Теория и практика перевода. Терехова Г.В. - 83 стр.

UptoLike

Составители: 

83
warning about the Official Secrets Acts would deserve whatever happened thereafter,
there are a few hacking projects which should never be attempted.
On the converse side, I and many hackers I know are convinced of one thing:
we receive more than a little help from the system managers of the computers we
attack. In the case of computers owned by universities and polys, there is little doubt
that a number of them are viewed like academic libraries--strictly speaking they are
for the student population, but if an outsider seriously thirsty for knowledge shows
up, they aren't turned away. As for other computers, a number of s are almost sure
we have been used as a cheap means to test a system's defenses...someone releases a
phone number and low-level password to hackers (there are plenty of ways) and
watches what happens over the next few weeks while the computer files themselves
are empty of sensitive data. Then, when the results have been noted, the phone
numbers and passwords are changed, the security improved etc etc....much easier on
dp budgets than employing programmers at Ј150/man/ day or more. Certainly the
Pentagon has been known to form 'Tiger Units' of US Army computer specialists to
pin-point weaknesses in systems security.
Two spectacular hacks of recent years have captured the public imagination:
the first, the Great Prince Philip Prestel Hack, is described in detail in chapter 8,
which deals with view data. The second was spectacular because it was carried out on
live national television. It occurred on October 2nd 1983 during a follow-up to the
BBC's successful Computer Literacy series. It's worth reporting here, because it
neatly illustrates the essence of hacking as a sport...skill with systems, careful
research, maximum impact with minimum real harm, and humour.
The TV presenter, John Coll, was trying to show off the Telecom Gold
electronic mail service. Coll had hitherto never liked long passwords and, in the
context of the tight timing and pressures of live TV, a two letter password seemed a
good idea at the time. On Telecom Gold, it is only the password that is truly
confidential; system and account numbers, as well as phone numbers to log on to the
system, are easily obtainable. The BBC's account number, extensively publicized,
was OWL001, the owl being the 'logo' for the TV series as well as the BBC
computer.
The hacker, who appeared on a subsequent programs as a 'former hacker' and
who talked about his activities in general, but did not openly acknowledge his
responsibility for the BBC act, managed to seize control of Coll's mailbox and
superimpose a message of his own:
Computer Security Error. Illegal access. I hope your television
PROGRAMME runs as smoothly as my PROGRAM worked out your passwords!
Nothing is secure! /41/
1.2.5 Текст “Cloning”
Clone, an organism, or group of organisms, derived from another organism by
an asexual (nonsexual) reproductive process. The word clone has been applied to
cells as well as to organisms, so a group of cells stemming from a single cell is also
called a clone. Usually the members of a clone are identical in their inherited
warning about the Official Secrets Acts would deserve whatever happened thereafter,
there are a few hacking projects which should never be attempted.
         On the converse side, I and many hackers I know are convinced of one thing:
we receive more than a little help from the system managers of the computers we
attack. In the case of computers owned by universities and polys, there is little doubt
that a number of them are viewed like academic libraries--strictly speaking they are
for the student population, but if an outsider seriously thirsty for knowledge shows
up, they aren't turned away. As for other computers, a number of s are almost sure
we have been used as a cheap means to test a system's defenses...someone releases a
phone number and low-level password to hackers (there are plenty of ways) and
watches what happens over the next few weeks while the computer files themselves
are empty of sensitive data. Then, when the results have been noted, the phone
numbers and passwords are changed, the security improved etc etc....much easier on
dp budgets than employing programmers at Ј150/man/ day or more. Certainly the
Pentagon has been known to form 'Tiger Units' of US Army computer specialists to
pin-point weaknesses in systems security.
        Two spectacular hacks of recent years have captured the public imagination:
the first, the Great Prince Philip Prestel Hack, is described in detail in chapter 8,
which deals with view data. The second was spectacular because it was carried out on
live national television. It occurred on October 2nd 1983 during a follow-up to the
BBC's successful Computer Literacy series. It's worth reporting here, because it
neatly illustrates the essence of hacking as a sport...skill with systems, careful
research, maximum impact with minimum real harm, and humour.
        The TV presenter, John Coll, was trying to show off the Telecom Gold
electronic mail service. Coll had hitherto never liked long passwords and, in the
context of the tight timing and pressures of live TV, a two letter password seemed a
good idea at the time. On Telecom Gold, it is only the password that is truly
confidential; system and account numbers, as well as phone numbers to log on to the
system, are easily obtainable. The BBC's account number, extensively publicized,
was OWL001, the owl being the 'logo' for the TV series as well as the BBC
computer.
        The hacker, who appeared on a subsequent programs as a 'former hacker' and
who talked about his activities in general, but did not openly acknowledge his
responsibility for the BBC act, managed to seize control of Coll's mailbox and
superimpose a message of his own:
        Computer Security Error. Illegal access. I hope your television
PROGRAMME runs as smoothly as my PROGRAM worked out your passwords!
        Nothing is secure! /41/

      1.2.5 Текст “Cloning”

        Clone, an organism, or group of organisms, derived from another organism by
an asexual (nonsexual) reproductive process. The word clone has been applied to
cells as well as to organisms, so a group of cells stemming from a single cell is also
called a clone. Usually the members of a clone are identical in their inherited
                                                                                     83