計(jì)算機(jī)病毒診斷與防治.rar
計(jì)算機(jī)病毒診斷與防治,論文標(biāo)準(zhǔn)word格式 共78頁 23228字 附中英文翻譯設(shè)計(jì)軟件源文件 封裝好的軟件摘 要目前,計(jì)算機(jī)病毒可以滲透信息社會(huì)的各個(gè)領(lǐng)域,給計(jì)算機(jī)系統(tǒng)帶來了巨大的破壞和潛在的威脅。為了確保信息的安全與暢通,因此研究對(duì)算機(jī)病毒的分析與清除的方法是迫在眉睫的,本論文從對(duì)病毒的分析入手,結(jié)合計(jì)算機(jī)病毒傳染的現(xiàn)狀,概述了計(jì)算機(jī)病...
該文檔為壓縮文件,包含的文件列表如下:
![](http://img.queshao.com/images/pcgzh.gif)
![](http://preview.queshao.com/tobuy/256637.gif)
內(nèi)容介紹
原文檔由會(huì)員 莎士比亞 發(fā)布
論文標(biāo)準(zhǔn)WORD格式 共78頁 23228字 附中英文翻譯 設(shè)計(jì)軟件源文件 封裝好的軟件
摘 要
目前,計(jì)算機(jī)病毒可以滲透信息社會(huì)的各個(gè)領(lǐng)域,給計(jì)算機(jī)系統(tǒng)帶來了巨大的破壞和潛在的威脅。為了確保信息的安全與暢通,因此研究對(duì)算機(jī)病毒的分析與清除的方法是迫在眉睫的,本論文從對(duì)病毒的分析入手,結(jié)合計(jì)算機(jī)病毒傳染的現(xiàn)狀,概述了計(jì)算機(jī)病毒的發(fā)展歷史及危害性,給出計(jì)算機(jī)病毒的一種計(jì)算模型,并針對(duì)具體的實(shí)例—沖擊波病毒,初步分析其有關(guān)性質(zhì)和作用原理,仔細(xì)閱讀它的源程序,根據(jù)病毒的發(fā)作機(jī)制,提出了它的清除方式。
沖擊波病毒主要是利用微軟系統(tǒng)的漏洞,實(shí)現(xiàn)其破壞目的的。我主要是采用對(duì)所有的文件進(jìn)行二進(jìn)制掃描,如果發(fā)現(xiàn)病毒特征碼就認(rèn)為是病毒感染文件,保留文件的路徑后,根據(jù)路徑刪除感染文件,同時(shí)清楚注冊(cè)表中被病毒改寫過的內(nèi)容。從而最終實(shí)現(xiàn)其殺毒的目的。
關(guān)鍵詞:病毒 沖擊波 二進(jìn)制 路徑 注冊(cè)表
Abstract
At present, computer virus could permeate every region of the society. And it brings great destruction and potential threat to the computer system. In order to insure the safety and expedite of the information, so study the analysis which is computer virus and the method which is used to clear away the virus is pressing. This paper generalizes the development and the harm of the computer virus, by analyzing the actuality of the computer virus and beginning with analysis of the computer virus. We also get a compute model of the computer virus , our model is more practical and reasonable in respect of the computer virus' characters of infection and spread. According a in detail example that is Worm. Blaster, preliminarily analyze the character and action principle about the Worm. Blaster, carefully read its source program,according to the outbreak mechanism of the virus bring forward its way which is used to clear way.
Worm. Blaster accomplishes destructive aim by using the leak of Microsoft system. We mainly use binary scanning which is used for all files. If finding out characteristic, we will consider that it is the file that is infected by computer virus. After conserving the path which is infected file, according this path delete this file. At the same time clear off the content of the register which is recomposed by computer virus. Thereby we finally accomplish the aim which is clear off virus.
Keywords: virus Worm. Blaster binary path register
目 錄
引 言 1
第一章 計(jì)算機(jī)病毒簡介 2
1.1 計(jì)算機(jī)病毒的認(rèn)識(shí) 2
1.1.1 計(jì)算機(jī)病毒的產(chǎn)生 2
1.1.2 計(jì)算機(jī)病毒的起源識(shí) 4
1.2 計(jì)算機(jī)病毒的結(jié)構(gòu)特征 4
1.2.1 病毒的結(jié)構(gòu) 4
1.2.2 病毒的特征 5
1.3 計(jì)算機(jī)病毒的發(fā)展歷史 6
1.4 蠕蟲病毒 6
1.5 計(jì)算機(jī)病毒發(fā)展趨勢 10
第二章 沖擊波病毒簡述 11
2.1 沖擊波病毒介紹 11
2.2 沖擊波病毒的操作與癥狀 11
2.2.1 沖擊波病毒的操作 11
2.2.2 計(jì)算機(jī)病毒的發(fā)作癥狀 12
2.3 沖擊波病毒的具體說明 13
2.4 沖擊波病毒的解決方案 14
2.4.1 應(yīng)急解決 14
2.4.2 DOS下清除該病毒 15
2.4.3 安全模式下清楚該病毒 15
2.4.4 安全建議 17
第三章 VB介紹 18
3.1 VB的誕生 18
3.2 VB的特性 18
3.3 VB中的API函數(shù) 19
3.3.1 什么是API函數(shù) 19
3.3.2 軟件中涉及的API函數(shù)及其定義 20
第四章 沖擊波的殺毒軟件 23
4.1 殺毒軟件介紹 23
4.2 殺毒軟件具體實(shí)現(xiàn) 25
4.3 殺毒軟件流程圖 29
第五章 設(shè)計(jì)總結(jié) 30
致謝 36
參考文獻(xiàn) 37
附錄 38
摘 要
目前,計(jì)算機(jī)病毒可以滲透信息社會(huì)的各個(gè)領(lǐng)域,給計(jì)算機(jī)系統(tǒng)帶來了巨大的破壞和潛在的威脅。為了確保信息的安全與暢通,因此研究對(duì)算機(jī)病毒的分析與清除的方法是迫在眉睫的,本論文從對(duì)病毒的分析入手,結(jié)合計(jì)算機(jī)病毒傳染的現(xiàn)狀,概述了計(jì)算機(jī)病毒的發(fā)展歷史及危害性,給出計(jì)算機(jī)病毒的一種計(jì)算模型,并針對(duì)具體的實(shí)例—沖擊波病毒,初步分析其有關(guān)性質(zhì)和作用原理,仔細(xì)閱讀它的源程序,根據(jù)病毒的發(fā)作機(jī)制,提出了它的清除方式。
沖擊波病毒主要是利用微軟系統(tǒng)的漏洞,實(shí)現(xiàn)其破壞目的的。我主要是采用對(duì)所有的文件進(jìn)行二進(jìn)制掃描,如果發(fā)現(xiàn)病毒特征碼就認(rèn)為是病毒感染文件,保留文件的路徑后,根據(jù)路徑刪除感染文件,同時(shí)清楚注冊(cè)表中被病毒改寫過的內(nèi)容。從而最終實(shí)現(xiàn)其殺毒的目的。
關(guān)鍵詞:病毒 沖擊波 二進(jìn)制 路徑 注冊(cè)表
Abstract
At present, computer virus could permeate every region of the society. And it brings great destruction and potential threat to the computer system. In order to insure the safety and expedite of the information, so study the analysis which is computer virus and the method which is used to clear away the virus is pressing. This paper generalizes the development and the harm of the computer virus, by analyzing the actuality of the computer virus and beginning with analysis of the computer virus. We also get a compute model of the computer virus , our model is more practical and reasonable in respect of the computer virus' characters of infection and spread. According a in detail example that is Worm. Blaster, preliminarily analyze the character and action principle about the Worm. Blaster, carefully read its source program,according to the outbreak mechanism of the virus bring forward its way which is used to clear way.
Worm. Blaster accomplishes destructive aim by using the leak of Microsoft system. We mainly use binary scanning which is used for all files. If finding out characteristic, we will consider that it is the file that is infected by computer virus. After conserving the path which is infected file, according this path delete this file. At the same time clear off the content of the register which is recomposed by computer virus. Thereby we finally accomplish the aim which is clear off virus.
Keywords: virus Worm. Blaster binary path register
目 錄
引 言 1
第一章 計(jì)算機(jī)病毒簡介 2
1.1 計(jì)算機(jī)病毒的認(rèn)識(shí) 2
1.1.1 計(jì)算機(jī)病毒的產(chǎn)生 2
1.1.2 計(jì)算機(jī)病毒的起源識(shí) 4
1.2 計(jì)算機(jī)病毒的結(jié)構(gòu)特征 4
1.2.1 病毒的結(jié)構(gòu) 4
1.2.2 病毒的特征 5
1.3 計(jì)算機(jī)病毒的發(fā)展歷史 6
1.4 蠕蟲病毒 6
1.5 計(jì)算機(jī)病毒發(fā)展趨勢 10
第二章 沖擊波病毒簡述 11
2.1 沖擊波病毒介紹 11
2.2 沖擊波病毒的操作與癥狀 11
2.2.1 沖擊波病毒的操作 11
2.2.2 計(jì)算機(jī)病毒的發(fā)作癥狀 12
2.3 沖擊波病毒的具體說明 13
2.4 沖擊波病毒的解決方案 14
2.4.1 應(yīng)急解決 14
2.4.2 DOS下清除該病毒 15
2.4.3 安全模式下清楚該病毒 15
2.4.4 安全建議 17
第三章 VB介紹 18
3.1 VB的誕生 18
3.2 VB的特性 18
3.3 VB中的API函數(shù) 19
3.3.1 什么是API函數(shù) 19
3.3.2 軟件中涉及的API函數(shù)及其定義 20
第四章 沖擊波的殺毒軟件 23
4.1 殺毒軟件介紹 23
4.2 殺毒軟件具體實(shí)現(xiàn) 25
4.3 殺毒軟件流程圖 29
第五章 設(shè)計(jì)總結(jié) 30
致謝 36
參考文獻(xiàn) 37
附錄 38