时间:2019-01-12 作者:英语课 分类:冀教版小学英语(三起)--第三册


英语课

Technology Report - Is Your Computer Committing Cybercrimes?


科技报道 - 宙斯僵尸网络查封难度与防范办法


This is the VOA Special English Technology Report.
这里是美国之音慢速英语科技报道。
Last week, we told you about efforts by Microsoft Corporation to stop Zeus, one of the most harmful cybercrime operations active today. Zeus hackers 1 use a network of infected computers, known as botnets, to steal personal information from computer users.
上周,我们讲述了微软公司在制止最有害的网络犯罪活动之一的宙斯僵尸网络上的努力。宙斯黑客利用被称为僵尸网络的受感染计算机形成的网络,窃取计算机用户的个人信息。
On March twenty-third, officials seized computer servers in two states, Pennsylvania and Illinois. The servers were said to be operating some of the worst known Zeus botnets.
3月23日,有关官员在宾夕法尼亚和伊利诺伊州查获了计算机服务器。这些服务器据称操纵了一些最恶劣的已知宙斯僵尸网络。
Richard Boscovich is with the Digital Crimes Unit at Microsoft. He says the operators of the servers did not know they were linked to cybercrime.
理查德·博斯科维克(Richard Boscovich)就职于微软数字犯罪部门。他表示,服务器运营商并不知道他们和网络犯罪联系到了一起。
RICHARD BOSCOVICH: “The hosting providers in and of themselves are not necessarily in cahoots with the criminals, so to speak. In the room that we walked into there were over ten thousand computers. So their business is simply to host customers.”
博斯科维克:“这些主机托管服务商未必和犯罪分子勾结,可以这么说。我们进去的房间里有超过1万台电脑,所以他们的业务就是简单地为客户提供托管。”
Zeus botnets are positioned all over the world. Mr. Boscovich says they act as command and control centers for the infected computers.
宙斯僵尸网络被放置到世界各地。博斯科维克先生说,它们作为受感染计算机的指挥控制中心。
RICHARD BOSCOVICH: “It’s not just one botnet but probably hundreds of different botnets that come from this particular code base.”
博斯科维克:“它不止是一个僵尸网络,很可能是来自这个特定代码基地的数百个不同的僵尸网络。”
And, he says, the Zeus botnets are not easy to identify.
他还表示,宙斯僵尸网络不易识别。
RICHARD BOSCOVICH: “These command and control centers are constantly moving. So it takes a lot of effort to be able to identify where they were, or where they are and where they are going to be.”
博斯科维克:“这些指挥控制中心不断转移。所以确定它们曾在何处,现在何处,将转移到何处需要很多努力。”
Microsoft says it is studying information gathered from the servers that were seized last month. It hopes to gather more evidence against the unidentified Zeus operators. It also hopes to identify and notify the more than thirteen million computer users that have been infected with the Zeus malware.
微软公司称其正在研究上月查获的服务器上收集到的信息。它希望收集更多针对不明宙斯僵尸网络运营商的证据,也希望确定并通知已经被宙斯恶意软件感染的1300多万个计算机用户。
Mr. Boscovich says there are many things that users can and should do to protect themselves from harmful software programs. At the very least, he says, they should be using legitimate 2 software that has been purchased from creditable providers. And he says every computer must have current anti-virus software.
博斯科维克先生表示,为了保护自己免受有害软件程序感染,计算机用户可以采取并应当采取的办法很多。他说,最最基本的,他们应当使用购买自可信供应商的正版软件。他还表示,每台计算机都必须安装现行的杀毒软件。
Most of all, Mr. Boscovich says, computer users must be careful about e-mails.
博斯科维克先生说,最重要的是,计算机用户一定要小心电子邮件。
RICHARD BOSCOVICH: “The bad guys are extremely adept 3 at sending emails that appear to be from friends, from family members or from banks or companies, in fact.”
博斯科维克:“这些坏家伙在发送看上去像是来自朋友、家人、银行或公司的电子邮件上非常娴熟。”
Microsoft is not alone in efforts to fight cybercrime. Security experts from CrowdStrike, Dell SecureWorks and other companies took down a large botnet known as Kelihos last month. As quickly as Kelihos was stopped, researchers say cybercriminals began working to build another botnet.
在打击网络犯罪上微软并不孤单。来自 CrowdStrike, Dell SecureWorks及其它公司的安全专家上月摧毁了一个名为Kelihos的大型僵尸网络。研究人员表示,Kelihos一被终止,犯罪分子很快就开始致力于建立另一个僵尸网络。
Also last month, the European Union announced steps to fight the growing problem of cybercrime. They include plans to establish a new cybercrimes center, to be based in The Hague. The center will deal with issues like misuse 4 of credit card information, identity theft and the sexual abuse of children online.
同样是在上月,欧盟出台了打击日益严重的网络犯罪问题的措施。这些措施包括筹建一个总部位于海牙的新的打击网络犯罪中心。该中心将处理类似信用卡信息滥用、身份盗用和网上儿童性虐待的问题。
And, that's the VOA Special English Technology Report, written by June Simms. I'm Steve Ember.

n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.合法的,合理的,合乎逻辑的;v.使合法
  • Sickness is a legitimate reason for asking for leave.生病是请假的一个正当的理由。
  • That's a perfectly legitimate fear.怀有这种恐惧完全在情理之中。
adj.老练的,精通的
  • When it comes to photography,I'm not an adept.要说照相,我不是内行。
  • He was highly adept at avoiding trouble.他十分善于避开麻烦。
n.误用,滥用;vt.误用,滥用
  • It disturbs me profoundly that you so misuse your talents.你如此滥用自己的才能,使我深感不安。
  • He was sacked for computer misuse.他因滥用计算机而被解雇了。
学英语单词
adjustment column
afaint
AFOLs
alkyl arsine sulfide
anoyful
artesian pressure
back-shunt keying
bare weight
board chart
boiler load factor
castle-buildings
Cayratia timoriensis
CGP-42344
chalcedons
chickenhouse
child safety order
Constanta
core-periphery theory
critical point of declination
cultural negotiation
cuntery
Cururupu
digiprolactone
direct-mapped
distinguishable configuration
double-pole
dwarf phlox
edgrowth
encaustic tile
engine wear
Epidermophyton interdigitale
exception highlighting
final segment
frontlighting
future system
gain the majority
genus trichosuruss
get sb's shirt off
glass screen
glebe houses
glue joint failure
goodchuck
have not a dry thread on one
hydrogenate
i-swowen
ill luck
initial control
integrated disc adapter
ionizabillty
jacobsville
kallmann's syndrome
laceration of canaliculus
Lady with the Lamp
landdrost
lawryr
load in tension
logarithmic divergence
lubrication station
lunar satellite
lymphotoxin cross test
madagascan
mahnaz
marrow spoon
millions of instructions per second (mips)
nanoacre
nematode
neounitarian theory of hematopoiesis
nerita helicinoides tristis
normal weighing
ochracea
passivation technology
petrographies
pneumatic conveyor system
producer gas tar pitch
pseudodisaccharide
pulling into
raft culture
rail steel
rhamnus purshiana
ring expansion
root access
rule-follower
sauter diameter
saw red
seaside park
short-legged aircraft
slab formwork
slotted lever
spread footing
stenosal accentuated
stockless anchor
student-teacher ratio
target servicing
TCTL (transistor-coupled transistor logic)
Testudinata
twin-frame mill
unity
usurpation of a franchise
vector statement generation
X-ray image receptor
yelpy
zocor