首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
admin
2010-06-30
87
问题
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn’t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today’s hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.
The underlined word "hacker" (Para. 1) most probably means "______".
选项
A、highly recognisable names behind many of the computer technologies used today
B、the negative connotation of those computer users
C、a game, employing the tools that are readily available via the Internet
D、People who break into computer systems
答案
D
解析
黑客指的是计算机和网络科技的专家,可以进入计算机系统,所以D是正确答案。
转载请注明原文地址:https://www.kaotiyun.com/show/UEJd777K
本试题收录于:
公共英语四级笔试题库公共英语(PETS)分类
0
公共英语四级笔试
公共英语(PETS)
相关试题推荐
Youmaysaythatthebusinessofmarkingbooksisgoingtoslowdownyourreading.【C1】______probablywill.That’soneofthe【C2】
Youmaysaythatthebusinessofmarkingbooksisgoingtoslowdownyourreading.【C1】______probablywill.That’soneofthe【C2】
Accordingtothespeaker,whatareconveniencegoods?
At18,AshanthiDeSilvaofsuburbanClevelandisalivingsymbolofoneofthegreatintellectualachievementsofthe20thcentu
"Themoregadgetsthereare,the【C1】______thingsseemtoget."saidHonoreErvin,co-authorofTheEtiquetteGirls:ThingsYou
YouwillhearaninterviewwithGailJarvis,headofAustralianBroadcastingCorporation(ABC)abouttheTVseriesQuantum.Asyou
ToproducetheupheavalintheUnitedStatesthatchangedandmodernizedthedomainofhighereducationfromthemid-1860’sto
ToproducetheupheavalintheUnitedStatesthatchangedandmodernizedthedomainofhighereducationfromthemid-1860’sto
Inpopulardiscussionsofemissions-rightstradingsystems,itiscommontomistakethesmokestacksforthetrees.Forexample,
Inpopulardiscussionsofemissions-rightstradingsystems,itiscommontomistakethesmokestacksforthetrees.Forexample,
随机试题
在电压负反馈调速系统中加入电流正反馈的作用是利用电流的增加,从而使转速(),机械特性变硬。
简述国际技术市场的作用。
男性,40岁,乘坐公共汽车时右腿搁在左大腿上,突遇车祸。向前冲撞倒地,右髋疼痛,活动障碍。查体:右下肢短缩,呈屈曲内收、内旋畸形。其诊断首先应考虑
患者右上中切牙扭转近90度角,且伴有唇侧倾泻,牙髓正常,牙根长、粗大,牙槽骨轻度吸收,牙龈红肿,探易出血。桩核切端应为金瓷冠留出的间隙为()
如图6-49所示,两根完全相同的长管道,只是安装高度不同,两管的流量关系为()。
会计监督体系包括政府监督和社会监督两个层次。()
李老师中途接手小学五年级(2)班的班主任工作,有几个学生经常缺席冬季长跑。经过了解,发现只要天气冷一些,这几名同学就找各种借口不参加长跑。不仅如此,在各项活动中也有一些同学叫苦叫累。如果你是班主任的话,可在全班进行()。
下列典故或成语与哲学论断对应错误的是:
2000年、2005年、2006年发达国家、发展中国家和世界总体的国际储备(不包括黄金)和黄金储备变化情况。如图所示:假设黄金价格为500美元/盎司,那么表中各年黄金储备量均超过相应年份国际储备量的国家有多少个?
Whatisthewomangoingtobuy?
最新回复
(
0
)