-
(单词翻译:双击或拖选)
Unit 9
Computer Technology
In-Class Reading
Hackers3, Crackers4 and Trackers
1 Coursing through arteries5, replicating6 along the way, edging into new sites to wreak7 havoc8, the virus at first seemed like any other virus that eventually would be defeated by the host's defense9 mechanisms10. This, however, was a new, more powerful virus, and it would take advantage of the system's weaknesses, infecting and reinfecting as it traveled through the host.
2 The "Internet Worm", as the virus came to be known, worked its way into thousands of computers connected to the national information infrastructure11. Created by Cornell University student Robert Morris, it infected more than 6,000 systems, jamming hard drives and erasing12 valuable information before being eliminated in November 1988 by engineers at the University of California at Berkeley and at Purdue University in West Lafayette, Indiana.
3 That was the first time the Internet and the destructive aims of certain computer experts made the national news. It wouldn't be the last. The Internet is just as susceptible13 to abuse as any other form of computer technology. The only difference is that the malicious14 attack comes through telephone lines and across network connections. Computer vandals can break into any system. Whether it is transportation, finance or defense, no system is 100-percent safe. There will always be individuals who, for one reason or another, are eager to discover the weak spot in order to penetrate15 the system.
4 Who are these individuals and what do they want? Generally, people who break into computer systems are called "hackers". Irrespective of their aims, they tend to inspire a certain admiration16 because they are extremely clever and infinitely17 more knowledgeable18 than the average computer user. Breaking into computer systems--whether it is on the Internet, in a bank or a government office--is an illegal activity. However, "ordinary" hackers who penetrate and explore systems just for the intellectual challenge are regarded as less dangerous than "crackers". The latter are people who break into systems in order to steal or to destroy information. They also can remove money from accounts, as Russian "crackers" demonstrated when they stole $10 million from Citibank's cash-management system in 1994. In fact, some experts estimate that the U.S. economy loses between $2 and $4 billion annually19 to computer vandals.
5 The increasing number of hackers and crackers has forced police departments to create computer crimes squads21. These law enforcement experts who watch all these illegal activities are known as "trackers". According to a member of the new Computer Crimes Squad20 in San Francisco, the FBI does not want to needlessly harass22 the harmless hacker2, but it has a duty to catch the bad ones. No society that depends heavily on computer systems can afford to ignore either the potential dangers of hacking23 or the moral issues that hacking has raised.
6 Do hackers regard themselves as criminals? Probably not. But they do make a distinction between "good" and "bad" hacking. Take, for example, the case of Ian, a 16-year-old hacker. He admits quite proudly that he knows how to defeat the registration24 process to get into systems which he enjoys doing just for the fun of it. Nevertheless, he prefers breaking into software programs rather than systems because there is less chance of being prosecuted26. Ian never hacks27 for profit although he knows some who do work for money and even just for the fun of causing someone else headaches. Like many members of the hacker community, he does not feel morally obliged to turn "bad" hackers over to the authorities.
7 Jeff, a 27-year-old hacker, has a different point of view. He feels, on the contrary, that hackers do have the moral responsibility to report "crackers". He admits that he stopped being a "bad" hacker because he didn't want to go to jail. He now works for a computer security company. In other words, he sells his skills as a hacker to a company that repairs flaws in systems to prevent break-ins by hackers of all kinds. However, in his spare time Jeff still continues his activities as a hacker because he considers it a way to expand his knowledge.
8 Jeff's situation raises an interesting debate among computer and information executives, both in government and private enterprise: What can you do with a hacker or what can a hacker do for you? It seems obvious that a person capable of breaking into a system would also be capable of helping28 repair the flaws in a system. But should hackers be allowed to continue penetrating29 systems after they have been hired by the computer industry? Hacking is, after all, an illegal activity.
9 Because computer vandals can cause real damage, Congress is taking a serious look at the security of computer systems and ways to deter30 intrusions by both "good" and "bad" hackers. Many public officials consider the issue of hacking one of the most important issues that government, and society as a whole, face today. However, progress has been slow because many intrusions go unreported by private and public sector31 organizations for fear of publicity32. When a break-in occurs, companies and governmental departments are extremely reluctant to admit that their files have been stolen, damaged or destroyed. By admitting their vulnerability, they would undermine the confidence of the public.
10 Despite the potential danger of hackers, most computer security experts feel that people should not be afraid to use the Internet. It is a technology that, when used properly, can yield untold33 benefits. The Internet allows scientists to share data, it helps students research history, and it allows journalists to report the news.
11 In the final analysis, America needs the Internet and the hackers that come with it. If no one exposes the vulnerabilities, they never get solved. So at least in one way hackers, the non-malicious ones, help us. (953 words)
Time taken: _______ minutes
Proper Names
Berkeley
(地名)伯克利(美国加利福尼亚州西部城市)
California
(地名)加利福尼亚(美国州名)
Citibank
(美国)花旗银行
FBI Federal Bureau of Investigation34
(美国)联邦调查局(简称)
Ian
(男子名)伊恩
Indiana
(地名)印第安纳(美国州名)
San Francisco
(地名)旧金山(美国加利福尼亚州西部港口城市)
West Lafayette
(地名)西拉斐特(美国印第安纳州西部城市)
New Words
artery35
n.
1) a main road, railway line, river, etc. 干线,要道
e.g. I heard on the radio that all the main arteries leading into London are blocked with traffic.
2) one of the thick vessels36 that carry blood from the heart to other parts of the body 动脉
e.g. The arteries leading to the brain are on both sides of the neck.
Congress
n. the group of people elected to make laws in the US, consisting of the Senate and the House of Representatives 美国国会
e.g. The US Congress set forth37 the annual budget.
debate
n. a discussion or argument on a subject that people have different opinions about 辩论,讨论
e.g. I) There's a debate in the meeting room about next year's budget
II) Whether he will be on time is open to debate.
deter
v. prevent, hinder 阻止,制止,防止
e.g. These measures are designed to deter an enemy attack.
enforcement*
n. an action of making people obey a rule or law, imposing38实施,执行
e.g. I) There should be heavy penalties and strict enforcement for those who sell cigarettes to children.
II) The courts vowed39 stern (严格的) enforcement of all laws and regulations.
hack1
v. (informal) get into someone else's computer system without permission in order to find out information or do something illegal 私自存取他人计算机系统中的资料
havoc
n. a situation in which there is a lot of confusion or damage 混乱,大破坏
infinitely*
adv. (especially with comparatives) very much 远,甚
e.g. I) Living in the country is infinitely preferable to living in London.
II) Once we understand this, we may take a different view of the belief that all humans are somehow infinitely more valuable than any animal.
infrastructure
n. the basic structure on which an organization or system is built and which makes it able to work 基础结构,基础设施
irrespective
adj. without considering, regardless 不考虑的,不顾及的
e.g. I) Irrespective of where you decide to turn to for help and support, it is important that you do not delay.
II) Irrespective of his strange way of talking, he's an excellent worker.
malicious
adj. showing a desire to harm or hurt someone 恶意的
non-malicious
adj. not wishing to hurt or harm others 无恶意的
prosecute25
v. bring a criminal charge against someone in a court of law 对......提出公诉,告发,检举
e.g. I) The store prosecuted John for shoplifting.
II) If you don't pay those bills soon we'll be forced to prosecute.
registration *
n. the act of having one's name or something else written in a list or record 登记,注册
e.g. You can't attend the conference until you have completed your registration form.
reinfect *
v. give someone a disease again, infect again 再传染
e.g. His bandage came off and his wound got reinfected.
replicate40
v. make a copy of something 复制,自我复制
software
n. the instructions which control what a computer does, computer programs 软件
e.g. I) Mary loaded some accounting41 software onto her computer.
II) A new software package (软件包) is now on the market which controls traffic flow in cities.
tracker *
n. a person who follows someone or something by means of footprints, marks, etc. 追踪者
e.g. The trackers tried to find when and how the thieves broke into the bank's computer system.
untold *
adj. too much or too many to be measured 无数的,巨大的
e.g. I) The millionaire had made untold riches by selling oil.
II) Words alone do not convey the untold misery42 endured by people in these refugee camps.
user
n. someone who uses something 使用者,用户
e.g. I) The social worker convinced the drug user to seek help.
II) This manual was written to aid new users of this appliance.
vandal
n. someone who damages public or private property on purpose 故意破坏他人或公共财产者
wreak
v. (past tense and past participle wreaked43, also wrought) cause something to happen in a violent and often uncontrolled way 造成(破坏等)
Phrases and Expressions
for fear of/that
because of anxiety about/that, in case (of) 惟恐,以免
e.g. I) They did not mention it for fear of offending him.
II) They wouldn't let their cat run around outside for fear that it would get run over by a car.
in the final/last analysis
after everything has been considered 归根结底,说到底
e.g. I) They realized that in the last analysis their job was to tell the public the facts.
II) In the final analysis, political independence and economic independence are inseparable.
irrespective of
without considering 不顾或不考虑
e.g. All pupils, irrespective of age, are invited to join the club.
public sector
the part of an economy that is controlled by the state 政府控制的企业
turn someone over to someone
bring a criminal to the police or other official organization 把某人移交给
e.g. The thief was turned over to the police.
wreak havoc
do violence (destruction, punishment, etc.) (对......)造成严重破坏
e.g. The hurricane wreaked havoc on the coastal44 area.
1 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
2 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
3 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
4 crackers | |
adj.精神错乱的,癫狂的n.爆竹( cracker的名词复数 );薄脆饼干;(认为)十分愉快的事;迷人的姑娘 | |
参考例句: |
|
|
5 arteries | |
n.动脉( artery的名词复数 );干线,要道 | |
参考例句: |
|
|
6 replicating | |
复制( replicate的现在分词 ); 重复; 再造; 再生 | |
参考例句: |
|
|
7 wreak | |
v.发泄;报复 | |
参考例句: |
|
|
8 havoc | |
n.大破坏,浩劫,大混乱,大杂乱 | |
参考例句: |
|
|
9 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
10 mechanisms | |
n.机械( mechanism的名词复数 );机械装置;[生物学] 机制;机械作用 | |
参考例句: |
|
|
11 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
12 erasing | |
v.擦掉( erase的现在分词 );抹去;清除 | |
参考例句: |
|
|
13 susceptible | |
adj.过敏的,敏感的;易动感情的,易受感动的 | |
参考例句: |
|
|
14 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
15 penetrate | |
v.透(渗)入;刺入,刺穿;洞察,了解 | |
参考例句: |
|
|
16 admiration | |
n.钦佩,赞美,羡慕 | |
参考例句: |
|
|
17 infinitely | |
adv.无限地,无穷地 | |
参考例句: |
|
|
18 knowledgeable | |
adj.知识渊博的;有见识的 | |
参考例句: |
|
|
19 annually | |
adv.一年一次,每年 | |
参考例句: |
|
|
20 squad | |
n.班,小队,小团体;vt.把…编成班或小组 | |
参考例句: |
|
|
21 squads | |
n.(军队中的)班( squad的名词复数 );(暗杀)小组;体育运动的运动(代表)队;(对付某类犯罪活动的)警察队伍 | |
参考例句: |
|
|
22 harass | |
vt.使烦恼,折磨,骚扰 | |
参考例句: |
|
|
23 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
24 registration | |
n.登记,注册,挂号 | |
参考例句: |
|
|
25 prosecute | |
vt.告发;进行;vi.告发,起诉,作检察官 | |
参考例句: |
|
|
26 prosecuted | |
a.被起诉的 | |
参考例句: |
|
|
27 hacks | |
黑客 | |
参考例句: |
|
|
28 helping | |
n.食物的一份&adj.帮助人的,辅助的 | |
参考例句: |
|
|
29 penetrating | |
adj.(声音)响亮的,尖锐的adj.(气味)刺激的adj.(思想)敏锐的,有洞察力的 | |
参考例句: |
|
|
30 deter | |
vt.阻止,使不敢,吓住 | |
参考例句: |
|
|
31 sector | |
n.部门,部分;防御地段,防区;扇形 | |
参考例句: |
|
|
32 publicity | |
n.众所周知,闻名;宣传,广告 | |
参考例句: |
|
|
33 untold | |
adj.数不清的,无数的 | |
参考例句: |
|
|
34 investigation | |
n.调查,调查研究 | |
参考例句: |
|
|
35 artery | |
n.干线,要道;动脉 | |
参考例句: |
|
|
36 vessels | |
n.血管( vessel的名词复数 );船;容器;(具有特殊品质或接受特殊品质的)人 | |
参考例句: |
|
|
37 forth | |
adv.向前;向外,往外 | |
参考例句: |
|
|
38 imposing | |
adj.使人难忘的,壮丽的,堂皇的,雄伟的 | |
参考例句: |
|
|
39 vowed | |
起誓,发誓(vow的过去式与过去分词形式) | |
参考例句: |
|
|
40 replicate | |
v.折叠,复制,模写;n.同样的样品;adj.转折的 | |
参考例句: |
|
|
41 accounting | |
n.会计,会计学,借贷对照表 | |
参考例句: |
|
|
42 misery | |
n.痛苦,苦恼,苦难;悲惨的境遇,贫苦 | |
参考例句: |
|
|
43 wreaked | |
诉诸(武力),施行(暴力),发(脾气)( wreak的过去式和过去分词 ) | |
参考例句: |
|
|
44 coastal | |
adj.海岸的,沿海的,沿岸的 | |
参考例句: |
|
|