e)    As long as there are procedures that may exist on the BUG
As long as there are procedures that may exist on the BUG. Even the security tools also possible security loopholes. Almost every day a new BUG was found and published, in the process to amend the designer known for BUG at the same time, it may have had a new BUG. BUG system, hackers often use, and this attack does not normally have a log, almost no data are available. For example, many programs the existence of the memory overflow BUG, and safe use of these tools for BUG's almost impossible to guard against attacks.
f)    hacking efforts
Almost every day, a different system security problems. Means hackers are constantly updated, and security tools to update the rate lagged far behind the attacks means the update rate, the vast majority of cases people need to be able to participate in the discovery of previously unknown security issues, making their impact on emerging security The question is always too slow in responding. When the security tools to detect and correct just a safety issue, other security issues have emerged. As a result, hackers can always use advanced security tools can not find the means to carry out attacks.
Second, the network's vulnerability has led to arbitrary hackers on the Internet Hang
According to the Warroon? Research survey, in 1997 the world's top 1000 companies have been almost hackers broke into.
According to FBI statistics of the United States, the United States each year as a result of network security caused by the loss of up to 7,500,000,000 U.S. dollars.
Ernst and Young report, due to theft or misuse of information security, almost 80% of large enterprises suffered losses.
In a recent large-scale hacker attacks, the Yahoo Web site to stop running 3 hours, so the loss of millions of dollars of transactions. According to statistics, and in this whole operation, the U.S. economy has lost a total of over one billion U.S. dollars. As the panic of the industry, Amazon (Amazon.com), AOL, Yahoo (Yahoo!), EBay shares were down, technology-dominated Nasdaq stock index (Nasdaq) over the past three consecutive days to break the record The rally, a 63-point drop, the Dow Jones Industrial Average closed Wednesday, also fell 258 points. To see these shocking events, so that people can not help but issued a doubt: "Network security has?" According to incomplete statistics, at present, our web site by the hackers, although not on a par with the United States, China, but the number of customers, the size of users has reached the stage of rapid progress, the fact that we can not let food for thought:
By the end of 1993, the High Energy Institute, Chinese Academy of Sciences have found a "hacker" intrusion, a user's permission has been upgraded to a super-powers, when the system administrator to track, was his revenge.
In 1994, the United States, a 14-year-old children via the Internet into Chinese Academy of Sciences Network Center of Tsinghua University and host to our system administrator warned.
In 1996, the High Energy Institute has once again been a "hacker" invasion, in the private High Energy Institute hosts dozens of accounts set up, the track is found in a dial-up users.
Over the same period, domestic ISP found a "hacker" invasion of its main server and delete the account of its document management, resulting in hundreds of people can not use.
In 1997, the Chinese Academy of Sciences Network Center of the page was a "hacker" with plans to replace the devil.
To enter in 1998, the hacking activity is on the increase, almost all major networks have met with varying degrees of hacker attacks:
In February, Guangzhou Shi Lingtong invasion by hackers several times, resulting in 4 hours the system out of control;
In April, Guizhou port hacking, home to be replaced by an obscene picture;
May, Dalian ChinaNET node invasion, user passwords stolen;
上一篇:ASP.NET英文文献及翻译
下一篇:网页应用程序英文文献和中文翻译

AngularJS技术介绍英文文献和中文翻译

开关电源水冷却系统英文文献和中文翻译

减数分裂和基因重组英文文献和中文翻译

太阳能最大功率点追踪和...

移动码头的泊位分配问题英文文献和中文翻译

虚拟船舶装配集成建模方...

中学生科学探究中对等论...

从政策角度谈黑龙江對俄...

浅论职工思想政治工作茬...

上海居民的社会参与研究

压疮高危人群的标准化中...

基于Joomla平台的计算机学院网站设计与开发

酵母菌发酵生产天然香料...

浅谈高校行政管理人员的...

提高教育质量,构建大學生...

STC89C52单片机NRF24L01的无线病房呼叫系统设计

AES算法GPU协处理下分组加...