Seven, RAID, Redundant Disk Array
RAID0, banding pattern (striped)> = 2 Disk
RAID1, mirror mode (mirrored)> = 2 Disk
RAID10, strip mirror mode +> = 4 disks
RAID5, balanced mode (one parity disk)> = 3 Disk
RAID6, balanced mode (two parity disk)> = 4 disks
Virus and Trojan Protection
First, the Trojans
1, the computer Trojan
A legitimate program included in the illegal program
3, Trojan horse Hazard
File Operations
Modify the registry
Steal passwords
Keyloggers
System Operation
4, common Trojan
Glacial
GDUFS ghost
Great white shark
Gray pigeons
First, computer viruses and biological viruses similarities and differences
The same point: parasitic, infectious and destructive
Differences: artificially prepared
Second, the characteristics of computer viruses
Unauthorized execution of
Invisibility
Infectiousness
Latent
Destructive
Can be triggered
Third, computer viruses - classification
File type
Boot sector type
Macro viruses
VBS script virus
worm
Fourth, network computers against viruses
Strong destructive
Spread and strong
Wide diffusion
Spread fast
It is difficult to eradicate
- Script virus
1, the script virus using .asp, .htm, .html, .vbs, .js types of files spread-based VB Script and Java Script scripting language
2, the script virus characteristics
Hidden
Spread wide
Multi-variant virus
Broilers (host) check result of the communication
netstat -nao