首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2012-12-30
63
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected .
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead. In the end, the software industry’s interest is in making money from the problem (by selling subscriptions to regular security updates) rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of cooperation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail; it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
"They vault over technical fixes as fast as the hurdles are erected"(Para. 1) probably means that hackers
选项
A、are constantly trying to overcome technical problems.
B、immediately find a way to break into others’ computers.
C、get excited to fix technical problems they have faced.
D、tend to install technical barriers in others’ computers.
答案
B
解析
语义题。直接定位至首段。倒数第二句指出“The criminal businesses behind spam ale competitive and creative.”,而末句是对competitive和creative的解释,vault over意为“越过”,这里是说黑客总是能找到办法来攻克技术专家们修复时设置的障碍,即能够找到方法入侵别人的电脑,故[B]为答案。
转载请注明原文地址:https://kaotiyun.com/show/ytaO777K
0
专业英语八级
相关试题推荐
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdetail
Thepoundingrainbeganinthemiddleofthenight.ThepeopleofJackson,Ohioawoketothesoundthenwentbacktosleep.The
A、It’slocatedinBethlehem.B、It’sonthebirthplaceofJesusChrist.C、It’sonMangerSquare.D、LesspeoplevisiteditatChri
Humour(alsospelledhumor)istheabilityorqualityofpeople,objects,orsituationstoevokefeelingsofamusementinother
Meteorologistsroutinelytelluswhatnextweek’sweatherislikelytohe,andclimatescientistsdiscusswhatmighthappenin1
A、lookingatthemirror.B、]practicingsimulatedinterviews.C、practicingansweringquestions.D、findingsomeofyourstrongpo
By______,werefertothewaysthatsentencesareconstructedaccordingtothegrammarofarrangement.
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdeta
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdeta
随机试题
某商业企业为增值税一般纳税企业,适用的增值税税率为17%。2013年有关资料如下。 (1)有关账户期初、期末余额和部分账户发生额如下: (2)有关损益类账户本年发生额如下: (3)其他有关资料如下: 出售的交易性金融资产均为非现
“这是一个无疑的英明决策。”出现的错误是()
人体厌氧菌感染的危险因素不包括
某上市公司共7名董事,现审议向其中2名董事甲和乙共同出资的一家公司进行投资,则以下说法正确有()。Ⅰ.该董事会需4名以上董事出席方可举行Ⅱ.该董事会经除甲和乙外的其他3名以上非关联董事出席即可举行Ⅲ.该董事会须经除甲和乙外的其他3名以上非关联董
以下属于不正当竞争行为的表现形式的是()。
地球陆地总面积相当于海洋总面积的41%,南半球的陆地面积相当于其海洋面积的23%,那么,北半球的海洋面积相当于其陆地面积的多少倍?(精确到小数点后两位)
先进的社会意识之所以能对社会的发展起促进作用,是由于
某商品一周的需求量X是随机变量,已知其概率密度为f(x)=假设各周的需求量相互独立,以Uk表示k周的总需求量,试求:(1)U2和U3的概率密度fk(x)(k=2,3);(2)接连三周中的周最大需求量的概率密度f(3)(x).
下列关系模型中,能使经运算后得到的新关系中属性个数多于原来关系中属性个数的是()。
2012级企业管理专业的林楚楠同学选修了“供应链管理”课程,并撰写了题目为“供应链中的库存管理研究”的课程论文。论文的排版和参考文献还需要进一步修改,根据以下要求,帮助林楚楠对论文进行完善。修改文档中样式为“正文文字”的文本,使其首行缩进2字符,段前和
最新回复
(
0
)