Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Notable hackers

Читайте также:
  1. Cities and notable towns
  2. Fight against computer hackers
  3. Notable places to visit
  4. THE FIRST HACKERS

· Mark Abene -- Inspired thousands of teenagers around the country to "study" the internal workings of the United States phone system. One of the founders of the Masters of Deception group.

· Dark Avenger -- Bulgarian virus writer that invented polymorphic code in 1992 as a way to fool the recognition by Anti-virus software.

· Robert Tappan Morris, Jr. -- This Cornell University graduate student created the first major Internet worm in 1988.

· Kevin Mitnick -- The first hacker to be held in jail without bail for a time long enough to a world record.

· Kevin Poulsen -- In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest.

· Adrian Lamo – Was accused of nontechnical but surprisingly successful intrusions into computer systems at Microsoft, The New York Times, Lexis-Nexis, MCI WorldCom, SBC, Yahoo!, and others.

· Vladimir Levin -- This mathematician led Russian hacker gang that tricked Citibank's computers into spitting out $10 million. To this day, the method used is unknown.

Ex.2. Fill in the missing words.

1. _______ is a term used to describe different types of computer experts.

2. _______is a hacker who uses the World Wide Web as a way to express their political views.

3. A hacker is someone who enjoys the intellectual challenge of creatively _______

4. _______ has age and experience, and _______ often has particular expertise in a specific topic.

5. A hacker programs _______ and enjoys programming rather than just _______ about programming.

 

Ex.3. Translate into English.

Кража интеллектуальной собственности, набор навыков, удаленный компьютер, проникать в систему, ошибки в системе безопасности, сеть, творчески преодолевать ограничения, компьютерный эксперт, взломщик, подделка кредитных карточек.

Ex.4. Match the words from column A with their definitions from column B.

1. Cracker, Black-hat a) Types of hacker in the positive sense.
2. Script kiddy b) A hacker in the negative sense.
3. Guru, Wizard c) A hacker who breaks security but who does so for altruistic or at least non-malicious reasons. The darker the hat, the less the ethics of the activity.
4. Whitehat, Sneaker, Grey-hat   d) a person with little or no skill. Or a person who simply follows directions or uses a cook-book approach without fully understanding the meaning of the steps they are doing.

Ex. 5. ON THE LEFT there are examples of ten useful verbs in computing; on the right there are definitions of the verbs. Read the examples and match the verbs (which are in italics) with the definitions. Then write the infinitive forms into the spaces in the definitions on the right.

 


Дата добавления: 2015-11-14; просмотров: 31 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Hacker: Brilliant programmer| Ex.8. Translate one of the following texts (to the teacher’s choice) in written form.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)