01-04-2020-Oxford_English_for_Infomation_Technology (1171844), страница 35
Текст из файла (страница 35)
ask you to ... log on and type anID and password. You might at thesimplest level try typing in 'guest' or'demo' or 'help' and see what it givesyou.I How can you avoid being hacked into?R There's a lot you can do but you haveto keep at it to keep ahead of thehackers. Erm, you can install firewallsto restrict access to a network. You canhave a callback system to make sureremote clients are who they say theyare.
Having really secure passwordshelps. Don't use a common name or adictionary word or anything short.Check the system regularly using eventlogs to find failed access attempts.PART 2I How did you get into this business inthe first place? Were you a computergeek at school?R I was a computer geek, a younganorak. I got into computers at school.I discovered that what the computersin the lab would let me see dependedon what password I typed in and that'sreally where I started thinking aboutsecurity.I And how did you manage to get intothe American company's files?R I guessed some passwords and so onand because of various very sillymistakes the operators of the systemmade I managed to get right into thesystem at the highest level.I And managed to get into the CEO'spersonal files.R Yes, what happened there was I gotinto part of the system that said'Please enter your ID' and thenunderneath that on the same screentold you what the ID was.
It was themost senior ID on the system so Ityped it in. It said 'You're logged on assystems manager what would you liketo do?' And I said, I'll have somepasswords please. And because I waslogged on at the highest level it said'Whose do you want?' And I said 'TheCEO' because there was an account onthe system in his name.
And it gave itto me.I Did you feel terribly excited?R Yes, absolutely. People sometimeshack for money, for criminal purposesor for political purposes ... they wantto expose something. But often youhack because you're challenged.Because it's exciting. It is a very bigchallenge for a couple of 18-year-oldsworking on a basic PC to link directlyto a very powerful machine thatthey've completely penetrated. It wasgreat fun and it's a wonderful feelingand that's why we did it.We never thought about the legalside of it. My parents knew that thephone bill was horrendous and that Ispent an awful lot of time in myLISTENING SCRIPTbedroom on the computer but theydidn't know quite what I was doing.I How did they track you down?R Well, because we never really tried tocover our tracks.
We would boast toour friends, we would boast to girls.That got us known to the police andthe computer crime unit. They arrestedus. The guy who arrested us, thedetective inspector, I'm now quitefriendly with. I see him at computerconferences all over the world. But Imet him first when he knocked at mydoor and took away the contents of mybedroom in black plastic bags.I Now you're helping companies to avoidpeople like you.R Yes, if you want to protect yoursystems it's a good idea to talk topeople like myself rather than big cityconsultants...
because I know theways in which I would try to break intoyour system.I Do you hackers know each other? Isthere a competitive element to all this?Is there a kind of rivalry?R I think in the beginning people did. Er,they would ... sit round ... talking abouthacking and sharing passwords butnowadays because of the Internet...hackers are all over the world and theytend not to know each other and youtend not, because it's so illegal nowand so many people are scared of it,people tend not to want to be known.There is rivalry. Everyone wants tobe the first to hack into a reallypowerful system.
The Pentagon getssomething like 200 attempts a day tobreak into their systems.I Movies sometimes feature hackers.R I don't go much for the Hollywood ...hacker. They show hackers coming intoyour system via the Internet andstealing all your data. That's notgenerally what happens. In realityabout 75% of all hacks into companycomputers are done by current staffwho are simply misusing the privilegesyou've given them ...I A recent survey found that four out often UK consumers are reluctant to usecredit cards for Internet purchases.How risky is it really?R Some people are nervous about givingtheir credit card number on theInternet.
We've seen in the press,partly due to hackers, partly due to theincompetence of people who arerunning websites, that you can getdatabases of credit card numbers. Butusually it's the retailers, not thebuyers, who get done by people usingfake or stolen cards.Using your credit card on theInternet is no more dangerous thangiving your credit card number downthe phone or paying at thesupermarket with a credit card,throwing the receipt away wheresomebody can pick it up and thenthey've got your credit card numberand a copy of your signature.
TheInternet is not as dangerous as that.My advice is, if you want to buythings on the Internet, get a separatecredit card. Ask for a small limit. Thenif it gets misused, you've cut yourlosses. You can buy a pre-paid chargecard for small purchases. Long term,smart cards are probably the answerbut you would need a reader on yourPC.UNIT 21Software EngineeringAnalyst If I could find out what you do atpresent. What kind of system do youhave at the moment?Hotel owner Well, we introduced erm acomputerised system about five yearsago but I'm not very happy with it.What we've got is erm, just a systemthat allows us to enter bookings asthey come in.A So is everything computerised or...
?H No, it's only the reservations system.A So what features would you like to addto this?H Well, there are a number of things. Iwould like a more sophisticatedsystem that would allow me to linkreservations and invoicing. I'd like thesystem to handle invoices also.A OK. Now the output. What kind ofoutput are you looking for from this?G Erm, well there are a number of thingsI'd like. One is of course the totalinvoice, a bill for the guests. I'd like italso to display room bookings so thatif someone phones up it's easy for thereception staff to identify quicklywhich rooms are occupied and whichare available.A Is that on the screen?H Yes, I would like it to be on the screenif possible. A sort of room chart on thescreen.A And the invoices, is it pre-printedforms you use?H Would pre-printed forms be useful?A Well, if you have a coloured logo, it'sbetter to have the forms pre-printed.H Yes, I'd like that.
And of course I wantthe invoice to have details of allexpenditure so if the guest has a drink201at the bar, extra meals at therestaurant, anything of that nature, it'sall detailed. I'd also like the system togenerate lists of previous guests so Ican send them news of special offers.A Has the system to print out addressedenvelopes?H If it could, that would be very useful.A Now, who's going to be inputting theinformation?H Right, the main users would be thereception staff. They would be dealingwith bookings, largely by phone butsome by fax or letter.
The accountant,of course, would be using the systemto create bills. And, erm, bar andrestaurant staff would have to entersales.A Are the staff experienced in usingcomputers or would they need a lot oftraining?H Reception staff are quite experienced,however, our accountant would needsome training as she's used to a papersystem.A What about the bar and restaurantstaff?H Well, I suppose they would be enteringonly very restricted information onsales.A Hm. What computer hardware do youhave at the moment?H Er, we've got one PC at reception andone in the office.
What would I need?A One for the accountant, one in the barand restaurant. And they would haveto be networked.H If they're networked together, thatdoesn't mean that people can get intothe accounts, does it?A No, it would be password-protected.And the printers?H I don't want anything too noisy.A Laser printers tend to be quieter. Now,it would be useful to talk to thereceptionist to get details of the inputfor the guest records and to theaccountant to find out what she needs.H Great, I'll set up meetings for you.What's the next step?A I'll come back to you with a plan andwe'll check through to make sure it hasall the features you want.
Then we'llcreate a program and try it out. We'llhave to keep adapting it dependinghow well it works. And once you'rehappy with it, we'll put it into serviceand I'll fix some training for the staff.H Thanks very much.202LISTENING SCRIPTUNIT 24The Future of ITSpeaker A To recreate humanintelligence we need speed, we needmemory capacity to match the humanbrain and we need the right hardware.We'll have all this by 2020 but thesethings aren't enough. We also need tocapture the complexity, range andrichness of human intelligence. That'smore difficult... but we will do it.
Andwe'll do it by reverse engineering ofthe human brain. What I mean is thatwe'll explore the human brain from theinside and find out how it works, howit's connected, how it's wired up. We'realready well on the way to this. Withbrain scanning we can see inside thebrain. But by 2030 we'll have anotherinstrument for exploring the brain.We'll be able to send tiny scanningrobots along blood vessels to map thebrain from the inside. This will give usall the data on how the brain isconnected and all the features whichenable it to perform as it does.