Next the virus scans all local drives and infects files on them.
接着病毒扫描所有本地驱动器感染其上的文件。
It has been proved by experiments that the algorithm entirely satisfies the disposal of intrusion detection, text search, virus scans and information inquires in the high-speed network.