Phương tiện truyền thông không điều khiển có một thuộc tính chung: họ không điều khiển và như vậy có thể đi du lịch nhiều máy cùng một lúc. truyền giải quyết Lega của họ để giúp mọi người trên đã được henever s, pense Missi Nolo,-w ồn ào, xuất r ba thập kỷ Đối với sự tự tin tối thiểu, một vấn đề với Hout một luật sư. | SY0 - 201 If the event is a specific date or time the program will often be referred to as a time bomb. In one famous example of a time bomb a disgruntled employee left a time bomb in place just prior to being fired from his job. Two weeks later thousands of client records were deleted. Police were eventually able to track the malicious code to the disgruntled ex-employee who was prosecuted for his actions. He had hoped that the two weeks that had passed since his dismissal would have caused investigators to assume he could not have been the individual who had caused the deletion of the records. Logic bombs are difficult to detect because they are often installed by authorized users and in particular have been installed by administrators who are also often responsible for security. This demonstrates the need for a separation of duties and a periodic review of all programs and services that are running on a system. It also illustrates the need to maintain an active backup program so that if your organization loses critical files to this sort of malicious code it loses only transactions that occurred since the most recent backup and no permanent loss of data results. Rootkits Rootkits are a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality. The history of rootkits goes back to the beginning of the UNIX operating system where they were sets of modified administrative tools. Originally designed to allow a program to take greater control over operating system function when it fails or becomes unresponsive the technique has evolved and is used in a variety of ways. One high-profile case occurred at Sony BMG Corporation when rootkit technology was used to provide copy protection technology on some of the company s CDs. Two major issues led to this being a complete debacle for Sony first the software modified systems without the user s approval and second the software opened