首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2012-12-30
77
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected .
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead. In the end, the software industry’s interest is in making money from the problem (by selling subscriptions to regular security updates) rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of cooperation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail; it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
Which of the following contains a metaphor?
选项
A、...treats the Internet like a village.
B、...the classic techniques of a con-man.
C、...prey on the credulity of new arrivals.
D、...be brusque with strangers.
答案
B
解析
修辞题。根据试题顺序及选项内容定位至最后三段。倒数第三段第三句指出“If you look beyond the computers that lie between a spammer and his mark,you can see all the classic techniques of a con-man:buy this stock,before everyone else does.”,可以看出这里作者把spammer比喻成为con-man,接着分析骗子的伎俩,这是一种暗喻,故[B]为答案。
转载请注明原文地址:https://kaotiyun.com/show/NtaO777K
0
专业英语八级
相关试题推荐
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdetail
Rabiesisanordinarilyinfectiousdiseaseofthecentralnervoussystem,causedbyavirusand,asarule,spreadchieflybydo
HowtoConquerPublicSpeakingFearⅠ.IntroductionA.Publicspeaking—acommonsourceofstressforeveryoneB.Thetru
WhichgroupofpeoplecanNOTvoteintheBritishgeneralelection?
Accordingtolegend,Aesculapiusboretwodaughters,PanaceaandHyegeia,whogaverisetodynastiesofhealersandhygienists.
Meteorologistsroutinelytelluswhatnextweek’sweatherislikelytohe,andclimatescientistsdiscusswhatmighthappenin1
Meteorologistsroutinelytelluswhatnextweek’sweatherislikelytohe,andclimatescientistsdiscusswhatmighthappenin1
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdeta
A、TheTalebancommanderwaskilledinaU.S.-ledcoalitionoperation.B、Manyofjournalistshadinterviewedtheone-leggedTaleb
随机试题
法庭在审理被告人某甲入室盗窃案的过程中发现,某甲在实施犯罪过程中,为逃避抓捕曾以暴力伤害被害人。关于法院的做法,下列哪一选项是正确的?(卷二真题试卷第31题)
对多发性骨髓瘤诊断具有决定性意义的检查是
某城市每逢冬季,常有大雾、无风天气,空气质量恶化,城区经常连续多日烟雾弥漫对此污染最敏感的人群是
移动通信基站的防雷要求有()。
某地拟新建总长142km的铁路干线。全程有特大桥6座,总长6891m;大中桥66座,总长16468m;三线大桥7座,总长2614m;涵洞302座,总长8274m;隧道45座,总长18450m,其中长度大于1000m的隧道6座,长度小于1000m的隧道37座
采用企业施工定额通过施工预算的编制而形成的成本计划是()。
对企业消费税应税消费品销售数量检查的内容包括()。
(2005年考试真题)不同法的形式具有不同的效力等级。下列各项中,效力低于地方性法规的是()。
小张为了验证延迟满足实验,将6位幼儿分成三组,分别带入情境不同的实验室内,并在室外通过单向可视玻璃进行观察。这种观察是
以法治价值和法治精神为导向,运用法律原则、法律规则、法律方法思考和处理问题的思维模式是
最新回复
(
0
)