Please wait a minute...
Computer & Telecommunication  2019, Vol. 1 Issue (5): 45-47    DOI:
Current Issue | Archive | Adv Search |
Discussion on the Omni-directional Defense for Virus Defense
GAO Pan LIN Li
Fujian Meteorological Information Center
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  The traditional virus defense measures are only aimed at the individual virus defense, lacking omni-directional defense measures, resulting in an inability to effectively protect the virus. This paper discusses on a kind of omni-directional virus defense scheme, improving the virus defense ability.
Key wordsomni-directional      computer virus      virus defense     
Published: 12 August 2019
ZTFLH:  TP393.08  

Cite this article:

GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense. Computer & Telecommunication, 2019, 1(5): 45-47.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2019/V1/I5/45

[1] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[2] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[3] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
[4] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[5] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
[6] TANG Jun-ming. Network Security Analysis Method for Big Data[J]. 电脑与电信, 2017, 1(12): 62-63.
[7] XUE Jin-song , FENG Ren-jun. Network security technology based on LAN environment[J]. 电脑与电信, 2017, 1(11): 92-94.
[8] Xie Fan. Analysis on the Computer Network Security and Router Troubleshooting[J]. 电脑与电信, 2017, 1(7): 42-43.
[9] Li Fangjun. The Application of Data Encryption Technology in Computer Network Communication Security[J]. 电脑与电信, 2017, 1(5): 59-61.
[10] Zou Ning. Design and Realization of a Kind of Network Tool Software Based on Jpcap[J]. 电脑与电信, 2017, 1(4): 47-49.
[11] Chen Fubin. Thoughts on Computer Network Security Precautions[J]. 电脑与电信, 2016, 1(12): 84-85.
[12] Zhao Yonggang. Design of the LAN Computer Network Security Monitoring Platform Based on Nagios[J]. 电脑与电信, 2016, 1(11): 48-49.
[13] Shen Lixiang. The Security of Linux Server Deployment[J]. 电脑与电信, 2016, 1(11): 50-52.
[14] Chen Zhen. Research on the Role of Virtual Network Technology in Computer Network Security[J]. 电脑与电信, 2016, 1(9): 31-32.
[15] Cui Aiguo. Network Security Technology under INTRANET Based on Intelligent Firewall[J]. 电脑与电信, 2016, 1(9): 33-35.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd