2017年12月英语六级阅读练习100篇:保护个人计算机

2017-12-07 14:31:07来源:网络

  保护个人计算机安全的技巧

  It's near impossible to defend oneself from thekind of cyber attack that targeted Google Inc. andmore than 30 other companies. But for the averagecomputer user there are some common-sense stepsthat can help protect against viruses and othermalicious computer code.

  对于针对谷歌以及其他30多个公司的网络攻击,个人几乎毫无招架之力。但对普通计算机用户来说,只需采取一些常识性步骤即可免受病毒和其他恶意代码的侵扰。

  Install antivirus software. This can protect a computer against known malicious programsthat could allow a hacker to steal personal information. Cyber criminals release thousands ofnew programs each day so it is important to update antivirus software.

  安装杀霉软件。这样可将已知恶意程序拒之门外,以防黑客窃取个人信息。网络罪犯每天发布数千个新程序,因此及时更新杀毒软件十分重要。

  Install software patches. Companies such as Microsoft Corp. and Adobe Systems Inc. areconstantly issuing small updates to the Windows operating system and PDF reader inresponse to newly identified security bugs. Users should be sure to install these so-calledpatches.

  安装软件补丁。微软和奥多比系统公司等公司均不断发布小的的更新程序以修补Windows操作系统和 PDFreader程序中新发现的安全漏洞。用户应当及时安装这些补丁。

  Be suspicious. Consider attachments to emails, links on social-networking sites and files fordownload on Web sites guilty until proven innocent. These are the most common ways thatcriminals load malicious software onto a victim's computer.

  保持戒心。除非确保安全无毒,否则一律将电子邮件附件、社交网站链接和网站上的可下载文件视同病毒处理。这些是罪犯将恶意软件传送到受害者计算机的最常用伎俩。

  Be vigilant in public. Sign out of your Gmail, Yahoo or Hotmail account when using a publiccomputer and clear the Web browser's cache, cookies and history. Then close the browser.

  在公共场合保持警惕。用公共计算机登录Gmail、雅虎或 Hotmail邮箱后应登出,清空浏览器缓存、cookie和历史,然后关闭浏览器。

  People with access to sensitive information need to take extra precautions. They could betargeted by hacker who could takes steps,including sending malicious software in an emailthat appears to come from someone the victim knows. One way to guard against this is toencrypt important files. Also, businesses should deploy systems that track where sensitiveinformation is being sent.

  接触敏感信息的人士需特别小心。他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。重要文件加密是有效的保护措施之一。公司用户还应当配备能够跟踪敏感信息发送路径的系统。

  Use strong passwords. Create passwords that are a mix of numbers, letters and symbols. Don't use common words or personal information. Don't use the same password on multiplesites. Put one on your cellphone.

  使用安全密码。使用包含数字、字母和符号的混合密码。不要以常用单词或个人信息作为密码,不要在多个站点使用同一密码,手机也要设置密码。

  1.It's near impossible to defend oneself fromthe kind of cyber attack that targeted GoogleInc. and more than 30 other companies.

  本句是一个复合句。It是形式主语,真正的主语是后面的todefend oneself...companies不定式短语。其中that引导限制性定语从句,修饰 cyber attack。

  语法重点:形式主语,定语从句

  2. This can protect a computer against known malicious programs that could allow ahacker to steal personal information.

  本句是一个复合句,that引导限制性定语从句,修饰programs。to steal personal information是allow的宾语补足语。

  语法重点:定语从句,宾语补足语

  3. They could be targeted by hacker who could takes steps,including sendingmalicious software in an email that appears to come from someone the victim knows.

  本句是一个复合句,主句是they could be targeted by a hacker。 who引导限制性定语从句,修饰hacker。其中including...email现在分词短语作伴随状语。that引导定语从句,修饰email。

点击查看:全国英语六级全真模拟试卷

六级资料免费下载:2017年12月大学英语六级大纲词汇

英语六级必备工具:测测你的词汇量能过六级吗

大学英语六级寒假全程班

大学英语六级寒假全程班

-->

扫码即刻查分 四六级最新答案

四六级好课 海量资料定期更新

更多资料
更多>>
更多内容
更多>>
更多公开课>>
更多>>
更多资料