时间:2018-12-16 作者:英语课 分类:2012年VOA慢速英语(四)月


英语课

Technology Report - Microsoft Takes On Zeus


This is the VOA Special English Technology Report.


The Microsoft Corporation is making progress in efforts to stop one of the most harmful cybercrime operations active today. It is called Zeus.
Last week, an American judge ordered the group of cybercriminals to end their illegal activities. A week earlier, federal officials raided office buildings in two states and seized evidence related to the Zeus family of computer software. Richard Boscovich is with Microsoft’s Digital Crimes Unit.
RICHARD BOSCOVICH: “The objective was to go in there and be able to seize evidence which would lead us to hopefully identify the individuals behind the Zeus family of malware as well as ultimately identify the computers of people all over the world that are compromised. That is, that they have the malware on their computer. Their being victimized, being used to victimized others and they don’t even know about it.”
Cybercriminals use Zeus to create a network of infected computers, or botnet, to steal personal information from computer users. Mr. Boscovich says the operation reaches around the world.
RICHARD BOSCOVICH: “We’ve identified this particular malware was present at any particular point in time in at least thirteen million computers worldwide.”
Malware means malicious 1 software. It also can be called a computer virus or worm. Mister Boscovich says it is mostly spread through a normal everyday activity.
RICHARD BOSCOVICH: “The malware is spread through emails where people inadvertently are tricked to click on a particular link on the email or visit a particular site. And once that happens, the objective is to infect the person’s computer with this piece of malware.”
The malware is programmed to record every key you strike on a computer keyboard. It gathers details about the websites you visit, your usernames and passwords, or other personal information. The information is then sent to the botnet’s command center.
RICHARD BOSCOVICH: “What that is is a location on the Internet. It could be domain 2 based or IP based, where the criminals will direct all of these computers that they’ve infected to every once in a while literally 3 call out to these domains 4 or these IPs asking for directions.”
Much of the stolen information is sold on the black market. The information can be used to steal money from bank accounts or make purchases online without the victim’s knowledge. Officials say these malware invasions are one of the main causes of identity theft.
Microsoft brought a case against the Zeus operation on March nineteenth. The company released the details of the case after the buildings were raided on March twenty-third.
Next week, we will tell more about the raids, Zeus, and what Microsoft says computer users can do to protect themselves. We will also talk about other recent efforts to fight cybercrime.
And that's the VOA Special English Technology Report, written by June Simms.  I'm Steve Ember.

1 malicious
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
2 domain
n.(活动等)领域,范围;领地,势力范围
  • This information should be in the public domain.这一消息应该为公众所知。
  • This question comes into the domain of philosophy.这一问题属于哲学范畴。
3 literally
adv.照字面意义,逐字地;确实
  • He translated the passage literally.他逐字逐句地翻译这段文字。
  • Sometimes she would not sit down till she was literally faint.有时候,她不走到真正要昏厥了,决不肯坐下来。
4 domains
n.范围( domain的名词复数 );领域;版图;地产
  • The theory of thermodynamics links the macroscopic and submicroscopic domains. 热力学把宏观世界同亚微观世界联系起来。 来自辞典例句
  • All three flow domains are indicated by shading. 所有三个流动区域都是用阴影部分表示的。 来自辞典例句
学英语单词
absorption
Aleksandrovskiy Zavod
alptop
alternative-power
angiostrongylosis
antirachitic rays
arteriae genu superior lateralis
blue blindness
bovine piroplasmosis
centenary appraisal
centreless bar turning machine
chrominance demodulation
coefficient of transmissivity
concept dependency
coniferization
converter motor
conway's diffusion analysis
coscinodiscus janischii
cultural theory of risk
current probe
dan burite
decision process for hypothesis testing
decisively
deprotonated molecule
desilverizing
destroy the material evidence
DRD
Dripsey
electron-meson interaction
Epipremnum aureum
family-planning
feed magazine
feed meal
generalized programming (gp)
GM_between-or-among
Gonostegia parvifolia
gorhams
granma
grease manufacture
hydraulic system control handle
i'itoi
image scale
initiating process
insecurity
Jashobeam
juxtaposing protein
key to tape input
kuinanensis
Kwilu (Cuilo, R.)
labour handbook
livestock pool
lnl
longhorn beetles
made no scruple about doing
maximum dust content
media ca?a
media go
musculi compressor vaginae
Mustela frenata
necrodochium
non-data-ink
nutted
of all times
olympic movement
outside caliper
overlond running
oxyjavanicin
parvums
Pay the piper while others call the tune.
pomegranate tree
pyreneola semiplicata
quasi-nondivergent
quinconazole
radiative capture
Reconstruction Acts
rectovesical muscle
Rhododendron hirsutipetiolatum
riveted steel
rumbling diastolic murmur
sans culottes
sauris inscissa
Shilabo
simulator for marine powerplant
single-pass internal reflection element
staties
stomatologist
strettons
strigatella auriculoides
sub-ranges
synchro resolver repeater
system checker
Tatarka
thibodeaux
tread on sb's toes
trimethylene glycol
tuebingen
turbine overspeed testing pit
undeclared war
VHF homing adapter
vitriolum caeruleum
wool-fell