首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
To reduce spam mails, which of the following is NOT suggested by David?
To reduce spam mails, which of the following is NOT suggested by David?
admin
2014-08-13
45
问题
To reduce spam mails, which of the following is NOT suggested by David?
W: Good evening. My name is Jenny Fowler and I would like to welcome all our listeners to Net News, your weekly program dealing with all matters online. Tonight we are fortunate to be joined by David Akris, head of the Internet security company WebLock. David, welcome to Net News.
M: Good evening Jenny.
W: Right, what I would really like to know first from you David is this: how on earth can I reduce the amount of spam mail I find every morning in my inbox? I think things are getting absolutely ridiculous. I mean, this morning there must have been about 30 to 40 e-mails covering everything from having won the lottery to purchasing things I would rather not mention on this show. What can a normal e-mail user such as myself do to combat this ever-growing problem?
M: Now there are a couple of strategies that we can employ to reduce this admittedly annoying problem. First of all, you have to be really guarded about where you leave your e-mail address. Of course, you give it to all your friends and you give it to contacts you have through your workplace, although I would also add as a strong recommendation that you have separate personal and work e-mail accounts. But what you must not do is to navigate around the Internet leaving your e-mail address for everyone to find. Because, believe me, there is no shortage of unscrupulous individuals out there who will harvest your e-mail address among the thousands of others either for their own personal gain or to sell to third parties.
W: Wow, I didn’t realize it was so simple.
M: It’s actually worse than that. There are little software programs called "spiders" that trawl around the Internet on their own looking for e-mail addresses, so your e-mail address, left innocently on that cookery message board, doesn’t even need to be seen by human eyes to be gathered. If any of your listeners are using what we call throwaway e-mail addresses, you know, provided by companies such as Yahoo or Hotmail, then I would recommend creating a new e-mail account and starting over.
W: That sounds like worthwhile advice, David. You have spoken to us about how we can prevent our e-mail address falling into the wrong hands. What can we do to alleviate the spam problem if this has already occurred, beyond creating a new account, which may not be practical for all of our listeners? Is there anything we can do to fight back against the spammers?
M: Sure. There are a variety of handy antispam tools out there on the market. Your ISP, that is, your Internet service provider, will most likely have one of the main antispam filters active on all their users’ accounts.
W: Hmmm, tell me about these filters. I think I need to get one.
M: Without going into too much technical detail, spam filter software will analyze all incoming messages and flag, divert or delete e-mails that it considers to be spam. This may be because the message contains certain words—I think we all know what types of words I’m talking about here. Or the e-mail may have other qualities which mark it out to be spam in all likelihood, such as large blue or red font, lack of return address, too much capitalization and a whole list of other considerations.
W: But doesn’t that mean we have to ask our friends never to write e-mails to us in blue? I would be very concerned about legitimate e-mails being deleted...
M: Oh, absolutely! An antispam filter will only flag an e-mail message as spam if several of these factors are found to be present in a particular message. If your friends choose to write to you in blue, but the message is otherwise perfectly normal, it will not be considered spam. These filters are great because users are often given control over the sensitivity level, but that’s not true if you use one of the huge national ISPs such as AOL.
W: We now move on to an issue we mentioned at the beginning of the program—phishing. What is it and how can we best protect ourselves from it?
M: First of all, we should explain that even though the pronunciation is the same, this variety of phishing is spelt with a "PH" and not an "F". Right, phishing is quite a recent phenomenon but can be very damaging if users are not very aware of the dangers that exist. If you get an e-mail that claims to be from, let’s say, your bank and asks you to click on a link, visit a site and enter information such as your account number, password, or username, you can be certain that you have been a victim of phishing.
W: David, it’s been very informative to have you here speaking to us today. A little understanding of these issues can help us to see the world of e-mail and the Internet isn’t so sinister after all. Please come back and see us soon, won’t you?
M: I’d be delighted. Thanks very much for inviting me to speak to your listeners.
选项
A、blue font.
B、no return address.
C、excessive capitalization.
D、obscene content.
答案
A
解析
在谈到filters时,男士提到含有以下几种内容的电邮可能会被过滤掉:包含某些大家心照不宣的敏感词语、红色或蓝色的大字体、没有回信地址、太多的大写字母等,B、C、D内容正确。此外,男士还进一步提到,即使用蓝色字体,但内容正常,是不会被当成垃圾邮件过滤掉的,A错误,为答案。
转载请注明原文地址:https://kaotiyun.com/show/qOpO777K
0
专业英语八级
相关试题推荐
CulturalUnderstandingLikelearningalanguage,developingculturalunderstandingoccursstepl>ystepovertime.Herearefive
Igrewupinasmalltown.Myfatherraisedchickensandranaconstructioncompany.Iwasbarely10yearsoldthanmydadgave
UsingLyricstoDevelopStudents’CriticalLiteracySonglyricscanbeusedeffectivelyin(1)_____toprovidethevoicesrarely
WhichofthefollowingstatementsaboutPresidentBush’striptoEuropeisTRUE?
MakingandWritingWordsI.AbriefintroductionA.Makingwordsisconceptuallyanengagingandeffectiveinstructionaltask.B
SevenTypesofEvidenceItisimportanttolearntouseevidenceinargumentativewriting,becausewithoutevidence,youcan’tp
Somepeopleliketolearnforeignlanguagebylisteninglessons,writinghomeworkandreadingbooks,othersliketolearnbytak
WhatCanWeLearnfromArt?Ⅰ.IntroductionA.Differencesbetweengeneralhistoryandarthistory—Focus:—ge
AproverballegedlyfromancientChinawaswidelyspreadintheWest"Ifyouwanttobehappyforafewhours,gotogetdrunk;
Thecause"ofthecrisisbetweenAmericaandIsraelisthat
随机试题
“资产评估专业人员在执行资产评估业务过程中,应当与其他资产评估专业人员保持良好的工作关系”,这里所说的“其他资产评估专业人员”通常不包括()。
A.血琼脂培养基B.沙氏培养基C.DTM培养基D.左旋多巴-枸橼酸铁和咖啡酸培养基E.酵母浸膏磷酸盐琼脂分离荚膜组织胞浆菌的选择性培养基是
A.绒促性素B.垂体后叶素C.雌二醇D.苯丙酸诺龙E.促黄体素释放激素兽医临诊用于慢性消耗性疾病的恢复期,也可用于某些贫血性疾病的辅助治疗的药物是()
28岁,女性,月经量多1年,近10日经常鼻出血,脾肋下未及。血红蛋白90g/L,白细胞10×109/L,血小板30×109/L。骨髓检查:粒、红细胞系增生旺盛,巨核细胞增多,伴成熟障碍。应诊断为
下列对综合风向玫瑰图的阐述中,哪项是错误的?[2005-9]
记账人员记账后发现账簿中某笔数字多记了36元,用“九除法”查出是将邻数记颠倒了。则下列数字中,记错的数字是()。
资本公积金不包括()。
材料消耗量变动的影响=(实际数量-计划数量)×实际价格。()
数学《义务教育课程标准》中三维课程目标指知识与技能目标、_____、_____。
用树形结构表示实体之间联系的模型是
最新回复
(
0
)