Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Учебник Computing 1 часть.doc
Скачиваний:
3
Добавлен:
01.05.2025
Размер:
349.7 Кб
Скачать

Infected four copies of command.Com , the detonator is triggered.

The detonator in Lehigh is a simple one. It erases a vital part

of your hard disk, making the files on that part of the disk no

longer accessible. You grumble and set about rebuilding your

work, unware that Lehigh is waiting to infect other unsuspecting

computers if you boot from one of those four infected floppies.

Don`t worry too much about viruses. You may never see one.

There are just a few ways to become infected that you should be

aware of. The sources seem to be service people, pirated games,

putting floppies in publicity available PCs without write-protect

tabs, commercial software (rarely), and software distributed over

computer bulletin board systems (also quite rarely, despite media

misinformation).

Many viruses have spread through pirated - illegally copied

or broken - games. This is easy to avoid. Pay for your games, fa-

ir and square.

If you use a shared PC or a PC that has public access, such

as one in a college PC lab or a library, be very careful about

putting floppies into that PC`s drives without a write-protect

tab. Carry a virus-checking program and scan the PC before let-

- 95 -

ting it write data onto floppies.

Despite the low incidence of actual viruses, it can`t hurt

to run a virus checking program now and then. There are actually

two kinds of antivirus programs: virus shields, which detect vi-

ruses as they are infecting your PC, and virus scanners, which

detect viruses once they`ve infected you.

Viruses are something to worry about, but not a lot. A litt-

le common sense and the occasional virus scan will keep you vi-

rus-free.

Remember these four points:

* Niruses can`t infect a data or text file.

* Before runnung an antivirus program, but sure to cold-boot

from a write-protected floppy.

* Don`t boot from floppies except reliable DOS disks or your

original production disks.

* Stay away from pirated software.

Vocabulary

fair and square - honestly

it can`t hurt - it`s probably a good idea

Task 4

Decide whether the following statements are true (T) or fal-

se (F) in relation to the information in the text. If you feel a

statement is false, change it to make it true.

1 Viruses cannot be spread through a computer network, only via

floppies transported from computer to computer.

2 The virus will spread as soon as you put the infected floppy in

your PC.

3 The infector works by interfering in some way with the normal

use of your computer.

4 The detonator in Lehigh works by altering what you see on your

screen.

5 Most viruses spread through pirated games.

6 You should run an antivirus program every time you use your

computer.

- 96 -

7 There are not very many viruses in circulation.

8 Virus shields are more effective than virus scanners.

Task 5

These are answers to questions about the text. Write the qu-

estions.

1 Two, one that infects and one that does the damage.

2 By interfering in some way with the normal use of the computer.

3 After it has infected four copies of COMMAND.COM.

4 Every time you access a hard disk subdirectory or a floppy

disk containing COMMAND.COM.

5 Yes, by using your common sense and by occasionally scanning

for them.

Task 6

Look back in the text and find words or phrases with a simi-

lar meaning to:

1 reproduces

2 infect

3 changing

4 immediately

5 complain

Find words or phrases that have an opposite meaning to:

6 reducing

7 removed

8 records

9 ignorant

10 frequently

Computer security

Security breach blamed on `hacker`

12 year-old

hacks into Hacker causes

- 97 -

bank`s database chaos in city hospital

Computer fraud on the increase

Task 7

In pairs, try to answer these questions:

1 Who or what is a `hacker`?

2 How many ways can you think of to make the data in a computer

secure?

Who Knows What Evil Lurks In The Darkest Corner Of Your PC ?

The combined threat of viruses wreaking havoc on your PC and

probing meddlers gaining access to sensitive data can strike lear

into the hearts of even the most mild-mannered PC managers. Re-

lax... XTree Company has the ultimate in PC protection. AllSafe

teams superior virus prevention with access control and security

reporting.

And while most anti-virus products simply scan for known vi-

rus signatures,AllSafe actually looks for the signs of viruses

attemping to replicate. Once a virus is spotted,AllSafe isolates

it,preventing the virus from infecting your PC. IIf the virus is

known,AllSafe quickly removes it. Even if the virus is unk-

nown,AllSafe studies it and leams its signature immediately,let-

ting you automatically update the virus signature database. Then

you can use AllSafe to scan other disks or systems right away be-

fore an infection can spread,without waiting for a new signature

from the software publisher. So,if you use a standalone PC,fear

not! It's over for the evil virus.

Just as scary as the viruses are those characters that at-

tempt to invade your computer files without autorization. AllSa-

fe's flexible password options let you share or limit access to

as much of your hard disk as you wish. AllSafe keeps out the evil

invaders!

When you need a complete solution - protection against both

viruses and unauthorized entry - choose AllSafe. And like all

XTree Company products,they're easy to install and use. For more

- 98 -

information or to find out where you can buy AllSafe, call one of

our distributors:

Softsel UK(081) 568-8866 P&P(0706) 217-744

Ingram Micro UK(0908) 260-160 Frontline (0256) 27890

The flowchart on the following page represents the steps inb

the process by which AllSafe removes viruses from PCs. Using the

information in the advertisement,match each step with the corres-

ponding letter in the flowchart.

1 Virus signature database is updated. a

2 Is virus known? b

3 All Safe scans other disks or systems in order

to prevent further infection immediately. c

4 AllSafe searches for indications that virsuses

are attempting to copy themselves. d

5 AllSafe identifies and isolates the virus. e

6 AllSafe eliminates the known virus. f

7 AllSafe analyses the virus and learns its

signature straight away. g

Task 9

Find words or phrases in the text which mean:

1 wickedness,badness,danger

2 hides(while waiting to attack)

3 causing a lot of damage

4 people who interfere without authorization

5 terrify, make very afraid

6 combines

7 identified,recognized

8 frightening

9 choices

10 attackers

Task 10

Discuss the following questions:

- 99 -

1 What technique does the advertisement use to persuade pe-

ople to buy the product?

2 Do you think the advertisement is succwssful?Give reasons

for your opinion.

3 What other techniques could be used to sell this kind of

software?

Task 11

Design an advertisement for a PC protection package. Your

advertisement should mention all the features listed below,but

you may others. Choose a name,and decide on the best way to pre-

sent your product.

Features

Password protection - system manager controls what each user

is permitted to do

File encryption - plain text messages are converted into

cipher (code)so that only authorized recipients can read them

Keyboard lock - screen is cleared and keyboard is locked af-

ter pre-set period of inactivity

Task 12

Read this news report and discuss the questions that follow.

NSA CONSULTANT'S SON IS COMPUTER SABOTEUR

'Worm' came from graduate student

A court heard today how a Cornell University graduate stu-

dent,Robert T.Morris Jr(25)0,infected a host of government and

educational computer centres with a computer virus, known as a

'worm',which literally brought all computational activity to a

halt in over 6,000 installations. Morris,the son of a prominent

National Security Agency computer consultant,was sentenced for

his offences yesterday. As punishment,he was required to spend no

time in prison but,instead , serve three years ' probation,cont-

ribute 400 hours of community service, and to pay a $10,000 fine

along with associated court probation costs.

- 100 -

1 How serious do you think Robert Morris's crime was?

2 Do you think the punishment was

a too severe?

b about right?

c not severe enough?

3 Do you know of any similar incidents of computer hacking?

WORD-PLAY

Task 13

The words and phrases below are taken from this unit. In pa-

irs or groups,decide if they have a "protective" or a "destructi-

ve" meaning as they are used in the unit, then put them under the

correct heading.

detonator infector erase pirated

infect write-protect tab worm virus scanner

hacker password smart card shield

signature cipher keyboard lock access control

protective destructive

----------- -------------

----------- -------------

----------- ------------

----------- ------------

----------- ------------

----------- ------------

----------- ------------

----------- ------------

How many other ways can you think of to classify them?

Unit 11

Puzzle

1 A computer virus ....... itself so that it can spread from com-

puter to computer.

- 101 -

2 The term used for the part which performs the virus`s main da-

maging work.

3 A computer being inhabited by a virus is called ........ .

4 The term used for a notch on a floppy disk which may be covered

to prevent the disk being written to ......... .

5 What are the 2 kends of antivirus programs .......... .

6 To ......... from infecting your PC special protective software

is used.

7 Flexible ........ let you limit access to your disks.

8 To ....... means to reload the operating system.

9 An entirely self-replicating virus which is not hardware depen-

dent is called a ........ .

10 A program that defects viruses ........ .