时间:2018-12-25 作者:英语课 分类:礼节美语


英语课

   Dylan早上见到同事Cory和Brenda, 告诉他们公司出事了。


  Dylan: Hey, Cory....did you hear about the break-in?
  Cory: No! Burglars broke in? Did they steal anything valuable?
  D: Actually, they might have gotten quite a bit of valuable information. But it wasn't thieves, it was online hackers 2.
  C: Ah, so somebody broke into our computer system! Oh, good morning, Brenda. Did you hear the news? There was a cyber attack!
  B: Oh my! But I thought we had very strong Internet firewalls.
  D: We do, but all it takes is one mistake and hackers can come pouring in like an invading army.
  Dylan问同事Cory听没听说公司有人非法闯入break-in, 不过不是真的有人夜盗,而是 online hackers 网上的骇客。The hackers broke into our computer system. 骇客进入了公司的电脑系统,这也可以被称为 cyber attack. 尽管公司安装了 Internet firewalls 互联网防火墙,但是稍一疏忽大意,还是被骇客钻了空子。
  B: Does the I.T. department have any idea how this happened?
  D: It looks like the hackers got in from an unsecure corporate 3 e-mail account.
  C: And then they loaded up a virus?
  D: Not a virus, but they put spyware or malware into our system.
  C: I've heard of spyware but what's malware?
  B: Malware is short for "malicious 4 software." Malware is any kind of software that is specially 5 designed to infiltrate 6 a computer system.
  C: So spyware is a kind of malware.
  公司电脑技术部门的调查显示,这次袭击是通过一个 unsecure e-mail account 没加保密措施的电子邮箱偷偷安装的 spyware 或 malware. malware是 malicious software两个字连在一起产生的,spyware间谍软件是malware恶意软件的一种,都是破坏电脑安全的软件,目的是渗透进入电脑系统,infiltrate is spelled i-n-f-i-l-t-r-a-t-e, infiltrate, infiltrate 意思是渗透 。
  B: Sometimes the malware follows each keystroke you make, and then sends the information back to the hacker 1.
  D: Or, sometimes they install a program called a Trojan horse that steals data.
  C: Do you think this cyber attack was instigated 7 by one of our competitors?
  D: I don't want to point fingers, but it certainly could be. If a Trojan horse got into our mainframe it could download a lot of sensitive info about our company's upcoming product launches.
  B: Many companies do spy on each other....but of course, it's illegal.
  特洛伊木马程序 Trojan horse 也是骇客常用的一种程序,目的是盗取电脑系统里的数据。Brenda说,现在很多公司都 spy on each other 彼此展开电子间谍行动,那这次的骇客入侵是不是他们公司竞争对手干的呢?Dylan说,I don't want to point fingers. 我不想指责谁,to point fingers at someone 是一种很形象的说法,意思是指责某人做某事,但是如果骇客真在他们公司的电脑系统里安装了特洛伊木马程序的话,就可能盗取很多 sensitive information 敏感的信息。

1 hacker
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
2 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
3 corporate
adj.共同的,全体的;公司的,企业的
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
4 malicious
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
5 specially
adv.特定地;特殊地;明确地
  • They are specially packaged so that they stack easily.它们经过特别包装以便于堆放。
  • The machine was designed specially for demolishing old buildings.这种机器是专为拆毁旧楼房而设计的。
6 infiltrate
vt./vi.渗入,透过;浸润
  • The teacher tried to infiltrate her ideas into the children's minds.老师设法把她的思想渗透到孩子们的心中。
  • It can infiltrate as much as 100 kilometers into enemy territory at night.可以在夜间深入敌领土100千米。
7 instigated
v.使(某事物)开始或发生,鼓动( instigate的过去式和过去分词 )
  • The government has instigated a programme of economic reform. 政府已实施了经济改革方案。
  • He instigated the revolt. 他策动了这次叛乱。 来自《现代汉英综合大词典》
标签: 礼节美语
学英语单词
AAP (analyst assistance program)
air operating electric light
airbrushed
albizzin
amberized
antiartillery
autobike
balancing procedure
basal cell carcinoma of face
bearing holder
Bogatyrëvo
boot-leg
British Accounting Association
Brocard point
bucephala islandicas
Camellia parafurfuracea
carbon circuit breaker
centrifugal tar extractor
cinnabar moths
computer literacies
creepage distance
cushioned-seat coach
Darcy law of resistance
denomination currency
diddlysquats
discretionary wiring machine
double break contact
ductile fracture
dynamic balance test
e and m leads
ectopocystis
esophageal sarcoma
feareth
filsting
for-loop block
French type machinist's hammer
full-point
fuselis
hexachaetous
high frequency feeder
home monitoring
honeybush
impracticalities
intrinsicates
jeans' radiation law
kerb-crawlers
Kopites
Kārvāndar, Rūdkhāneh-ye
liability to outsiders
Lumsum
made mountains of molehills
magnetic isoanomalous line
malakoplakia of genitourinary system
male - pattern baldness
Mboula
microdosimetricspectra
microfilariae
Mitsuze-tōge
nasty-looking
non-contact magnetic recording
non-hazardous area
nonsister chromatids
officery
on all sides
opercular fold
perseverances
Piliophen
piquant sauce
Plexus venosus vesicalis
postdiction
precision thermometer
Puccinia scleriae
pulsus aequalis
radio frequency energy
rag-and-bone
reductios
retractable bit
reviviscible
rigger brush
ringing generator
sambas
SearchMash
sequential testing
single-phase three wire system
skandas
solar spectrum
songvid
spatial disequilibrium
squarenesses
stared out
Tar River
td.
think ... up
transabled
translation operation
tubularian
u-shaped adapter
upthrust bearing
vitamin K-1
VSIP
wall gecko
water-rot