病毒的工作原理: [英] How viruses work:

查看:93
本文介绍了病毒的工作原理:的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我有一个关于病毒是如何工作的理论。我的理论是你需要一台计算机来承载另一台计算机程序,一旦该程序被托管,并且该程序被执行,它就可以启动另一台计算机程序。 />
程序进入免费商店的内存,它可以在操作系统的幕后运行和播放

。只是有意地写了一个程序,将自己溢出到剩余的内存中。

最简单的一种只会开始摧毁一台Windows计算机,但更多精彩程序会尝试观察和理解什么窗口

正在做什么。一旦windows开始自行关闭,它就会将其加载程序写入启动脚本中,一旦windows启动它将从启动脚本中删除,所以你永远不会看到程序正在执行。并且由于程序在免费商店运行,因为它会破坏内存并降低机器速度,因此除了非常的

错误外,你甚至都没有注意到它。最终

它只是占用了大量的资源,它发送了大量的电子邮件给每个人在线b / b
所有其他病毒的网络

回来了。它会记录您的所有击键并窃取您的密码,将您的身份标记到黑客数据库中。几乎每台机器都有

病毒,但没有人可以追溯到可能隐藏在另一个国家的作者,特别是因为你通过了一个
意大利面条网络,因为所有病毒都互相通信。

计算机内存中不安全的免费商店是C ++

构建的一部分,和Windows在C ++编程中编程了

语言。您甚至可以编写自己的C ++操作系统,并将它们放在启动盘和cdroms上。我认为比尔盖茨真的应该为所有病毒责备

,因为他没有办法让Windows通过自己的记忆搜索
并寻找不寻常的活动。它甚至不知道它在做什么。

I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system. Just by intentionally
writing a program that spills itself into the rest of memory. The
simplest kind will just start destroying a windows computer, but more
sophisticated programs will try to watch and understand what windows
is doing. As soon as windows starts shutting itself down, it will
write its loading program into the startup script, and once windows
starts up it will remove itself from the startup script, so you never
even see the program executing. And because the program is running
wild on the free store you never even notice it except for unsual
errors as it corrupts memory and slows down your machine. Eventually
it just hogs so much resources that it sends out bulk e-mail to
everyone online, and networks with all the other viruses behind your
back. It logs all your keystrokes and steals your passwords, putting
your identity into a hacker database. Almost every machine has the
virus, but no one can trace it down to the author who is probably
hiding in another country, especially because you get through a
network of spaghetti as all the viruses communicate with each other.
The unsecured free store in the computers memory is part of what C++
was built on, and windows was programmed up in the C++ programming
language. You can even write your own C++ operating systems and put
them on boot disks and cdroms. I think Bill Gates is really to blame
for all viruses because he doesn''t have a way for windows to search
through its own memory and look for unusual activity. It doesn''t even
know what it is doing itself.

推荐答案

周五,30 2007年3月1日14:27:02 -0700,一块石头落在了天空,击中了头部的b $ b virtaaladepts,并启发了以下内容:
On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:

我有一个关于病毒是如何工作的理论。我的理论是你需要一台计算机来承载另一台计算机程序,一旦该程序被托管,并且该程序被执行,它就可以启动另一个程序

在免费商店的内存中,它可以在操作系统的

场景后面运行和播放。
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other program
in to memory on the free store, where it can run and play behind the
scenes of the operating system.



哇,这一天充满了精彩的创意!


我想你刚刚发明了那里的缓冲区溢出,孩子!
http://en.wikipedia.org/wiki/Buffer_overflow


恭喜!


-

k

Wow, this day is full of brilliant ideas!

I think you''ve just invented the buffer overflow there, kiddo!
http://en.wikipedia.org/wiki/Buffer_overflow

Congratulations!

--
k


3月30日下午5:32,PerfectReign< perfectre ... @ xr4ti.cotse.netwrote:
On Mar 30, 5:32 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:

2007年3月30日星期五14:27:02 -0700,一块石头落在了天空,击中了b $ b virtaaladepts的头部,并启发了以下内容:
On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:

I了解病毒是如何运作的。我的理论是你需要一台计算机来承载另一台计算机程序,一旦该程序被托管,并且该程序被执行,它就可以启动另一个程序

在免费商店的内存中,它可以在操作系统的

场景后面运行和播放。
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other program
in to memory on the free store, where it can run and play behind the
scenes of the operating system.



哇,这一天充满了精彩的创意!


我想你刚刚发明了那里的缓冲区溢出,孩子!

http://en.wikipedia.org / wiki / Buffer_overflow


恭喜!


-

k


Wow, this day is full of brilliant ideas!

I think you''ve just invented the buffer overflow there, kiddo!

http://en.wikipedia.org/wiki/Buffer_overflow

Congratulations!

--
k



缓冲区溢出完全不同。病毒编写者可以通过他们的朋友手动启动他们自己的病毒。他们用他们自己编写的软件计算机.b
计算机。该软件只是在一个字符串中包含另一个已经编译过的程序,即
将自己启动到内存中。然后,原始程序找到了一种方法来单独执行该程序在内存中,也许是在启动之前

windows加载之前。计算机硬件配置为多个b
任务。因此,所有程序需求都是在Windows内存中执行自身的一种方式,在关机时重写自己进入引导扇区,

并在启动时自行删除它。所有最初的攻击都要做的是

将自己写入引导扇区并冻结你的计算机强制重启
。然后病毒可以在

操作系统之外的内存中执行,并监视你的每次击键,甚至通过电子邮件将你的b $ b活动发回给一个匿名账户。自己的电子邮件服务器。

bootsector病毒首先加载,然后终止溢出

本身进入Windows启动脚本,甚至是imac启动。我的b $ b可以告诉imac'不安全,但如果你要构建一台机器,那么
只能启动它的预期操作系统并配置该代码<对CMOS病毒来说,
不是问题。您还需要

永久配置哪些应用程序可以在启动时加载

操作系统内,因为病毒可以重写

操作系统执行背后的常驻程序。

The buffer overflow is completely different. Virus writers can
litterally launch their own viruses by hands on their friends
computers with software they write themselves. The software just
contains in a string another program that is already compiled that
launches itself into memory. Then the origonal program finds a way to
execute that program in memory seperately, perhaps at boot time before
windows even loads. The computer hardware is configured to be multi-
tasking. So all the program needs is a way to execute itself outside
of windows memory, rewrite itself into the boot sector at shutdown,
and delete it self at startup. All the initial attack has to do is
write itself into the boot sector and freeze your computer forcing a
restart. The virus can then execute itself in memory outside of the
operating system, and spy on your every keystroke, even e-mailing you
activity back to an anonymous account with its own e-mail server. The
bootsector virus just loads up first and then terminates spilling
itself into the windows startup script, or even the imac startup. I
can tell imac''s aren''t secure, but if you were to build a machine that
could only boot its intended operating system and configure that code
into CMOS viruses wouldn''t be a problem. You would also have to
permanently configure what applications could load up at boot time
inside of the operating system, because a virus can rewrite the
operating system to execute resident programs behind your back.


2007年3月30日星期五15:06:46 -0700,一块石头落在了天空,击中

virtualadepts的头部,并启发以下内容:
On Fri, 30 Mar 2007 15:06:46 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:

3月30日下午5:32,PerfectReign< perfectre .. 。@ xr4ti.cotse.netwrote:
On Mar 30, 5:32 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:

> 2007年3月30日星期五14:27:02 -0700,一块石头落在了天空中,击中了>头脑中的virtualadepts,并启发以下内容:
>On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:

我有一个关于病毒如何工作的理论。我的理论是你需要一台计算机来承载另一台计算机程序,一旦该程序被托管,并且该程序被执行,它就可以启动另一台计算机程序。 />
程序进入免费商店的内存,它可以在操作系统的幕后运行和播放


I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system.


哇,这一天充满了精彩的想法!

我想你刚刚在那里发明了缓冲区溢出,孩子!

http://en.wikipedia.org/wiki/Buffer_overflow

恭喜!

-
k


Wow, this day is full of brilliant ideas!

I think you''ve just invented the buffer overflow there, kiddo!

http://en.wikipedia.org/wiki/Buffer_overflow

Congratulations!

--
k



缓冲区溢出完全不同。病毒编写者可以通过他们自己编写的软件亲自在他们的朋友计算机上发起他们自己的病毒.b
。该软件只包含一个

字符串另一个已编译的程序,它将自己启动到内存中。然后,原始程序找到一种方法在内存中单独执行那个

程序,也许是在Windows启动之前,即使是
加载。


The buffer overflow is completely different. Virus writers can
litterally launch their own viruses by hands on their friends computers
with software they write themselves. The software just contains in a
string another program that is already compiled that launches itself
into memory. Then the origonal program finds a way to execute that
program in memory seperately, perhaps at boot time before windows even
loads.



Windows是否会在您的计算机上加载?我觉得很难相信。

Does Windows load on your computer? On mine, I find that hard to believe.


计算机硬件配置为多任务处理。
The computer hardware is configured to be multi- tasking.



确切地说,这是怎么发生的?我从来没有听说过多任务处理

硬件。


这是否意味着我的硬盘可以同时充当键盘?

How, exactly, did that happen? I''ve never heard of multi-tasking
hardware.

Does this mean that my hard drive can simultaneously act as a keyboard?


所以

所有程序需求都是在windows外执行的一种方式

内存,
So
all the program needs is a way to execute itself outside of windows
memory,



这很容易!我的所有程序都在Windows内存之外执行。

That''s easy! All my programs execute outside of Windows memory.


在关机时重写自己进入引导扇区,并在启动时将其删除

self。所有最初的攻击都要将自己写入引导扇区并冻结你的计算机强制重启。病毒

然后可以在操作系统之外的内存中执行,并且每次按键都会监视
间谍,甚至通过电子邮件将您的活动发送回

匿名帐户及其自己的电子邮件服务器。引导程序病毒只是

首先加载,然后终止溢出到窗口

启动脚本,甚至是imac启动。我可以告诉imac'不是
安全,但是如果你要构建一台只能启动其b / b
操作系统的机器并将其配置为CMOS病毒

不是问题。您还必须永久配置

哪些应用程序可以在运行时运行

系统内加载,因为病毒可以重写操作系统来执行
背后的常驻计划。
rewrite itself into the boot sector at shutdown, and delete it
self at startup. All the initial attack has to do is write itself into
the boot sector and freeze your computer forcing a restart. The virus
can then execute itself in memory outside of the operating system, and
spy on your every keystroke, even e-mailing you activity back to an
anonymous account with its own e-mail server. The bootsector virus just
loads up first and then terminates spilling itself into the windows
startup script, or even the imac startup. I can tell imac''s aren''t
secure, but if you were to build a machine that could only boot its
intended operating system and configure that code into CMOS viruses
wouldn''t be a problem. You would also have to permanently configure
what applications could load up at boot time inside of the operating
system, because a virus can rewrite the operating system to execute
resident programs behind your back.



哦,你熟悉TSx投票机,那么。


也许你就是那个谁在俄亥俄州那里操纵选举,那么,呃?


-

k


a转向信号是一个声明,而不是请求

Oh, you''re familiar with the TSx voting machines, then.

Maybe you''re the one who rigged the election there in Ohio, then, eh?

--
k

a turn signal is a statement, not a request


这篇关于病毒的工作原理:的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆