МИНИСТЕРСТВО ОБРАЗОВАНИЯ И НАУКИ РФ Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования «СЕВЕРО-КАВКАЗСКИЙ ГОРНО-МЕТАЛЛУРГИЧЕСКИЙ ИНСТИТУТ (ГОСУДАРСТВЕННЫЙ ТЕХНОЛОГИЧЕСКИЙ УНИВЕРСИТЕТ)» Кафедра иностранных языков Английский язык. Information security. Hacking. Учебно – практическое пособие по развитию навыков работы с аутентичными текстами по направлениям подготовки: 230100.62 – Информатика и вычислительная техника, 230700.62 – Прикладная информатика в экономике, 0990303.65 – Информационная безопасность автоматизированных систем Составители: Закаева Б.К., Братчик А. Б. Допущено редакционно-издательским советом Северо-Кавказского горно-металлургического института (государственного технологического университета). Владикавказ 2015г 1 УДК 811.111 ББК 81.2 Англ З-18 Рецензент: кандидат филологических наук, профессор, зав. кафедрой иностранных языков СКГМИ (ГТУ) Делиева Л. М. З-18 Английский язык. Information security. Hacking. Учебно - практическое пособие по развитию навыков работы с аутентичными текстами по направлениям подготовки: 230100.62 – «Информатика и вычислительная техника», 230700.62, «Прикладная информатика в экономике», 0990303.65-«Информационная безопасность автоматизированных систем» / Сост.: Б. К. Закаева; А. Б. Братчик; Северо - Кавказский горно-металлургический институт (государственный технологический университет). – Владикавказ: Северо - Кавказский горно-металлургический институт (государственный технологический университет). Изд-во «Терек», 2015. – 52 с. Пособие составлено в соответствии с ФГОС ВПО и РУП по всем направлениям подготовки. Подготовлено кафедрой Иностранных языков УДК 811.111 ББК 81.2 Англ Редактор: Компьютерная верстка: © Составление. ФГБОУ ВПО «Северо-Кавказский горно-металлургический институт (государственный технологический университет)», 2015 © Закаева Б. К.; Братчик А. Б.., составление, 2015 _______________________________________________________________________________ Подписано в печать ___.____.15.Формат бумаги 60х84 1/16. Бумага офсетная. Гарнитура «Таймс». Печать на ризографе. Усл. п.л____. Уч.-изд.л_____. Тираж 30 экз. Заказ № ____. Северо-Кавказский горно-металлургический институт (государственный технологический университет). Изд-во «Терек». Отпечатано в отделе оперативной полиграфии СКГМИ (ГТУ). 362021. Владикавказ, ул. Николаева, 44. 2 ОГЛАВЛЕНИЕ Предисловие Lesson 1 Is the devil as black as it is painted? Lesson 2 Who writes computer viruses? Lesson 3 Computer hacking – high-tech crime Lesson 4 How to become a hacker Lesson 5 The hacker toolbox Lesson 6 Computer crimes Lesson 7 The first hackers. Lesson 8 The ex-hacker. Lesson 9 The famous hackers Интерактив 1) Круглый стол 2) Ролевая игра 3) Мозговой штурм Дополнительные материалы Приложение 1) Составление аннотации на русском языке 2) Составление аннотации на английском языке 3) Реферирование статьи (текста) 4) Составление плана статьи (текста) Литература 3 4 5 8 12 15 19 23 27 30 36 41 41 41 42 47 47 48 50 52 Предисловие Методическое пособие по курсу «Английский язык . Information security. Hacking.» предназначено для студентов факультета информационных технологий , а также для всех желающих изучать профессиональный английский язык . Цель пособия – подготовить студентов к чтению и пониманию специальной литературы на английском языке в области информационных технологий и защиты информации. Представленный материал позволяет познакомиться с компьютерными преступлениями, причинами, по которым программисты, пишут вирусыи разновидностями хакеров. Пособие содержит аутентичные тексты потеме. Все задания способствуют усвоению и запоминанию специальной лексики; развивают навыки аналитического чтения, перевода, поиска информации и говорения на английском языке. Кроме того, пособие закладывает основы навыков аннотирования и реферирования англоязычных текстов. Выражаем благодарность за помощь в создании пособия студентам группы ИВб-12-1: Насуашвили Левану, Сабанову Сослану, Манвелянц Владиславу и Цакоеву Заурбеку, студентам группы Мб-13-1: Бекоевой Оксане и Кисиевой Яне и студенту группы Мб-13-1 Дмитриеву Максиму. 4 Lesson 1 1. Прочитайте и переведите текст. /Read and translate the text./ Is the devil as black as it is painted? Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community. The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential. A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug - a section of bad code that prevented the program from working properly - hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free. As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge. In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments 5 construct better security measures. Others might use their skills for more unethical endeavors. 2.Ответьте на вопросы по содержанию текста. /Answer the questions./ 1. What reputation has got the word «hacker»? 2. What thoughts does the word «hacker» summon up? 3. When was first the term «computer hacker» showed up? 4. What was a unifying trait among hackers? 5. What do hackers do when a program has a bug? 6. When did computer engineers begin to network individual machines together into a system? 7. What new meaning of the term hacker has been appeared? 8. Did hackers always have bad intents? 3.Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations./ СМИ, плохая репутация, преследовать людей, обманывать корпорации, украсть информацию, разрушить экономику, военные компьютерные сети, нет никаких сомнений, компьютерный код, мечтатели, новые способы, исследование компьютеров, способы достижения, объединяющая черта, сильное чувство любопытства , способность создавать программы, ошибка в программе, использовать навыки, по мере развития компьютеров, начать соединять, обретать новый смысл, злой умысел, барьер между ними, проникать в сети, компьютерные вирусы, тонкости компьютерного мира, корпорации и правительство, меры безопасности. 4. -Закончите следующие предложения, используя текст./Complete the following sentences, using the text./ 1. Thanks to the media, the word "hacker" has gotten … 2. While there's no denying that there are hackers out there with bad intentions, they make up only… 3. The term computer hacker first showed up … 4. A hacker was a programmer - someone who … 5. Hackers were visionaries who could see new ways to … 6. As computers evolved, computer engineers began to … 7. Soon, the term hacker had a new meaning - a person using computers to … 6 8. Some use their knowledge to help corporations and …. 5. Составьте предложения из двух, подходящих по смыслу частей. / Connect 1-7 with those of a-g. 1) The word «hacker» 2) They were the pioneers of the computer industry, 3) A unifying trait among these hackers was 4) Some managed to land a job that leveraged their skills 5) As computers evolved 6) They just wanted to know how computer networks worked and a) computer engineers began to network individual machines together into a system. b) a strong sense of curiosity, sometimes bordering on obsession. c) help corporations and governments construct better security measures. d) has gotten a bad reputation e) getting paid for what they'd happily do for free. f) building everything from small applications to operating systems. 7) Some use their knowledge to g) saw any barrier between them and that knowledge as a challenge 6.Вставьте недостающие слова / Insert the correct words./ 1. Hackers with bad intentions _____only a small percentage of the hacker community. 2. Hackers were_____ who could see new ways to use computers. 3. Bill Gates, Steve Jobs and Steve Wozniak saw the potential of what computers could do and_____ ways to ____ that potential. 4. A____ trait among these hackers was a strong sense of curiosity, sometimes bordering on____. 5. Hackers would often create and distribute small sections of code called _____ to fix problems. 6. The term hacker had a new meaning -- a person using computers to explore a ____ to which he or she didn't belong. 7. Usually hackers didn't have any ____ intent. 7 8. Some hackers might use their skills for more ____ endeavors. 7.Переведите на русский язык. / Translate into Russian./ 1. Most virus writers were people who just wanted to test the system and push the envelope. 2. If somebody instead of working plays pirated computer games all day long, then it’s quite likely that at some point they will get a virus. 3. With the advent of virus writing kits more people entered into the picture. 4. This sort of activity expanded as the virus and worm and Trojan world expanded and script worms became common. 5. The botnet creators realized that they could use the botnets to make the infected computers send out spam. 6. Newer malware tended toward collecting information from systems instead of crashing them or destroying data. 8.Переведите на английский язык. /Translate into English./ 1. Хакеры с плохими намерениями составляют лишь небольшой процент от хакерского сообщества. 2. Хакер был тем, кто взламывал компьютерный код . 3. Хакеры были основоположниками компьютерной индустрии 4. Билл Гейтс, Стив Джобс и Стив Возняк увидели потенциал того, что компьютеры могут сделать и создали способы для достижения этого потенциала. 5.Объединяющая черта среди этих хакеров был сильное чувство любопытства 6.Хакеры создавали программы, которые больше никто не мог себе представить. 7. Некоторым хакерам удалось получить работу, в которой использовались их навыки 8. Обычно у хакеров не было никакого злого умысла Lesson 2 1. Прочитайте и переведите текст. /Read and translate the text./ Who Writes Computer Viruses? 8 The typical caricature of a virus writer is a teenage with no friends who has something to prove. In reality this is not too far from the truth as guys like this produce a number of viruses and other malicious software. The term ‘malware’ is a fairly recent catch-all definition encompassing viruses, Trojan horse programs, worms, spyware and adware. It is an acronym of MALicious soft WARE – any computer program designed to cause harm your computer data or your personal privacy. Virus programmers can be divided into two main categories – the ‘digital vandal’ who does it for fun and the professional malware programmer who does it for commercial gain. Digital Vandals These are typically young men in their teens and early twenties who are learning programming and get some kind of buzz out of writing malicious software. They are probably members of shady internet forums dedicated to virus programming where they can share ideas, download virus writing toolkits and learn from more experienced programmers. Usually any software produced by inexperienced programmers has bugs in it and operates unpredictably. The same is true of viruses they write – often they do not operate exactly as the programmer intended because of errors and bugs. Sometimes this means that they are not quite as destructive as intended, which is no bad thing, but there is also a chance of them being even more destructive. Why do the digital vandals do what they do? Usually to earn some kind of recognition from their peers. They measure each other as to how well their creations can avoid detection, how fast they can spread and how many millions of dollars worth of damage they can do. Professional Programmers These are the most dangerous and secretive group of programmers. Not only are they experienced programmers who can produce software free from bugs, but they spend time studying vulnerabilities in operating systems and application software so that they can write code to exploit them. They are also often experts in psychology of computer users, studying patterns and habits. They make it their business to know what sort of link a user is most likely to click and devise other ways of concealing their malicious software as something benign. 9 Like the amateur ‘digital vandals’ their goals are to produce devastating programs that can evade detection for as long as possible and spread to as many users as possible. The difference is that the professional virus writer can not only produce software that does this well, but can also operate reliably. This enables the most highly skilled to command top rates when selling their services. 2. Ответьте на вопросы /Answer the Questions. / 1. Who writes computer viruses? 2. What is malware? 3. What are the main categories of virus? 4. Who are the digital vandals? 5. Why do the digital vandals do what they do? 6. Who are professional programmers? 7. Do professional programmers and digital vandals have anything in common? 8. What is the difference between professional programmers and digital vandals? 3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations / cartoon , wiseacre , argue , last , develop , share , first , form , discovery , hurt , hazardous , close , manners , feasible. 4. Закончите следующие предложения, используя текст./Complete the following sentences using the text./ 1.In reality this is not ___ ___ _____ the truth as guys like this produce a number of viruses and other malicious software. 2.The term ‘malware’ is a fairly recent _______ _______encompassing viruses, trojan horse programs, worms, spyware and adware. 3.These are typically young men ___ ______ _____and early twenties who are learning programming and get some kind of buzz out of writing malicious software. 10 4.Usually any software produced _____________ programmers has bugs in it and operates unpredictably. 5.Like the amateur ‘digital vandals’ their goals are __ ______________ programs that can evade detection for as long as possible and spread to as many users as possible. 5. Составьте предложения из двух, подходящих по смыслу частей. / Connect 1-5 with those of a-e. 1. The typical caricature of a virus writer is a teenage nerd. 2. The term ‘malware’ is a fairly recent catch-all definition encompassing. 3. Usually any software produced by inexperienced. 4. They make it their business to know what sort of link a user is most likely. 5. This enables the most highly skilled to command top. a. rates when selling their services. b. programmers has bugs in it and operates unpredictably. c. with no friends who has something to prove. d. viruses, Trojan horse programs, worms, spyware and adware. e. to click and devise other ways of concealing their malicious software as something benign. 6. Прочитайте следующие предложения и скажите, соответствуют ли они содержанию текста. /Read the following sentences and say if they are true or false. / 1. The term ‘malware’ is a fairly recent catch-all definition encompassing viruses, Trojan horse programs, worms, spyware and adware_ 11 2. Virus programmers can be divided into three main categories_ 3. Usually any software produced by inexperienced programmers has not bugs in it and operates unpredictably_ 4. True of viruses they write – often they do not operate exactly as the programmer intended because of errors and bugs 5. Like the amateur ‘digital vandals’ their goals are to produce devastating programs that can't evade detection for as long as possible and spread to as many users as possible_ 7. Translate sentence into Russian. 1. The typical caricature of a virus writer is a teenage nerd with no friends who has something to prove. 2. The term ‘malware’ is a fairly recent catch-all definition encompassing viruses, trojan horse programs, worms, spyware and adware. 3. Digital Vandals These are typically young men in their teens and early twenties who are learning programming and get some kind of buzz out of writing malicious software. 4. Professional Programmers These are the most dangerous and secretive group of programmers. 5. Like the amateur ‘digital vandals’ their goals are to produce devastating programs that can evade detection for as long as possible and spread to as many users as possible. The difference is that the professional virus writer can not only produce software that does this well, but can also operate reliably. Lesson 3 1. Read the text and think of the answers to the questions: COMPUTER HACKING – HIGH-TECH CRIME What’s your attitude to hacking? Do you think hackers must be punished? If so, in what way? What can be done to protect a computer from a hacker? 12 You can rob a bank without leaving the house these days. Who needs stocking masks, guns and getaway cars? If you are a computer whizz-kid, you could grab your first million armed with nothing more dangerous than a personal computer, a telephone and a modem to connect them. All you have to do is dial into the networks that link the computer in large organizations together, type in a couple of passwords and you can get the information that’s stored there to your hearts content. Fortunately it isn’t always quite as easy as it sounds. But, as more and more information is processed and stored on computer, whether it’s details of your bank account or the number of tins of baked beans in the stockroom at the supermarket. A couple of months ago a newspaper reported that five British banks were being held to ransom by a gang of hackers who had managed to break into their computer. The hackers were demanding money in return for revealing exactly how they did it. In cases like this, banks may consider paying just so they can protect themselves better in the future. No one knows exactly how much money is stolen by keyboard criminals – banks and other companies tend to be very secretive if it happens to them. Some experts believe that only around a tenth of all computer crimes are actually reported. Insurance company Hogg Robinson estimate that computer frauds cost British companies an incredible 400 million pound a year. Most computer crimes are “inside jobs”, where staff with access to the company’s computers fiddle with the records. A comparatively small amount are committed by the more glamorous – and headline-grabbing – hackers. The true hacker, it seems, doesn’t do it for financial gain. The thrill appears to be, not in getting rich, but in beating the system. Two of Britain’s most notorious hackers are Nicolas “Mad Hacker” Whitely and Edward Singh. Whitely hacking days came to an abrupt halt in June, when 21-year-old was imprisoned for four months for damaging computer disks. Edward Singh first came to public attention after claiming that he had hacked into American and British government and military computers. As with everything else, hackers start young in the States. A 12-year-old boy in Detroit was accused of entering a company’s credit rating computer and distributing the numbers he found there. His mother told reporters that he spent up to 14 hours on his computer during the weekend. “He didn’t bother me. I figured, computers, that’ the thing of the day”, she said. 13 Prevention is probably easier than detection, and many companies now spend lots of time and money devising programs using passwords and codes. Of course, all this is no use at all if computer users tell each other their password, stick it on their screen so they don’t forget it or use passwords like “password”. There are plenty of software companies who specialize in writing software that make computers hacker-proof. One company in the States set out to prove that its system can defeat hackers by asking 2,000 of them to try to hack in. The hackers were given two weeks to discover the secret message stored on two PCs in offices in New York and San Francisco. The message reads: “The persistent hunter who wins his prize sooner or later becomes the hunted”. You’ll be relieved – or perhaps disappointed – to learn that no one hacker managed it. 2.Прочитайте текст еще раз и выберите правильные варианты ответов. / Read the text again and choose the best answer from the four suggested answers A, B, C or D. 1. A. B. C. D. 2. A. B. C. D. 3. A. B. C. D. 4. A. B. C. D. 5. A. B. C. When banks decide to pay computer criminals, they expect those hackers… to give back the information they have stolen. to explain what their technique is. not to deal with these banks again. not to pass on the stolen information. Companies don’t always report computer crimes because they… know that the criminals are members of their staff. think that it would damage their reputation. don’t expect the criminals to be caught. don’t know about these crimes themselves. According to the text, the main motive of computer hackers is … to make a lot of money. to appear in the newspapers. to overcome a challenge. to become members of the staff of a large company. The mother of the 12-year-old hacker from Detroit said that … she had been worried about the time her son spent at his computer. she tried to prevent her son’s criminal activity. she had been involved in her son’s criminal activity. she thought her son’s interest in his computer was normal. Which of the people described in the text was sent to prison? Hogg Robinson Nicholas Whiteley Edward Singh 14 D. The boy from Detroit 6. What was the result of one company’s attempt to prove that its security systems were effective? A. The results were ambiguous. B. It was a failure. C. It was a complete success. D. It was a partial success. Lesson 4 1. Прочитайте и переведите текст. /Read and translate the text. / HOW TO BECOME A HACKER Looking for advice on how to learn to crack passwords, sabotage systems, mangle websites, write viruses, and plant Trojan horses you can come to the wrong place. I'm not that kind of hacker. Looking for advice on how to learn the guts and bowels of a system or network, get inside it, and become a real expert. Maybe I can help you. How you use this knowledge is up to you. I hope you'll use it to contribute to computer science and hacking (in its good sense), not to become a cracker or vandal. This little essay is basically the answers to all the e-mails I get asking how to become a hacker. It's not a tutorial in and of itself. It's certainly not a guaranteed success. Just give it a try and see what happens. If this ends up being of any use to you, let me know. That said here's where to start: Be curious Take things apart. Look under the hood. Dig through your system directories and see what's in there. View the files with hex editors. Look inside your computer. Wander around computer stores and look at what's there. Read everything in sight If you can afford it, buy lots of books. If you can't, spend time in libraries and online. Borrow books from friends. Go through tutorials. Read the help files on your system. If you're using Unix/Linux, read the main files. Check out the local college bookstores and libraries. And as you're reading, try things (see next paragraph). Experiment Don't be afraid to change things, just to see what'll happen. Do this long enough, of course, and you'll wipe out your system (see next paragraph), but that's part of becoming a hacker. Try command options and switches you've never tried before. Look for option menus on programs and see what they can do. In Windows, tweak your registry and see what happens. Change settings in .INI files. In Unix, 15 dig around in the directories where you don't normally go. On the Macintosh, play around in the system folder. Make backups If you start mucking around with system files, registries, password files, and such, you will eventually destroy your system. Have a backup ready. If you can afford it, have a system you use just for experimenting, ready to reload on a moment's notice, and do the serious work on a different computer. Don't limit yourself Who says a computer or network is the only place to hack? Take apart your telephone. Figure out your television (careful of the high voltage around the picture tube - if you fry yourself, it's not my fault) and VCR. Figure out how closed captioning works (that was a plug for my FAQ). Take apart your printer. Pick up the latest issues of Nuts & Volts and Midnight Engineer. Take apart the locks on your doors. Figure out how your radio works. Be insatiably curious and read voraciously. Get some real tools You can't cut a board in half with a screwdriver. Well, maybe, but it'll take a long time. Dig around and find the proper tools for the operating systems you're using. They're out there on the Web. You can get some pretty good stuff as shareware or freeware (especially on Unix). The serious power tools often cost serious money. What kinds of tools? Hex file editors. Snoopers that analyze system messages and network traffic. Programming tools. Scripting tools. Disk editors/formatters. Disassemblers. When you get good, write some of your own. Learn to program If you want to be a hacker, you're going to have to learn to program. The easiest way to start depends on the operating system you're using. The choice of language is very individual. It's almost a religious thing. Suggest a programming language to a beginner, and someone will disagree. Heck, you'll probably get flamed for it in a newsgroup. In Unix, I'd suggest getting started with Perl. Buy a copy of the camel book (Programming Perl) and the llama book (Learning Perl). You'll have the fundamentals of programming really fast! The best part is that the language itself is free. In Windows, you can get started quickly using a visual development environment like Visual Basic or Delphi. No matter what the system, if you want to get serious, you'll eventually need to learn С (or C++ or Visual C++ or some other variant). Real hackers know more than one programming language, anyway, because no one language is right for every task. Learn to type Hackers spend a lot of time at their keyboards. I type 90+ wpm (according to the Mavis Beacon typing tutor). HackingWiz (of hackers.com and Hacker's Haven BBS fame) says he can type 140+ wpm. The typing tutor may be boring, but it pays off. 16 Use real operating systems Everyone's using Windows 95/98 these days, but it's just a shell on top of a 32bit patch to a 16-bit DOS. Get some real operating systems (Linux, Windows NT, Mac OS, OS/2...) and learn them. You can't call yourself a linguist if you only know one language, and you certainly can't call yourself a hacker if you only know one OS. Linux is a hacker's dream. All the source code is freely available. Play with it, analyze it, learn it. Eventually, perhaps you can make a contribution to Linux yourself. Who knows, you might even have a chance to write your own OS. Talk to people It's hard to learn in a vaccuum. Take classes. Join users groups or computer clubs. Talk to people on IRC or newsgroups or Web boards until you find people to learn with. That can take a while. Every third message on newsgroups like alt.hack is «teach me to hack.» Sigh. The best way to be accepted in any group is to contribute something. Share what you learn, and others will share with you. Do some projects It's important to pick some projects and work until you've finished them. Learning comes from doing, and you must follow the project through start to finish to really understand it. Start really simple. Make an icon. Customize your system (the startup screen on Win95, or the prompt on Unix). Make a script that performs some common operation. Write a program that manipulates a file (try encrypting something). Learn to really use the Internet Start with the Web. Read the help for the search engines. Learn how to use boolean searches. Build up an awesome set of bookmarks. Then move on to other Internet resources. Get on Usenet. Learn to use gopher. Get on IRC. You'll find useful information in the strangest places. Get to the point where you can answer your own questions. It's a whole lot faster than plastering them all over various newsgroups and waiting for a serious answer. Once you've gone through these steps, go out and contribute something. The Internet was built by hackers. Linux was built by hackers. Usenet was built by hackers. Sendmail was built by hackers. Be one of the hackers that builds something. 2. Ответьте на вопросы по содержанию текста. /Answer the questions./ 1. 2. 3. 4. 5. 6. 7. 8. How сan you use the knowledge obtained from the article? What does the author mean saying «I'm not that kind of hacker»? Why should you dig through your system directories? Why is it advised to look for option menus on programs? What operating systems are mentioned in the text? What programming languages are recommended? Why is it important for hacker to have a high speed typing skills? Why is it important to program? 17 9. What OS is a hacker's dream? 10.What is the best way to be accepted in any group 11.What Internet resources does the author advise? 12.Where can you find useful information? 13.Did hackers create anything really useful ? 3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations. / Резервная копия; интерактивный; перезагрузить; клавиатура; доступный; руководство; пароль; разобрать на части; основы; вопрос-ответ; программные средства; документ; позволить cебе; понимать; скучный; делать вклад. IRC международная линия передачи документальной информации shareware n условно бесплатное ПО (попробуй перед тем как заплатить) snooper n - тот, кто сует нос в чужие дела hex a - шестнадцатеричный on a moments notice сразу customize v - изготовить по техническим условиям (заказчика), свободные программные средства freeware n ( средства без исходного кода, которые можно свободно распространять) 4. Сопоставьте английские слова с их переводом. / Connect the English words with their Russian equivalents. / часто задаваемые вопросы благоговейный, внушающий страх способ папка заголовок руководство разъем, подстрочник искажать расплатиться, окупиться j) каталог k) настройка, установка l) документ m) делиться n) закладка o) резервная копия p) ерунда, чепуха q) зашифровать r) редактор 1. awesome a 2. backup n – 3. bookmark n 4. caption n 5. directory n 6. editor n 7. encrypt v 8. FAQ 9. folder n 10. mangle v 11. pay off v 12. plug n 13. setting n 14. script n 15. share v 16. stuff n 17. tutorial n - a) b) c) d) e) f) g) h) i) 5. Разговорная практика. (Интерактив) / Speaking ./ 18 A friend of yours wants to be a hacker and asks you for some advice. Write a list of instructions and warnings for him. 6. Напишите краткую аннотацию текста “How to become a hacker” на английском языке. /Write a short summary of the text. / Lesson 5 1. Прочитайте и переведите текст. /Read and translate the text./ The Hacker Toolbox The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it. Malicious hackers use programs to: Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity. Hack passwords: There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields. Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks. Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the 19 early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse. Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam. Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it. 2. Ответьте на вопросы по содержанию текста. /Answer the questions./ 1. What is the main recourse hackers rely on ? 2.Why do hackers download programs written by other people? 3.how is called trial and error methods of hacking passwords ? 4.what is dictionary attack? 5.what are computer viruses? 6.Why hackers are possible to find a pathway into the system without username and password? 7.what is zombie computer? 8.How do hackers spy on e-mail? 9.what kind of formulas use e-mail today? 3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations. / Lean , resourcefulness , search , various , operate , let , set up , personality, mistake , feasible , make , moment , sacrifice , coding 4. Закончите следующие предложения, используя текст. /Complete the following sentences, using the text. / 20 1. These programs ___ _______ a lot of power over innocent users and organizations. 2. Some programs allow ________ to review every keystroke a computer user makes 3. Computer viruses are programs designed to duplicate themselves and cause problems ______ _____ ________a computer to wiping out everything on a system's hard drive. 4. The hacker can secretly ______ ___ victim's computer, using it to commit crimes or spread spam. 5. Today, most e-mail programs use _________ _____ so complex that even if a hacker intercepts the message, he won't be able to read it. 5. Составьте предложения из двух, подходящих по смыслу частей. / Connect 1-5 with those of a-e. 1. While there is a large community of hackers on the Internet, 2. These programs give hackers a lot of power over innocent users and organizations 3. Infect a computer or system with a virus 4. Create zombie computers 5. Today, most e-mail programs use encryption formulas so complex that even if a hacker a. Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive b. intercepts the message, he won't be able to read it. c. only a relatively small number of hackers actually program code. d. once a skilled hacker knows how a system works, he can design programs that exploit it. e. A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks 6. Прочитайте следующие предложения и скажите, соответствуют ли они содержанию текста. /Read the following sentences and say if they are true or false./ 21 1.only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people_ 2.Some programs don't allow hackers to review every keystroke a computer user makes_ 3. Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive_ 4. Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers_ 5. Hackers have not created code that lets them intercept and read e-mail messages - the Internet's equivalent to wiretapping_ 7.Переведите на русский язык. /Translate into Russian. / 1. The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code 2. Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. 3. Hack passwords: There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols 4. Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive 5. Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers 6. Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks 7. Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping 22 Lesson 6 1. Прочитайте и переведите текст. /Read and translate the text. / Computer crimes More and more the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment. These facts have not been lost on criminals or would-be criminals. A recent Stanford Research Institute study of computer abuse was based on 160 case histories, which probably are just the proverbial tip of the iceberg. After all, we only know about the unsuccessful crimes. How many successful ones have gone undetected is anybody's guess. Here are a few areas in which computer criminals have found the pickings all too easy. Banking. All but the smallest banks now keep their accounts on computer files. Someone who knows how to change the numbers in the files can transfer funds at will. For instance, one programmer was caught having the computer transfer funds from other people's accounts to his wife's checking account. Often, traditionally trained auditors don't know enough about the workings of computers to catch what is taking place right under their noses. Business. A company that uses computers extensively offers many opportunities to both dishonest employees and clever outsiders. For instance, a thief can have the computer ship the company's products to addresses of his own choosing. Or he can have it issue checks to him or his confederates for imaginary supplies or services. People have been caught doing both. Credit Cards. There is a trend towards using cards similar to credit cards to gain access to funds through cash-dispensing terminals. Yet, in the past, organized crime has used stolen or counterfeit credit cards to finance its operations. Banks that offer after-hours or remote banking through cash-dispensing terminals may find themselves unwillingly subsidizing organized crime. Theft of Information. Much personal information about individuals is now stored in computer files. An unauthorized person with access to this information could use it for blackmail. Also, confidential information about a company's products or operations can be stolen and sold to unscrupulous competitors. (One attempt at the latter came to light when the competitor turned out to be scrupulous and turned in the people who were trying to sell him stolen information.) 23 Software Theft. The software for a computer system is often more expensive than the hardware. Yet this expensive software is all too easy to copy. Crooked computer experts have devised a variety of tricks for getting these expensive programs: printed out, punched on cards, recorded on tape or otherwise delivered into their hands. This crime has even been perpetrated from remote terminals that access the computer over the telephone. Theft of Time-Sharing Services. When the public is given access to a system, some members of the public often discover how to use the system in unauthorized ways. For example, there are the "phone freakers" who avoid long distance telephone charges by sending over their phones control signals that are identical to those used by the telephone company. Since time-sharing systems often are accessible to anyone who dials the right telephone number, they are subject to the same kinds of manipulation. Of course, most systems use account numbers and passwords to restrict access to unauthorized users. But unauthorized persons have proved to be adept at obtaining this information and using it for their own benefit. For instance, when a police computer system was demonstrated to a school class, a precocious student noted the access codes being used; later, all the student's teachers turned up on a list of wanted criminals. Perfect Crimes. It's easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers. Of course, we have no statistics on crimes that go undetected. But it's unsettling to note how many of the crimes we do know about were detected by accident, not by systematic audits or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck. For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for fraudulent transactions. In another case, disgruntled employees of the thief tipped off the company that was being robbed. An undercover narcotics agent stumbled on still another case. An employee was selling the company's merchandise on the side and using the computer to get it shipped to the buyers. Unlike other embezzlers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes brazen it out, demanding not only that they not be prosecuted but also that they be given good recommendations and perhaps other benefits, such as severance pay. All too often, their demands have been met. Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They cringe at the 24 thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company's executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his exploits elsewhere. 2. Ответьте на вопросы по содержанию текста. /Answer the questions. / 1. What are operations of businesses, governments, and financial institutions controlled by? 2. Where is computer crime used? 3. How can a programmer stole money from bank? 4. How can a programmer hack in the business area? 5. How can a programmer use credit cards for crimes? 6. How can a programmer get documents and confidential information? 7. Why does the system use account numbers and passwords? 8. Do computer crimes exist nowadays ? 3. Найдите в тексте эквиваленты(синонимы) следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations. / Procedure , penalty , likely , fortunate , proposal , accomplice , orderly , keep , escape, equal , benefit , discovered , 4. Вставьте недостающие слова /Insert the missing words. / 1. More and more the operations of our ________ _______ __________ _________are controlled by information that exists only inside computer memories. 2. _______ All but the smallest banks now keep their accounts on computer files. 3. Theft of Information. ____ ______ ______ about individuals is now stored in computer files. 4. Perfect Crimes. It's _____ _______ _______to go undetected if no one checks up on what the computer is doing. 5. They cringe at the thought of a criminal boasting in open court of how he juggled the most confidential ___________________________________executives, accountants, and security staff. 5. Составьте предложения из двух, подходящих по смыслу частей. / Connect 1-5 with those of a-e. 25 1. Even worse, a number of people who have done this and been caught at it 2. Credit Cards. There is a trend towards using cards similar to credit cards to gain 3. Software Theft. The software for a computer system is often more 4. Theft of Time-Sharing Services. When the public is given access to a system, 5. For example, a certain keypunch operator complained of having to a. stay overtime to punch extra cards b. have managed to get away without punishment c. some members of the public often discover how to use the system in unauthorized ways d. access to funds through cash-dispensing terminals e. than the hardware 6. Прочитайте следующие предложения и скажите, соответствуют ли они содержанию текста. /Read the following sentences and say if they are true or false./ 1. More and more the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories _ 2. Banking. All but the smallest banks now keep their accounts on computer files_ 3. Credit Cards. There is not a trend towards using cards similar to credit cards to gain access to funds through cash-dispensing terminals_ 4. of Time-Sharing Services. When the public is given access to a system, some members of the public often can't discover how to use the system in unauthorized ways_ 5. Perfect Crimes. It's easy for computer crimes to go undetected if no one checks up on what the computer is doing_ 7.Переведите на русский язык. /Translate into Russian. / 26 1. More and more the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. 2. Banking. All but the smallest banks now keep their accounts on computer files. 3. Credit Cards. There is a trend towards using cards similar to credit cards to gain access to funds through cash-dispensing terminals. 4. Theft of Information. Much personal information about individuals is now stored in computer files. 5. Software Theft. The software for a computer system is often more expensive than the hardware. Lesson 7 1. Прочитайте и переведите текст. /Read and translate the text./ The first hackers. The first "hackers" were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech Model Railroad Club). Some of the members really built model trains. But many were more interested in the wires and circuits underneath the track platform. Spending hours at TMRC creating better circuitry was called "a mere hack." Those members who were interested in creating innovative, stylistic, and technically clever circuits called themselves (with pride) hackers. During the spring of 1959, a new course was offered at MIT, a freshman programming class. Soon the hackers of the railroad club were spending days, hours, and nights hacking away at their computer, an IBM 704. Instead of creating a better circuit, their hack became creating faster, more efficient program with the least number of lines of code. Eventually they formed a group and created the first set of hacker's rules, called the “Hacker's Ethic”. Rule 1: Access to computers and anything, which might teach you, something about the way the world works - should be unlimited and total. Rule 2: All information should be free. Rule 3: Mistrust authority - promote decentralization. Rule 4: Hackers should be judged by their hacking, not bogus criteria such as degrees, race, or position. 27 Rule 5: You can create art and beauty on a computer. Rule 6: Computers can change your life for the better. These rules made programming at MIT's Artificial Intelligence Laboratory a challenging, all encompassing endeavor. Just for the exhilaration of programming, students in the Al Lab would write a new program to perform even the smallest tasks. The program would be made available to others who would try to perform the same task with fewer instructions. The act of making the computer work more elegantly was awe-inspiring. Hackers were given free reign on the computer by two AI Lab professors, "Uncle" John McCarthy and Marvin Minsky, who realized that hacking created new insights. Over the years, the AI Lab created many innovations: LIFE, a game about survival; LISP, a new kind of programming language; the first computer chess game; The CAVE, the first computer adventure; and SPACEWAR, the first video game.. 2. Ответьте на вопросы по содержанию текста. /Answer the questions. / 1. Who were the first hackers? 2. What is “Hacker's Ethic”? 3. Why was the set of hacker's rules written? 4. According to what rules should that hackers be judged? 5. Do you think that Rule 6 is real? 6. What should students do for the exhilaration of programming? 7. Would the program be made available to others? 8. Who did give hackers free reign? Why? 9. What innovations did the AI Lab create over the years? 3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations. / Первые хакеры; строить образцы поездов; заинтересованы проводами и схемами; тратить часы; просто хакеры; умные схемы; новый курс; компьютерное программирование; проводили дни, часы, и ночи на пролет за своим компьютером; наименьшее количество строк кода; сформировали группу; набор правил хакера; Этика Хакера; доступ к компьютерам; строение мира; информация должна быть бесплатной; поддерживать децентрализацию; поддельные критерии; ученая степень; раса; должность; произведения искусства; изменить жизнь; сделали программирование более перспективным; 28 просто для развлечения; писать новые программы; простые задачи; меньшее количество инструкций; работа на компьютере становилась более изящной; полная свобода; создает новые идеи; язык программирования; компьютерные шахматы; приключенческая игра; видео игра. 4.Вставьте недостающие слова /Insert the correct words. / 1. Spending _________creating better circuitry was called "a mere hack 2. During the spring of 1959, a new _________offered at MIT, a freshman programming class 3. These rules ___________ at MIT's Artificial Intelligence Laboratory a challenging, all encompassing endeavor 4. The act of making the ___________more elegantly was awe-inspiring 5. Hackers were given free ________________by two AI Lab professors, "Uncle" John McCarthy and Marvin Minsky, who realized that hacking created new insights. 5. Прочитайте следующие предложения и скажите, соответствуют ли они содержанию текста. /Read the following sentences and say if they are true or false./ 1. The first "hackers" were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech Model Railroad Club) 2. During the winter of 1959, a new course was offered at MIT, a freshman programming class 3. Rule 3: All information should be free 4. The program would not be available to others who would try to perform the same task with fewer instructions 5. Hackers were given free reign on the computer by two AI Lab professors, "Uncle" John McCarthy and Marvin Minsky, who realized that hacking created new insights. 6. Computers can change your life for the harder and less interesting. 8.Переведите на русский язык. /Translate into Russian. / Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. 29 Lesson 8 1. Прочитайте и переведите текст. /Read and translate the text./ THE EX–HACKER Kevin Mitnick is the hackers' hero. His latest spell in jail was, a 46-month sentence for fraud relating to breaking into the systems of several multinational corporations. He was released on condition that he did not have any contact with a computer. In March 2000, a Welsh teenager allegedly stole information from more than 26,000 credit card accounts across Britain, the US, Japan, Canada and Thailand, and published the details on the Internet. FBI agents and British police raided the home of Raphael Gray, 18, and arrested him and his friend. He has been charged with 10 counts of downloading unauthorised information. In 1998 Washington revealed that an Israeli hacker called 'The Analyser' was responsible for the most organised attempt to penetrate the Pentagon's computer systems'. He turned out to be Ehud Tenenbaum, 18, who had planted a list of his own passwords in the Pentagon system and passed them to other hackers. In 1997 the son of a fraud squad detective walked free from a court in London after charges of breaching the security of the US air force were dropped. Three years earlier Mathew Bevan, then 19, and a friend, Richard Pryce, 16, used the Internet to gain access to several US military bases. Pryce was fined £1,200 after admitting several other offences. Hotmail, Microsoft's free email service, was hacked into last September, exposing the correspondence of more than 40m users. A group calling itself Hackers Unite posted a Web address with details of how to access any Hotmail account. The service was shut down for five hours. The UK Department of Trade and Industry has twice been prey to hackers, once in 1996 and again in 2000 when a DTI computer was programmed to reroute email. The Home Office investigated nine cases of hacking last year, one of which was the leaking of a report on a murder. In August 1996 hackers ran up a £ lm phone bill for Scotland Yard but did not access files. In 1997 hackers got into the Yahoo! website, replacing the homepage with a ransom note demanding the release of their hero, Kevin Mitnick. Unless the demand was met, the note said, a virus would be released in all Yahoo!'s computers. The 30 company dismissed the threat as a hoax, but the 'Free Kevin' slogan continued to appear on other hijacked sites. Kevin Mitnick's criminal record 1981 Where: California Charge: Computer fraud for stealing computer manuals from Pacific Bell Sentence: One year probation 1987 Where: California Charge: Computer fraud (no details available) Sentence: Pleaded guilty, but sentence unknown 1989 Where: California Charges: Computer fraud and possession of unauthorized access devices for hacking into MCI and Digital Equipment computers Sentence: One year in low-security prison and three years of supervised release Time Served: One year, much of it at a halfway house for people with compulsive disorders 1992 Where: California Charges: Computer fraud and possession of unauthorized access devices for allegedly hacking into state Department of Motor Vehicles computers Sentence: Charges still pending 1995 Where: North Carolina Charge: Possession of unauthorized access devices Sentence: Eight months Time served: Eight months Where: California Charge: Violation of supervised release Sentence: Fourteen months Time served: Fourteen months 1996 Where: California 31 Charges: Computer fraud, wire fraud and possession of unauthorized access devices Sentence: Subject to terms of plea bargain 2. Ответьте на вопросы /Answer the questions. / 1) What was Kevin Mitnick? 2) Why was he sentenced to spend in jail 46 months ? 3) What condition was he released on? 4) Why and when did FBI agents and British police raid the home of Raphael Gray? 5) What was an Israeli hacker called 'The Analyser' responsible for? 6) Who used the Internet to gain access to several US military bases in 2000? 7) Who hacked into Hotmail, Microsoft's free email service and what was the result of that hacking? 3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations / 1) Кредитная карта - … 2) Британская полиция - … 3) Организованная попытка - … 4) Был освобожден - … 5) Последний срок - … 4. Закончите следующие предложения, используя текст. /Complete the following sentences using the text./ Complete the following sentences, using the text. 1) In August 1996 hackers ran up … 2) FBI agents and British police raided the home of … 3) He was released on condition that … 4) In 1997 hackers got into the Yahoo! website, replacing the homepage with a 32 ransom note … 5) Pryce was fined … 6) Kevin Mitnick is the … 5. Составьте предложения из двух, подходящих по смыслу частей. / Connect 1-5 with those of a-e. 1) He was released on condition … 2) Unless the demand was met, the note said, … 3) Hotmail, Microsoft's free email service, was hacked into last September, … 4) He turned out to be Ehud Tenenbaum, 18, who had planted … 5) His latest spell in jail was a 46-month sentence for … a) exposing the correspondence of more than 40m users. b) a virus would be released in all Yahoo!'s computers. с) fraud relating to breaking into the systems of several multinational corporations. d) that he did not have any contact with a computer. e) a list of his own passwords in the Pentagon system and passed them to other hackers. 6. Вставьте недостающие слова /Insert the correct words./ 1) Kevin Mitnick is the … hero. 2) The company dismissed the threat as a … but the 'Free Kevin' slogan continued to appear on other hijacked sites. 3) In March 2000, a Welsh teenager allegedly stole information from more than 26,000 credit card accounts across Britain, the US, Japan, Canada and Thailand, and published the details on the … 4) In 1997 hackers got into the Yahoo! website, replacing the homepage with a ransom note demanding the … of their hero, Kevin Mitnick. 33 5) The Home Office investigated nine cases of hacking last year, one of which was the leaking of a report on a … 7. Прочитайте текст и дайте его краткую аннотацию. / Read the text and give its short summary. The World's Richest Ex-Hackers Whatsapp founder and billionaire ex-hacker Jan Koum. Long before he was the two-hundred-and-second richest person on the planet, Jan Koum was just another curious kid with a wardialer. Koum, whose net worth suddenly jumped to $6.8 billion last month when his startup WhatsApp was acquired by Facebook, began his tech career as a teenage immigrant from Ukraine and fan of the 1995 film ‘Hackers.’ From the privacy of his Mountain View, Calif. bedroom, he’d use his wardialer—a machine that cycles through phone numbers, dialing them on a modem to find open connections—to probe the global Internet and explore faraway networks. “The Internet was so insecure back then,” he told my colleague Parmy Olson during her reporting for Forbes’ recent cover story on Koum’s $19 billion dollar startup. “Servers on the fringes of the Internet with root account and no passwords…The challenging part was finding these systems where you have to learn your way around. There were no manuals.” Koum says his intentions were never malicious. He was careful not to delete anything and never participated in the distributed denial of service attacks that plagued websites in the late 90s by flooding them with junk traffic. “It was more curiosity, how can I figure it out, more of a challenge,” he says. Once, Koum admits, he found his way onto the network of the computer graphics giant Silicon Graphics, a story that the 38-year-old CEO is careful to leave unfinished. “At some point I connected to the server,” he says. “And that’s as much as I’m going to say.” Add Koum’s name to the growing list of ultra-successful entrepreneurs whose paths to billions started on the wilder side of the hacker frontier. In fact, founders of Apple AAPL +0.03%, Microsoft MSFT +1.89%, Facebook and Twitter all flirted with activities that might today be called illegal hacking before going on to found Silicon Valley’s most successful companies, a trend worth remembering as the tech world 34 and Washington grapple over how to apply–or restrict–the controversial Computer Fraud and Abuse Act. In the late 60s, a teenage Bill Gates and his Microsoft co-founder Paul Allen, for instance, were caught with unauthorized access to an administrator account at Computer Center Corporation and even rummaged through its Dumpster for printouts of source code, according to Allen’s memoir. In 2004, Zuckerberg used login records on TheFacebook.com to break into the email accounts of Harvard Crimson reporters, according to reporting by Business Insider’s Nicholas Carlson. Twitter co-founder Jack Dorsey got his first job by breaking into the network of the dispatch company he hoped would hire him to show the company its security vulnerabilities. Jan Koum’s hacking adventures played a similar role in his unlikely rise from welfare to a top spot on the most recent Forbes billionaire list released earlier this month. Koum was a noted member of the 1990s hacker group w00w00, which also included Napster co-founder Sean Fanning and, occasionally Napster co-founder and Facebook investor Sean Parker. Gordon “Fyodor” Lyon remembers Koum as a vital contributor to the development of the Nmap security scanner, a tool used today by both attackers and defenders of networks to suss out vulnerabilities. “He was particularly helpful in training Nmap to recognize FreeBSD machines,” Lyon writes to me in an email, referring to a common open-source operating system. “We lived nearby and used to hang out from time to time. This tremendous WhatsApp success truly could not have happened to a nicer person!” When Koum was working at Yahoo! years later, it was the same w00w00 crowd that he turned for advice in fending off an unprecedented denial of service attack hitting the company’s websites, according to Reuters’ Joseph Menn. And when his startup WhatsApp was acquired for a shocking $19 billion dollars in February, the same group of hackers assembled for a spontaneous celebration, Menn reports. Career paths like Koum’s should be taken as evidence of how prosecuting harmless young hackers under the Computer Fraud and Abuse Act can hamper innovation, says Hanni Fakhoury, an attorney with the Electronic Frontier Foundation. “[The CFAA] is definitely creating a chilling effect on researchers, tinkerers and innovators,” says Fakhoury. “At the EFF, we get phone calls weekly from researchers who have an idea, have done some preliminary testing, and want to look deeper but are worried about CFAA liability. The volume of those calls has gone up.” 35 Fakhoury points to the case of Aaron Swartz, the coding prodigy, activist and early employee of the social news site Reddit. Swartz was prosecuted under the CFAA in 2011 after using an automated script to download millions of files from the academic journal website JSTOR. Facing seven-figure legal bills and decades in prison, the 26-year-old committed suicide. His story is told in a soon-to-be-released documentary titled “The Internet’s Own Boy.” “Zuckerberg, Steve Jobs, Bill Gates, Wozniak, Paul Allen, all have told stories or written in autobiographies about how when were younger they engaged in legally questionable activities, and how they used those mostly harmless experiences to create the biggest tech companies in the world,” says Fakhoury. “They were fortunate that they were spared the fate of Aaron Swartz.” No one, perhaps, has better captured the importance of hacker experimentation for innovation better than the late Steve Jobs, who once partnered with Apple cofounder Steve Wozniak to sell “Blue Boxes,” tools that skirted the phone companies’ security measures to allow free calls. “If it hadn’t been for the Blue Boxes,” Jobs told his biographer Walter Isaacson before his death, “There would have been no Apple.” And if there had been no wardialer, there may have never been Whatsapp. Lesson 9 1. Прочитайте и переведите текст. /Read and translate the text./ Famous Hackers Steve Jobs and Steve Wozniak, founders of Apple Computers, were both hackers. Some of their early exploits even resembled the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers. Linus Torvalds, creator of Linux, is another famous honest hacker. Hisopen source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits. 36 Richard Stallman, also known as "rms," founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management. On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole. Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California. Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software. Kevin Poulsen, or Dark Dante, specialized in hacking phonesystems. He's famous for hacking the phones of a radio station called KIIS-FM. Poulsen's hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he's famous for being a senior editor at Wired magazine. Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant -- his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times. It's likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don't really know what they are doing -- they're just using dangerous tools they don't completely understand. Others know what they're doing so well that they can slip in and out of systems without anyone ever knowing. 37 2. Ответьте на вопросы по содержанию текста. /Answer the questions./ 1) Who were the founders of Apple Computers? 2) Did they have anything in common with hackers? 3) Who outgrew their malicious behavior and began concentrating on creating computer hardware and software? 4) What another famous hacker was the creator of Linux? 5) Who promoted the concept of free software and computer access? 6) What organizations did Richard Stallman work with? 7) Who became the first juvenile hacker to get sent to prison at the age of 16? 8) How old was Kevin Mitnick when he gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD)? 9) Who was arrested several times for hacking into secure systems, usually to gain access to powerful computer software 10) What did Kevin Poulsen, or Dark Dante, specialize in? 11) How did Adrian Lamo hack into computer systems? 12) Is an accurate count of hackers active online today possible? 3. Найдите в тексте эквиваленты следующих слов и словосочетаний. /Find in the text English equivalents for the following words and word combinations. / 1) создание компьютерных аппаратных средств и программного обеспечения, 2) эпоха персональных компьютеров 3) слишком дорогие и громоздкие 4) концепция программного обеспечения 5) свободное программное обеспечение и компьютерный доступ 6) первый несовершеннолетний хакер 7) несколько раз 8) за взлом систем защиты 9) главный редактор 10 с помощью компьютеров в библиотеках и интернет-кафе.) 11) отправить сообщение 12) Вполне вероятно 13) но точный подсчет невозможен 14) используя опасные инструменты 4. -Закончите следующие предложения, используя текст. /Complete the following sentences, using the text. / 1) Linus Torvalds, creator of Linux, … . 2) On the other end of the spectrum are the black ….. 4) Many hackers don't really know what they are doing - they're just … . 5) He promotes the concept of free … . 38 6) Mitnick was arrested several times for hacking into secure systems, usually to gain … . 5. Составьте предложения из двух, подходящих по смыслу частей. / Connect the sentences 1-7 with those of a-g. 1) In reality, Mitnick was arrested several times for hacking into secure systems, 2) It's likely that there are thousands of hackers active online today, 3) Originally sentenced to house arrest, James was sent to 4) He's famous for hacking the phones of 5) Kevin Poulsen, or Dark Dante, 6) Unfortunately for Lamo, he was doing this on his own time rather than . a)prison when he violated parole. b) but an accurate count is impossible. c)usually to gain access to powerful computer software d) as a paid consultant -- his activities were illegal. e) specialized in hacking phone systems. f) a radio station called KIIS-FM. 6.Вставьте недостающие слова /Insert the correct words. / 1) Linus Torvalds, creator of Linux, is another ______ hacker. 2) Richard Stallman founded the GNU Project, a free _____system. 3) At the age of 16, Jonathan James became ___________ to get sent to prison. 4) Kevin Mitnick allegedly broke into the North _______ Aerospace Defense Command ______ he was 17 years old 5) Adrian Lamo _____into computer systems ______computers at libraries and Internet______. 7. Прочитайте текст и дайте его краткую аннотацию. / Read the text and give its short summary. Kevin Mitnick is the hackers' hero. His latest spell in jail was, a 46-month sentence for fraud relating to breaking into the systems of several multinational corporations. He was released on condition that he did not have any contact with a computer. In March 2000, a Welsh teenager allegedly stole information from more than 39 26,000 credit card accounts across Britain, the US, Japan, Canadaand Thailand, and published the details on the Internet. FBI agents and British police raided the home of Raphael Gray, 18, and arrested him and his friend. He has been charged with 10 counts of downloading unauthorised information. In 1998 Washington revealed that an Israeli hacker called 'The Analyser' was responsible for 'the most organised attempt to penetrate the Pentagon's computer systems'. He turned out to be Ehud Tenenbaum, 18, who had planted a list of his own passwords in the Pentagon system and passed them to other hackers. In 1997 the son of a fraud squad detective walked free from a court in London after charges of breaching the security of the US air force were dropped. Three years earlier Mathew Bevan, then 19, and a friend, Richard Pryce, 16, used the Internet to gain access to several US military bases. Pryce was fined £1,200 after admitting several other offences. Hotmail, Microsoft's free email service, was hacked into last September, exposing the correspondence of more than 40m users. A group calling itself Hackers Unite posted a Web address with details of how to access any Hotmail account. The service was shut down for five hours. The UK Department of Trade and Industry has twice been prey to hackers, once in 1996 and again in 2000 when a DTI computer was programmed to reroute email. The Home Office investigated nine cases of hacking last year, one of which was the leaking of a report on a murder. In August 1996 hackers ran up a £ lm phone bill for Scotland Yard but did not access files. In 1997 hackers got into the Yahoo! website, replacing the homepage with a ransom note demanding the release of their hero, Kevin Mitnick. Unless the demand was met, the note said, a virus would be released in all Yahoo!'s computers. The company dismissed the threat as a hoax, but the 'Free Kevin' slogan continued to appear on other hijacked sites. 8.Переведите на английский язык. /Translate into English. / 1)Некоторые из ранних подвигов Стива Джобса и Стива Возняка напоминали сомнительную деятельность некоторых хакеров. 2)Усилия Стива Джобса и Стива Возняка помогли создать эпоху ПК. 3) Концепция свободного программного обеспечения и компьютерного доступа была выдвинута Ричардом Столлманом. 4) Джеймс Джонатан первоначально был приговорен к домашнему аресту , а затем отправлен в тюрьму. 5) Некоторые хакеры специализируются на взломе телефонных систем. 40 6) Тысячи хакеров, действующих сегодня, не знают, что они делают - они просто используют опасные инструменты, которые они не могут в полной мере понять. 9.Interactive: Organise “Black hats” conferenc Интерактив. 1. Круглый стол 2. What passwords does he suggest for trying to get into a system? 3. What does a firewall do? 4. To prevent hacking, what sort of passwords should you avoid? 5. How could you hack into a system? 6. How could you stop people hacking into a system? 7. Why did people start thinking about computer security? 8. Why do people hack? 9. How risky is credit card use on the Internet? 10. What advice can you give for people intending to use credit cards over the Internet? 11. What is a 'white hat' hacker? 12. What ways do you know for hacking into a system? 13. What terms can you use to describe someone obsessed by computers? 14.What's the problem with using smart cards for Internet purchases? 2. Ролевая игра. / Role play. Work in pairs. Together make up your own questions on these prompts. Then play the parts of the interviewer and a hacker. 1) first interested in hacking 2) reason for being arrested 3) ways to avoid hackers 4) safe ways of paying for Internet shopping 3. Мозговой штурм. .Brain Storm What do you know about hacking and hackers? Дополнительные материалы / Suplementary materials 1. 41 A Read the text and answer these questions. 1 Which hacking case inspired the film War Games? 2 When did Captain Zap hack into the Pentagon? 3 Why was Nicholas Whitely arrested in 1988? 4 How old was the hacker that broke into the US defence computer in 1989? The history of hacking : 1971 - John Draper discovered that a whistle offered in boxes of Cap'n Crunch breakfast cereal perfectly generated the 2,600Hz signal used by the AT&T phone company. He started to make free calls. He was arrested in 1972 but wasn't sent to prison. 1974 - Kevin Mitnick, a legend among hackers, began hacking into banking networks and altering the credit reports of his enemies. He didn't expect that his most famous exploit - hacking into the North American Defense Command in Colorado Springs - would inspire the film War Games in 1983. 1981 - Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into the White House and the Pentagon. 1987 -The IBM international network was paralysed by a hacker's Christmas message. 1988 -The Union Bank of Switzerland almost lost £32 million to hackers. Nicholas Whitely was arrested in connection with virus spreading. 1989 - A fifteen-year-old hacker cracked the US defence computer. 1991 - Kevin Poulsen, known as Dark Dante on the networks, was accused of stealing military files. 2. Кто и зачем пишет вирусы? Возможно, вы получите ответ на эти вопросы, прочитав статью, написанную человеком, который сам принимал непосредственное участие в создании вирусов. Я много раз слышал и читал высказывания разных людей по этому поводу. Практически все из этих высказываний основывались на мнении автора, после общения его с каким-либо вирусописателем. Сейчас же я сам, как 42 вирусописатель и член их общества, попробую раскрыть причины толкающие людей на написание вирусов. Как уже упоминалось, я имел опыт написания вирусов, и не буду рассматривать мотивации остальных людей, а попытаюсь объяснить свою. Она довольно проста: скука, и желание узнать, что можно, а чего нельзя сделать с какой-либо операционной системой. Сейчас операционки на персональных компьютерах меняются довольно быстро, и постоянно обретают новые возможности, такие, как, например, доступ к сети интернет и выполнение полученного из него произвольного кода. Это дает потенциально новую ступень в развитии вирусов и гораздо большую степень наносимого вреда. Немного истории Скука и любознательность - это самые основные, и в тоже время, самые простые причины побуждающие людей писать вирусы. Я думаю с самого начала истории появления вирусов, эти причины не изменились. В моем случае, все было как и множества других, так называемых, хакеров: любознательность и увлеченность технологией. Точкой отсчета стала задача: добавить программу А в тело программы Б таким образом, чтобы программа Б не потеряла своей функциональности. Для этого требовалось серьезное знание системы, под управлением которой работала программа. В то время это был DOS, простая коммандная строка, имевшая серьезные ограничения по возможностям, однако не для серьезных программистов. С течением времени, появлялись версии Windows, которые перестали являться надстройкой над DOS, а предаставляли собой полноценную ОС. Они были более дружелюбны к пользователю, и вирусописателям необходимо было адаптировать свой код для этих систем, и продолжать искать в них возможности нанесения ущерба. Вирусы становились более привлекательные внешне, однако их разрушающий эффект становился больше. Думаю, что именно возможность внести графический аспект в свои вирусы, как часть своей личности, дала авторам возможность персонализировать свои "творения", как например слова William Blake занесенные в Maltese Amoeba. Чем больше интересных вещей добавлялось в вирусы, тем они становились злее по своей сути. Обратите внимание на серию Патогенных вирусов, которые при запуске выдавали Smoke me a kipper I'll be back for breakfast, unfortunately some of your data won't". Это была попытка заставить пользователя помнить, о том как он получил вирус. 43 Вирусы появлялись медленно и являлись, если так можно выразиться, игрой имен. Многие авторы придумывали необычные и странные имена, полагаю для создания атмосферы недоступной таинственности. Она должна была указывать на загадочность и неприступность автора в реальной жизни, чтобы не понести наказания за содеянное. Все это попахивало какой-то мистикой. Написание вирусов быстро стало интересовать множество людей, которые стремились достичь уровня тех, кто способен "повалить" компьютер на другой стороне земного шара парой нажатий клавиш. Однако реальность есть реальность, никакой мистики, вирус - это просто программа. Эта реальность и подняла новую волну кодеров, вдохновленных одной силой: силой безграничного и наиболее ощутимого разрушения. С развитием Windows вирусописатели научились отправлять почту, кодировать файлы, проводить атаки на веб-сервера, обновлять вирусы через интернет или группы новостей, и множеству других возможностей. С тем как офисные программы становились проще и функциональнее, кодеры узанали о том, что можно делать с использованием его макро языка. Оказалось, что вирусы стало писать гораздо быстрее и проще. В тоже время многие предыдущие вирусописатели столкнулись с тем, что их ассемблерный код не работает на новых 32-х разрядных системах, и необходимо новое глубокое изучение системы. Старожилы считают новые способы написания вирусов, с помощью макросов, "ламерством". Однако пользователю все равно каким видом кода, или каким способом его заразили. Он в тонкостях не разбирается. Антивирусные компании постоянно сообщают об обнаружении тысяч новых вирусов - это придает романтики, и желания обойти табу, особенно для молодых людей имеющих свободное время. В конце 90-х такой маленький кусочек макро кода, известный как Melissa, написанный скучающим 33-х летним молодым человеком, словно вихрь пронесся по всему миру заразив миллионы компьютеров, привлекши тем самым внимание федеральных властей к вирусной сцене. Принятие новых жестких законов заставило кого-то из вирусописателей отказаться от этой идеи, кото-то уйти в подполье, однако это их не остановило. В это время появилась новая группа вирусописателей: называемых как "script kiddies". Вдохновленные известностью Meliss'ы они бросились писать новые и модифицировать имеющиеся макровирусы, в надежде стать известными кодерами. Однако имея очень мало опыта и знаний, и стараясь как можно 44 раньше вывалить свое творение в мир, именно они чаще всего становятся добычей властей. Некоторые из таких кодеров, для привлечения к себе внимания, начали давать интервью в средства масс-медиа и по телевидению. Однако в силу того, что они слабо представляли, что такое вирусы по сути, все это выглядело как какая-то игра. Мотивы написания вирусов Рассмотрев немного истории, вернемся в реальность, и попробуем понять, зачем люди пишут вирусы? По моему опыту, скажу, что на это есть несколько причин. Они, естественно, сугубо индивидуальны, что и сказывается в последствии на результате труда. Для удовольствия Это первая и наиболее основная причина. Это может звучать смешно, по сравнению с наносимым ущербом, но автору было просто интересно, что может произойти. Думаю ты не осознаешь проблемы, пока сам с ней не сталкивешься. "Ха-ха! Какой-то чувак в штатах только что потерял весь свой винт! Ну и что, все равно я его не знаю". Поиск известности Вторая причина для написания - это добится того, чтобы твой кусок кода появился на Wildlist, сайте освещающем циркулирующие в даный момент по миру вирусы. Круто ведь ткнуть кого-нить в Wildlist и сказать: "Смотри, чувак! Это я сбацал!" или "Теперь я в натуре монстр!". Она во всей своей красе проявляется у script kiddie с их детским подходом к возможному ущербу. Сюда же можно отнести и "Kit clicker'ов", тех script kiddies которые используют готовые наборы кода для создания вирусов. Широко известный пример, это создание червя Anna Kournikova, с использованием Kalamar kit. Kit кодеры не имеют заний для понятия осуществляемого процесса, ими руководит только одно - получение известности. Эта группа не приветствуется как вирусописателями, так и теми, кто пишет антивирусы. Эксперименты с заготовками на предмет, того что может получится (обычно среди 14 - 18 летних) доставляют только головную боль. Третья группа из этого раздела состоит из тех, кто не ленится идотски шлепать по 20 вирусов из кусков в день, нуждающихся для обнаружения в полном 45 дизасемблировании, разборе и т.д. Хотя именно они и обеспечивают работой антивирусные компании. Обычно народ из этого раздела с радостью дает интервью в любые издания, тем самым портя репутацию серьезных кодеров. Раскрывшиеся серьезные кодеры Эта группа включает в себя более опасных и серьезных кодеров, которые имеют достаточно серьезный опыт в программировании, и могут писать на уровне анти-вирусной индустрии. В созданные вирусы они добавляют процедуры и функции недающие при дизассемблировании получить исходный код. Обычно такие вирусы пишутся для какого-либо исследования, а не для нанесения вреда конечному пользователю. Хотелось бы упомянуть, что доступ к этому коду имеет достаточно ограниченное количество людей, и все из этой же группы, либо этот код становится доступным в сети, как доказательство найденной уязвимости. Они не наносят никому ущерба, а указывают на направление, откуда ущерб может быть нанесен. Рассерженные одиночки Последняя и наиболее опасный тип вирусописателя. Их не интересует какаялибо мораль или закон, и забота о том ущербе, который может понести пострадавший. У каждого из них есть своя персональная цель. Они не относят себя ни к какой группе кодеров, ни в коей мере. Их задача нанести максимальный урон или создать вирус который "даст власть над всем миром". Этих людей нельзя подвести под общие рамки вирусописателей, так как у каждого их них своя мораль и о ней никто не знает. Сейчас к этой группе относится не так много людей. И хорошо, что пока их амбиции не совпадают с их возможностями. Однако, с учетом того, насколько чаще находятся уязвимости в используемом всеми ПО, шанс добится своей цели у них с каждым днем все выше (помните codered?). Увлечение Как уже говорилось, многие вирусописатели делают это из увлечения. У когото есть достаточно свободного времени, которое он проводит за любимым занятием. Это скорее относится к молодым людям, так как у более старшего поколения чаще гораздо больше забот. 46 Их можно сравнить с первой группой, однако чаще они более грамотно программируют, часами смотрят логи на наличие частей пропущенного кода, или раз за разом проверяют работоспособность своих творений под различными ОС (своего рода бета-тестирование). Кодеры часто помогают друг другу советами, делатся информацией, ночами изучают новые вирусы, или придумывают новые идеи (я бы пожалуй отнес себя к этой группе). У этой группы нет как таковой цели: навредить кому-либо, или тупо зацикливаться на одной идее. Чего нам ждать Мир вирусописателей наполненный легендами и мифами, сформированный в сознании людей некомпетентными обозревателями остался далеко в прошлом, и уже не отпугивает народ от покупки нового ПО, и необходимости сохранять свои данные. Общий уровень вирусописателей растет, как знание программирования и распределенных систем. Думаю в ближайшем будущем мы будем часто сталкиваться с аналогами meliss'ы, из-за пассивного отношения пользователей к безопасности, и растущего числа вирусописателей. В принципе, этот вопрос уже решен, он звучит скорее "когда?", а не "если?". Приложение. / Appendix 1. Как составить аннотацию на русском языке. Стиль аннотаций, как правило, имеет безличностный характер. Используйте при работе следующие клише: Статья (текст) посвящена проблеме/ вопросу .../ В начале статьи —речь идет о ...; —дается определение...; —обосновывается значимость ...; —привлекается внимание к ... Далее 47 —описывается...; —рассказывается...; —рассматривается...; —излагается ... В частности, —отмечается, например, ...; —подробно излагается...; —описывается схема...; —указывается ...; —доказывается мысль... Наконец —раскрывается... В заключение —приводятся примеры Подытоживая сказанное, следует отметить... Как мне кажется, статья может представлять интерес для ... Думается, статья может оказаться полезной для ... 2. Как составить аннотацию на английском языке. Для составления аннотации используются следующие клише: 1. The text / article under review ...(gives us a sort of information about...) The article deals with the problem ... The subject of the text is... 2. 48 At the beginning (of the text) the author describes... (dwells on ...; explains...; touches upon...; analyses...; comments ...; characterizes ...; underlines ...; reveals...; gives account of...) The article begins with the description of..,, a review of..., the analysis of... The article opens with ... 3. Then (after that, further on, next) the author passes on to ..., gives a detailed (thorough) analysis (description), goes on to say that ... 4. To finish with, the author describes ... At the end of the article the author draws the conclusion that ...; the author sums it all up (by saying...) In conclusion the author... 3. Как реферировать текст. Writing a summary To summarize the text follow these steps: 1. Read the text again. 2. Underline the relevant information in each paragraph. 3. Make notes about the main points. Leave out details such as examples. 4. Make sentences from the notes and link the sentences with connectors (and, but, because, therefore, etc.). 5. Write your first draft. 6. Improve your first draft by reducing sentences. For example: Cut out unnecessary phrases Macs were designed with one clear aim: to facilitate interaction with the computer. Omit qualifying words (adjectives or modifying adverbs) very complex= complex Transform relative clauses into -ing participle clauses Double-clicking a folder opens a window which contains programs, documents or... Double-clicking a folder opens a window containing programs, documents or... 49 8. Write the final version of your summary. Don't forget to check the spelling and grammar. 4. Как составить план текста. Прочтите внимательно текст. Составьте на английском языке план текста, выделив основные его темы. План можно составить в вопросной, назывной или тезисной форме. Познакомьтесь с образцами планов, представленными после текста; сравните со своим планом. MEMORY It is interesting to note that memory, one of the basic components of the computer, is often called storage. It stores calculation program, the calculation formulae, initial data, intermediate and final results. Therefore, the functions of the computer memory may be classified in the following way. Firstly, the computer memory must store the information transmitted from the input and other devices. Secondly, memory should produce the information needed for the computation process to all other devices of the computer. Generally, memory consists of two main parts called the main, primary or internal, memory and the secondary or external memory. The advantage of the primary memory is an extremely high speed. The secondary memory has a comparatively low speed, but it is capable of storing far greater amount of information than the main memory. The primary storage takes a direct part in the computational process. The secondary storage provides the information necessary for a single step in the sequence of computation steps. The most important performance characteristics of a storage unit are speed, capacity and reliability. Its speed is measured in cycle time. Its capacity is measured by the number of machine words or binary digits. Its reliability is measured by the number of failures (отказ) per unit of time. План в вопросной форме. 1. What is memory? 2. What is the function of memory? 3. What are the main parts of memory? 4. What are advantages and disadvantages of a storage unit? 5. What are their functions? 50 6. What are performance characteristics of the main and secondary memory? 7. What units are performance characteristics measured by? План в назывной форме 1. The definition of memory. 2. The main functions of memory. 3. Classification of memory. 4. Advantages and disadvantages of memory components. 5. The functions of memory components. 6. Performance characteristics of memory. 7. The units for measuring the performance characteristics of memory. План в тезисной форме. 1. Memory is one of the basic components of the computer. 2. Memory stores initial data, intermediate and final results. 3. It produces the information needed to other devices of the computer. 4. Memory consists of the main (internal) and the secondary (external) storage. 5. The main memory has high speed, but small capacity; the secondary memory possesses lower speed but greater capacity. 6. The main memory performs computation; the secondary memory provides information sequentially, step by step. 7. The performance characteristics — speed, capacity and reliability — are measured by cycles, binary digits and the number of failures per unit of time. 51 Литература: 1. Santiago Remacha Eteras Infotech. English for computer users. Cambridge. Universal Press2009 2. Oxford English for Information Technology, Eric H. Glendinning, John MacEvan 3. Dinos Demetriades Information Technology Oxford 4. Professional English in use for computers and Internet. Cambridge. 5. John Marks Computers and Information Technology. 6. Е. В. Гольцова, Английский для пользователей ПК и программистов. Санкт-Петербург, 2002г. 7. Радовель В. А. Основы компьютерной грамотности. Ростов н/Д: Феникс, 2006. — 224 с. 8. Wikipedia - en.wikipedia.org›Information security 9. Tech Target Search Security - http://searchsecurity.techtarget.com 10.: http://hack.com.ua 52