首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2015-06-14
51
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected.
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets(networks of hijacked computers)instead. In the end, the software industry’s interest is in making money from the problem(by selling subscriptions to regular security updates)rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of co-operation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail: it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
We know from the passage that when we receive e-mails, we should
选项
A、recognize the counterfeit websites.
B、watch out for malicious software.
C、be cautious of clicking the link attached.
D、take particularly care of social networks.
答案
C
解析
推断题。按照试题顺序及选项巾的counterfeit定位至第四段。首句为该段主旨句“In any case,thereal problem is not the message,but the link.”,结合倒数第二句“Spam was never about e-mail;it was aboutconvincing us to click.”可以推断,我们要小心点击那些链接,[C]为答案。
转载请注明原文地址:https://www.kaotiyun.com/show/A5OO777K
0
专业英语八级
相关试题推荐
TheProblemsofTakingEnglishCoursesThroughEnglishWhenstudentstakecoursesthroughthemediumofEnglish,theyhaveto
Elementaryandsecondaryeducationis______.
Itcanbetemptingtohidefromthepeople,placesandtaskswhichmakelifestressful.Byremovingyoufromthesituation,it’s
Itcanbetemptingtohidefromthepeople,placesandtaskswhichmakelifestressful.Byremovingyoufromthesituation,it’s
Tounderstandthemarketingconcept,it’sonlynecessarytounderstandthedifferencebetweenmarketingandselling.Nottooma
Tounderstandthemarketingconcept,it’sonlynecessarytounderstandthedifferencebetweenmarketingandselling.Nottooma
Ineducation,Nigeriahasamothertonguepolicywhichrequiresthateverychildistaughtinamothertongueatthepreprimary【
Ineducation,Nigeriahasamothertonguepolicywhichrequiresthateverychildistaughtinamothertongueatthepreprimary【
AtraditionalfoodenjoyedbyAmericansduringThanksgivingDayis______.
破碎的事物就这样印满了重重叠叠的生命的影迹,那么沉厚,那么绰约,却那么美丽。同样,很残忍的,我相信破碎的灵魂才最美丽。我喜欢看人痛哭失声,喜欢听人狂声怒吼,喜欢人酒后失态吐出一些埋在心底发酵的往事。我喜欢素日沉静安然的人喋喋不休地诉说苦难,一向喜
随机试题
A.心悸不安,形寒肢冷B.心悸眩晕,面浮肢肿C.心悸不寐,多梦易醒D.心悸心烦,胸闷泛恶心悸证属心阳不振者,其主症特点是
在进行因果关系推论前必须排除什么联系
有机磷农药是目前使用较多的农药,用于有机磷中毒解救药物有
下列哪些情形成立共同犯罪?()
(2016年)下列各项中,属于注册会计师编制审计工作底稿的目的的有()。
案例:下面为一道物理习题和某同学的解答过程。题目:如图7所示,一质量为m=0.6kg的物体以v0=20m/s的初速度从倾角α=30°的斜坡底端沿斜面向上运动。当物体向上滑到某一位置时,其动能减少了△Ek=18J,机械能减少了△E=3J,不计空气
在古代汉语中,“习”的本义是__________。
披毛犀化石多分布在欧亚大陆北部,我国东北平原、华北平原、西藏等地也偶有发现。披毛犀有一个独特的构造——鼻中隔,简单地说就是鼻子中间的骨头。研究发现,西藏披毛犀化石的鼻中隔只是一块不完全的硬骨,早先在亚洲北部、西伯利亚等地发现的披毛犀化石的鼻中隔要比西藏披毛
在VisualFoxPro中,如果一个表达式包含数值运算、关系运算、逻辑运算和函数时,运算的先后顺序是()。
ManypeoplewonderwhysomemenwanttoliveonthemoonItis【C1】______notthekindofplacewheremostmenwouldchoosetoliv
最新回复
(
0
)