Computer World. Матросова Т.А. - 70 стр.

UptoLike

Составители: 

69
TEXT 5
Read the text and divide it into paragraphs. Translate the first three paragraphs
in written form.
CREATING AND USING SECURE TECHNOLOGY
Software programs represent a unique combination of human authorship and
technology. The complexity of modern computing is compounded on the Internet as
programs interact with a broadening diversity of other programs and devices. This
complexity has become the target of hackers and writers of viruses and worms, who
have become increasingly sophisticated in probing for and exploiting vulnerabilities
in order to inflict senseless harm or worse. The launch of the Trustworthy Computing
Initiative was about fundamentally changing the way we design and develop software
in order to more holistically address this reality. Back in 2002, some 8,500 Microsoft
developers halted their work and dedicated their efforts to building security directly
into our software. While this initiative delayed the release of Windows Server 2003
and postponed work on other key products, we believe that the initial Trustworthy
Computing push created a quantum leap in our ability to help protect computing
systems from online attacks. Across the company, our developers have maintained
their focus on improving the security of our products, and employees around the
world helped customers, partners, and other key audiences understand how,
collectively, we can improve the security of the Internet. Our development of
Microsoft Windows XP Service Pack 2 (SP2)–a free upgrade to the Windows XP
operating system–was the most significant step of the past year. Windows XP SP2
contains a number of new security technologies. By consenting to and «turning on»
Automatic Updates, consumers permit Microsoft to send them updates when they
connect to the Internet. During the setup of Windows XP SP2, consumers are
presented with a screen that educates them in consumer-friendly terms on the
importance of enabling this feature.
TEXT 6
Read the text and express the main idea. Give the text a suitable title. Find a
definition of hacker in the text.
In today's world of international networks and electronic commerce, every
computer system is a potential target. Rarely does a month go by without news of
some major network or organization having its computers penetrated by unknown
computer criminals. Although some computer «hackers» have said that such
intrusions are merely teenage pranks or fun and games, these intrusions have become
more sinister in recent years: computers have been rendered inoperable; records have
been surreptitiously altered; software has been replaced with secret «back doors» in
place; proprietary information has been copied without authorization; and millions of
passwords have been captured from unsuspecting users.
Even if nothing is removed or altered, system administrators must often spend
hours or days reloading and reconfiguring a compromised system to regain some