时间:2019-01-12 作者:英语课 分类:2014年VOA慢速英语(十一)月


英语课

 


AS IT IS 2014-11-18 Hackers 2 Attack US State Department Computers 美国国务院电脑遭到黑客攻击


The U.S. State Department has closed its public email system and websites after a suspected attack by computer criminals called “hackers.” It had never been shut down before.


A senior official told the Associated Press on Sunday that only the unclassified email system and websites were affected 3. The affected email system was not used to send secret communications.


Workers are now repairing the damage caused by the hackers and are improving the security of the system. The repairs should be finished Monday or Tuesday. The State Department plans to talk about the attack when the repairs are completed.


According to the official, the State Department detected “activity of concern” last October. It was around the same time hackers tried to gain access to the White House computer network. At that time, it appeared that the State Department computers were not affected. And there was no indication that the two hacking 4 attempts were related.


Last month, hackers gained access to an unclassified computer system at the White House and did not get through the part that holds secret information. Two other U.S. government agencies, the U.S. Postal 5 Service and the National Weather Service, also reported attacks on their computer systems.


There have been reports that Russian cyber-attackers have targeted the governments of Germany and Ukraine among others, as well as NATO headquarters.


Obama administration officials have blamed hackers with links to the Russian government for the attack on White House computers. And The New York Times have reported that the attacks on the Postal Service and the National Weather Service likely came from China.


Identifying the hackers is difficult. Hackers often take control of computer networks around the world and then launch their attacks through those systems.


Words in This Story 


hacker 1 – n. a person who secretly gets access to a computer system in order to get information or cause damage


network – n. a system of computers that are connected to each other


cyber – adj. related to computers and the Internet



n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.不自然的,假装的
  • She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
  • His manners are affected.他的态度不自然。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
adj.邮政的,邮局的
  • A postal network now covers the whole country.邮路遍及全国。
  • Remember to use postal code.勿忘使用邮政编码。
标签: VOA慢速英语
学英语单词
a format
acid Bessemer pig
acute phlegmonous gastritis
arthroderms
artocrat
at that place
automatic supervisor
bag lady
Bagshot
bayrumtree
Berettyo
Broad-Church
by no means
captive balloon sounding
commedia
commission charge
constant magnetic field
cryptopolyploid
Cypripedium tibeticum
decoration method
diameter of a circle
differential ballistic wind
diffuse bronchiolectasis
enduce
enduringnesses
Euro Market
fauchon
first-hand
gas bypassing
hydraulic trap
ihcs
increment key
indeedy
infinitely variable control
interfloras
Jaspers, Karl
klebsiella pneumonia
labiate ladle
lace cloth
lankan
Lentobetic
leprosy cell
linea recta
MacLeish, Archibald
Makkum
meadow foxtail
memmi
moncheur
necrotic myelitis
negative-resistance device
non-interest bearing demand deposits
number of drawing
nut hut
ophthalmomanometer
orbital parameter
OS (operating system)
outlining
Perquimans County
policy of independence and self reliance
powertops
pressworking
prewrap
Priority Frame
probe microanalyzer
processing program for outstockroom registration
proportioned streams
proving house
radioexamination
reeving thimble
rejoicest
rod shadow effect
roll in pairs
rotary hand drill
sammel blende(samthlende)
sampling control
security cultures
shellperson
ship owner's responsibility clause
slurry compounding machine
smoothies
solid girder
span error
stainless steel disc for casting
stiff bottom
sub-Poisson light
subshifts
temporary internet file
temptability
tinderies
toggle valve
topicaine
total loss cover-hulls
total traffic
traffic enquiry
Truncus nervi accessorii
Two-L
unmolding
validity claim
wage-price control
wainrope
wolfgangsees
write winding