时间:2019-01-11 作者:英语课 分类:英语新闻


英语课

   BEIJING, March 19 (Xinhua) -- A computer security official said China has become the world's biggest victim of cyber attacks, with a report from a national computer monitoring center revealing that many domestic computers were controlled via overseas-based Internet Protocol 1 addresses (IPs) last year.


  A total of 47,000 overseas IPs were involved in attacks against 8.9 million Chinese computers last year, compared to nearly 5 million affected 2 computers in 2010, according to a report issued Monday by the National Computer Network Emergency Response Coordination 3 Center of China (CNCERT/CC), China's primary computer security monitoring network.
  Most of the IP addresses originated in Japan, the United States and the Republic of Korea (ROK), according to the agency.
  "China has become the world's biggest victim of cyber attacks," said Zhou Yonglin, an information security official from the Internet Society of China.
  In terms of website security, a total of 1,116 domestic websites were tampered 4 with by overseas-based hackers 5; in addition, 95.8 percent of the server IPs that maliciously 7 falsified the websites of domestic banks were also based overseas, according to the report.
  "Generally speaking, malicious 6 IPs based in the U.S., Japan and the ROK posed the greatest security threat to China last year," said Wang Minghua, vice 8 director of the CNCERT/CC's operations department.
  Zhou said the CNCERT will deepen its cooperation with other countries in computer security. The CNCERT has established cooperative relations with 40 countries and 79 organizations thus far.

n.议定书,草约,会谈记录,外交礼节
  • We must observe the correct protocol.我们必须遵守应有的礼仪。
  • The statesmen signed a protocol.那些政治家签了议定书。
adj.不自然的,假装的
  • She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
  • His manners are affected.他的态度不自然。
n.协调,协作
  • Gymnastics is a sport that requires a considerable level of coordination.体操是一项需要高协调性的运动。
  • The perfect coordination of the dancers and singers added a rhythmic charm to the performance.舞蹈演员和歌手们配合得很好,使演出更具魅力。
v.窜改( tamper的过去式 );篡改;(用不正当手段)影响;瞎摆弄
  • The records of the meeting had been tampered with. 会议记录已被人擅自改动。 来自辞典例句
  • The old man's will has been tampered with. 老人的遗嘱已被窜改。 来自辞典例句
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
adv.有敌意地
  • He was charged with maliciously inflicting grievous bodily harm. 他被控蓄意严重伤害他人身体。 来自《简明英汉词典》
  • His enemies maliciously conspired to ruin him. 他的敌人恶毒地密谋搞垮他。 来自《现代汉英综合大词典》
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
标签: Cyber
学英语单词
Altytan
alveologram
area of wetted cross-section
asymmetric lighting
automatic precision approach radar
azinphos methyl
backpropagating
bad suderode
Baja California, Estado de
ball planting
banons
be down as
bioparticles
brown root rot funguss
buying signal
cable net
CHBA
choctaws
cisney
clod breaker
compasses for workshop
dipterocarps
Doran L.
double-proted slide valve
Dwight D. Eisenhower
dyke strengthening by warping
electromagnetic compatability
fall rope block
filamentous lichens
fishin
forklift atachment
Friedanian
Gigantes, Llanos de los
glutinous substance
haggadas
Harbour I.
hate-speech
Herodion
hit where it hurts
hydraulic unlock
hydrothermal resources
hypercompetition
implusive force
isopatin
jacquard presser
Jammu District
kazantzakis
Keiskammapunt
Kirkconnel
kre-
lead-ingroove
linear action disk valve
Macromonas
magic cube
making the rounds
male adanter
modal composition
multi-purpose signal generator
multileveled
night-bats
noninterfering process
oil-piping
os job queue dump program
output matching network
oxyphenisatin
pacioli
palpebral antioma
paraphs
pedroncelli
phenomenologicaltheoryof elasticity
phylladiorhynchus pusillus
Pic R.
project performance
qualified accounts
recanvasing
receiving and shipping department
sand blaster
scopolia carniolicas
Sedna
shoving around
slenderise
solar emergy
solid state storage
spaders
statement of auditing procedure
Stibiatil
superior temporal sulcus
sydor
thermohaline convection
thin-layer anisotropy
tonelson
transformation of format
treble clef
tunnel slot
umbones
unwainscoted
uranium assay
video tape recording
Wiener filter
Windach
women's-rights
zaccheus