登陆注册
3765300000073

第73章 Computer Security(3)

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compaq and IBM developed to secure their own networks in the mid-eighties, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with simple packet filters and dial-back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a Web site’s true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become simple and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every internet-connected computer contains the equivalent of a firewall. Even then, centralized management of internet policy may make firewalls a permanent addition to corporate networking.

【New Words】

subway

地道,地铁

totality

全体,总数

magnitude

大小,数量,量级

infrastructure

下部构造,基础下部组织

minuscule

草写小字,极小的

burgeon

嫩芽,萌芽

rudimentary

根本的,未发展的

permanent

永久的,持久的

9.2 Computer Viruses

Most viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of it over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security system.

The technical details of CIH’s infection mechanism are intriguing for the virus researcher; its payload is what sets it apart from other viruses. The payload consists of two parts, both of which are triggered when the right conditions are met. As the payload is a part of the infection mechanism, it is not triggered until the virus is resident in memory. The trigger condition is met when a file which has an EXE extension, but which is not a suitable host, is opened on the trigger date.

The first part of the payload code to trigger is what has given CIH the world’s sudden attention. Flash ROM technology has existed for several years. Having BIOS “flash able”, by storing it in such a chip, has allowed the basic bootstrap procedure and I/O routines of the PC to be rewritten by software. Early EPROM technologies allowed reprogramming the BIOS, but required the chip to be removed, erased under ultraviolet light and reprogrammed in dedicated hardware.

The second part of the load is common. It overwrites the first 2048 sectors (1MB) of each hard disk in the system with random data from memory. Anything overwritten in such a manner will be difficult or impossible to recover. The virus looks for further disks indefinitely and the machine -- despite running the hard disk continuously -- is unresponsive to user input.

PE files are executables used by Windows XP and Windows NT. APE file consists of a DOS executable, usually just a stub that indicates the program should be run under Windows, a PE header section and several data objects. These objects can contain executable code, information on imported and exported functions, data or relocation information. Each object following the PE header must be aligned within the file to start on a boundary that is an even power of two, between 512 bytes and 64KB.

同类推荐
  • 地道英语脱口而出

    地道英语脱口而出

    本书精选热点单词及句型,用口语交流最热点的主题。本书内容丰富,语言地道。书中附有配套超长600分钟MP3的下载二维码,只需拿起手机扫一扫即可轻松下载MP3,随时随地练习听力和口语,开创外语学习新模式!
  • 英文爱藏:我在回忆里等你

    英文爱藏:我在回忆里等你

    杨一兰编著的《我在回忆里等你》是英文爱藏丛书之一,为中英双语 对照版,《我在回忆里等你》既是英语学习爱好者、文学爱好者的必备读 物,也是忙碌现代人的一片憩息心灵的家园,让读者在欣赏原法原味和凝 练生动的英文时,还能多角度、深层次地品读语言特色与艺术之美,再配 合文章后附加的多功能、全方位巩固题型,更有助于理解并学习英……
  • 非洲的百万富翁(双语译林)

    非洲的百万富翁(双语译林)

    《非洲的百万富翁》讲述了骗子克雷上校与查尔斯爵士斗智斗勇的故事。克雷上校通过伪装成不同的身份,如墨西哥先知、小牧师理查德·佩普洛·布拉巴宗、施莱尔马赫教授等欺骗查尔斯,令查尔斯防不胜防。而案情的揭露则是通过克雷上校在事后给查尔斯发来的羞辱信,把他实施作案的过程揭露出来的。最终,克雷上校受到了法律的制裁。
  • 相约星期二

    相约星期二

    这是一个真实的故事:年逾七旬的社会心理学教授莫里在一九九四年罹患肌萎缩性侧索硬化,一年以后与世长辞。作为莫里早年的得意门生,米奇在老教授缠绵病榻的十四周里,每周二都上门与他相伴,聆听他最后的教诲,并在他死后将老师的醒世箴言缀珠成链,冠名《相约星期二》。
  • 时间机器与隐身人:THE TIME MACHINE & THE INVISIBLE MAN(

    时间机器与隐身人:THE TIME MACHINE & THE INVISIBLE MAN(

    《时间机器》是令威尔斯声誉鹊起的处女作,也是其杰出代表作之一。通过《时间机器》,威尔斯表达了对人类终极处境的关怀,拨动了亿万颗不安的心灵。人类自诞生之日起就感叹生命的短暂,然而威尔斯竟设想出一架能自由穿梭于时空中的机器,而且从理论到实践均构思得天衣无缝,只要人类还为时空的局限所困,《时间机器》的魅力将永不消减。1897年发表的《隐身人》亦是威尔斯流传深远、广受欢迎的作品。《隐身人》将视角转向了科学技术本身,向读者展现了科技无限发展后潜在的负面效应。威尔斯警示人们科学是把双刃剑,既可造福人类,又能招致灭顶之灾,在物欲横流的社会,科学发明一旦落入自私者之手,后果将不堪设想。
热门推荐
  • 大周神厨

    大周神厨

    一代神厨穿越古代,成为公主府厨房管事……
  • 拆开一个夏天

    拆开一个夏天

    下辈子我们还要住隔壁,我们青梅竹马,两小无猜……“不管你是回忆里的还是已经去世的,我都要对你说,对不起!我后悔了,从离婚的那一秒就后悔了!我爱你,我喜欢你,我好想你啊!”“我说过我喜欢温柔的人,而你……很温柔。”“如果我向你提出共度余生的邀请,你会愿意放下她来牵我的手吗?”“明明有对我那么好的人,为什么我还爱你!我要怎么做才能像你那样说走就走不再回头啊!”“你一直相信着你以为的,但你有问过我吗,如果你问过我的话,我一定会大声的告诉你我从来都没有恨过你啊!”“如果警察来晚一些,你就不是我的了……”本作为微腐小甜大虐的类型,有单纯青涩的爱恋,有年少幼稚的嫉妒,有向前追逐的理想,有无可替代的友谊,有无法言说的愧疚,有难以启齿的告白,有再也回不去的回忆……抒写一段全新的、如诗如画如曲如梦的青春。
  • 我的非人类女战士

    我的非人类女战士

    被召唤到了一个千年之后的异星世界时,发现自己陷入了被人追杀的一系列事件中。在追杀与反追杀的较量中,他只想拥有一个可以重新开始的自己。却没料到,忽略了身边的一个人……
  • 成功父母的7堂课

    成功父母的7堂课

    不是每位父母部懂得如何去爱孩子,如何去教育孩子。作为父 母,仅仅为孩子创造了丰富的物质基础是远远不够的,父母有责任提 高自己的能力,有责任学习正确的教育方法。 廖康强编著的《成功父母的7堂课》是一本培训好父母的教材,告诉父 母家庭教育中的基本理 念,教父母如何与孩予沟通,如何培养孩子的各种能力,如何让孩子 自由地成长。对于心望子成龙的父母来说,毫无疑问,《成功父母的7堂课 》是一本不 可多得的好书。
  • 繁星万里不如你

    繁星万里不如你

    景笑笑上辈子识人不清,惨死在医院,重活一世,她飞速抱上了一根粗大腿。第二次见面两个人就迅速领了证,她成为了万众瞩目的司太太,更是成了那个男人的心尖宠。从此以后,大众心中高不可攀的男神化身为忠犬,做饭,暖床,带娃……人人都羡慕景笑笑有幸得到司夜辰的如此宠爱,却不知在司夜辰心中,他是寒冰,而她是骄阳,遇到她以后,他就化作了一潭春水。
  • 你离品位有多远

    你离品位有多远

    该书内设有“与品位邂逅”、“形象与品位”、“品位男人”、“品位女人”、“品位在职海泛波”以及“过有品位的生活”六个专题内容。
  • 龙女祸世

    龙女祸世

    神界、人界、仙界,三界轮回,他只对她情有独钟。世人皆知龙生九子,却不知还有个第十子,并且这个第十子还是个女的。“龙女祸世,见之杀之!”这道神谕是任她三界轮回都甩不掉的诅咒。苍砄上仙亦是她三界都躲不掉的情劫。人界他是都护之子,她是陪读丫头仙界他是苍砄上仙,她是耍宝弟子神界他是沧海白石,她是龙之十子三界轮回,他只对她情有独钟。
  • 独步上西楼

    独步上西楼

    他是将军。可她,却是戏子。阴差阳错,就代替了陆家姑娘成为了将军夫人。她普爱众生,是个善良姑娘。他屠杀城池,是个不败将军。她不愿难民无家可归四处漂泊,他便放了难民自愿承担圣上的所有责罚。她不喜战争,他便为了她放下将军身段恳求圣上平息战乱还百姓安宁。他从开始就知道她是个冒名顶替的陆小姐。可又不知怎的,却被她迷了心窍。可他却不知。她的日夜祈祷,其实是怕自己的夫君受伤。她的苦愁哀怨都是在提心吊胆着他的安危。“你顾这天下顾了一辈子,你可曾知道,我只顾你。”她在院前的桃树下埋了几壶酒,盼着他回来与她对饮谈心。可这一等,便是十几个春秋。后来,她偶尔从小辈口中听到他的名字,她只会稍加赞赏几句。可心里确实埋怨的很。若不是这天下战乱,我又怎会失去他。吾发青丝化白雪,汝却迟迟不归家。待吾化土入尘埃,与尔对饮论今生。
  • 凰医帝临七神

    凰医帝临七神

    (原名《焚尽七神:狂傲女帝》)前世,她贵为巅峰女帝,一夕之间局势逆转,沦为废材之质。魂灵双修,医毒无双,血脉觉醒,一御万兽。天现异象,凰命之女,自此归来,天下乱之。这一次,所有欺她辱她之人必杀之!他自上界而来,怀有目的,却因她动摇内心深处坚定的道义。“你曾说,你向仰我,你想像我一样,步入光明,是我对不起你,又让你重新回到黑暗。”“你都不在了,你让我一个人,怎么像向仰你?!”爱与不爱,从来都是我们自己的事,与他人无关。带走了所有的光明与信仰。
  • 情场麻辣烫

    情场麻辣烫

    选录了《最美的爱情有多美》、《等待第十朵玫瑰》、《等待一朵蔷薇再盛开》、《开灯》、《谁是我的拉风王子》、《找一趟回18岁的班车》、《5000只鸟儿说爱你》、《拼图游戏》、《一袋买了60年的盐》、《相守一生的爱人》、《想抓你就抓床单吧》、《蜀葵边上的石凳》、《绑架者》、《和初恋情人看电影》、《请把我的花儿浇点水》等近百篇关于情感的微型小说。