四六级必读美文系列:保护个人计算机安全的技巧(在线收听

   (1)It's near impossible to defend oneself from the kind of cyber attack that targeted Google Inc. and more than 30 other companies. But for the average computer user there are some common-sense steps that can help protect against viruses and other malicious computer code.

  (1)对于针对谷歌 (Google Inc.)以及其他30多个公司的网络攻击,个人几乎毫无招架之力。但对普通计算机用户来说,只需采取一些常识性步骤即可免受病毒和其他恶意代码的侵扰。
  一Install anti-virus software. (2) This can protect a computer against known malicious programs that could allow a hacker to steal personal information. Cyber criminals release thousands of new programs each day so it is important to update anti-virus software.
  安装杀霉软件。(2)这样可将已知恶意程序拒之门外,以防黑客窃取个人信息。网络罪犯每天发布数千个新程序,因此及时更新杀毒软件十分重要。
  一Install software patches. Companies such as Microsoft Corp. and Adobe Systems Inc. are constantly issuing small updates to the Windows operating system and PDF reader in response to newly identified security bugs. Users should be sure to install these so-called patches.
  安装软件补丁。微软和奥多比系统公司等公司均不断发布小的的更新程序以修补Windows操作系统和 PDF reader程序中新发现的安全漏洞。用户应当及时安装这些补丁。
  —Be suspicious. Consider attachments to emails, links on social-networking sites and files for download on Web sites guilty until proven innocent. These are the most common ways that criminals load malicious software onto a victim's computer.
  保持戒心。除非确保安全无毒,否则一律将电子邮件附件、社交网站链接和网站上的可下载文件视同病毒处理。这些是罪犯将恶意软件传送到受害者计算机的最常用伎俩。
  Be vigilant in public. Sign out of your Gmail, Yahoo or Hotmail account when using a public computer and clear the Web browser's cache, cookies and history. Then close the browser.
  在公共场合保持警惕。用公共计算机登录Gmai1、雅虎 (Yahoo)或 Hotmail邮箱后应登出,清空浏览器缓存、 cookie和历史,然后关闭浏览器。
  People with access to sensitive information need to take extra precautions. (3) They could be targeted by hacker who could takes steps,including sending malicious software in an email that appears to come from someone the victim knows. One way to guard against this is to encrypt important files. Also, businesses should deploy systems that track where sensitive information is being sent.
  接触敏感信息的人士需特别小心。 (3)他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。重要文件加密是有效的保护措施之一。公司用户还应当配备能够跟踪敏感信息发送路径的系统。
  一Use strong passwords. Create passwords that are a mix of numbers, letters and symbols. Don't use common words or personal information. Don't use the same password on multiple sites. Put one on your cellphone.
  使用安全密码。使用包含数字、字母和符号的温合密码 g不要以常用单词或个人信息作为密码,不要在多个站点使用同一密码,手机也要设置密码。
  四六级句型讲解
  It's near impossible to defend oneself from the kind of cyber attack that targeted Google Inc. and more than 30 other companies.
  本句是一个复合句。It是形式主语,真正的主语是后面的to defend oneself...companies不定式短语。其中that引导限制性定语从句,修饰 cyber attack。
  语法重点:形式主语,定语从句
  2. This can protect a computer against known malicious programs that could allow a hacker to steal personal information.
  本句是一个复合句,that引导限制性定语从句,修饰programs。to steal personal information是allow的宾语补足语。
  语法重点:定语从句,宾语补足语
  3. They could be targeted by hacker who could takes steps,including sending malicious software in an email that appears to come from someone the victim knows.
  本句是一个复合句,主句是they could be targeted by a hacker。 who引导限制性定语从句,修饰hacker。其中including...email现在分词短语作伴随状语。that引导定语从句,修饰email。
  语法重点:定语从句,分词短语作状语
  原文地址:http://www.tingroom.com/lesson/sljbdywxl/426855.html