[00:01.76]黑客、破坏者和追踪者
[00:03.53]1 Coursing through arteries,replicating along the way,edging into new sites to wreak havoc,
[00:07.13]这种病毒通过主干线,一路繁殖,渐渐扩大范围造成严重破坏,
[00:10.73]the virus at first seemed like any other virus that eventually would be defeated by the host's defense mechanisms.
[00:15.14]最初看起来似乎和别的病毒一样,最初会被主机的防御系统消灭,
[00:19.55]This,however,was a new,more powerful virus,and it would take advantage of the system's weaknesses,
[00:23.49]实际上这是一种新的,更有杀伤力的病毒。能利用系统的弱点多次进行感染。
[00:27.43]infecting and reinfecting as it traveled through the host.
[00:29.93]当它在主机内活动时,进行传染和再传染
[00:32.44]2 The "Internet Worm",as the virus came to be know,
[00:34.90]人们逐渐得知这种病毒名叫“因特尔网虫”。
[00:37.37]worked its way into thousands of computers connected to the national information infrastructure.
[00:40.88]这种病毒侵入了成千上万台与国家信息设施相连的电脑。
[00:44.39]Created by Cornell University student Robert Morris,it infected more than 6,000 systems,
[00:48.33]科内尔大学的学生罗伯特·莫里斯是这种病毒的创造者。它曾使6,000多个系统受到感染。
[00:52.27]jamming hard drives and erasing valuable information before being eliminated in November
[00:55.96]使硬盘失灵,把所有的信息删除掉,直到11月被消灭,
[00:59.65]1988 by engineers at the University of California at Berkeley and at Purdue University in West Lafayette,Indiana.
[01:05.29]直到1988年11月才被加利福尼亚大学伯克利分校和印第安纳州西拉斐特的普度大学的工程师消灭。
[01:10.92]3 That was the first time the Internet and the destructive aims of certain computer experts made the national news.
[01:14.83]就在那一次,因特网和某些电脑专家的破坏性企图首次成为全国新闻。
[01:18.73]It wouldn't be the last.
[01:20.14]但那次不会是最后一次。
[01:21.54]The Internet is just as susceptible to abuse as any other form of computer technology.
[01:25.14]因特网和其他任何形式的电脑技术一样容易被滥用。
[01:28.74]The only difference is that the malicious attack comes through telephone lines and across network connections.
[01:32.74]唯一的区别是,这种病毒的攻击是通过电话线和网络连接的。
[01:36.73]Computer vandals can break into any system.
[01:38.55]电脑破坏分子能闯入任何系统,
[01:40.37]Whether it is transportation,finance or defense,no system is 100-percent safe.There will always be individuals who,for one reason or another,are eager to discover the weak spot in order to penetrate the system.
[01:49.22]不管是交通、金融,还是防御系统,没有哪个系统是百分之百安全的。总有些人为了各种各样的原因迫切地想发现系统的薄弱点而侵入系统。
[01:58.08]4 Who are these individuals and what do they want?
[01:59.84]这些人是谁,他们想干什么?
[02:01.61]Generally,people who break into computer systems are called"hackers".
[02:04.51]这些闯入电脑系统的人一般被称为“黑客”。
[02:07.40]Irrespective of their aims,
[02:08.63]无论他们的目的是什么,
[02:09.85]they tend to inspire a certain admiration because they are extremely clever and infinitely more knowledgeable than the average computer user.
[02:14.80]他们往往受人钦佩,因为他们极其聪明,比一般的电脑用户知识渊博得多。
[02:19.75]Breaking into computer systems--whether it is on the Internet,
[02:22.02]闯入电脑系统——无论是因特网,
[02:24.29]in a bank or a government office--is an illegal activity.
[02:26.75]银行或是政府机关的系统——都是违法行为。
[02:29.22]However,"ordinary?"hackers
[02:30.62]但是“普通”黑客
[02:32.03]who penetrate and explore systems just for the intellectual challenge are regarded as less dangerous than"crackers".
[02:36.49]人们往往认为那样仅仅为了智力上的挑战而侵入或探索系统的黑客不像“破坏者”那些危险。
[02:40.96]The latter are people who break into systems in order to steal or to destroy information.
[02:44.50]“破坏者”是为了窃取或毁坏信息而闯入系统的人。
[02:48.05]They also can remove money from accounts,
[02:49.54]某些黑客还能从帐户中提走钱,
[02:51.04]as Russian "crackers"demonstrated when they stole $ 10 million from Citibank's cash-management system in 1994 |