450)=450"> Dylan早上見到同事Cory和Brenda, 告訴他們公司出事了。 Dylan: Hey, Cory....did you hear about the break-in? Cory: No! Burglars broke in? Did they steal anything valuable? D: Actually,---1---. But it wasn't thieves, it was online hackers. C: Ah, so somebody broke into our computer system! Oh, good morning, Brenda. Did you hear the news? There was a cyber attack! B: Oh my! But I thought we had very strong Internet firewalls. D: We do, ---2---. Dylan問同事Cory聽沒聽說公司有人非法闖入break-in, 不過不是真的有人夜盜,而是 online hackers 網(wǎng)上的駭客。The hackers broke into our computer system. 駭客進入了公司的電腦系統(tǒng),這也可以被稱為 cyber attack. 盡管公司安裝了 Internet firewalls 互聯(lián)網(wǎng)防火墻,但是稍一疏忽大意,還是被駭客鉆了空子。 B: Does the I.T. department have any idea how this happened? D: ---3---. C: And then they loaded up a virus? D: Not a virus, but they put spyware or malware into our system. C: I've heard of spyware but what's malware? B: Malware is short for "malicious software." Malware is any kind of software that is specially designed to infiltrate a computer system. C: So spyware is a kind of malware. 公司電腦技術(shù)部門的調(diào)查顯示,這次襲擊是通過一個 unsecure e-mail account 沒加保密措施的電子郵箱偷偷安裝的 spyware 或 malware. malware是 malicious software兩個字連在一起產(chǎn)生的,spyware間諜軟件是malware惡意軟件的一種,都是破壞電腦安全的軟件,目的是滲透進入電腦系統(tǒng),infiltrate is spelled i-n-f-i-l-t-r-a-t-e, infiltrate, infiltrate 意思是滲透 。 B: Sometimes the malware follows each keystroke you make, and then sends the information back to the hacker. D: Or, sometimes they install a program called a Trojan horse that steals data. C: ---4---? D: I don't want to point fingers, but it certainly could be. If a Trojan horse got into our mainframe it could download a lot of sensitive info about our company's upcoming product launches. B: Many companies do spy on each other....but of course, it's illegal. 特洛伊木馬程序 Trojan horse 也是駭客常用的一種程序,目的是盜取電腦系統(tǒng)里的數(shù)據(jù)。Brenda說,現(xiàn)在很多公司都 spy on each other 彼此展開電子間諜行動,那這次的駭客入侵是不是他們公司競爭對手干的呢?Dylan說,I don't want to point fingers. 我不想指責(zé)誰,to point fingers at someone 是一種很形象的說法,意思是指責(zé)某人做某事,但是如果駭客真在他們公司的電腦系統(tǒng)里安裝了特洛伊木馬程序的話,就可能盜取很多 sensitive information 敏感的信息。
they might have gotten quite a bit of valuable information but all it takes is one mistake and hackers can come pouring in like an invading army It looks like the hackers got in from an unsecure corporate e-mail account Do you think this cyber attack was instigated by one of our competitors
1. 他們或許已經(jīng)盜走了許多重要信息。 2. 但是只要有一個錯誤,駭客們就可以像侵略軍一樣長驅(qū)直入。 3. 看上去駭客們是通過一個未加密的電子郵件進來的。 4. 你覺得這次網(wǎng)絡(luò)攻擊是我們的競爭對手搞的鬼嗎? ——譯文來自: ausko