时间:2019-01-11 作者:英语课 分类:英语新闻


英语课

   BEIJING, March 19 (Xinhua) -- A computer security official said China has become the world's biggest victim of cyber attacks, with a report from a national computer monitoring center revealing that many domestic computers were controlled via overseas-based Internet Protocol 1 addresses (IPs) last year.


  A total of 47,000 overseas IPs were involved in attacks against 8.9 million Chinese computers last year, compared to nearly 5 million affected 2 computers in 2010, according to a report issued Monday by the National Computer Network Emergency Response Coordination 3 Center of China (CNCERT/CC), China's primary computer security monitoring network.
  Most of the IP addresses originated in Japan, the United States and the Republic of Korea (ROK), according to the agency.
  "China has become the world's biggest victim of cyber attacks," said Zhou Yonglin, an information security official from the Internet Society of China.
  In terms of website security, a total of 1,116 domestic websites were tampered 4 with by overseas-based hackers 5; in addition, 95.8 percent of the server IPs that maliciously 7 falsified the websites of domestic banks were also based overseas, according to the report.
  "Generally speaking, malicious 6 IPs based in the U.S., Japan and the ROK posed the greatest security threat to China last year," said Wang Minghua, vice 8 director of the CNCERT/CC's operations department.
  Zhou said the CNCERT will deepen its cooperation with other countries in computer security. The CNCERT has established cooperative relations with 40 countries and 79 organizations thus far.

n.议定书,草约,会谈记录,外交礼节
  • We must observe the correct protocol.我们必须遵守应有的礼仪。
  • The statesmen signed a protocol.那些政治家签了议定书。
adj.不自然的,假装的
  • She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
  • His manners are affected.他的态度不自然。
n.协调,协作
  • Gymnastics is a sport that requires a considerable level of coordination.体操是一项需要高协调性的运动。
  • The perfect coordination of the dancers and singers added a rhythmic charm to the performance.舞蹈演员和歌手们配合得很好,使演出更具魅力。
v.窜改( tamper的过去式 );篡改;(用不正当手段)影响;瞎摆弄
  • The records of the meeting had been tampered with. 会议记录已被人擅自改动。 来自辞典例句
  • The old man's will has been tampered with. 老人的遗嘱已被窜改。 来自辞典例句
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
adv.有敌意地
  • He was charged with maliciously inflicting grievous bodily harm. 他被控蓄意严重伤害他人身体。 来自《简明英汉词典》
  • His enemies maliciously conspired to ruin him. 他的敌人恶毒地密谋搞垮他。 来自《现代汉英综合大词典》
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
标签: Cyber
学英语单词
ainis
Alfie Bass
allowable operating current range
anal blood gill
anticyclogenesis
artesian discharge
ask for leave
astern maneuvering valve
autodermic
be swayed by prejudice
beeter
bergamot pear
bottari
bowlingite
bulls eye
cock carrying platform
color bar Y buffer
come to a dead end
Commission on Narcotic Drugs
consumer expenditure income pattern
container fork lift
depth charge exploder
devorations
dialectical statement
divisibilities
dressel
dumb down
ec-
El Uarot
elastic restraint
end land width
equips
erythroferrone
exemplificator
extensible markup language parser
family historian
femoral scute
field ion microscopy(FIM)
foration
gas sampling
gdcf
Georges Bizet
gotten some air
Horizontal Stripe
incomplexly
isoenzyme isozyme
lichees
life linesman
Ligularia przewalskii
Lobomonas
low-speed agitator
mariage blanc
meter-candle
middling purifier
midepigastric plane
most obviously
nonfollicular
nonreference
object image coincidence method
operation of controller
oxophenamidum
pajaros
pedal operated directional valve
periphrasic
pomiferas
potassium bitartrates
presco
present historic
program debugging
prostomial palp
recipe for disaster
reinforcement layup
rock rip-rap
Saint-Yrieix
show deference to
sound duct
sparklinkage
stomachic
store access cycle
stovetops
sulfosuccinate
table speed
the Channel
tiletamine
to the memory of sb
torpedo stop
tortaxis mirus
Traffic Safety Committee
tungsten-carbide composition
unamortized share-issuing expenses
undamped navigation mode
universal joint transmission flange
us sars
voltage-controlled shift register
wassermann tests
watering hole attack
wave shoaling coefficient
waveguide twists
X-LA
X-ray fluoresce readout analyser
xylosidase
zooms in