英語(yǔ)聽力 學(xué)英語(yǔ),練聽力,上聽力課堂! 注冊(cè) 登錄
> 在線聽力 > 有聲讀物 > 英語(yǔ)美文 > 晨讀英語(yǔ)美文60篇 >  第56篇

晨讀英語(yǔ)美文60篇56 Hackers: The Enemy on the Internet

所屬教程:晨讀英語(yǔ)美文60篇

瀏覽:

手機(jī)版
掃描二維碼方便學(xué)習(xí)和分享
https://online2.tingclass.net/lesson/shi0529/0008/8648/56.mp3
https://image.tingclass.net/statics/js/2012
Hackers: The Enemy on the Internet

Until comparatively recently the opportunities for criminal activity on the Internet have been low. However, the volume of business done on the Internet is growing rapidly, ad people order books and other products and make money transactions. All this is creating temptations for hackers.

Hackers are often young people who are obsessed by computers. They use them to prowl the Internet, looking for ways to break into computer systems run by banks, telephone companies and even government department. They look for samples of credit cards and try to steal the numbers.

Recently in America, hackers have been caught testing the security system at the Pentagon, headquarters of the American Defense Department. But still the hackers persist often for a dare “because it’s there” although with what success nobody really knows.

Estimates for worldwide sales on the Internet now range between $US 40 billion and $US 90 billion by the end of the year 2000. Much of this is in publishing and software purchases, which require the disclosure of credit card numbers, but there is really no limit to what can be conducted on the Internet.

“You just don’t give your credit card out to anybody,” experts say. “And in the same way that you should regularly change your credit card access number, you can defeat hackers by regularly changing your Internet password. If you don’t ,it’s like leaving the bank vault door wide open.”

When it comes to creating your password, experts recommend including a few punctuation marks and numbers rather than relying on letters in the alphabet. Telecom media communications manager Gien Sowry says that when it comes to security of credit cards, the Internet offers a higher standard than many others whose honesty is taken for granted.

For example, few people think twice about giving a credit card number over the phone and many are equally careless about what happens to the carbon copy when completing a transaction over the counter.

Some customers may inadvertently reveal their passwords to hackers via what is known as a Trojan horse form of virus. ②These are attached to documents or messages being received, and lodge in a computer’s hard drive. Next time the customer logs on to an Internet service provider the virus reveals where it is and the password to anyone who is prowling the Net looking for such information. They can then tap in.

The two ways to defeat such snooping are:

1) to have an up-to-date virus scanner which can recognise the invader and delete it, and

2) constant password changes.

用戶搜索

瘋狂英語(yǔ) 英語(yǔ)語(yǔ)法 新概念英語(yǔ) 走遍美國(guó) 四級(jí)聽力 英語(yǔ)音標(biāo) 英語(yǔ)入門 發(fā)音 美語(yǔ) 四級(jí) 新東方 七年級(jí) 賴世雄 zero是什么意思福州市火巷里教工宿舍英語(yǔ)學(xué)習(xí)交流群

網(wǎng)站推薦

英語(yǔ)翻譯英語(yǔ)應(yīng)急口語(yǔ)8000句聽歌學(xué)英語(yǔ)英語(yǔ)學(xué)習(xí)方法

  • 頻道推薦
  • |
  • 全站推薦
  • 推薦下載
  • 網(wǎng)站推薦