英语翻译 急 在线等大神
BackdoorsBackdoorprogramsaretypicallymoredangerousthancomputerviruses,astheycanbeused...
Backdoors
Backdoor programs are typically more dangerous than computer viruses, as they can be used by an intruder to take control of a PC and potentially gain access to an entire network.Backdoor programs, also referred to as Trojan horses, are typically sent as attachments to e-mails with innocent-looking file names, tricking users into installing them. They often enable remote users to listen in on conversations using the host computer's microphone, or even see through its video camera if it has one. Back Orifice (BO) (闯后门程序)2000 is a backdoor program designed for malicious use. Its main purpose is to maintain unauthorized control over another machine for reconfiguration and data collection. It takes the form of a client/server application that can remotely control a machine without the user's knowledge to gather information, perform system commands, reconfigure machines and redirect network traffic.
With BO an intruder has to know the user's IP address to connect, or could scan an entire network look for the victim. Once connected, the intruder can send requests to the BO 2000 server program, which performs the actions the intruder specifies on the victim's computer, sending back the results.
BO is installed on the server machine simply through the execution of the server application. 展开
Backdoor programs are typically more dangerous than computer viruses, as they can be used by an intruder to take control of a PC and potentially gain access to an entire network.Backdoor programs, also referred to as Trojan horses, are typically sent as attachments to e-mails with innocent-looking file names, tricking users into installing them. They often enable remote users to listen in on conversations using the host computer's microphone, or even see through its video camera if it has one. Back Orifice (BO) (闯后门程序)2000 is a backdoor program designed for malicious use. Its main purpose is to maintain unauthorized control over another machine for reconfiguration and data collection. It takes the form of a client/server application that can remotely control a machine without the user's knowledge to gather information, perform system commands, reconfigure machines and redirect network traffic.
With BO an intruder has to know the user's IP address to connect, or could scan an entire network look for the victim. Once connected, the intruder can send requests to the BO 2000 server program, which performs the actions the intruder specifies on the victim's computer, sending back the results.
BO is installed on the server machine simply through the execution of the server application. 展开
3个回答
2014-12-19
展开全部
后门
Backdoor programs are typically more dangerous than computer viruses, as they can be used by an intruder to take control of a PC and potentially gain access to an entire network.Backdoor programs, also referred to as Trojan horses, are typically sent as attachments to e-mails with innocent-looking file names, tricking users into installing them. They often enable remote users to listen in on conversations using the host computer's microphone, or even see through its video camera if it has one. Back Orifice (BO) (闯后门程序)2000 is a backdoor program designed for malicious use. Its main purpose is to maintain unauthorized control over another machine for reconfiguration and data collection. It takes the form of a client/server application that can remotely control a machine without the user's knowledge to gather information, perform system commands, reconfigure machines and redirect network traffic.
后门程序通常比病毒更危险,因为他们可以通过一个入侵者以PC控制和潜在的访问整个网络。后门程序,也被称为特洛伊木马,通常作为附件的电子邮件发送文件名无辜,欺骗用户安装。他们经常使远程用户听在使用主机计算机的麦克风交谈,甚至看到通过摄像机,如果它有一个。背孔(BO)(闯后门程序)2000是一个后门程序设计的恶意使用。其主要目的是保持对重构和数据收集的另一台机器上未经授权的控制。它以客户机/服务器应用程序,可以远程没有用户的知识来收集信息,控制机器的形式,执行系统命令,重新配置的机器和重定向的网络流量。
With BO an intruder has to know the user's IP address to connect, or could scan an entire network look for the victim. Once connected, the intruder can send requests to the BO 2000 server program, which performs the actions the intruder specifies on the victim's computer, sending back the results.
柏入侵者必须知道用户的IP地址连接,或可以扫描整个网络看受害者。一旦连接,攻击者可以发送请求到BO 2000服务器程序,它执行的动作指定对受害人的电脑入侵者,发送回的结果。
BO is installed on the server machine simply through the execution of the server application.
博是安装在服务器通过服务器应用程序的执行。
Backdoor programs are typically more dangerous than computer viruses, as they can be used by an intruder to take control of a PC and potentially gain access to an entire network.Backdoor programs, also referred to as Trojan horses, are typically sent as attachments to e-mails with innocent-looking file names, tricking users into installing them. They often enable remote users to listen in on conversations using the host computer's microphone, or even see through its video camera if it has one. Back Orifice (BO) (闯后门程序)2000 is a backdoor program designed for malicious use. Its main purpose is to maintain unauthorized control over another machine for reconfiguration and data collection. It takes the form of a client/server application that can remotely control a machine without the user's knowledge to gather information, perform system commands, reconfigure machines and redirect network traffic.
后门程序通常比病毒更危险,因为他们可以通过一个入侵者以PC控制和潜在的访问整个网络。后门程序,也被称为特洛伊木马,通常作为附件的电子邮件发送文件名无辜,欺骗用户安装。他们经常使远程用户听在使用主机计算机的麦克风交谈,甚至看到通过摄像机,如果它有一个。背孔(BO)(闯后门程序)2000是一个后门程序设计的恶意使用。其主要目的是保持对重构和数据收集的另一台机器上未经授权的控制。它以客户机/服务器应用程序,可以远程没有用户的知识来收集信息,控制机器的形式,执行系统命令,重新配置的机器和重定向的网络流量。
With BO an intruder has to know the user's IP address to connect, or could scan an entire network look for the victim. Once connected, the intruder can send requests to the BO 2000 server program, which performs the actions the intruder specifies on the victim's computer, sending back the results.
柏入侵者必须知道用户的IP地址连接,或可以扫描整个网络看受害者。一旦连接,攻击者可以发送请求到BO 2000服务器程序,它执行的动作指定对受害人的电脑入侵者,发送回的结果。
BO is installed on the server machine simply through the execution of the server application.
博是安装在服务器通过服务器应用程序的执行。
展开全部
Backdoor programs are typically more dangerous than computer viruses , as they can be used by an intruder to take control of a pc and potentially gain access to an entire network.
后门程序一般要比计算机病毒更加危险,因为入侵者可通过它来控制一台电脑。
With BO an intruder has to know the user.s IP address to connect, or could scan an entire network looking for the victim.
使用BO时,入侵者必须知道用户IP地址才能连接,或者通过扫描整个网络来寻找攻击对象.
BO is installed on the server machine simply through the execution of the sever application
只要执行服务应用程序,BO便被安装到服务器上。
Many people send each other animations in E-mail ;it is easy to put a backdoor program into one of these and users cannot tell when they infect their computers with Back Orifice 2000。
不少人在电子邮件中发送动画:后门程序很容易藏身其中,用户就很难说清BO2000何时会感染他们的计算机.
后门程序一般要比计算机病毒更加危险,因为入侵者可通过它来控制一台电脑。
With BO an intruder has to know the user.s IP address to connect, or could scan an entire network looking for the victim.
使用BO时,入侵者必须知道用户IP地址才能连接,或者通过扫描整个网络来寻找攻击对象.
BO is installed on the server machine simply through the execution of the sever application
只要执行服务应用程序,BO便被安装到服务器上。
Many people send each other animations in E-mail ;it is easy to put a backdoor program into one of these and users cannot tell when they infect their computers with Back Orifice 2000。
不少人在电子邮件中发送动画:后门程序很容易藏身其中,用户就很难说清BO2000何时会感染他们的计算机.
本回答被网友采纳
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
后台程序通常比病毒更危险,因为他们可以通过一个入侵者以PC控制和潜在的访问整个网络。后门程序,也被称为特洛伊木马,通常作为附件的电子邮件发送文件名无辜,欺骗用户安装。他们经常使远程用户听在使用主机计算机的麦克风交谈,甚至看到通过摄像机,如果它有一个。背孔(BO)(闯后台程序)2000是一个后门程序设计的恶意使用。其主要目的是保持对重构和数据收集的另一台机器上未经授权的控制。它以客户机/服务器应用程序,可以远程没有用户的知识来收集信息,控制机器的形式,执行系统命令,重新配置的机器和重定向的网络流量。柏入侵者必须知道用户的IP地址连接,或可以扫描整个网络看受害者。一旦连接,攻击者可以发送请求到BO 2000服务器程序,它执行的动作指定对受害人的电脑入侵者,发送回的results.bo安装在服务器通过服务器应用程序的执行。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询