时间:2018-12-18 作者:英语课 分类:2010年ESL之商务英语


英语课

14 Dealing 1 with Website Hackers 4



GLOSSARY 5


hacker 3 – a person who tries to access and/or change the information on anotherperson’s computer or website, usually to get secret information or to destroy acompetitor’s computer system* How long would it take a hacker to break into the government’s computernetwork and access criminals’ records?


to access – to be able to see or obtain something; to be able to get something* Nobody can access the personnel files unless they have the keys to the filingcabinet.


server – a large computer that controls other computers on a network, sharinginformation between and among the computers, and often hosting manycomputer programs* Is that computer program stored on your computer, or on the server?


to embed 6 – to put something inside something else; to lock something in placeas part of something else* Do you like the new graphics 7 we’ve embedded 8 on the website?


malicious 9 – mean, cruel, and hurtful; with the intention of doing evil or hurtinganother person* The other kids made such malicious comments that she came home fromschool in tears.


code – computer programming language that cannot be read by people whoaren’t experts in that language; instructions that tell a program or computer whatto do or how to do something* They had to review more than a million lines of code to find the error in theprogram.


to redirect – to send someone or something in a different direction* When we walked into the room, we all looked at the paintings on the walls, butthe museum’s tour guide redirected our attention to the beautiful ceilings andfloors.


security – safety; protection from danger or interference* The office is increasing security by making all employees show identificationbefore entering the building.


to encrypt – to protect information by writing it in a special language so that itcannot be read by other people while it is sent* Never send your social security number via email unless you’re sure themessage is encrypted.


database – a collection of information stored on a computer in an organized wayso that it is easy to sort and to find pieces of data* They created a customer database that includes each customer’s name,contact information, and past purchase information.


to patch – to fix something that is broken or isn’t working properly, usuallyfocusing on one part of a larger thing* Harold patched the hole in the roof to keep the rainwater out of his bedroom.


vulnerability – a weakness; something that leaves one open to attack or danger* The army’s greatest vulnerability is on the northern side, where the mountainsmake it more difficult to protect the soldiers.


to pay the price – to suffer negative consequences for something one has (not)done in the past* Now in her 50s, Greta’s health is failing and she is paying the price for all thesmoking and drinking she did in her teens and 20s.


to be back up – for a program or website to be working again after a periodwhen it was not working* The technicians had to shut down all the computers to install an upgrade, buteverything should be back up again within an hour.


24/7 – 24 hours a day, 7 days a week; all the time; without stopping* Our telephone support center is open 24/7, so if you have questions you cancall anytime.


security measure – something that one does to try to keep something safe andsecure* As a security measure, the embassy requires all its employees to be indoorsafter 9:00 p.m.


to wreak 10 havoc 11 – to create many problems; to create a disaster* The weather is wreaking 12 havoc on Florida’s tomato crops.


COMPREHENSION QUESTIONS


1. Which of these would be the best way to improve website security?


a) Embed malicious code.


b) To access the server.


c) Patch any vulnerabilities.


2. What does Valerie mean when she says the specialist has been working24/7?


a) She has been working without stopping.


b) She has been working 24 hours and seven minutes.


c) She has been working 24 hours at $7 per hour.


______________


WHAT ELSE DOES IT MEAN?


server


The word “server,” in this podcast, means a large computer that controls othercomputers on a network, sharing information between and among the computers,and often hosting many computer programs: “If your website traffic continues togrow like this, you’ll need to pay for a bigger, faster server.” A “server” is also awaiter, or a person who brings food to customers in a restaurant: “Hello, myname is Sasha and I’ll be your server this evening. Would you like to hear aboutour specials?” In sports, a “server” is the person who hits the ball to begin agame of tennis or volleyball: “Christine is a really strong server, so I hope she’son our volleyball team again this year.”


patch


In this podcast, the verb “to patch” means to fix something that is broken or isn’tworking properly, usually focusing on one part of a larger thing: “The politiciansare trying to patch the old law by passing several related laws.” The verb “topatch” is normally used to talk about putting a small piece of something over alarge hole or rip: “If you put patches over the ripped knees of your jeans, they’lllook much better.” Or, “This jacket has patches over the elbows, making thefabric stronger there.” The phrase “to patch things up” means to stop arguingwith another person or to end an argument: “I don’t know if Gregory and I willever be able to patch things up after what happened last weekend.”


CULTURE NOTE


Some American hackers have “gained” (earned; received through their actions)“notoriety” (fame for something bad that one has done) for their computer-relatedcrimes.


Jonathan James was the first American “juvenile” (child; someone less than 18years old) to be “incarcerated” (put in jail) for a computer-related crime. When hewas 15 years old, he hacked 13 into many computer systems, including those forthe BellSouth communications company and the Miami-Dade school system.


More seriously, he hacked into some of the computers that were part of the U.S.


Department of Defense 14, downloading software worth about $1.7 million.


A man named Kevin Mitnick was “convicted” (found guilty of a crime) of “identitytheft” (the crime of using another person’s name and other identifyinginformation). He hacked into computer networks to get the “birth certificates”


(official documents showing when and where someone was born) of very youngchildren who had “passed away” (died) and then used them as his new identity.


Other people hack 2 into computer networks to try to steal money by accessingcredit card information. American hackers Adam Botbyl, Brian Salcedo, and PaulTimmins got access to the computer system for Lowe’s, which is a large “chain”


(group of stores with the same name in many different locations) of homeimprovementstores. They created a program to steal shoppers’ credit cardinformation, but they were caught and convicted before they could do muchdamage.


Finally, some hackers create “worms,” or special computer programs that moveacross computer networks, causing damage to many computers. In 1988,Robert Tappan Morris created the Morris Worm, which spread across theInternet very quickly and “infected” (got into and made sick) thousands ofcomputers. It cost $200-$53,000 to fix each damaged system.


______________Comprehension Questions Correct Answers: 1 – c; 2 – a


COMPLETE TRANSCRIPT 15


Welcome to English as a Second Language Podcast number 592: Dealing WithWebsite Hackers.


This is English as a Second Language Podcast episode 592. I’m your host, Dr.


Jeff McQuillan, coming to you from the Center for Educational Development inbeautiful Los Angeles, California.


Visit our website at eslpod.com. Download a Learning Guide for this episodethat will help your improve your English even faster.


This episode is called “Dealing With Website Hackers,” people who go into awebsite to damage it or hurt it. Let’s get started.


[start of dialogue]


Valerie: You’ll never guess what happened over the weekend.


Bill: What?


Valerie: Our website was attacked by hackers, and nobody could access it.


Bill: You’re kidding! What did they do?


Valerie: They got access to our server and embedded some malicious code thatcaused the site to be redirected to their own website.


Bill: But I thought our site had really good security. Didn’t we hire a programmerlast year to encrypt the database and patch any vulnerabilities?


Valerie: That’s what we should have done. So now, we’re paying the price.


Bill: The site seems to be back up, though.


Valerie: Yeah, we brought in a specialist on Friday and she’s been working on it24/7. Let’s hope she puts in the security measures we should have had allalong, and this will never happen again.


Bill: Right, at least until some creative hacker comes up with a new way to wreakhavoc.


[end of dialogue]


Valerie begins the dialogue by saying, “You’ll never guess what happened overthe weekend.” That phrase, “you’ll never guess,” means that you have somesurprising news, some unusual news that the other person could not evenimagine. Bill says, “What?” Valerie replies, “Our website was attacked byhackers, and nobody could access it.” A “hacker” (hacker) is a person who triesto go into a website to either steal secret information or to somehow destroy ormake the website not work properly. “To access” means to be able to see or getsomething; it’s often used when we are talking about something that is private orsecret. Do not let anyone get access to your bank account; they could steal yourmoney!


Bill says, “You’re kidding! What did they do?” What did the hackers do? Shesays, “They got access to our server and embedded some malicious code.” The“server” (server) here means a large computer that is on the Internet, or it is acomputer that is linked up to many other computers. It often has certaincomputer programs or software on it. All websites on the Internet are on aserver; it allows you to get to the website – to access that computer where theinformation for the website is stored. “Server” has a couple of different meaningshowever; take a look at the Learning Guide for some additional explanations.


The hackers got access to Valerie’s server and embedded some malicious code.


“To embed” (embed) means to put something inside of something else, to makeit a part of something else. So here, the hackers have taken the good code – thegood program on the website, and they have added – they have embeddedsome malicious code. “Malicious” means mean, cruel, something you dobecause you want to hurt someone. “Code” (code) is simply the computerprogramming language that you have to understand and know in order to use.


Basically, they are instructions that tells the computer what to do or how to dosomething. So here, Valerie’s server was embedded with some malicious, badcode that caused the site to be redirected to their own – the hackers’ – website.


“To redirect” means to send someone in a different direction. They were going toyour website, you redirect them to another website so they automatically gettransferred, if you will, to another website, and that’s what happened with thehackers.


Bill says, “But I thought our site had really good security.” “Security” here meansprotection from danger, safety. “Didn’t we hire a programmer last year to encryptthe database and patch any vulnerabilities?” A “programmer” is someone who works with computer program languages, who makes, for example, software andwebsites. Last year, they hired a programmer to encrypt (encrypt) the database.


“To encrypt (something)” is to protect your information by using a special code orlanguage that no one else can read or understand. In computer terms, thingsthat are encrypted usually require that the other person has the special key – thespecial code that would allow them to read what you have produced. This is acase of the website having an encrypted database. A “database” is a collectionof information stored on a computer in some organized way so that it is easy tofind something. The programmer was also supposed to patch any vulnerabilities.


“To patch” (patch) means to fix something that is broken or isn’t workingcorrectly, usually by focusing on one part of a larger thing – one area where themain problem is. This is a term used nowadays to talk about fixing problems withcomputer programs on the Internet, especially problems related to security.


“Patch” however has other meanings in English, and those you can find in theLearning Guide. A “vulnerability” is a weakness, something that leaves you opento attack or danger. Websites have vulnerabilities; they have weak spots – weakpoints where someone can enter in illegally, without permission.


Valerie says, “That’s what we should have done,” meaning they didn’t hire theprogrammer. “Now,” she says, “we’re paying the price.” “To pay the price” heremeans to have something bad happen to you, we might say to suffer negativeconsequences for something that you didn’t do in the past. So if you come toLos Angeles and you rent a car, and you decide Los Angeles is a safe city, I’mnot going to lock my car, I’m going to leave my car open. Well, you will probablyget your car stolen and you will pay the price. You will suffer the negativeconsequences, primarily to your insurance or to your credit card.


Bill says, “The site seems to be back up, though.” “To be back up” whendescribing something on the Internet – a website – means that the website isworking again after a long period, or a certain period when it was not working.


That is to be back up. “Is the website back up?” The opposite is the website isdown. When we say a website is “down,” we mean it’s not working; you can’taccess it.


Valerie says, “Yeah, we brought in a specialist on Friday and she’s been workingon it 24/7.” This expression “24/7” means, literally 16, 24 hours a day, 7 days aweek; or in other words, all the time, without any stopping. Many largecompanies have technical support 24/7; you can call them at any time. You maynot necessarily talk to someone who knows how to help you, but you cancertainly call them! Valerie says, “Let’s hope this specialist puts in the security measures we should have had all along (meaning before, in the past), and thiswill never happen again.”


Bill says, “Right (I agree), at least until some creative hacker comes up with (orinvents; creates) a new way to wreak (wreak) havoc (havoc).” “To wreak havoc” means to create a lot of problems, to create a disaster where things are totallydestroyed, or they’re a big mess.


Now let’s listen to the dialogue, this time at a normal speed.


[start of dialogue]


Valerie: You’ll never guess what happened over the weekend.


Bill: What?


Valerie: Our website was attacked by hackers, and nobody could access it.


Bill: You’re kidding! What did they do?


Valerie: They got access to our server and embedded some malicious code thatcaused the site to be redirected to their own website.


Bill: But I thought our site had really good security. Didn’t we hire a programmerlast year to encrypt the database and patch any vulnerabilities?


Valerie: That’s what we should have done. So now, we’re paying the price.


Bill: The site seems to be back up, though.


Valerie: Yeah, we brought in a specialist on Friday and she’s been working on it24/7. Let’s hope she puts in the security measures we should have had allalong, and this will never happen again.


Bill: Right, at least until some creative hacker comes up with a new way to wreakhavoc.


[end of dialogue]


The script for this episode was written by someone who’s never malicious, Dr.Lucy Tse.


From Los Angeles, California, I’m Jeff McQuillan. Thank you for listening. Comeback and listen to us next time on ESL Podcast.


English as a Second Language Podcast is written and produced by Dr. Lucy Tse,hosted by Dr. Jeff McQuillan, copyright 2010 by the Center for EducationalDevelopment.




1 dealing
n.经商方法,待人态度
  • This store has an excellent reputation for fair dealing.该商店因买卖公道而享有极高的声誉。
  • His fair dealing earned our confidence.他的诚实的行为获得我们的信任。
2 hack
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
3 hacker
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
4 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
5 glossary
n.注释词表;术语汇编
  • The text is supplemented by an adequate glossary.正文附有一个详细的词汇表。
  • For convenience,we have also provided a glossary in an appendix.为了方便,我们在附录中也提供了术语表。
6 embed
vt.把…嵌(埋、插)入,扎牢;使深留脑中
  • The harpoon struck but did not embed.鱼叉击中了但并没有插入。
  • This photo showed us how did the root of plant embed the soil deeply.这张照片显示植物的根是如何深入到土壤里去的。
7 graphics
n.制图法,制图学;图形显示
  • You've leveraged your graphics experience into the video area.你们把图形设计业务的经验运用到录像业务中去。
  • Improved graphics took computer games into a new era.经改进的制图技术将电脑游戏带进了一个新时代。
8 embedded
a.扎牢的
  • an operation to remove glass that was embedded in his leg 取出扎入他腿部玻璃的手术
  • He has embedded his name in the minds of millions of people. 他的名字铭刻在数百万人民心中。
9 malicious
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
10 wreak
v.发泄;报复
  • She had a burning desire to wreak revenge.她复仇心切。
  • Timid people always wreak their peevishness on the gentle.怯懦的人总是把满腹牢骚向温和的人发泄。
11 havoc
n.大破坏,浩劫,大混乱,大杂乱
  • The earthquake wreaked havoc on the city.地震对这个城市造成了大破坏。
  • This concentration of airborne firepower wrought havoc with the enemy forces.这次机载火力的集中攻击给敌军造成很大破坏。
12 wreaking
诉诸(武力),施行(暴力),发(脾气)( wreak的现在分词 )
  • Coal mining is a messy business, often wreaking terrible environmental damage nearby. 采矿是肮脏的行业,往往会严重破坏周边环境。
  • The floods are wreaking havoc in low-lying areas. 洪水正在地势低洼地区肆虐。
13 hacked
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
14 defense
n.防御,保卫;[pl.]防务工事;辩护,答辩
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
15 transcript
n.抄本,誊本,副本,肄业证书
  • A transcript of the tapes was presented as evidence in court.一份录音带的文字本作为证据被呈交法庭。
  • They wouldn't let me have a transcript of the interview.他们拒绝给我一份采访的文字整理稿。
16 literally
adv.照字面意义,逐字地;确实
  • He translated the passage literally.他逐字逐句地翻译这段文字。
  • Sometimes she would not sit down till she was literally faint.有时候,她不走到真正要昏厥了,决不肯坐下来。
标签: ESL英语
学英语单词
(of a silkworm) molt to go through the chrysalis state
amethystanthus japonicus nakai
Ampcoloy
antipodism
arsentsumebite
asymmetric conductivity
autogyro rotor
bacterial calls
ballet british colombia
bioocclusion
biotropic
birth control measure
carried-out
Caryophyllineae
cell granulations
chimney exit diameter
chresard
closer-in
consultation committee
coolant distribution unit
cryptands
Cupressus sempervirens
daylight robberies
direct-geared
dito
domestic staff
electronic band
exceptional performance
eye-blinks
fixture for boring machine
flood-level rim
formrs
green machine
hisds
homatropine eye drops
i could have wept
Iepê
igloo
imagistically
intropressions
isooctyl alcohol
joint and several obligation
laser raman photoacoustic spectrometry
lebanese pounds
line terminator
love beat
main spar
mapmakings
mat-forming
mecke
media check
meta-anthracite
methylmetal-crylates
mixed tumor of submaxillary gland
monarchia
moss locust
muckamuck
Muhamut
musculoligamentous
nitrocellulose varnish
nonstratified crown
Norheimsund
onagers
online monitoring
ooxanthines
order Spirochaetales
oxoglutaric
particulars of goods
pestiferously
postheparin
potato beans
power supply main
precipitron
press agencies
PsLogList
refolds
relieving oppression and masses
rere-county
residence half
restimulates
self-directing missile
single-spindle lathe
slab amplifiers
sode ash
soft-pedalleds
sphericities
static MOS inverter
stratified sand
stringifying
subsonic ejection seat
swallowers
systems analysis and design
target.com
the means of production
tourism area
true folding
uncastigated
uniform heat flux
vestibule floor
visual relief map
width of ruled area