四六級必讀美文系列MP3:保護個人計算機安全的技巧

作者:admin

來源:

2016-3-18 10:12

四六級必讀美文系列MP3:保護個人計算機安全的技巧

00:00

英語四六級必讀美文音頻系列

Unit 25 How to Resign on Good Terms

【中英雙語文本】

(1)It's near impossible to defend oneself from the kind of cyber attack that targeted Google Inc. and more than 30 other companies. But for the average computer user there are some common-sense steps that can help protect against viruses and other malicious computer code.

(1)對于針對谷歌 (Google Inc.)以及其他30多個公司的網絡攻擊,個人幾乎毫無招架之力。但對普通計算機用戶來說,只需采取一些常識性步驟即可免受病毒和其他惡意代碼的侵擾。

一Install anti-virus software. (2) This can protect a computer against known malicious programs that could allow a hacker to steal personal information. Cyber criminals release thousands of new programs each day so it is important to update anti-virus software.

安裝殺霉軟件。(2)這樣可將已知惡意程序拒之門外,以防黑客竊取個人信息。網絡罪犯每天發布數千個新程序,因此及時更新殺毒軟件十分重要。

一Install software patches. Companies such as Microsoft Corp. and Adobe Systems Inc. are constantly issuing small updates to the Windows operating system and PDF reader in response to newly identified security bugs. Users should be sure to install these so-called patches.

安裝軟件補丁。微軟和奧多比系統公司等公司均不斷發布小的的更新程序以修補Windows操作系統和 PDF reader程序中新發現的安全漏洞。用戶應當及時安裝這些補丁。

—Be suspicious. Consider attachments to emails, links on social-networking sites and files for download on Web sites guilty until proven innocent. These are the most common ways that criminals load malicious software onto a victim's computer.

保持戒心。除非確保安全無毒,否則一律將電子郵件附件、社交網站鏈接和網站上的可下載文件視同病毒處理。這些是罪犯將惡意軟件傳送到受害者計算機的最常用伎倆。

Be vigilant in public. Sign out of your Gmail, Yahoo or Hotmail account when using a public computer and clear the Web browser's cache, cookies and history. Then close the browser.

在公共場合保持警惕。用公共計算機登錄Gmai1、雅虎 (Yahoo)或 Hotmail郵箱后應登出,清空瀏覽器緩存、 cookie和歷史,然后關閉瀏覽器。

People with access to sensitive information need to take extra precautions. (3) They could be targeted by hacker who could takes steps,including sending malicious software in an email that appears to come from someone the victim knows. One way to guard against this is to encrypt important files. Also, businesses should deploy systems that track where sensitive information is being sent.

接觸敏感信息的人士需特別小心。 (3)他們很可能成為黑客的攻擊目標。攻擊手段包括偽裝成受害者認識的人,通過電子郵件向其發送惡意軟件。重要文件加密是有效的保護措施之一。公司用戶還應當配備能夠跟蹤敏感信息發送路徑的系統。

一Use strong passwords. Create passwords that are a mix of numbers, letters and symbols. Don't use common words or personal information. Don't use the same password on multiple sites. Put one on your cellphone.

使用安全密碼。使用包含數字、字母和符號的溫合密碼 g不要以常用單詞或個人信息作為密碼,不要在多個站點使用同一密碼,手機也要設置密碼。

四六級句型講解

It's near impossible to defend oneself from the kind of cyber attack that targeted Google Inc. and more than 30 other companies.

本句是一個復合句。It是形式主語,真正的主語是后面的to defend oneself...companies不定式短語。其中that引導限制性定語從句,修飾 cyber attack。

語法重點:形式主語,定語從句

2. This can protect a computer against known malicious programs that could allow a hacker to steal personal information.

本句是一個復合句,that引導限制性定語從句,修飾programs。to steal personal information是allow的賓語補足語。

語法重點:定語從句,賓語補足語

3. They could be targeted by hacker who could takes steps,including sending malicious software in an email that appears to come from someone the victim knows.

本句是一個復合句,主句是they could be targeted by a hacker。 who引導限制性定語從句,修飾hacker。其中including...email現在分詞短語作伴隨狀語。that引導定語從句,修飾email。

語法重點:定語從句,分詞短語作狀語

陕西十一选五走势图最