英语翻译 急 在线等大神

BackdoorsBackdoorprogramsaretypicallymoredangerousthancomputerviruses,astheycanbeused... Backdoors

Backdoor programs are typically more dangerous than computer viruses, as they can be used by an intruder to take control of a PC and potentially gain access to an entire network.Backdoor programs, also referred to as Trojan horses, are typically sent as attachments to e-mails with innocent-looking file names, tricking users into installing them. They often enable remote users to listen in on conversations using the host computer's microphone, or even see through its video camera if it has one. Back Orifice (BO) (闯后门程序)2000 is a backdoor program designed for malicious use. Its main purpose is to maintain unauthorized control over another machine for reconfiguration and data collection. It takes the form of a client/server application that can remotely control a machine without the user's knowledge to gather information, perform system commands, reconfigure machines and redirect network traffic.
With BO an intruder has to know the user's IP address to connect, or could scan an entire network look for the victim. Once connected, the intruder can send requests to the BO 2000 server program, which performs the actions the intruder specifies on the victim's computer, sending back the results.
BO is installed on the server machine simply through the execution of the server application.
展开
 我来答
匿名用户
2014-12-19
展开全部
后门
Backdoor programs are typically more dangerous than computer viruses, as they can be used by an intruder to take control of a PC and potentially gain access to an entire network.Backdoor programs, also referred to as Trojan horses, are typically sent as attachments to e-mails with innocent-looking file names, tricking users into installing them. They often enable remote users to listen in on conversations using the host computer's microphone, or even see through its video camera if it has one. Back Orifice (BO) (闯后门程序)2000 is a backdoor program designed for malicious use. Its main purpose is to maintain unauthorized control over another machine for reconfiguration and data collection. It takes the form of a client/server application that can remotely control a machine without the user's knowledge to gather information, perform system commands, reconfigure machines and redirect network traffic.
后门程序通常比病毒更危险,因为他们可以通过一个入侵者以PC控制和潜在的访问整个网络。后门程序,也被称为特洛伊木马,通常作为附件的电子邮件发送文件名无辜,欺骗用户安装。他们经常使远程用户听在使用主机计算机的麦克风交谈,甚至看到通过摄像机,如果它有一个。背孔(BO)(闯后门程序)2000是一个后门程序设计的恶意使用。其主要目的是保持对重构和数据收集的另一台机器上未经授权的控制。它以客户机/服务器应用程序,可以远程没有用户的知识来收集信息,控制机器的形式,执行系统命令,重新配置的机器和重定向的网络流量。
With BO an intruder has to know the user's IP address to connect, or could scan an entire network look for the victim. Once connected, the intruder can send requests to the BO 2000 server program, which performs the actions the intruder specifies on the victim's computer, sending back the results.
柏入侵者必须知道用户的IP地址连接,或可以扫描整个网络看受害者。一旦连接,攻击者可以发送请求到BO 2000服务器程序,它执行的动作指定对受害人的电脑入侵者,发送回的结果。
BO is installed on the server machine simply through the execution of the server application.
博是安装在服务器通过服务器应用程序的执行。
dayinspring
高粉答主

2014-12-19 · 繁杂信息太多,你要学会辨别
知道大有可为答主
回答量:2.3万
采纳率:92%
帮助的人:3487万
展开全部
Backdoor programs are typically more dangerous than computer viruses , as they can be used by an intruder to take control of a pc and potentially gain access to an entire network.
后门程序一般要比计算机病毒更加危险,因为入侵者可通过它来控制一台电脑。
With BO an intruder has to know the user.s IP address to connect, or could scan an entire network looking for the victim.
使用BO时,入侵者必须知道用户IP地址才能连接,或者通过扫描整个网络来寻找攻击对象.

BO is installed on the server machine simply through the execution of the sever application
只要执行服务应用程序,BO便被安装到服务器上。
Many people send each other animations in E-mail ;it is easy to put a backdoor program into one of these and users cannot tell when they infect their computers with Back Orifice 2000。
不少人在电子邮件中发送动画:后门程序很容易藏身其中,用户就很难说清BO2000何时会感染他们的计算机.
本回答被网友采纳
已赞过 已踩过<
你对这个回答的评价是?
评论 收起
学着走路2013
2014-12-19 · TA获得超过2180个赞
知道大有可为答主
回答量:3309
采纳率:40%
帮助的人:1665万
展开全部
后台程序通常比病毒更危险,因为他们可以通过一个入侵者以PC控制和潜在的访问整个网络。后门程序,也被称为特洛伊木马,通常作为附件的电子邮件发送文件名无辜,欺骗用户安装。他们经常使远程用户听在使用主机计算机的麦克风交谈,甚至看到通过摄像机,如果它有一个。背孔(BO)(闯后台程序)2000是一个后门程序设计的恶意使用。其主要目的是保持对重构和数据收集的另一台机器上未经授权的控制。它以客户机/服务器应用程序,可以远程没有用户的知识来收集信息,控制机器的形式,执行系统命令,重新配置的机器和重定向的网络流量。柏入侵者必须知道用户的IP地址连接,或可以扫描整个网络看受害者。一旦连接,攻击者可以发送请求到BO 2000服务器程序,它执行的动作指定对受害人的电脑入侵者,发送回的results.bo安装在服务器通过服务器应用程序的执行。
已赞过 已踩过<
你对这个回答的评价是?
评论 收起
收起 更多回答(1)
推荐律师服务: 若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询

为你推荐:

下载百度知道APP,抢鲜体验
使用百度知道APP,立即抢鲜体验。你的手机镜头里或许有别人想知道的答案。
扫描二维码下载
×

类别

我们会通过消息、邮箱等方式尽快将举报结果通知您。

说明

0/200

提交
取消

辅 助

模 式