摘要
从木马原理出发,分析了几种木马隐藏方法,并对各自优缺点做了简要评论。
Based on the principle of Trojan horse,the paper analyzes several kinds of Trojan horse concealing,and briefly discusses their advantages and disadvantages.
出处
《电脑学习》
2007年第5期4-5,共2页
Computer Study
关键词
木马
隐蔽性
端口
反弹
溢出植入
Trojan Horse Concealing Port Rebound Overflow Planting