首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
admin
2010-06-30
43
问题
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn’t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today’s hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.
Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
选项
A、They are all good examples of today’s computer users.
B、They are driven by greed, power, revenge, or some other malicious intent.
C、Their goal is to push programs beyond what they are designed to do.
D、They are all dead.
答案
C
解析
本题的相关信息在文章的第一段。Steve Wozniak,Bill Gates and Linus Torvalds都是一些早期的著名黑客,不同于现今的黑客,他们都是处于好奇,勇于挑战计算机和网络科技的漏洞,并以此推动计算机和网络科技的进步。
转载请注明原文地址:https://kaotiyun.com/show/TEJd777K
本试题收录于:
公共英语四级笔试题库公共英语(PETS)分类
0
公共英语四级笔试
公共英语(PETS)
相关试题推荐
Youmaysaythatthebusinessofmarkingbooksisgoingtoslowdownyourreading.【C1】______probablywill.That’soneofthe【C2】
Whatisthispassagemainlyabout?
Forachild,happinesshasamagicalnature.Iremembermakinghide-outsinnewly-cuthay,playingcopsandrobbersinthewoods
At18,AshanthiDeSilvaofsuburbanClevelandisalivingsymbolofoneofthegreatintellectualachievementsofthe20thcentu
Overthepastfewyears,flyingincoachhasbecomeanincreasinglymiserableexperience.Legroomispracticallynonexistent.Pa
Overthepastfewyears,flyingincoachhasbecomeanincreasinglymiserableexperience.Legroomispracticallynonexistent.Pa
Carmakershavelongusedsextoselltheirproducts.Recently,however,bothBMWandRenaulthavebasedtheirlatestEuropeanm
Almostdaily,thegulfbetweeneducationandemploymentwidens.Careersofficerscomplainaboutasystemthatpresentsthemwith
Mostpublishingisnow"electronic"inthesensethatbooks,magazinesandnewspapersarepreparedoncomputers,andexistasco
WhatisNOTtrueaboutthefirstOlympics?
随机试题
补体法荧光抗体技术是将荧光素标记在
计算机病毒是指
维持蛋白质二级结构稳定的主要因素是
一束自然光从空气射到玻璃板表面上,当折射角为30°的反射光为完全偏振光,则此玻璃的折射率为()。
希望股份有限公司在中期期末和年度终了时,按单项投资计提短期投资跌价准备,在出售时同时结转跌价准备。2005年6月10日以每股15元的价格(其中包含已宣告但尚未发放的现金股利0.4万元)购进某股票100万股进行短期投资;6月30日该股票价格下跌到每股12元;
窗花的制作工艺主要包括()
人类珍贵的文化传统,绵延久远,力道强劲,就像是这个世界上永恒的生命。它以很长的周期、有时甚至长过某代人一生的频度在_________着。它不会_________,即使有时候看不到了,也还在地底下扎着根、生长着.伺机而发。填入划横线部分最恰当的一项是:
个人品德在社会道德建设中具有基础作用,社会公德、职业道德和家庭美德建设,最终都要落实到个人品德的养成上。在现实生活中,个人品德的作用还表现为
下列程序中的this指针的作用是【 】。#include<iostream.h>classSample{intn;staticintst;
Asmostparentsofsmallchildrenwillreluctantlyadmit,nothingcanoccupyachildquiteliketelevision.Unfortunately,thes
最新回复
(
0
)