首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hack The first big-name hackers included Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names beh
Hack The first big-name hackers included Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names beh
admin
2014-03-13
66
问题
Hack
The first big-name hackers included Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "
hacker
" didn’ t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today’ s hackers. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’ s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security policies and awareness. It doesn’ t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable e-mail attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take:Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a website through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—use intrusion detection systems, vulnerability scans, anti-virus protection.
Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is true?
选项
A、They are all good examples of today’ s computer users.
B、They are driven by greed, power, revenge, or some other malicious intent.
C、Their goal is to push programs beyond what they are designed to do.
D、They are all dead.
答案
C
解析
根据第一段第一、二句可知,Steve Wozniak,Bill Gates和Linus Torvalds都是早期的黑客,早期黑客的目标是扩展程序的用途(to push programs beyond what they were designed to do),故选C项。
转载请注明原文地址:https://kaotiyun.com/show/yEGd777K
本试题收录于:
职称英语理工类A级题库职称英语分类
0
职称英语理工类A级
职称英语
相关试题推荐
AAddressingaVarietyofBehavior-affectingFactorsBImportanceofImmunizationCRelationshipwithOtherHealthServicesD
EscapingfromtheEarthTheEarthhasaforcethatpullsthingstowarditself.Wecallthisforcegravity(地心引力).Thisissomethi
LightNight,DarkStarsThousandsofpeoplearoundtheglobestepoutsidetogazeattheirnightsky.Onaclearnight,withno
TheWeddellsealofAntarcticacandivetoadepthofabout,1,600feetandremainsubmergedforaslongasanhourandtenminu
Thedisease,rust,stuntsaplant’sgrowthandleadstothedestructionoftheplant.
NewcomersWhenacountryisunder-populated,newcomersarenotcompetitors,hutassistants.Ifmorecometheymayproducen
EarthquakesandAnimalsScientistswhotrytopredictearthquakeshavegottensomenewhelpersrecently—animals.Animalsoften
Thetwobankshaveannouncedplanstomergenextyear.
TheGreatestMysteryofWhalesThewhaleisawarm-blooded,air-breathinganimal,givingbirthtoitsyoungalive,suckingt
Shehasbeenthesubjectofmassivemediacoverage.
随机试题
被拘留人在被行政拘留前因同一行为被依法拘传、刑事拘留、取保候审的时间都不能折抵行政拘留时间。
农业发展逐步实现从增产导向向提质导向转型升级,这体现了我国现代农业发展()时期的发展思路。
第二信使cAMP介导激素作用的机制是()
某办公楼工程,地下2层,地上15层,建筑面积30000m2,施工单位进场后按照批准的总平面布置图进行了现场规划,其中库房分成普通库房和特殊库房,分建在不同的位置,主要出人口及楼层各主要部分等均悬挂了明显的警示牌,在施工过程中发生了以下事件:事件一
经检验检疫机构预检的出口货物,可直接向口岸检验检疫机构办理换证放行手续,无须提供任何单证。
根据上海证券交易所的相关规定,证券回购交易集中竞价时,其申报应当符合( )。
2010年第一季度,中国人民银行根据国内外经济金融形势和银行体系流动性变化,实施的主要货币政策操作如下:1.累计发行央行票据1.43万亿元,开展短期正回购操作8930亿元。2.经过2009年一年多的宽松货币政策,在货币信贷快速增长背景下,2010年1月
根据合同法律制度的规定,仓储期间因特定原因导致仓储物变质、损坏的,保管人不承担损害赔偿责任,该特定原因包括()。
一般资料:求助者,男性,17岁,高中三年级学生。案例介绍:求助者要参加高考了,但目前成绩较差,知道原因,就是控制不住地老玩游戏,严重影响了学习成绩。求助者生动前来咨询,请求咨询师帮助自己改掉玩游戏的毛病。下面是心理咨询师与求助者之间的一
某教师遇到学习成绩不同的学生犯错误,在进行教育时,对优秀学生是“轻描淡写,面带微笑”,对中等学生是“不厌其烦,严肃教导”,对后进学生是“谩骂训斥,又吼又叫”,教师的这种做法()。
最新回复
(
0
)