首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2012-12-30
83
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected .
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead. In the end, the software industry’s interest is in making money from the problem (by selling subscriptions to regular security updates) rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of cooperation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail; it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
"They vault over technical fixes as fast as the hurdles are erected"(Para. 1) probably means that hackers
选项
A、are constantly trying to overcome technical problems.
B、immediately find a way to break into others’ computers.
C、get excited to fix technical problems they have faced.
D、tend to install technical barriers in others’ computers.
答案
B
解析
语义题。直接定位至首段。倒数第二句指出“The criminal businesses behind spam ale competitive and creative.”,而末句是对competitive和creative的解释,vault over意为“越过”,这里是说黑客总是能找到办法来攻克技术专家们修复时设置的障碍,即能够找到方法入侵别人的电脑,故[B]为答案。
转载请注明原文地址:https://kaotiyun.com/show/ytaO777K
0
专业英语八级
相关试题推荐
Therearetwosortsofpeopleintheworld,whowithequaldegreesofhealth,andwealth,andtheothercomfortsoflife,become
IntheUnitedStates,charterschoolsprovidealternativesto"regular"publicschools.Unlikemostpublicschools,chartersdon
InthenewmillenniumIwanttoseedisabledpeopleacquiringthesamedegreeofcontrolovertheirlivesthatotherpeoplehave
A、It’slocatedinBethlehem.B、It’sonthebirthplaceofJesusChrist.C、It’sonMangerSquare.D、LesspeoplevisiteditatChri
WhichgroupofpeoplecanNOTvoteintheBritishgeneralelection?
A、ManydetaineesinGuantanamoBayhavebeenheldformorethan2years.B、U.Sgovernmentdoesn’tpermitWilnertodiscusstheir
Accordingtolegend,Aesculapiusboretwodaughters,PanaceaandHyegeia,whogaverisetodynastiesofhealersandhygienists.
Meteorologistsroutinelytelluswhatnextweek’sweatherislikelytohe,andclimatescientistsdiscusswhatmighthappenin1
Who’stoblamefortheapproximately$2agallonmostAmericanspaidforgasolineontheirThanksgivingDaytravels?Toquote
Who’stoblamefortheapproximately$2agallonmostAmericanspaidforgasolineontheirThanksgivingDaytravels?Toquote
随机试题
师生关系在_______上是相互促进的关系。
建筑工程施工现场环境保护要求中,施工现场产生的固体废弃物应在所在地县级以上地方人民政府()部门申报登记,分类存放。
关于施工成本计划的说法中,错误的是()。
甲、乙、丙三个国有企业共同投资设立某有限责任公司,设立了董事会和监事会。股东会通过的下列决议中,不符合公司法律制度规定的有()。
甲企业拥有一处原值560000元的房产。已知房产税税率为1.2%,当地规定的房产税减除比例为30%。甲企业年应缴纳房产税税额的下列计算中,正确的是()。
某企业实施质量改进项目,采用网络图法。根据所搜集的资料绘制的网络图如图6.4—6所示。根据图形可分析出: 确定关键线路,便于()。
一般资料:求助者,女,58岁案例介绍:求助者一个月前在北方的投资失利,资金目前存在严重的缩水,想要撤回投资,可是有觉得目前还不是时候,不撤,只能眼睁睁地看着资金一点点减少,求助者觉得都是自己的错,自己真是太笨了,才导致今天的下场,自己本来打算能留
张军等兄弟五人为某食品有限公司全体股东,该公司为兄弟五人共同出资建立。公司股东会由兄弟五人组成,张军为公司法定代表人。公司成立并经营若干年后,兄弟五人析产,于是协议减少公司资本。该公司工商登记上的公司资本为170万元。公司的实际资产则有:①现金9.3万元
以下各项中,哪个选项2006年的产业值最大( )。根据材料,2005年浙江省的工业总产值约为( )。
对调用数据库数据的命令进行语法、语义和权限检查的信息,存储于下列哪一个(些)结构中?
最新回复
(
0
)