首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
SoBig. F was the more visible of the two recent waves of infection, because it propagated itself by e-mail, meaning that victims
SoBig. F was the more visible of the two recent waves of infection, because it propagated itself by e-mail, meaning that victims
admin
2009-04-27
34
问题
SoBig. F was the more visible of the two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.
Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie-Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of "multi-threading": it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.
Blaster worked by creating a "buffer overrun in the remote procedure call". In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.
Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.
One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings"—signals that checked for the presence of other computers.
Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.
选项
A、sending them an overpowering number of messages.
B、harvesting the addresses stored in the computers.
C、infecting the computers with an invisible virus.
D、destroying the anti-virus software of the computers.
答案
A
解析
事实细节题。本文首段第二、三句指出"巨无霸如此有效,它能给那些有防毒软件保护的电脑造成很大的破坏。这主要是因为大量的病毒被复制传播,许多电脑被自己的防毒软件发出的无数信息压瘫痪了"。由此可知巨无霸病毒主要是通过给计算机发送大量的信息来毁坏计算机程序。
转载请注明原文地址:https://jikaoti.com/ti/VBURFFFM
0
考研英语一
相关试题推荐
[A]Thepossibilitytoincreaseyourgutmicrobiota[B]Scientist’sopiniontowardsthefoodvalue[C]Theindispensabler
Asawisemanoncesaid,weareallultimatelyalone.ButanincreasingnumberofEuropeansarechoosingtobesoataneverear
WhenIaskexperiencedcollegeteachersandadministratorstodescribehowcollegestudentshavechangedovertheyears,Ioften
AnonymityisnotsomethingwhichwasinventedwiththeInternet.Anonymityandpseudonymityhasoccurredthroughouthistory.For
AnonymityisnotsomethingwhichwasinventedwiththeInternet.Anonymityandpseudonymityhasoccurredthroughouthistory.For
AnonymityisnotsomethingwhichwasinventedwiththeInternet.Anonymityandpseudonymityhasoccurredthroughouthistory.For
Foralmosttwocenturiesnow,scientistshavenoticedaplace’ssuicideratebearstroublinglinkstothechangingoftheseason
[A]Waysforparentstohelpdeafchildrenspeak[B]Variousreactionsofparentstotheirdeafchildren[C]Badattitude
[A]Waysforparentstohelpdeafchildrenspeak[B]Variousreactionsofparentstotheirdeafchildren[C]Badattitude
SupposeyouarestudyinginWashingtonUniversity.Youlostyourpassportbyaccidentyesterday.WritealettertotheChineseE
随机试题
在《荷马史诗》中,赫克托耳是在与()交战时阵亡的。
Theprocessoflearningbydiscovery,accordingtoBruner,involves______withtheminimumofinstructionanderrorfullearning
男性,60岁,半年前发生广泛前壁心肌梗死,原有间歇房颤病史8年,超声心动检查发现左室附壁血栓,血栓附着部位向外扩张,呈矛盾运动,左心室显著扩大。引起左室附壁血栓最可能的原因是
男性,63岁。慢性咳嗽、咳痰近20年,每年秋冬发作,至翌年春暖季节方有缓解。偶有痰血。年轻时患肺结核,经异烟肼、链霉素和对氨水杨酸钠治疗近2年,以后胸片随访为两肺散斑片结节影伴少量纤维条索状病灶。5年前发现高血压病,心电图示左心室高电压。重度吸烟(每日超过
现行国家规定的以房产为主的房地产价格评估费,按照房地产的价格总额采取差额定率分档累计收取,费率最低为()。[2004年考题]
从本质上说,机构投资者是以获得证券投资收益为主要经营目的的团体机构或企业,概括起来,机构投资者的基本属性包括()。Ⅰ.集合投资的规模性Ⅱ.代客理财的中介性Ⅲ.投资运作的专业性Ⅳ.股权投资的收益性
根据经验法则,当数据服从对称的钟形分布时,与平均数的距离在3个标准差之内的数据项所占比例约为()。
六个盘子中各放有一块糖,每次从任选的两个盘子中各取一块放入另一个盘子中,这样至少要做多少次,才能把所有的糖都集中到一个盘子中?()
已知n维向量组α1,α2……αs线性无关,则向量组α1’,α2’……αs’可能线性相关的是()
为了避免流程图在描述程序逻辑时的灵活性,提出了用方框图来代替传统的程序流程图,通常也把这种图称为______。
最新回复
(
0
)