-
A
Flying pod
evolution
automobiles
predecessors
Travel on land
water and snow
fly
portable wing.
Fishing or hunting
15 kilometers
stay still
30-horsepower
motor
160 kilometers
80
450 kilometers
Marketing campaign
back
light aircraft
B
A
golf
course
named
Fox
Hollow,
which
has
won
an
award
for
its
relatively low impact on environment
and sustainable wildlife.
Golf courses and the environment have
historically been at odds. It’s
hard
to
reconcile
the
careful
grooming
and
excessive
water
needed
for
greens and fairways with conservation
and natural habitats. One
case in
point,
Lakewood’s
Fox
Hollow
Golf
Course
had
its
construction
temporarily
halted so some killdeer eggs can hatch. A pair of
retail hawks
were also born during the
construction of Fox Hollow. However, the golf
course
has
recently
won
an
award
for
its
relatively
low
impact
an
sustained
wildlife.
The
Golf
Course
Superintendents
of
America
say
Lakewood’s
27
-hole
Fox
Hollow
course
blends
well
with
Bear
Creek
Lake’s
grasslands, and the land still hosts foxes, deer,
great horned owls,
blue
herons,
coyotes,
and
other
wildlife.
Only
three
Environmental
Steward A
wards are given out
each year, so Lakewook officials are pretty
excited about helping set the standard
for golf courses with a soft touch.
C:
C1: F
F
T
F
T
C2:
1999
old school
friends
2005
12
million
School
college
university
a
list
of
the
members
personal profile
other people’s details
Lives
about yourself
your self-esteem
School reunions
childhood sweethearts
relationships
Have you ever
wondered what
your old schoolmates are doing now?
well, plenty of people in Britain do.
One of the most successful Internet
ventures in Britain has shown how
popular, and how lucrative, nostalgia
can be.
The website Friends Reunited was
started for fun in 1999 by a couple
who
were
interested to know what their old
school friends were doing.
The
project
snowballed
and by
2005,
the
site
had
12
million
members.
One extraordinary fact is that Friends
Reunited has never advertised, its
success is entirely due to word-of-
mouth.
Y
ou can search for a school,
college or university and find a list of the
members who were there in any year.
Y
ou can also post a personal profile
showing what you are doing now, and
read other people’s details.
Steve
Pankhurst, one of the founders of the site, thinks
that one of the
reasons
for
its
success
is
that
some
people
like
to
be
anonymous.
On
Friends Reunited, you ca
n
snoop on other people’s lives without giving
away
anything
about
yourself
if
you
don’t
want
to.
It’s
also
an
opportunity to bolster
your self-esteem by showing off to everyone
just
how successful and
happy you are now, even
if
you weren’t while you
were
at school.
Friends Reunited has also led to many
successful school reunions, and
people
meeting up with each other after many years. In
particular, many
people
use
the
site
to
look
up
their
childhood
sweethearts
and
many
couples
have actually rekindled relationships after
contacting each other
through the site.
There
have
even
been
Friends
Reunited
weddings
and
babies,
and
Friends
Reunited
now
has
a
new
site
called
Friends
Reunited
Dating
especially
for
people
who
are
looking
for
love.
The
company
has
also
launched
other sites, such as Genes Reunited, which helps
people to find
long-lost relatives and
build their family tress online.
So, whether you want to be nosy,
contact old friends, organize a school
reunion,
find
your
first
love,
or
simply
show
off
you
success,
Friends
Reunited is the site to visit.
D Beware hackers!
1. 75%
2. Juveniles, usually
in their late teens to early twenties
3. They do it as a challenge.
4. A former hacker, now a security
consultant
5. To fight the holes in the
firewall -- the protection device between
different security systems
6. Because they can bring expertise
that only hackers understand, a
holistic perception of computer systems
7. Because they are so in-depth within
a system.
8. 90% or 95% effectiveness
is better than not having anything at all.
9. A good security policy will protect
you from an employment level up
to a
system administration level.
Tapescript:
H --
Holmes T -- Teresa B -- Bevan
H: Let's
talk about how widespread the problem is. Many
people think the
number of companies or
government agencies whose security is breached
is small. Is that the case or not?
T: No, I think anybody who has
information online ... it's gonna be a huge
concern for anybody
. Mostly
because if you've got information on these
websites, anybody can actually get into
them. The thing that you need to
know
is how to be careful. It's kind of like think of
it as a security system
in a building,
let's say. If you have a security guard
in the front, you're
protected in that
area. Y
ou need to do that all around
the entire circle, let's
say,
to
make
sure
that
your
entire
information
on
these
websites
is
completely protected.
H:
I
...
I
read
a
statistic
that
said
that
something
like
75
percent
of
companies online have been hacked,
whether they know it or not. Is... is
that ... That's huge.
T:
That is huge. And, in fact, it can be minor to
major. Most of them are
usually on the
minor scale -- that being, some information
getting in. And
at this point in time,
a lot of experts are saying that the hackers that
are
going
into
these
sites
are
juveniles,
usually
in
their
late
teens
to
early
twenties. And most times, they're
really just doing things as a challenge,
as a way to get in, because it's
something that they can do.
H: Now,
Mathew Bevan, who's a ... who's a former hacker,
who became a
security consultant. Now
... now, tell us about that. This happens a lot?
T: This ... right now, this is
happening a lot. Mostly because these hackers
that are young, juvenile children, or
teens, as we have said, really know
the
industry. They know the computer so well, even
more so than a lot of
the
security,
you
know,
computer
systems
that
are
already
in
place.
They've
really
become
kind
of
an
asset, or
they
could
be
a
consultant,
as ... as Mathew is,
because they really know how they've got into
them.
And
these
are
the
people
that
a
lot
of
corporations
can
actually
use,
because
what
they're
doing
is
they're
fighting
the
holes
in
the
firewalls
which
are
the
protection
device
between
the
different
security
systems
-and they're really
kinda getting into the loopholes or the niches
there. By
doing that this is great
information that companies can use, because they
may
know,
that ... part of
that ... our
website
is
not,
you
know,
protected.
H. Y
ou
were a hacker. And how important is that for you
in your current
job, which is as a
consultant for companies who fear hackers?
B. Well, in my current job, what I can
do is bring expertise that perhaps
only
hackers
will
actually
understand.
It's
kind
of
a
perception
of
computer
systems, sort
of
a
holistic
overview.
And
sometimes
you
get
people who come from perhaps a sales
background, and they move into
IT in a
company, or, you know, they.., they may
just be programmers...
turned security experts. I'm not
diminishing the expertise that they have,
but
sometimes
there
are
very
tiny
things
that
they
can
overlook,
just
because they're so in-depth within a
system.