1. - Северо-Кавказский горно

advertisement
МИНИСТЕРСТВО ОБРАЗОВАНИЯ И НАУКИ РФ
Федеральное государственное бюджетное образовательное учреждение
высшего профессионального образования
«СЕВЕРО-КАВКАЗСКИЙ ГОРНО-МЕТАЛЛУРГИЧЕСКИЙ ИНСТИТУТ
(ГОСУДАРСТВЕННЫЙ ТЕХНОЛОГИЧЕСКИЙ УНИВЕРСИТЕТ)»
Кафедра иностранных языков
Английский язык.
Information security. Hacking.
Учебно – практическое пособие по развитию навыков работы с аутентичными
текстами по направлениям подготовки: 230100.62 – Информатика и
вычислительная техника, 230700.62 – Прикладная информатика в экономике,
0990303.65 – Информационная безопасность автоматизированных систем
Составители: Закаева Б.К., Братчик А. Б.
Допущено
редакционно-издательским советом
Северо-Кавказского горно-металлургического
института (государственного технологического
университета).
Владикавказ 2015г
1
УДК 811.111
ББК 81.2 Англ
З-18
Рецензент:
кандидат филологических наук, профессор, зав. кафедрой иностранных
языков СКГМИ (ГТУ) Делиева Л. М.
З-18
Английский язык. Information security. Hacking.
Учебно - практическое пособие по развитию навыков работы с аутентичными
текстами по направлениям подготовки: 230100.62 – «Информатика и
вычислительная техника», 230700.62, «Прикладная информатика в экономике»,
0990303.65-«Информационная безопасность автоматизированных систем» / Сост.:
Б. К. Закаева; А. Б. Братчик; Северо - Кавказский горно-металлургический
институт (государственный технологический университет). – Владикавказ: Северо
- Кавказский горно-металлургический институт (государственный
технологический университет). Изд-во «Терек», 2015. – 52 с.
Пособие составлено в соответствии с ФГОС ВПО и РУП по всем
направлениям подготовки.
Подготовлено кафедрой Иностранных языков
УДК 811.111
ББК 81.2 Англ
Редактор:
Компьютерная верстка:
© Составление. ФГБОУ ВПО «Северо-Кавказский
горно-металлургический институт (государственный
технологический университет)», 2015
© Закаева Б. К.; Братчик А. Б.., составление, 2015
_______________________________________________________________________________
Подписано в печать ___.____.15.Формат бумаги 60х84 1/16. Бумага офсетная. Гарнитура
«Таймс».
Печать на ризографе. Усл. п.л____. Уч.-изд.л_____. Тираж 30 экз. Заказ № ____.
Северо-Кавказский горно-металлургический институт (государственный
технологический университет). Изд-во «Терек».
Отпечатано в отделе оперативной полиграфии СКГМИ (ГТУ).
362021. Владикавказ, ул. Николаева, 44.
2
ОГЛАВЛЕНИЕ
Предисловие
Lesson 1 Is the devil as black as it is painted?
Lesson 2 Who writes computer viruses?
Lesson 3 Computer hacking – high-tech crime
Lesson 4 How to become a hacker
Lesson 5 The hacker toolbox
Lesson 6 Computer crimes
Lesson 7 The first hackers.
Lesson 8 The ex-hacker.
Lesson 9 The famous hackers
Интерактив
1) Круглый стол
2) Ролевая игра
3) Мозговой штурм
Дополнительные материалы
Приложение
1) Составление аннотации на русском языке
2) Составление аннотации на английском языке
3) Реферирование статьи (текста)
4) Составление плана статьи (текста)
Литература
3
4
5
8
12
15
19
23
27
30
36
41
41
41
42
47
47
48
50
52
Предисловие
Методическое пособие по курсу «Английский язык . Information security.
Hacking.» предназначено для студентов факультета информационных
технологий , а также для всех желающих изучать профессиональный
английский язык .
Цель пособия – подготовить студентов к чтению и пониманию специальной
литературы на английском языке в области информационных технологий и
защиты информации.
Представленный материал позволяет познакомиться с компьютерными
преступлениями, причинами, по которым программисты, пишут вирусыи
разновидностями хакеров. Пособие содержит аутентичные тексты потеме.
Все задания способствуют усвоению и запоминанию специальной лексики;
развивают навыки аналитического чтения, перевода, поиска информации и
говорения на английском языке.
Кроме того, пособие закладывает основы навыков аннотирования и
реферирования англоязычных текстов.
Выражаем благодарность за помощь в создании пособия
студентам группы ИВб-12-1: Насуашвили Левану, Сабанову Сослану,
Манвелянц Владиславу и Цакоеву Заурбеку,
студентам группы Мб-13-1: Бекоевой Оксане и Кисиевой Яне
и студенту группы Мб-13-1 Дмитриеву Максиму.
4
Lesson 1
1. Прочитайте и переведите текст. /Read and translate the text./
Is the devil as black as it is painted?
Thanks to the media, the word "hacker" has gotten a bad reputation. The word
summons up thoughts of malicious computer users finding new ways to harass
people, defraud corporations, steal information and maybe even destroy the
economy or start a war by infiltrating military computer systems. While there's no
denying that there are hackers out there with bad intentions, they make up only a
small percentage of the hacker community.
The term computer hacker first showed up in the mid-1960s. A hacker was a
programmer -someone who hacked out computer code. Hackers were visionaries
who could see new ways to use computers, creating programs that no one else could
conceive. They were the pioneers of the computer industry, building everything
from small applications to operating systems. In this sense, people like Bill Gates,
Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what
computers could do and created ways to achieve that potential.
A unifying trait among these hackers was a strong sense of curiosity, sometimes
bordering on obsession. These hackers prided themselves on not only their ability to
create new programs, but also to learn how other programs and systems worked.
When a program had a bug - a section of bad code that prevented the program from
working properly - hackers would often create and distribute small sections of code
called patches to fix the problem. Some managed to land a job that leveraged their
skills, getting paid for what they'd happily do for free.
As computers evolved, computer engineers began to network individual machines
together into a system. Soon, the term hacker had a new meaning -- a person using
computers to explore a network to which he or she didn't belong. Usually hackers
didn't have any malicious intent. They just wanted to know how computer networks
worked and saw any barrier between them and that knowledge as a challenge.
In fact, that's still the case today. While there are plenty of stories about malicious
hackers sabotaging computer systems, infiltrating networks and spreading computer
viruses, most hackers are just curious -- they want to know all the intricacies of the
computer world. Some use their knowledge to help corporations and governments
5
construct better security measures. Others might use their skills for more unethical
endeavors.
2.Ответьте на вопросы по содержанию текста. /Answer the questions./
1. What reputation has got the word «hacker»?
2. What thoughts does the word «hacker» summon up?
3. When was first the term «computer hacker» showed up?
4. What was a unifying trait among hackers?
5. What do hackers do when a program has a bug?
6. When did computer engineers begin to network individual machines together
into a system?
7. What new meaning of the term hacker has been appeared?
8. Did hackers always have bad intents?
3.Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations./
СМИ, плохая репутация, преследовать людей, обманывать корпорации,
украсть информацию, разрушить экономику, военные компьютерные сети,
нет никаких сомнений, компьютерный код, мечтатели, новые способы,
исследование компьютеров, способы достижения, объединяющая черта,
сильное чувство любопытства , способность создавать программы, ошибка в
программе, использовать навыки, по мере развития компьютеров, начать
соединять, обретать новый смысл, злой умысел, барьер между ними,
проникать в сети, компьютерные вирусы, тонкости компьютерного мира,
корпорации и правительство, меры безопасности.
4. -Закончите следующие предложения, используя текст./Complete the
following sentences, using the text./
1. Thanks to the media, the word "hacker" has gotten …
2. While there's no denying that there are hackers out there with bad intentions,
they make up only…
3. The term computer hacker first showed up …
4. A hacker was a programmer - someone who …
5. Hackers were visionaries who could see new ways to …
6. As computers evolved, computer engineers began to …
7. Soon, the term hacker had a new meaning - a person using computers to …
6
8. Some use their knowledge to help corporations and ….
5. Составьте предложения из двух, подходящих по смыслу частей. /
Connect 1-7 with those of a-g.
1) The word «hacker»
2) They were the pioneers of the
computer industry,
3) A unifying trait among these
hackers was
4) Some managed to land a job
that leveraged their skills
5) As computers evolved
6) They just wanted to know how
computer networks worked and
a) computer engineers began to network
individual machines together into a system.
b) a strong sense of curiosity, sometimes
bordering on obsession.
c) help corporations and governments
construct better security measures.
d) has gotten a bad reputation
e) getting paid for what they'd happily do
for free.
f) building everything from small
applications to operating systems.
7) Some use their knowledge to
g) saw any barrier between them and that
knowledge as a challenge
6.Вставьте недостающие слова / Insert the correct words./
1. Hackers with bad intentions _____only a small percentage of the hacker
community.
2. Hackers were_____ who could see new ways to use computers.
3. Bill Gates, Steve Jobs and Steve Wozniak saw the potential of what computers
could do and_____ ways to ____ that potential.
4. A____ trait among these hackers was a strong sense of curiosity, sometimes
bordering on____.
5. Hackers would often create and distribute small sections of code called _____
to fix problems.
6. The term hacker had a new meaning -- a person using computers to explore a
____ to which he or she didn't belong.
7. Usually hackers didn't have any ____ intent.
7
8. Some hackers might use their skills for more ____ endeavors.
7.Переведите на русский язык. / Translate into Russian./
1. Most virus writers were people who just wanted to test the system and push the
envelope.
2. If somebody instead of working plays pirated computer games all day long, then
it’s quite likely that at some point they will get a virus.
3. With the advent of virus writing kits more people entered into the picture.
4. This sort of activity expanded as the virus and worm and Trojan world expanded
and script worms became common.
5. The botnet creators realized that they could use the botnets to make the infected
computers send out spam.
6. Newer malware tended toward collecting information from systems instead of
crashing them or destroying data.
8.Переведите на английский язык. /Translate into English./
1. Хакеры с плохими намерениями составляют лишь небольшой процент от
хакерского сообщества.
2. Хакер был тем, кто взламывал компьютерный код .
3. Хакеры были основоположниками компьютерной индустрии
4. Билл Гейтс, Стив Джобс и Стив Возняк увидели потенциал того, что
компьютеры могут сделать и создали способы для достижения этого
потенциала.
5.Объединяющая черта среди этих хакеров был сильное чувство любопытства
6.Хакеры создавали программы, которые больше никто не мог себе
представить.
7. Некоторым хакерам удалось получить работу, в которой использовались их
навыки
8. Обычно у хакеров не было никакого злого умысла
Lesson 2
1. Прочитайте и переведите текст. /Read and translate the text./
Who Writes Computer Viruses?
8
The typical caricature of a virus writer is a teenage with no friends who has
something to prove. In reality this is not too far from the truth as guys like this
produce a number of viruses and other malicious software.
The term ‘malware’ is a fairly recent catch-all definition encompassing viruses,
Trojan horse programs, worms, spyware and adware. It is an acronym of MALicious
soft WARE – any computer program designed to cause harm your computer data or
your personal privacy.
Virus programmers can be divided into two main categories – the ‘digital vandal’
who does it for fun and the professional malware programmer who does it for
commercial gain.
Digital Vandals
These are typically young men in their teens and early twenties who are learning
programming and get some kind of buzz out of writing malicious software. They are
probably members of shady internet forums dedicated to virus programming where
they can share ideas, download virus writing toolkits and learn from more
experienced programmers. Usually any software produced by inexperienced
programmers has bugs in it and operates unpredictably. The same is true of
viruses they write – often they do not operate exactly as the programmer intended
because of errors and bugs. Sometimes this means that they are not quite as
destructive as intended, which is no bad thing, but there is also a chance of them
being even more destructive.
Why do the digital vandals do what they do? Usually to earn some kind of
recognition from their peers. They measure each other as to how well their creations
can avoid detection, how fast they can spread and how many millions of dollars
worth of damage they can do.
Professional Programmers
These are the most dangerous and secretive group of programmers. Not only are
they experienced programmers who can produce software free from bugs, but they
spend time studying vulnerabilities in operating systems and application software so
that they can write code to exploit them. They are also often experts in psychology
of computer users, studying patterns and habits. They make it their business to know
what sort of link a user is most likely to click and devise other ways of concealing
their malicious software as something benign.
9
Like the amateur ‘digital vandals’ their goals are to produce devastating programs
that can evade detection for as long as possible and spread to as many users as
possible. The difference is that the professional virus writer can not only produce
software that does this well, but can also operate reliably. This enables the most
highly skilled to command top rates when selling their services.
2. Ответьте на вопросы /Answer the Questions. /
1. Who writes computer viruses?
2. What is malware?
3. What are the main categories of virus?
4. Who are the digital vandals?
5. Why do the digital vandals do what they do?
6. Who are professional programmers?
7. Do professional programmers and digital vandals have anything in common?
8. What is the difference between professional programmers and digital vandals?
3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations /
cartoon , wiseacre , argue , last , develop , share , first , form , discovery , hurt ,
hazardous , close , manners , feasible.
4. Закончите следующие предложения, используя текст./Complete the
following sentences using the text./
1.In reality this is not ___ ___ _____ the truth as guys like this produce a number of
viruses and other malicious software.
2.The term ‘malware’ is a fairly recent _______ _______encompassing viruses,
trojan horse programs, worms, spyware and adware.
3.These are typically young men ___ ______ _____and early twenties who are
learning programming and get some kind of buzz out of writing malicious software.
10
4.Usually any software produced _____________ programmers has bugs in it and
operates unpredictably.
5.Like the amateur ‘digital vandals’ their goals are __ ______________ programs
that can evade detection for as long as possible and spread to as many users as
possible.
5. Составьте предложения из двух, подходящих по смыслу частей. /
Connect 1-5 with those of a-e.
1. The typical caricature of a virus writer is a teenage nerd.
2. The term ‘malware’ is a fairly recent catch-all definition encompassing.
3. Usually any software produced by inexperienced.
4. They make it their business to know what sort of link a user is most likely.
5. This enables the most highly skilled to command top.
a. rates when selling their services.
b. programmers has bugs in it and operates unpredictably.
c. with no friends who has something to prove.
d. viruses, Trojan horse programs, worms, spyware and adware.
e. to click and devise other ways of concealing their malicious software as
something benign.
6. Прочитайте следующие предложения и скажите, соответствуют ли они
содержанию текста. /Read the following sentences and say if they are true or
false. /
1. The term ‘malware’ is a fairly recent catch-all definition encompassing viruses,
Trojan horse programs, worms, spyware and adware_
11
2. Virus programmers can be divided into three main categories_
3. Usually any software produced by inexperienced programmers has not bugs in it
and operates unpredictably_
4. True of viruses they write – often they do not operate exactly as the programmer
intended because of errors and bugs
5. Like the amateur ‘digital vandals’ their goals are to produce devastating programs
that can't evade detection for as long as possible and spread to as many users as
possible_
7. Translate sentence into Russian.
1. The typical caricature of a virus writer is a teenage nerd with no friends who has
something to prove.
2. The term ‘malware’ is a fairly recent catch-all definition encompassing viruses,
trojan horse programs, worms, spyware and adware.
3. Digital Vandals These are typically young men in their teens and early twenties
who are learning programming and get some kind of buzz out of writing malicious
software.
4. Professional Programmers These are the most dangerous and secretive group of
programmers.
5. Like the amateur ‘digital vandals’ their goals are to produce devastating programs
that can evade detection for as long as possible and spread to as many users as
possible. The difference is that the professional virus writer can not only produce
software that does this well, but can also operate reliably.
Lesson 3
1. Read the text and think of the answers to the questions:
COMPUTER HACKING – HIGH-TECH CRIME
What’s your attitude to hacking? Do you think hackers must be punished? If so, in
what way? What can be done to protect a computer from a hacker?
12
You can rob a bank without leaving the house these days. Who needs stocking
masks, guns and getaway cars? If you are a computer whizz-kid, you could grab
your first million armed with nothing more dangerous than a personal computer, a
telephone and a modem to connect them.
All you have to do is dial into the networks that link the computer in large
organizations together, type in a couple of passwords and you can get the
information that’s stored there to your hearts content.
Fortunately it isn’t always quite as easy as it sounds. But, as more and more
information is processed and stored on computer, whether it’s details of your bank
account or the number of tins of baked beans in the stockroom at the supermarket.
A couple of months ago a newspaper reported that five British banks were being
held to ransom by a gang of hackers who had managed to break into their computer.
The hackers were demanding money in return for revealing exactly how they did it.
In cases like this, banks may consider paying just so they can protect themselves
better in the future.
No one knows exactly how much money is stolen by keyboard criminals –
banks and other companies tend to be very secretive if it happens to them. Some
experts believe that only around a tenth of all computer crimes are actually reported.
Insurance company Hogg Robinson estimate that computer frauds cost British
companies an incredible 400 million pound a year.
Most computer crimes are “inside jobs”, where staff with access to the
company’s computers fiddle with the records. A comparatively small amount are
committed by the more glamorous – and headline-grabbing – hackers.
The true hacker, it seems, doesn’t do it for financial gain. The thrill appears to
be, not in getting rich, but in beating the system. Two of Britain’s most notorious
hackers are Nicolas “Mad Hacker” Whitely and Edward Singh. Whitely hacking
days came to an abrupt halt in June, when 21-year-old was imprisoned for four
months for damaging computer disks. Edward Singh first came to public attention
after claiming that he had hacked into American and British government and
military computers.
As with everything else, hackers start young in the States. A 12-year-old boy in
Detroit was accused of entering a company’s credit rating computer and distributing
the numbers he found there. His mother told reporters that he spent up to 14 hours
on his computer during the weekend. “He didn’t bother me. I figured, computers,
that’ the thing of the day”, she said.
13
Prevention is probably easier than detection, and many companies now spend
lots of time and money devising programs using passwords and codes. Of course, all
this is no use at all if computer users tell each other their password, stick it on their
screen so they don’t forget it or use passwords like “password”.
There are plenty of software companies who specialize in writing software that
make computers hacker-proof. One company in the States set out to prove that its
system can defeat hackers by asking 2,000 of them to try to hack in. The hackers
were given two weeks to discover the secret message stored on two PCs in offices in
New York and San Francisco. The message reads: “The persistent hunter who wins
his prize sooner or later becomes the hunted”. You’ll be relieved – or perhaps
disappointed – to learn that no one hacker managed it.
2.Прочитайте текст еще раз и выберите правильные варианты ответов.
/ Read the text again and choose the best answer from the four suggested answers
A, B, C or D.
1.
A.
B.
C.
D.
2.
A.
B.
C.
D.
3.
A.
B.
C.
D.
4.
A.
B.
C.
D.
5.
A.
B.
C.
When banks decide to pay computer criminals, they expect those hackers…
to give back the information they have stolen.
to explain what their technique is.
not to deal with these banks again.
not to pass on the stolen information.
Companies don’t always report computer crimes because they…
know that the criminals are members of their staff.
think that it would damage their reputation.
don’t expect the criminals to be caught.
don’t know about these crimes themselves.
According to the text, the main motive of computer hackers is …
to make a lot of money.
to appear in the newspapers.
to overcome a challenge.
to become members of the staff of a large company.
The mother of the 12-year-old hacker from Detroit said that …
she had been worried about the time her son spent at his computer.
she tried to prevent her son’s criminal activity.
she had been involved in her son’s criminal activity.
she thought her son’s interest in his computer was normal.
Which of the people described in the text was sent to prison?
Hogg Robinson
Nicholas Whiteley
Edward Singh
14
D. The boy from Detroit
6. What was the result of one company’s attempt to prove that its security systems
were effective?
A. The results were ambiguous.
B. It was a failure.
C. It was a complete success.
D. It was a partial success.
Lesson 4
1. Прочитайте и переведите текст. /Read and translate the text. /
HOW TO BECOME A HACKER
Looking for advice on how to learn to crack passwords, sabotage systems,
mangle websites, write viruses, and plant Trojan horses you can come to the wrong
place. I'm not that kind of hacker.
Looking for advice on how to learn the guts and bowels of a system or
network, get inside it, and become a real expert. Maybe I can help you. How you
use this knowledge is up to you. I hope you'll use it to contribute to computer
science and hacking (in its good sense), not to become a cracker or vandal.
This little essay is basically the answers to all the e-mails I get asking how to
become a hacker. It's not a tutorial in and of itself. It's certainly not a guaranteed
success. Just give it a try and see what happens. If this ends up being of any use to
you, let me know. That said here's where to start:
Be curious
Take things apart. Look under the hood. Dig through your system directories
and see what's in there. View the files with hex editors. Look inside your computer.
Wander around computer stores and look at what's there.
Read everything in sight
If you can afford it, buy lots of books. If you can't, spend time in libraries and
online. Borrow books from friends. Go through tutorials. Read the help files on
your system. If you're using Unix/Linux, read the main files. Check out the local
college bookstores and libraries. And as you're reading, try things (see next
paragraph).
Experiment
Don't be afraid to change things, just to see what'll happen. Do this long
enough, of course, and you'll wipe out your system (see next paragraph), but that's
part of becoming a hacker. Try command options and switches you've never tried
before. Look for option menus on programs and see what they can do. In Windows,
tweak your registry and see what happens. Change settings in .INI files. In Unix,
15
dig around in the directories where you don't normally go. On the Macintosh, play
around in the system folder.
Make backups
If you start mucking around with system files, registries, password files, and
such, you will eventually destroy your system. Have a backup ready. If you can
afford it, have a system you use just for experimenting, ready to reload on a
moment's notice, and do the serious work on a different computer.
Don't limit yourself
Who says a computer or network is the only place to hack? Take apart your
telephone. Figure out your television (careful of the high voltage around the picture
tube - if you fry yourself, it's not my fault) and VCR. Figure out how closed
captioning works (that was a plug for my FAQ). Take apart your printer. Pick up the
latest issues of Nuts & Volts and Midnight Engineer. Take apart the locks on your
doors. Figure out how your radio works. Be insatiably curious and read voraciously.
Get some real tools
You can't cut a board in half with a screwdriver. Well, maybe, but it'll take a
long time. Dig around and find the proper tools for the operating systems you're
using. They're out there on the Web. You can get some pretty good stuff as
shareware or freeware (especially on Unix). The serious power tools often cost
serious money. What kinds of tools? Hex file editors. Snoopers that analyze system
messages and network traffic. Programming tools. Scripting tools. Disk
editors/formatters. Disassemblers. When you get good, write some of your own.
Learn to program
If you want to be a hacker, you're going to have to learn to program. The
easiest way to start depends on the operating system you're using. The choice of
language is very individual. It's almost a religious thing. Suggest a programming
language to a beginner, and someone will disagree. Heck, you'll probably get
flamed for it in a newsgroup. In Unix, I'd suggest getting started with Perl. Buy a
copy of the camel book (Programming Perl) and the llama book (Learning Perl).
You'll have the fundamentals of programming really fast! The best part is that the
language itself is free. In Windows, you can get started quickly using a visual
development environment like Visual Basic or Delphi. No matter what the system,
if you want to get serious, you'll eventually need to learn С (or C++ or Visual C++
or some other variant). Real hackers know more than one programming language,
anyway, because no one language is right for every task.
Learn to type
Hackers spend a lot of time at their keyboards. I type 90+ wpm (according to
the Mavis Beacon typing tutor). HackingWiz (of hackers.com and Hacker's Haven
BBS fame) says he can type 140+ wpm. The typing tutor may be boring, but it pays
off.
16
Use real operating systems
Everyone's using Windows 95/98 these days, but it's just a shell on top of a 32bit patch to a 16-bit DOS. Get some real operating systems (Linux, Windows NT,
Mac OS, OS/2...) and learn them. You can't call yourself a linguist if you only know
one language, and you certainly can't call yourself a hacker if you only know one
OS. Linux is a hacker's dream. All the source code is freely available. Play with it,
analyze it, learn it. Eventually, perhaps you can make a contribution to Linux
yourself. Who knows, you might even have a chance to write your own OS.
Talk to people
It's hard to learn in a vaccuum. Take classes. Join users groups or computer
clubs. Talk to people on IRC or newsgroups or Web boards until you find people to
learn with. That can take a while. Every third message on newsgroups like alt.hack
is «teach me to hack.» Sigh. The best way to be accepted in any group is to
contribute something. Share what you learn, and others will share with you.
Do some projects
It's important to pick some projects and work until you've finished them.
Learning comes from doing, and you must follow the project through start to finish
to really understand it. Start really simple. Make an icon. Customize your system
(the startup screen on Win95, or the prompt on Unix). Make a script that performs
some common operation. Write a program that manipulates a file (try encrypting
something).
Learn to really use the Internet
Start with the Web. Read the help for the search engines. Learn how to use
boolean searches. Build up an awesome set of bookmarks. Then move on to other
Internet resources. Get on Usenet. Learn to use gopher. Get on IRC. You'll find
useful information in the strangest places. Get to the point where you can answer
your own questions. It's a whole lot faster than plastering them all over various
newsgroups and waiting for a serious answer.
Once you've gone through these steps, go out and contribute something. The
Internet was built by hackers. Linux was built by hackers. Usenet was built by
hackers. Sendmail was built by hackers. Be one of the hackers that builds
something.
2. Ответьте на вопросы по содержанию текста. /Answer the questions./
1.
2.
3.
4.
5.
6.
7.
8.
How сan you use the knowledge obtained from the article?
What does the author mean saying «I'm not that kind of hacker»?
Why should you dig through your system directories?
Why is it advised to look for option menus on programs?
What operating systems are mentioned in the text?
What programming languages are recommended?
Why is it important for hacker to have a high speed typing skills?
Why is it important to program?
17
9. What OS is a hacker's dream?
10.What is the best way to be accepted in any group
11.What Internet resources does the author advise?
12.Where can you find useful information?
13.Did hackers create anything really useful ?
3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations. /
Резервная копия; интерактивный; перезагрузить; клавиатура; доступный;
руководство; пароль; разобрать на части; основы; вопрос-ответ; программные
средства; документ; позволить cебе; понимать; скучный; делать вклад. IRC международная линия передачи документальной информации shareware n условно бесплатное ПО (попробуй перед тем как заплатить) snooper n - тот,
кто сует нос в чужие дела hex a - шестнадцатеричный on a moments notice сразу customize v - изготовить по техническим условиям (заказчика),
свободные программные средства freeware n ( средства без исходного кода,
которые можно свободно распространять)
4. Сопоставьте английские слова с их переводом. / Connect the English
words with their Russian equivalents. /
часто задаваемые вопросы
благоговейный, внушающий страх
способ
папка
заголовок
руководство
разъем, подстрочник
искажать
расплатиться,
окупиться
j) каталог
k) настройка, установка
l) документ
m) делиться
n) закладка
o) резервная копия
p) ерунда, чепуха
q) зашифровать
r) редактор
1. awesome a
2. backup n –
3. bookmark n 4. caption n 5. directory n 6. editor n 7. encrypt v 8. FAQ 9. folder n 10. mangle v 11. pay off v 12. plug n 13. setting n 14. script n 15. share v 16. stuff n 17. tutorial n -
a)
b)
c)
d)
e)
f)
g)
h)
i)
5. Разговорная практика. (Интерактив) / Speaking ./
18
A friend of yours wants to be a hacker and asks you for some advice. Write a
list of instructions and warnings for him.
6. Напишите краткую аннотацию текста “How to become a hacker” на
английском языке. /Write a short summary of the text. /
Lesson 5
1. Прочитайте и переведите текст. /Read and translate the text./
The Hacker Toolbox
The main resource hackers rely upon, apart from their own ingenuity,
is computer code. While there is a large community of hackers on the Internet, only
a relatively small number of hackers actually program code. Many hackers seek out
and download code written by other people. There are thousands of different
programs hackers use to explore computers and networks. These programs give
hackers a lot of power over innocent users and organizations -- once a skilled hacker
knows how a system works, he can design programs that exploit it.
Malicious hackers use programs to:

Log keystrokes: Some programs allow hackers to review every keystroke a
computer user makes. Once installed on a victim's computer, the programs record
each keystroke, giving the hacker everything he needs to infiltrate a system or even
steal someone's identity.

Hack passwords: There are many ways to hack someone's password, from educated
guesses to simple algorithms that generate combinations of letters, numbers and
symbols. The trial and error method of hacking passwords is called a brute force
attack, meaning the hacker tries to generate every possible combination to gain
access. Another way to hack passwords is to use a dictionary attack, a program that
inserts common words into password fields.

Infect a computer or system with a virus: Computer viruses are programs designed
to duplicate themselves and cause problems ranging from crashing a computer to
wiping out everything on a system's hard drive. A hacker might install a virus by
infiltrating a system, but it's much more common for hackers to create simple
viruses and send them out to potential victims via email, instant messages, Web sites
with downloadable content or peer-to-peer networks.

Gain backdoor access: Similar to hacking passwords, some hackers create programs
that search for unprotected pathways into network systems and computers. In the
19
early days of the Internet, many computer systems had limited security, making it
possible for a hacker to find a pathway into the system without a username or
password. Another way a hacker might gain backdoor access is to infect a computer
or system with a Trojan horse.

Create zombie computers: A zombie computer, or bot, is a computer that a hacker
can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After
a victim executes seemingly innocent code, a connection opens between his
computer and the hacker's system. The hacker can secretly control the victim's
computer, using it to commit crimes or spread spam.

Spy on e-mail: Hackers have created code that lets them intercept and read e-mail
messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs
use encryption formulas so complex that even if a hacker intercepts the message, he
won't be able to read it.
2. Ответьте на вопросы по содержанию текста. /Answer the questions./
1. What is the main recourse hackers rely on ?
2.Why do hackers download programs written by other people?
3.how is called trial and error methods of hacking passwords ?
4.what is dictionary attack?
5.what are computer viruses?
6.Why hackers are possible to find a pathway into the system without username and
password?
7.what is zombie computer?
8.How do hackers spy on e-mail?
9.what kind of formulas use e-mail today?
3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations. /
Lean , resourcefulness , search , various , operate , let , set up , personality, mistake
, feasible , make , moment , sacrifice , coding
4. Закончите следующие предложения, используя текст. /Complete the
following sentences, using the text. /
20
1. These programs ___ _______ a lot of power over innocent users and
organizations.
2. Some programs allow ________ to review every keystroke a computer user
makes
3. Computer viruses are programs designed to duplicate themselves and cause
problems ______ _____ ________a computer to wiping out everything on a
system's hard drive.
4. The hacker can secretly ______ ___ victim's computer, using it to commit crimes
or spread spam.
5. Today, most e-mail programs use _________ _____ so complex that even if a
hacker intercepts the message, he won't be able to read it.
5. Составьте предложения из двух, подходящих по смыслу частей. /
Connect 1-5 with those of a-e.
1. While there is a large community of hackers on the Internet,
2. These programs give hackers a lot of power over innocent users and organizations
3. Infect a computer or system with a virus
4. Create zombie computers
5. Today, most e-mail programs use encryption formulas so complex that even if a
hacker
a. Computer viruses are programs designed to duplicate themselves and cause
problems ranging from crashing a computer to wiping out everything on a system's
hard drive
b. intercepts the message, he won't be able to read it.
c. only a relatively small number of hackers actually program code.
d. once a skilled hacker knows how a system works, he can design programs that
exploit it.
e. A zombie computer, or bot, is a computer that a hacker can use to send spam or
commit Distributed Denial of Service (DDoS) attacks
6. Прочитайте следующие предложения и скажите, соответствуют ли они
содержанию текста. /Read the following sentences and say if they are true or
false./
21
1.only a relatively small number of hackers actually program code. Many hackers
seek out and download code written by other people_
2.Some programs don't allow hackers to review every keystroke a computer user
makes_
3. Computer viruses are programs designed to duplicate themselves and cause
problems ranging from crashing a computer to wiping out everything on a system's
hard drive_
4. Similar to hacking passwords, some hackers create programs that search for
unprotected pathways into network systems and computers_
5. Hackers have not created code that lets them intercept and read e-mail messages - the Internet's equivalent to wiretapping_
7.Переведите на русский язык. /Translate into Russian. /
1. The main resource hackers rely upon, apart from their own ingenuity,
is computer code. While there is a large community of hackers on the Internet, only
a relatively small number of hackers actually program code
2. Log keystrokes: Some programs allow hackers to review every keystroke a
computer user makes.
3. Hack passwords: There are many ways to hack someone's password, from
educated guesses to simple algorithms that generate combinations of letters,
numbers and symbols
4. Infect a computer or system with a virus: Computer viruses are programs
designed to duplicate themselves and cause problems ranging from crashing a
computer to wiping out everything on a system's hard drive
5. Gain backdoor access: Similar to hacking passwords, some hackers create
programs that search for unprotected pathways into network systems and computers
6. Create zombie computers: A zombie computer, or bot, is a computer that a hacker
can use to send spam or commit Distributed Denial of Service (DDoS) attacks
7. Spy on e-mail: Hackers have created code that lets them intercept and read e-mail
messages -- the Internet's equivalent to wiretapping
22
Lesson 6
1. Прочитайте и переведите текст. /Read and translate the text. /
Computer crimes
More and more the operations of our businesses, governments, and financial
institutions are controlled by information that exists only inside computer memories.
Anyone clever enough to modify this information for his own purposes can reap
substantial rewards. Even worse, a number of people who have done this and been
caught at it have managed to get away without punishment.
These facts have not been lost on criminals or would-be criminals. A recent
Stanford Research Institute study of computer abuse was based on 160 case
histories, which probably are just the proverbial tip of the iceberg. After all, we only
know about the unsuccessful crimes. How many successful ones have gone
undetected is anybody's guess.
Here are a few areas in which computer criminals have found the pickings all too
easy.
Banking. All but the smallest banks now keep their accounts on computer files.
Someone who knows how to change the numbers in the files can transfer funds at
will. For instance, one programmer was caught having the computer transfer funds
from other people's accounts to his wife's checking account. Often, traditionally
trained auditors don't know enough about the workings of computers to catch what
is taking place right under their noses.
Business. A company that uses computers extensively offers many opportunities to
both dishonest employees and clever outsiders. For instance, a thief can have the
computer ship the company's products to addresses of his own choosing. Or he can
have it issue checks to him or his confederates for imaginary supplies or services.
People have been caught doing both.
Credit Cards. There is a trend towards using cards similar to credit cards to gain
access to funds through cash-dispensing terminals. Yet, in the past, organized crime
has used stolen or counterfeit credit cards to finance its operations. Banks that offer
after-hours or remote banking through cash-dispensing terminals may find
themselves unwillingly subsidizing organized crime.
Theft of Information. Much personal information about individuals is now stored
in computer files. An unauthorized person with access to this information could use
it for blackmail. Also, confidential information about a company's products or
operations can be stolen and sold to unscrupulous competitors. (One attempt at the
latter came to light when the competitor turned out to be scrupulous and turned in
the people who were trying to sell him stolen information.)
23
Software Theft. The software for a computer system is often more expensive than
the hardware. Yet this expensive software is all too easy to copy. Crooked computer
experts have devised a variety of tricks for getting these expensive programs: printed
out, punched on cards, recorded on tape or otherwise delivered into their hands. This
crime has even been perpetrated from remote terminals that access the computer
over the telephone.
Theft of Time-Sharing Services. When the public is given access to a system,
some members of the public often discover how to use the system in unauthorized
ways. For example, there are the "phone freakers" who avoid long distance
telephone charges by sending over their phones control signals that are identical to
those used by the telephone company.
Since time-sharing systems often are accessible to anyone who dials the right
telephone number, they are subject to the same kinds of manipulation.
Of course, most systems use account numbers and passwords to restrict access to
unauthorized users. But unauthorized persons have proved to be adept at obtaining
this information and using it for their own benefit. For instance, when a police
computer system was demonstrated to a school class, a precocious student noted the
access codes being used; later, all the student's teachers turned up on a list of wanted
criminals.
Perfect Crimes. It's easy for computer crimes to go undetected if no one checks up
on what the computer is doing. But even if the crime is detected, the criminal may
walk away not only unpunished but with a glowing recommendation from his
former employers.
Of course, we have no statistics on crimes that go undetected. But it's unsettling to
note how many of the crimes we do know about were detected by accident, not by
systematic audits or other security procedures. The computer criminals who have
been caught may have been the victims of uncommonly bad luck.
For example, a certain keypunch operator complained of having to stay overtime
to punch extra cards. Investigation revealed that the extra cards she was being asked
to punch were for fraudulent transactions. In another case, disgruntled employees of
the thief tipped off the company that was being robbed. An undercover narcotics
agent stumbled on still another case. An employee was selling the company's
merchandise on the side and using the computer to get it shipped to the buyers.
Unlike other embezzlers, who must leave the country, commit suicide, or go to
jail, computer criminals sometimes brazen it out, demanding not only that they not
be prosecuted but also that they be given good recommendations and perhaps other
benefits, such as severance pay. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result
if the public found out that their computer had been misused. They cringe at the
24
thought of a criminal boasting in open court of how he juggled the most confidential
records right under the noses of the company's executives, accountants, and security
staff. And so another computer criminal departs with just the recommendations he
needs to continue his exploits elsewhere.
2. Ответьте на вопросы по содержанию текста. /Answer the questions. /
1. What are operations of businesses, governments, and financial institutions
controlled by?
2. Where is computer crime used?
3. How can a programmer stole money from bank?
4. How can a programmer hack in the business area?
5. How can a programmer use credit cards for crimes?
6. How can a programmer get documents and confidential information?
7. Why does the system use account numbers and passwords?
8. Do computer crimes exist nowadays ?
3. Найдите в тексте эквиваленты(синонимы) следующих слов и
словосочетаний. /Find in the text English equivalents for the following words
and word combinations. /
Procedure , penalty , likely , fortunate , proposal , accomplice , orderly , keep ,
escape, equal , benefit , discovered ,
4. Вставьте недостающие слова /Insert the missing words. /
1. More and more the operations of our ________ _______ __________
_________are controlled by information that exists only inside computer memories.
2. _______ All but the smallest banks now keep their accounts on computer files.
3. Theft of Information. ____ ______ ______ about individuals is now stored in
computer files.
4. Perfect Crimes. It's _____ _______ _______to go undetected if no one checks up
on what the computer is doing.
5. They cringe at the thought of a criminal boasting in open court of how he juggled
the most confidential ___________________________________executives,
accountants, and security staff.
5. Составьте предложения из двух, подходящих по смыслу частей. /
Connect 1-5 with those of a-e.
25
1. Even worse, a number of people who have done this and been caught at it
2. Credit Cards. There is a trend towards using cards similar to credit cards to gain
3. Software Theft. The software for a computer system is often more
4. Theft of Time-Sharing Services. When the public is given access to a system,
5. For example, a certain keypunch operator complained of having to
a. stay overtime to punch extra cards
b. have managed to get away without punishment
c. some members of the public often discover how to use the system in unauthorized
ways
d. access to funds through cash-dispensing terminals
e. than the hardware
6. Прочитайте следующие предложения и скажите, соответствуют ли они
содержанию текста. /Read the following sentences and say if they are true or
false./
1. More and more the operations of our businesses, governments, and financial
institutions are controlled by information that exists only inside computer memories
_
2. Banking. All but the smallest banks now keep their accounts on computer files_
3. Credit Cards. There is not a trend towards using cards similar to credit cards to
gain access to funds through cash-dispensing terminals_
4. of Time-Sharing Services. When the public is given access to a system, some
members of the public often can't discover how to use the system in unauthorized
ways_
5. Perfect Crimes. It's easy for computer crimes to go undetected if no one checks
up on what the computer is doing_
7.Переведите на русский язык. /Translate into Russian. /
26
1. More and more the operations of our businesses, governments, and financial
institutions are controlled by information that exists only inside computer memories.
2. Banking. All but the smallest banks now keep their accounts on computer files.
3. Credit Cards. There is a trend towards using cards similar to credit cards to gain
access to funds through cash-dispensing terminals.
4. Theft of Information. Much personal information about individuals is now stored
in computer files.
5. Software Theft. The software for a computer system is often more expensive
than the hardware.
Lesson 7
1. Прочитайте и переведите текст. /Read and translate the text./
The first hackers.
The first "hackers" were students at the Massachusetts Institute of Technology
(MIT) who belonged to the TMRC (Tech Model Railroad Club). Some of the
members really built model trains. But many were more interested in the wires and
circuits underneath the track platform. Spending hours at TMRC creating better
circuitry was called "a mere hack." Those members who were interested in creating
innovative, stylistic, and technically clever circuits called themselves (with pride)
hackers.
During the spring of 1959, a new course was offered at MIT, a freshman
programming class. Soon the hackers of the railroad club were spending days, hours,
and nights hacking away at their computer, an IBM 704. Instead of creating a better
circuit, their hack became creating faster, more efficient program with the least
number of lines of code. Eventually they formed a group and created the first set of
hacker's rules, called the “Hacker's Ethic”.
Rule 1: Access to computers and anything, which might teach you, something about
the way the world works - should be unlimited and total.
Rule 2: All information should be free.
Rule 3: Mistrust authority - promote decentralization.
Rule 4: Hackers should be judged by their hacking, not bogus criteria such as
degrees, race, or position.
27
Rule 5: You can create art and beauty on a computer.
Rule 6: Computers can change your life for the better.
These rules made programming at MIT's Artificial Intelligence Laboratory a
challenging, all encompassing endeavor. Just for the exhilaration of programming,
students in the Al Lab would write a new program to perform even the smallest
tasks. The program would be made available to others who would try to perform the
same task with fewer instructions. The act of making the computer work more
elegantly was awe-inspiring.
Hackers were given free reign on the computer by two AI Lab professors, "Uncle"
John McCarthy and Marvin Minsky, who realized that hacking created new insights.
Over the years, the AI Lab created many innovations: LIFE, a game about survival;
LISP, a new kind of programming language; the first computer chess game; The
CAVE, the first computer adventure; and SPACEWAR, the first video game..
2. Ответьте на вопросы по содержанию текста. /Answer the questions. /
1. Who were the first hackers?
2. What is “Hacker's Ethic”?
3. Why was the set of hacker's rules written?
4. According to what rules should that hackers be judged?
5. Do you think that Rule 6 is real?
6. What should students do for the exhilaration of programming?
7. Would the program be made available to others?
8. Who did give hackers free reign? Why?
9. What innovations did the AI Lab create over the years?
3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations. /
Первые хакеры; строить образцы поездов; заинтересованы проводами и
схемами; тратить часы; просто хакеры; умные схемы; новый курс;
компьютерное программирование; проводили дни, часы, и ночи на пролет за
своим компьютером; наименьшее количество строк кода; сформировали
группу; набор правил хакера; Этика Хакера; доступ к компьютерам; строение
мира; информация должна быть бесплатной; поддерживать децентрализацию;
поддельные критерии; ученая степень; раса; должность; произведения
искусства; изменить жизнь; сделали программирование более перспективным;
28
просто для развлечения; писать новые программы; простые задачи; меньшее
количество инструкций; работа на компьютере становилась более изящной;
полная свобода; создает новые идеи; язык программирования; компьютерные
шахматы; приключенческая игра; видео игра.
4.Вставьте недостающие слова /Insert the correct words. /
1. Spending _________creating better circuitry was called "a mere hack 2. During
the spring of 1959, a new _________offered at MIT, a freshman programming class
3. These rules ___________ at MIT's Artificial Intelligence Laboratory a
challenging, all encompassing endeavor
4. The act of making the ___________more elegantly was awe-inspiring 5. Hackers
were given free ________________by two AI Lab professors, "Uncle" John
McCarthy and Marvin Minsky, who realized that hacking created new insights.
5. Прочитайте следующие предложения и скажите, соответствуют ли они
содержанию текста. /Read the following sentences and say if they are true or
false./
1. The first "hackers" were students at the Massachusetts Institute of Technology
(MIT) who belonged to the TMRC (Tech Model Railroad Club)
2. During the winter of 1959, a new course was offered at MIT, a freshman
programming class
3. Rule 3: All information should be free
4. The program would not be available to others who would try to perform the same
task with fewer instructions
5. Hackers were given free reign on the computer by two AI Lab professors, "Uncle"
John McCarthy and Marvin Minsky, who realized that hacking created new insights.
6. Computers can change your life for the harder and less interesting.
8.Переведите на русский язык. /Translate into Russian. /
Hacking has been around for more than a century. In the 1870s, several teenagers
were flung off the country's brand new phone system by enraged authorities. Here's
a peek at how busy hackers have been in the past 35 years.
Early 1960s University facilities with huge mainframe computers, like MIT's
artificial intelligence lab, become staging grounds for hackers. At first, "hacker"
was a positive term for a person with a mastery of computers who could push
programs beyond what they were designed to do.
29
Lesson 8
1. Прочитайте и переведите текст. /Read and translate the text./
THE EX–HACKER
Kevin Mitnick is the hackers' hero. His latest spell in jail was, a 46-month sentence
for fraud relating to breaking into the systems of several multinational corporations.
He was released on condition that he did not have any contact with a computer.
In March 2000, a Welsh teenager allegedly stole information from more than 26,000
credit card accounts across Britain, the US, Japan, Canada and Thailand, and
published the details on the Internet. FBI agents and British police raided the home
of Raphael Gray, 18, and arrested him and his friend. He has been charged with 10
counts of downloading unauthorised information.
In 1998 Washington revealed that an Israeli hacker called 'The Analyser' was
responsible for the most organised attempt to penetrate the Pentagon's computer
systems'. He turned out to be Ehud Tenenbaum, 18, who had planted a list of his
own passwords in the Pentagon system and passed them to other hackers.
In 1997 the son of a fraud squad detective walked free from a court in London after
charges of breaching the security of the US air force were dropped. Three years
earlier Mathew Bevan, then 19, and a friend, Richard Pryce, 16, used the Internet to
gain access to several US military bases. Pryce was fined £1,200 after admitting
several other offences.
Hotmail, Microsoft's free email service, was hacked into last September, exposing
the correspondence of more than 40m users. A group calling itself Hackers
Unite posted a Web address with details of how to access any Hotmail account. The
service was shut down for five hours.
The UK Department of Trade and Industry has twice been prey to hackers, once in
1996 and again in 2000 when a DTI computer was programmed to reroute email.
The Home Office investigated nine cases of hacking last year, one of which was the
leaking of a report on a murder. In August 1996 hackers ran up a £ lm phone bill for
Scotland Yard but did not access files.
In 1997 hackers got into the Yahoo! website, replacing the homepage with a ransom
note demanding the release of their hero, Kevin Mitnick. Unless the demand was
met, the note said, a virus would be released in all Yahoo!'s computers. The
30
company dismissed the threat as a hoax, but the 'Free Kevin' slogan continued to
appear on other hijacked sites.
Kevin Mitnick's criminal record
1981
Where: California
Charge: Computer fraud for stealing computer manuals from Pacific Bell
Sentence: One year probation
1987
Where: California
Charge: Computer fraud (no details available)
Sentence: Pleaded guilty, but sentence unknown
1989
Where: California
Charges: Computer fraud and possession of unauthorized access devices for hacking
into MCI and Digital Equipment computers
Sentence: One year in low-security prison and three years of supervised release
Time Served: One year, much of it at a halfway house for people with compulsive
disorders
1992
Where: California
Charges: Computer fraud and possession of unauthorized access devices for
allegedly hacking into state Department of Motor Vehicles computers
Sentence: Charges still pending
1995
Where: North Carolina
Charge: Possession of unauthorized access devices
Sentence: Eight months
Time served: Eight months
Where: California
Charge: Violation of supervised release
Sentence: Fourteen months
Time served: Fourteen months
1996
Where: California
31
Charges: Computer fraud, wire fraud and possession of unauthorized access devices
Sentence: Subject to terms of plea bargain
2. Ответьте на вопросы /Answer the questions. /
1) What was Kevin Mitnick?
2) Why was he sentenced to spend in jail 46 months ?
3) What condition was he released on?
4) Why and when did FBI agents and British police raid the home of Raphael Gray?
5) What was an Israeli hacker called 'The Analyser' responsible for?
6) Who used the Internet to gain access to several US military bases in 2000?
7) Who hacked into Hotmail, Microsoft's free email service and what was the result
of that hacking?
3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations /
1) Кредитная карта - …
2) Британская полиция - …
3) Организованная попытка - …
4) Был освобожден - …
5) Последний срок - …
4. Закончите следующие предложения, используя текст. /Complete the
following sentences using the text./
Complete the following sentences, using the text.
1) In August 1996 hackers ran up …
2) FBI agents and British police raided the home of …
3) He was released on condition that …
4) In 1997 hackers got into the Yahoo! website, replacing the homepage with a
32
ransom note …
5) Pryce was fined …
6) Kevin Mitnick is the …
5. Составьте предложения из двух, подходящих по смыслу частей. /
Connect 1-5 with those of a-e.
1) He was released on condition …
2) Unless the demand was met, the note said, …
3) Hotmail, Microsoft's free email service, was hacked into last September, …
4) He turned out to be Ehud Tenenbaum, 18, who had planted …
5) His latest spell in jail was a 46-month sentence for …
a) exposing the correspondence of more than 40m users.
b) a virus would be released in all Yahoo!'s computers.
с) fraud relating to breaking into the systems of several multinational corporations.
d) that he did not have any contact with a computer.
e) a list of his own passwords in the Pentagon system and passed them to other
hackers.
6. Вставьте недостающие слова /Insert the correct words./
1) Kevin Mitnick is the … hero.
2) The company dismissed the threat as a … but the 'Free Kevin' slogan continued to
appear on other hijacked sites.
3) In March 2000, a Welsh teenager allegedly stole information from more than
26,000 credit card accounts across Britain, the US, Japan, Canada and Thailand, and
published the details on the …
4) In 1997 hackers got into the Yahoo! website, replacing the homepage with a
ransom note demanding the … of their hero, Kevin Mitnick.
33
5) The Home Office investigated nine cases of hacking last year, one of which was
the leaking of a report on a …
7. Прочитайте текст и дайте его краткую аннотацию. / Read the text and
give its short summary. The World's Richest Ex-Hackers
Whatsapp founder and billionaire ex-hacker Jan Koum.
Long before he was the two-hundred-and-second richest person on the planet, Jan
Koum was just another curious kid with a wardialer.
Koum, whose net worth suddenly jumped to $6.8 billion last month when his startup
WhatsApp was acquired by Facebook, began his tech career as a teenage immigrant
from Ukraine and fan of the 1995 film ‘Hackers.’ From the privacy of his Mountain
View, Calif. bedroom, he’d use his wardialer—a machine that cycles through phone
numbers, dialing them on a modem to find open connections—to probe the global
Internet and explore faraway networks.
“The Internet was so insecure back then,” he told my colleague Parmy Olson during
her reporting for Forbes’ recent cover story on Koum’s $19 billion dollar startup.
“Servers on the fringes of the Internet with root account and no passwords…The
challenging part was finding these systems where you have to learn your way
around. There were no manuals.”
Koum says his intentions were never malicious. He was careful not to delete
anything and never participated in the distributed denial of service attacks that
plagued websites in the late 90s by flooding them with junk traffic. “It was more
curiosity, how can I figure it out, more of a challenge,” he says.
Once, Koum admits, he found his way onto the network of the computer graphics
giant Silicon Graphics, a story that the 38-year-old CEO is careful to leave
unfinished. “At some point I connected to the server,” he says. “And that’s as much
as I’m going to say.”
Add Koum’s name to the growing list of ultra-successful entrepreneurs whose paths
to billions started on the wilder side of the hacker frontier. In fact, founders of Apple
AAPL +0.03%, Microsoft MSFT +1.89%, Facebook and Twitter all flirted with
activities that might today be called illegal hacking before going on to found Silicon
Valley’s most successful companies, a trend worth remembering as the tech world
34
and Washington grapple over how to apply–or restrict–the controversial Computer
Fraud and Abuse Act.
In the late 60s, a teenage Bill Gates and his Microsoft co-founder Paul Allen, for
instance, were caught with unauthorized access to an administrator account at
Computer Center Corporation and even rummaged through its Dumpster for
printouts of source code, according to Allen’s memoir. In 2004, Zuckerberg used
login records on TheFacebook.com to break into the email accounts of Harvard
Crimson reporters, according to reporting by Business Insider’s Nicholas Carlson.
Twitter co-founder Jack Dorsey got his first job by breaking into the network of the
dispatch company he hoped would hire him to show the company its security
vulnerabilities.
Jan Koum’s hacking adventures played a similar role in his unlikely rise from
welfare to a top spot on the most recent Forbes billionaire list released earlier this
month. Koum was a noted member of the 1990s hacker group w00w00, which also
included Napster co-founder Sean Fanning and, occasionally Napster co-founder
and Facebook investor Sean Parker. Gordon “Fyodor” Lyon remembers Koum as a
vital contributor to the development of the Nmap security scanner, a tool used today
by both attackers and defenders of networks to suss out vulnerabilities. “He was
particularly helpful in training Nmap to recognize FreeBSD machines,” Lyon writes
to me in an email, referring to a common open-source operating system. “We lived
nearby and used to hang out from time to time. This tremendous WhatsApp success
truly could not have happened to a nicer person!”
When Koum was working at Yahoo! years later, it was the same w00w00 crowd that
he turned for advice in fending off an unprecedented denial of service attack hitting
the company’s websites, according to Reuters’ Joseph Menn. And when his startup
WhatsApp was acquired for a shocking $19 billion dollars in February, the same
group of hackers assembled for a spontaneous celebration, Menn reports.
Career paths like Koum’s should be taken as evidence of how prosecuting harmless
young hackers under the Computer Fraud and Abuse Act can hamper innovation,
says Hanni Fakhoury, an attorney with the Electronic Frontier Foundation. “[The
CFAA] is definitely creating a chilling effect on researchers, tinkerers and
innovators,” says Fakhoury. “At the EFF, we get phone calls weekly from
researchers who have an idea, have done some preliminary testing, and want to look
deeper but are worried about CFAA liability. The volume of those calls has gone
up.”
35
Fakhoury points to the case of Aaron Swartz, the coding prodigy, activist and early
employee of the social news site Reddit. Swartz was prosecuted under the CFAA in
2011 after using an automated script to download millions of files from the
academic journal website JSTOR. Facing seven-figure legal bills and decades in
prison, the 26-year-old committed suicide. His story is told in a soon-to-be-released
documentary titled “The Internet’s Own Boy.”
“Zuckerberg, Steve Jobs, Bill Gates, Wozniak, Paul Allen, all have told stories or
written in autobiographies about how when were younger they engaged in legally
questionable activities, and how they used those mostly harmless experiences to
create the biggest tech companies in the world,” says Fakhoury. “They were
fortunate that they were spared the fate of Aaron Swartz.”
No one, perhaps, has better captured the importance of hacker experimentation for
innovation better than the late Steve Jobs, who once partnered with Apple cofounder Steve Wozniak to sell “Blue Boxes,” tools that skirted the phone
companies’ security measures to allow free calls. “If it hadn’t been for the Blue
Boxes,” Jobs told his biographer Walter Isaacson before his death, “There would
have been no Apple.”
And if there had been no wardialer, there may have never been Whatsapp.
Lesson 9
1. Прочитайте и переведите текст. /Read and translate the text./
Famous Hackers
Steve Jobs and Steve Wozniak, founders of Apple Computers, were both hackers.
Some of their early exploits even resembled the questionable activities of some
malicious hackers. However, both Jobs and Wozniak outgrew their malicious
behavior and began concentrating on creating computer hardware and software.
Their efforts helped usher in the age of the personal computer -- before Apple,
computer systems remained the property of large corporations, too expensive and
cumbersome for average consumers.
Linus Torvalds, creator of Linux, is another famous honest hacker. Hisopen source
operating system is very popular with other hackers. He has helped promote the
concept of open source software, showing that when you open information up to
everyone, you can reap amazing benefits.
36
Richard Stallman, also known as "rms," founded the GNU Project, a free operating
system. He promotes the concept of free software and computer access. He works
with organizations like the Free Software Foundation and opposes policies like
Digital Rights Management.
On the other end of the spectrum are the black hats of the hacking world. At the age
of 16, Jonathan James became the first juvenile hacker to get sent to prison. He
committed computer intrusions on some very high-profile victims, including NASA
and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname
(called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to
prison when he violated parole.
Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in
Lompoc, California.
Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into
the North American Aerospace Defense Command (NORAD) when he was 17 years
old. Mitnick's reputation seemed to grow with every retelling of his exploits,
eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list.
In reality, Mitnick was arrested several times for hacking into secure systems,
usually to gain access to powerful computer software.
Kevin Poulsen, or Dark Dante, specialized in hacking phonesystems. He's famous
for hacking the phones of a radio station called KIIS-FM. Poulsen's hack allowed
only calls originating from his house to make it through to the station, allowing him
to win in various radio contests. Since then, he has turned over a new leaf, and now
he's famous for being a senior editor at Wired magazine.
Adrian Lamo hacked into computer systems using computers at libraries and
Internet cafes. He would explore high-profile systems for security flaws, exploit the
flaws to hack into the system, and then send a message to the corresponding
company, letting them know about the security flaw. Unfortunately for Lamo, he
was doing this on his own time rather than as a paid consultant -- his activities were
illegal. He also snooped around a lot, reading sensitive information and giving
himself access to confidential material. He was caught after breaking into the
computer system belonging to the New York Times.
It's likely that there are thousands of hackers active online today, but an accurate
count is impossible. Many hackers don't really know what they are doing -- they're
just using dangerous tools they don't completely understand. Others know what
they're doing so well that they can slip in and out of systems without anyone ever
knowing.
37
2. Ответьте на вопросы по содержанию текста. /Answer the questions./
1) Who were the founders of Apple Computers?
2) Did they have anything in common with hackers?
3) Who outgrew their malicious behavior and began concentrating on creating
computer hardware and software?
4) What another famous hacker was the creator of Linux?
5) Who promoted the concept of free software and computer access?
6) What organizations did Richard Stallman work with?
7) Who became the first juvenile hacker to get sent to prison at the age of 16?
8) How old was Kevin Mitnick when he gained notoriety in the 1980s as a
hacker who allegedly broke into the North American Aerospace Defense
Command (NORAD)?
9) Who was arrested several times for hacking into secure systems, usually to
gain access to powerful computer software
10) What did Kevin Poulsen, or Dark Dante, specialize in?
11) How did Adrian Lamo hack into computer systems?
12) Is an accurate count of hackers active online today possible?
3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find
in the text English equivalents for the following words and word combinations. /
1) создание компьютерных аппаратных средств и программного обеспечения,
2) эпоха персональных компьютеров 3) слишком дорогие и громоздкие 4)
концепция программного обеспечения 5) свободное программное обеспечение
и компьютерный доступ 6) первый несовершеннолетний хакер 7) несколько
раз 8) за взлом систем защиты 9) главный редактор 10 с помощью
компьютеров в библиотеках и интернет-кафе.) 11) отправить сообщение 12)
Вполне вероятно 13) но точный подсчет невозможен 14) используя опасные
инструменты
4. -Закончите следующие предложения, используя текст. /Complete the
following sentences, using the text. /
1) Linus Torvalds, creator of Linux, … .
2) On the other end of the spectrum are the black …..
4) Many hackers don't really know what they are doing - they're just … .
5) He promotes the concept of free … .
38
6) Mitnick was arrested several times for hacking into secure systems, usually to
gain … .
5. Составьте предложения из двух, подходящих по смыслу частей. /
Connect the sentences 1-7 with those of a-g.
1) In reality, Mitnick was arrested
several times for hacking into secure
systems,
2) It's likely that there are thousands of
hackers active online today,
3) Originally sentenced to house arrest,
James was sent to
4) He's famous for hacking the phones
of
5) Kevin Poulsen, or Dark Dante,
6) Unfortunately for Lamo, he was
doing this on his own time rather than
. a)prison when he violated parole.
b) but an accurate count is impossible.
c)usually to gain access to powerful
computer software
d) as a paid consultant -- his activities
were illegal.
e) specialized in hacking phone systems.
f) a radio station called KIIS-FM.
6.Вставьте недостающие слова /Insert the correct words. /
1) Linus Torvalds, creator of Linux, is another ______ hacker.
2) Richard Stallman founded the GNU Project, a free _____system.
3) At the age of 16, Jonathan James became ___________ to get sent to prison.
4) Kevin Mitnick allegedly broke into the North _______ Aerospace Defense
Command ______ he was 17 years old
5) Adrian Lamo _____into computer systems ______computers at libraries and
Internet______.
7. Прочитайте текст и дайте его краткую аннотацию. / Read the text and
give its short summary.
Kevin Mitnick is the hackers' hero. His latest spell in jail was, a 46-month sentence
for fraud relating to breaking into the systems of several multinational corporations.
He was released on condition that he did not have any contact with a computer.
In March 2000, a Welsh teenager allegedly stole information from more than
39
26,000 credit card accounts across Britain, the US, Japan, Canadaand Thailand, and
published the details on the Internet. FBI agents and British police raided the home
of Raphael Gray, 18, and arrested him and his friend. He has been charged with 10
counts of downloading unauthorised information.
In 1998 Washington revealed that an Israeli hacker called 'The Analyser' was
responsible for 'the most organised attempt to penetrate the Pentagon's computer
systems'. He turned out to be Ehud Tenenbaum, 18, who had planted a list of his
own passwords in the Pentagon system and passed them to other hackers.
In 1997 the son of a fraud squad detective walked free from a court in London after
charges of breaching the security of the US air force were dropped. Three years
earlier Mathew Bevan, then 19, and a friend, Richard Pryce, 16, used the Internet to
gain access to several US military bases. Pryce was fined £1,200 after admitting
several other offences.
Hotmail, Microsoft's free email service, was hacked into last September, exposing
the correspondence of more than 40m users. A group calling itself Hackers
Unite posted a Web address with details of how to access any Hotmail account. The
service was shut down for five hours.
The UK Department of Trade and Industry has twice been prey to hackers, once in
1996 and again in 2000 when a DTI computer was programmed to reroute email.
The Home Office investigated nine cases of hacking last year, one of which was the
leaking of a report on a murder. In August 1996 hackers ran up a £ lm phone bill for
Scotland Yard but did not access files.
In 1997 hackers got into the Yahoo! website, replacing the homepage with a ransom
note demanding the release of their hero, Kevin Mitnick. Unless the demand was
met, the note said, a virus would be released in all Yahoo!'s computers. The
company dismissed the threat as a hoax, but the 'Free Kevin' slogan continued to
appear on other hijacked sites.
8.Переведите на английский язык. /Translate into English. /
1)Некоторые из ранних подвигов Стива Джобса и Стива Возняка напоминали
сомнительную деятельность некоторых хакеров.
2)Усилия Стива Джобса и Стива Возняка помогли создать эпоху ПК.
3) Концепция свободного программного обеспечения и компьютерного
доступа была выдвинута Ричардом Столлманом.
4) Джеймс Джонатан первоначально был приговорен к домашнему аресту , а
затем отправлен в тюрьму.
5) Некоторые хакеры специализируются на взломе телефонных систем.
40
6) Тысячи хакеров, действующих сегодня, не знают, что они делают - они
просто используют опасные инструменты, которые они не могут в полной
мере понять.
9.Interactive: Organise “Black hats” conferenc
Интерактив.
1. Круглый стол
2. What passwords does he suggest for trying to get into a system?
3. What does a firewall do?
4. To prevent hacking, what sort of passwords should you avoid?
5. How could you hack into a system?
6. How could you stop people hacking into a system?
7. Why did people start thinking about computer security?
8. Why do people hack?
9. How risky is credit card use on the Internet?
10. What advice can you give for people intending to use credit cards over the
Internet?
11. What is a 'white hat' hacker?
12. What ways do you know for hacking into a system?
13. What terms can you use to describe someone obsessed by computers?
14.What's the problem with using smart cards for Internet purchases?
2. Ролевая игра. / Role play.
Work in pairs. Together make up your own questions on these prompts. Then
play the parts of the interviewer and a hacker.
1) first interested in hacking
2) reason for being arrested
3) ways to avoid hackers
4) safe ways of paying for Internet shopping
3. Мозговой штурм. .Brain Storm
What do you know about hacking and hackers?
Дополнительные материалы / Suplementary materials
1.
41
A
Read the text and answer these questions.
1
Which hacking case inspired the film War Games?
2
When did Captain Zap hack into the Pentagon?
3
Why was Nicholas Whitely arrested in 1988?
4
How old was the hacker that broke into the US defence computer in 1989?
The history of hacking :
1971 - John Draper discovered that a whistle offered in boxes of Cap'n Crunch
breakfast cereal perfectly generated the 2,600Hz signal used by the AT&T phone
company. He started to make free calls. He was arrested in 1972 but wasn't sent to
prison.
1974 - Kevin Mitnick, a legend among hackers, began hacking into banking
networks and altering the credit reports of his enemies. He didn't expect that his
most famous exploit - hacking into the North American Defense Command in
Colorado Springs - would inspire the film War Games in 1983. 1981 - Ian Murphy,
a 23-year-old known as Captain Zap on the networks, hacked into the White House
and the Pentagon.
1987 -The IBM international network was paralysed by a hacker's Christmas
message.
1988 -The Union Bank of Switzerland almost lost £32 million to hackers. Nicholas
Whitely was arrested in connection with virus spreading.
1989 - A fifteen-year-old hacker cracked the US defence computer.
1991 - Kevin Poulsen, known as Dark Dante on the networks, was accused of
stealing military files.
2.
Кто и зачем пишет вирусы?
Возможно, вы получите ответ на эти вопросы, прочитав статью, написанную
человеком, который сам принимал непосредственное участие в создании
вирусов.
Я много раз слышал и читал высказывания разных людей по этому поводу.
Практически все из этих высказываний основывались на мнении автора, после
общения его с каким-либо вирусописателем. Сейчас же я сам, как
42
вирусописатель и член их общества, попробую раскрыть причины толкающие
людей на написание вирусов.
Как уже упоминалось, я имел опыт написания вирусов, и не буду
рассматривать мотивации остальных людей, а попытаюсь объяснить свою. Она
довольно проста: скука, и желание узнать, что можно, а чего нельзя сделать с
какой-либо операционной системой. Сейчас операционки на персональных
компьютерах меняются довольно быстро, и постоянно обретают новые
возможности, такие, как, например, доступ к сети интернет и выполнение
полученного из него произвольного кода. Это дает потенциально новую
ступень в развитии вирусов и гораздо большую степень наносимого вреда.
Немного истории
Скука и любознательность - это самые основные, и в тоже время, самые
простые причины побуждающие людей писать вирусы. Я думаю с самого
начала истории появления вирусов, эти причины не изменились. В моем
случае, все было как и множества других, так называемых, хакеров:
любознательность и увлеченность технологией. Точкой отсчета стала задача:
добавить программу А в тело программы Б таким образом, чтобы программа Б
не потеряла своей функциональности. Для этого требовалось серьезное знание
системы, под управлением которой работала программа. В то время это был
DOS, простая коммандная строка, имевшая серьезные ограничения по
возможностям, однако не для серьезных программистов.
С течением времени, появлялись версии Windows, которые перестали являться
надстройкой над DOS, а предаставляли собой полноценную ОС. Они были
более дружелюбны к пользователю, и вирусописателям необходимо было
адаптировать свой код для этих систем, и продолжать искать в них
возможности нанесения ущерба.
Вирусы становились более привлекательные внешне, однако их разрушающий
эффект становился больше. Думаю, что именно возможность внести
графический аспект в свои вирусы, как часть своей личности, дала авторам
возможность персонализировать свои "творения", как например слова William
Blake занесенные в Maltese Amoeba. Чем больше интересных вещей
добавлялось в вирусы, тем они становились злее по своей сути. Обратите
внимание на серию Патогенных вирусов, которые при запуске выдавали
Smoke me a kipper I'll be back for breakfast, unfortunately some of your data
won't". Это была попытка заставить пользователя помнить, о том как он
получил вирус.
43
Вирусы появлялись медленно и являлись, если так можно выразиться, игрой
имен. Многие авторы придумывали необычные и странные имена, полагаю
для создания атмосферы недоступной таинственности. Она должна была
указывать на загадочность и неприступность автора в реальной жизни, чтобы
не понести наказания за содеянное. Все это попахивало какой-то мистикой.
Написание вирусов быстро стало интересовать множество людей, которые
стремились достичь уровня тех, кто способен "повалить" компьютер на другой
стороне земного шара парой нажатий клавиш. Однако реальность есть
реальность, никакой мистики, вирус - это просто программа. Эта реальность и
подняла новую волну кодеров, вдохновленных одной силой: силой
безграничного и наиболее ощутимого разрушения.
С развитием Windows вирусописатели научились отправлять почту,
кодировать файлы, проводить атаки на веб-сервера, обновлять вирусы через
интернет или группы новостей, и множеству других возможностей. С тем как
офисные программы становились проще и функциональнее, кодеры узанали о
том, что можно делать с использованием его макро языка. Оказалось, что
вирусы стало писать гораздо быстрее и проще. В тоже время многие
предыдущие вирусописатели столкнулись с тем, что их ассемблерный код не
работает на новых 32-х разрядных системах, и необходимо новое глубокое
изучение системы. Старожилы считают новые способы написания вирусов, с
помощью макросов, "ламерством".
Однако пользователю все равно каким видом кода, или каким способом его
заразили. Он в тонкостях не разбирается. Антивирусные компании постоянно
сообщают об обнаружении тысяч новых вирусов - это придает романтики, и
желания обойти табу, особенно для молодых людей имеющих свободное
время.
В конце 90-х такой маленький кусочек макро кода, известный как Melissa,
написанный скучающим 33-х летним молодым человеком, словно вихрь
пронесся по всему миру заразив миллионы компьютеров, привлекши тем
самым внимание федеральных властей к вирусной сцене. Принятие новых
жестких законов заставило кого-то из вирусописателей отказаться от этой
идеи, кото-то уйти в подполье, однако это их не остановило.
В это время появилась новая группа вирусописателей: называемых как "script
kiddies". Вдохновленные известностью Meliss'ы они бросились писать новые и
модифицировать имеющиеся макровирусы, в надежде стать известными
кодерами. Однако имея очень мало опыта и знаний, и стараясь как можно
44
раньше вывалить свое творение в мир, именно они чаще всего становятся
добычей властей.
Некоторые из таких кодеров, для привлечения к себе внимания, начали давать
интервью в средства масс-медиа и по телевидению. Однако в силу того, что
они слабо представляли, что такое вирусы по сути, все это выглядело как
какая-то игра.
Мотивы написания вирусов
Рассмотрев немного истории, вернемся в реальность, и попробуем понять,
зачем люди пишут вирусы? По моему опыту, скажу, что на это есть несколько
причин. Они, естественно, сугубо индивидуальны, что и сказывается в
последствии на результате труда.
Для удовольствия
Это первая и наиболее основная причина. Это может звучать смешно, по
сравнению с наносимым ущербом, но автору было просто интересно, что
может произойти. Думаю ты не осознаешь проблемы, пока сам с ней не
сталкивешься. "Ха-ха! Какой-то чувак в штатах только что потерял весь свой
винт! Ну и что, все равно я его не знаю".
Поиск известности
Вторая причина для написания - это добится того, чтобы твой кусок кода
появился на Wildlist, сайте освещающем циркулирующие в даный момент по
миру вирусы. Круто ведь ткнуть кого-нить в Wildlist и сказать: "Смотри,
чувак! Это я сбацал!" или "Теперь я в натуре монстр!". Она во всей своей красе
проявляется у script kiddie с их детским подходом к возможному ущербу.
Сюда же можно отнести и "Kit clicker'ов", тех script kiddies которые
используют готовые наборы кода для создания вирусов. Широко известный
пример, это создание червя Anna Kournikova, с использованием Kalamar kit.
Kit кодеры не имеют заний для понятия осуществляемого процесса, ими
руководит только одно - получение известности. Эта группа не приветствуется
как вирусописателями, так и теми, кто пишет антивирусы. Эксперименты с
заготовками на предмет, того что может получится (обычно среди 14 - 18
летних) доставляют только головную боль.
Третья группа из этого раздела состоит из тех, кто не ленится идотски шлепать
по 20 вирусов из кусков в день, нуждающихся для обнаружения в полном
45
дизасемблировании, разборе и т.д. Хотя именно они и обеспечивают работой
антивирусные компании.
Обычно народ из этого раздела с радостью дает интервью в любые издания,
тем самым портя репутацию серьезных кодеров.
Раскрывшиеся серьезные кодеры
Эта группа включает в себя более опасных и серьезных кодеров, которые
имеют достаточно серьезный опыт в программировании, и могут писать на
уровне анти-вирусной индустрии. В созданные вирусы они добавляют
процедуры и функции недающие при дизассемблировании получить исходный
код. Обычно такие вирусы пишутся для какого-либо исследования, а не для
нанесения вреда конечному пользователю. Хотелось бы упомянуть, что доступ
к этому коду имеет достаточно ограниченное количество людей, и все из этой
же группы, либо этот код становится доступным в сети, как доказательство
найденной уязвимости. Они не наносят никому ущерба, а указывают на
направление, откуда ущерб может быть нанесен.
Рассерженные одиночки
Последняя и наиболее опасный тип вирусописателя. Их не интересует какаялибо мораль или закон, и забота о том ущербе, который может понести
пострадавший. У каждого из них есть своя персональная цель. Они не относят
себя ни к какой группе кодеров, ни в коей мере. Их задача нанести
максимальный урон или создать вирус который "даст власть над всем миром".
Этих людей нельзя подвести под общие рамки вирусописателей, так как у
каждого их них своя мораль и о ней никто не знает. Сейчас к этой группе
относится не так много людей. И хорошо, что пока их амбиции не совпадают с
их возможностями. Однако, с учетом того, насколько чаще находятся
уязвимости в используемом всеми ПО, шанс добится своей цели у них с
каждым днем все выше (помните codered?).
Увлечение
Как уже говорилось, многие вирусописатели делают это из увлечения. У когото есть достаточно свободного времени, которое он проводит за любимым
занятием. Это скорее относится к молодым людям, так как у более старшего
поколения чаще гораздо больше забот.
46
Их можно сравнить с первой группой, однако чаще они более грамотно
программируют, часами смотрят логи на наличие частей пропущенного кода,
или раз за разом проверяют работоспособность своих творений под
различными ОС (своего рода бета-тестирование). Кодеры часто помогают друг
другу советами, делатся информацией, ночами изучают новые вирусы, или
придумывают новые идеи (я бы пожалуй отнес себя к этой группе). У этой
группы нет как таковой цели: навредить кому-либо, или тупо зацикливаться на
одной идее.
Чего нам ждать
Мир вирусописателей наполненный легендами и мифами, сформированный в
сознании людей некомпетентными обозревателями остался далеко в прошлом,
и уже не отпугивает народ от покупки нового ПО, и необходимости сохранять
свои данные. Общий уровень вирусописателей растет, как знание
программирования и распределенных систем. Думаю в ближайшем будущем
мы будем часто сталкиваться с аналогами meliss'ы, из-за пассивного
отношения пользователей к безопасности, и растущего числа вирусописателей.
В принципе, этот вопрос уже решен, он звучит скорее "когда?", а не "если?".
Приложение. / Appendix
1. Как составить аннотацию на русском языке.
Стиль аннотаций, как правило, имеет безличностный характер.
Используйте при работе следующие клише:
Статья (текст) посвящена проблеме/ вопросу .../
В начале статьи
—речь идет о ...;
—дается определение...;
—обосновывается значимость ...;
—привлекается внимание к ...
Далее
47
—описывается...;
—рассказывается...;
—рассматривается...;
—излагается ...
В частности,
—отмечается, например, ...;
—подробно излагается...;
—описывается схема...;
—указывается ...;
—доказывается мысль...
Наконец
—раскрывается...
В заключение
—приводятся примеры
Подытоживая сказанное, следует отметить...
Как мне кажется, статья может представлять интерес для ...
Думается, статья может оказаться полезной для ...
2. Как составить аннотацию на английском языке.
Для составления аннотации используются следующие клише:
1.
 The text / article under review ...(gives us a sort of information about...)
 The article deals with the problem ...
 The subject of the text is...
2.
48
 At the beginning (of the text) the author describes... (dwells on ...; explains...;
touches upon...; analyses...; comments ...; characterizes ...; underlines ...;
reveals...; gives account of...)
 The article begins with the description of..,, a review of..., the analysis of...
The article opens with ...
3.
 Then (after that, further on, next) the author passes on to ..., gives a detailed
(thorough) analysis (description), goes on to say that ...
4.
 To finish with, the author describes ...
 At the end of the article the author draws the conclusion that ...; the author
sums it all up (by saying...)
 In conclusion the author...
3. Как реферировать текст.
Writing a summary
To summarize the text follow these steps:
1. Read the text again.
2. Underline the relevant information in each paragraph.
3. Make notes about the main points. Leave out details such as examples.
4. Make sentences from the notes and link the sentences with connectors (and, but,
because, therefore, etc.).
5. Write your first draft.
6. Improve your first draft by reducing sentences. For example:

Cut out unnecessary phrases
Macs were designed with one clear aim: to facilitate interaction with the
computer.

Omit qualifying words (adjectives or modifying
adverbs)
very complex= complex

Transform relative clauses into -ing participle clauses
Double-clicking a folder opens a window which contains programs, documents
or... Double-clicking a folder opens a window containing programs, documents
or...
49
8. Write the final version of your summary. Don't forget to check the spelling and
grammar.
4. Как составить план текста.
Прочтите внимательно текст. Составьте на английском языке план текста,
выделив основные его темы. План можно составить в вопросной, назывной
или тезисной форме. Познакомьтесь с образцами планов, представленными
после текста; сравните со своим планом.
MEMORY
It is interesting to note that memory, one of the basic components of the
computer, is often called storage. It stores calculation program, the calculation
formulae, initial data, intermediate and final results. Therefore, the functions of
the computer memory may be classified in the following way. Firstly, the computer
memory must store the information transmitted from the input and other devices.
Secondly, memory should produce the information needed for the computation
process to all other devices of the computer. Generally, memory consists of two
main parts called the main, primary or internal, memory and the secondary or external memory. The advantage of the primary memory is an extremely high speed.
The secondary memory has a comparatively low speed, but it is capable of storing
far greater amount of information than the main memory. The primary storage
takes a direct part in the computational process. The secondary storage provides the
information necessary for a single step in the sequence of computation steps.
The most important performance characteristics of a storage unit are speed,
capacity and reliability. Its speed is measured in cycle time. Its capacity is measured
by the number of machine words or binary digits. Its reliability is measured by the
number of failures (отказ) per unit of time.
План в вопросной форме.
1.
What is memory?
2.
What is the function of memory?
3.
What are the main parts of memory?
4.
What are advantages and disadvantages of a storage unit?
5.
What are their functions?
50
6.
What are performance characteristics of the main and secondary memory?
7.
What units are performance characteristics measured by?
План в назывной форме
1.
The definition of memory.
2.
The main functions of memory.
3.
Classification of memory.
4.
Advantages and disadvantages of memory components.
5.
The functions of memory components.
6.
Performance characteristics of memory.
7.
The units for measuring the performance characteristics of memory.
План в тезисной форме.
1.
Memory is one of the basic components of the computer.
2.
Memory stores initial data, intermediate and final results.
3.
It produces the information needed to other devices of the computer.
4.
Memory consists of the main (internal) and the secondary (external) storage.
5.
The main memory has high speed, but small capacity; the secondary memory
possesses lower speed but greater capacity.
6.
The main memory performs computation; the secondary memory provides
information sequentially, step by step.
7.
The performance characteristics — speed, capacity and reliability — are
measured by cycles, binary digits and the number of failures per unit of time.
51
Литература:
1. Santiago Remacha Eteras Infotech. English for computer users. Cambridge.
Universal Press2009
2. Oxford English for Information Technology, Eric H. Glendinning, John
MacEvan
3. Dinos Demetriades Information Technology Oxford
4. Professional English in use for computers and Internet. Cambridge.
5. John Marks Computers and Information Technology.
6. Е. В. Гольцова, Английский для пользователей ПК и программистов.
Санкт-Петербург, 2002г.
7. Радовель В. А. Основы компьютерной грамотности. Ростов н/Д: Феникс,
2006. — 224 с.
8. Wikipedia - en.wikipedia.org›Information security
9. Tech Target Search Security - http://searchsecurity.techtarget.com
10.: http://hack.com.ua
52
Download