2、然而利益背后也有着弊端。在日益发达的网络环境下,黑客和不法分子很容易利用特洛伊木马程序来窃取用户的隐私。因此如何有效保护人们的隐私就成了一个不容忽视的问题。关键词:计算机;网络;特洛伊木马;窃取;保护Trojanhorse attacks and defenseAbstract:Withthe rapiddevelopment ofcomputernetworktechnology, computer tools havebeen asa people mustbe integratedintoour dail
3、ylife,people's lives becomeincreasinglydependenton networksand computers. However, interest alsohas disadvantages behind.Intheincreasingly well-developed networkenvironment, itiseasy forhackersandcriminals use Trojanhorse tosteal theuser's privacy. So howtoe
4、ffectively protectpeople'sprivacy hasbecome a problem cannotbeignored.Keywords:Computer;Network;Trojanhorse;Steal;Protection9引言特洛伊木马的故事是在古希腊传说中,希腊联军围困特洛伊久攻不下,于是假装撤退,留下一具巨大的中空木马,特洛伊守军不知是计,把木马运进城中作为战利品。夜深人静之际,木马腹中躲藏的希腊士兵打开城门,特洛伊沦陷。现实中的特洛伊木马程序是黑客常用攻击方法,它通过在用户的的