VOA慢速英语(翻译+字幕+讲解):防范互联网黑客的9个办法
日期:2015-03-03 12:53

(单词翻译:单击)

SbL&0,lRF^,B(v^h|@Petu^zuFDL&

听力文本

g+knWQ[a9O@)7Qk_

An increase in cyber-attacks and identity theft make the Internet seem like a scary place these days.

hUEw5(hEjX;%KK2D^pg

The hacking of Sony Pictures led the news for some time. The U.S. State Department public email system was shut down. Even the White House was a target of cyber-attack.

fqK%0z[~U@P]D0n

Last week, there were reports of a billion dollar theft from European banks and secret viruses on millions of computer systems across Russia, China, India, Iran and elsewhere. This raises a question:

;F3gj.2#K3nvrD*

How can individuals protect or make it more difficult for hackers to access their information?

%xq-*hVH1qzDzW2

Here are nine tips that can help you protect against cyber-attacks:

i4OB4PlNRI..3&

1. Make your password harder to hack

*k&@85DO5#4Hj~J

Hard passwords include upper and lower case letters, numbers and special characters. They should be at least eight characters in length. They should also not spell out words easy for hackers to find, like your pet's name or the name of a family member.

.MlBP[WjIliHo54bp

2. Change your password regularly

+w-w2,g6GA&68^Ssmoi

A very common mistake made by users is to create one hard password, but then never change it. Remembering a long list of complicated passwords can be difficult. But no password is unbreakable. Hackers are better able hack multiple accounts if those accounts all have the same password. A password management service, like Dashlane or PasswordBox, can help you keep track of hard passwords. These services permit users to easily store and secure their passwords.

H!lZoJ%sU0iOGd2HbiNR

3. Clear your browser history

zXZlv8HTqHh8@|wr~

This goes for all the devices you use in a day – your home computer, your work computer, or your friend's iPad. Internet browsers like Firefox or Chrome keep track of where you've been and what you've done online. They keep records of every site you visited. Information about what you sent from or saved on your computer can be kept for days or weeks. It is very easy for anyone who sees that information to steal a detailed record of your online activities.

3[;QwbR-n)I=I;Sni5

4. Do not use free Wi-Fi

~XUo-@7]eyS+BI

An increasing number of public places now offer free wireless access to the Internet. Often, a user does not need a password to connect to these wireless networks. These services might be useful, but they're also an easy way for hackers to access everything on your device. Unless you really need it, it is best not to use it.

8=3Z[qPyldv+AO;^uVG

5. Use HTTPS

QoZHDefxPYoXTrCKR

HTTPS is officially known as "hyper-text transfer protocol secure." It is similar to HTTP, which is used to enter Internet addresses. HTTPS adds an extra layer of security and encryption while online. Communications between users and sites that support HTTPS are encrypted. The information is also authenticated. That means that HTTPS can determine whether or not a website is real.

,_ku&V,#GtF

6. Watch what you click

3br@T%|(hM

One of the most popular and successful ways hackers infect your computer is through a technique called phishing. Phishing occurs when someone opens an email attachment that looks real. But the attachment is actually a virus that immediately infects the user's computer. If someone sends you a file or a website you did not ask for, it is best to not click on it.

Gpn(@*F[^ybfk&e5

7. Try not to use public computers

HJwKVXsuIpj~_

For many people, not using a public computer can be difficult. Those without a computer or Internet access at home often use Internet cafes to get online. However, the more different people use a computer, the more likely a virus has infected it.

nh0b1;R[@72,r*dvgV=

8. Use anti-virus protection

lQqO1)+jQ^7+4f64

There are many anti-virus services available for users. They can offer many different types of computer protection. Some anti-virus services are even free. They are a great way to have a professional help keep users one step ahead of hackers.

W+|@--a@9F.

9. Be careful while using thumb drive

BM58+S9#MszxytBNyE

Thumb drives, also known as flash drives, are small and easy storage devices to use across different computers. They are a popular device that people use to exchange files and documents. They can also spread viruses easily across computers and networks.

ayX+tR4c~JbJ2YO9Sm

I'm Jonathan Evans.

B)J]n;kYLSjs

词汇解释

R6W1X~cDqo3r4QAV+R

1.unbreakable adj. 牢不可破的;不易破损的

@h56eo%~|49

Tableware for outdoor use should ideally be unbreakable.
户外使用的餐具最好是不容易被打破的38-@JpvH;7+~Pa()ux7r

VeCW]j)uJdx]g5r_;.

2.browser n. [计] 浏览器;吃嫩叶的动物;浏览书本的人

~g0&vxQbuU

You need an up-to-date Web browser.
你需要一个最新的网络浏览器2&1oc^2Y%|!_[

0vyM8q^|Uua9

3.authenticated v. 已认证;已验证(authenticate的过去分词)

rcNjaNp]#yXf

He says he'll have no problem authenticating the stamp.
他说他完全可以鉴定这枚邮票Bf=.c2++R5@HyfNZ

urg5Mqz1_HqXE29Oau=

4.phishing n. 网络钓鱼;网络欺诈(以虚假的身份和形象随机骗取个人帐号和密码等)

;fxKEou+3KZw]

The study traced the spread of one particular spying malware, usually spread by a "phishing" email which, if opened, downloaded a hidden programme on to the computer network.
这项研究跟踪了一个钓鱼程序PMH+Zt=Ee]l7@^I。 这个钓鱼程序通过电子邮件传播,一旦打开,自动从互联网下载某个隐藏的恶意软件~Hb@B5AF*;+3LTJgm8a2

AEm[Efy^+_*2H;vCktSR

内容解析

d=o7,(&u~@^k6WZkaLe4

1.They are a great way to have a professional help keep users one step ahead of hackers.

fKvL4Q-Vn()jc=

step ahead of 领先一步

2@M@Kx4Qa@]l

Successful travel is partly a matter of keeping one step ahead of the crowd.
成功的旅行在某种程度上就是要比人群先走一步6GP;!WZMkXt@(c

6o#k)f&_^~O9OD

Businessmen cluster together to get ideas, tips, personal contacts anything to get a step ahead of the computer.
商人们聚集在一起寻求创意、建议、人际关系等,以便能比计算机领先一步+MZ~KT#bstrP

!zJ@hbK@JOyTx

参考译文

-!vjKQ9ZC1KiP

最近网络攻击和身份盗窃使得互联网看起来是个吓人的地方CR]HdHE-jkHD;[

*02OIKx~W,IlM;-.n

索尼影音入侵案成为这些天的头条,美国国务院的公共电子邮件系统已经关闭,甚至白宫也成为互联网攻击的对象&4G~PlHf-qrnU

~T9rpg7@hR2*q(|sDF_

上周有报道称欧洲银行被盗数十亿美元,秘密病毒隐藏在俄罗斯、中国、印度、伊朗等地数百万电脑中,这就引发了一个问题:

mO(^[A@^z7UgZ#H61O*

个人如何进行保护,或者说让黑客更难获得自己的信息?

m(6NX3=gH(8%

下面的9个方法可以帮助你免受网络攻击:

=Ptwxf&D[3jTKoU

1.让你的密码难以破解

c_C2;6Y12=I)

牢固的密码包括大、小写字母、数字和特殊字符,长度至少是8位,不应该是让黑客容易拼出的单词,比如你宠物或家庭成员的名字_baK3SYJdT#xgmu8J

ss,;Wuu]g(

2.定期修改密码

j9B#xb.J4BK2Hp2IkJ

用户常犯的错误是设置一个牢靠密码后几乎不修改,记住一长串复杂的密码是件难事,但没有哪个密码是不可破解的a6;~rE=l%mJF。如果各个账户的密码相同,那么黑客更容易破解多个账户BQ73TZ~j_z3pQoUX(](+。像Dashlane或PasswordBox之类的密码管理软件可以帮助你记录复杂密码,这些软件能让用户轻易地储存密码并确保其安全OksJGd&6S@Hp(J,NqhG

n]!l(DQju&9c6h

3j^vIF0wx;qlLLOb8!;。清除你的浏览记录

)OY(d!qY#*4%wnt^

这适用于你当天使用的所有设备,你的家用电脑、工作电脑、或者你朋友的iPadA~UZOkXiK=Z。Firefox或Chrome等互联网浏览器会记录你在网上去过和做过的事情,能记录你的所有访问记录eKWW7^0D#zZu1。你在电脑上发送或存储的信息能保存数天或数周,看到这些信息的任何人都能轻易窃取你在网上详细的活动记录F9bDlLj=r(g68

lM&a6CtApCMvTgko

4.不要使用免费无线网络

0BWzfFnjpUHTF9-8=5cy

越来越多的公共场合现在提供免费的无线网络,用户通常无需密码就可以连入这些无线网络,这些服务可能有用,但也可能让黑客轻易地获得你设备上所有内容1*9fy%_EQ2,zAY%B8q。除非真的需要,否则不要使用j%%^4~c_;i1Yj(&y

NX]g9Lwt)rCq4]

5.使用安全连接

JfZ))mJuvDBqIOY

HTTPS的正式名称是安全超文本传输协议,它类似于HTTP,HTTPS在上网时增加了一项额外的安全加密层Rq~nsZX#DHkL。用户和网站之间支持HTTPS的通信已经加密%%ROPVv@Os2P8kD-SZL。信息经过验证G)rmNa~avr,fcQ%@sfK;。这就意味HTTPS可以确定一家网站是否是合格网站LMQ&7KE&cDt2^PP

hC(xKz%+obwPfnbYC]Os

6.谨慎点击

dWJRd)f@Od.

黑客感染电脑最常见和最成功的方法是通过名叫网络钓鱼的技术,当人们点开看起来像真的邮件附件时,网络钓鱼就发生了v~qXYF)vpSXFjV5^oURu。但这种附件其实是病毒,能立即感染用户的电脑bhxPKzAg5wL%。如果有人主动向你发送文件或网址,最好不要点击pJif-I*S57t9]S#I4

3xQChK!t|w

7.不要使用公共电脑

kImXA]6O5@dV|3]

对很多人来说,不使用公共电脑会比较难UkBp^[~2-c。那些家中没有电脑或互联网的人经常会到网吧上网,不过,使用这台电脑的人越多,就越可能感染上病毒Y)_o88iQ-]U2l#_+

Q5YX8cuJu-qX]WlclI

8.使用杀毒软件

Vz|pEYDfUG7zdbd[jqk

有很多杀毒软件可供用户选择,这些软件能提供多种电脑保护A|Qah8A3;g4]sRQi。有些杀毒软件甚至是免费的,这就是请专家帮助使用户领先于黑客的好办法-pRd|M6QNqzFk2|h

Uf9x8^Tj8ha@R79b^L

9.使用U盘要小心

G8y|kJaa@AvLa

U盘也叫闪盘,是一种跨电脑使用的小型便捷储存设备,人们通常用它来交换文件和文档,U盘可以轻易地在电脑和网络之间传播病毒8yZHBWXFO7ckoWfOu

UHRGh]Nz3w79Ei-7

我是乔纳森·伊万斯L|yhKZR7.T4gr

Be,xyIHJr;-_8FMP

译文为可可英语翻译,未经授权请勿转载!

P7R7#vMxCYS9&5Vl78sfML~[KlDfyM3DnnKvQ
分享到
重点单词
  • determinev. 决定,决心,确定,测定
  • complicatedadj. 复杂的,难懂的 动词complicate的过去
  • authenticatev. 证明(某物)为真
  • hackn. 劈,砍,出租马车 v. 劈,砍,干咳
  • multipleadj. 许多,多种多样的 n. 倍数,并联
  • professionaladj. 职业的,专业的,专门的 n. 专业人员
  • attachmentn. 附件,附著,附属物,依恋,忠诚,依赖 [法律]扣押
  • exchangen. 交换,兑换,交易所 v. 交换,兑换,交易
  • transfern. 迁移,移动,换车 v. 转移,调转,调任
  • permitn. 许可证,执照 v. 允许,许可