版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
..Reading:Text11.Matchthewordswiththeirdefinitions.1g2a3e4b5c6d7j8f2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1symbolic2distributed3site4complex5identify6fairly7straightforward8capability9target10attempt11process12parameter13interpretation14technical15range16exploit17networking18involve19instance20specification21accompany22predictable23profile3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.rangingfrom〔從……到arisefromsomemisunderstandings〔來自于對……誤解leavesalotofproblemsunsolved〔留下很多問題沒有得到解決opensapathfor〔打開了通道requiresadifferentframeofmind〔需要有新的思想4.TranslatethefollowingsentencesfromText1intoChinese.1>有些人聲稱黑客是那些超越知識疆界而不造成危害的好人〔或即使造成危害,但并非故意而為,而"駭客"才是真正的壞人。2>這可以指獲取計算機(jī)系統(tǒng)的存儲內(nèi)容,獲得一個系統(tǒng)的處理能力,或捕獲系統(tǒng)之間正在交流的信息。3>那些系統(tǒng)開發(fā)者或操作者所忽視的不為人知的漏洞很可能是由于糟糕的設(shè)計造成的,也可能是為了讓系統(tǒng)具備一些必要的功能而導(dǎo)致計劃外的結(jié)果。4>另一種是預(yù)先設(shè)定好程序?qū)μ囟ㄒ资芄魧ο筮M(jìn)行攻擊,然而,這種攻擊是以鳥槍式的方式發(fā)出的,沒有任何具體目標(biāo),目的是攻擊到盡可能多的潛在目標(biāo)。5>另外,考慮安裝一個硬件防火墻并將從互聯(lián)網(wǎng)中流入和流出的數(shù)據(jù)限定在幾個真正需要的端口,如電子郵件和網(wǎng)站流量。Reading:Text21.Matchthewordswiththeirdefinitions.1d2f3h4i5a6e7b8j9g2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1compromised2notoriety3interchangeably4malfunctioned5squeeze6ingenious7emergence8humble9Cunning10vulnerability11criminal12patches13sinister14daunting15replicate16malicious17spirals18secure19blur20stem21disrepute22sophisticated23harness24recipient25convert3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.Thereisevidence〔有證據(jù)表明sohasthenumberofhackers〔黑客的數(shù)量也有很大增長areoftenreferredtoas〔往往被稱之為compromiseyourcomputer〔損壞你的計算機(jī)captureyourinformation〔獲取你的信息accessyourcomputer〔進(jìn)入你的計算機(jī)4.TranslatethefollowingsentencesfromText2intoChinese.1看似無害的編程錯誤可能被利用,導(dǎo)致電腦被侵入,為電腦病毒和蠕蟲的繁衍提供溫床。2當(dāng)一個軟件漏洞被發(fā)現(xiàn),黑客可以將它變成一個侵入點,從而造成極大的破壞。在這之前,往往需要爭分奪秒地利用正確的軟件補(bǔ)丁來防止破壞的發(fā)生。3最簡單的釣魚騙局試圖利用迅速致富的伎倆誘使詐騙目標(biāo)寄錢。但網(wǎng)絡(luò)騙子們也變得越來越狡猾,最近的陷阱是通過發(fā)送客戶服務(wù)的電子郵件讓用戶進(jìn)入假銀行或商業(yè)網(wǎng)站,并在那里請他們"重新輸入"他們的賬戶信息。4間諜軟件與垃圾郵件和釣魚網(wǎng)絡(luò)一起,構(gòu)成了三個令人生厭的互聯(lián)網(wǎng)害蟲。盡管有些程序可以通過入侵軟件漏洞從而進(jìn)入電腦,但這些有害而秘密的程序通常會隨著其他免費的應(yīng)用軟件侵入到計算機(jī)系統(tǒng)中。5盡管因特網(wǎng)已經(jīng)徹底改變了全球通訊,但是對于那些利用網(wǎng)絡(luò)力量實現(xiàn)罪惡目的的人和那些負(fù)責(zé)阻止這些網(wǎng)絡(luò)犯罪的人來說,他們之間的較量才剛剛開始。Reading:Text31.Matchthewordswiththeirdefinitions.1f2d3e4j5i6h7b8a2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1irrespective2betailored3prone4opt5maximum6coded7provision8catered9check10ready-made11modified12on-demand13whereabouts14Hazardous15incurred16applicable17developer18onoffer19host20nominal21certified22automated23outage24sync25backup26minimal27mobile3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.Irrespectiveofwhether〔不管saveusersthetrouble〔使用戶避免這樣的麻煩caterstotheneedsof〔迎合了需求forthepurposeof〔其目的就是4.TranslatethefollowingsentencesfromText3intoChinese.1云計算可定義為一種按次付費模式,這種模式可以根據(jù)要求迅速得到計算機(jī)分配的可靠資源,用戶很少需要自己進(jìn)行管理。2由于云計算可以用來不斷提供資源,因此當(dāng)你需要擴(kuò)充計算機(jī)容量時就不需要去買硬件,就不會因為用電去冷卻計算機(jī)設(shè)備而產(chǎn)生更多的二氧化碳。3這意味著他們不需要開車到辦公地點。這就可以省去燃料費,減少二氧化碳排放,從而保護(hù)了環(huán)境。4萬一斷電,客戶可以在電腦再啟動時使用和主機(jī)同步的備份。5除此之外,云計算還不容易受到黑客入侵和分布式拒絕服務(wù)的攻擊,因為攻擊者不知道數(shù)據(jù)的位置。Reading:Text41.Matchthewordswiththeirdefinitions.1c2e3a4i5g6b7d8f9j10h2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1analogy2compatible3Distribute4implement5activated6static7aggregated8clone9innovative10replacement11crashed12compromised13mine14substantial15asset16centralize17facilities18loose19monitor20integrate21derived22update23download24upgrade25licensed26differential27install28minimum29in-house30crucial3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.remainswideopen〔有很大的前景isderivedfromthewayinwhich〔來自這樣一個方法becomescrucial〔非常重要willbesubstantiallyreduced〔會大大降低4.TranslatethefollowingsentencesfromText4intoChinese.1這個術(shù)語來自于因特網(wǎng)往往呈現(xiàn)為網(wǎng)絡(luò)圖的方法。2目前云計算技術(shù)涉及一個數(shù)據(jù)中心的存在,這個中心能夠為全世界用戶提供服務(wù)。3這就減少了由于沒有硬件,如手提電腦帶來的影響。4虛擬化可以使一個損壞的云端服務(wù)器迅速找到替代品而不造成大的損失或破壞。5云技術(shù)還處于起步階段,更多新的優(yōu)點會不斷被發(fā)現(xiàn)。III.LectureListeningListening:Lecture11.TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.2.BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.3.NumberEight.4.NumberNine.5.Respectandfairness.6.Lecture1addressesthetopic"howacomputeruseravoidsbeingaconsciousorunconscioushacker"whileText1and2dealwiththewayhackers"getinside"acomputerandelectronicthreatsacomputerfaces.7.TenCommandmentsofComputerEthics.Lecture1Computerethics8Goodmorning.DidanyonehearthenewsabouttheteenagerinNewYorkwhohackedintoabank’sdatabaseandstoleabout30,000creditcardnumbersovertheweekend?Hackingisrelatedtocomputerethics.Computerethicsdealswiththeproperuseofinformationtechnology,suchascomputersandtheInternet.Byproperuse,Imeansociallyresponsibleuse.We’llfirsttalkaboutwhatethicalbehaviorisandthenhowthisappliestocomputeruse.Ethicsisaboutrightandwrongoritdealswithmoraljudgment,withwhatisacceptableorunacceptabletodo.Nowwelearnideasaboutwhatisrightandwrongfromourfamilies,ourfriends,andfromtheculturewelivein.Becauseofdifferencesinourbackgrounds,wemaynotalwaysagreeonwhatisrightandwrong.However,forourdiscussiontoday,IwilldefineforyouwhatImeanbyanethicalaction.Anethicalactionissomethingsomeonedoesthatbenefitssomeoneanddoesn’thurtanyone.So,forexample,ifyouseeamandropsomemoneyandyoupickthemoneyupandgiveittohim,thisisanethicalaction.Ontheotherhand,ifyoupickupthemoneyanddon’tgiveitbacktotheman,thisbenefitsyou,buthurtstheman.Thisisnotanethicalaction.Nowwhataboutcomputers?WhataretheethicalboundariesforusingcomputersandInternet?Mostpeopleagreethatitiswrongtostealfromastore.Wouldtheyalsosayit’swrongtocopymusicfilesfromtheInternet?Or,totakeanotherexample,mostpeopleagreethatitiswrongtoopenanenvelopeandreadalettertosomeoneelse.Wouldtheyalsosayit’swrongtoreadsomeoneelse’semail?Inthepastdecadeorso,manymorepeoplehavestartedusingcomputersandtheInternet,sotheseissueshavebecomeimportant.In1992,theComputerEthicsInstitutewasfoundedintheUnitedStates.Thisisaresearch,education,andpolicystudygroupwhosegoalistoincreaseawarenessoftheethicalissuesthatarelikelytocomeupastechnologydevelops.OneconcepttheComputerEthicsInstitutehasdevelopedistheTenCommandmentsofComputerEthics.TheserulesareimportantguidelinestheInstitutethinksallcomputerusersshouldfollow.NowsomeofyoumaybefamiliarwiththeTenCommandmentsfromtheBible,like,uh,"Thoushaltnotkill."or"Thoushalthonorthyfatherandthymother."TheTenCommandmentsofComputerEthicshavebeenwritteninthesamestyleoflanguageusedintheTenCommandmentsfromtheBible.Forexample,theyusethephrase"Thoushaltnot","Thoushaltnot"means"don’t"or"youshouldn’t".Let’slookateachcommandmentorrule.Thefirstcommandmentsays:Thoushaltnotuseacomputertoharmotherpeople.Simpleenough,right?NumberTwo:Thoushaltnotinterferewithotherpeople’scomputerwork.Iinterpretthistomeandon’tuseacomputerinanywaythatwillaffectorchangetheworksomeoneelseisdoing.Don’tmoveoreditsomeoneelse’sfileswithouttellingthem.NumberThree:Thoushaltnotsnoopinotherpeople’sfiles.Tosnoopmeanstotrytofindoutsomethingwithoutanotherpersonknowingit.Ifyoulookatsomeoneelse’sfilesonthecomputerorreadtheiremail,you’resnooping.Respectotherpeople’sprivacy.NumberFour:Thoushaltnotuseacomputertosteal.TherearesituationsontheInternetinwhichyouhavetodecideifyouarestealingornot,likedownloadingmusicfiles,asImentionedearlier.NumberFive:Thoushaltnotuseacomputertosaythingsthatareuntrue.Itisuptoyoutobetruthfulinyourwebsite,inyoure-business,andinyouremail.NumberSix:Thoushaltnotusesoftwareforwhichyouhavenotpaid.Inotherwords,ifthesoftwareisfreeontheInternet,it’sokaytodownloadanduseit.However,itisnotokaytocopysoftwarefromafriend,becauseyoudidn’tpayforit.NumberSeven:Thoushaltnotuseotherpeople’scomputerresourceswithouttellingthem,orwithoutpayingthem.Forexample,youshouldn’tusesomeoneelse’scomputer,password,orInternetconnectionwithoutaskingthemfirst.NumberEight:Thoushaltnotappropriatesomeoneelse’sideas.Appropriatemeanstotakewordssomeoneelsewroteandsaythey’reyours.Uh,forexample,youhavetowriteareportforschool.IfyoucopyatermpaperfromtheInternetandhanditin,you’rebreakingtherule.CopyingevenafewsentencesofftheInternetandpresentingthemasyourownisbreakingtherule.NumberNine:Theninthcommandmentsays:Thoushaltthinkaboutthesocialconsequencesoftheprogramyouarewriting.Now,thisappliesmostlytocomputerprogrammers.Socialconsequencesmeanshowtheprogramyou’rewritingmightaffectothersinsociety.Couldhackerspossiblyuseyourprogramtoillegallygainaccesstoacomputersystem?Skillfulhackerscanhackintobanksandintocreditcardcompanies;theycanalteraccountsandstealmoney.Theycanalsocreatevirusesthatcancausebillionsofdollarsofdamageworldwide.NumberTen,Thetenthcommandmentsays:Thoushaltalwaysuseacomputerinwaysthatarerespectfulofothers.Forexample,sendingunfriendlyemailtosomeoneoraboutsomeoneorcreatingwebsiteswithnegativemessagesareexamplesofbreakingthisrule.OK,theComputerEthicsInstitutehassenttheseguidelinestomanylargecompaniesandtoschoolsacrosstheUnitedStates.However,there’snowaytoenforcetheserules.Nevertheless,theywouldliketoseeschools,inparticular,utilizetheserulestohelpstudentsdevelopastrongsenseofcomputerethics.Well,therearealotofrules,buttheyallboildowntoacoupleofprinciples:respectandfairness.Respectwhatbelongstoothersanduseresourcesfairly.Nowlet’sgobacktoethics.Nowincreasingly,schoolsareseeingthatstudentsneedtobetaughtcomputerethicsaspartoftheschoolcurriculum.Someschoolshavecomeupwithacceptable-usepolicies,orrulesaboutwhatisorisn’tOKforstudentstodoregardingcomputeruse.ThisishowtheComputerEthicsInstitutewouldliketoseeschoolsutilizingtherules.Generally,it’sconsideredwrongtostealsomeoneelse’spasswordortoreadsomeelse’semail.It’salsoconsideredunacceptableincollegeclassesforastudenttodownloadatermpaperofftheInternetandpretendthatheorshewroteit.Thisiscalled"plagiarism",andit’sagoodexampleofbreakingRuleNumberEight.StudentsarepermittedtousetheInternetforresearch,butareinstructedtowritetheinformationintheirownwordsandtoexplainwheretheygottheinformation.Nowthetenrulesareguidelinesforustofollow.Theseruleshelpustobeawareoftheethicalusesoftechnology.Let’sstopherefortoday.Thinkabouttheserulesthisweekandwe’lltalkaboutthem.Andreadthenexttwochaptersfornextweek.Listening:Lecture21It’sasophisticatedgroupofpoliticallymotivatedhackers.2Weshouldtalktohackersandmakeuseofthem.3Theydobusinessbyusingtheescrowsystem.4Hackerswhohavedisabilitieslikeautism.5Recruitingandmobilizinghackersonbehalfofthestate.6FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.7UnderstandandMakeUseofHackers.Lecture2Computerhackers!Nowthisisaveryun-TED-likethingtodo,butlet’skickofftheafternoonwithamessagefromamysterysponsor.Anonymous:DearFoxNews,ithascometoourunfortunateattentionthatboththenameandnatureofAnonymoushasbeenravaged.Weareeveryoneandwearenoone.Weareanonymous.Wearelegion.Wedonotforgive.Wedonotforget.Wearethebaseofchaos.Anonymous,ladiesandgentlemen—asophisticatedgroupofpoliticallymotivatedhackerswhohaveemergedin2011.Andthey’reprettyscary.Youneverknowwhenthey’regoingtoattacknext,whoorwhattheconsequenceswillbe.Butinterestingly,theyhaveasenseofhumor.TheseguyshackedintoFoxNews’TwitteraccounttoannouncePresidentObama’sassassination.NowyoucanimaginethepanicthatwouldhavegeneratedinthenewsroomatFox."Whatdowedonow?Putonablackarmband,orcrackopenthechampagne?"<Laughter>Andofcourse,whocouldescapetheironyofamemberofRupertMurdoch’sNewsCorp.beingavictimofhackingforachange.<Laughter,applause>Sometimesyouknowyouturnonthenewsandyousay,"Isthereanyonelefttohack?"SonyPlayStationNetwork—done;thegovernmentofTurkey—tick,Britain’sSeriousOrganizedCrimeAgency—abreeze,theCIA—fallingoffalog.Infact,afriendofminefromthesecurityindustrytoldmetheotherdaythattherearetwotypesofcompaniesintheworld:thosethatknowthey’vebeenhacked,andthosethatdon’t.ImeanthreecompaniesprovidingcybersecurityservicestotheFBIhavebeenhacked.Imeanisnothingsacredanymore,forheaven’ssake?Anyway,thismysteriousgroupAnonymous—andtheywouldsaythisthemselves—theyareprovidingaservicebydemonstratinghowuselesscompaniesareatprotectingourdata.ButthereisalsoaveryseriousaspecttoAnonymous—theyareideologicallydriven.Theyclaimthattheyarebattlingadastardlyconspiracy.TheysaythatgovernmentsaretryingtotakeovertheInternetandcontrolit,andthatthey,Anonymous,aretheauthenticvoiceofresistance—beitagainstglobalmediacorporations,oragainstintelligenceagencies,orwhoeveritis.Andtheirpoliticsarenotentirelyunattractive.Okay,they’realittleinchoate.There’sastrongwhiffofsortofhalf-bakedanarchismaboutthem.Butonethingistrue:WeareatthebeginningofamightystruggleforcontroloftheInternet.TheWeblinkseverything,andverysoonitwillmediatemosthumanactivity.BecausetheInternethasfashionedanewandcomplicatedenvironmentforanold-agedilemmathatpitsthedemandsofsecuritywiththedesireforfreedom.Nowthisisaverycomplicatedstruggle.Andunfortunately,formortalslikeyouandme,weprobablycan’tunderstanditverywell.Nonetheless,inanunexpectedattackofhubrisacoupleofyearsago,IdecidedIwouldtryanddothat.AndIsortofgetit.ThesewerethevariousthingsthatIwaslookingatasIwastryingtounderstandit.Butinordertotryandexplainthewholething,Iwouldneedanother18minutesorsotodoit,soyou’rejustgonnahavetotakeitontrustfrommeonthisoccasion,andletmeassureyouthatalloftheseissuesareinvolvedincybersecurityandcontroloftheInternetonewayortheother,butinaconfigurationthatevenStephenHawkingwouldprobablyhavedifficultytryingtogethisheadaround.Sothereyouare.Andasyousee,inthemiddle,thereisouroldfriend,thehacker.Thehackerisabsolutelycentraltomanyofthepolitical,socialandeconomicissuesaffectingtheNet.AndsoIthoughttomyself,"Well,thesearetheguyswhoIwanttotalkto."Andwhatdoyouknow,nobodyelsedoestalktothehackers.They’recompletelyanonymous,asitwere.Sodespitethefactthatwearebeginningtopourbillions,hundredsofbillionsofdollars,intocybersecurity—forthemostextraordinarytechnicalsolutions—noonewantstotalktotheseguys,thehackers,whoaredoingeverything.Instead,wepreferthesereallydazzlingtechnologicalsolutions,whichcostahugeamountofmoney.Sonothingisgoingintothehackers.Well,Isaynothing,butactuallythereisoneteenyweenylittleresearchunitinTurin,Now,sofarI’vementionedthehackersAnonymouswhoareapoliticallymotivatedhackinggroup.Ofcourse,thecriminaljusticesystemtreatsthemascommonoldgardencriminals.Butinterestingly,Anonymousdoesnotmakeuseofitshackedinformationforfinancialgain.Butwhatabouttherealcybercriminals?Well,realorganizedcrimeontheInternetgoesbackabout10yearswhenagroupofgiftedUkrainianhackersdevelopedawebsite,whichledtotheindustrializationofcybercrime.WelcometothenowforgottenrealmofCarderPlanet.ThisishowtheywereadvertisingthemselvesadecadeagoontheNet.NowCarderPlanetwasveryinteresting.Cybercriminalswouldgotheretobuyandsellstolencreditcarddetails,toexchangeinformationaboutnewmalwarethatwasoutthere.Andremember,thisisatimewhenwe’reseeingforthefirsttimeso-calledoff-the-shelfmalware.Thisissortofreadyforuse,out-of-the-boxstuff,whichyoucandeployevenifyou’renotaterriblysophisticatedhacker.AndsoCarderPlanetbecameasortofsupermarketforcybercriminals.Anditscreatorswereincrediblysmartandentrepreneurial,becausetheywerefacedwithoneenormouschallengeascybercriminals.Andthatchallengeis:Howdoyoudobusiness,howdoyoutrustsomebodyontheWebwhoyouwanttodobusinesswithwhenyouknowthatthey’reacriminal?<Laughter>Imeanit’saxiomaticthatthey’redodgy,andthey’regoingtowanttotryandripyouoff.Sothefamily,astheinnercoreofCarderPlanetwasknown,cameupwiththisbrilliantideacalledtheescrowsystem.Theyappointedanofficerwhowouldmediatebetweenthevendorandthepurchaser.Thevendor,say,hadstolencreditcarddetails;thepurchaserwantedtogetholdofthem.Thepurchaserwouldsendtheadministrativeofficersomedollarsdigitally,andthevendorwouldsellthestolencreditcarddetails.Andtheofficerwouldthenverifyifthecreditcard,thestolencreditcardsworked.Andiftheydid,hethenpassedonthemoneytothevendorandthestolencreditcarddetailstothepurchaser.AnditwasthiswhichcompletelyrevolutionizedcybercrimeontheWeb.Andafterthat,itjustwentwild.WehadachampagnedecadeforpeopleweknowasCarders.NowIspoketooneoftheseCarderswhowe’llcallRedBrigade—althoughthatwasn’tevenhispropernickname—butIpromisedIwouldn’trevealwhohewas.Andheexplainedtomehowin2003and2004hewouldgoonspreesinNewYork,takingout$10,000fromanATMhere,$30,000fromanATMthere,usingclonedcreditcards.Hewasmaking,onaverageaweek,$150,000—taxfreeofcourse.Andhesaidthathehadsomuchmoneystashedinhisupper-Eastsideapartmentatonepointthathejustdidn’tknowwhattodowithitandactuallyfellintoadepression.Butthat’saslightlydifferentstory,whichIwon’tgointonow.NowtheinterestingthingaboutRedBrigadeisthathewasn’tanadvancedhacker.Hesortofunderstoodthetechnology,andherealizedthatsecuritywasveryimportantifyouweregoingtobeaCarder,buthedidn’tspendhisdaysandnightsbentoveracomputer,eatingpizza,drinkingcokeandthatsortofthing.Hewasoutthereonthetownhavingafabtimeenjoyingthehighlife.Andthisisbecausehackersareonlyoneelementinacybercriminalenterprise.Andoftenthey’rethemostvulnerableelementofall.AndIwanttoexplainthistoyoubyintroducingyoutosixcharacterswhoImetwhileIwasdoingthisresearch.DimitryGolubov,akaSCRIPT—borninOdessa,Ukrainein1982.NowhedevelopedhissocialandmoralcompassontheThenwehaveRenukanthSubramaniam,akaJiLsi—founderofDarkMarket,borninColombo,SriLanka.Asaneight-year-old,heandhisparentsfledtheSriLankancapitalbecauseSinghalesemobswereroamingthecity,lookingforTamilslikeRenutomurder.At11,hewasinterrogatedbytheSriLankanmilitary;accusedofbeingaterrorist,andhisparentssenthimonhisowntoBritainasarefugeeseekingpoliticalasylum.At13,withonlylittleEnglishandbeingbulliedatschool,heescapedintoaworldofcomputerswhereheshowedgreattechnicalability,buthewassoonbeingseducedbypeopleontheInternet.Hewasconvictedofmortgageandcreditcardfraud,andhewillbereleasedfromWormwoodScrubsJailinMatrix001,MatrixLunarAnx,whowasanadministratoratDarkMarket.BorninSouthernGermanytoastableandwell-respectedmiddleclassfamily,hisobsessionwithgamingasateenagerledhimtohacking.Andhewassooncontrollinghugeserversaroundtheworldwherehestoredhisgamesthathehadcrackedandpirated.Hisslideintocriminalitywasincremental.Andwhenhefinallywokeuptohissituationandunderstoodtheimplications,hewasalreadyintoodeep.MaxVision,akaICEMAN—mastermindofCardersMarket.BorninMeridian,Idaho.MaxVisionwasoneofthebestpenetrationtestersworkingoutofSantaClara,Californiainthelate90sforprivatecompaniesandvoluntarilyfortheFBI.Nowinthelate1990s,hediscoveredavulnerabilityonallAdewaleTaiwo,akaFreddyBB—masterbankaccountcrackerfromAbujainNigeria.Hesetuphisprosaicallyentitlednewsgroup,bankfraudsyahoo.co.ukbeforearrivinginBritainin2005totakeaMastersinchemicalengineeringatManchesterUniversityAndthenfinally,CagatayEvyapan,akaChao—oneofthemostremarkablehackersever,fromAnkarainTurkey.Hecombinedthetremendousskillsofageekwiththesuavesocialengineeringskillsofthemastercriminal.OneofthesmartestpeopleI’veevermet.Healsohadthemosteffectivevirtualprivatenetworksecurityarrangementthepolicehaveeverencounteredamongstglobalcybercriminals.Nowtheimportantthingaboutallofthesepeopleistheysharecertaincharacteristicsdespitethefactthattheycomefromverydifferentenvironments.Theyareallpeoplewholearnedtheirhackingskillsintheirearlytomid-teens.Theyareallpeoplewhodemonstrateadvancedabilityinmathsandthesciences.Rememberwhentheydevelopedthosehackingskills,theirmoralcompasshadnotyetdeveloped.Andmostofthem,withtheexceptionofSCRIPTandChao,well,theydidnotdemonstrateanyrealsocialskillsintheoutsideworld—onlyontheWeb.AndtheotherthingisthehighincidenceofhackerslikethesewhohavecharacteristicswhichareconsistentwithAsperger’ssyndrome.NowIdiscussthiswithProfessorSimonBaron-Cohenwho’stheprofessorofdevelopmentalpsychopathologyatCambridge.Andhehasdonepath-breakingworkonautismandconfirmed,alsofortheauthoritieshere,thatGaryMcKinnon—whowaswhoiswantedbytheUnitedStatesforhackingintothePentagon—suffersfromAsperger’sandasecondaryconditionofdepression.AndBaron-Cohenexplainedthatcertaindisabilitiescanmanifestthemselvesinthehackingandcomputingworldastremendousskills,andthatweshouldnotbethrowinginjailpeoplewhohavesuchdisabilitiesandskillsbecausetheyhavelosttheirwaysociallyorbeenduped.NowIthinkwe’remissingatrickhere,becauseIdon’tthinkpeoplelikeMaxVisionshouldbeinjail.Weneedtoengageandfindwaysofofferingguidancetotheseyoungpeople,becausetheyarearemarkablebreed.Andifwerely,aswedoatthemoment,solelyonthecriminaljusticesystemandthethreatofpunitivesentences,wewillbenurturingamonsterwecannottame.Thankyouverymuchforlistening.Listening:Lecture31.Itcandisplaydifferentkindsofcolordependingonone’sfortune.2Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.3Theappstore.4Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.5HowshouldiPadbeusedandwhatappsshouldweputontheiPads.6HowCanIGetFascinatedwiththeiPadsandDesignApps?7Maybemostprobablyifhelackssucheducationascomputerethics.Lecture3ComputerapplicationsHello,everyone!MynameisThomasSuarez.I’vealwayshadafascinationforcomputersandtechnology,andImadeafewappsfortheiPhone,iPodtouchandiPad.I’dliketoshareacouplewithyoutoday.MyfirststepwasauniquefortunetellercalledEarthFortune,thatwoulddisplaydifferentcolorsofearthdependingonwhatyourfortunewas.MyfavoriteandmostsuccessfulappisBustinJieber,whichistheJustinBieberwackmal.IcreateditbecausealotofpeopleatschooldislikeJustinBieberalittlebit,soIdecidedtomaketheapp,soIwenttoworkprogrammingitandIreleaseditjustbeforetheholidaysin2010.AlotofpeopleaskedmehowdidImakethis?Alotoftimejustbecausethepersonwhoaskedthequestionwantstomakeanappalso.Alotofkidsthesedaysliketoplaygames,butnowtheywanttomakethemandit’sdifficult.Becausenotmanykidsknowwheretogotofindouthowtomakeaprogram.Imeanforsocceryoucouldgotoasoccerteam,forviolinyoucouldgetlessonsforaviolin,butwhatifyouwanttomakeanapp?Andtheirparents,thesekids’parentsmighthavedonethesethingswhentheywereyoung,butnotmanyparentshavemadeapps.Wheredoyougotofindouthowtomakeanapp.Well,thisishowIapproachedit,thisiswhatIdid.Firstofall,I’vebeenprogramminginmultipleotherprogramsjusttogetthebasicsdown,suchasthePython,C,Javaetc.AndthenApplereleasedtheiPhoneandwithit,theiPhonesoftwaredevelopingkit,andsoftwaredevelopingkitisasweetoftoolsforcreatingandprogramminganiPhoneapp.Thisopenedupawholenewworldofpossibilitiesforme,andafterplayingwiththesoftdevelopingkitalittlebitImadeacoupleappsandmadesometestapps,oneofthemhappenedtobeEarthFortune.IwasreadytoputEarthFortuneontheappstore,andsoIpersuadedmyparentstopaythe$99feetobeabletoputmyappsontheappstore.TheyagreedandnowIhaveappsontheappstore.I’vegotalotinterestingencouragementfrommyfamily,friends,
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2026年貴州城市職業(yè)學(xué)院單招綜合素質(zhì)考試備考題庫含詳細(xì)答案解析
- 2026年上海外國語大學(xué)賢達(dá)經(jīng)濟(jì)人文學(xué)院高職單招職業(yè)適應(yīng)性測試備考題庫及答案詳細(xì)解析
- 2026年江蘇護(hù)理職業(yè)學(xué)院單招綜合素質(zhì)考試備考題庫含詳細(xì)答案解析
- 2026年江西冶金職業(yè)技術(shù)學(xué)院單招職業(yè)技能考試模擬試題含詳細(xì)答案解析
- 2026年廣東輕工職業(yè)技術(shù)學(xué)院高職單招職業(yè)適應(yīng)性測試模擬試題及答案詳細(xì)解析
- 2026年滁州職業(yè)技術(shù)學(xué)院單招職業(yè)技能考試備考試題含詳細(xì)答案解析
- 2026年上海電機(jī)學(xué)院單招綜合素質(zhì)考試參考題庫含詳細(xì)答案解析
- 2026年山東水利職業(yè)學(xué)院單招職業(yè)技能考試備考試題含詳細(xì)答案解析
- 2026年武漢城市職業(yè)學(xué)院高職單招職業(yè)適應(yīng)性測試備考試題及答案詳細(xì)解析
- 2026年慶陽職業(yè)技術(shù)學(xué)院單招綜合素質(zhì)筆試備考試題含詳細(xì)答案解析
- 胖東來經(jīng)營數(shù)據(jù)全公開管理辦法
- 國企內(nèi)審面試題目及答案
- 瑞幸食品安全培訓(xùn)題庫課件
- 腰果介紹教學(xué)課件
- 豬肉進(jìn)銷存表格-模板
- 中考微機(jī)題型
- 仇永鋒一針鎮(zhèn)痛課件
- 中小學(xué)校食堂建設(shè)配置標(biāo)準(zhǔn)(試行)
- 網(wǎng)絡(luò)安全風(fēng)險自查表與整改措施清單
- 2025年歷年水利部面試真題及答案解析
- 露天礦物開采輔助工技術(shù)考核試卷及答案
評論
0/150
提交評論