有计算机英语高手帮我翻译下 非常感谢拉.!

来源:百度知道 编辑:UC知道 时间:2024/06/29 02:25:55
在网络这个不断更新换代的世界里,网络中的安全漏洞无处不在。即便旧的安全漏洞补上了,新的安全漏洞又将不断涌现。网络攻击正是利用这些存在的漏洞和安全缺陷对系统和资源进行攻击。
也许有人会对网络安全抱着无所谓的态度,认为最多不过是被攻击者盗用账号,造不成多大的危害。他们往往会认为“安全”只是针对那些大中型企事业单位和网站而言。其实,单从技术上说,黑客入侵的动机是成为目标主机的主人。只要他们获得了一台网络主机的超级用户权限后他们就有可能在该主机上修改资源配置、安置“特洛伊”程序、隐藏行踪、执行任意进程等等。我们谁又愿意别人在我们的机器上肆无忌惮地拥有这些特权呢?更何况这些攻击者的动机也不都是那么单纯。因此,我们每一个人都有可能面临着安全威胁,都有必要对网络安全有所了解,并能够处理一些安全方面的问题。
计算机网络的风险主要由网络系统存在的缺陷或漏洞、对漏洞的攻击以及外界环境对网络的威胁等因素构成。可以通过对风险要素的识别、评价,达到减少风险,从而达到保障网络安全的目的。
下面我们就来看一下那些攻击者是如何找到你计算机中的安全漏洞的,并了解一下他们的攻击手法。

World lining renovating and upgrading so unceasingly in network , safe leak nowhere in network are
absent. The leak has made up even old safety , the new safe leak will have spring up unceasingly.
The defect the network is attacked exactly being to make use of leak and safety there existing in
these carries out attack on system and resource. Somebody maybe may be carrying the attitude being
indifferent in breast to network safety , think that the maximum is just to be embezzled the
account number , to be unable to how big damage bring about by the attacker. They sometimes will be
greatly medium-sized thinking that "safety" is only specifically for those anxiously expecting
institution and website Er Yan . In fact , only from saying on the technology, the motivation that
the hacker invades is the host who becomes the target lead plane. The course waits procedure ,
track , implementation concealing revising allocation of