Recently, according to media coverage, the United States produces network weapon greatly, let oneself suffer disaster first however, develop because of American state him security bureau " lasting blue " because network attack software is divulged, bring about computer of American native government to atttack a weapon to inbreak by homebred network, the loss is very huge, look this the United States moves stone to break a leg, ask for trouble.
If everybody is right,the harm sex of computer virus still has no the word of direct experience, might as well before be being searched paragraph time whole world erupts blackmail virus. Erupt in that virus in the center, the data that has countless databases because of this virus damage and grey flying smoke destroys, the loss countless that cause, and up to now really fierce it is the view that everybody returns neither one to unite after all, this also is one of typical features that computer virus atttacks: Origin very find out hard. From the point of this angle, computer virus suits extremely " backside disclose knives " usage.
Be in current, internet all over the world popularize degree and applied rate already very considerable, its consist in people lives and work do not have a corner, those who be a society run offerred huge advantage. Say none exaggeratively, the prosperity of modern society, from the action that high speed of the information in opening a network exchanges. So, from turn over square all along to think, once Internet this very effective tool instant is out of order, of the impact that causes to the society also be adv unimaginably absolutely greatly, and this is the purpose location that computer virus weapon changes.
Permeate with spy, what what epidemic disease transmission differs is, of computer virus diffuse not to get the limitation of situation, one sits in the hacker before desk of the computer inside Washington apartment, the likelihood is moved move finger can let far some computer that carries in ocean those suffers disaster, and forge false appearance to let his be in Moscow personally it seems that at the same time. This is meant, want to be on guard the transmission of computer virus, far on difficulty outclass is on guard the assault of other tradition, and undertake capturing to a vicious person manipulating sb or sth from behind the scenes of behind the curtain as a result of very difficult real ground and even the cause of blow, should eradicate its menace is approximately impossible more.
Face this kind to be attacked aeriformly prevent, will see the most efficient way at present can be only with child lance defect child aegis, with likewise perfectness this technologist will defy the person of the same trade of cherish ill will. In fact, the war between the hacker is early also it is not merely subjective, a few years after the network is born, the large-scale antagonism between the hacker has happened a lot of times, can be being inspected completely is a war that does not have smoke of gunpowder. This kind of war does not need the severe test of blood and fire, but when statistic of after the event, the loss that cause is mixed completely likely however groovy war comparatives.
After all, had become in global couplet net finality now, network safety problem had become to be able to not ignore the topic for discussion that also can not bypass, and important rate still is in climb stage by stage litre in the center. China is having the Internet user number with the largest whole world, in network safety respect nature should bet with the greatest attention. Although the black dragon incident that this computer virus weapon atttacks happens in the United States, but do not have not not be an omen that is worth vigilance however to us.