首页 | 本学科首页   官方微博 | 高级检索  
     

浅谈网络端口与特洛伊木马
引用本文:张兵,包新彩. 浅谈网络端口与特洛伊木马[J]. 塔里木大学学报, 2007, 19(3): 79-81,90
作者姓名:张兵  包新彩
作者单位:1. 塔里木大学信息工程学院,新疆,阿拉尔,843300
2. 新乡医学院图书馆,河南,新乡,453003
摘    要:计算机端口的概念、分类和查看端口的方法,以及关闭木马经常使用的端口。相关工具软件的应用。木马入侵的端口解析,和正确的上网方式。

关 键 词:端口  协议  木马  病毒  命令
文章编号:1009-0568(2007)03-0079-04
收稿时间:2007-01-03
修稿时间:2007-01-03

Analysis on the Relationship between Computer Ports and Trojan Horse Virus
Zhang Bing,Bao Xincai. Analysis on the Relationship between Computer Ports and Trojan Horse Virus[J]. Journal of tarim University, 2007, 19(3): 79-81,90
Authors:Zhang Bing  Bao Xincai
Affiliation:1. College of Information Engineering,Tarim University, Alar, Xinjiang 843300;2 .The Library of Xinxiang Medical University, XinXiang, Henan 453003
Abstract:This acticle expounds the concept,classification and examination method of computer port,and sets forth how to close the computer ports that the Trojan horse virus often uses and uses relevant implement software.It also illuminates the port analysis of Trojan horse virus inbreak and the correct way of using internet.
Keywords:port  protocol  Trojan horse  virus  order  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号