英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

pbs高端访谈:保护个人信息不受黑客攻击

时间:2015-01-07 07:42来源:互联网 提供网友:mapleleaf   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)

   JEFFREY BROWN:And we begin an occasional series about the way we live ever more of our lives online in the digital age, and some of the risks and rewards connected with this evolution.

  In coming segments, we will discuss the connections and disconnections of online life, the differences between engaging online and in the physical world, and what does it mean exactly when a video go viral.
  We begin with a look at just how much of us, our identities, are online, and how vulnerable that can make us.
  Mat Honan learned this firsthand recently when he was hacked1 and lost control of his phone, email and personal computer. He told the tale in "Wired" magazine, where he's a technology writer.
  Also joining us is Peter Pachal, who watches this world closely as the technology editor for the Web site Mashable.
  So, Mat Honan, you can be our case study, I guess, to start. How much of you, of your life existed online in some form or other before you got hacked?
  49.jpg
  MAT HONAN, "Wired": Well, like a lot of people, you know, it's an increasing amount every year.
  I had probably more than most. I had eight years or so of Gmail history in there. And then, in addition to that, I was using Apple's iCloud service, which, while my data wasn't stored online, had an online component2 that let people wipe my computer, wipe my iPad, wipe my iPhone. So, although the data wasn't there, the control of that data was there.
  JEFFREY BROWN:Well, so, it's a long story. We can't go into everything that happened to you. But tell us, where did you see the—where were you most vulnerable? What did you find out?
  MAT HONAN:What I found out, interestingly, was that it wasn't like there was one key area that was vulnerable.
  We tend to now give lots of different companies lots of little bits of information. So in my case, what hackers3 were able to do was to take one small bit of information from Amazon, the last four digits4 of my credit card number, and use that to get access to my Apple account which they were to use to get into all these other accounts, my Google account, my Twitter account.
  And to me it highlighted how all of these services are really linked together and how little control we have over what's happening with our data that's in them.
  JEFFREY BROWN:Well, Peter Pachal, let me bring you into it.
  A little control or little awareness5 of how much we have there and how vulnerable we are? What do we know about people's sort of psychology6 and knowledge of life online?
  PETER PACHAL, Mashable: Well, I think Mat said it best in his piece when he said that he basically created an Apple I.D. years ago, like a lot of us did, simply to download songs for 99 cents each.
  And now that same account is now linked to so many different services that Apple provides. I mean, iCloud is obviously the main one that served as a catalyst7 here. So it really kind of bears taking a step back on, you know, just how many of these accounts we have, how they have grown, and also how they're linked.
  I think, like, one of the big takeaways, I think, from Mat's story and others is that do the best you can to isolate8 your services from each other, use different emails, different passwords, password managers and certain other tools to help you with that, because, you know, it's rather—it's like dominoes. One gets hacked and the rest fall.
  JEFFREY BROWN:Well, Peter, staying with you, I want to ask you more about passwords, because that is, of course, one of the best ways to protect all these different things we use, and yet most of us, of course, have a hard time remembering too many passwords. I read about how many people use very simple passwords, even though they're warned otherwise.
  PETER PACHAL:Yes, I'm glad you brought that up.
  There are a number of password-managing tools that are free to use or cost a very small fee that work for both the Web and your phone. And that's obviously the absolute best solution, because they can also generate random9 passwords, so you don't even have to remember them. And they have automatic log-in tools and that kind of thing.
  Now, realistically, I know that a lot of people aren't going to do that, even though we all sort of know we need to. I personally have been guilty of using the same password for other services. I probably shouldn't say that on air, but I have been guilty of it. I now use a password manager.
  But the—if you're not going to use a password manager, at the very least, do not use the same password that you use for a simple service that you're only going to sign up for once and use that same password for your banking10 information. At least have a few tiers of security in the passwords you're remembering. Use like a single easy-to-remember password for stuff you're only going to sign up for once, another one for something more secure like email, and something really hard for your online bank.
  But that's not the best solution. It's not even really good solution. But at least it's better than using the same password for everything, which I do know a lot of people do.
  JEFFREY BROWN:Well, Mat, I saw you smiling as he was talking about the passwords and admitting to not always being as fully11 useful of them as any of us should be.
  What was your—what would you add to that about the—you know, it's a very human psychology not to overdo12 the passwords, not to make it too complicated.
  MAT HONAN:Right.
  My password scheme—this is what was interesting. My password scheme was actually pretty complicated. I was using a password manager. I wasn't reusing passwords. And I was able—I was hacked basically by people calling up companies on the phone and calling the tech support department and getting passwords reset13.
  But I think that one of the things that we all—whether you're talking about passwords or turning on extra layers of security in Gmail or Facebook, you always have this tradeoff between security and ease of use.
  And as we continue to give more and more of our information, our financial information, our credit card numbers, our addresses, things like that to Web services that we don't have any control over, I think we're going to have to start understanding and accepting that security is not always going to be easy and it's just a price we're going to have to pay.
  JEFFREY BROWN:Well, so, what do you advise? You guys are in this world. And you're always up on the latest gadgets14. What about the rest of us?
  Mat, starting with you, I mean, what do you advise? What do you tell friends?
  MAT HONAN:One of the main things that I think people should be doing is making local backups of their data regularly.
  I didn't do this. I was guilty of it. And it's why I lost, you know, about a year-and-a-half worth of photos of my daughter. Another thing that I think you should do is to set up a password manager, something like 1Password or LastPass, where you can store all these complex passwords.
  And then there are security solutions that—like Google offers that are called two-step services. Facebook has something similar, where you use a password and your phone. You have to basically get a text message on your phone to log into the site from a new computer.
  JEFFREY BROWN:And, Peter, just our last word from you, because I know you have also looked at the—we haven't talked about the people who are doing the hacking15, but presumably they're staying up on all of this as well to stay a step ahead, right?
  PETER PACHAL:Yes, but so are security companies. Mat mentioned ease of use. And I'm glad he brought that up.
  I mean, there is some stuff that is sort of being introduced now. It's the field of biometrics, which is basically using fingerprints16 and things like your voice as your password.
  Now, there's a lot to be figured out with these technologies, particularly on the back end for I.T. managers.
  But promise is that you would basically use your voice as your password, because if the app can know it's actually you speaking, then the password becomes redundant17. Then you can just throw it away. And it just won't let in anyone else. So, that sort of has a lot of promise. And I hope it actually turns out to basically solve a lot of these issues of inconvenience.
  JEFFREY BROWN:And, Mat, just finish your story here. You were able to restore a good deal of the information?
  MAT HONAN:I got everything back that was stored—ironically, that was stored in the cloud. Everything in the cloud is back. Everything in my Google account, I got back.
  The stuff that was on my hard drive what was remotely wiped, it was remotely deleted, I still have not got back yet. It's at a data recovery place right now.
  JEFFREY BROWN:All right, good lesson for everybody.
  Mat Honan, Peter Pachal, thank you both.
  MAT HONAN:Thank you.
  PETER PACHAL:Happy to be here.

点击收听单词发音收听单词发音  

1 hacked FrgzgZ     
生气
参考例句:
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
2 component epSzv     
n.组成部分,成分,元件;adj.组成的,合成的
参考例句:
  • Each component is carefully checked before assembly.每个零件在装配前都经过仔细检查。
  • Blade and handle are the component parts of a knife.刀身和刀柄是一把刀的组成部分。
3 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
4 digits a2aacbd15b619a9b9e5581a6c33bd2b1     
n.数字( digit的名词复数 );手指,足趾
参考例句:
  • The number 1000 contains four digits. 1000是四位数。 来自《简明英汉词典》
  • The number 410 contains three digits. 数字 410 中包括三个数目字。 来自《现代英汉综合大词典》
5 awareness 4yWzdW     
n.意识,觉悟,懂事,明智
参考例句:
  • There is a general awareness that smoking is harmful.人们普遍认识到吸烟有害健康。
  • Environmental awareness has increased over the years.这些年来人们的环境意识增强了。
6 psychology U0Wze     
n.心理,心理学,心理状态
参考例句:
  • She has a background in child psychology.她受过儿童心理学的教育。
  • He studied philosophy and psychology at Cambridge.他在剑桥大学学习哲学和心理学。
7 catalyst vOVzu     
n.催化剂,造成变化的人或事
参考例句:
  • A catalyst is a substance which speeds up a chemical reaction.催化剂是一种能加速化学反应的物质。
  • The workers'demand for better conditions was a catalyst for social change.工人们要求改善工作条件促进了社会变革。
8 isolate G3Exu     
vt.使孤立,隔离
参考例句:
  • Do not isolate yourself from others.不要把自己孤立起来。
  • We should never isolate ourselves from the masses.我们永远不能脱离群众。
9 random HT9xd     
adj.随机的;任意的;n.偶然的(或随便的)行动
参考例句:
  • The list is arranged in a random order.名单排列不分先后。
  • On random inspection the meat was found to be bad.经抽查,发现肉变质了。
10 banking aySz20     
n.银行业,银行学,金融业
参考例句:
  • John is launching his son on a career in banking.约翰打算让儿子在银行界谋一个新职位。
  • He possesses an extensive knowledge of banking.他具有广博的银行业务知识。
11 fully Gfuzd     
adv.完全地,全部地,彻底地;充分地
参考例句:
  • The doctor asked me to breathe in,then to breathe out fully.医生让我先吸气,然后全部呼出。
  • They soon became fully integrated into the local community.他们很快就完全融入了当地人的圈子。
12 overdo 9maz5o     
vt.把...做得过头,演得过火
参考例句:
  • Do not overdo your privilege of reproving me.不要过分使用责备我的特权。
  • The taxi drivers' association is urging its members,who can work as many hours as they want,not to overdo it.出租车司机协会劝告那些工作时长不受限制的会员不要疲劳驾驶。
13 reset rkHzYJ     
v.重新安排,复位;n.重新放置;重放之物
参考例句:
  • As soon as you arrive at your destination,step out of the aircraft and reset your wristwatch.你一到达目的地,就走出飞机并重新设置手表时间。
  • He is recovering from an operation to reset his arm.他做了一个手臂复位手术,正在恢复。
14 gadgets 7239f3f3f78d7b7d8bbb906e62f300b4     
n.小机械,小器具( gadget的名词复数 )
参考例句:
  • Certainly. The idea is not to have a house full of gadgets. 当然。设想是房屋不再充满小配件。 来自超越目标英语 第4册
  • This meant more gadgets and more experiments. 这意味着要设计出更多的装置,做更多的实验。 来自英汉非文学 - 科学史
15 hacking KrIzgm     
n.非法访问计算机系统和数据库的活动
参考例句:
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
16 fingerprints 9b456c81cc868e5bdf3958245615450b     
n.指纹( fingerprint的名词复数 )v.指纹( fingerprint的第三人称单数 )
参考例句:
  • Everyone's fingerprints are unique. 每个人的指纹都是独一无二的。
  • They wore gloves so as not to leave any fingerprints behind (them). 他们戴着手套,以免留下指纹。 来自《简明英汉词典》
17 redundant Tt2yO     
adj.多余的,过剩的;(食物)丰富的;被解雇的
参考例句:
  • There are too many redundant words in this book.这本书里多余的词太多。
  • Nearly all the redundant worker have been absorbed into other departments.几乎所有冗员,都已调往其他部门任职。
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   黑客
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴