1 UNIT 20 The ex-hacker 2 Starter 1 3 Starter 1 1. Hackers Unite 2. A new phishing scam which substituted a bogus website address for any bank details in the computer. 3. Kevin Metnick 4. The hackers ran up a £ 1m phone bill 5. 2 and 3 6. It forced them to slow down or even stop working. 4 Listening Listening 2 Think about these questions before you listen • How could you hack into a system? • How could you stop people hacking in to a system? Listening 3 1. Hacking in to a large American company 2. He is a computer security expert 3. They hand over information such as passwords without checking that the person asking for it is authorized 4. “guest” OR “demo” OR “help” 5. Restricts access to a network 6. You can make sure remote clintes are who they say they are 7. A common name or a dictionary word or any thing short 8. Failed access attempt Listening 4 1. At school he discovered that what computers would let him see depended on the password he typed in 2. He got into part of the system that asked for ID but display the ID in the screen at the same time 3. For money, criminal purposes, political purposes and often because it’s challenging and exciting 4. It was a challenge and fun 5. He and his friends never tried to cover their attack. They boasted to friends and girls 6. Because he knows the ways he would try to break in to their systems 7. They tend not to these days because it’s illegal 8. Hollywood shows hackers coming into systems via the internet. In reality about 75% of all hacks into company computers are done by current staff 9. Not as risky as buying something by credit cards and throwing away the receipt 10. Get a separate card with a small limit Listening 5 1. A rud message for the CEO 2. Someone who advises companies how to prevent hacking 3. By trying to guess somebody's password or finding a bug that will allow people with certain passwords to get in where they shouldn’t 4. a computer geek, a young anorak 5. They meet at conferences from time to time 6. He says he doesn’t go much for Hollywood hackers 7. It’s the retailers who are swindled out of money 8. Your computer needs to have a smart card reader 12 Language Work 6 Language Work 6 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Find out. Hand over. Tracked (Ralph) down. Break into, hack into, get into. Log on. Go about, set about. Phone up. Throw away. Grown up. Hacking into. Keep ahead. 14 Language Work 7 Language Work 7 1. Throw away 2. Hack into 3. Grown up 4. Set about 5. Phones (you) up, hand (it) over 6. Shut down 7. Ran up 8. Work out 9. Note down 10. Checkout 16 Word study 8 A Viruses & distruvctive programs Logic bomb B C D E Data Communicati on Systems Protection Internet WEB Bandwidth Bandwidth Domain name Browser FTP Domain name IRC IRC Pagers ISP ISP Usenet Router Hyperlink URL URL Usenet XML Anti-virus software Backups Trigger routine Encryption Trojan Firwalls Passwords Bandwidth GPS IRC