论文部分内容阅读
当前破坏者(Cracker)的破坏活动十分猖獗,破坏性极大。尤其是破坏者中的非法入侵活体的破坏和盗窃所造成的灾难性后果,已经是人人皆知。这里的活体是指一段可执行程序.例如计算机病毒,特洛伊木马,等等,本文提出一种新的计算机系统结构,它能有效防止非法入侵活体的破坏和盗窃活动,包括:能有效保护主系统的硬件和软件,不受任何非法入侵活体的破坏和盗窃。这一点是共享网络巨大计算资源和数据资源的前提。本文所提出的计算机系统结构,可以应用于个人计算机,企业内部的各种计算机系统,以及国防.国家安全,公安等等的大型计算机系统、和网络上的各种节点用的各种类型的计算机、还可以应田于能上网的家电,等等。所需的代价极低.对PC而言,内部存储部件的空间增加32/64分之一。CPU所增加器材可以忽略不计。本文还提出另一种新的称为区域隔离的计算机系统,它不增加任何内部存储部件空间.CPU所增加的器材同样可以忽略不计。而且能有效防止常见的非法入侵活体的破坏和盗窃活动,例如EMAIL病毒,缓冲区溢出的计算机病毒
The sabotage by the current Cracker is rampant and devastating. It is well known that disastrous consequences of the destruction and theft of the unlawfully invading living entities among saboteurs, in particular. The living body here refers to an executable program, such as a computer virus, a Trojan horse, etc. This paper presents a new computer system architecture that can effectively prevent the destruction and theft of illegal invaders, including: The hardware and software are free from the destruction and theft of any unlawful invasion of the living body. This is a prerequisite for sharing huge computational and data resources on the network. The computer system structure proposed in this paper can be applied to personal computers, various computer systems in the enterprise, and large-scale computer systems such as national defense, public security and so on, and various types of computers for various nodes on the network , But also should be able to field access to home appliances, and so on. The cost is extremely low, and for PCs, the amount of internal storage is one in 32/64th increments. CPU increased equipment can be ignored. This article also presents another new computer system called Area Isolation, which does not add any internal storage component space. The added hardware of the CPU is likewise negligible. But also effectively prevent the common destruction and theft of illegal invaders such as EMAIL virus, computer virus overflowing buffer area