题目内容
Trojan HorsesThis article will be played three times. Listen carefully, and fill in the numbered spaces with the appropriate words you have heard.The name “Trojan horse”comes from a legend told in the Iliad about the siege of the city of Troy by the Greeks.Legend has it that the Greeks, unable to penetrate the city’s1 , got the idea to give up the siege and instead gave the city a giant wooden horseas a gift 2 . The Trojans (the people of the city of Troy) accepted this seemingly 3Gift and brought it within the city walls. However, the horse was 4 with soldiers, who came out atnightfall, while the town 5 , to open the city gates so that the 6 of the army could enter.Thus, in the world ofcomputing, a Trojan horse is any program that 7 the user to run it, but concealsa harmful or malicious payload, and usually opens up 8 to the computer running it by opening a 9. For this reason, it is sometimes called a Trojan by analogy tothe citizens of Troy. The payload may take effect 10 and can lead to many undesirable effects, such as deleting all the user’s files, or more commonly it may11further harmful software into the user’s system to serve the creator’s longer-term 12. Trojan horse known as droppers are used to star off a worm 13 , by injecting the worm into users’localnetworks.Since Trojan horses have a 14 of forms, there is no single method to delete them The simplest responses involve clearing the 15 Internet file and deleting it16 . Normally, antivirus software is able to detect and remove the Trojan17 . If the antiviruscannot find it, booting the computer from 18 media, such as a live CD, may allow an antivirus program to find a Trojan and delete it. Updated anti-spyware programs are also efficient against this 19 .Most Trojans also20 in registries, and processes.[音频]
查看答案
搜索结果不匹配?点我反馈
更多问题