楼主: play32
收起左侧

[讨论] 知道小红伞收费版为什么要20欧元吗?

[复制链接]
play32
 楼主| 发表于 2009-1-7 16:56:06 | 显示全部楼层
Active X控件  
Active X is technology produced by Microsoft that enables different applications to interact easily with each other.
积极X是微软公司生产的技术,使不同的应用程序容易地相互交流。
Forexample, Microsoft Word can be opened in an Internet Explorer browserand specific communications needs to occur between Microsft Word &Internet Explorer.
例如, Microsoft Word可以打开的Internet Explorer浏览器和具体的通信需求,以之间发生Microsft Word中与Internet Explorer中。
Sometimes these communication rules are exploited by malicious applications and they can cause harm to your computer.
有时候,这些通信规则所利用的恶意应用程序,他们可以造成损害您的计算机。

Adware
广告软件  
Storage media that are removed from the computer, such as floppy diskettes, tapes, CD-ROM disks.
存储介质是从计算机中删除,如软盘,磁带, CD - ROM光碟磁盘。

Browser Hijackers
浏览器黑客  
Browser hijackers are programs that run automatically every time you start your Internet browser.
浏览器黑客的程序自动运行,每次启动您的互联网浏览器。
These hijackers can sometimes control your browser, like Internet Explorer.
这些劫机犯有时可以控制您的浏览器,如Internet Explorer 。
SomeBrowser Helper Objects are really good for expanding your browsercapabilities, but there are others that may not need your permission toinstall and which can be used for malicious purposes like gatheringinfo on your surfing habits.
有些浏览器帮助对象是非常好的,扩大您的浏览器的能力,但也有其他人可能并不需要您的许可,安装和可用于恶意目的,如收集信息在您的上网习惯。
Thiscan cause anything from incompatibility issues to corrupting importantsystem functions making them not only a threat to your security, butalso to your systems stability.
这可能会导致不兼容问题,从腐败的重要制度,以使他们的职能不仅威胁到您的安全,而且对你的系统稳定。

Data Mining
数据挖掘  
Data mining is an information extraction activity whose goal is to discover hidden facts contained in databases.
数据挖掘是信息提取的活动,其目标是发现隐藏的事实数据库。
Usinga combination of machine learning, statistical analysis, modelingtechniques, and database technology, data mining finds patterns andsubtle relationships in data and infers rules that allow the predictionof future results.
利用相结合的机器学习,统计分析,建模技术,数据库技术,数据挖掘发现的模式和微妙的关系,数据和推导规则,允许预测将来的结果。
For example: people purchasing wood on the Internet would have painting supplies cross sold to them.
例如:购买木材的人在互联网上有绘画用品交叉销售给他们。
Typicalapplications include market segmentation, customer profiling, frauddetection, evaluation of retail promotions, and credit risk analysis.
典型的应用包括市场细分,客户分析,欺诈检测,评价的零售促销,以及信用风险分析。

Dialers
拨号器  
Dialers are a type of software typically used by vendors serving pornography via the Internet.
拨号器是一种常用的软件服务供应商通过互联网从事色情活动。
Oncedialer software is downloaded, the user is disconnected from theirmodem's usual Internet service provider, re-connected to anotherInternet service provider (new dial-up telephone number), and the useris billed at exorbitant rates.
一旦拨号软件下载,用户断开其调制解调器通常的互联网服务提供商,重新连接到另一台Internet服务提供商(新的拨号电话号码) ,用户在高昂的结算利率。
Dialersdo not "spy" on their intended victims, but these malevolent programscan rack up significant long distance phone charges, costing victimstime and money.
拨号不“间谍”他们打算受害者,但这些恶意程序可以机架了大量长途电话费用,成本的受害者时间和金钱。

Drive-By Download
驱动下载  
Adrive-by download is a program that is automatically downloaded to yourcomputer, often without your consent or even your knowledge.
开车经过下载一个程序,它会自动下载到电脑后,往往未经您的同意,甚至你的知识。
Unlikea pop-up download, which asks for consent (albeit in a deceitful mannerlikely to lead to a "yes"), a drive-by download is carried outinvisibly to the user.
不同弹出下载,这要求同意(尽管在骗人的方式可能导致“是” ) ,一名驾车进行下载看不见给用户。
They can be initiated by simply visiting a Web site or viewing an HTML email message.
它们可以通过简单的开始访问网站或查看HTML电子邮件消息。
Frequently, a drive-by download is installed along with another application.
通常情况下,开车经过下载安装以及其他应用程序。

Keyloggers
键盘记录器  
Programs that capture and record your every keystroke, including personal information and passwords.
程序,捕捉和记录您的每个按键,包括个人信息和密码。
Keyloggers are applications designed to monitor computer activity to various degrees.
键盘记录器是应用计算机设计,监测活动的不同程度。
Theseprograms can capture virtually everything you do on your computerincluding recording of all keystrokes, emails, chat room dialogue, websites visited, and programs run.
这些程序可以捕获几乎所有您在您的计算机上,包括记录所有击键,电子邮件,聊天室对话,网站访问,以及运行的程序。
System monitors usually run in the background so that you do not know that you are being monitored.
系统监视通常在后台运行,这样你不知道你是被监视着。
The information gathered by the system monitor is stored on your computer in an encrypted log file for later retrieval.
收集到的资料,系统监控存储在您的计算机在加密的日志文件为日后检索。
Some programs are capable of emailing the log files to another location.
一些程序能够通过电子邮件发送的日志文件到另一个位置。

Malware
恶意软件  
Malware is short for malicious software.
恶意软件是短期的恶意软件。
Malware is software designed specifically to disrupt a computer system.
恶意软件的软件,专门破坏计算机系统。
For example, a trojan horse or a virus is considered malware.
例如,一个木马或病毒被认为是恶意软件。
Some advertising software can be malicious in that it can try to re-install itself after you remove it.
一些广告软件可以恶意的,因为它可以尝试重新安装它后,您将其删除。
Basically, it is virus ware.
基本上,它是病毒洁具。

Parasites
寄生虫  
Parasitesare programs that get installed on your computer which you never askedfor, which does some type of activity that you didn't intend for it todo.
寄生虫程序获得您的计算机上安装您从未要求,这是某种类型的活动,您不打算这样做。
Almostall the parasites that are currently known are only compatible withWindows, and some only affect the Internet Explorer browser.
几乎所有的寄生虫,目前已知的唯一兼容Windows ,有些只会影响Internet Explorer浏览器。

Real-Time Protection
实时保护  
All anti-spyware software will search your computer for certain types of components or applications.
所有的反间谍软件将搜索您的计算机对某些类型的组件或应用程序。
This feature identifies how many different components are searched for when running the Anti-Spyware software.
这一功能可以识别有多少种不同的组成部分是搜查时,运行反间谍软件。
Most anti-spyware component databases are updated on a regular basis.
大多数反间谍组件数据库定期更新。

Registry Entries
注册表项  
MicrosoftWindows stores all of your application information in your registrykeys, for example, what software to run, where is the software located,etc. Viruses can manipulate these settings so that applications stoprunning or run when least expected.
微软Windows商店所有对您的申请信息在您的注册表项,例如,软件运行,如果是软件位于等病毒可以操纵这些设置,以便应用程序停止运行或运行时,至少预期。

Rootkits
的Rootkits  
Rootkits allow hackers to take total control of your computer at the "root" or Administrative level, without being detected.
的Rootkits使黑客完全控制您的计算机上的“根”或行政级别,不被察觉。
A good anti spyware program will detect and eliminate rootkits.
一个很好的反间谍软件程序将检测和消除的rootkit 。

Spyware
间谍软件  
Spyware is any application that tracks your online behavior without your knowledge or consent.
间谍软件是任何应用程序,跟踪您的在线行为您不知情或未经您的同意。

Toolbars
工具栏  
Toolbars can be downloaded to your web browser to make browsing easier.
工具栏可以被下载到您的网页浏览器,使浏览更加容易。
Examples are Google, Alexa, and Yahoo toolbars.
例子是谷歌灼,雅虎工具栏。
Eventhough these toolbars are very handy to use, these toolbars have theability to track everything you do on the Internet and to pass thatinformation back to the owners of the toolbars.
即使这些工具是非常方便的使用,这些工具能够追踪所有你在互联网上传递的信息提供给业主的工具栏。
Be cautious to read the terms and conditions page before you download any toolbar.
小心阅读的条款和条件页面,然后再下载任何工具栏。

Tracking Cookies
追踪cookies  
Cookies are small pieces of information that are generated by a web server and stored on your computer for future access.
Cookie是一小段信息所产生的Web服务器和存储在您计算机上为今后的访问。
Cookieswere originally implemented to allow you to customize your webexperience, and still continue to serve useful purposes in enabling apersonalized web experience.
Cookie的最初实施,让您可以自定义您的Web体验,并仍然继续有用的目的,使个性化的Web体验。
However,some web sites now issue adware cookies, which allow multiple web sitesto store and access cookies that may contain personal information(including surfing habits, user names and passwords, areas of interest,etc.), and then simultaneously share the information it contains withother web sites.
然而,现在一些网站的广告软件的cookie问题,使多个网站,以存储和访问的Cookie可能包含个人信息(包括上网习惯,用户名和密码,感兴趣的领域,等等) ,然后同时分享的信息包含与其他网站。
Thissharing of information allows marketing firms to create a user profilebased on your personal information and sells it to other firms.
这种信息共享允许营销公司,以创建一个用户个人资料的基础上您的个人信息和出售给其他公司。
Adware cookies are almost always installed and accessed without your knowledge or consent.
广告饼干几乎总是安装和使用在您不知情或不同意的。

Trojans
木马  
Trojans are malicious programs that appear as harmless or desirable applications.
特洛伊木马是恶意程序显示为无害或可取的应用。
Trojans are designed to cause loss or theft of computer data, and to destroy your system.
木马程序的目的是造成损失或被窃的计算机数据,并破坏您的系统。
Sometrojans, called RATs (Remote Administration Tools), allow an attackerto gain unrestricted access of your computer whenever you are online.
有些木马,所谓的RAT (远端管理工具) ,让黑客不受限制地进入您的计算机时,您是否在线。
Theattacker can perform activities such as file transfers, adding/deletingfiles or programs, and controlling the mouse and keyboard.
攻击者可以执行的活动,如文件传输,添加/删除文件或程序,并控制鼠标和键盘。
Trojans are generally distributed as email attachments or bundled with another software program.
木马程序一般都分布作为电子邮件附件或捆绑其他软件程序。



这下大家清楚了没有
一下子丫
发表于 2009-1-7 16:57:17 | 显示全部楼层
原帖由 ahu2422 于 2009-1-7 15:26 发表

20欧元很贵么?

和20 RMB差不多吧(考虑当地的收入和消费水平)


卖 20 RMB 的话,估计中国也有很多人买


十分赞成。
play32
 楼主| 发表于 2009-1-7 16:59:53 | 显示全部楼层
这下终于把容易忽略的反间谍功能解释清楚了即使扣分我也值了不知道是很危险的事情。
play32
 楼主| 发表于 2009-1-7 17:05:49 | 显示全部楼层
这下大家也知道为什么临时文件夹容易经常扫除一堆小木马来了吧,那里是最容易泄露个人隐私的地方所以木马喜欢往那里挤了。
我coocie经常扫除几只木马呵呵有人居然不在乎,当然你存钱跑银行物理隔绝了不过用网上银行就危险了
说了这么多,跑题了
xishan679
发表于 2009-1-7 17:36:55 | 显示全部楼层
原帖由 play32 于 2009-1-7 16:39 发表
看了各位忽然发现原来小红伞不来中国确实大家喜欢盗版软件了。
补充反间谍功能包含哪些东东:你们就知道这20欧元花在了什么地方了----------
Active X控件,
广告软件,
浏览器黑客,
数据挖掘,
拨号器 ...

现在明白了
bbbxyoiil
发表于 2009-1-7 17:40:34 | 显示全部楼层
赞成
LilyPrincess
发表于 2009-1-7 19:27:17 | 显示全部楼层
原帖由 play32 于 2009-1-7 16:56 发表
Active X控件  Active X is technology produced by Microsoft that enables different applications to interact easily with each other.积极X是微软公司生产的技术,使不同的应用程序容易地相互交流。 Forexample ...


机器翻译的,还不如不翻译.......- -|||
play32
 楼主| 发表于 2009-1-8 05:06:02 | 显示全部楼层
不好意思,楼主英语水平有限,勉强看看吧,其实不想把英语弄上来,主要时间有限,百忙中还能够回复帖子不容易啊用火狐自动翻译的,
andyzhai
发表于 2009-1-10 21:26:08 | 显示全部楼层
还以为测算出成本和利润了呢
mixyzai
发表于 2009-1-10 21:35:00 | 显示全部楼层
问题是住在中国想买正版也没法买啊
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-10-16 14:38 , Processed in 0.091371 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表