时间:2019-01-11 作者:英语课 分类:英语新闻


英语课

   BEIJING, March 19 (Xinhua) -- A computer security official said China has become the world's biggest victim of cyber attacks, with a report from a national computer monitoring center revealing that many domestic computers were controlled via overseas-based Internet Protocol 1 addresses (IPs) last year.


  A total of 47,000 overseas IPs were involved in attacks against 8.9 million Chinese computers last year, compared to nearly 5 million affected 2 computers in 2010, according to a report issued Monday by the National Computer Network Emergency Response Coordination 3 Center of China (CNCERT/CC), China's primary computer security monitoring network.
  Most of the IP addresses originated in Japan, the United States and the Republic of Korea (ROK), according to the agency.
  "China has become the world's biggest victim of cyber attacks," said Zhou Yonglin, an information security official from the Internet Society of China.
  In terms of website security, a total of 1,116 domestic websites were tampered 4 with by overseas-based hackers 5; in addition, 95.8 percent of the server IPs that maliciously 7 falsified the websites of domestic banks were also based overseas, according to the report.
  "Generally speaking, malicious 6 IPs based in the U.S., Japan and the ROK posed the greatest security threat to China last year," said Wang Minghua, vice 8 director of the CNCERT/CC's operations department.
  Zhou said the CNCERT will deepen its cooperation with other countries in computer security. The CNCERT has established cooperative relations with 40 countries and 79 organizations thus far.

n.议定书,草约,会谈记录,外交礼节
  • We must observe the correct protocol.我们必须遵守应有的礼仪。
  • The statesmen signed a protocol.那些政治家签了议定书。
adj.不自然的,假装的
  • She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
  • His manners are affected.他的态度不自然。
n.协调,协作
  • Gymnastics is a sport that requires a considerable level of coordination.体操是一项需要高协调性的运动。
  • The perfect coordination of the dancers and singers added a rhythmic charm to the performance.舞蹈演员和歌手们配合得很好,使演出更具魅力。
v.窜改( tamper的过去式 );篡改;(用不正当手段)影响;瞎摆弄
  • The records of the meeting had been tampered with. 会议记录已被人擅自改动。 来自辞典例句
  • The old man's will has been tampered with. 老人的遗嘱已被窜改。 来自辞典例句
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
adv.有敌意地
  • He was charged with maliciously inflicting grievous bodily harm. 他被控蓄意严重伤害他人身体。 来自《简明英汉词典》
  • His enemies maliciously conspired to ruin him. 他的敌人恶毒地密谋搞垮他。 来自《现代汉英综合大词典》
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
标签: Cyber
学英语单词
a streaker
a.m.
adenanthrea microsperma l.
AGA,A.G.A.
air cleaner
annual ring density
Bayerbach bei Ergoldsbach
Bence-Jones protein
blacklers
cagewashes
cartographic design
cerebral irritation
chief executives
ciprofibrate
clutter rejection
coherent brittle stage
commutator-controlled weld
cryogenic technology
digital to image conversion
discipleships
double faced hammer
dress
drewe
Dunnet
eeps
efficiency factor
enthalpy of swelling
equatorial system
exterior varnish
exult over
farigue
Fat Analysis Committee colour
flat billet
get his
Gojra
graynet
Guaranteed Death Benefit
half-binding
hexaquarks
high-sulphur fuel
improvement by lessee
injector feed
interaction volume
intoxilyzer
IP fragmentation IP
key variable
korahl
leakage spectrum
lenslets
linolenate
logolepsy
long - term care
loop termination
lql
lutnick
malgwyn
material for test
Medveditskiy
Metroval
mintels
miscellaneous asbestos product
Neolitsea pinninervis
newbattles
non-dividend payee
operational technical manual
penetration of grease
pole setting
pretell
primary mother-tree selection
production strategies
psauoscopy
Qarshi
random noise level
reference oscillator muting
reservoir sensitivity evaluation
reversible code
roller-ball
runners
salty milk
scarifie
see sth with half an eye
sentenceable
shilt
Shimabara-hantō
simple radical
special transfer paper
steinhausers
sulphur cement mortar anchor
superefficiency
temperature classification
thelephoid
theory of growth
thermal processes
thrash over
tooth abscess
USB stick
velascas
vermilions
voltaic irritability
wad hamid
with expedition
zygoplast