首页 | 本学科首页   官方微博 | 高级检索  
     检索      

特洛伊木马技术的研究与VC实现
引用本文:张可儿,高晓红,汪晓文.特洛伊木马技术的研究与VC实现[J].陇东学院学报(社会科学版),2011(6).
作者姓名:张可儿  高晓红  汪晓文
作者单位:陇东学院电气工程学院;中南大学信息科学与工程学院;
摘    要:随着计算机技术的发展,木马作为网络入侵的一种常用工具,对计算机网络信息安全构成的威胁越来越大.本文研究了木马实现技术,并对木马的防范与查杀技术进行了深入的分析,基于VC++6.0平台设计了采用反向链接技术的端口反弹型木马,该木马种植起来较容易,并对其提出了相应的木马查杀工具,能有效地检测和清除该木马,有助于木马程序的研究和防范.

关 键 词:特洛伊木马  木马防范  木马查杀  木马编程  

A Research on Trojan horse Technological and VC Realization
ZHANG Ke-er,GAO Xiao-hong,WANG Xiao-wen.A Research on Trojan horse Technological and VC Realization[J].Journal of Longdong University(Social Science Edition),2011(6).
Authors:ZHANG Ke-er  GAO Xiao-hong  WANG Xiao-wen
Institution:ZHANG Ke-er1,GAO Xiao-hong2,WANG Xiao-wen2(1.Colloge of Electrical Engineering,Longdong University,Qingyang 745000,Gansu,China,2.School of Information Science and Engineering,Central South University,Changsha 410083,Hunan,China)
Abstract:As the development of the computer technology techniques,which as a common tool of network intrusion,is becoming a growing threat to information safety technology for computer network.Trojan implementation techniques are studied,and detecting as well as killing Trojans are deeply analyzed.Basing on the platform of VC++6.0 and using reverse ling technology;Port recall Trojan horse is studied and designed and easy to plant.In the end,corresponding killing Trojans tool is designed which can effectively detect ...
Keywords:Trojan horse  Trojan defenses  finding and killing Trojans  Trojan programming Multiple Positive Solutions of Forth-Order Two-Point Boundary Value Problem  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号