辅修《科技英语翻译》讲义(2015.3)

发布时间 : 星期二 文章辅修《科技英语翻译》讲义(2015.3)更新完毕开始阅读

How to Stay Safe While Shopping Online (Part Two)

● Don’t trust your “friends”. Hackers target social media, including Facebook and Twitter, because they know it’s easier to get people to click on a link that appears to be recommended from a friend. McAfee has identified dozens of examples, including free dinner offers at Cheesecake Factory and fake mystery shopping invitations. Offers that sound too good to be true, such as free iPads or free iPhones, are also a common lure. The company cautions against clicking on fake alerts from friends, who may have been hacked themselves, and avoiding shortened links on Twitter that claim to offer deals.

● Open e-cards with caution. They can be cute, but they can also be malicious. McAfee warms that some e-cards download viruses onto your computer when you download them. To avoid that outcome the company suggests only opening e-cards from domain names that you recognize as big e-car sites.

● Upgrade your passwords. The holiday season can serve as a good reminder to give your passwords a makeover; security experts recommend changing them regularly as a precaution against hackers. Avoid common and simple words, use long combinations of words that also incorporate numbers or symbols, and never use duplicate passwords for multiple accounts.

● Check up on an e-retailer before making purchases. Some fly-by-night operations take advantage of the uptick in shopping around the holiday season to collect cash without ever mailing out the goods in return, warms the Better Business Bureau. To protect yourself, the bureau recommends never wiring money or paying in advance.

● Review your statements. The first sign of identity theft is often an unfamiliar charge on a credit card or bank statement; reviewing those statements carefully and contacting your bank or card provider with any concerns can prevent a theft from expanding. Credit card usually come with some measure of automatic protection, as long as you report the scam relatively quickly.

Following these tips might leave you feeling like the Grinch — be suspicious of friends ? — but the real holiday downer would be dealing with a stolen identity when you’re trying to enjoy the spirit of the season.

练习九(Drill Nine)

Battles of Ideas and Persuasion

The introduction of a revolutionary technology brings new races for ideas and new interactions of knowledge, power, and communication. In the case of robotics, a new fascinating cross has emerged between intellectual-property rights issues and defence studies.

As a critical field to security and industry, akin to the rise of the car, the computer, or the atomic bomb, we are unsurprisingly seeing attempts at stealing information for copying abroad.

Beyond the stealing of design secrets, unmanned systems have also opened a competitions to reach into the communications of the machines themselves. In Iraq, insurgents managed to hack into the video feed of U. S. military drones — in effect, the equivalent of a robber listening in on a police radio scanner.

As we use more and more systems that are digitally controlled, where a human is not physically inside, we will see a new step in this race open. The battle is not just for design secrets and access to communications, but also for control. We enter into an era of battles of persuasion.

This is a fundamental shift. We have never been able to “persuade” a weapon to do what its

21

owner didn’t want. You never could change the direction of a bullet or arrow in mid flight. Now you can do the equivalent. The goal then moves from only seeking to destroy the enemy’s plane or tank, to co-opting it to “persuade” it to do things its original owners wouldn’t want. “Recode all allied soldiers as enemies, and all enemy soldiers as friendly.” A human would ask why, needing motivation to change his or her ways. With the proper access, a computer will just comply. (from The Robotics Revolution)

22

联系合同范文客服:xxxxx#qq.com(#替换为@)