英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

2005年NPR美国国家公共电台九月-Transition Seen from Hacker Posturing to

时间:2007-07-18 03:16来源:互联网 提供网友:zhao6221133   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)
A new survey of Internet security says the computer attacks are increasingly being used to make money, rather than simply to make mischief1. Virus writers are finding also ways to amplify2 their power—they're renting out robot armies of computers under their command. NPR's Larry Abramson has more.

In the old days the creators of computer viruses were in it for the glory, for the chance to brag3 about breaking into some well-guarded system. There is still a lot of boasting in the back alleys4 of the Internet, but increasingly the goal is profit. Vincent Riva is with the security company--Symantec.

There's an ecosystem5 which has been created as, where increasingly the full profit is the connection between those who find the vulnerabilities, those who write their exploits, and those who try to exploit it for money.

Symantec has just released its latest Internet security report which documents the ways that malicious6 computer code is being used to steal identities, attack businesses and send out spam. In the first six months of this year, Symantec counted nearly 2,000 vulnerabilities—2,000 security holes that could be used to break into computers remotely. On average someone attacks those holes less than a week after they're discovered, but Symantec says it usually takes two months before a security patch is developed. That means that evildoers have 7 weeks to march through those gateways7 and get inside the machines of unsuspecting users. And that's what Vincent Riva says another trend is building. Computer crackers8 are taking control of vast numbers of machines. They're developing what are known as botnets, and offering them for hire.

They become for rent. And we know available underground a number of these systems, are available for people who want to use it to make money.

The actual owners of these machines may be unaware9 that their computers have these alter egos10 and are being used to commit crimes. In one case brought by the Justice Department last year, a Massachusetts businessman was indicted11 for hiring a botnet operator and telling him to attack the computers of a competitor. Botnets have also been used to pump up revenues for advertisements by creating imaginary traffic to a website. And these commandeerd computers can also be called into service for fishing scams, which trick users into giving a passwords and other personal information. Thurston Hose has been monitoring the growth of botnets for a group called the HoneyNet project from his listening post in Germany. Hose says even beginners can amass12 large armies.

So we see several hundred/ thousands of compromised machines / each day and just the skill that is not very high for running a botnet.

The Symantec Internet security report brings news of other ominous13 trends. Vincent Riva says he seen the growth of viruses aimed at portable computing14 devices, PDAs and smart cell phones.

If we look at countries or regions of the world, which actually have a fast deployment15 of a smart phone, such as Japan, we actually see more crime in those areas, so for example we see the first fishing and float attacks occurring in Japan.

If you find these threats alarming, you're supposed to. This news is coming from a company that makes its money off the sale of security software. They see the world through their own particular lens. But even the best security software has holes, for example, researchers at UC Berkley have just announced they can reliably decode16 passwords and other information simply by recording17 the sounds of you typing on your keyboard.

Larry Abramson, NPR news.

点击收听单词发音收听单词发音  

1 mischief jDgxH     
n.损害,伤害,危害;恶作剧,捣蛋,胡闹
参考例句:
  • Nobody took notice of the mischief of the matter. 没有人注意到这件事情所带来的危害。
  • He seems to intend mischief.看来他想捣蛋。
2 amplify iwGzw     
vt.放大,增强;详述,详加解说
参考例句:
  • The new manager wants to amplify the company.新经理想要扩大公司。
  • Please amplify your remarks by giving us some examples.请举例详述你的话。
3 brag brag     
v./n.吹牛,自夸;adj.第一流的
参考例句:
  • He made brag of his skill.他夸耀自己技术高明。
  • His wealth is his brag.他夸张他的财富。
4 alleys ed7f32602655381e85de6beb51238b46     
胡同,小巷( alley的名词复数 ); 小径
参考例句:
  • I followed him through a maze of narrow alleys. 我紧随他穿过一条条迂迴曲折的窄巷。
  • The children lead me through the maze of alleys to the edge of the city. 孩子们领我穿过迷宫一般的街巷,来到城边。
5 ecosystem Wq4xz     
n.生态系统
参考例句:
  • This destroyed the ecosystem of the island.这样破坏了岛上的生态系统。
  • We all have an interest in maintaining the integrity of the ecosystem.维持生态系统的完整是我们共同的利益。
6 malicious e8UzX     
adj.有恶意的,心怀恶意的
参考例句:
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
7 gateways 15fd82cde2a6c5cde8ab669e8d349305     
n.网关( gateway的名词复数 );门径;方法;大门口
参考例句:
  • Police bullets raked the gateways car. 警察的子弹对着门口的汽车扫射。 来自辞典例句
  • No Internet gateways are needed for the programs operation. 该软件的操作不需要互联网网关的支持。 来自互联网
8 crackers nvvz5e     
adj.精神错乱的,癫狂的n.爆竹( cracker的名词复数 );薄脆饼干;(认为)十分愉快的事;迷人的姑娘
参考例句:
  • That noise is driving me crackers. 那噪声闹得我简直要疯了。
  • We served some crackers and cheese as an appetiser. 我们上了些饼干和奶酪作为开胃品。 来自《简明英汉词典》
9 unaware Pl6w0     
a.不知道的,未意识到的
参考例句:
  • They were unaware that war was near. 他们不知道战争即将爆发。
  • I was unaware of the man's presence. 我没有察觉到那人在场。
10 egos a962560352f3415d55fdfd9e7aaf5265     
自我,自尊,自负( ego的名词复数 )
参考例句:
  • Their egos are so easily bruised. 他们的自尊心很容易受到伤害。
  • The belief in it issues from the puerile egos of inferior men. 这种信仰是下等人幼稚的自私意识中产生的。
11 indicted 4fe8f0223a4e14ee670547b1a8076e20     
控告,起诉( indict的过去式和过去分词 )
参考例句:
  • The senator was indicted for murder. 那位参议员被控犯谋杀罪。
  • He was indicted by a grand jury on two counts of murder. 他被大陪审团以两项谋杀罪名起诉。
12 amass tL5ya     
vt.积累,积聚
参考例句:
  • How had he amassed his fortune?他是如何积累财富的呢?
  • The capitalists amass great wealth by exploiting workers.资本家剥削工人而积累了巨额财富。
13 ominous Xv6y5     
adj.不祥的,不吉的,预兆的,预示的
参考例句:
  • Those black clouds look ominous for our picnic.那些乌云对我们的野餐来说是个不祥之兆。
  • There was an ominous silence at the other end of the phone.电话那头出现了不祥的沉默。
14 computing tvBzxs     
n.计算
参考例句:
  • to work in computing 从事信息处理
  • Back in the dark ages of computing, in about 1980, they started a software company. 早在计算机尚未普及的时代(约1980年),他们就创办了软件公司。
15 deployment 06e5c0d0f9eabd9525e5f9dc4f6f37cf     
n. 部署,展开
参考例句:
  • He has inquired out the deployment of the enemy troops. 他已查出敌军的兵力部署情况。
  • Quality function deployment (QFD) is a widely used customer-driven quality, design and manufacturing management tool. 质量功能展开(quality function deployment,QFD)是一个广泛应用的顾客需求驱动的设计、制造和质量管理工具。
16 decode WxYxg     
vt.译(码),解(码)
参考例句:
  • All he had to do was decode it and pass it over.他需要做的就是将它破译然后转给他人。
  • The secret documents were intercepted and decoded.机密文件遭截获并被破译。
17 recording UktzJj     
n.录音,记录
参考例句:
  • How long will the recording of the song take?录下这首歌得花多少时间?
  • I want to play you a recording of the rehearsal.我想给你放一下彩排的录像。
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   npr  公共电台  transition  hacker
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴