学文网

通用学术英语课文翻译资料

时间:2023-08-20 17:57:37 文/阿林老师 课文学文网www.xuewenya.com

  学术英语课文翻译资料

  【课文】

  How do computer hackers get into computers

  It seems like a direct question, but the implications are complex and the answer is not simple. If you answer it casually, then the hacker enters the target computer system using the weakness. But to provide more details, let's start at the beginning.

  The word "hacker" is controversial in meaning and interpretation. Some people say that hackers (open circuit) is a good man, they just push the boundaries of knowledge, and not for any damage (at least not intentionally), and crackers (smash) is really bad.

  This argument has little effect, and if it is for the purposes of this discussion, the term "unauthorised user" (UU) is sufficient. The term includes all different types of people, from those involved in organized crime to those who are inside, who break through the authority granted in the system.

  Now let's talk about what it means to "get into" the computer. This can mean something stored on a computer system.

  Get the processing power of the system, or capture the information exchanged between the system. Each attack requires a different skill set, with different vulnerabilities.

  So what are "unauthorised users" using? Weaknesses exist in every system, and there are two weaknesses:

  Known and unknown. Known weaknesses usually exist because of the need for certain abilities. For example, for a business process, you need different people to use a system, and you have a known weakness: the user. Another example of a known weakness is the ability to communicate through the Internet. In order to have this ability, you have to open a path to the unknown and the untrusted entity. The unknown weakness is what the owner or operator of the system does not know, may be the result of shoddy engineering, or the unintended consequences of some of the required capabilities.

  By definition, weaknesses can be exploited. These weaknesses can be low-level password protection, or it can be left to the computer to make use of the office visitors. As long as you sit at a receptionist's desk and use his computer to get the information you need, more than one technology is being used. Low-level code (for example, the user name "Joe Smith", the password is "Joe Smith") is close to the rich resources of a computer: password cracking program can be easily in a few minutes to confirm the word in the dictionary, name, or common phrases. By replacing letters with Numbers, these passwords are more complex. For example, replacing the letter O with 0 does not make the task more complicated. When an unauthorized user USES a valid user name - password combination, the entry system is simply logged in.

  If the target system is well protected (through the technical control, such as a firewall or security software, control and management, clear policies and processes, for example), and remote into hard, unauthorized users may use low technology, these policies may include bribery authorized users, in the cleaning company do temporary workers, or to find information in the dump.

  If the target system is not well protected, then unauthorized users can access it using technology.

  Users who are not authorized to use technical means must first determine the specifications of the target system. For unauthorised users, there is no benefit to using technology that attacks Microsoft's weaknesses if the target system is a Macintosh. They have to know what the target system is, how it is configured, and what networking capabilities it has. Once you know these parameters (they can be obtained remotely from multiple methods), they can take advantage of the known vulnerabilities of these configurations. For common configurations, you can use the first set of attacks to make the task simple.

  People who use these pre-set attacks are sometimes derided as "script kiddies". A skilled person can remotely determine the configuration of the target system, one of which is the ability to pass through the hypertext transfer protocol. People close to the web site send configuration information, such as the type of browser being used, to the requested address. Once the system is configured, you can choose the means.

  Another type of attack is targeting a specific vulnerability, without any specific target to launch an attack - it

  Like a shotgun attack, the aim is to attack as many potential targets as possible. The attack took a first step. But the results and effectiveness of any given target are less predictable.

  It should be noted that the unauthorised access to its ultimate purpose is different from the motivation of the entrant, for example, if he

  Want to collect a lot of zombies, but don't want to attack at the service, that his purpose is to make client secretly installed on the computer as much as possible, a effective way to do this is through the use of the so-called Trojan horse program, it is in the user without knowing or not install malicious programs, some of the more recent large-scale attacks, some of the more recent large-scale attacks, there are such a stance as the attack types of elements.

  It is a multi-step process to protect yourself from attacks, with the goal of limiting and managing the weaknesses of the system (it is not likely to be complete

  Eliminate these weaknesses. First, make sure you have the operating system and application of the latest patches - these patches often repair can take advantage of weaknesses, make sure your password is complicated enough: include letters, Numbers, and symbols, and meaningless.

  Also, consider hardware firewalls and limit the flow of data to and from the Internet. When you really need a few carefully selected ports, such as email and web traffic, make sure your anti-virus software is the latest, check whether there is a new virus definitions (if you are using Windows, ideally you should upgrade virus definition) every day. Finally, back up your data so that if the bad situation does happen, at least you can recover the important things.

  【翻译】

  电脑黑客如何进入电脑

  这好像是一个直接的问题,但是内涵很复杂,答案绝不简单,如果随便地回答,那么黑客通过利用弱点进入目标电脑系统。但是为了提供更多细节,我们还是从头说起。

  “hacker” 这个词在意义和解释上都很有争议。有些人说hackers(开路人) 是好人,他们只是推动了知识的边界,并没造成什么伤害(至少不是故意的),而crackers (打砸者)是真正的坏蛋。

  这种争论没有什么效果,如果是为了这种讨论的目的,术语“未授权的使用者”(UU)就足够用了。这个术语包含了所有不同类型的人,从那些参与有组织犯罪行为的人到那些内部人士,他们突破了在系统中被授予的权限。

  接下来我们探讨一下“进入”电脑意味着什么。这可以指获得电脑系统储存的内容,

  获得系统的处理能力,或者捕获系统之间交流的信息。每种攻击都需要不同的技巧,以不同的弱点为目标。

  那么“未授权的使用者”利用的是什么?弱点存在于每个系统中,并且有两种弱点:

  已知的和未知的。已知的弱点通常因为需要某些能力而存在。比如,为了某个商业过程,你需要不同的人使用一个系统,你就有一个已知的弱点:使用者。另一个已知弱点的例子是通过互联网交流的能力,为了具备这个能力,你要给未知和不被信任的实体开通一条路径。未知的弱点是系统的拥有者或操作者所不了解的,可能是劣质工程的结果,或者是某些被需要的能力产生的非故意的结果。

  按照定义,弱点可能被利用。这些弱点可以是低级的密码保护,也可以是让电脑开着,让办公室的访客可以利用。只要坐在接待员的桌前,用他的电脑获得需要的信息,就有超过一种技术被利用。低级的密码(比如,用户名“Joe Smith”, 密码也是“Joe Smith”)也是接近电脑的丰富的来源:密码破译程序可以很容易在几分钟内确认字典中的单词、姓名,甚至常见短语。通过用数字代替字母,使这些密码更复杂。比如用0来代替字母O,并不会使任务更复杂。当未获授权的使用者使用有效的用户名—密码组合,进入系统就是简单的登录了。

  假如目标系统被很好地保护(通过技术控制,比如防火墙或安全软件,还有管理控制,比如明确的政策和过程),并且远程难以进入,未获授权的使用者可能会使用低技术的攻击,这些策略可能包括贿赂获授权的使用者,在清洁公司做临时工,或者在垃圾堆里翻找信息。

  如果目标系统没有得到很好的保护,那么未获授权的使用者可以使用技术手段进入。

  为了使用技术手段未获授权的使用者必须先决定目标系统的规格。对未获授权使用者来说,如果目标系统是Macintosh, 使用攻击微软弱点的技术手段没有任何好处。他们必须知道目标系统是什么,它是怎样配置的,它有哪种联网能力。一旦知道了这些参数(它们可以通过多种方法远程获得),他们就可以利用这些配置的已知弱点。对于常见的配置可以利用先设置好的攻击方式,这样能让这次任务很简单。

  使用这些预先设置的攻击能力的人有时被嘲笑为“脚本小子”。 技术熟练的人可以远程决定目标系统的配置,其中一个办法是通过超文本传输协议内在的能力。接近固有网站的人把配置信息,比如正在被使用的浏览器类型,发送到发出请求的地址。一旦系统配置已知,就可以选择手段。

  另一种攻击类型是针对特定的弱点预设好,没有任何特定的目标就发起攻击——它

  就像猎*一样猛烈攻击,目的是尽可能多地攻击潜在目标。这种攻击略去了第一步。但是对于任何给定的目标其结果和有效性都不太好预测。

  应该注意到未获授权的进入其最终目的因为进入者的动机而有不同,比如,如果他

  想收集很多僵尸电脑,而又不想在服务时进行攻击,那他的目的就是把客户程序偷偷安装到尽量多的电脑上,这样做的一种有效方式就是通过使用所谓的特洛伊木马程序,它是在用户不知情或不同意的情况下安装恶意程序,有些更近期发生的大规模网络攻击,有些更近期发生的大规模网络攻击,有这样的姿态作为攻击类型的要素。

  保护好自己不受攻击是多步的过程,目的是限制和管理系统的弱点(并不可能完全

  消除这些弱点)。首先,保证你有操作系统和应用程序的最新补丁——这些补丁通常会修补可以利用的弱点,保证你的密码够复杂:包括字母、数字和象征符号,并且毫无意义。

  同时,要考虑硬件防火墙,并且限制往来因特网的数据流。在你真正需要的几个精心挑选的端口上,比如email 和网络交通,保证你的反病毒软件是最新的,经常检查是否有新的病毒定义(如果你正在使用Windows 系统,理想状态下你应该每天升级病毒定义)。最后,备份你的数据,那样如果不好的情况真的发生,至少你可以恢复重要的东西。

  学术英语读写课文翻译

  cyberspace :if you don't love it ,leave it信息空间:出入随愿

  something in the American psyche loves new frontiers. We hanker after wide-open spaces ;we like to explore ;we like to make rules but refuse to follow them .But in this age it's hard to find a place where you can go and be yourself without worrying about he neighbours .

  美国人的内心深处具有一种酷爱探索新领域的气质。我们渴求宽敞的场地,我们喜欢探索,喜欢制定规章制度,却不愿去遵守。在当今时代,却很难找到一块空间,可以供你任意驰骋,又不必担心影响你的邻居。

  There is such a place : cyberspace . Formerly a playground for computer fans ,cyberspace . Formely a playgroundfor computer fans ,cyberspace now embraces every conceivable constituency : school lchildren , flirtatious ,singles ,dirty pictures behind their bedroom doors provoke a crackdown ?

  确实有这样一个空间,那就是信息空间。这里原本是计算机迷的游戏天地,但如今只要想像得到的各类人群应有尽有,包括少年儿童、轻佻的单身汉、美籍匈牙利人、会计等。问题是他们都能和睦相处吗?人们是否会因为害怕孩子们躲在卧室里看网上的淫秽图片而将它封杀?

  The first order of business is to grasp what cyberspace is . It might help to leave beind metaphors 隐喻 of highways and frontiers and to think instead of real estate . Real estate ,remember ,is an intellectual ,legal ,artificial environment constructed on top of land. Real estate recognizes the difference between parkland and shopping mall ,between red-light zone and school district ,between church ,state and drugstore .

  首先要解决的问题是,什么是信息空间。我们可以抛开高速公路、前沿新领域等比喻,把信息空间看作一个巨大的房地产。请记住,庄园是人们智慧的结晶,是合法的、人工营造的氛围,它建立在土地之上。在房地产业中,公园和商业中心、红灯区与学校、教堂、政府机构与杂货店都能区分开来。

  in the same way , you could think of cyberspace as a giant and unbounded world of virtual real estate .Some property is privatedly owned and rented out ; other property is common land ; some places are suitable for children , and others are best avoided by all citizens . Unfortunately ,it's those places that are now capturing the popular imagination ,places that offer bombmaking instructions ,pornography, advice on how to steal credit cards .They make cyberspace sound like a nasty place . Good citizens jump to a conclusion : Better regulate it .

  你可以用同样的方法把信息空间想像为一个巨大的、无边无际的虚拟房地产业。其中有些房产为私人拥有并已租出,有些是公共场所;有的场所适合儿童出人,而有些地方人们最好避开。遗憾的是,正是这些应该避开的地方使得人们心向神往。这些地方教唆你如何制造炸弹、为你提供淫秽材料、告诉你如何窃取信用卡。所有这些使信息空间听起来像是一个十分肮脏的地方。正直的公民纷纷作出这样的结论:最好对它严加管理。

  But before using regulations to counter indecency ,it is fundamental to interpret the nature of cyberspace . Cyberspace isn't a frontier where wicked people can grab unsuspecting children ,nor is it a giant television system that can beam offensive messages at unwilling viewers . In this kind of real estate ,users have to choose where thy visit ,what they see ,what they do .It's optiona .In other words,cyberspace is a voluntary destination --in reality ,many destinations .You don't just get "onto the Net" ;you have to go someplace in particular . That means that people can choose where to go and what to see .Yes , community standards should be enforced ,but those standards set by cyberspace communities themselves ,not by the courts or by politicians in Washington .

  但是,在利用规章制度来反击下流之举之前,关键是从根本上理解信息空间的`性质。恶棍并不能在信息空间抢走毫无提防之心的儿童;信息空间也不像一台巨大的电视机,向不情愿的观众播放令人作呕的节目。在信息空间这个房地产业中,用户对他们所去之处、所见所闻、所做所为都要作出选择,一切都出于自愿。换句话说,信息空间是个出入自便的地方,实际上,信息空间里有很多可去之处。人们不能盲目上网,必须带着具体的目标上网。这意味着人们可以选择去哪个网址、看什么内容。不错,规章制度应该在群体内得以实施,但这些规章制度必须由信息空间内各个群体自己来制定,而不是由法庭或华盛顿的政客们来制定。

  what makes cyberspace so alluring is precisely the way in which it's different from shopping malls , television ,highways and other terrestrial jurisdictions.But let's define the territor: 信息空间之所以具有如此大的诱惑力,正是因为它不同于商场、电视、公路或地球上的其他地方。那么,让我们来描述一下这个空间。

  First ,there are private e-malil conversations ,similar to the conversations you have over the teleophone .These are private and consensualand require no regulation at all .

  首先,信息空间里人与人之间可以进行电子邮件交流。这种交流类似于电话交谈,都是私人之间的、两相情愿的谈话,不需要任何规章制度加以限制。

  Second , there are information and entertainment services , wehre people can download anytihing from legal texts and lists of "great new restaurants " to game software or dirty pictures . These places are like bookstores ,malls and movie houses --places whre you go to buy something .The customer needs to request an item or sign up for a subscription; stuff (especially pornography ) is not sent out to people who don't ask for it .Some of these services are free or included as part of a broader service like ComputerServe or America Online ; others charge may and may bill their customers directly .

  其次,信息空间提供信息与娱乐服务。人们可以从中下载各种信息,从法律文件、“大型新饭店”名单,到游戏软件、下流图片,无奇不有。这里如同书店、商场和电影院,属购物区域。顾客必须通过索求或者登记来购物,物品(特别是淫秽之物)不会发送给那些没有索取的人。有些服务可以

  免费,或作为总服务费用的一部分计算,如“计算机服务”和“美国在线”就是如此。而有些服务要向顾客收费,而且可能会让顾客直接支付账单。

  Third ,there are "real" communities ---groups of people who communicate among themselves . In real-estate terms ,they're like bars or restaurants or bathhouses . Each active participate contributes to a general conversation ,generally through posted messages . Other participant may simply listen or watch .Some services are supervised by a moderator ; others are more like bulletin boards ---anyone is free to post anything .Many of these services started out unmoderated but are now imposing rules to keep out unwanted advertising ,extraneous discussions or increasingly rude participants .

  三,信息空间里还有真正意义上的群体,那就是在内部互相交流思想的人群。从庄园的角度来看,这些群体就像酒吧、饭店或公共浴室。每个活跃的人都积极参与谈话,谈话一般通过邮件方式进行;而有的人也许只充当旁观者或旁听者。有些活动由专人监督,有些则像公告牌,任何人可以任意在上面张贴。很多活动起初都无人监督,但现在实行强制管理,用规章制度来扫除那些不受欢迎的广告、不相干的讨论或日渐粗鲁的成员。

  cyberspace communitis evolve just the way terrestrial ommunities do : people with like-minded interests band together . Every cyberspace community has its own character . Overall , the communities on CompuServe tend t be more professsional ; those on AmericaOnline , affluent young singles ;Prodigy family-oriented itself there are lots of passionate non-commercial discussion groups on topics ranging from Hungarian politics (hungary Online ) copyright law .

  信息空间里群体的演变过程正如陆地社会团体的演变过程,即情趣相投的人们聚在一起。信息空间里每一个团体都各具特色。总的来说,“计算机服务”上的团体一般由专业技术人员组成;“美国在线”上的团体一般为富有的独身者;“奇才”主要面向家庭。另外还有一些具有独到见解的服务机构,“共鸣”为其中之一,是纽约市中心一家时髦的服务机构。再如“妇女专线”,是专为女性开辟的,她们希望逃避网上其他地方盛行的男性文化。就因特网本身也有大量情绪激昂的讨论小组,都属非商业性质,讨论话题广泛,从匈牙利政治(匈牙利在线)到版权法,无所不及。

  what's unique about cyberspace is that it allows communities of any size and kind to flourish ; in cyberspace ,communities are chosen by the users , not forced on them by accidents of geography . This freedom gives the rules that precise in cyberspace a moral authority that rules in terrestrial environments don't have . Most people are stuck in the country of their birth, but if you don't like the rules of a given cyberspace community ,they can restrict their children's access to it .

  信息空间的独特之处在于允许任何规模、任何种类的团体发展繁荣。在信息空间,用户自愿参加任何团体,而不是因为地理位置的巧合而被迫参加某个团体。这种自由赋予主宰信息空间的准则一种道义上的权威,这种权威是地球空间里的准则所没有的。多数

  人呆在自己出生的国土上动弹不得,而在信息空间,假若你不喜欢某一群体的准则,脱离这个群体即可。出入自由。同样,如果做父母的不喜欢某一群体的准则,便可以限制孩子,不让他们参与。

  what's likely to happen in cyberspace is the formation of new communities ,free of the constraits that cause conflict on earth . Instead of a global village ,which is a nice dream but impossible to manage , we'll have invented another world of self-contained communities that cater to their own members' inclinations without interfering with anyoneelse's The possibility of a real market-style evolution of governance is at hand .In cyberpace ,we'll be able to test and evolve rules governing what needs to be governed --intellectual property ,content and access control , rules about privacy and free speech .Some communities will allow anyone in ;others will restrict access to members who qualify on one basis or another .Those communites that prove self-sustaining will prosper (and perhaps grow and split into subsets wiht ever-more-particular interests and identities ) Those that can't survive --either because people lose interest or get scared off --will simply wither away .

  在信息空间,可能会发生的情况是形成新的群体,新群体的形成不像在地球上那样受到限制,产生冲突。我们不是要建立一个梦寐以求、而又难以管理的全球村,而是要建立一个由各种独立的、不受外界影响的群体组成的世界,这些群体将投其成员所好,而又不干涉他人。一种真正的市场型管理模式很快成为可能。在信息空间,我们将能够检验并完善所需要的管理制度——知识产权制度、服务内容与使用权的控制制度、个人隐私权与自由言论制度等。有些群体允许任何人加入,而有些则只允许符合这样或那样条件的人加入。能够自立的群体会兴旺发展(或许也会因为志趣与身份日趋特殊,而发展成为几个分支)。有些群体或因为成员失去兴趣,或因为成员被吓跑而不能幸存下来,它们将渐渐萎缩消亡。

  in the near future ,explorers in cyberspace will need to get better at defining and identifying their communities . they will need to put in place --and accept ---their own local governments apart from terrestrial governments ,just as the owners of expensive real estatet often have their own security guards though they can call in the police to get ride of undesirable customers .

  在不久的将来,信息空间的探索者应该更善于解释和辨别各群体的性质。除了现实中的政府之外,他们将有必要安置并接受自己的地方政府,就如同豪华庄园的业主一样.尽管可以叫警察来驱逐不受欢迎的顾客,但还是宁愿雇佣自己的保安。

  then what should be done about undesirable material in cyberspace ? What to do ,for instance ,about pornography . The answer is labeling ,besides banning ,questionable material .it makes sense for cyberspace participants themselves to agree on a scheme for uestionable items ,so that people or automatic filters can avoid them . It's easy enough for

  software manufacturers to build an automatioc filter that would prevent you or your child from ever seeing the undesired item on a menu . (it's as if all the items were wrapped , with labels on the wrapper.)

  Someone who posted pornographic material under the title "Kid-Fun" could be sued for mislabeling .

  那么,该如何处置信息空间不受欢迎的材料呢?例如,淫秽材料该怎么办?答案除了禁止以外,就是在有问题的材料上贴上标签。信息空间的成员对有问题的内容应该达成共识,拿出一个解决方案来,使人们或自动过滤系统避开这些内容,这样可能会有助于解决问题。软件制造商很容易建立一套自动过滤系统,使你和孩子们在菜单上见不到不想见到的内容。(就好像所有的内容都被包装了起来,并在包装纸上贴有标签。)如果有人在色情材料上贴上“童趣”的标签,便可能会因错贴标签而被起诉。

  Without a lot of fanfare , private enterprises and local groups are already producing a variety of labeling services ,along with kid-oriented sites like Kidlink and Kid's Space .People differ in their tastes and values and can find services on the Net that suit them in the same way they select books and magazines . Or they can wonder freely if they prefer , making up their own itinerary .

  一些私人组织和地方团体已经在不声不晌地建立各种标签服务系统,并建立了适合儿童的网站,如“儿童连接”、“儿童空间”等。具有不同品味和抱有不同价值观念的人如同挑选书刊、杂志一样,可以从网上挑选出适合自己的服务机构。如果愿意,他们还可以在网上无拘无束地逍遥漫游,完成自己的旅程。

  In the end , our society needs to grow up . Growing up means understanding thtat there are no perfect answers , no all-purpose solutions , no government sanctioned safe havens .We haven't created a perfect society on earth , and we won't have one in cyberspace either . But at least we can have individual choice and individual responsibility .

  总之,我们的社会需要发展,要发展就意味着我们必须明白,世上没有完美无缺的答案,没有能够解决各种问题的妙方,没有政府认可的安全避难所。我们不能在地球上建立一个十全十美的社会,同样也不能在信息空间营造一个这样的社会。但是至少我们可以有个人的选择——也有个人的责任。

推荐文章

河南高考排名180740左右排位文科可以上哪些大学,具体能上什么大学2024-06-09 06:53:39

河南高考排名291880左右排位文科可以上哪些大学,具体能上什么大学2024-06-09 06:48:44

湖南高考排名218820左右排位物理可以上哪些大学,具体能上什么大学2024-06-09 06:44:55

江苏高考排名44380左右排位历史可以上哪些大学,具体能上什么大学2024-06-09 06:41:42

山东高考排名39020左右排位综合可以上哪些大学,具体能上什么大学2024-06-09 06:37:04

贵州高考排名63120左右排位理科可以上哪些大学,具体能上什么大学2024-06-09 06:32:52

龙井题名记课文翻译2023-08-11 23:18:02

善待挫折 阅读答案2023-08-21 14:37:31

外贸英语函电课文翻译2023-08-10 14:23:11

学术综合英语2课文翻译2023-08-13 00:52:48

龙井题名记课文翻译2023-08-11 23:18:02

外贸英语函电课文翻译2023-08-10 14:23:11

学术综合英语2课文翻译2023-08-13 00:52:48

人教版草船借箭课文原文2023-08-27 17:44:15

送东阳马生序课文原文2023-08-20 05:01:23

卡罗纳课文片断赏析2023-08-21 00:14:13

最新文章

热门排序