【英语语言学习】因特网的免疫系统
时间:2019-02-16 作者:英语课 分类:英语语言学习
英语课
Four years ago, a security researcher, or, as most people would call it, a hacker 2, found a way to literally 3 make ATMs throw money at him. His name was Barnaby Jack 4, and this technique was later called "jackpotting" in his honor.
I'm here today because I think we actually need hackers 5. Barnaby Jack could have easily turned into a career criminal or James Bond villain 6 with his knowledge, but he chose to show the world his research instead. He believed that sometimes you have to demo a threat to spark a solution. And I feel the same way. That's why I'm here today.
We are often terrified and fascinated by the power hackers now have. They scare us. But the choices they make have dramatic outcomes that influence us all. So I am here today because I think we need hackers, and in fact, they just might be the immune system for the information age. Sometimes they make us sick, but they also find those hidden threats in our world, and they make us fix it.
I knew that I might get hacked 8 for giving this talk, so let me save you the effort. In true TED 7 fashion, here is my most embarrassing picture. But it would be difficult for you to find me in it, because I'm the one who looks like a boy standing 9 to the side. I was such a nerd back then that even the boys on the Dungeons 10 and Dragons team wouldn't let me join. This is who I was, but this is who I wanted to be: Angelina Jolie. She portrayed 12 Acid Burn in the '95 film "Hackers." She was pretty and she could rollerblade, but being a hacker, that made her powerful. And I wanted to be just like her, so I started spending a lot of time on hacker chat rooms and online forums 13. I remember one late night I found a bit of PHP code. I didn't really know what it did, but I copy-pasted it and used it anyway to get into a password-protected site like that. Open Sesame. It was a simple trick, and I was just a script kiddie back then, but to me, that trick, it felt like this, like I had discovered limitless potential at my fingertips. This is the rush of power that hackers feel. It's geeks just like me discovering they have access to superpower, one that requires the skill and tenacity 14 of their intellect, but thankfully no radioactive spiders.
But with great power comes great responsibility, and you all like to think that if we had such powers, we would only use them for good. But what if you could read your ex's emails, or add a couple zeros to your bank account. What would you do then? Indeed, many hackers do not resist those temptations, and so they are responsible in one way or another to billions of dollars lost each year to fraud, malware or plain old identity theft, which is a serious issue. But there are other hackers, hackers who just like to break things, and it is precisely 15 those hackers that can find the weaker elements in our world and make us fix it.
This is what happened last year when another security researcher called Kyle Lovett discovered a gaping 16 hole in the design of certain wireless 17 routers like you might have in your home or office. He learned that anyone could remotely connect to these devices over the Internet and download documents from hard drives attached to those routers, no password needed. He reported it to the company, of course, but they ignored his report. Perhaps they thought universal access was a feature, not a bug 19, until two months ago when a group of hackers used it to get into people's files. But they didn't steal anything. They left a note: Your router and your documents can be accessed by anyone in the world. Here's what you should do to fix it. We hope we helped. By getting into people's files like that, yeah, they broke the law, but they also forced that company to fix their product.
Making vulnerabilities known to the public is a practice called full disclosure in the hacker community, and it is controversial, but it does make me think of how hackers have an evolving effect on technologies we use every day. This is what Khalil did. Khalil is a Palestinian hacker from the West Bank, and he found a serious privacy flaw on Facebook which he attempted to report through the company's bug bounty 20 program. These are usually great arrangements for companies to reward hackers disclosing vulnerabilities they find in their code. Unfortunately, due to some miscommunications, his report was not acknowledged. Frustrated 21 with the exchange, he took to use his own discovery to post on Mark Zuckerberg's wall. This got their attention, all right, and they fixed 22 the bug, but because he hadn't reported it properly, he was denied the bounty usually paid out for such discoveries. Thankfully for Khalil, a group of hackers were watching out for him. In fact, they raised more than 13,000 dollars to reward him for this discovery, raising a vital discussion in the technology industry about how we come up with incentives 23 for hackers to do the right thing. But I think there's a greater story here still. Even companies founded by hackers, like Facebook was, still have a complicated relationship when it comes to hackers. And so for more conservative organizations, it is going to take time and adapting in order to embrace hacker culture and the creative chaos 24 that it brings with it. But I think it's worth the effort, because the alternative, to blindly fight all hackers, is to go against the power you cannot control at the cost of stifling 25 innovation and regulating knowledge. These are things that will come back and bite you.
It is even more true if we go after hackers that are willing to risk their own freedom for ideals like the freedom of the web, especially in times like this, like today even, as governments and corporates fight to control the Internet. I find it astounding 26 that someone from the shadowy corners of cyberspace 27 can become its voice of opposition 28, its last line of defense 29 even, perhaps someone like Anonymous 30, the leading brand of global hacktivism. This universal hacker movement needs no introduction today, but six years ago they were not much more than an Internet subculture dedicated 31 to sharing silly pictures of funny cats and Internet trolling campaigns. Their moment of transformation 32 was in early 2008 when the Church of Scientology attempted to remove certain leaked videos from appearing on certain websites. This is when Anonymous was forged out of the seemingly random 33 collection of Internet dwellers 34. It turns out, the Internet doesn't like it when you try to remove things from it, and it will react with cyber attacks and elaborate pranks 35 and with a series of organized protests all around the world, from my hometown of Tel Aviv to Adelaide, Australia. This proved that Anonymous and this idea can rally the masses from the keyboards to the streets, and it laid the foundations for dozens of future operations against perceived injustices 36 to their online and offline world. Since then, they've gone after many targets. They've uncovered corruption 37, abuse. They've hacked popes and politicians, and I think their effect is larger than simple denial of service attacks that take down websites or even leak sensitive documents. I think that, like Robin 38 Hood 39, they are in the business of redistribution, but what they are after isn't your money. It's not your documents. It's your attention. They grab the spotlight 40 for causes they support, forcing us to take note, acting 41 as a global magnifying glass for issues that we are not as aware of but perhaps we should be. They have been called many names from criminals to terrorists, and I cannot justify 42 their illegal means, but the ideas they fight for are ones that matter to us all. The reality is, hackers can do a lot more than break things. They can bring people together.
And if the Internet doesn't like it when you try to remove things from it, just watch what happens when you try to shut the Internet down. This took place in Egypt in January 2011, and as President Hosni Mubarak attempted a desperate move to quash the rising revolution on the streets of Cairo, he sent his personal troops down to Egypt's Internet service providers and had them physically 43 kill the switch on the country's connection to the world overnight. For a government to do a thing like that was unprecedented 44, and for hackers, it made it personal. Hackers like the Telecomix group were already active on the ground, helping 45 Egyptians bypass censorship using clever workarounds like Morse code and ham radio. It was high season for low tech, which the government couldn't block, but when the Net went completely down, Telecomix brought in the big guns. They found European service providers that still had 20-year-old analog 46 dial-up access infrastructure 47. They opened up 300 of those lines for Egyptians to use, serving slow but sweet Internet connection for Egyptians. This worked. It worked so well, in fact, one guy even used it to download an episode of "How I Met Your Mother." But while Egypt's future is still uncertain, when the same thing happened in Syria just one year later, Telecomix were prepared with those Internet lines, and Anonymous, they were perhaps the first international group to officially denounce the actions of the Syrian military by defacing their website.
But with this sort of power, it really depends on where you stand, because one man's hero can be another's villain, and so the Syrian Electronic Army is a pro-Assad group of hackers who support his contentious 48 regime. They've taken down multiple high-profile targets in the past few years, including the Associated Press's Twitter account, in which they posted a message about an attack on the White House injuring President Obama. This tweet was fake, of course, but the resulting drop in the Dow Jones index that day was most certainly not, and a lot of people lost a lot of money.
This sort of thing is happening all over the world right now. In conflicts from the Crimean Peninsula to Latin America, from Europe to the United States, hackers are a force for social, political and military influence. As individuals or in groups, volunteers or military conflicts, there are hackers everywhere. They come from all walks of life, ethnicities, ideologies 49 and genders 50, I might add. They are now shaping the world's stage. Hackers represent an exceptional force for change in the 21st century. This is because access to information is a critical currency of power, one which governments would like to control, a thing they attempt to do by setting up all-you-can-eat surveillance programs, a thing they need hackers for, by the way. And so the establishment has long had a love-hate relationship when it comes to hackers, because the same people who demonize hacking 51 also utilize 52 it at large.
Two years ago, I saw General Keith Alexander. He's the NSA director and U.S. cyber commander, but instead of his four star general uniform, he was wearing jeans and a t-shirt. This was at DEF CON 18, the world's largest hacker conference. Perhaps like me, General Alexander didn't see 12,000 criminals that day in Vegas. I think he saw untapped potential. In fact, he was there to give a hiring pitch. "In this room right here," he said, "is the talent our nation needs." Well, hackers in the back row replied, "Then stop arresting us." (Applause)
Indeed, for years, hackers have been on the wrong side of the fence, but in light of what we know now, who is more watchful 53 of our online world? The rules of the game are not that clear anymore, but hackers are perhaps the only ones still capable of challenging overreaching governments and data-hoarding corporates on their own playing field. To me, that represents hope.
For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think it's time we take a good look at how we choose to portray 11 them, because if we keep expecting them to be the bad guys, how can they be the heroes too? My years in the hacker world have made me realize both the problem and the beauty about hackers: They just can't see something broken in the world and leave it be. They are compelled to either exploit it or try and change it, and so they find the vulnerable aspects in our rapidly changing world. They make us, they force us to fix things or demand something better, and I think we need them to do just that, because after all, it is not information that wants to be free, it's us.
Thank you very much.
Thank you. (Applause)
Hack 1 the planet!
I'm here today because I think we actually need hackers 5. Barnaby Jack could have easily turned into a career criminal or James Bond villain 6 with his knowledge, but he chose to show the world his research instead. He believed that sometimes you have to demo a threat to spark a solution. And I feel the same way. That's why I'm here today.
We are often terrified and fascinated by the power hackers now have. They scare us. But the choices they make have dramatic outcomes that influence us all. So I am here today because I think we need hackers, and in fact, they just might be the immune system for the information age. Sometimes they make us sick, but they also find those hidden threats in our world, and they make us fix it.
I knew that I might get hacked 8 for giving this talk, so let me save you the effort. In true TED 7 fashion, here is my most embarrassing picture. But it would be difficult for you to find me in it, because I'm the one who looks like a boy standing 9 to the side. I was such a nerd back then that even the boys on the Dungeons 10 and Dragons team wouldn't let me join. This is who I was, but this is who I wanted to be: Angelina Jolie. She portrayed 12 Acid Burn in the '95 film "Hackers." She was pretty and she could rollerblade, but being a hacker, that made her powerful. And I wanted to be just like her, so I started spending a lot of time on hacker chat rooms and online forums 13. I remember one late night I found a bit of PHP code. I didn't really know what it did, but I copy-pasted it and used it anyway to get into a password-protected site like that. Open Sesame. It was a simple trick, and I was just a script kiddie back then, but to me, that trick, it felt like this, like I had discovered limitless potential at my fingertips. This is the rush of power that hackers feel. It's geeks just like me discovering they have access to superpower, one that requires the skill and tenacity 14 of their intellect, but thankfully no radioactive spiders.
But with great power comes great responsibility, and you all like to think that if we had such powers, we would only use them for good. But what if you could read your ex's emails, or add a couple zeros to your bank account. What would you do then? Indeed, many hackers do not resist those temptations, and so they are responsible in one way or another to billions of dollars lost each year to fraud, malware or plain old identity theft, which is a serious issue. But there are other hackers, hackers who just like to break things, and it is precisely 15 those hackers that can find the weaker elements in our world and make us fix it.
This is what happened last year when another security researcher called Kyle Lovett discovered a gaping 16 hole in the design of certain wireless 17 routers like you might have in your home or office. He learned that anyone could remotely connect to these devices over the Internet and download documents from hard drives attached to those routers, no password needed. He reported it to the company, of course, but they ignored his report. Perhaps they thought universal access was a feature, not a bug 19, until two months ago when a group of hackers used it to get into people's files. But they didn't steal anything. They left a note: Your router and your documents can be accessed by anyone in the world. Here's what you should do to fix it. We hope we helped. By getting into people's files like that, yeah, they broke the law, but they also forced that company to fix their product.
Making vulnerabilities known to the public is a practice called full disclosure in the hacker community, and it is controversial, but it does make me think of how hackers have an evolving effect on technologies we use every day. This is what Khalil did. Khalil is a Palestinian hacker from the West Bank, and he found a serious privacy flaw on Facebook which he attempted to report through the company's bug bounty 20 program. These are usually great arrangements for companies to reward hackers disclosing vulnerabilities they find in their code. Unfortunately, due to some miscommunications, his report was not acknowledged. Frustrated 21 with the exchange, he took to use his own discovery to post on Mark Zuckerberg's wall. This got their attention, all right, and they fixed 22 the bug, but because he hadn't reported it properly, he was denied the bounty usually paid out for such discoveries. Thankfully for Khalil, a group of hackers were watching out for him. In fact, they raised more than 13,000 dollars to reward him for this discovery, raising a vital discussion in the technology industry about how we come up with incentives 23 for hackers to do the right thing. But I think there's a greater story here still. Even companies founded by hackers, like Facebook was, still have a complicated relationship when it comes to hackers. And so for more conservative organizations, it is going to take time and adapting in order to embrace hacker culture and the creative chaos 24 that it brings with it. But I think it's worth the effort, because the alternative, to blindly fight all hackers, is to go against the power you cannot control at the cost of stifling 25 innovation and regulating knowledge. These are things that will come back and bite you.
It is even more true if we go after hackers that are willing to risk their own freedom for ideals like the freedom of the web, especially in times like this, like today even, as governments and corporates fight to control the Internet. I find it astounding 26 that someone from the shadowy corners of cyberspace 27 can become its voice of opposition 28, its last line of defense 29 even, perhaps someone like Anonymous 30, the leading brand of global hacktivism. This universal hacker movement needs no introduction today, but six years ago they were not much more than an Internet subculture dedicated 31 to sharing silly pictures of funny cats and Internet trolling campaigns. Their moment of transformation 32 was in early 2008 when the Church of Scientology attempted to remove certain leaked videos from appearing on certain websites. This is when Anonymous was forged out of the seemingly random 33 collection of Internet dwellers 34. It turns out, the Internet doesn't like it when you try to remove things from it, and it will react with cyber attacks and elaborate pranks 35 and with a series of organized protests all around the world, from my hometown of Tel Aviv to Adelaide, Australia. This proved that Anonymous and this idea can rally the masses from the keyboards to the streets, and it laid the foundations for dozens of future operations against perceived injustices 36 to their online and offline world. Since then, they've gone after many targets. They've uncovered corruption 37, abuse. They've hacked popes and politicians, and I think their effect is larger than simple denial of service attacks that take down websites or even leak sensitive documents. I think that, like Robin 38 Hood 39, they are in the business of redistribution, but what they are after isn't your money. It's not your documents. It's your attention. They grab the spotlight 40 for causes they support, forcing us to take note, acting 41 as a global magnifying glass for issues that we are not as aware of but perhaps we should be. They have been called many names from criminals to terrorists, and I cannot justify 42 their illegal means, but the ideas they fight for are ones that matter to us all. The reality is, hackers can do a lot more than break things. They can bring people together.
And if the Internet doesn't like it when you try to remove things from it, just watch what happens when you try to shut the Internet down. This took place in Egypt in January 2011, and as President Hosni Mubarak attempted a desperate move to quash the rising revolution on the streets of Cairo, he sent his personal troops down to Egypt's Internet service providers and had them physically 43 kill the switch on the country's connection to the world overnight. For a government to do a thing like that was unprecedented 44, and for hackers, it made it personal. Hackers like the Telecomix group were already active on the ground, helping 45 Egyptians bypass censorship using clever workarounds like Morse code and ham radio. It was high season for low tech, which the government couldn't block, but when the Net went completely down, Telecomix brought in the big guns. They found European service providers that still had 20-year-old analog 46 dial-up access infrastructure 47. They opened up 300 of those lines for Egyptians to use, serving slow but sweet Internet connection for Egyptians. This worked. It worked so well, in fact, one guy even used it to download an episode of "How I Met Your Mother." But while Egypt's future is still uncertain, when the same thing happened in Syria just one year later, Telecomix were prepared with those Internet lines, and Anonymous, they were perhaps the first international group to officially denounce the actions of the Syrian military by defacing their website.
But with this sort of power, it really depends on where you stand, because one man's hero can be another's villain, and so the Syrian Electronic Army is a pro-Assad group of hackers who support his contentious 48 regime. They've taken down multiple high-profile targets in the past few years, including the Associated Press's Twitter account, in which they posted a message about an attack on the White House injuring President Obama. This tweet was fake, of course, but the resulting drop in the Dow Jones index that day was most certainly not, and a lot of people lost a lot of money.
This sort of thing is happening all over the world right now. In conflicts from the Crimean Peninsula to Latin America, from Europe to the United States, hackers are a force for social, political and military influence. As individuals or in groups, volunteers or military conflicts, there are hackers everywhere. They come from all walks of life, ethnicities, ideologies 49 and genders 50, I might add. They are now shaping the world's stage. Hackers represent an exceptional force for change in the 21st century. This is because access to information is a critical currency of power, one which governments would like to control, a thing they attempt to do by setting up all-you-can-eat surveillance programs, a thing they need hackers for, by the way. And so the establishment has long had a love-hate relationship when it comes to hackers, because the same people who demonize hacking 51 also utilize 52 it at large.
Two years ago, I saw General Keith Alexander. He's the NSA director and U.S. cyber commander, but instead of his four star general uniform, he was wearing jeans and a t-shirt. This was at DEF CON 18, the world's largest hacker conference. Perhaps like me, General Alexander didn't see 12,000 criminals that day in Vegas. I think he saw untapped potential. In fact, he was there to give a hiring pitch. "In this room right here," he said, "is the talent our nation needs." Well, hackers in the back row replied, "Then stop arresting us." (Applause)
Indeed, for years, hackers have been on the wrong side of the fence, but in light of what we know now, who is more watchful 53 of our online world? The rules of the game are not that clear anymore, but hackers are perhaps the only ones still capable of challenging overreaching governments and data-hoarding corporates on their own playing field. To me, that represents hope.
For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think it's time we take a good look at how we choose to portray 11 them, because if we keep expecting them to be the bad guys, how can they be the heroes too? My years in the hacker world have made me realize both the problem and the beauty about hackers: They just can't see something broken in the world and leave it be. They are compelled to either exploit it or try and change it, and so they find the vulnerable aspects in our rapidly changing world. They make us, they force us to fix things or demand something better, and I think we need them to do just that, because after all, it is not information that wants to be free, it's us.
Thank you very much.
Thank you. (Applause)
Hack 1 the planet!
n.劈,砍,出租马车;v.劈,砍,干咳
- He made a hack at the log.他朝圆木上砍了一下。
- Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
n.能盗用或偷改电脑中信息的人,电脑黑客
- The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
- This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
adv.照字面意义,逐字地;确实
- He translated the passage literally.他逐字逐句地翻译这段文字。
- Sometimes she would not sit down till she was literally faint.有时候,她不走到真正要昏厥了,决不肯坐下来。
n.插座,千斤顶,男人;v.抬起,提醒,扛举;n.(Jake)杰克
- I am looking for the headphone jack.我正在找寻头戴式耳机插孔。
- He lifted the car with a jack to change the flat tyre.他用千斤顶把车顶起来换下瘪轮胎。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
- They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
- Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
n.反派演员,反面人物;恶棍;问题的起因
- He was cast as the villain in the play.他在戏里扮演反面角色。
- The man who played the villain acted very well.扮演恶棍的那个男演员演得很好。
vt.翻晒,撒,撒开
- The invaders gut ted the village.侵略者把村中财物洗劫一空。
- She often teds the corn when it's sunny.天好的时候她就翻晒玉米。
n.持续,地位;adj.永久的,不动的,直立的,不流动的
- After the earthquake only a few houses were left standing.地震过后只有几幢房屋还立着。
- They're standing out against any change in the law.他们坚决反对对法律做任何修改。
n.地牢( dungeon的名词复数 )
- The captured rebels were consigned to the dungeons. 抓到的叛乱分子被送进了地牢。 来自《简明英汉词典》
- He saw a boy in fetters in the dungeons. 他在地牢里看见一个戴着脚镣的男孩。 来自辞典例句
v.描写,描述;画(人物、景象等)
- It is difficult to portray feelings in words.感情很难用言语来描写。
- Can you portray the best and worst aspects of this job?您能描述一下这份工作最好与最坏的方面吗?
v.画像( portray的过去式和过去分词 );描述;描绘;描画
- Throughout the trial, he portrayed himself as the victim. 在审讯过程中,他始终把自己说成是受害者。
- The author portrayed his father as a vicious drunkard. 作者把他父亲描绘成一个可恶的酒鬼。 来自《现代汉英综合大词典》
讨论会; 座谈会; 广播专题讲话节目; 集会的公共场所( forum的名词复数 ); 论坛,讨论会,专题讨论节目; 法庭
- A few of the forums were being closely monitored by the administrators. 有些论坛被管理员严密监控。
- It can cast a dark cloud over these forums. 它将是的论坛上空布满乌云。
n.坚韧
- Tenacity is the bridge to success.坚韧是通向成功的桥。
- The athletes displayed great tenacity throughout the contest.运动员在比赛中表现出坚韧的斗志。
adv.恰好,正好,精确地,细致地
- It's precisely that sort of slick sales-talk that I mistrust.我不相信的正是那种油腔滑调的推销宣传。
- The man adjusted very precisely.那个人调得很准。
adj.口的;张口的;敞口的;多洞穴的v.目瞪口呆地凝视( gape的现在分词 );张开,张大
- Ahead of them was a gaping abyss. 他们前面是一个巨大的深渊。
- The antelope could not escape the crocodile's gaping jaws. 那只羚羊无法从鱷鱼张开的大口中逃脱。 来自《简明英汉词典》
adj.无线的;n.无线电
- There are a lot of wireless links in a radio.收音机里有许多无线电线路。
- Wireless messages tell us that the ship was sinking.无线电报告知我们那艘船正在下沉。
n.反对的观点,反对者,反对票,肺病;vt.精读,学习,默记;adv.反对地,从反面;adj.欺诈的
- We must be fair and consider the reason pro and con.我们必须公平考虑赞成和反对的理由。
- The motion is adopted non con.因无人投反对票,协议被通过。
n.虫子;故障;窃听器;vt.纠缠;装窃听器
- There is a bug in the system.系统出了故障。
- The bird caught a bug on the fly.那鸟在飞行中捉住了一只昆虫。
n.慷慨的赠予物,奖金;慷慨,大方;施与
- He is famous for his bounty to the poor.他因对穷人慷慨相助而出名。
- We received a bounty from the government.我们收到政府给予的一笔补助金。
adj.挫败的,失意的,泄气的v.使不成功( frustrate的过去式和过去分词 );挫败;使受挫折;令人沮丧
- It's very easy to get frustrated in this job. 这个工作很容易令人懊恼。
- The bad weather frustrated all our hopes of going out. 恶劣的天气破坏了我们出行的愿望。 来自《简明英汉词典》
adj.固定的,不变的,准备好的;(计算机)固定的
- Have you two fixed on a date for the wedding yet?你们俩选定婚期了吗?
- Once the aim is fixed,we should not change it arbitrarily.目标一旦确定,我们就不应该随意改变。
激励某人做某事的事物( incentive的名词复数 ); 刺激; 诱因; 动机
- tax incentives to encourage savings 鼓励储蓄的税收措施
- Furthermore, subsidies provide incentives only for investments in equipment. 更有甚者,提供津贴仅是为鼓励增添设备的投资。 来自英汉非文学 - 环境法 - 环境法
n.混乱,无秩序
- After the failure of electricity supply the city was in chaos.停电后,城市一片混乱。
- The typhoon left chaos behind it.台风后一片混乱。
a.令人窒息的
- The weather is stifling. It looks like rain. 今天太闷热,光景是要下雨。
- We were stifling in that hot room with all the windows closed. 我们在那间关着窗户的热屋子里,简直透不过气来。
adj.使人震惊的vt.使震惊,使大吃一惊astound的现在分词)
- There was an astounding 20% increase in sales. 销售量惊人地增加了20%。
- The Chairman's remarks were so astounding that the audience listened to him with bated breath. 主席说的话令人吃惊,所以听众都屏息听他说。 来自《简明英汉词典》
n.虚拟信息空间,网络空间,计算机化世界
- She travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
- The teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
n.反对,敌对
- The party leader is facing opposition in his own backyard.该党领袖在自己的党內遇到了反对。
- The police tried to break down the prisoner's opposition.警察设法制住了那个囚犯的反抗。
n.防御,保卫;[pl.]防务工事;辩护,答辩
- The accused has the right to defense.被告人有权获得辩护。
- The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
adj.无名的;匿名的;无特色的
- Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
- The author wishes to remain anonymous.作者希望姓名不公开。
adj.一心一意的;献身的;热诚的
- He dedicated his life to the cause of education.他献身于教育事业。
- His whole energies are dedicated to improve the design.他的全部精力都放在改进这项设计上了。
n.变化;改造;转变
- Going to college brought about a dramatic transformation in her outlook.上大学使她的观念发生了巨大的变化。
- He was struggling to make the transformation from single man to responsible husband.他正在努力使自己由单身汉变为可靠的丈夫。
adj.随机的;任意的;n.偶然的(或随便的)行动
- The list is arranged in a random order.名单排列不分先后。
- On random inspection the meat was found to be bad.经抽查,发现肉变质了。
n.居民,居住者( dweller的名词复数 )
- City dwellers think country folk have provincial attitudes. 城里人以为乡下人思想迂腐。 来自《简明英汉词典》
- They have transformed themselves into permanent city dwellers. 他们已成为永久的城市居民。 来自《简明英汉词典》
n.玩笑,恶作剧( prank的名词复数 )
- Frank's errancy consisted mostly of pranks. 法兰克错在老喜欢恶作剧。 来自辞典例句
- He always leads in pranks and capers. 他老是带头胡闹和开玩笑。 来自辞典例句
不公平( injustice的名词复数 ); 非正义; 待…不公正; 冤枉
- One who committed many injustices is doomed to failure. 多行不义必自毙。
- He felt confident that his injustices would be righted. 他相信他的冤屈会受到昭雪的。
n.腐败,堕落,贪污
- The people asked the government to hit out against corruption and theft.人民要求政府严惩贪污盗窃。
- The old man reviled against corruption.那老人痛斥了贪污舞弊。
n.知更鸟,红襟鸟
- The robin is the messenger of spring.知更鸟是报春的使者。
- We knew spring was coming as we had seen a robin.我们看见了一只知更鸟,知道春天要到了。
n.头巾,兜帽,覆盖;v.罩上,以头巾覆盖
- She is wearing a red cloak with a hood.她穿着一件红色带兜帽的披风。
- The car hood was dented in.汽车的发动机罩已凹了进去。
n.公众注意的中心,聚光灯,探照灯,视听,注意,醒目
- This week the spotlight is on the world of fashion.本周引人瞩目的是时装界。
- The spotlight followed her round the stage.聚光灯的光圈随着她在舞台上转。
n.演戏,行为,假装;adj.代理的,临时的,演出用的
- Ignore her,she's just acting.别理她,她只是假装的。
- During the seventies,her acting career was in eclipse.在七十年代,她的表演生涯黯然失色。
vt.证明…正当(或有理),为…辩护
- He tried to justify his absence with lame excuses.他想用站不住脚的借口为自己的缺席辩解。
- Can you justify your rude behavior to me?你能向我证明你的粗野行为是有道理的吗?
adj.物质上,体格上,身体上,按自然规律
- He was out of sorts physically,as well as disordered mentally.他浑身不舒服,心绪也很乱。
- Every time I think about it I feel physically sick.一想起那件事我就感到极恶心。
adj.无前例的,新奇的
- The air crash caused an unprecedented number of deaths.这次空难的死亡人数是空前的。
- A flood of this sort is really unprecedented.这样大的洪水真是十年九不遇。
n.食物的一份&adj.帮助人的,辅助的
- The poor children regularly pony up for a second helping of my hamburger. 那些可怜的孩子们总是要求我把我的汉堡包再给他们一份。
- By doing this, they may at times be helping to restore competition. 这样一来, 他在某些时候,有助于竞争的加强。
n.类似物,模拟
- The analog signal contains high-frequency video information,which helps make up the picture.模拟信号包括有助于构成图像的高频视频信息。
- The analog computer measures continuously,without proceeding step by step.模拟计算机不是一步一步地进行,而是连续地进行量度。
n.下部构造,下部组织,基础结构,基础设施
- We should step up the development of infrastructure for research.加强科学基础设施建设。
- We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
adj.好辩的,善争吵的
- She was really not of the contentious fighting sort.她委实不是好吵好闹的人。
- Since then they have tended to steer clear of contentious issues.从那时起,他们总想方设法避开有争议的问题。
n.思想(体系)( ideology的名词复数 );思想意识;意识形态;观念形态
- There is no fundamental diversity between the two ideologies. 这两种思想意识之间并没有根本的分歧。 来自《简明英汉词典》
- Radical ideologies require to contrast to their own goodness the wickedness of some other system. 凡是过激的意识形态,都需要有另外一个丑恶的制度作对比,才能衬托出自己的善良。 来自辞典例句
n.性某些语言的(阳性、阴性和中性,不同的性有不同的词尾等)( gender的名词复数 );性别;某些语言的(名词、代词和形容词)性的区分
- There are three genders in German: masculine, feminine and neuter. 德语中有叁性:阳性、阴性和中性。 来自辞典例句
- Japan was fourth among the genders of foreign students. 日本在二十个留美学生输送地中列第四位。 来自互联网
n.非法访问计算机系统和数据库的活动
- The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
- We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
vt.使用,利用
- The cook will utilize the leftover ham bone to make soup.厨师要用吃剩的猪腿骨做汤。
- You must utilize all available resources.你必须利用一切可以得到的资源。