首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2015-06-14
28
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected.
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets(networks of hijacked computers)instead. In the end, the software industry’s interest is in making money from the problem(by selling subscriptions to regular security updates)rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of co-operation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail: it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
Which of the following contains a metaphor?
选项
A、...treats the Internet like a village.
B、...the classic techniques of a con-man.
C、...prey on the credulity of new arrivals.
D、...be brusque with strangers.
答案
B
解析
修辞题。根据试题顺序及选项内容定位至最后三段。倒数第三段第三句指出“If you look beyond thecomputers that lie between a spammer and his mark,you can see all the classic techniques of a con-man:buy this stock,before everyone else does.”,可以看出这里作者把spammer比喻成为con—man,接着分析骗子的伎俩,这是一种暗喻,故[B]为答案。
转载请注明原文地址:https://kaotiyun.com/show/N5OO777K
0
专业英语八级
相关试题推荐
WhichofthefollowingstatementsisINCORRECTaboutMikeScott?
A、TheyhadsomehistorianscomeandtalktoEnglishstudentsaboutlocalhistory.B、Studentscouldchoosetowriteinpairs.C、T
TheProblemsofTakingEnglishCoursesThroughEnglishWhenstudentstakecoursesthroughthemediumofEnglish,theyhaveto
WhichofthefollowingdoesLi-Fimostprobablystandfor?
MyJoyinTeachingandLearningIhavebeenengagedinteachingIntensiveReadingCoursetoPhD【1】ofScienceandTechnology
IntroductiontotheSportsStudiesDepartmentThismini-lecturegivenbytheSportsStudiesDepartmentontheUniversity’sOpen
Itcanbetemptingtohidefromthepeople,placesandtaskswhichmakelifestressful.Byremovingyoufromthesituation,it’s
Tounderstandthemarketingconcept,it’sonlynecessarytounderstandthedifferencebetweenmarketingandselling.Nottooma
Tounderstandthemarketingconcept,it’sonlynecessarytounderstandthedifferencebetweenmarketingandselling.Nottooma
Therearetwomethodsoffighting,theonebylaw,theotherbyforce;thefirstmethodisthatofmen,thesecondofbeasts;an
随机试题
________是劳动力市场的内在机制。()
抗生素治疗牙周病的原则是
安全生产法律法规和规章制度的直接执行者是()。
小明平时自立能力比较强,课堂上回答问题思想活跃,对老师和同学彬彬有礼,与同学们相处融洽。他成长的家庭教养方式最可能是()。
中央提出要对“带病提拔”干部的选拔任用过程实行“倒查”,并依据“倒查”结果追究相关责任人的责任。其中“相关责任人”是指()。①主要领导干部②分管领导干部③人事部门主要领导干部④干部考核组负责人
毛泽东曾在不同场合多次谈到,调查研究由两种方法,一种是走马看花,一种是下马看花。走马看花,不深入,还必须用第二种方法,就是下马看花,过细看花,分析一朵花。毛泽东强调“下马看花”的实际意义在于()。
2005年5月27日,胡锦涛在中央民族工作会议暨第四次全国民族团结进步表彰大会上提出新世纪新阶段民族工作的主题是
从下列叙述中选出5条正确的叙述,并把编号按从小到大次序排列,它们是(51)、(52)、(53)、(54)、(55)。(51)~(55):A.解释程序是接受参数、按照某一样板产生机器语言的计算机程序B.编译程序是把高级语言书写的计算机程序翻
数字波形声音的获取过程中,正确的处理步骤是
在宽带综合业务数据网B-ISDN中,________简化了网络功能。其网络不参与任何数据链路层功能,将差错控制与流量控制工作交给终端去做,它采用异步时分复用方式。
最新回复
(
0
)