-
(单词翻译:双击或拖选)
(1)It's near impossible to defend oneself from the kind of cyber attack that targeted Google Inc. and more than 30 other companies. But for the average computer user there are some common-sense steps that can help protect against viruses and other malicious1 computer code.
(1)对于针对谷歌 (Google Inc.)以及其他30多个公司的网络攻击,个人几乎毫无招架之力。但对普通计算机用户来说,只需采取一些常识性步骤即可免受病毒和其他恶意代码的侵扰。
一Install anti-virus software. (2) This can protect a computer against known malicious programs that could allow a hacker2 to steal personal information. Cyber criminals release thousands of new programs each day so it is important to update anti-virus software.
安装杀霉软件。(2)这样可将已知恶意程序拒之门外,以防黑客窃取个人信息。网络罪犯每天发布数千个新程序,因此及时更新杀毒软件十分重要。
一Install software patches. Companies such as Microsoft Corp. and Adobe3 Systems Inc. are constantly issuing small updates to the Windows operating system and PDF reader in response to newly identified security bugs4. Users should be sure to install these so-called patches.
安装软件补丁。微软和奥多比系统公司等公司均不断发布小的的更新程序以修补Windows操作系统和 PDF reader程序中新发现的安全漏洞。用户应当及时安装这些补丁。
—Be suspicious. Consider attachments5 to emails, links on social-networking sites and files for download on Web sites guilty until proven innocent. These are the most common ways that criminals load malicious software onto a victim's computer.
保持戒心。除非确保安全无毒,否则一律将电子邮件附件、社交网站链接和网站上的可下载文件视同病毒处理。这些是罪犯将恶意软件传送到受害者计算机的最常用伎俩。
Be vigilant6 in public. Sign out of your Gmail, Yahoo or Hotmail account when using a public computer and clear the Web browser7's cache, cookies and history. Then close the browser.
在公共场合保持警惕。用公共计算机登录Gmai1、雅虎 (Yahoo)或 Hotmail邮箱后应登出,清空浏览器缓存、 cookie和历史,然后关闭浏览器。
People with access to sensitive information need to take extra precautions. (3) They could be targeted by hacker who could takes steps,including sending malicious software in an email that appears to come from someone the victim knows. One way to guard against this is to encrypt important files. Also, businesses should deploy8 systems that track where sensitive information is being sent.
接触敏感信息的人士需特别小心。 (3)他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。重要文件加密是有效的保护措施之一。公司用户还应当配备能够跟踪敏感信息发送路径的系统。
一Use strong passwords. Create passwords that are a mix of numbers, letters and symbols. Don't use common words or personal information. Don't use the same password on multiple sites. Put one on your cellphone.
使用安全密码。使用包含数字、字母和符号的温合密码 g不要以常用单词或个人信息作为密码,不要在多个站点使用同一密码,手机也要设置密码。
四六级句型讲解
It's near impossible to defend oneself from the kind of cyber attack that targeted Google Inc. and more than 30 other companies.
本句是一个复合句。It是形式主语,真正的主语是后面的to defend oneself...companies不定式短语。其中that引导限制性定语从句,修饰 cyber attack。
语法重点:形式主语,定语从句
2. This can protect a computer against known malicious programs that could allow a hacker to steal personal information.
本句是一个复合句,that引导限制性定语从句,修饰programs。to steal personal information是allow的宾语补足语。
语法重点:定语从句,宾语补足语
3. They could be targeted by hacker who could takes steps,including sending malicious software in an email that appears to come from someone the victim knows.
本句是一个复合句,主句是they could be targeted by a hacker。 who引导限制性定语从句,修饰hacker。其中including...email现在分词短语作伴随状语。that引导定语从句,修饰email。
语法重点:定语从句,分词短语作状语
点击收听单词发音
1 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
2 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
3 adobe | |
n.泥砖,土坯,美国Adobe公司 | |
参考例句: |
|
|
4 bugs | |
adj.疯狂的,发疯的n.窃听器( bug的名词复数 );病菌;虫子;[计算机](制作软件程序所产生的意料不到的)错误 | |
参考例句: |
|
|
5 attachments | |
n.(用电子邮件发送的)附件( attachment的名词复数 );附着;连接;附属物 | |
参考例句: |
|
|
6 vigilant | |
adj.警觉的,警戒的,警惕的 | |
参考例句: |
|
|
7 browser | |
n.浏览者 | |
参考例句: |
|
|
8 deploy | |
v.(军)散开成战斗队形,布置,展开 | |
参考例句: |
|
|