计算机专业文章 翻译(不要机器翻译)很着急 有些符号不需要翻译

(1)打电话请求密码。
尽管这个方式很普通,但打电话询问密码也经常奏效。在社会工程中那些黑客冒充失去密码的合法雇员,经常通过这种简单的方法重新获得密码。
(2)伪造Email
使用telnet,一个黑客可以截取任何一个身份证发送Email的全部信息,这样的Email消息是真,因为它发自于一个合法的用户。在这种情形下这些信息显得是绝对的真实。黑客可以伪造这些。一个冒充系统管理员或经理的黑客就能较为轻松的获得大量的信息,黑客就能实施他们的恶意阴谋。
二. Ping of death 攻击
Ping是潜水艇人员的专用术语,表示回应的声纳脉冲,在网络中ping是一个十分好用的TCP/IP工具。它主要的功能是用来检测网络的连通情况和分析网路速度。Ping有善的一面也有恶的一面。
它们攻击的方式攻击方式:
(1)对目标IP不停地Ping探测从而致使目标主机TCP/IP堆栈崩溃
(2)致网络瘫痪。
(3)Ping –t –l 65550
三.Unicode漏洞攻击
1.Unicode漏洞描述
攻击者可通过IE浏览器远程运行被攻击计算机的cmd.exe文件,从而使该计算机的文件暴露,且可随意执行和更改文件。
Unicode标准被很多软件开发者所采用,无论何种平台、程序或开发语言,Unicode均为每个字符提供独一无二的序号,如向IIS服务器发出包括非法Unicode
UTF-8序列的URL,攻击者可使服务器逐字“进入或退出”目录并执行任意程序,该攻击即称为目录转换攻击。
Unicode用“%2f”和“%5c”分别代表“/”和“\”字符,但也可用“超长”序列来代替这些字符。“超长”序列是非法的Unicode表示符,如用“%c0%af”代表“/”字符。由于IIS不对超长序列进行检查,因此在URL中添加超长的Unicode序列后,可绕过微软的安全检查,如在一个标记为可执行的文件夹发出该请求,攻击者即可在服务器上运行可执行文件。
2.利用Unicode漏洞进行攻击
此漏洞从中文IIS4.0+SP6开始,还影响中文WIN2000+IIS5.0、中文WIN2000+IIS5.0+SP1,台湾繁体中文也同样存在这样的漏洞。在NT4中/编码为“%c1%9c”或者“%c1%9c”,WIN2000英文版是“%c0%af”。
但从国外某些站点得来的资料显示,还有以下的编码可以实现对该漏洞的检测,该编码存在于日文版、韩文版等操作系统。
3.利用Unicode漏洞读取系统盘目录
利用该漏洞读取出计算机上目录列表,比如读取C盘的目录,只要在浏览器中输入
4.利用Unicode漏洞读取系统文件
利用语句得到对方计算机上装了几个操作系统以及操作系统的类型,只要读取C盘下的boot.ini文件就可以了。使用的语句是:
5.利用Unicode漏洞拷贝文件
为了是使用方便,利用语句将cmd.exe文件拷贝到scripts目录,并改名为c.exe,使用的语句是:
结论
本论文从多方面描述了网络安全的解决方案,目的在于为用户提供信息的保密,认证和完整性保护机制,使网络中的服务,数据以及系统免受侵扰和破坏。比如防火墙,加密技术等都是当今常用的方法,本论文从这些方法入手深入研究各个方面的网络安全问题的解决,可以使读者有对网络安全技术的更深刻的了解。

(1) call requests a password.
Although this method is very common, but often ask for a password to call work. Those in the social engineering hackers posing as legitimate employees lost password, often through such simple methods to obtain the password.
(2) forged e-mail
The use of remote login, a hacker can be any one of the interception of all e-mail identity information, such as e-mail message is true, because it is from a legitimate user on. Under such circumstances it is the information is absolutely true. These hackers can be forged. Posing as a system administrator or manager of the hackers will be able to more easily access a wealth of information, hackers will be able to implement their malicious conspiracy.
二. Ping of death attack
Ping is dedicated submarine terms of personnel, said in response to the sonar pulse, Zhongping in the network is a very useful TCP / IP tools. Its major function is used to detect network connectivity and network speed analysis. Flat side of the good side of evil also.
The way they attack the way the attack:
(1) on the target horizon to detect the IP in order to keep target host resulted in the TCP / IP stack collapse
(2) network to a standstill.
(3) T or the 65,550-ping
三. Exploits the Unicode
Description 1.Unicode loopholes
Attacker IE browser by browser attacks remote computer running cmd.exe file, so that exposure to the computer files, and are free to implement and change the file.
Many of the Unicode standard has been adopted by software developers, regardless of what platform, program, or the development of language, unity of characters are each unique serial number, such as the server to IIS, including illegal Unicode
UTF - 8 encoding sequence of the URL, an attacker could server verbatim "to enter or withdraw from the" directory and the implementation of any program, the offensive attack that is known as the directory conversion.
Uniform with "% 2" and "% 5C No." on behalf of "/" and "\" characters, but can also be used "very long" to replace the sequence of these characters. "Long" sequence is illegal and that the Unicode characters, such as "% c0% AF" represents "/" character. IIS as a result of the inspection sequence is not long, so long to add on the Web site of the Unicode sequence may bypass Microsoft's security checks, such as marked as executable in a folder issued by the request, an attacker can in running on the server executable file.
2. Unicode use loopholes to carry out attacks
This loophole in IIS4.0 + SP6 from the beginning of the Chinese, but also Chinese WIN2000 + IIS5.0, English WIN2000 + IIS5.0 + SP1, Taiwan Traditional Chinese also there is no such loophole. NT4 is in / encoding to "% C1% 9C of Article" or "% C1% 9C of Article", WIN2000 English is a "% c0% AF."
However, some sites outside the information obtained, as well as the coding can be achieved following the detection of flaws in the code exist in Japanese, Korean and other operating systems.
3. Unicode use loopholes in the system disk directory read
Use of the loopholes in the computer to read the directory list, such as disk read ç directory, as long as the browser, type in
4. Unicode use loopholes to read system files
Use to get their statements to fit a number of computer operating system and the type of operating system, as long as the disk read ç the Boot.ini file under it. The use of the statement is:
5. Copy of the loopholes in the use of Unicode files
In order to be easy to use, the use of paper statements to copy cmd.exe to the script directory, and changed its name to c.exe, the use of the statement is:
Conclusion
This paper describes the various aspects of network security solutions designed to provide users with information security, authentication and integrity protection mechanisms, so that network services, data and systems from intrusion and destruction. Such as firewalls, encryption techniques are commonly used method today, the papers start from the in-depth study of these methods in all aspects of network security solutions, enabling readers to have a network security technology to a more profound understanding.
温馨提示:答案为网友推荐,仅供参考
第1个回答  2009-05-30
(1) requests a password by make pone calls.
Although this method is very common, but often works by calling to ask for a password. Those hackers posing as legitimate employees who lost password in the social engineering, often through such simple methods to obtain the password.
(2) counterfeit Email
Using telnet, a hacker can any one interception Email ID to send all of the information, so that the Email message appears absolutely true, because it is from a legitimate user on. Under such circumstances it is the information is absolutely true. These hackers can forge these info. a hacker who Posing as a system administrator or manager will be able to more easily get a wealth of information, hackers will be able to implement their malicious conspiracy.
二. Ping of death attack
Ping is the terms of dedicated submarine personnel, said in response to the sonar pulses ,ping in the network is a very useful TCP / IP tools. Its major function is used to detect network connectivity and network speed analysis. Ping have a good side there are the evil side.
The way they attack:
(1) on the target IP in order to keep the result that the target detection Ping host TCP / IP stack collapse
(2) network to a standstill.
(3) Ping-t-l 65550
三. Unicode Loophole Attack
Description 1.Unicode loopholes
The attacker can run IE browser remote computer to be attacked cmd.exe file, so that expose the computer files, and can freely execute and change files.
Unicode standard is used by many software developers, regardless of what platform, program or language, Unicode characters are each unique serial number, such as include send the illegal Unicode to IIS server UTF-8 sequence of the URL, an attacker can server verbatim "to enter or withdraw from the" directory and the implementation of any program, the offensive attack that is known as the directory conversion.
Unicode with "% 2f" and "% 5c" representing "/" and "\" characters, but can also be used "very long" to replace the sequence of these characters. "Long" sequence that is illegal Unicode characters, such as "% c0% af" on behalf of the "/" character. Because IIS does not check the long sequences, so long URL to add the Unicode sequence may bypass Microsoft's security checks, such as marked as executable in a folder issued by the request, an attacker can be on the server run executable file.
2. The use of Unicode attack vulnerability
This loophole in IIS4.0 + SP6 from the beginning of the Chinese, but also Chinese WIN2000 + IIS5.0, English WIN2000 + IIS5.0 + SP1, Taiwan Traditional Chinese is also the existence of such loopholes. In NT4 in / coding for the "% c1% 9c" or "% c1% 9c", WIN2000 English is a "% c0% af".
However, some sites outside the information obtained, as well as the coding can be achieved following the detection of flaws in the code exist in Japanese, Korean and other operating systems.
3. The use of Unicode to read the system disk directory loopholes
Use of the loopholes in the computer to read the directory list, such as the C disk to read the directory, as long as the browser, type in
4. The use of Unicode to read system files vulnerability
Use to get their statements to fit a number of computer operating system and the type of operating system, as long as the C disk to read the boot.ini file on it. The use of the statement is:
5. The use of Unicode vulnerability-copy documents
In order to be easy to use, the use of paper statements to copy cmd.exe to the scripts directory, and changed its name to c.exe, the use of the statement is:
Conclusion
This paper describes the various aspects of network security solutions designed to provide users with information security, authentication and integrity protection mechanisms, so that network services, data and systems from intrusion and destruction. Such as firewalls, encryption techniques are commonly used method today, the papers start from the in-depth study of these methods in all aspects of network security solutions, enabling readers to have a network security technology to a more profound understanding.

我只人工翻译了前半部分, 我实在太困了...
第2个回答  2009-05-30
1)Make a phone call to request a password.
Though this method is very common, makes a phone call to inquire a password also usually do execution.The legal employees which pretend to be to lose a password in the social engineering, usually pass this kind of simple method re- acquires a password.
(2)Counterfeit Email
Use telnet, a black guest is all informations that can intercept whichever ID card to send out Email, so of the Email news be true, because it deliver from at a legal customer.These informations' seem to be is an absolute reality in this kind of case.The black guest can forge these.A black guest which pretends to be system managing person or manager can more and easily acquire a great deal of information, black guest the malice scheme that can carry out them.
Two. The Ping of death attackstone
The Ping is the submarine personnel's appropriation technical term, mean the sonar pulse of response, the ping is a very friendly TCP/IP in the network tool.It of the main function be used for examining circumstance and analysis network speed of the connect of network.The Ping have kind of a side also has the evilness one side.
The way attack of their attack method:
(1)To target IP without intermission the Ping probe in to cause the TCP/IP heap inn of the target host collapse thus
(2)With the result that the network paralyze.
(3)The Ping – t – l 65550
Three.the Unicode loophole attackstone
The 1. Unicode loophole describe
The aggressor can pass an IE browser long range to circulate to be attackstoned the cmd.exe document of calculator, make the document of that calculator expose thus, and can at will carry out and change a document.
The Unicode standard is adopt by a lot of software developers, no matter what terrace, procedure it is or develop language, the Unicode all provides the one and only ordinal number for each character list, such as send out to include illegal Unicode toward the IIS server
The URL of sequences UTF-8s, the aggressor can make server word by word"get into or withdraw" catalogue combine performance arbitrarily procedure, that attack is namely called a catalogue conversion an attack.
The Unicode uses "%2 F" with"%5 cs" to represent respectively"/" with"\" character list, but can also use "super long" sequence to replace these character lists."Super long" sequence is an illegal Unicode to mean a sign, if use "% c 0% afs" a representative"/" character list.The IIS wrong super long sequence carries on a check, so canned once round the safe check of Microsoft after the URL win add super grow of Unicode sequence, if clip to send out that claim for the document that can carry out at a marking, aggressor then the movement can carry out a document on the server.
2.Make use of the Unicode loophole carries on an attack
This loophole is from Chinese IIS 4.0+ SP6 beginning, also influence Chinese WIN 2000+ IIS5.0s, Chinese WIN be 2000+ SP1s with 5.0+ IISs, the Taiwanese traditional Chinese character also equally exists thus of loophole.In the NT4/code for"% c 1%9 cs" perhaps "% c 1%9 cs", WIN2000 English versions are "% c 0% afs".
But show from the data for get of the abroad some station point, also there is following coding carrying out the examination toward that loophole and that coding exists at the operate systems, such as Japanese version and Korean version...etc..
3.Make use of the Unicode loophole read system dish catalogue
Make use of that loophole read compute on board catalogue row form and for example read the catalogue of C dish, want ~only in the browser to input
4.Make use of the Unicode loophole read system document
Make use of a language sentence get the other party calculation was on board to pack a few operate systems and operate system of type, as long as read under the C dish of the boot.ini document be all right.The language sentence of usage is:
5.Make use of the Unicode loophole copies a document
Convenience for being an usage, make use of a language sentence to copy the cmd.exe document to the scripts catalogue, and change name to c.exe, usage of language sentence BE:
Conclusion
This thesis from in many ways described the solution of network safety, the purpose lay in providing a keep secret of information for the customer, attestation and complete sex protection mechanism, keep the service in the network, data and system from be subjected to harass with break.For example fire wall, encrypt a technique all of etc.s is in common use methods nowadays, this thesis commences from these methods thorough study the resolve of the network safe problem of each aspect, can make the reader have to the network safe technically deeper understanding.
第3个回答  2009-06-06
( 1 )のパスワードを要求した。
この方法は非常に一般的ですが、多くの场合、パスワードの入力作业电话をお愿いいたします。ハッカーたちは、ソーシャルエンジニアリングの従业员の合法的なポーズで、そのような単纯な方法で频繁に连络し、パスワードを入手してパスワードを失った。
( 2 )电子メールの伪造
ためには、正当なユーザーからのtelnetを使用すると、ハッカーはいずれかのすべての情报が傍受メールを送信するように、真の电子メールメッセージは、 IDをすることができます。确実に该当するような状况下では、情报です。これらのハッカーを伪造することができます。システム管理者やハッカーのマネージャーとしての豊富なポーズをより简単に情报にアクセスするために、ハッカーは、悪意のある阴谋を実装できるようになることができます。
二。死攻撃の平
平、人事の専门用语をしている潜水舰は、ネットワークでのソナーのパルスのpingに応答して、非常に便利なTCP / IPのツールです。その主要な机能をネットワーク接続とネットワークの速度解析を検出するために使用されています。そこは、悪の侧は、良い面がある平。
彼らは攻撃方法は、攻撃の方法:
( 1 )は、ターゲットのIP上でのTCPその结果、目标を検出するホスト平/ IPの崩壊スタック
( 2 )には、停止するためのネットワーク。
( 3 )平- Tの- lの65550
三。 Unicodeの悪用
说明1.Unicode抜け穴
攻撃者は、これは、コンピュータのファイルへの暴露は、无料ですが、実装すると、ファイルを変更Cmd.exeファイルを攻撃するリモートコンピュータのIEブラウザを実行できます。
多くのソフトウェア开発者によってはUnicode标准に関系なく、どのプラットフォーム、プログラムまたは言语、 Unicodeの文字は、 IISサーバーのような不正なUnicodeを含むように、それぞれ固有のシリアル番号は、采用する
のURLはUTF - 8シーケンスを、攻撃することができますサーバー逐语的"と入力するか、 "ディレクトリから撤退すると任意のプログラムの実装は、攻撃的な攻撃は、ディレクトリの変换として知られています。
Unicodeの" % 2阶"と" % 5c " "代表/ "と" \ "の文字だけでなく、使用することができます"と、非常に长い"これらの文字の配列を置き换えます。 " / "文字の代わりに% "のように"长い"シーケンスは、违法であるUnicode文字は、 c0 %心房细动" 。 IISのため、长いので、 Microsoftのセキュリティチェックをバイパスすることがありますは、 Unicodeシーケンスなどの実行可能ファイルのフォルダは、リクエストが発行するのマークを追加するにはURLが长い列をチェックしない场合は、攻撃者がサーバーにすることができます実行可能ファイルを実行します。
2 。 Unicodeの攻撃の脆弱性を使用する
IIS4.0でこの抜け穴+ SP6での最初から、中国だけでなく、中国语WIN2000 + IIS5.0 、英语WIN2000 + IIS5.0 + SP1では、台湾の伝统的な中国の人々もこのような抜け穴が存在しています。 NT4で/ " % c1 % 9cを"または" % c1 % 9cを符号化" 、英语をWIN2000 " % c0 %心房细动"です。
しかし、同様に符号化のコードを以下にいくつかの欠陥の検出を実现することができます入手した情报を外部の一部のサイトに存在しますが、韩国语、日本语、他のオペレーティングシステム。
3 。のUnicodeの使用は、システムディスクのディレクトリの抜け穴を読むこと
は、コンピュータ内の抜け穴を使用して、ディスクのCのようなディレクトリを読むように、长くは、ディレクトリの一覧を読むことは、ブラウザのタイプに
4 。 Unicodeの脆弱性を使用するシステムファイルを読むこと
使用としては、 Cディスクには、 Boot.iniファイルを読むには、ステートメントおよびオペレーティングシステムの种类を限り、コンピュータのオペレーティングシステムのコードに合うように入手してください。ステートメントを使用することです:
5 。ユニコードの脆弱性を使用するコピー书类
するために使用するように、纸のステートメントを使用するスクリプトのディレクトリにcmd.exeをコピーするには、简単には、その名c.exeに変更は、ステートメントの使用されます:
结论
相似回答
大家正在搜