Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.

  Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”

   Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.

  Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”

   The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.

Thieves are trying to get access to your computer in order to      .

  A. find your personal information

  B. see how your computer is working

  C. talk with you

  D. help you with your system

Why did Beth Pope use peer-to-peer software?

  A. Because she wanted others to use her information.

  B. Because she wanted to try it.

  C. Because she wanted to increase her music library.

  D. Because she wanted to get others' financial information.

Susan Koeppen tried to       .

  A. warn the readers of dangers of sharing music files with others.

  B. warn the readers not to share music files with others.

  C. tell us a true and funny story

  D. advertise the peer-to-peer networks.

From the passage we get to know       .

  A. we shouldn't believe others.

  B. computers make our life easy and comfortable.

  C. softwares help us to share music with others

  D. everything has two sides, the good side and the bad one

The Internet has led to a huge increase in credit-card fraud. Your card information could even be for sale in an illegal Web site. Web sites offering cheap goods and services should be regarded with care. On-line shoppers who enter their credit-card information may never receive the goods they thought they bought.

The thieves then go shopping with your card number or sell the information over the Internet.

Computers hackers have broken down security systems, raising questions about the safety of cardholder information. Several months ago, 25 000 customers of CD Universe, an on-line music retailer(批发商), were not lucky. Their names, addresses and credit-card numbers were posted on a Web site after the retailer refused to pay US $157 828 to get back the information.

Credit-card firms are now fighting against on-line fraud. Master card is working on plans for Web-only credit card, with a lower credit limit. The card could be used only for shopping on-line.

However, there are a few simple steps you can take to keep from being cheated.

Ask about your credit-card firm’s on-line rules: Under British law, cardholders are responsible for the first US $78 of any fraudulent spending.

And shop only at secure sites: Send your credit-card information only if the Web site offers advanced secure system.

If the security is in place, a letter will appear in the bottom right-hand corner of your screen. the Web site address may also start with https://-- the extra “s” stands for secure. If in doubt, give your credit-card information over the telephone.

Keep your password safe: Most online sites require a user name and password before placing an order. Treat your passwords with care.

What do most people worry about the Internet according to this passage?

A. A lot of stolen credit-cards were sold on the Internet.     B. Fraud on the Internet.

C. Many Web sites are destroyed.                D. Many illegal Web sites are on the Internet.

What is the meaning of “fraud”?

A. cheating           B. sale            C. payment                     D. safety

How can the thieves get the information of the credit-card?

A. The customers give them the information. B. The thieves steal the information from Web sites.

C. The customers sell the information to them. D. Both A and B.

How many pieces of advice does the passage give to you?

A. Four.      B. Three.         C. Five.         D. Six.

You are shopping on the site: http: //www. shopping. com, and you want to buy a TV set, what does this article suggest doing?

A. Order the TV set at once.        B. Do not buy the TV set on this site.

C. E-mail the site your credit-card information.

D. Tell the site your password and buy the TV set for you.

In 1985 a France television company sent its reporters to the Paris Metro(地铁).They took ___21___ to see what passengers would do if they saw someone ___22___ on the platform or trains.The incidents looked ___23___ and they were all done with the help of actors.However, very ___24___ people tried to help, and most passengers ___25___ not to notice.In one of the ___26___, a foreigner was attacked by three men.The attack was on a ___27___ which was quite full, and although the man tried to get ___28___ passengers to help, they all refused.This is not only a French ___29___.A British newspaper reported in 1991 that a professor of Social Psychology in New York had ___30___ his students out to rob their own cars.The students didn’t try to ___31___ what they were doing.About 80 people ___32___ 250 car thefts, and only twelve of them tried to ___33___ the student robbers.In a typical incident, one man stopped, looked, and then put his hands over his ___34___ and shouted “I didn’t see that!” About forty people ___35___ to help the thieves, and two people ___36___ sat down next to the car and ___37___ to buy a camera and a television set a student was ___38___ from the back seat of his own car.The professor ___39___ whether it is a problem of big cities or would be the ___40___ thing as happens anywhere.

1.A.notes              B.trains           C.cameras          D.newspapers

2.A.attacked           B.stolen           C .wounded         D.struck

3.A.great              B.real             C.serious          D.terrible

4.A.many               B.old              C.few              D.large

5.A.pretended          B.seemed           C.managed          D.asked

6.A.passengers         B.actors           C.accidents        D.incidents

7.A.plane              B.train            C.truck            D.bus

8.A.another    B.all  C.more             D.the other

9.A.situation          B.agreement        C.problem          D.accident

10.A.brought           B.sent             C.took             D.put

11.A.expose            B.hide             C.tell             D.find

12.A.watched    B.discovered              C.found            D.realized

13.A.help              B.refuse           C.stop             D.report

14.A.face              B.head             C.eyes             D.ears

15.A.expected          B.offered          C.hated            D.liked

16.A.bravely           B.surely           C.actually         D.certainly

17.A.wanted            B.loved            C.needed           D.waited

18.A.sending           B.taking           C.offering         D.robbing

19.A.knows             B.wonders          C.learns           D.asks

20.A.former        B.different        C.same             D.small

 

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网