-
(单词翻译:双击或拖选)
Voice 1
Voice 2
And I'm Robin2 Basselin. Spotlight uses a special English method of broadcasting. It is easier for people to understand, no matter where in the world they live.
Voice 1
On January 12, 2010, the world's largest internet company, Google, made a major announcement. It announced that their computer systems had been hacked4. An unknown person or group of people had used computer skills to illegally enter Google's systems. The hackers6 stole important information. This major computer attack was reported in the news around the world. In fact, this computer attack did not only affect Google. The hackers also attacked over 30 other large companies like Adobe7, Yahoo and Dow Chemical.
Voice 2
This famous act of computer hacking8 was very complex. The hackers were extremely intelligent and careful. But they used their computer skills in illegal and negative ways. Many people think of computer hackers as bad people - people who steal knowledge, money and even personal information. However, computer hacking is not always bad. Today's Spotlight is on the positive uses of hacking and the new "Random9 Hacks10 of Kindness" movement.
Voice 1
Like the hackers from the beginning of this program, computer hacking can be a bad thing. Sometimes, hackers find and get information they are not supposed to have. Some hackers steal this information or even destroy computer systems. This kind of a hacker5 is called a black hat hacker. Black hat hackers break into systems without permission. And they use technology in illegal ways or for bad reasons. When most people think of hackers, they think of black hat hackers. However, hacking is just changing a computer program or system to work differently than it did originally. Many times, hackers are able to create new ways of doing things.
Voice 2
There are many different kinds of good hackers. For example, there are also Grey or Blue hat hackers. These hackers find weaknesses or security11 issues for websites, computer programs and computer systems. Grey hat hackers do this work for free because they enjoy it. These hackers usually inform the website or program owner so that they can fix the problem. Blue hat hackers are usually paid to do this work. Companies will ask blue hat hackers to try and hack3 their particular computer products. This helps the company test the security of these products.
Voice 1
White hat hackers are yet another kind of hacker. They usually work for large companies with computer systems, products and websites. They are full time employees. Their job is to continually12 test the security of the company's systems and products.
Voice 2
These examples show that there are many different kinds of hackers. However, all these hackers have one thing in common: they know a lot about computer programs and systems. If this knowledge is used for good reasons, their skills are very valuable.
Voice 1
One organization has recognized the value of hackers. And it is trying to bring the hacking community together for a very good cause. This organization is called "Random Hacks of Kindness." This name comes from another popular movement. It is called "Random Acts of Kindness." You may remember another Spotlight program on "Acts of Kindness." This movement encourages people to do kind things for other people every day - for no reason. It just wants to encourage kindness all over the world. In the same way, "Random Hacks of Kindness" wants to encourage hackers to use their skills in kind ways.
Voice 2
The idea for "Random Hacks of Kindness" began in June of 2009. It came from a technology and crisis13 meeting in Washington, D.C. in the United States. Representatives from global businesses like Google, Yahoo and Microsoft gathered at this meeting. They decided14 that there were global problems that they could help solve. They wanted to "hack for humanity15" and make a positive difference with their hacking.
Voice 1
Soon two other organizations joined: the World Bank and NASA, the United States' air and space organization. The organizations decided to bring hackers and disaster relief workers together. Disaster relief workers are people who help victims of disasters like earthquakes, floods, or even wars. They wanted computer hackers and disaster relief workers to work together at a "Random Hacks of Kindness" conference. They hoped the group could "hack" computer programs to find answers to the greatest problems of disaster victims.
Voice 2
Todd Khozein is a lead worker for "Random Hacks of Kindness." He explains,
Voice 3
"We are trying to use technology to make the world a better place. The event gives hackers the chance to use their skills for a good cause with the guidance of experts who understand the real world problems."
Voice 1
The first "Random Hacks of Kindness" conference was in November of 2009. About 100 hackers and relief workers attended. Craig Fugate was one of the disaster relief workers that attended the conference. He came to the conference with one request. He wanted a tool for people to use after disasters. This tool would allow them to tell their family and friends that they were alive and well. But he also wanted to be sure this tool would not interfere16 with mobile17 phone service in the disaster area. This is because relief workers need mobile phone systems to serve victims in emergency situations.
Voice 2
Surprisingly, the hackers created two solutions in only one day! In fact, one of these solutions won the first prize at the conference. It is a mobile phone program called "I'm OK." The program uses SMS or texting technology to send a simple message to friends and family. The message says "I'm OK" - it means "I am alive and well". The message spreads through social networks like Facebook and Twitter. In an emergency situation, a person only has to touch one button on their mobile phone. This will send the message to anyone they want.
Voice 1
"I'm OK" is not the only amazing solution from "Random Hacks of Kindness." Another program helps relief workers find exactly where a disaster has taken place - almost immediately. Before, this process could take hours and even days. Solutions from "Random Hacks of Kindness" have been used after recent disasters in Haiti, Pakistan and Chile.
Voice 2
"Random Hacks of Kindness" continues to gather every six months. The last conference was in December of 2010. Now, the conferences are much larger. In fact, they no longer meet in just one place. The December 2010 conference gathered over one thousand people in over twenty cities - including Nairobi, Kenya, Bogotá, Colombia and Jakarta, Indonesia.
Voice 1
Hackers that attend "Random Hacks of Kindness" conferences are clear examples that not all hackers are bad! Will Pate18 attended the December 2010 conference in Toronto, Canada. He believes the conferences are making positive changes. He told the Christian19 Science Monitor news organization,
Voice 4
"We are changing the way people understand the word 'hacking.' These are events where people are there because they care about helping20 other people."
Voice 1
So, what do you think about hackers? Does "Random Hacks of Kindness" change what you think about computer hacking? Tell us your thoughts. You can e-mail us at [email protected]
Voice 2
The writer of today's programme was Robin Basselin. The producer was Ryan Geertsma. The voices you heard were from the United States. All quotes were adapted and voiced by Spotlight. Computer users21 can read our scripts22, hear our programs and see our word list on our website: http://www.radio.english.net This .programme is called "Computer Programming for Good."
点击收听单词发音
1 spotlight | |
n.公众注意的中心,聚光灯,探照灯,视听,注意,醒目 | |
参考例句: |
|
|
2 robin | |
n.知更鸟,红襟鸟 | |
参考例句: |
|
|
3 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
4 hacked | |
生气 | |
参考例句: |
|
|
5 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
6 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
7 adobe | |
n.泥砖,土坯,美国Adobe公司 | |
参考例句: |
|
|
8 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
9 random | |
adj.随机的;任意的;n.偶然的(或随便的)行动 | |
参考例句: |
|
|
10 hacks | |
黑客 | |
参考例句: |
|
|
11 security | |
n.安全,安全感;防护措施;保证(金),抵押(品);债券,证券 | |
参考例句: |
|
|
12 continually | |
adv.不间断地,不停地;多次重复地 | |
参考例句: |
|
|
13 crisis | |
n.危机,危急关头,决定性时刻,关键阶段 | |
参考例句: |
|
|
14 decided | |
adj.决定了的,坚决的;明显的,明确的 | |
参考例句: |
|
|
15 humanity | |
n.人类,[总称]人(性),人道[pl.]人文学科 | |
参考例句: |
|
|
16 interfere | |
v.(in)干涉,干预;(with)妨碍,打扰 | |
参考例句: |
|
|
17 mobile | |
adj.可移动的,易变的,机动的;n.运动物体 | |
参考例句: |
|
|
18 pate | |
n.头顶;光顶 | |
参考例句: |
|
|
19 Christian | |
adj.基督教徒的;n.基督教徒 | |
参考例句: |
|
|
20 helping | |
n.食物的一份&adj.帮助人的,辅助的 | |
参考例句: |
|
|
21 users | |
用户,使用者( user的名词复数 ) | |
参考例句: |
|
|
22 scripts | |
剧本( script的名词复数 ); 文字; 笔迹; (一种语言的)字母系统 | |
参考例句: |
|
|