时间:2019-01-11 作者:英语课 分类:英语新闻


英语课

   BEIJING, March 19 (Xinhua) -- A computer security official said China has become the world's biggest victim of cyber attacks, with a report from a national computer monitoring center revealing that many domestic computers were controlled via overseas-based Internet Protocol 1 addresses (IPs) last year.


  A total of 47,000 overseas IPs were involved in attacks against 8.9 million Chinese computers last year, compared to nearly 5 million affected 2 computers in 2010, according to a report issued Monday by the National Computer Network Emergency Response Coordination 3 Center of China (CNCERT/CC), China's primary computer security monitoring network.
  Most of the IP addresses originated in Japan, the United States and the Republic of Korea (ROK), according to the agency.
  "China has become the world's biggest victim of cyber attacks," said Zhou Yonglin, an information security official from the Internet Society of China.
  In terms of website security, a total of 1,116 domestic websites were tampered 4 with by overseas-based hackers 5; in addition, 95.8 percent of the server IPs that maliciously 7 falsified the websites of domestic banks were also based overseas, according to the report.
  "Generally speaking, malicious 6 IPs based in the U.S., Japan and the ROK posed the greatest security threat to China last year," said Wang Minghua, vice 8 director of the CNCERT/CC's operations department.
  Zhou said the CNCERT will deepen its cooperation with other countries in computer security. The CNCERT has established cooperative relations with 40 countries and 79 organizations thus far.

n.议定书,草约,会谈记录,外交礼节
  • We must observe the correct protocol.我们必须遵守应有的礼仪。
  • The statesmen signed a protocol.那些政治家签了议定书。
adj.不自然的,假装的
  • She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
  • His manners are affected.他的态度不自然。
n.协调,协作
  • Gymnastics is a sport that requires a considerable level of coordination.体操是一项需要高协调性的运动。
  • The perfect coordination of the dancers and singers added a rhythmic charm to the performance.舞蹈演员和歌手们配合得很好,使演出更具魅力。
v.窜改( tamper的过去式 );篡改;(用不正当手段)影响;瞎摆弄
  • The records of the meeting had been tampered with. 会议记录已被人擅自改动。 来自辞典例句
  • The old man's will has been tampered with. 老人的遗嘱已被窜改。 来自辞典例句
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
adv.有敌意地
  • He was charged with maliciously inflicting grievous bodily harm. 他被控蓄意严重伤害他人身体。 来自《简明英汉词典》
  • His enemies maliciously conspired to ruin him. 他的敌人恶毒地密谋搞垮他。 来自《现代汉英综合大词典》
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
标签: Cyber
学英语单词
abustles
afibrinogenaemic
albomycetin
arranged marriage
BFUP
cappa
chain home beamed
chalutzim
chronicle of school
citrus leaf-miner
cowboy economy
data longevity
decentralized stochastic control
Dewi, Saint
differencing
directional radio
dominant tone
drafts
Duncan I.
earthed concentric wiring system
eusintomycin
externally heating
faciobrachialis
fancy oneself as
fifty-somethings
fore pressure
gamma-aminobutyric acid
gateway-to-gateway protocol
gelatin tube
get stuck in the mire
hay-seed
hoerr
holthe
hyperergic
import cargoes
inadequate diet
indirect initiation
knock someone's eyes out
knowledge-oriented
Kuibyshev
laugh sth to scorn
Laves' phases
lecointre
left inverse element
Leg-Over
length of boss
Lermontov, MikhailYurievich
Linda Vista
Linneryd
liquid nitrogen freezing system
liquor tyrothricini
load-deflection relation
looked after
magnifiable
manstration
Mary Cassatt
medrysone
milltailings
mixed ores
monensin
negroponte
nongoal
Ossietzky
Panxworth
paramukta
Parkhurst
part-drawing
Periptychus
pestle mill
phenagle
pipeline inventories
point probe-dynamic characteristic method
police judge
potyvirus konjak mosaic virus
quarter-bell
quenching and high temperature tempering
ramus ilicus
real-time application
resection through cervical approach
right-to-left rule
rotto
safe in life and limb
sample frequency
scientise
see ... off
semiconductor particle detector
settlingss
Shubat Enlil
soapy water
soft HRM
sputum
supplementary appropriation
Telotremata
texting codes
the bitter truth
the dogs of war
trichosurus vulpeculas
tubb
unholding
view(in computer graphics)
walking orders
X-ray fluorescences