b2科目四模拟试题多少题驾考考爆了怎么补救
b2科目四模拟试题多少题 驾考考爆了怎么补救

kaspersky lab zao_kaspersky os下载_kaspersky密码(4)

电脑杂谈  发布时间:2017-06-03 06:09:36  来源:网络整理

By monitoring is meant the identification, among the events occurring, of a forbidden event and the subsequent blocking of both the forbidden event itself and the object giving rise to the forbidden event A list of forbidden events or forbidden objects is transmitted from the antivirus module 180。 Furthermore, the antivirus agent 170 is able to perform an antivirus check by itself。 In this case, the antivirus agent 170 has a functional which enables said antivirus check (which is described herein with reference to FIG。 2)。

A second component of the antivirus system resides on the security virtual machine 140 (hereinafter, the SVM 140), which is specially created for the working of the antivirus system and which includes the antivirus module 180, which in turn is designed to perform the tasks of the antivirus check。 The SVM 140 is similar to VM 150, but its purpose, as mentioned above, is to perform the tasks of antivirus checking。 The creation of such a SVM 140 makes it possible to unload of VMs 150 from performing some of the resource-consuming operations (e。

g。, antivirus check methods) when performing the antivirus checking tasks from the VM 150, which allows for a reduced workload both on the VMs 150 themselves and on the host machine 110。 For example, the transfer to the SVM 140 of such an antivirus check method as signature ysis of files substantially reduces the workload on the resources of the host machine 110, in particular, it decreases the number of disk operations (work with the hard disk) and the use of memory。 This is due to the fact that a constant accessing of the signature list is needed during the performance of a signature ysis, but since this method is performed only by the SVM 140, the accessing of the hard disk also occurs from the SVM 140。 Yet another aspect is due to the fact that signature ysis takes time, which may result in substantial delay in the user's work。


本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-4.html

相关阅读
    发表评论  请自觉遵守互联网相关的政策法规,严禁发布、暴力、反动的言论

    热点图片
    拼命载入中...