位置:首页 > 在线广播 > 新奇事件簿 > 正文
新奇事件簿(翻译+字幕+讲解):网站还在修补漏洞
日期:2015-02-11 17:43

(单词翻译:单击)

2G1uZPhQRVi9s3]HQOlTIHFAIBTXg

听力文本

9rk#JNm2x2C-

Many companies are trying to make their websites safe from a new Internet bug called Heartbleed. It is like a hole in the security of websites that hackers can use to get private information. The bug was in security software used by most Internet sites. Millions of sites used the software after it became available onNew Year's Eve, 2011. The bug was in it then but was only found last week. The big sites, like Google, Yahoo, YouTube, Amazon, etc., quickly made a patch to fix the bug. However, many small sites and thousands ofapps are still at risk. It is still possible for hackers to access passwords and other confidential information. Hackers already broke into Canada's tax system and stole 900 passwords.

FA9Py%fH3pL#Rnfr

u=3204662162,2914061257&fm=21&gp=0.jpg

oUPsLp&Ngm03~g9~jyN

Internet security experts say more than a third of people who use the Android Jelly Bean OS are still waiting for a patch. Google has made all of its other services safe, such as Search, Gmail, YouTube and Play, but is working with its partners to create a fix for Jelly Bean. BlackBerry is also working to release a patch to its users later this week. Meanwhile, the man who accidentally created the bug spoke to reporters.He said: "I am responsible for the error because I wrote the code." He added: "Unfortunately, this mistakealso slipped through the review process and therefore made its way into the released version." He said it was a "simple programming error".

*GA%*gUe~S.w8HGB8

中文翻译

]SMb[3vJg~jW_e7+o

许多公司正在试图让网站免受网络安全漏洞“Heartbleed”的侵扰U_u)vkEXvc。这是一个网络安全漏洞,黑客可以利用这一漏洞来窃取私人信息EjUU3z25UX&4RrRn。这一漏洞存在于安全软件之中,而大多数的网站都使用了这一软件r1wVY-pnV6HP6GqL_*3。就在这一安全软件在2011年新年前夕上映时,上百万个网站都使用了这一软件nJX3X8ol#1bxbbP。这一漏洞在上周刚刚发现CKIz)aD%!k。谷歌、雅虎、亚马逊、YouTube等网站都迅速进行了修补*b-&35KigBMPp=t!c。但是,许多小网站,以及成千个应用仍然处在危险当中GDI^h0BWgpUHIhJA。黑客仍然有可能获取密码,以及其他秘密信息nd9o8#ud~]Uj]oww。黑客已经进入了加拿大的税务系统,并盗走了900个密码2G+9yrhE50jY*Q

s0j67%5tR!44|

互联网安全专家说有超过三分之一使用安卓软心豆粒糖的用户还在等待修补b;HO]oj%-JW^h-BgAW。谷歌已经确保了其他服务软件的安全,例如搜索引擎、Gmail、YouTube以及Play,但是,还在努力修复软心豆粒糖的安全问题zLlaj3db(|。这周晚些时候,黑莓也正在加紧为用户推出补丁%nR]j7mb6V_gF=C71D。与此同时,那位无意之间留下隐患的开发员说:“我对这样的错误负责,因为这是我写的n#8V*!FCO=。”他还说:“不幸的是,这一错误不仅出现在了审核过程,而且还出现在了发行版本之中PopyP%+](Nfb1do8。”他说这就是一个简单的程序错误QJ.y@Z=N=gy)CU。”

F#W9G;~=iX9i3@AYmqa

译文属可可原创,仅供学习交流使用,未经许可请勿转载

+d;Q%9i-+k=Qql|h

重点讲解

K;vB9SY)2Ns

PTxO7)bDkh6k2F]

Q_1yq~]4S]KZf#e,CP]

g&ufUdZI5~MW~lLm

1.confidential information 机密信息

GI5B=Kvx.SRr#]N

He could also obtain confidential information without any of the parties being aware.

Mw=M%8X(CSa~+J9kp

他还能在没有任何一方发现的情况下获得机密信息Jn#Bw;4_q-f

D!89)J~mr.a#TH

2.wait for 等候

qUy1Y9W50z3]6Yq

Where do I wait for the express to Edinburgh?

Qfj@8!otFZEYHsATpk+

我到哪里等候开往爱丁堡的快车呢?

(zSM;^lw#tvCt,YP|.

3.be at risk 处于风险之中

U+Kb]GG|XFv

Until we know which parts, if any, failed on Flight 447, it is impossible to know which other planes mightbe at risk.

qc&J#mvzZ;M

在我们知道法航447航班上到底是哪个零部件出现故障之前,是根本不可能知道其他的哪些飞机有着潜在的危险5fcy=A]N2V@TFiTH

i~IxvT]eq6pK2ZFs49X

4.be responsible for 对……负责

|(*.890!CrB]!

Do you want to be responsible for your own life decisions?

DW|ZhIBIAS

你是否真的想要为你自己的人生决定负责?

Y4XOt^0fZzxDL+&ib

听力题目

FCGpvAi8,,.qLR

k=9GdsSa=;V*Py#

fznxzx5Q97y6

1.What did the article say Heartbleed was like?

@#RSQ*[8ef#b

a) a library

87-Pg]ag)2e8e0hf

b) a hole

Bn2dlik#@]3YcfcTED%H

c) a monster

&aIW~.sk@z

d) a headache

[Pm|,n;NKYPx6S

2.How many sites used the infected software?

0q#R74uqj(

a) tens of thousands

;niNZtah(J|M@

b) hundreds of thousands

OX|E|JQY*p6n*fR

c) billions

(+b^W&^)=-sB[pDK

d) millions

&ny@j1HtvnZ_b

3.In what year did Heartbleed appear?

)cC=;=9b#dMOt21Mlk

a) 2011

d!4F3bfk%hiGb.g&5_Su

b) 2012

MP]!68RB]~=zpYKr&V6x

c) 2013

q;;JE!B=d5pujAlL

d) 2014

QevxBh_z2vMp_c

4.What did many sites quickly make?

lNk@L=wKk;4=[Z@4@XSn

a) money

a]Rf[v2yYvIN]@N.-z

b) excuses

lqYWGkqZLaL^rD

c) a patch

XOKqtFzXUFY

d) mistakes

Hrgtl8Y##9l

5.How many passwords did hackers steal?

cTzv]@|,H)_

a) 9,000

I4~7=LAQ#jco6ajv+R3~

b) 900

DRp2Y)LJO0_dJyQ13Wz

c) 90,000

t4P-qlzGhT5T

d) 900,000

fvw(DDG6*ByN2(WKRzBt

6.How many Jelly Bean users are waiting for a patch?

.abRVO&m8DI

a) 42 million

x)(=Ei=bYj~3F6y#pI;

b) just a few

u5MRT|PZnun[|;

c) more than a third

nWVHASaR[Njv5Ju

d) those with the green ones

;|nf_R]W,oLX]w^yEE7N

7.Who is Google working with to create a patch?

_q+[CGZ!xx3WmK2D

a) the World Wide Web

DlY8F+=(nJyDSG_-R

b) Facebook

jTxtU+^7B9~R

c) the US Government

VvBT[UCAn#S*N+9..Rp

d) its partners

aGL-[y_-G-

8.When will BlackBerry's patch be available?

(m|Hug*GlvGO

a) later this week

8D@=0D[B=Op7_Qw

b) tomorrow

)lz^^fYr&&YRPho^x9

c) next month

l8;XnMT,5uOAD#9

d) when the manager comes back

wKYt-(SolorQBs

9.Why does the man who created the big say he is responsible?

N#GMQx@!KlA9.Ig;[T

a) he wrote the code

_WCRG|ez.KY=Af[

b) he knew it would be a problem

EBMFcIz4J.pmHbcpUc

c) he did not report it

^X=*)-7,JEX

d) he was the chief bug-spotter

2D5D5j=~_2B2

10.What kind of mistake did the man say he made?

O+ZNT57p!7diKfw

a) a huge one

nm&c.pR,Mq&Hmx(ReK

b) a simple one

Vd&nqoSy[|=9Htyq+a

c) an unforgivable one

Ja-~PhU+)Yv

d) the kind anyone could make

]V8+Tr9Jo3*x0,AkL#TJ

听力答案

Pb]I1q558FrnD4%8

1.b

cc]ONUuLwz+

2.d

3D1[j(vZ]|

3.a

p.ZBVl.kVIsXu

4.c

-W7k08%n,1Ky

5.b

t8~!tnAMs&S1%

6.c

JMT^Ho)Ff3h^d8

7.d

T4I7z=T|dQ%n8%yp]

8.a

)8nZ1EcJw*~5]5zN

9.a

J|a_UxC-3D_&

10.b

bn8IGg&%4&Pwj=Xzy(X1lUT%+lcN^;+Y3.W%&)*-n
分享到
重点单词
  • impossibleadj. 不可能的,做不到的 adj. 无法忍受的
  • obtainvt. 获得,得到 vi. 通用,流行,存在
  • availableadj. 可用的,可得到的,有用的,有效的
  • patchn. 补丁,小片 vt. 修补,补缀 n. 呆子
  • securityn. 安全,防护措施,保证,抵押,债券,证券
  • confidentialadj. 秘密的,值得信赖的,机密的
  • flightn. 飞行,航班 n. 奇思妙想,一段楼梯 n.
  • coden. 码,密码,法规,准则 vt. 把 ... 编码,制
  • spokev. 说,说话,演说
  • releasen. 释放,让渡,发行 vt. 释放,让与,准予发表,发