英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

VOA慢速英语2012 Technology Report - Is Your Computer Committing Cybercrimes?

时间:2012-04-10 06:36来源:互联网 提供网友:nan   字体: [ ]
    (单词翻译:双击或拖选)

Technology Report - Is Your Computer Committing Cybercrimes?

科技报道 - 宙斯僵尸网络查封难度与防范办法

This is the VOA Special English Technology Report.
这里是美国之音慢速英语科技报道。
Last week, we told you about efforts by Microsoft Corporation to stop Zeus, one of the most harmful cybercrime operations active today. Zeus hackers1 use a network of infected computers, known as botnets, to steal personal information from computer users.
上周,我们讲述了微软公司在制止最有害的网络犯罪活动之一的宙斯僵尸网络上的努力。宙斯黑客利用被称为僵尸网络的受感染计算机形成的网络,窃取计算机用户的个人信息。
On March twenty-third, officials seized computer servers in two states, Pennsylvania and Illinois. The servers were said to be operating some of the worst known Zeus botnets.
3月23日,有关官员在宾夕法尼亚和伊利诺伊州查获了计算机服务器。这些服务器据称操纵了一些最恶劣的已知宙斯僵尸网络。
Richard Boscovich is with the Digital Crimes Unit at Microsoft. He says the operators of the servers did not know they were linked to cybercrime.
理查德·博斯科维克(Richard Boscovich)就职于微软数字犯罪部门。他表示,服务器运营商并不知道他们和网络犯罪联系到了一起。
RICHARD BOSCOVICH: “The hosting providers in and of themselves are not necessarily in cahoots with the criminals, so to speak. In the room that we walked into there were over ten thousand computers. So their business is simply to host customers.”
博斯科维克:“这些主机托管服务商未必和犯罪分子勾结,可以这么说。我们进去的房间里有超过1万台电脑,所以他们的业务就是简单地为客户提供托管。”
Zeus botnets are positioned all over the world. Mr. Boscovich says they act as command and control centers for the infected computers.
宙斯僵尸网络被放置到世界各地。博斯科维克先生说,它们作为受感染计算机的指挥控制中心。
RICHARD BOSCOVICH: “It’s not just one botnet but probably hundreds of different botnets that come from this particular code base.”
博斯科维克:“它不止是一个僵尸网络,很可能是来自这个特定代码基地的数百个不同的僵尸网络。”
And, he says, the Zeus botnets are not easy to identify.
他还表示,宙斯僵尸网络不易识别。
RICHARD BOSCOVICH: “These command and control centers are constantly moving. So it takes a lot of effort to be able to identify where they were, or where they are and where they are going to be.”
博斯科维克:“这些指挥控制中心不断转移。所以确定它们曾在何处,现在何处,将转移到何处需要很多努力。”
Microsoft says it is studying information gathered from the servers that were seized last month. It hopes to gather more evidence against the unidentified Zeus operators. It also hopes to identify and notify the more than thirteen million computer users that have been infected with the Zeus malware.
微软公司称其正在研究上月查获的服务器上收集到的信息。它希望收集更多针对不明宙斯僵尸网络运营商的证据,也希望确定并通知已经被宙斯恶意软件感染的1300多万个计算机用户。
Mr. Boscovich says there are many things that users can and should do to protect themselves from harmful software programs. At the very least, he says, they should be using legitimate2 software that has been purchased from creditable providers. And he says every computer must have current anti-virus software.
博斯科维克先生表示,为了保护自己免受有害软件程序感染,计算机用户可以采取并应当采取的办法很多。他说,最最基本的,他们应当使用购买自可信供应商的正版软件。他还表示,每台计算机都必须安装现行的杀毒软件。
Most of all, Mr. Boscovich says, computer users must be careful about e-mails.
博斯科维克先生说,最重要的是,计算机用户一定要小心电子邮件。
RICHARD BOSCOVICH: “The bad guys are extremely adept3 at sending emails that appear to be from friends, from family members or from banks or companies, in fact.”
博斯科维克:“这些坏家伙在发送看上去像是来自朋友、家人、银行或公司的电子邮件上非常娴熟。”
Microsoft is not alone in efforts to fight cybercrime. Security experts from CrowdStrike, Dell SecureWorks and other companies took down a large botnet known as Kelihos last month. As quickly as Kelihos was stopped, researchers say cybercriminals began working to build another botnet.
在打击网络犯罪上微软并不孤单。来自 CrowdStrike, Dell SecureWorks及其它公司的安全专家上月摧毁了一个名为Kelihos的大型僵尸网络。研究人员表示,Kelihos一被终止,犯罪分子很快就开始致力于建立另一个僵尸网络。
Also last month, the European Union announced steps to fight the growing problem of cybercrime. They include plans to establish a new cybercrimes center, to be based in The Hague. The center will deal with issues like misuse4 of credit card information, identity theft and the sexual abuse of children online.
同样是在上月,欧盟出台了打击日益严重的网络犯罪问题的措施。这些措施包括筹建一个总部位于海牙的新的打击网络犯罪中心。该中心将处理类似信用卡信息滥用、身份盗用和网上儿童性虐待的问题。
And, that's the VOA Special English Technology Report, written by June Simms. I'm Steve Ember.

点击收听单词发音收听单词发音  

1 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
2 legitimate L9ZzJ     
adj.合法的,合理的,合乎逻辑的;v.使合法
参考例句:
  • Sickness is a legitimate reason for asking for leave.生病是请假的一个正当的理由。
  • That's a perfectly legitimate fear.怀有这种恐惧完全在情理之中。
3 adept EJIyO     
adj.老练的,精通的
参考例句:
  • When it comes to photography,I'm not an adept.要说照相,我不是内行。
  • He was highly adept at avoiding trouble.他十分善于避开麻烦。
4 misuse XEfxx     
n.误用,滥用;vt.误用,滥用
参考例句:
  • It disturbs me profoundly that you so misuse your talents.你如此滥用自己的才能,使我深感不安。
  • He was sacked for computer misuse.他因滥用计算机而被解雇了。
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   VOA慢速英语  Computer  Computer
顶一下
(2)
22.2%
踩一下
(7)
77.8%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴