首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
【F1】Internet users used to comfort themselves by thinking that to become victims of the pirates of the Web, they had to frequent
【F1】Internet users used to comfort themselves by thinking that to become victims of the pirates of the Web, they had to frequent
admin
2015-09-30
133
问题
【F1】
Internet users used to comfort themselves by thinking that to become victims of the pirates of the Web, they had to frequent the online porn circuit or respond to an e-mail from the widowed wife of the former central bank governor of Nigeria.
The idea was that one had to do something naughty to get caught in the wrongdoers’ net, or at least go for a late-night stroll in the rough end of town.
But the conceit has become untenable. Two years ago, engineers at Google reported that about 10 percent of millions of Web pages they analyzed engaged in "drive-by downloads" of malware. Google today has about 330,000 Web sites listed as malicious, up from about 150,000 a year ago.
【F2】
Earlier this month, the Justice Department charged a 28-year-old from Miami and a couple of Russians with stealing 130 million credit card numbers from one of the largest payment processing companies in the world, which should know how to protect its computers from hackers.
And last week, McAfee, the maker of antivirus software, reported that fans searching for Hollywood gossip and memorabilia faced a high risk of getting caught up by online bad guys.
【F3】
Searching for the actress Jessica Biel, who won an achievement award at the Newport Beach Film Festival in 2006 and ranked in third place on Maxim magazine’s Hot 100 list last year, is most dangerous, with a 1 in 5 chance of landing at a Web site that tested positive for spyware, adware, spam, phishing, viruses or other noxious stuff.
【F4】
Perhaps cybercops will respond more aggressively to Internet threats as they spread to the more wholesome parts of the Web, like police forces that leave crime alone in the poor parts of town but snap into action when it seeps into middle-class neighborhoods.
McAfee, to no one’s surprise, suggests that we buy McAfee software.
But with more and more information about people’s credit cards, browsing histories and identities sloshing around online, I wonder whether this will do. A few months ago, I nervously created my first Facebook page with the minimum necessary information to view pictures posted by old friends.
I returned to the page a few days later to discover that somehow it had found out both the name of my college and my graduation class, displaying them under my name. I have not returned since.【F5】
In the back of my mind, I fear a 28-year-old hacker and a couple of Russians have gathered two more facts about me that 1 would rather they didn’t have.
And it’s way too late to take my life offline.
【F3】
选项
答案
女演员杰西卡·贝尔在2006年纽波特比奇电影节上荣获成就奖,在去年《马克西姆》杂志评选的100名最热辣女郎中名列第三。上网搜索杰西卡·贝尔的信息最为危险,有五分之一的可能性会登录到一家含间谍软件、恶意广告软件、垃圾邮件、网络钓鱼、病毒或其他有害软件的网站。
解析
转载请注明原文地址:https://kaotiyun.com/show/KxzZ777K
0
考研英语一
相关试题推荐
Cultureisactivityofthought,andreceptivenesstobeautyandhumanefeeling.【C1】______ofinformationhavenothingtodowith
TheteachingofEnglishasasecondlanguage(ESL)inschoolshashadahistoryofconflictingarguments,interestinginnovation
Thefollowingparagraphsaregiveninawrongorder.ForQuestions41-45,youarerequiredtoreorganizetheseparagraphsintoa
Youaregoingtoreadatextabouttheapproachestocreatingchampionship,followedbyalistofexamples.Choosethebestexam
Youaregoingtoreadatextabouttheapproachestocreatingchampionship,followedbyalistofexamples.Choosethebestexam
ReduceWaste-FoodExpertsinthefoodindustryarethinkingalotabouttrashthesedays.Restaurants,colleges,hospitalsa
A"LOSTTRIBE"thatreachedAmericafromAustraliamayhavebeen.thefirstNativeAmericans,accordingtoanewtheory.(46
Manyteachersbelievethattheresponsibilitiesforlearningliewiththestudent.(1)_____alongreadingassignmentisgiven,
EveryyearLesWexner,theownerofVictoria’sSecret,alingerie(女士内衣)retailer,takesamonthofftotraveltheworldlookingf
In2001,asecretmeetingofleadingIsraeliarchaeologistsareshownaremarkableartifact.It’sastonetablet,apparentlyfro
随机试题
Wehaveallhadtoworkanddothings【C1】________.Usually,somechirpy(活泼)personwouldtellustobemoreenthusiastic."You
卫生湿巾的卫生要求是
不属于十二指肠分部的是
适用于能随水蒸气蒸馏而不被破坏、具有挥发性的,且难溶或不溶于水的化学成分的提取的是()。
出现下列哪些情况,审批机关应作出不予批准设立外资企业的决定?()
保险商品是一种有形的、非渴求的特殊商品。()
第一审行政案件,均由基层人民法院管辖。()
甲于某日早晨在垃圾箱里边捡回一名弃婴,抚养3个月后,声称是自己的亲生儿子,以3000元卖给乙,甲的行为构成()。
E-mail营销与垃圾邮件的本质区别是_____________。
最大化激活窗口的宏命令是()。
最新回复
(
0
)