首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clev
admin
2012-12-30
74
问题
Bill Gates, then still Microsoft’s boss, was nearly right in 2004 when he predicted the end of spam in two years. Thanks to clever filters unsolicited e-mail has largely disappeared as a daily nuisance for most on the Internet. But spam is still a menace: blocked at the e-mail inbox, spammers post messages as comments on websites and increasingly on social networks like Twitter and Facebook. The criminal businesses behind spam are competitive and creative. They vault over technical fixes as fast as the hurdles are erected .
The anti-spam industry has done laudable work in saving e-mail. But it is always one step behind. When filters blocked missives with tell-tale words such as "Rolex" or "Viagra", spammers misspelled them. When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead. In the end, the software industry’s interest is in making money from the problem (by selling subscriptions to regular security updates) rather than tackling it at its source.
Law-enforcement agencies have had some success shutting down spam-control servers in America and the Netherlands. Even Russia, where much of the world’s spam is spawned, has shown signs of cooperation. But as one place becomes unfriendly, spammers move somewhere else. Internet connections in poor and ill-run countries are improving faster than the authorities there can police them. That won’t end soon.
In any case, the real problem is not the message, but the link. Sometimes an unwise click leads only to a website that sells counterfeit pills. But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or uses your machine for other nefarious purposes. Spam was never about e-mail; it was about convincing us to click. To the spammer, it is moot whether the link is e-mailed, tweeted or liked.
The police are doing what they can, and software companies keep on tightening security. But spam is not just a hack or a crime, it is a social problem, too. If you look beyond the computers that lie between a spammer and his mark, you can see all the classic techniques of a con-man: buy this stock, before everyone else does. Buy these pills, this watch, cheaper than anyone else can. The spammer plays upon the universal human desire to believe that we are smarter than anyone gives us credit for, and that things can be had for nothing. As in other walks of life, people become wiser and take precautions only when they have learned what happens when they don’t.
That is why the spammers’ new arena—social networks—is so effective. People follow Twitter feeds from people they would like to know and make "friends" on Facebook whom they do not know at all. Hijack one such account, and you can exploit a whole network of trusting and trusted contacts.
A few fiddles might help, such as tougher default privacy settings on social networks. But the real problem is man, not the machine. Public behaviour still treats the Internet like a village, in which new faces are welcome and anti-social behaviour a rarity. A better analogy would be a railway station in a big city, where hustlers gather to prey on the credulity of new arrivals. Wise behaviour in such places is to walk fast, avoid eye contact and be brusque with strangers. Try that online.
"They vault over technical fixes as fast as the hurdles are erected"(Para. 1) probably means that hackers
选项
A、are constantly trying to overcome technical problems.
B、immediately find a way to break into others’ computers.
C、get excited to fix technical problems they have faced.
D、tend to install technical barriers in others’ computers.
答案
B
解析
语义题。直接定位至首段。倒数第二句指出“The criminal businesses behind spam ale competitive and creative.”,而末句是对competitive和creative的解释,vault over意为“越过”,这里是说黑客总是能找到办法来攻克技术专家们修复时设置的障碍,即能够找到方法入侵别人的电脑,故[B]为答案。
转载请注明原文地址:https://kaotiyun.com/show/ytaO777K
0
专业英语八级
相关试题推荐
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdetail
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdetail
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdetail
Rabiesisanordinarilyinfectiousdiseaseofthecentralnervoussystem,causedbyavirusand,asarule,spreadchieflybydo
A、CheneyandKerryB、BushandKerryC、CheneyandtheheadofDemocraticPartyD、TheheadsofDemocraticandRepublicpartiesC
Thepoundingrainbeganinthemiddleofthenight.ThepeopleofJackson,Ohioawoketothesoundthenwentbacktosleep.The
TV,Internetandradioareverypopularnowadays.Somepeoplesaythattheywillreplacebooksandwrittenwordsasthemainsou
Itisnotagoodcountrywherepeoplehavetoworkhardertomakelessmoney.Itisnotaharmonioussceneinwhichasmallgrou
Accordingtolegend,Aesculapiusboretwodaughters,PanaceaandHyegeia,whogaverisetodynastiesofhealersandhygienists.
Who’stoblamefortheapproximately$2agallonmostAmericanspaidforgasolineontheirThanksgivingDaytravels?Toquote
随机试题
关于社会工作专业发展历程的说法,正确的是()。
二维编码裁剪法如何对线段的端点进行编码?
已婚妇女,54岁。白带多伴外阴痒2周。提示:若经上述治疗后症状未消失,查阴道分泌物仍见滴虫。为避免重复感染应注意的事项有提示:查外阴皮肤有抓痕,检查见阴道后穹窿处有多量稀薄泡沫状分泌物,阴道黏膜有多处多个散在红色斑点。
患者,一个月前发热,胸痛,咳嗽,有大量脓痰,经用抗感染治疗不见好转,一周前咳嗽加重,并有呼吸困难。胸部X线片见左胸大片状阴影,经胸穿抽出脓汁,反复穿刺排脓不能控制。其治疗应为()
机构所在地在A县的甲服装生产企业是增值税一般纳税人,2018年2月在A县取得含税服装销售收入30万元,为其他企业设计服装收取含税设计费3万元,当月发生进项税2.5万元(均取得增值税专用发票),将位于B市的一处办公用房(系2016年5月1日后取得)出租,收取
课程的基本类型有()。
2011年上半年,天津市新批三资企业328家,比上年同期下降3.8%;合同外资额90.35亿美元,增长10.0%;实际使用外资72.34亿美元,增长22.3%。其中,新批合同外资1000万美元以上项目89个;合同外资79.4亿美元,增长7.2%,占全市合同
[2007年MPlA真题]有些工程师有博士学位,因此,有些获得博士学位的人技术水平很高。为使上述推理成立,必须补充以下哪项作为前提?
A、 B、 C、 D、 B
下列关于域名的说法正确的是()。
最新回复
(
0
)