Hacking
people tend to think of computers as isolated machines,working away all by themselves.some do-personal computer without an outside link,like someones hideaway (隐蔽的) cabin in the woods.but just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community m local,national and even global network joined by telephone connections.
the computer network is a creation of the electric age,but it is based on old-fashioned trust.it cannot work without trust.a rogue loose (为所欲为的无赖) in a computer system called hacker (黑客) is worse than a thief entering your house.he could go through anyones electronic mail or add to,change,distort or delete anything in the information stored in the computers memory.he could even take control of the entire system by placing his own instructions in the software that runs it.he could shut the computer down whenever he wished,and no one could stop him.then he could program the computer to erase any sign of his ever having been there.
hacking,our electronic-age term for computer break-in,is more and more in the news-brainy kids vandalizing university records,even pranking (胡闹) about in supposedly safeguarded systems.to those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.a potential for disaster is building: a dissatisfied former insurance-company employee wipes out information from payroll (工资表) files.a student sends out a virus,a secret and destructive command,over a national network.the virus copies itself at lightning speed,jamming the entire network thousands of academic,commercial and government computer systems.such disastrous cases have already occurred.now exists the possibility of terrorism by computer.spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic.yet neither business nor government has done enough to toughen its defenses against attack.for one thing,such defenses are expensive; for another,they may interrupt communication the main reason for using computers in the first place.
Artistic investments 投资艺术品就肯定有回报?
Father’s Promise 父亲的承诺
Father’s Present 父亲的礼物
国际英语资讯:Spotlight: Pakistan, U.S. at crossroad following Trumps fresh accusations
研究:每天喝三杯咖啡有益健康
支付宝年度账单挖了个大坑,你也不慎掉进去了吗?
小测验 – 庆祝新年聚会中的常用语
如何高级又委婉地表达“你很蠢”?
为什么我不喜欢别人叫我‘美女’
刘雯入选全球最性感女星!老外的审美终于在线了!
创造历史!两名宇航员完成人类首次全女性太空行走
国内英语资讯:Spotlight: Chinas ivory trade ban offers hope for future of African elephants
Haemophilia breakthrough 血友病治疗方法的重大突破
无聊的工作会议让你神游?永远不要为此感到愧疚
习近平主席2018年新年贺词中的几个典故
国际英语资讯:11 killed, 20 injured in Kabul suicide bombing
美国的房产中介推出神奇新服务:帮你看看是否闹鬼
国内英语资讯:Birth centenary of late senior political advisor commemorated
国际英语资讯:Japanese mayor under fire for threatening to kill reporter
2020东京奥运会:参赛人员将“刷脸”进场
Born in the wrong place for good schools? 在英国想上好学校 要生对地方?
Trail, track and trace 和“追踪、踪迹”有关的三个词
国内英语资讯:Chinese vice premier urges full completion of clearing arrears task
国内英语资讯:China raises snowstorm alert level
国际英语资讯:Norways PM visits Baghdad to boost ties
支付宝给你的2018关键词准吗? 这些词用英语怎么说?
让怀孕的另一半保持愉快的心情
美文赏析:父母才是孩子最大的差距
国内英语资讯:China sees better nursing home services in 2017
给你100万元 你愿意把你的脸卖给机器人吗?
不限 |
英语教案 |
英语课件 |
英语试题 |
不限 |
不限 |
上册 |
下册 |
不限 |