-
Text1 How do computer hackers
“
get
inside
”
a computer
Abstract
:
Computer
vulnerabilities are often utilized
by
hackers or crackers.
The
security of each computer is
challenging. This paper firstly redefines the term
“
hacker
”
,
“
cracker
”
and
“
getting
inside
”
the computers and
describes the
procedure in detail. The
term
“
unauthorized
user
”
(UU) will be a better
choice
for
defining
the
insider
group.
The
known
and
unknown
vulnerabilities
will
be
taken
advantage of by UUs ranging from poor
password protection to leaving a computer
turned on and physically accessible to
visitors in the office. The first step of
employing
technical
exploits
will
be
the
determination
of
the
specifications
of
the
target
system.
There
are
two
ways
of
attacking
including
being
through
capabilities
inherent in
hypertext transfer protocol (http) and being
preprogrammed against
specific
vulnerabilities
and
launched
without
any
specific
target.
The
variability
of hacking
action including the weak system and the strong
system warns the users
to choose the
right way to protect the computer and do not
authorize the computer
to
others
easily.
Lastly,
the
solution
of
avoiding
vulnerabilities
has
been
given,
including
updating
patches,
making
complex
passwords,
getting
information
only
from
the
reliable
websites
or
services,
updating
anti-virus
software
and
backing
up
the
data to protect the computer not being
hacked.
Text 3 Advantages of Cloud
computing
Abstract
:
Cloud
of
computing
is
allowing
you
to
use
services
that
include
infrastructure
applications,
and
storage
space
for
a
nominal
fee.
It
should
be
able
to quickly allot and
relieve resources whenever required by clients and
cater to
the
needs
of
clients
without
having
to
involve
clients
into
management
of
the
service
and have real- time backup to offer
maximum up time clients. The type of cloud
services includes software as a
service, platform as a service, infrastructure as
a
service
.The
advantages
of
cloud
computing
under
green
computing
include
reducing
the
consumption
of
electricity
while
also
reducing
emissions
that
damage
the
environment
,saving
the
environment
while
also
saving
on
the
expenses
incurred
due
to
a
demand
for
expansion
,and
allowing
you
to
let
you
employees
telecommute.
Then,
here is a summary about the advantages
of cloud computing: remote accessibility,
easy expansion, security and
environmentally friendly.
Text5 Can
You Compete with A.I. for the Next Job?
Abstract:
With the
development of social and technology, Artificial
intelligence
may
replace
human
jobs
in
the
future.
There
are
a
lot
of
news
that
reported
artificial
intelligence
has
play
a
important
role
in
our
life.
For
decades,
People
wrote
about
how
machines
replace
humans.
It
will
be
better
or
ill.
But
all
expected
did
not
come.
Around
the
time
of
the
Revolution,
Most
of
Americans
worked
in
the
farm.
They
farmed
to keep themselves alive. With the
development of traffic, Farming increasingly
became
a cash business.
But as the agricultural
industry grew, there
are
fewer and
fewer
workers
who
worked
at
farming
and
ranching.
Today
agricultural
provides
fewer
than two million jobs.
Because of automation happened. It brings better
plows,
-
-
-
-
-
-
-
-
-
上一篇:国标图集目录
下一篇:星火2013专四满分听力模拟题5