首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2015-08-29
49
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected.
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets(networks of hijacked computers)instead. In the end, the software industry’s interest is in making money from the problem(by selling subscriptions to regular security updates)rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of co-operation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail: it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
We know from the passage that when we receive e-mails, we should
选项
A、recognize the counterfeit websites.
B、watch out for malicious software.
C、be cautious of clicking the link attached.
D、take particularly care of social networks.
答案
C
解析
推断题。按照试题顺序及选项巾的counterfeit定位至第四段。首句为该段主旨句“In any case,thereal problem is not the message,but the link.”,结合倒数第二句“Spam was never about e-mail;it was aboutconvincing us to click.”可以推断,我们要小心点击那些链接,[C]为答案。
转载请注明原文地址:https://kaotiyun.com/show/rKOO777K
0
专业英语八级
相关试题推荐
Contrasttoresearchers’expectations,dysfunctionalfamilyrelationshipsandpoor【M1】______.communicationstylesappearto
FiveCommonMistakesinConversationsandTheirSolutionsⅠ.NotlisteningA.Problem:mostpeopledon’tlisten—waiteager
WhichofthefollowingistherepresentativeofRealism?
Alotofpeoplebelievethattelevisionhasaharmfuleffectonchildren.Afewyearsago,thesamecriticismsweremadeofthe
WhichofthefollowingworksisNOTwrittenbyWilliamShakespeare?
Itisobviousthatthereisagreatdealofdifferencebetweenbeinginternationalandbeingcosmopolitan.Allgoodmenareinte
WhathavetheleadersofEuropeanUnionagreedtodo?
Itisgenerallyagreedthat_____werethefirstEuropeanstoreachAustralia’sshores.
WhathavetheleadersofEuropeanUnionagreedtodo?
随机试题
(本题可用英文作答)甲实木地板厂为增值税一般纳税人,2020年9月有关生产经营情况如下:(1)从油漆厂购进油漆200吨,每吨不含税单价1万元,取得油漆厂开具的增值税专用发票,注明货款200万元、增值税26万元。(2)向农业生产者收购原木40吨,收购凭证
关于启动子的叙述正确的是
估价的假设前提是()。
旅游安全事故发生后,(),应当及时赶赴现场,进行现场组织指挥,并采取适当的处理措施。
数字出版读物是未来出版业发展的一大趋势。预计未来五年时间内,将有超过80%的手机用户通过手机阅读电子书和数字报。由图书馆等机构用户采购的电子书、数字报的规模将达到30亿元人民币。因此,数字出版即将替代传统纸质出版。以下哪项如果为真,不能支持上述结论?(
下列符合风化壳基本特征的是()。
请从所给出的四个选项中,选择最合适的一个填在问号处,使之呈现一定的规律性。
下列行为中,不构成挪用公款罪的是()
坚持总体国家安全观,必须统筹外部安全和内部安全、国土安全和国民安全、传统安全和非传统安全、自身安全和共同安全,完善国家安全制度体系。国家安全的基石是
计算下列二重积分:
最新回复
(
0
)