时间:2019-01-12 作者:英语课 分类:2014年VOA慢速英语(十一)月


英语课

 


AS IT IS 2014-11-18 Hackers 2 Attack US State Department Computers 美国国务院电脑遭到黑客攻击


The U.S. State Department has closed its public email system and websites after a suspected attack by computer criminals called “hackers.” It had never been shut down before.


A senior official told the Associated Press on Sunday that only the unclassified email system and websites were affected 3. The affected email system was not used to send secret communications.


Workers are now repairing the damage caused by the hackers and are improving the security of the system. The repairs should be finished Monday or Tuesday. The State Department plans to talk about the attack when the repairs are completed.


According to the official, the State Department detected “activity of concern” last October. It was around the same time hackers tried to gain access to the White House computer network. At that time, it appeared that the State Department computers were not affected. And there was no indication that the two hacking 4 attempts were related.


Last month, hackers gained access to an unclassified computer system at the White House and did not get through the part that holds secret information. Two other U.S. government agencies, the U.S. Postal 5 Service and the National Weather Service, also reported attacks on their computer systems.


There have been reports that Russian cyber-attackers have targeted the governments of Germany and Ukraine among others, as well as NATO headquarters.


Obama administration officials have blamed hackers with links to the Russian government for the attack on White House computers. And The New York Times have reported that the attacks on the Postal Service and the National Weather Service likely came from China.


Identifying the hackers is difficult. Hackers often take control of computer networks around the world and then launch their attacks through those systems.


Words in This Story 


hacker 1 – n. a person who secretly gets access to a computer system in order to get information or cause damage


network – n. a system of computers that are connected to each other


cyber – adj. related to computers and the Internet



n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.不自然的,假装的
  • She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
  • His manners are affected.他的态度不自然。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
adj.邮政的,邮局的
  • A postal network now covers the whole country.邮路遍及全国。
  • Remember to use postal code.勿忘使用邮政编码。
标签: VOA慢速英语
学英语单词
abnormal immunoglobulin
amputation in continuity
ans.
architects selecting
asteromphalus elegans
attitudinal reflexes
Ban Tamrong Phatho
baseline-plus forecast
Batchinsky
beltways
bevelled sickle wheel
bremsstrahlung
chuckings
clubzines
cold constants
collides with
colloidal suspension/system
complex geometry
computer-processing system
cotton shirting
cruising order
Dem.
design-by-contract programming
dimercaptosuccinate
diploprion bifasciatum
Dispersion of redundant employees
dtmf
epidemiological threshold
equivalent space charge
euchlorin
flop-over circuit
genus Onopordon
ground movement control (gmc)
index-linked
initial public offering
intermediate water
intralimbs
Johnin
Karnaphuli
ketch-word
kida
Kirchanschöring
kodas
left pulmonary veins
literato
Long Islanders
Lonicera giraldii
Lucas Nunatak
lycoperdon gemmatum
major first face
manipulation chart
moenomycinB2
moonbattery
Motoura-kawa
mund
neuromyth
noncrazy
Norwood procedure
NPCR
oil pressure test for strength and tightness
operating practices
petalous
petit assize
phglaxiology
pickard
practical room block
primary auxiliary view
prosoposchisis
public attorney
radiofrequency torch
ratine yarn
rayleigh's approximation method
residual cycle life
Rhizidium leptorhizum
richard m. nixons
riggite
Rio Prêto, Cachoeira do
Robert Venturi
rubber ring packing
schemata
senile lenticular arcus
sericulture
solid-liquid transition
specific visibility
spreons
stadia reading
system function language
tailers
thallium monoiodide
thianschanicum
thingymabob
Thomas Mann
three dimensional television
toffee paper
trade buyer
utere
Vodomir
weirdnesses
wipe circuit
wire arraying vehicle for seismic exploration
with one blow
Yom, Mae Nam