Unit 8 Computers and security In this unit, you will a first listen, and then talk about computers and security read about computer viruses and the damage they may inflict; learn new words and expressions write about what should be done to protect against computer viruses practice the use of omission and emphasis write an Internet notice check goals visit Culture Salon for an introduction to milestones in computer history L. Listen and talk The photos are all related to Computers and security. Describe them to your classmates with the help of the following question 1. What are the basic skills you need to be effective in using computers? How do you think the Internet can help in our modern life? Explain 3. How can you avoid being a victim of cybercrime? IL. Read and explore Passage A You Are the Weakest Link, Goodbye Lead-in Questions 1. Do you often download free software from the Internet? Explain 2. Have you installed anti-virus software on your computer? What is it? 3. Is it possible for us to find a way to get rid of computer viruses permanently? Notes to the Text 1. But those long lazy summers disappeared too fast.(para. 2) That summer doesn't last as long as we would like it to last 那些长长的夏日,悠闲自得,可惜消逝得太快。 2. It wasn't unusual to find hundreds of computers within one company infected by viruses transmitted via email attachments. (para. 2) It was often the case that in the same company hundreds of computers would have viruses because the employees had opened email attachments containing these viruses 一家公司里的数百台计算机因为发送电子邮件附件而感染病毒,这是十分
1 Unit 8 Computers and Security In this unit, you will ◼ first listen, and then talk about computers and security ; ◼ read about computer viruses and the damage they may inflict ; ◼ learn new words and expressions; ◼ write about what should be done to protect against computer viruses ; ◼ practice the use of omission and emphasis ; ◼ write an Internet notice check goals; ◼ visit Culture Salon for an introduction to milestones in computer history I. Listen and Talk The photos are all related to Computers and Security . Describe them to your classmates with the help of the following question. 1. What are the basic skills you need to be effective in using computers ? 2. How do you think the Internet can help in our modern life? Explain. 3. How can you avoid being a victim of cybercrime? II. Read and Explore Passage AYou Are the Weakest Link, Goodbye Lead-in Questions 1. Do you often download free software from the Internet? Explain. 2. Have you installed anti-virus software on your computer? What is it? 3. Is it possible for us to find a way to get rid of computer viruses permanently? Notes to the Text 1. But those long lazy summers disappeared too fast. (para. 2) That summer doesn't last as long as we would like it to last. 那些长长的夏日,悠闲自得,可惜消逝得太快。 2. It wasn't unusual to find hundreds of computers within one company infected by viruses transmitted via email attachments. (para. 2) It was often the case that in the same company hundreds of computers would have viruses because the employees had opened email attachments containing these viruses. 一家公司里的数百台计算机因为发送电子邮件附件而感染病毒,这是十分
平常的事。 3. Companies now real ize that viruses arent" urban myths", and can have a serious impact on their operations. (para. 3) Companies now understand that viruses are not modern made-up stories, and they can do great harm to a company's operations 各家公司现在都意识到病毒并不是“现代神话”,而会严重影响到公司的实 际运作。 4. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against (para. 5 With the fast spread of information through networked computers and the Internet, a virus can reach many computers before anything can be done about it 通过网络和互联网,文件可以快速地传输,等到人们发现一种病毒并加以 防范时,病毒可能已经扩散到了相当的范围。 5. Complacency can set in when there is no perceived"action"on the virus front and no global crisis and the importance of being v igilant about viruses recedes in our users minds. ( para. 6) People may ignore viruses and stop worry ing about them when no major worldwide viruses have been reported recently, and the need to be very on guard against viruses is easily forgotten 若病毒战线没有能察觉到的“大动作”,也没有全球性的危机,人们就会变 得心安理得,对病毒保持警惕的重要性的意识就会在用户的脑子中渐渐淡化。 6. but the security of your computer system is only as strong as the weakest link. (para. 5) But the security of your computer system against viruses rests with its user who is actually the weakest point 公司的计算机系统安全与否实际上系于最薄弱的一个环节 7. However, the worry comes when employees start risking company security in pursuit of personal amusement. (para. 9) But the worry arises when employees start breaking the company security rules in order to amuse or entertain themselves by doing personal downloading from the Internet 但是,如果员工为了追求个人乐趣而置公司安全于不顾,就着实堪忧了。 8. Virus writers and hackers often use such software as the ideal "k ick -start" for their virus distribution. (para. 10) Virus writers and people who break into other people's computer files often use such software as the best means to get their viruses to start spreading 制造病毒者以及黑客们经常利用这类软件作为病毒扩散的理想开端 9. The potential threat should always be in the back of an employees mind and precautionary measures should be taken as a matter of course. (para. 11) Employees should always be aware of the possibility of a virus infection and they should take protective measures as their daily routine 员工的潜意识里应该随时留意潜在的危险,而且应该总是采取防范措施。 2
2 平常的事。 3. Companies now realize that viruses aren't "urban myths", and can have a serious impact on their operations. (para. 3) Companies now understand that viruses are not modern made-up stories , and they can do great harm to a company's operations. 各家公司现在都意识到病毒并不是“现代神话”,而会严重影响到公司的实 际运作。 4. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against. (para. 5) With the fast spread of information through networked computers and the Internet, a virus can reach many computers before anything can be done about it. 通过网络和互联网,文件可以快速地传输,等到人们发现一种病毒并加以 防范时,病毒可能已经扩散到了相当的范围。 5. Complacency can set in when there is no perceived "action" on the virus front and no global crisis and the importance of being vigilant about viruses recedes in your users' minds.(para. 6) People may ignore viruses and stop worrying about them when no major worldwide viruses have been reported recently, and the need to be very on guard against viruses is easily forgotten.. 若病毒战线没有能察觉到的“大动作”,也没有全球性的危机,人们就会变 得心安理得,对病毒保持警惕的重要性的意识就会在用户的脑子中渐渐淡化。 6. but the security of your computer system is only as strong as the weakest link.(para. 5) But the security of your computer system against viruses rests with its user who is actually the weakest point. 公司的计算机系统安全与否实际上系于最薄弱的一个环节 . 7. However, the worry comes when employees start risking company security in pursuit of personal amusement.(para. 9) But the worry arises when employees start breaking the company security rules in order to amuse or entertain themselves by doing personal downloading from the Internet. 但是,如果员工为了追求个人乐趣而置公司安全于不顾,就着实堪忧了。 8. Virus writers and hackers often use such software as the ideal "kick-start" for their virus distribution.(para. 10) Virus writers and people who break into other people's computer files often use such software as the best means to get their viruses to start spreading. 制造病毒者以及黑客们经常利用这类软件作为病毒扩散的理想开端。 9. The potential threat should always be in the back of an employee's mind and precautionary measures should be taken as a matter of course.(para. 11) Employees should always be aware of the possibility of a virus infection and they should take protective measures as their daily routine. 员工的潜意识里应该随时留意潜在的危险,而且应该总是采取防范措施
Related Information Personal Computer All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be The internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain. however. that these number in the millions and are increasing at a rapid rat An Internet user has access to a wide variety of services electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more Email Even with the multimed ia excitement of the Web, Electronic Mail(email)is the most frequently used application of the Internet Many people who have access to the internet at school. home. and work use the internet for no other purpose than to send and receive emai a Email allows computer users locally and worldwide to exchange messages Each user of email has a mailbox address to which messages are sent Messages sent through email can arrive within a matter of seconds Computer virus A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system a All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt It is highly recommended that you have Virus Protection installed in your computer before you consider download ing anything Macro virus Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable
3 Related Information ◼ Personal Computer All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. ◼ The Internet ◼ The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions and are increasing at a rapid rate. ◼ An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. ◼ Email ◼ Even with the multimedia excitement of the Web, Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. ◼ Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds. ◼ Computer Virus ◼ A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. ◼ All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. ◼ It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything. ◼ Macro Virus Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable
Melissa Melissa affects Word documents. If launched, the macro v irus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook's address book as an attachment The email subject line reads "Important Message from the name of someone], " and the message reads Here is that document you asked for. don,'t show anyone else: -) ■ The Love bug The Love Bug virus is also called the Loveletter Virus, or simply I Love You I The virus is circulating through email and affecting many customers. If run the virus could overwrite. jpg, mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient,'s address book The e-mail containing the virus typically carries a subject line of "ILOVEYOU Inside the mail is a short message saying"Kindly check the attached LOVELETTER coming from me"and an attachment named LOVE-LETTER-FOR-YOU txt vbs Summary of the text The weakest link in the protection of a company's computers against viruses is the individual computer user. There is a strong tendency that the employees assume it is the company's computer security experts' job to worry about the viruses and they can bring the problem under control. But everyone must do their share to prevent viruses. Any unsolicited email attachment or any untested type of software may contain a virus Even the best anti-virus software is not always effective and must be frequently updated. Constant education of all employ ees about viruses is the key to virus prevention. No one should ever be allowed to relax their defenses, even if this means the company must have some rules set that employees might not like Understanding the Text 1. Who do employees turn to for help when their computers are affected by a virus? They turned to the it staff in their company for help 2. What are the several malicious computer viruses mentioned in the passage? Viruses such as Melissa, the Love bug, etc have caused great damage to the world 3 Are employees always alert to computer viruses? Explain No, they aren't. They forget about the harm a computer virus may bring when that virus is off news headlines 4. What are the cases when employees might put their company at risk? They are putting their company at risk when they are opening unsolicited attachments and download ing unauthorized software
4 ◼ Melissa ◼ Melissa affects Word documents. If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook’s address book as an attachment. ◼ The email subject line reads "Important Message from [the name of someone]," and the message reads "Here is that document you asked for...don't show anyone else ;-)". ◼ The Love Bug The Love Bug virus is also called the Loveletter Virus, or simply I Love You. ◼ The virus is circulating through email and affecting many customers. If run, the virus could overwrite .jpg, .mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient's address book. The e-mail containing the virus typically carries a subject line of "ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me" and an attachment named LOVE-LETTER-FOR-YOU.txt.vbs. Summary of the Text The weakest link in the protection of a company's computers against viruses is the individual computer user. There is a strong tendency that the employees assume it is the company's computer security experts' job to worry about the viruses and they can bring the problem under control. But everyone must do their share to prevent viruses. Any unsolicited email attachment or any untested type of software may contain a virus. Even the best anti-virus software is not always effective and must be frequently updated. Constant education of all employees about viruses is the key to virus prevention. No one should ever be allowed to relax their defenses, even if this means the company must have some rules set that employees might not like. Understanding the Text 1. Who do employees turn to for help when their computers are affected by a virus? They turned to the IT staff in their company for help. 2. What are the several malicious computer viruses mentioned in the passage? Viruses such as Melissa, the Love Bug, etc. have caused great damage to the world. 3. Are employees always alert to computer viruses? Explain. No, they aren't. They forget about the harm a computer virus may bring when that virus is off news headlines. 4. What are the cases when employees might put their company at risk? They are putting their company at risk when they are opening unsolicited attachments and downloading unauthorized software
5. Do you agree with the author that the human factor is the most important to protect a company against virus attack? Explain Words and expressions 1. innocent: of things) harmless, knowing nothing of evil or wrong;(of people guiltless An innocent prank turned into disaster He was pronounced innocent of the charge 2. or so: about There will be twenty or so people at the party In another year or so, you will have forgotten all about him 3. encounter: meet or be faced by(something bad, esp a danger or a difficulty) meet The plane encountered a storm over the rockies He encountered many interesting people on his travels 4. infect: fill with disease, germs, give disease to(a person) This meat is infected because of the hot weather The flu virus infected almost the entire class 5. transmit: send or pass from one person, place or thing to another The material was transmitted by satellite throughout the world This kind of d isease sometimes transmits to humans 6. in place: in the right or proper place He nodded approvingly, his wide grin still in place The books were in place on the shelves 7. adequate: enough for the purpose What should be done to assure adequate supplies of energy? There was adequate rain and snow last winter. 8. update: make more modern or up-to-date The information will need updating from time to time The speech had been corrected and updated after the last-minute reports from abroad 9. identify: prove or show who or what somebody is or something is Could you identify your umbrella among a hundred others? The light was too dim for me to identify her
5 5. Do you agree with the author that the human factor is the most important to protect a company against virus attack? Explain. Words and Expressions 1.innocent: ( of things) harmless, knowing nothing of evil or wrong; (of people) guiltless • An innocent prank turned into disaster. • He was pronounced innocent of the charge. 2. or so: about • There will be twenty or so people at the party. • In another year or so, you will have forgotten all about him. 3. encounter: meet or be faced by (something bad, esp. a danger or a difficulty); meet unexpectedly\ • The plane encountered a storm over the Rockies. • He encountered many interesting people on his travels. 4. infect: fill with disease, germs, give disease to (a person) • This meat is infected because of the hot weather. • The flu virus infected almost the entire class. 5. transmit: send or pass from one person, place or thing to another • The material was transmitted by satellite throughout the world. • This kind of disease sometimes transmits to humans. 6. in place: in the right or proper place • He nodded approvingly, his wide grin still in place. • The books were in place on the shelves. 7. adequate: enough for the purpose • What should be done to assure adequate supplies of energy? • There was adequate rain and snow last winter. 8. update: make more modern or up-to-date • The information will need updating from time to time. • The speech had been corrected and updated after the last-minute reports from abroad. 9. identify: prove or show who or what somebody is or something is • Could you identify your umbrella among a hundred others? • The light was too dim for me to identify her
10. set in: begin and (probably) continue Fortunately the wound was treated before infection could set in I must try and get my garden tid ied up before the bad weather sets in 11. in the first place: at an earlier appropriate time Why didn,'t you tell us that in the first place? Nobody can remember what was agreed in the first place 12. at risk: in danger The disease is spreading, and all children under 5 are at risk The economy sill fall further, putting more jobs at risk 13. come across as: seem to be jud ging from behavior or actions) Example He came across(to me)as(being ) quite a nice person He came across to voters as(being) honest, sincere and hard- working 14.conflict: disagreement, opposition They tried to stir up conflicts between us No one expected this to be the last conflict between the two countries Passage b So Sorry to bug You Lead-in Questions 1. How often do you email your friends? 2. How would you solve the problem if your computer is inflicted by viruses 3. What would you do if you accidentally spread a virus? Related nformation Josh Quittner A graduate of Grinnell College and the Columbia School of Journalism, Joshua Quittner is manag ing editor of on magazine (formerly TIME Digital a He is responsible for the ed itorial direction of the magazine, development of storiesandtheexpansionofitswebsiteonmagazine.com Quittner also writes a weekly column in the "Personal Time"section entitled Your Techno logy which combines practical ad vice with engaging personal stories Quittner was named one of top 20 most influential technology journal ists two years in a row by ADWEEK's Technology Marketing magazine
6 10. set in: begin and (probably) continue • Fortunately the wound was treated before infection could set in. • I must try and get my garden tidied up before the bad weather sets in. 11. in the first place: at an earlier, more appropriate time • Why didn't you tell us that in the first place? • Nobody can remember what was agreed in the first place. 12. at risk: in danger • The disease is spreading, and all children under 5 are at risk. • The economy sill fall further, putting more jobs at risk. 13. come across as: seem to be (judging from behavior or actions) Example: • He came across (to me) as (being) quite a nice person. • He came across to voters as (being) honest, sincere and hard-working. 14. conflict: disagreement , opposition • They tried to stir up conflicts between us. • No one expected this to be the last conflict between the two countries. Passage B So Sorry to Bug You Lead-in Questions 1. How often do you email your friends? 2. How would you solve the problem if your computer is inflicted by viruses? 3. What would you do if you accidentally spread a virus? Related Information ◼ Josh Quittner ◼ A graduate of Grinnell College and the Columbia School of Journalism, Joshua Quittner is managing editor of ON magazine (formerly TIME Digital) a monthly guide to personal technology. ◼ He is responsible for the editorial direction of the magazine, development of stories and the expansion of its web site, onmagazine.com. ◼ Quittner also writes a weekly column in the "Personal Time" section entitled "Your Technology," which combines practical advice with engaging personal stories. ◼ Quittner was named one of top 20 most influential technology journalists two years in a row by ADWEEK's Technology Marketing magazine
Mexico Mexico is the largest Spanish-speaking country and the second-largest Roman Catholic nation in the world. Mexico City, the capital, is one of the worlds fastest-growing metropolitan areas with an estimated population of 18 million Ancient Native American civilizations flourished there for centuries before the Spanish conquest in the 1 6th century. It was ruled as a colony for more than 300 years and gained independence on Oct 4, 1824 ■ Yucatan, Mexico The Yucatan peninsula has been the home of the Maya for at least 4,000 years Breathtaking sculpture and mural-covered pyramids stand witness to th magnificent civilization, which formerly existed here. Today, thatch-covered houses and hand-embroidered costumes of villagers are v ivid reminders that the Maya are still very much alive The andromeda strain ANDROMEDA STRAINS concept is simple: " A top-secret government team investigating rare diseases, some so bizarre they seem to come from outer space "It combines a classic science-fiction theme(disaster virus) with a contemporary distrust of political affairs ■ The Homepage virus VBSWG X, also known as Homepage, is an e-mail worm found on May 9th Homepage worm spreads using Outlook Application. It sends messages with the content as shown in the picture right When the attached file is executed the worm will send(mass mail) itself to each recipient in every address book. Then the worm tries to hide the mass mailing. It deletes all messages from Inbox and deleted Items folders which contain a subject Homepage The Philippines The Philippines is an independent island nation in the western Pacific Ocean some 800 km off the coast of mainland Southeast Asia. Over centuries foreign elements have been added to the native Malay culture, creating a culture that eflects both eastern and Western influences Notes to the text 1. I had unleashed a computer virus. (para. 2) I had sent a virus out 我释放了一个计算机病毒。 2. I felt like the doctor in The Andromeda Strain; the clock was outracing me. (para
7 ◼ Mexico Mexico is the largest Spanish-speaking country and the second-largest Roman Catholic nation in the world. Mexico City, the capital, is one of the world's fastest-growing metropolitan areas with an estimated population of 18 million. ◼ Ancient Native American civilizations flourished there for centuries before the Spanish conquest in the 16th century. It was ruled as a colony for more than 300 years and gained independence on Oct. 4, 1824. ◼ Yucatan, Mexico The Yucatan peninsula has been the home of the Maya for at least 4,000 years. Breathtaking sculpture and mural-covered pyramids stand witness to the magnificent civilization, which formerly existed here. Today, thatch-covered houses and hand-embroidered costumes of villagers are vivid reminders that the Maya are still very much alive. ◼ The Andromeda Strain ANDROMEDA STRAIN's concept is simple: "A top-secret government team investigating rare diseases, some so bizarre they seem to come from outer space." It combines a classic science-fiction theme (disaster virus) with a contemporary distrust of political affairs. ◼ The Homepage Virus VBSWG.X, also known as Homepage, is an e-mail worm found on May 9th, 2001. Homepage worm spreads using Outlook Application. It sends messages with the content as shown in the picture right: When the attached file is executed, the worm will send (mass mail) itself to each recipient in every address book. Then the worm tries to hide the mass mailing. It deletes all messages from Inbox and Deleted Items folders which contain a subject 'Homepage'. ◼ The Philippines The Philippines is an independent island nation in the western Pacific Ocean some 800 km off the coast of mainland Southeast Asia. Over centuries foreign elements have been added to the native Malay culture, creating a culture that reflects both Eastern and Western influences. Notes to the Text 1. I had unleashed a computer virus.(para. 2) I had sent a virus out. 我释放了一个计算机病毒。 2. I felt like the doctor in The Andromeda Strain; the clock was outracing me. (para
I felt like the doctor in a famous sc ience fiction horror movie the virus was 我感觉自己像是电影《人间大浩劫》里的博士一般,跟时间赛跑 3. Each had a file attached, as doom-laden as a warhead. (para. 3) Each message contained a dangerous virus in the attachment, like a fatal bomb 每一封都有一个附件,像弹头一般的不怀好意。 4. Double argh!(para. 5 (t was)extremely embarrassing and disgusting! 天呐!天呐! 5. The worst part was that many of the people I had emailed were newbies subscribers who had emailed me for help in connection with this column. (para. 6) subscriber who thnt gmail t me for ad vice abou the online computer colume 最糟糕的是,我的邮件收件人很多都是新手,这些订户发过邮件给我,要 我就这个栏目提供帮助。 6. Finally, if you get an email from me whose subject is"Homepage, "run.(para. 8) Finally, if you get an email from me with the title "Homepage, "delete it Immediate 最后,要是你收到我的电子邮件,主题是“主页”,赶紧跑开 Summary of the text The author, who writes an online computer column and ought to know better, had his personal computer attacked by a virus when he opened an attachment from former girlfriend without using virus protection. The computer automatically forwarded the attachment to all the addresses in the authors address book. He quickly stopped 65 infected messages from being sent, but soon received 50 replies from other people stating that the attachment to his message contained a virus. Then he wrote to everyone in his address book apolog izing and warning them of the virus Fortunately most of them forgave him. Only one subscriber to his column asked to be deleted from its mail ing list. The lesson of this story is to use virus protection and ignore unexpected attachments Words and expressions 1 correspond: exchange letters(with Janet and Bob corresponded for many years before they met He regularly corresponds with his brother
8 3) I felt like the doctor in a famous science fiction horror movie; the virus was spreading faster than I could stop it. 我感觉自己像是电影《人间大浩劫》里的博士一般,跟时间赛跑。 3. Each had a file attached, as doom-laden as a warhead. (para.3) Each message contained a dangerous virus in the attachment, like a fatal bomb. 每一封都有一个附件,像弹头一般的不怀好意。 4. Double argh!(para. 5) (It was) extremely embarrassing and disgusting! 天呐!天呐! 5. The worst part was that many of the people I had emailed were newbies - subscribers who had emailed me for help in connection with this column. (para. 6) The worst thing was that many of the people I had emailed were new subscribers who sent emails to me for advice about the online computer column . 最糟糕的是,我的邮件收件人很多都是新手,这些订户发过邮件给我,要 我就这个栏目提供帮助。 6. Finally, if you get an email from me whose subject is "Homepage," run. (para. 8) Finally, if you get an email from me with the title "Homepage," delete it immediately. 最后,要是你收到我的电子邮件,主题是“主页”,赶紧跑开。 Summary of the Text The author, who writes an online computer column and ought to know better, had his personal computer attacked by a virus when he opened an attachment from a former girlfriend without using virus protection. The computer automatically forwarded the attachment to all the addresses in the author's address book. He quickly stopped 65 infected messages from being sent, but soon received 50 replies from other people stating that the attachment to his message contained a virus. Then he wrote to everyone in his address book apologizing and warning them of the virus. Fortunately most of them forgave him. Only one subscriber to his column asked to be deleted from its mailing list. The lesson of this story is to use virus protection and ignore unexpected attachments. Words and Expressions 1. correspond: exchange letters (with) • Janet and Bob corresponded for many years before they met. • He regularly corresponds with his brother
2. swear: state firmly He said he was there all the time but i swear i never saw him I could have sworn that there was somebody in the next room remember I can recall stories that my mother told me years ago I still can recall your saying to me that you were going to be a lawyer. 4. assume. take as true You assume his innocence before hearing the evidence against him Scientists assume that there is no animal life on mars 5. figure out: work out; understand by thinking It didn't take Jimmie very long to figure out the situation I wish i could figure out how their minds work 6. get rid of: free oneself from(something unwanted) It took me a month to get rid of my cough The old machine is no use; I'll be glad to get rid of it 7. delete: cut out(esp. something written or printed) If you delete 50 words, we can put the whole story on one pa It will be cleared if you delete that last paragraph 8. irony: a course of events or a cond ition which has the opposite result from what is expected, usually a bad result It is one of the ironies of life that those with most money are often the most unhappy What an irony to be offered three jobs in one week after being out of work for a year Understanding the text 1. What happened to the author when he clicked Work Offline? He found 65 infected messages ready to be sent 2. What did the author do when he knew that his computer was attacked by a virus? He deleted the message and emptied the Recycle Bin. Then he went to the Web for 3. What is the worst part of the Homepage virus? It can mail itself to others in one's address book
9 2. swear: state firmly • He said he was there all the time, but I swear I never saw him. • I could have sworn that there was somebody in the next room. 3. recall: remember • I can recall stories that my mother told me years ago. • I still can recall your saying to me that you were going to be a lawyer. 4. assume: take as true • You assume his innocence before hearing the evidence against him. • Scientists assume that there is no animal life on Mars. 5. figure out: work out; understand by thinking • It didn't take Jimmie very long to figure out the situation. • I wish I could figure out how their minds work. 6. get rid of: free oneself from (something unwanted) • It took me a month to get rid of my cough. • The old machine is no use; I'll be glad to get rid of it. 7. delete: cut out (esp. something written or printed) Example: • If you delete 50 words, we can put the whole story on one page. • It will be cleared if you delete that last paragraph. 8. irony: a course of events or a condition which has the opposite result from what is expected, usually a bad result • It is one of the ironies of life that those with most money are often the most unhappy. • What an irony to be offered three jobs in one week after being out of work for a year. Understanding the Text 1. What happened to the author when he clicked Work Offline? He found 65 infected messages ready to be sent. 2. What did the author do when he knew that his computer was attacked by a virus? He deleted the message and emptied the Recycle Bin. Then he went to the Web for help. 3. What is the worst part of the Homepage virus? It can mail itself to others in one's Address Book
4. What is the author's advice to those who get an email message with an attachment? lever open it, unless they are told to expect it 5. What are the ve ways to protect your computer from being attacked by viruses?
10 4. What is the author's advice to those who get an email message with an attachment? Never open it, unless they are told to expect it. 5. What are the effective ways to protect your computer from being attacked by viruses?