查明这些袭击的罪犯,几乎是不可能的,因为网络攻击通常会通过多层被感染的计算机进入,以掩盖其发起源头。
Identifying the culprits in such attacks can be next to impossible, because computer attacks are typically routed through multiple layers of infected computers to disguise the source.
一旦被感染,该软件(中毒计算机)每天会连接250个不同的随机域名。
Once it has infected a machine, the software also tries to connect to up to 250 different domains with random names every day.
网站现在成了受黑客青睐的传播恶意软件的工具,部分原因是通过社交媒体网站发送垃圾邮件或链接可以让计算机神不知鬼不觉地被感染。
Websites are now the favoured means of spreading malware, partly because the unwary are directed to them through spam or links posted on social-networking sites.
被感染的计算机可能被利用,形成可以在外部操作的“僵尸网络”。不法分子就可以利用该网络发送垃圾信息,或发出大量假信息导致网站瘫痪。
Compromised machines can then be linked up to form "botnets3" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
Conficker程序被设计为了在它占据被感染的计算机后,它能被软件远程控制为一个用于分发广告邮件或其它恶意程序的广域系统服务。
The Conficker program is built so that after it takes up residence on infected computers, it can be programmed remotely by software to serve as a vast system for distributing spam or other malware.
缓慢或延迟的响应可能导致大量的计算机被感染和潜在的数据损失,或对波及的网络基础设施造成难以估量的冲击。
A slow or delayed response could lead to a large pool of computers being compromised and the potential data loss or impact on the affected network infrastructure could be unquantifiable.
计算机病毒的传播行为与生物病毒极其相似:它们可能从开始感染时就是致命的,可以被某些特定的事件所引发(逻辑炸弹)。
Computer viruses act like biologics in the way they can be set off: they can be virulent from the outset of the infection or they can be activated by a specific event (logic bomb).
这种计算机病毒正在传播,所有上网用户都有被感染的危险。
This computer virus is spreading, and all online users are at risk.
如果计算机被感染病毒,那么,我该怎么办?
它的名字被从“复制”和“感染”其他计算机的它的能力创造。
Its name was coined from its ability to "replicate" and "infect" other computers.
被远程操作的计算机更易感染病毒。
The tele-operated computer is more likely to be infected by virus.
本文针对目前气象业务工作中常常会遇到计算机被病毒感染的情况,提出了一些预防病毒感染的方法,以减少计算机病毒对业务工作的不利影响。
Aimed at the infection of computer virus in meteorological service work, some methods prevention from virus infections are proposed to reduce the impact of computer virus to operation work.
当一个感染的文件被激活、执行或者当计算机从一个感染的磁盘启动系统,那么系统他自己也在执行着。
Often, it lurks in computer memory, waiting to infect the next program that is activated, or the next disk that is accessed.
运行或访问受感染的文件或使用被感染磁盘启动计算机时,病毒会传播到计算机上。
Computer viruses spread by attaching themselves to other programs or to the boot sector of a disk.
运行或访问受感染的文件或使用被感染磁盘启动计算机时,病毒会传播到计算机上。
Computer viruses spread by attaching themselves to other programs or to the boot sector of a disk.
应用推荐