急,急,急!!!!!!!翻译高手帮忙翻译一篇计算机方面的短文

在计算机恶意程序横行的今天,没有安装安全防护软件的联网计算机已经很难正常运行了。Rootkit 是能持久可靠、无法检测地存在于计算机上的一组程序或代码,是恶意软件用来隐藏自己的踪迹和保留计算机最高访问权限(root访问权限)的工具。Rootkit的严重危害性表现在它拥有目标计算机的最高访问权限,可以对目标计算机进行随心所欲的操控。不断发展的Rootkit技术甚至能攻破Rootkit检测软件,并通过修改Rootkit检测软件的执行逻辑使得Rootkit检测软件失效。

本文设计了一个Rootkit检测子系统和自检子系统相互独立Rootkit检测系统。

自检子系统通过搜索在系统中找到Rootkit检测子系统后,首先启动认证程序,只有自检子系统通过了Rootkit检测子系统的认证,Rootkit检测子系统才接受自检子系统的对它的检测,并为自检子系统创造自检环境;如果自检没有通过认证,说明Rootkit检测子系统已经被破坏,需要强制进行自检和恢复。Rootkit检测子系统对自检子系统的认证方式采用RSA算法,通信双方都有自己的公钥和私钥,在认证的时候,通信双方都用对方的公钥加密信息后发给对方,并用自己的私钥解密接收到的信息,然后和自己发送的信息进行比对。

基于模块随机组合求MD5数字签名的文件完整性检测方法,将需要做文件完整性保护的所有模块可重复的分成若干组,并将每组中的模块有序合并以后求MD5值。

Rampant malicious programs on the computer today, there is no security software installed on networked computers has been difficult to run properly. Rootkit is able to durable and reliable, can not be detected to exist in a set of computer programs or code, is a malicious software to hide their tracks and keep your computer up access (root access) tool. Rootkit serious harm performance in the target computer, the highest it has access to the target computer can be arbitrary manipulation. Evolving technology can even break Rootkit Rootkit detection software, and Rootkit detection software by modifying the implementation of logic makes Rootkit detection software failure.
This paper designed a Rootkit detection subsystem and the self-test subsystem independent Rootkit detection system.

Self-test subsystem found by searching in the system Rootkit detection subsystem, the first start the certification process, only self-test subsystem through a Rootkit detection subsystem certification, Rootkit detection sub-system self-test subsystem, it only accepted test and to create a self-test environment for the self-test subsystem; if the self-test did not pass the certification, indicating Rootkit detection subsystem has been destroyed and forced to self-test and recovery. Rootkit detection subsystem of the self-test subsystem authentication using RSA algorithm, communications, both sides have their own public key and private key, the authentication when communication both with each other's public key encrypted message sent to each other and with their own private key to decrypt the received information, and then send the information and its own comparison.

Random combination of demand-based module MD5 digital signature file integrity detection method, the file needs to be done to protect the integrity of all the modules can be divided into several groups duplicate, and each of the modules to seek MD5 value after the merger.
温馨提示:答案为网友推荐,仅供参考
第1个回答  2010-05-06
Rampant malicious programs on the computer today, there is no security software installed on networked computers has been difficult to run properly. Rootkit is able to durable and reliable, can not be detected to exist in a set of computer programs or code, is a malicious software to hide their tracks and keep your computer up access (root access) tool. Rootkit serious harm performance in the target computer, the highest it has access to the target computer can be arbitrary manipulation. Evolving technology can even break Rootkit Rootkit detection software, and Rootkit detection software by modifying the implementation of logic makes Rootkit detection software failure.

This paper designed a Rootkit detection subsystem and the self-test subsystem independent Rootkit detection system.

Self-test subsystem be found by searching in the system Rootkit detection subsystem, the first start of the accreditation process, only self-test subsystem through a Rootkit detection subsystem certification, Rootkit detection subsystem before accepting its self-test subsystem testing and to create a self-test environment for the self-test subsystem; if the self-test did not pass the certification, indicating Rootkit detection subsystem has been destroyed and forced to self-test and recovery. Rootkit detection subsystem of the self-test subsystem authentication using RSA algorithm, communications, both sides have their own public key and private key, the authentication when communication both with each other's public key encrypted message sent to each other and with their own private key to decrypt the received information, and then send the information and its own comparison.

Random combination of demand-based module MD5 digital signature file integrity detection method, the file needs to be done to protect the integrity of all the modules can be divided into several groups duplicate, and each of the modules to seek MD5 value after the merger.
第2个回答  2010-05-06
In computer malicious programs today, no installation of safety networked computer software has been difficult to normal operation. Rootkit is not reliable, can exist in the computer test program or code, a group is used to hide their malicious software trace and retain top computer access (root access). The serious harm in Rootkit has its target computer's highest access to the target, the computer is follow one's inclinations. The continuous development of Rootkit technology can even break Rootkit detection software, and modify the software Rootkit executing logic software failure detection makes Rootkit.

This paper designs a Rootkit detection subsystem and self-inspection subsystem independent Rootkit detection system.

Through the search system self-check subsystem finds Rootkit detection, first start after the subsystem of authentication procedures, only by a Rootkit self-checking subsystem test system authentication, Rootkit detection subsystem to accept self-inspection of its subsystems, and create self-check environment for self-check subsystem, If no authentication, through self test has been damaged Rootkit subsystem, need to enforce self-check and recovery. Rootkit detection of self-check subsystems subsystem authentication using RSA algorithms, communication both have their public and private, authentication, communication in both the encrypted information with each other, and give yourself the decrypted receiving and sending messages, and then compares the information.

Based on the random combination module for MD5 of digital signature file integrity test method, will need to do all of the module file integrity protection into several groups can be repeated, and each group of module combined for MD5 value after orderly.本回答被网友采纳
第3个回答  2010-05-06
我是人工翻译的哦:
Rampant malicious programs on the computer today, there is no security software installed on networked computers has been difficult to run properly. Rootkit is able to durable and reliable, can not be detected to exist in a set of computer programs or code, is a malicious software to hide their tracks and keep your computer up access (root access) tool. Rootkit serious harm performance in the target computer, the highest it has access to the target computer can be arbitrary manipulation. Evolving technology can even break Rootkit Rootkit detection software, and Rootkit detection software by modifying the implementation of logic makes Rootkit detection software failure.

This paper designed a Rootkit detection subsystem and the self-test subsystem independent Rootkit detection system.

Self-test subsystem found by searching in the system Rootkit detection subsystem, the first start the certification process, only self-test subsystem through a Rootkit detection subsystem certification, Rootkit detection sub-system self-test subsystem, it only accepted test and to create a self-test environment for the self-test subsystem; if the self-test did not pass the certification, indicating Rootkit detection subsystem has been destroyed and forced to self-test and recovery. Rootkit detection subsystem of the self-test subsystem authentication using RSA algorithm, communications, both sides have their own public key and private key, the authentication when communication both with each other's public key encrypted message sent to each other and with their own private key to decrypt the received information, and then send the information and its own comparison.

Random combination of demand-based module MD5 digital signature file integrity detection method, the file needs to be done to protect the integrity of all the modules can be divided into several groups duplicate, and each of the modules to seek MD5 value after the merger.
相似回答