题目内容 (请给出正确答案)
提问人:网友l******8 发布时间:2023年1月16日 08:27
[单项选择题]

Text 2 SoBig. F was the more visible of the two recent waves of infection because it propagated iself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some S00,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected. Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. P was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading’ z it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes. Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory. Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting. One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings"—signals that checked for the presence of other computers. Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organising trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.

Text 2

SoBig. F was the more visible of the two recent waves of infection because it propagated iself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some S00,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.

Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. P was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading’ z it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes. Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.

Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.

One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings"—signals that checked for the presence of other computers.

Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organising trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.

参考答案
十点题库官方参考答案 (由十点题库聘请的专业题库老师提供的解答)
更多“Text 2 SoBig. F was the more v”相关的问题
()是指贷款人根据借款人的提款申请和支付委托,将贷款资金支付给符合合同约定用途的借款人交易对象。
A.借款人自主支付
B.借款人受托支付
C.贷款人自主支付
D.贷款人受托支付
点击查看答案
急性白血病引起贫血的原因为()
A . A.出血因素
B . B.感染因素
C . C.溶血因素
D . D.正常红细胞生成减少
E . E.无效性红细胞生成
点击查看答案
电动吊篮的配重应准确,并牢固地安装在配重点上。
点击查看答案
感抗与频率的关系是频率越高,感抗越小。
A.对 B.错
点击查看答案
滴丸剂常用的水溶性基质是()
A.硬脂酸
B.单硬脂酸甘油酯
C.硬脂酸钠
D.氢化植物油
E.虫蜡
点击查看答案
在办理机动车转入时,对2015年10月1日前已试点"一照三号"或"一照一号"改革,机动车档案中未收存组织机构代码证书或加载统一社会信用代码的登记证(照)的,要按规定办理转入业务,不得以身份证明不一致为由退档()
A.正确B.错误此题为判断题(对,错)。

B.错误此题为判断题(对,错)。

此题为判断题(对,错)。
点击查看答案
护士向患者告知和解释有关事项,允许并鼓励患者去解决问题,并对结果给予反馈,验证患者的感受,使患者在此过程中学会了相关的知识及技能。这属于护理关怀的()
A、知晓B、共处C、代替做D、赋能
点击查看答案
已经开展2年以上全院综合性监测的医院应开展目标性监测,持续时间应连续6个月以上。()
点击查看答案
在新设备启动并网过程中,若出现电网事故时,调管新设备的调度部门有权中止启动。()
点击查看答案
脊椎动物病毒的的复制周期也分为吸附、侵入、脱壳、病毒大分子合成、装配和释放五个阶段。
点击查看答案
Image模式下,使用MEMORYCARD的备份文件,如果没有PC配合,在空间允许的情况下,一张MEMORYCARD可以Image备份/加载()台机器。
A.1
B.2
C.5
D.任意多
点击查看答案
单位面积上的内力的大小叫应力。
点击查看答案
在实现原型样件方案时组织应尽可能地使用与正式生产相同的()。
A . 供应商
B . 工装
C . 制造过程
D . 场地
点击查看答案

关于熵的说法正确的是[ ]

A . 熵为每改变单位温度所交换的热B . 可逆过程的熵变为零C . 不可逆过程的熵将增加D . 熵与系统的微观状态数有关
点击查看答案
下列各项正确说明阶级斗争在社会发展中作用的有()。
A、阶级斗争是阶级社会发展的直接动力B、阶级斗争是人类社会发展的根本动力C、阶级斗争是阶级社会实现社会更替的途径D、阶级斗争是迫使统治阶级实行某些改良的手段E、阶级斗争是解决阶级社会基本矛盾的必要手段此题为多项选择题。
点击查看答案
客服
TOP