You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Computers are not defined by having a screen/keyboard; many are “hidden” inside everyday objects.
18
24
* Different computer types exist because design is a trade-off: mobility vs cooling/performance; reliability vs cost; purpose shapes interface and architecture.
* Malware history is tightly coupled with how computers started to **share resources over networks** (resource sharing) and later how microcomputers spread software via **removable media** (floppy disks).
18
24
* Early “malware-like” programs often looked like **experiments** in mobility or replication (e.g., Creeper), but they revealed real operational risks: uncontrolled replication → **resource exhaustion** and denial of service.
@@ -30,7 +36,7 @@ date: 2026-02-13
30
36
* boot sector virus (引导扇区病毒)
31
37
* obfuscation/encryption for stealth (为隐蔽而做的混淆/加密)
0 commit comments