Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

       As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

       When you type in a password ,it is stored in random access memory(RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

       But every so often ,the computer copies the contents of its RAM onto hard disk ,where it is easy prey for a hacker ,who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM ,the more likely it is to be copied onto the disk ,where it stays until it is overwritten—which might not happen for years.

       Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next ,Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer ,the Windows login script and Apache server software.

       In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained .Some of the tested software even copied the sensitive information ,apparently without restraint.

       This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

1.Which of the following statements is true according to the passage?

       A.It is secure to use your password as long as you hit the Return key.

       B.Your personal details is likely to be in danger if you spend more time on the web.

       C.Your password will be safe if you have some safeguards.

       D.Never allowing your computer to store your passwords will be safe.

2.Which of the following is NOT the reason for the unsafely of a password?

       A.It will be stored in RAM.

       B.It will be copied onto hard disk.

       C.It might not be overwritten.

       D.It will disappear as soon as you hit the return key.

3.Tal Garfinkel and his team measured the extent of security of        .

       A.simulating the working of a complete computer system

       B.tagging sensitive data

       C.passing through the system

       D.running common software

4.What can be inferred from the passage?

       A.The length of the time the information is stored is not limited.

       B.The programs can not retain the information.

       C.The security problem should be paid more attention to.

       D.Some sensitive information has been copied.

此题要求改正所给短文中的错误。对标有题号的每一行作出判断:如无错误,在该行右边横线上画一个勾(√);如有错误(每行只有一个错误),则按下列情况改正:

此行多一个词:把多余的词用斜线(\)划掉,在该行右边横线上写出该词,并也用斜线划掉。

此行缺一个词:在缺词处加一个漏字符号(∧),在该行右边横线上写出该加的词。

此行错一个词:在错的词下划一横线,在该行右边横线上写出改正后的词。

注意:原行没有错的不要改。

       Up until I was about 10 years old, I was the same as

everyone else in my class . I used to climb on trees ,swim and                1.______________

play football .In fact , I was used to dream about one day being                 2._______________

famous football player and representing my country in the                   3.____      _____

World Cup .Then I start to get weaker and weaker .Some days.               4._______________

I was too tired to get out of bed .I went into hospital for tests.                   5._______________

I stayed there for nearly three months and missed a lot of schools.            6._______________

I think I had at least a billion tests while I was there ,included                    7._______________

one which they cut out a piece of muscle from my leg and looked              8._______________

at it under a microscope . Only after all the tests ,no one could give            9._______________

my disease a name , so it is difficulty to know what the future will be like.      10._______________

 0  33651  33659  33665  33669  33675  33677  33681  33687  33689  33695  33701  33705  33707  33711  33717  33719  33725  33729  33731  33735  33737  33741  33743  33745  33746  33747  33749  33750  33751  33753  33755  33759  33761  33765  33767  33771  33777  33779  33785  33789  33791  33795  33801  33807  33809  33815  33819  33821  33827  33831  33837  33845  151629 

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网