Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
eng.docx
Скачиваний:
74
Добавлен:
31.08.2019
Размер:
2.04 Mб
Скачать
  1. Обсудите следующее. Составьте диалоги:

  • What do you know about the history of synopsis?

  • What is the aim of the creation of viruses?

  1. Сделайте сообщение по теме: «“Synopsis”. Describe Ни- history of synopsis and tell some words about creators of viruses».

*=" TEXT № 12

  1. Активные слова.

Слово

Перевод

Предложение

an informatics faculty

факультет

информатики

2 November 1988 Robert Morris younger (Robert Morris), graduate student of informatics facultv of Cornwall University (USA) infected a great amount of computers, connected to Internet network.

an Internet network

сеть Интернета

a network worm

сетевой червь

Network worm has struck 6200 machines that formed 7.3% computers to network, and has shown, that UNIX not okay too.

a symptom

симптом

Svrnotom: hundreds or thousands of jobs start running on a Unix system bringing response to zero.

a site

сайт

This virus is spreading very quickly over the Milnet. Within the past 4 hours, it has hit >10 sites across the country, both Arpanet and Milnet sites.

Trojan program

Троянская

программа

Meanwhile Troian programs aimed at causing harm or damage to PC’s.

a damage

повреждение

2. Ответьте на вопросы к тексту:

■f What was the attacker?

  • Who infected a great amount of computers, connected to Internet network?

  • Who has imposed a prohibition on all material relating to the Morris virus?

•f When did Robert Morris infect a great amount of computers?

  • When did the author come to FBI headquarters in Washington on his own?

How many dollars would have been Morris sentenced?

  • Why do not Reproducing programs harm your system?

  • Why do the viruses evolve as if they were alive?

.4. Прочитайте текст и переведите его на русский

Ш1МК.

From the history of computer viruses

Л bit of history

  1. November 1988 Robert Morris younger (Robert Morris), и graduate student of an informatics faculty of Cornwall University (USA) infected a great amount of computers,

  • oimected to Internet network. This network unites machines '•I university centres, private companies and governmental limits, including National Aeronautics Space Administration, ни well as some military scientific centres and labs.

I November the author of the virus — Morris — come to I III headquarters in Washington on his own. FBI has imposed и prohibition on all materials relating to the Morris virus.

2'1 January 1989 a court of jurors has acknowledged lorris guilty. If denunciatory verdict had been approved

without modification, Morris would have been sentenced to

  1. years of a prison and 250.000 dollars of fine. However, Morris’ attorney Thomas Guidoboni immediately has lodged a protest and directed all papers to the Circuit Court with the petition to decline the decision of the court... Finally Morris was sentenced to 3 months of a prison and fine of 270 thousand dollars. Cornwall University carried a heavy loss, having excluded Morris from its members. The author had to take part in the liquidation of its own creation.

It is necessary to differentiate between reproducing programs and Trojan horses. Reproducing programs will not necessarily harm your system because they are aimed at producing as many copies (or somewhat-copies) of their own as possible by means of so-called agent programs or without their help. In the later case they are referred to as “worms”.

Meanwhile Trojan programs aimed at causing harm or a damage to PC’s. Certainly it’s a usual practice, when they are a part of “tech-organism”, but they have completely different functions.

A network worm has struck 6.200 machines that formed 7.3% computers to network. Among damaged things were NASA, LosAlamos National Lab, exploratory center VMS USA, California Technology Institute, and Wisconsin University (200 from 300 systems). According to “Wall Street Journal”, a virus has infiltrated networks in Europe and Australia, where there were also registered events of blocking the computers. Here are some recalls of the event participants:

Symptom: hundreds or thousands of jobs start running on a Unix system bringing response to zero.

Systems attacked: Unix systems, 4.3BSD Unix and variants send mail compiled with debug. This virus is spreading very quickly over the Milnet. Within the past 4 hours, it has hit >10 sites across the country. Well over 50 sites have been hit. Most of these are “major” sites and gateways.

Method: Someone has written a program that uses a hole in SMTP Send mail utility. This utility can send a message Into another program.

Apparently what the attacker did was this: he or she connected to send mail, issued the appropriate debug command mid had a small С program compiled. This program took as nil argument a host number and copied two programs — one ending in VAX.OS and the other ending in SunOS — and I l ied to load and execute them. In those cases where the load Miid execution succeeded, the worm did two things: spawn a lot of shells that did nothing but clog the process table and Imii ii CPU cycles. It used both individual host files and any ul her remote hosts it could locate which it had a chance of

  • <>nnecting to. It may have done more: one of our machines i hanged super user password, but because of other factors we’re not sure this worm did it.

As you see, there are different types of viruses, and they have already been separated into classes and categories. For imitance: dangerous, harmless, and very dangerous. No ileatruction means a harmless one, tricks with system halts means a dangerous one, and finally with a devastating dent,ruction means a very dangerous virus.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]