为您找到与如何防止黑客相关的共5个结果:
下面是读文网小编整理的新型黑客工具威胁Wi-Fi用户安全,供广大学者参考。
You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents’ basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online.
也许你曾以为窥探你上网活动的事只有政府情报人员或者藏在自家地下室的青年黑客才会干的出来。但一些简单的软件使得哪怕是小咖啡馆里在你身边的任何人都可以看到你在浏览的网页甚至获得你的身份验证信息。
“Like it or not, we are now living in a cyberpunk novel,” said Darren Kitchen, a systems administrator for an aerospace company in Richmond, Calif., and the host of Hak5, a video podcast about computer hacking and security. “When people find out how trivial and easy it is to see and even modify what you do online, they are shocked.”
达伦·凯臣是美国加州里士满市的一家航空公司的系统管理员,同时他还是一家名为Hak5的计算机黑客与信息安全视频播客网站的站长。他说,“不管你喜欢与否,我们现在正生活在一个数字庞克小说之中。当人们发现他们的网上信息是多么容易被黑时,他们都会目瞪口呆。”
Until recently, only determined and knowledgeable hackers with fancy tools and lots of time on their hands could spy while you used your laptop or smartphone at Wi-Fi hot spots. But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.
不久前若要监视你的笔记本或智能手机通过Wi-Fi热点上网的情况,这还只是有能力和有毅力的黑客,花费大量时间并利用高精尖的工具才能办到的事。但去年十月发布的一款叫做Firesheep的自由程序使得监测未加密的Wi-Fi网络变得易如反掌,利用该软件人们可以监测别人上网信息乃至登录他人访问的网站帐户。
Without issuing any warnings of the possible threat, Web site administrators have since been scrambling to provide added protections.
在没有发布任何潜在安全威胁警告的情况下,网站管理员已经争先恐后的开始提供附加安全保护措施了。
“I released Firesheep to show that a core and widespread issue in Web site security is being ignored,” said Eric Butler, a freelance software developer in Seattle who created the program. “It points out the lack of end-to-end encryption.”
Firesheep的作者是西雅图的自由软件开发者埃里克巴·特勒,他表示:“我发布Firesheep就是为了让大家知道在网站安全上一个普遍的核心问题一直以来都被大家忽略了,那就是端到端的加密。”
What he means is that while the password you initially enter on Web sites like Facebook, Twitter, Flickr, Amazon, eBay and The New York Times is encrypted, the Web browser’s cookie, a bit of code that that identifies your computer, your settings on the site or other private information, is often not encrypted. Firesheep grabs that cookie, allowing nosy or malicious users to, in essence, be you on the site and have full access to your account.
当你在Facebook、Twitter、Flickr、Amzon、eBay和纽约时报之类的网站上初次输入登录密码时,端到端信息被加密。但当使用cookie登录时,常常是不进行加密的。Cookie是对记录你的登录信息、个人访问设置及某些私人信息的一段代码的称呼。Firesheep就设法抓取这些cookie,这样就可以使任何心存好奇或别有用心的用户干脆变成你,从网站上登录你的帐号。
More than a million people have downloaded the program in the last three months (including this reporter, who is not exactly a computer genius). And it is easy to use.
在过去三个月内超过一百万人已下载了该程序(包括对计算机并不在行的笔者在内)。它真的很简单易用。
The only sites that are safe from snoopers are those that employ the cryptographic protocol Transport Layer Security or its predecessor, Secure Sockets Layer, throughout your session. PayPal and many banks do this, but a startling number of sites that people trust to safeguard their privacy do not. You know you are shielded from prying eyes if a little lock appears in the corner of your browser or the Web address starts with “https” rather than “
唯一安全的网站就是那些在整个会话过程中使用传输层加密协议或其前身SSL的网站。PayPal和许多银行做了这样的设定。但仍有一批数量惊人的网站没有这么做,而通常人们却一直相信它们能够保护其私人信息。当你的浏览器的一角出现一个小小的锁形图标或者你所访问的网址前以“https”而不是“http”开头时,你才能躲过那些窥视的眼睛。
“The usual reason Web sites give for not encrypting all communication is that it will slow down the site and would be a huge engineering expense,” said Chris Palmer, technology director at the Electronic Frontier Foundation, an electronic rights advocacy group based in San Francisco. “Yes, there are operational hurdles, but they are solvable.”
电子前哨基金会是一家总部位于旧金山的数字版权维权组织,它的技术总监克利斯·帕尔默说:“网站不提供全程通信加密的理由通常是,这会拖慢站点访问速度并造成巨大的工程开销。要提供全程通信机密的确有一些操作上的障碍,但这些困难都是可以解决的。”#p#分页标题#e#
Indeed, Gmail made end-to-end encryption its default mode in January 2010. Facebook began to offer the same protection as an opt-in security feature last month, though it is so far available only to a small percentage of users and has limitations. For example, it doesn’t work with many third-party applications.
实际上,Gmail已于2010年一月起在其默认模式中采用了端到端加密技术。上个月,Facebook也开始将同样的保护措施作为一项可选择的安全功能提供给用户,但目前仍只限于一小部分用户应用。例如,它并不适用于许多第三方应用。
“It’s worth noting that Facebook took this step, but it’s too early to congratulate them,” said Mr. Butler, who is frustrated that “https” is not the site’s default setting. “Most people aren’t going to know about it or won’t think it’s important or won’t want to use it when they find out that it disables major applications.”
“Facebook这么做并不值得,现在就为他们的成功祝贺也为时尚早。大多数人并不会了解这项保护措施,或者并不会认为这有多重要,或者由于这对于大多数第三方应用无效而不会使用它。”巴特勒先生如是说,他仍觉得“https”访问并不是网站的默认访问设置乃是一件憾事。
Joe Sullivan, chief security officer at Facebook, said the company was engaged in a “deliberative rollout process,” to access and address any unforeseen difficulties. “We hope to have it available for all users in the next several weeks,” he said, adding that the company was also working to address problems with third-party applications and to make “https” the default setting.
Facebook的信息安全总监乔·沙利文表示,他们正着手准备一个“慎重的发布过程”,以发现并克服所有潜在的困难。他说,“我们希望在几周后这项安全措施能适用于所有用户。”此外他还补充说,公司正在努力解决第三方应用方面的安全问题并力促“https”访问方式成为默认设置。
Many Web sites offer some support for encryption via “https,” but they make it difficult to use. To address these problems, the Electronic Frontier Foundation in collaboration with the Tor Project, another group concerned with Internet privacy, released in June an add-on to the browser Firefox, called Https Everywhere. The extension, which can be downloaded at eff.org/https-everywhere, makes “https” the stubbornly unchangeable default on all sites that support it.
许多网站通过“https”提供加密服务,但这用起来并不方便。为解决这个问题,电子前哨基金会联合Tor项目组(另一个互联网隐私相关组织)于去年六月发布了一款名为Https Everywhere(Https无处不在)的火狐浏览器插件。该插件(可由eff.org/https-everywhere下载)强制通过https方式访问所有支持该访问服务的网站。
Since not all Web sites have “https” capability, Bill Pennington, chief strategy officer with the Web site risk management firm WhiteHat Security in Santa Clara, Calif., said: “I tell people that if you’re doing things with sensitive data, don’t do it at a Wi-Fi hot spot. Do it at home.”
由于并非所有网站都能提供“https”访问支持,白帽安全公司(美国加州圣克拉拉的网络风险管理公司)的首席策略官比尔·潘宁顿告戒大众:“如果你要进行涉及敏感信息的操作,不要通过Wi-Fi来做,还是回家再弄吧。”
But home wireless networks may not be all that safe either, because of free and widely available Wi-Fi cracking programs like Gerix WiFi Cracker, Aircrack-ng and Wifite. The programs work by faking legitimate user activity to collect a series of so-called weak keys or clues to the password. The process is wholly automated, said Mr. Kitchen at Hak5, allowing even techno-ignoramuses to recover a wireless router’s password in a matter of seconds. “I’ve yet to find a WEP-protected network not susceptible to this kind of attack,” Mr. Kitchen said.
但家里的无线网络也并不一定能确保安全,因为Gerix WiFi Cracker、Aircrack-ng 和Wifite之类的自由Wi-Fi黑客程序正被广泛使用着。此类软件仿冒合法用户的活动以窃取一系列所谓弱密匙或者可能透露户密码的蛛丝马迹。这个过程完全是自动的,凯臣在Hak5上说,这使得哪怕是一个技术白痴都能在几秒钟内获得一个无线路由器的密码。他还说:“我还没有发现哪个采用WEP保护的网络能够对这种攻击免疫。”
A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it’s best to use a WPA password instead. Even so, hackers can use the same free software programs to get on WPA password-protected networks as well. It just takes much longer (think weeks) and more computer expertise.
WEP(有线等效保密)密码并不如WPA(Wi-Fi接入保护)密码强大,所以使用WPA密码方为上策。但即便如此,黑客们也还是可以用同样的软件得到采用WPA密码保护的网络的密码信息。这只是需要花上更长的时间(大概是几周),当然也需要更多的计算机专业知识。
Using such programs along with high-powered Wi-Fi antennas that cost less than $90, hackers can pull in signals from home networks two to three miles away. There are also some computerized cracking devices with built-in antennas on the market, like WifiRobin ($156). But experts said they were not as fast or effective as the latest free cracking programs, because the devices worked only on WEP-protected networks.#p#分页标题#e#
使用这些程序和大功率的Wi-Fi天线的成本不到90美元,这样黑客们就能监听到两三英里内的家庭无线网络信号了。市场上还有一些带有内置天线的黑客设备,例如售价156美元的WifiRobin之类。但专家们称这些设备并不如最新的自由黑客程序来的便捷有效,这些设备只能针对采用WEP保护的网络使用。
To protect yourself, changing the Service Set Identifier or SSID of your wireless network from the default name of your router (like Linksys or Netgear) to something less predictable helps, as does choosing a lengthy and complicated alphanumeric password.
要保护你自己,最好将你的服务集标识符或无线网络服务组标识符(SSID)由路由器的默认名(Linksys或Netgear之类)改成一个比较不易预测的名字,就像选择够长够复杂的字母数字混合的密码那样。
Setting up a virtual private network, or V.P.N., which encrypts all communications you transmit wirelessly whether on your home network or at a hot spot, is even more secure. The data looks like gibberish to a snooper as it travels from your computer to a secure server before it is blasted onto the Internet.
建立一个虚拟专用网络将对你收发的所有信息进行加密,无论你使用的是家用无线网络或是Wi-Fi热点。这会更安全些。你的计算机发出的数据会先经过一个网络安全服务器再在互联网上传播,这样加密后的数据在嗅探软件看来就像是一堆乱码一样。
Popular V.P.N. providers include Vyper, HotSpot and LogMeIn Hamachi. Some are free; others are as much as $18 a month, depending on how much data is encrypted. Free versions tend to encrypt only Web activity and not e-mail exchanges.
流行的提供商包括Vyper, HotSpot 和LogMeIn Hamachi。其中一些是免费的,另一些则依加密的数据量的多少来计费(如每月18美金)。免费版本的通常只加密Web访问信息而不加密电邮。
However, Mr. Palmer at the Electronic Frontier Foundation blames poorly designed Web sites, not vulnerable Wi-Fi connections, for security lapses. “Many popular sites were not designed for security from the beginning, and now we are suffering the consequences,” he said. “People need to demand ‘https’ so Web sites will do the painful integration work that needs to be done.”
但电子前哨基金会的帕尔默先生却认为网络安全的疏失更多的要归咎于糟糕的网站设计,而非Wi-Fi连接本身的脆弱性。他说:“许多热门网站在其设计之初就对安全问题考虑不足,现在不得不自食其果,大众要求使用‘https’,因此网站不得不艰难的履行其义务。”
浏览量:2
下载量:0
时间:
白帽匿名者(white hat hacker)又称为白帽子,测试网络和系统的性能来判定它们能够承受入侵的强弱程度。
黑客并非都是黑的,那些用自己的黑客技术来做好事的黑客们叫“白帽黑客”,这点和网络安全工程师的性质有点相同。大多数的普通黑客都是挂靠在安全公司,通过检测计算机系统安全性来谋生。
hacker 即是“黑客”,与白帽黑客对应的,就是黑帽黑客 black hat hacker,一个白道,一个黑道。而“黑客”也叫它“骇客”(craker),即闯入计算机系统或网络系统者。
浏览量:1
下载量:0
时间:
小编为大家整理如何防止电脑病毒的方法,希望对你有帮助哦!
You've probably been sick before. It's not fun.In many cases, like the flu, you're sick because of a virus…tiny germs ready to multiply and spread from person-to-person, via handshakes or sneezes。
你肯定生过病吧,很不爽,对吗?生病通常是因为感染了病毒。握手、打喷嚏都能让病毒繁殖传播。
Computer viruses are no different.Instead of germs, they are computer programs.These programs are usually designed by criminals to multiply and spread from computer-to-computer like a disease.If one makes it to your computer, it can erase your files, send emails without your permission or even communicate sensitive info to criminals。
电脑病毒亦然。但不是微生物而是电脑程序。黑客设计的病毒程序会像疾病一样在电脑间传播一旦电脑感染了病毒,它会删除文件、私发邮件、甚至把私人信息泄露给犯罪分子。
Let's take a closer look, because what we call computer viruses can actually be Viruses, worms or trojanswe’ll start with viruses.These bugs hitch a ride when something, like a file, is shared between computers. This often happens via attachments sent in email or shared USB drives.Once someone clicks to open the file, the damage is done.The virus is now on that computer, where it starts to multiply and look for chances to hitch a ride to a new computer。
电脑病毒可以细分为三种,普通病毒、蠕虫 、木马先来说说普通病毒。它通过电脑之间的文件共享来传播。通常会在附件或U盘中出现,一打开这种文件,电脑就会中毒。然后复制,等着感染下一台电脑。
Like a sick human, it’s sometimes hard to to tell when a file has a virus.For this reason, the best defense is anti-virus software.It prevents viruses from getting to your computer and removes them when they are found。
和人生病一样,有时候文件是否感染病毒也很难”确诊”。所以,最好的防护措施就是安装杀毒软件能防止电脑中毒,也能在发现病毒时及时清除。
Now, worms are a little scarier.They are programs that spread to computers without humans doing anything.Criminals create worms to spread via computers that are connected in a network. They worm their way from computer-to-computer automatically.Whether it's a small office or a global network like the Internet。
蠕虫则更可怕,即使我们什么也没操作,它也能传播。只有电脑联网,蠕虫就会感染网上的病毒。不管是局域网,还是在整个互联网中。
Usually, the worms find a back door.a way to trick the computer’s software into letting them in.Once they're in, they look for the same backdoor in similar computers,wreaking havoc along the way。
蠕虫擅长走”后门”。就是通过电脑软件的漏洞入侵。一旦被感染,蠕虫还会寻找其他电脑的”后门”,一路披荆斩棘地破坏下去。
The best defense is keeping your computer software up to date at work and home.This helps close the doors and prevent problems。
最好的防护措施是,更新系统、修复漏洞,门关好了,蠕虫就爬不进来了。
Trojans, our last example, are sneaky bugs.Like the real trojan horse, they’re a trick.If you fall for it, you end up downloading a virus from the Internet.It may appear to be a game or useful software, but hidden inside is a program that can cause problems.For example, these programs can open new backdoors,giving criminals access to your computer and information over the Web。
木马则是最最阴险狡诈的病毒。像传说中的特洛伊木马,它也善用诡计,一个不小心就可能从网上下载木马。木马病毒会伪装成游戏或者常用软件,有些木马还会给电脑开新的”后门”,让犯罪分子轻易侵入你的电脑获取信息。
Not fun.To avoid trojans, only download software from sites you trust.Just like washing your hands and covering your cough,you have to be aware of what causes problems to avoid them。
可怕吧?要防木马,你必须只在信任的网站上下载软件,提高警惕,时刻注意网络安全,就像咳嗽要掩口,饭前便后要洗手一样。
Keep your computer up to date and get anti-virus software.It will help prevent problems and help you recover.And please…don't click on links, attachments and downloadable files.unless you know they're legit。
还要经常更新电脑软件,安装杀毒工具。一边防患于未然,一边“亡羊补牢”。另外,陌生的链接、附件、文件也不要碰。除非能确认它们的安全性。
Through a little awareness, you and your computer will stay happy and healthy。
警钟长鸣,健康常伴。
浏览量:1
下载量:0
时间:
在信息安全里,“黑客”指研究智取计算机安全系统的人员。利用公共通讯网路,如互联网和电话系统,在未经许可的情况下,载入对方系统的被称为黑帽黑客接下来小编为大家整理黑客工具如何威胁Wi-Fi用户安全,希望对你有帮助哦!
You may think the only people capable of snooping on your Internet activity aregovernment intelligence agents or possibly a talented teenage hacker holed up in his parents’ basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online.
也许你曾以为窥探你上网活动的事只有政府情报人员或者藏在自家地下室的青年黑客才会干的出来。但一些简单的软件使得哪怕是小咖啡馆里在你身边的任何人都可以看到你在浏览的网页甚至获得你的身份验证信息。
“Like it or not, we are now living in a cyberpunk novel,” said Darren Kitchen, a systems administrator for an aerospace company in Richmond, Calif., and the host of Hak5, a video podcast about computer hacking and security. “When people find out how trivial and easy it is to see and even modify what you do online, they are shocked.”
达伦·凯臣是美国加州里士满市的一家航空公司的系统管理员,同时他还是一家名为Hak5的计算机黑客与信息安全视频播客网站的站长。他说,“不管你喜欢与否,我们现在正生活在一个数字庞克小说之中。当人们发现他们的网上信息是多么容易被黑时,他们都会目瞪口呆。”
Until recently, only determined and knowledgeable hackers with fancy tools and lots of time on their hands could spy while you used your laptop or smartphone at Wi-Fi hot spots. But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.
不久前若要监视你的笔记本或智能手机通过Wi-Fi热点上网的情况,这还只是有能力和有毅力的黑客,花费大量时间并利用高精尖的工具才能办到的事。但去年十月发布的一款叫做Firesheep的自由程序使得监测未加密的Wi-Fi网络变得易如反掌,利用该软件人们可以监测别人上网信息乃至登录他人访问的网站帐户。
Without issuing any warnings of the possible threat, Web site administrators have since been scrambling to provide added protections.
在没有发布任何潜在安全威胁警告的情况下,网站管理员已经争先恐后的开始提供附加安全保护措施了。
“I released Firesheep to show that a core and widespread issue in Web site security is being ignored,” said Eric Butler, a freelance software developer in Seattle who created the program. “It points out the lack of end-to-end encryption.”
Firesheep的作者是西雅图的自由软件开发者埃里克巴·特勒,他表示:“我发布Firesheep就是为了让大家知道在网站安全上一个普遍的核心问题一直以来都被大家忽略了,那就是端到端的加密。”
What he means is that while the password you initially enter on Web sites like Facebook, Twitter, Flickr, Amazon, eBay and The New York Times is encrypted, the Web browser’s cookie, a bit of code that that identifies your computer, your settings on the site or other private information, is often not encrypted. Firesheep grabs that cookie, allowing nosy or malicious users to, in essence, be you on the site and have full access to your account.http://www.24en.com爱思英语网
当你在Facebook、Twitter、Flickr、Amzon、eBay和纽约时报之类的网站上初次输入登录密码时,端到端信息被加密。但当使用cookie登录时,常常是不进行加密的。Cookie是对记录你的登录信息、个人访问设置及某些私人信息的一段代码的称呼。Firesheep就设法抓取这些cookie,这样就可以使任何心存好奇或别有用心的用户干脆变成你,从网站上登录你的帐号。http://www.24en.com爱思英语网
More than a million people have downloaded the program in the last three months (including this reporter, who is not exactly a computer genius). And it is easy to use.http://www.24en.com爱思英语网
在过去三个月内超过一百万人已下载了该程序(包括对计算机并不在行的笔者在内)。它真的很简单易用。
The only sites that are safe from snoopers are those that employ the cryptographic protocol Transport Layer Security or its predecessor, Secure Sockets Layer, throughout your session. PayPal and many banks do this, but a startling number of sites that people trust to safeguard their privacy do not. You know you are shielded from prying eyes if a little lock appears in the corner of your browser or the Web address starts with “https” rather than “http.”http://www.24en.com爱思英语网
唯一安全的网站就是那些在整个会话过程中使用传输层加密协议或其前身SSL的网站。PayPal和许多银行做了这样的设定。但仍有一批数量惊人的网站没有这么做,而通常人们却一直相信它们能够保护其私人信息。当你的浏览器的一角出现一个小小的锁形图标或者你所访问的网址前以“https”而不是“http”开头时,你才能躲过那些窥视的眼睛。http://www.24en.com爱思英语网
“The usual reason Web sites give for not encrypting all communication is that it will slow down the site and would be a huge engineering expense,” said Chris Palmer, technology director at the Electronic Frontier Foundation, an electronic rights advocacy group based in San Francisco. “Yes, there are operational hurdles, but they are solvable.”
电子前哨基金会是一家总部位于旧金山的数字版权维权组织,它的技术总监克利斯·帕尔默说:“网站不提供全程通信加密的理由通常是,这会拖慢站点访问速度并造成巨大的工程开销。要提供全程通信机密的确有一些操作上的障碍,但这些困难都是可以解决的。”
Indeed, Gmail made end-to-end encryption its default mode in January 2010. Facebook began to offer the same protection as an opt-in security feature last month, though it is so far available only to a small percentage of users and has limitations. For example, it doesn’t work with many third-party applications.http://www.24en.com爱思英语网
实际上,Gmail已于2010年一月起在其默认模式中采用了端到端加密技术。上个月,Facebook也开始将同样的保护措施作为一项可选择的安全功能提供给用户,但目前仍只限于一小部分用户应用。例如,它并不适用于许多第三方应用。
“It’s worth noting that Facebook took this step, but it’s too early to congratulate them,” said Mr. Butler, who is frustrated that “https” is not the site’s default setting. “Most people aren’t going to know about it or won’t think it’s important or won’t want to use it when they find out that it disables major applications.”
“Facebook这么做并不值得,现在就为他们的成功祝贺也为时尚早。大多数人并不会了解这项保护措施,或者并不会认为这有多重要,或者由于这对于大多数第三方应用无效而不会使用它。”巴特勒先生如是说,他仍觉得“https”访问并不是网站的默认访问设置乃是一件憾事。
Joe Sullivan, chief security officer at Facebook, said the company was engaged in a “deliberative rollout process,” to access and address any unforeseen difficulties. “We hope to have it available for all users in the next several weeks,” he said, adding that the company was also working to address problems with third-party applications and to make “https” the default setting.
Facebook的信息安全总监乔·沙利文表示,他们正着手准备一个“慎重的发布过程”,以发现并克服所有潜在的困难。他说,“我们希望在几周后这项安全措施能适用于所有用户。”此外他还补充说,公司正在努力解决第三方应用方面的安全问题并力促“https”访问方式成为默认设置。
Many Web sites offer some support for encryption via “https,” but they make it difficult to use. To address these problems, the Electronic Frontier Foundation in collaborationwith the Tor Project, another group concerned with Internet privacy, released in June an add-on to the browser Firefox, called Https Everywhere. The extension, which can be downloaded at eff.org/https-everywhere, makes “https” the stubbornly unchangeable default on all sites that support it.
许多网站通过“https”提供加密服务,但这用起来并不方便。为解决这个问题,电子前哨基金会联合Tor项目组(另一个互联网隐私相关组织)于去年六月发布了一款名为Https Everywhere(Https无处不在)的火狐浏览器插件。该插件(可由eff.org/https-everywhere下载)强制通过https方式访问所有支持该访问服务的网站。
Since not all Web sites have “https” capability, Bill Pennington, chief strategy officer with the Web site risk management firm WhiteHat Security in Santa Clara, Calif., said: “I tell people that if you’re doing things with sensitive data, don’t do it at a Wi-Fi hot spot. Do it at home.”http://www.24en.com爱思英语网
由于并非所有网站都能提供“https”访问支持,白帽安全公司(美国加州圣克拉拉的网络风险管理公司)的首席策略官比尔·潘宁顿告戒大众:“如果你要进行涉及敏感信息的操作,不要通过Wi-Fi来做,还是回家再弄吧。”
But home wireless networks may not be all that safe either, because of free and widely available Wi-Fi cracking programs like Gerix WiFi Cracker, Aircrack-ng and Wifite. The programs work by faking legitimate user activity to collect a series of so-called weak keys or clues to the password. The process is wholly automated, said Mr. Kitchen at Hak5, allowing even techno-ignoramuses to recover a wireless router’s password in a matter of seconds. “I’ve yet to find a WEP-protected network not susceptible to this kind of attack,” Mr. Kitchen said.
但家里的无线网络也并不一定能确保安全,因为Gerix WiFi Cracker、Aircrack-ng 和Wifite之类的自由Wi-Fi黑客程序正被广泛使用着。此类软件仿冒合法用户的活动以窃取一系列所谓弱密匙或者可能透露户密码的蛛丝马迹。这个过程完全是自动的,凯臣在Hak5上说,这使得哪怕是一个技术白痴都能在几秒钟内获得一个无线路由器的密码。他还说:“我还没有发现哪个采用WEP保护的网络能够对这种攻击免疫。”
A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it’s best to use a WPA password instead. Even so,hackers can use the same free software programs to get on WPA password-protected networks as well. It just takes much longer (think weeks) and more computer expertise.
WEP(有线等效保密)密码并不如WPA(Wi-Fi接入保护)密码强大,所以使用WPA密码方为上策。但即便如此,黑客们也还是可以用同样的软件得到采用WPA密码保护的网络的密码信息。这只是需要花上更长的时间(大概是几周),当然也需要更多的计算机专业知识。
Using such programs along with high-powered Wi-Fi antennas that cost less than $90,hackers can pull in signals from home networks two to three miles away. There are also some computerized cracking devices with built-in antennas on the market, like WifiRobin ($156). But experts said they were not as fast or effective as the latest free cracking programs, because the devices worked only on WEP-protected networks.
使用这些程序和大功率的Wi-Fi天线的成本不到90美元,这样黑客们就能监听到两三英里内的家庭无线网络信号了。市场上还有一些带有内置天线的黑客设备,例如售价156美元的WifiRobin之类。但专家们称这些设备并不如最新的自由黑客程序来的便捷有效,这些设备只能针对采用WEP保护的网络使用。
To protect yourself, changing the Service Set Identifier or SSID of your wireless network from the default name of your router (like Linksys or Netgear) to something lesspredictable helps, as does choosing a lengthy and complicated alphanumeric password.
要保护你自己,最好将你的服务集标识符或无线网络服务组标识符(SSID)由路由器的默认名(Linksys或Netgear之类)改成一个比较不易预测的名字,就像选择够长够复杂的字母数字混合的密码那样。http://www.24en.com爱思英语网
Setting up a virtual private network, or V.P.N., which encrypts all communications you transmit wirelessly whether on your home network or at a hot spot, is even more secure. The data looks like gibberish to a snooper as it travels from your computer to a secure server before it is blasted onto the Internet.http://www.24en.com爱思英语网
建立一个虚拟专用网络将对你收发的所有信息进行加密,无论你使用的是家用无线网络或是Wi-Fi热点。这会更安全些。你的计算机发出的数据会先经过一个网络安全服务器再在互联网上传播,这样加密后的数据在嗅探软件看来就像是一堆乱码一样。
Popular V.P.N. providers include Vyper, HotSpot and LogMeIn Hamachi. Some are free; others are as much as $18 a month, depending on how much data is encrypted. Free versions tend to encrypt only Web activity and not e-mail exchanges.
流行的提供商包括Vyper, HotSpot 和LogMeIn Hamachi。其中一些是免费的,另一些则依加密的数据量的多少来计费(如每月18美金)。免费版本的通常只加密Web访问信息而不加密电邮。http://www.24en.com爱思英语网
However, Mr. Palmer at the Electronic Frontier Foundation blames poorly designed Web sites, not vulnerable Wi-Fi connections, for security lapses. “Many popular sites were not designed for security from the beginning, and now we are suffering the consequences,” he said. “People need to demand ‘https’ so Web sites will do the painful integration work that needs to be done.”
但电子前哨基金会的帕尔默先生却认为网络安全的疏失更多的要归咎于糟糕的网站设计,而非Wi-Fi连接本身的脆弱性。他说:“许多热门网站在其设计之初就对安全问题考虑不足,现在不得不自食其果,大众要求使用‘https’,因此网站不得不艰难的履行其义务。”
浏览量:3
下载量:0
时间:
你是否有过在职场上被人嫁祸呢?接下来小编为大家整理了如何防止在职场上背黑锅,希望对你有帮助哦!
In too many workplaces, when something goes wrong, people waste far more time and energy assigning blame for it than trying to find a solution," observes Ben Dattner, adding that the recession exacerbated the problem, so that finger-pointing is now more widespread than ever.
本-达特纳发现:“在职场上,一旦某件事出了差错,人们会把更多的精力用于相互指责,而不是努力找出解决方案,这样的情况太常见了。”他补充道,经济衰退加剧了这个问题,所以现在转嫁责任的做法比以前更要普遍。
An organizational psychologist and consultant, Dattner wrote a book called The Blame Game: How the Hidden Rules of Credit and Blame Determine Our Success or Failure. You don't mention whether you've ever talked with your boss about his habit of throwing you under the bus but, if not, it's time to start. "Confronting him is risky, but saying nothing and letting this go on is risky too," Dattner notes.
达特纳是一位组织心理学家和顾问,曾写过一本书,名为《责备游戏:荣誉潜规则和责备如何决定我们的成败》。关于你的上司经常把你推下火坑这件事,不知道你是否与他交流过,如果还没有,现在是时候了。达特纳表示:“直接与他对质会有风险,但沉默和逆来顺受同样有风险。”
The key is in how you approach the conversation. Dattner suggests asking lots of questions about exactly why your boss believes a mistake was someone else's fault. Pinning him down on the details -- in a calm, non-accusatory way, of course -- will put him on notice that you're tired of being a scapegoat and you want to prevent it in the future. You may also learn something useful about how he perceives your role, and his own.
关键是如何发起对话。达特纳建议,问一些具体的问题,比如你的上司为什么认为错误是别人造成的。跟他讨论出问题的细节,以此迫使他停止诬陷——当然要以平静、而不是责难的方式。这会让他意识到,你已经受够了继续做他的替罪羊,你希望在未来阻止这样的事情再次发生。你还可能了解到一些有用的东西,比如他如何看待你的角色和他的职责。
"Try to get to the bottom of what's really going on here," Dattner advises. Is it possible, for instance, that who was accountable for which parts of a given project wasn't clear at the outset, so your boss genuinely believes you or a teammate dropped the ball? "The biggest mistake I've seen people make is reacting to a situation, usually angrily, without really understanding it first."
达特纳说:“尽量弄清楚事情的真相。”比如,有没有可能是因为在最开始,大家并没有明确谁应该负责某个项目的哪个部分,所以你的上司真的以为是你和你的同事犯了错误?“我遇到过人们犯的最大的错误,是非常愤怒地对这种情况做出反应,而并没有首先了解事实的真相。”
Robert Hosking, executive director of staffing company OfficeTeam, agrees. "You need to know exactly how the blame for a problem got assigned to you," he says. "Then steer the discussion toward how to prevent the same thing from happening again."
员工安置公司OfficeTeam执行董事罗伯特-霍斯金同意达特纳的观点。他说:“必须弄清楚,到底是什么使你因为某个问题而受到责备。之后再去讨论如何防止同样的事情再次发生。”
One way to head off future finger-pointing, Hosking says, is to start documenting everything you and your teammates do. "Often everyone is so busy that things get overlooked or slip through the cracks," he says. "So begin each project with a written outline of who is responsible for what, and make sure everyone, including the boss, has a copy and signs off on it." Detailed accountability might even prevent mistakes from happening in the first place.
霍斯金表示,防止未来被嫁祸的一种方法是,开始记录你和同事做的每一件事。他说:“通常情况下,人们太忙了,忽视、错过了许多事情。所以在每一个项目开始之前,用书面方式列出每个人的职责,同时确保所有人,包括上司本人在内,人手一份,并在上面签字。”详细的责任分配甚至可以防止错误的发生。
As you already suspect, going over your boss's head to complain is so likely to backfire that it has to be a last resort. "If you're being unfairly accused of something that could seriously damage your career, do take it upstairs, and think about involving someone from human resources as well," Hosking says. "But warn your boss first, so he's not blindsided. Invite him to sit in on the meeting. Frame it as a chance to clear the air."
正如你所怀疑的,越过自己的上司提出投诉,可能会适得其反,所以这只能作为最后的手段。霍斯金说:“如果你因为某件事受到不公平的指责,而这件事会严重损害你的职业发展,这时候可以考虑向更高层投诉,并可考虑由人力资源部出面解决。但首先要警告你的上司,以免他会措手不及。邀请他参加会议。把这作为消除误会,澄清事实的一次机会。”
Small consolation though it might be, Hosking points out that the people your boss reports to are probably already aware that something's amiss. "If this manager has shown a pattern over time of never accepting responsibility for problems, higher-ups are going to notice that," he says. "Don't assume they're oblivious. Eventually, someone will call him on it."
虽然这么说只能作为一个小小的安慰,但霍斯金指出,你上司的上级或许早已察觉到事情不正常。他说:“如果你的上司表现出从来不肯承担责任的态度,高层肯定会注意到这一点。不要假设他们对此并不在意。最终,肯定会有人找他清算的。”
In the meantime, Ben Dattner has one additional suggestion for you: Concentrate on building a strong network. "A boss who denies you credit and unfairly blames you may change [his] tune when he realizes that others, both inside and outside the organization, recognize your talent," he writes in The Blame Game.
此外,本-达特纳还有另外一条建议:集中精力建立一个强有力的人际关系网络。他在《责备游戏》中写道:“如果你的上司否认你的功劳,还对你横加指责,等他意识到公司内外都认可你的才能时,他或许会改变自己的态度。”
A robust network of fans can make you more likely to be offered other jobs, inside and outside the company, Dattner notes, and "even the most credit-hogging and blame-dumping boss will not want to be viewed as out of step with others in the organization, or to be blamed for being the reason why a talented, hard-to-replace employee left."
达特纳表示,强有力的粉丝网络让你更有可能从内部和外部获得其他工作机会,即便是“最贪图功劳和热衷嫁祸他人的上司,也不希望自己被认为与公司其他人步调不一致,也不希望因为一位优秀的、难以替代的员工离职而受到指责。”
Once it's in your boss's own best interest to stop scapegoating you, in other words, he probably will.
一旦停止拿你当替罪羊成为对你上司最有好处的事情,他自然就会改变之前的做法。
浏览量:3
下载量:0
时间: