Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
пособие(2).doc
Скачиваний:
133
Добавлен:
14.03.2016
Размер:
3.31 Mб
Скачать

3. Complete the sentences on the text:

1) According to the text a hacker is …

2) "Hacking" historically referred to …

3) The term and concept of hacking was popularized in …

4) Today hacking and hackers are commonly associated with …

5) A few highly skilled hackers work for … to protect … from outside hacking.

4. Read Text 2 and find out what a ‘virus’ is: Text 2

The term computer "virus" originated to describe machine code command inserted into a computer's memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker's intent, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe. Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability. Each example is appropriately termed an "exploit." An exploit causes unintended or unanticipated behavior to occur in a computer's operating system or applications while propagating itself within the computer.

An exploit which operates through a network security vulnerability or "hole" without previous access to the vulnerable system is a "remote" exploit. An exploit that needs prior access to a system is termed a "local" exploit. These are usually intended to increase the hacker's access privileges beyond those granted by a system administrator. Worms are simply viruses that send copies over network connections. A bomb resides silently in a computer's memory until set off by a date or action. A Trojan horse is a malicious program that cannot reproduce itself, but is distributed by CD or e-mail.

5. Work in pairs and interview your partner asking these questions:

1) Have you ever come across viruses? If yes, was your computer seriously damaged? 2) Did you feel angry at those who created the virus? 3) What did you do to solve the problem of viruses?

6. Read Text 3 and find out what is recommended to protect a computer: Text 3

Avoid Computer Holes/Vulnerabilities

Install only trusted software and delete unknown emails. If you have any doubt about a piece of software's function, do not install it. If you receive e-mails from random people's names, resist your curiosity and do not open it, just delete it. Under no conditions download or open attachments from anyone that you do not know and even then be cautious. Avoid adult web sites, a hacker's paradise. Whether in your e-mail or online, do not click on ads. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.

Install Anti-Virus Software

Anti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of these programs. The anti-virus software eliminates or isolates/quarantines the infected files. For the individual, commercial software is relatively inexpensive; however, there are free anti-virus programs available. Since new viruses appear almost daily with new code it is imperative that you update you antivirus program often to keep up with these threats; therefore, make sure to set your program to update automatically. To avoid the annoyance of computer slowdown schedule full scale scans late at night.

Do you personally follow all the recommendations from the text in order to protect your computer? What else can be done?