Clear Method and Countermeasure of Trojan Horse" /> Clear Method and Countermeasure of Trojan Horse" /> Clear Method and Countermeasure of Trojan Horse" /> 特洛伊木马的清除和防范方法
Please wait a minute...
New Technology of Library and Information Service  2002, Vol. 18 Issue (2): 92-93    DOI: 10.11925/infotech.1003-3513.2002.02.31
Current Issue | Archive | Adv Search |
Clear Method and Countermeasure of Trojan Horse
Shen Wenyu   Liu Zongren
(Shandong University of Technology, Zibo 255000, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

The text introduce basic principle of Trojan horse, a few variety of famous Trojan horse at home and abroad, and clear method and countermeasure of Trojan Horse.

Key wordsTrojan horse      Network security     
Received: 02 July 2001      Published: 25 April 2002
ZTFLH: 

TP393.08

 
Corresponding Authors: Shen Wenyu,Liu Zongren   
About author:: Shen Wenyu,Liu Zongren

Cite this article:

Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse. New Technology of Library and Information Service, 2002, 18(2): 92-93.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2002.02.31     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2002/V18/I2/92


[1]杨继张.黑客大曝光.北京:清华大学出版社,2000

[2]孙昕等.Internet高级应用与技巧.北京:清华大学出版社,2000

[3]李红.安安全全把网上.电子&电脑,2001,(3)

[4]朱堂全.个人用户网络安全的保障方法.上海微型计算机周报,2000,(37)

[1] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[2] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[3] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[4] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[5] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[6] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[7] Jiang Chuanju. The Function of Log Analysis in Network Security[J]. 现代图书情报技术, 2004, 20(12): 58-60.
[8] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
[9] Liu Xing. NT服务器的安全维护与故障排除[J]. 现代图书情报技术, 2003, 19(6): 85-87.
[10] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Wang Huawei. The NAT Solution of Computer Network of Library[J]. 现代图书情报技术, 2001, 17(5): 27-28.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[14] Wang Yong,Ni Bo,Yuan Qinjian, Zhu Weiyong,Liang Wei. Advances of Computer Network Technology in 20 Century[J]. 现代图书情报技术, 2000, 16(6): 14-17.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn