According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
Hidden computer viruses and computer viruses polymorphism is more difficult to detect.
隐性计算机病毒和多态性计算机病毒更使人难以检测。
The amalgamation of the computer viruses and hacker technology makes the computer viruses full with more destructive potential than ever.
而计算机病毒与黑客技术的融合,使其具有了前所未有的破坏性。
This article recommends the principle of Computer Viruses, and gives overview of old method of Computer Viruses. On the other hand, it gives some new theory and protection method of Computer Viruses.
本文阐述了计算机病毒的原理,综述了传统的计算机病毒防护方法,同时介绍了一些新的防护理论及方法。
This article recommends the principle of Computer Viruses, and gives overview of old method of Computer Viruses. On the other hand, it gives some new theory and protection method of Computer Viruses.
本文阐述了计算机病毒的原理,综述了传统的计算机病毒防护方法,同时介绍了一些新的防护理论及方法。
应用推荐