节目资讯
刊物:生活知识家
日期:2009-02-23
难易度:High
关键字…
节目资讯
刊物:生活知识家
日期:2009-02-23
难易度:High
关键字:hack, tactic, spine, breach, clarify, airtight, mo
Oh, hi, everyone.
Welcome back to Studio Classroom Worldwide.
We are in our lesson this month.
A technology article.
Normally we hear people complaining that they need to be rescued from computer
hackers, right?
Well, today’s lesson is titled:
Hackers to the Rescue?
There are computer hackers out there who actually want to help others.
They want to help people.
They’re good hackers.
In fact, good hackers have a special name.
Let’s find out what that name is after we preview these key words.
The first is breach.
It won’t be long before the water breaches this dam.
It’s just too old.
The second is clarify as in:
You need to clarify your official statement.
The police still have many questions.
OK.
Let’s get back to the article.
This portion of the reading begins on line thirteen.
Hackers to the Rescue?
Thankfully, McOmie uses his knowledge for good.
His team does freelance work for banks and businesses in need of airtight
security.
Their mission to breach sophisticated security systems and then report back on
how they did it.
Companies use the information to protect their systems from real attacks.
Hackers both good and bad.
People usually think of a ”hacker” as a person who breaks into computer systems
to steal information or money,
or simply to cause mischief.
But hacking can be used for both good and evil.
And hackers use different monikers to clarify their motives.
Hackers who commit crimes are known as ”Black Hat” hackers;.
those who fight to prevent crime are known as ”White Hat” hackers.
So even though Luke, Ryan and Chris could send chills down any security
professional’s spine in fear,
they still use their knowledge for good.
I’m really thankful about that because if they use their knowledge for bad, then
they could do a lot of harm to a lot of people,
and they could probably steal a lot of money.
But they’re not out to do bad.
They’re out to do good.
So what kind of um, work does this team do, Chip?
Well, our article says that this team does freelance work.
So that means they don’t work for a company or a single company.
They actually are employed by themselves.
They are self-employed.
And they sell their work to several different companies and businesses.
OK, and these businesses all are in need of the same thing.
They all want the same thing.
And that is airtight security.
Now if something is airtight, it means no air can go in or out of it.
It’s secure.
And the kind of security you want at a multimillion-dollar company is airtight
security,
meaning nobody can break into your computer system and steal your personal
information.
And because so many businesses are wanting their security systems to be
airtight,
the mission of this team is to breach sophisticated security systems.
And breach is one of our Work Bank words for the day.
It sure is. And if you breach something, then you break it or...
Here we’re talking about breaking into something.
You know, you could breach a promise, and that means you break your promise.
But here we’re talking about security systems.
And they’re very sophisticated.
They’re very advanced.
And what these guys do is they break into them and then they report back on how
they did it.
This is a very unique job.
These... this team, these guys are given permission by major corporations to
break into their systems.
I think that’s a pretty cool job.
It sure is.
It shows that these companies trust them a lot, right?
Because they will... they do have access to a lot of that personal information,
but they’re not out to take or steal the information.
They’re using their... their knowledge of breaking into the systems to help the
companies prepare themselves from real attacks,
to protect themselves from real attacks by bad hackers.
That’s right.
Letting the companies know where the company’s weak spots are,
where their... were their security systems are not exactly airtight.
Exactly.
Well, I’m glad to hear that there are good and bad hackers that not all hackers
are bad.
Because like our author, I usually think of a hacker as a person who does bad
things who breaks into the computer systems,
who steals the money or who simply causes mischief.
I remember when I was a teacher, Chip, and we had some students who tried to
hack into the computer systems at school,
and I just thought of them as naughty kids, you know.
That’s right.
Kids who like to cause mischief or trouble.
Exactly.
But some hackers are good and hacking can be used for both good and evil.
That’s right.
And our article refers to ”Black Hat” hackers and ”White Hat” hackers.
That’s hard to say.
White Hat hackers.
It’s almost a tongue twister, isn’t it?
It is a little bit, yeah.
And so Black Hat hackers are hackers that have... mm... criminal motivations,
or their desires are to steal.
Exactly.
So Black is bad, right?
And White is good.
So therefore, we have different monikers.
And the different monikers clarify the motives of the hacker.
That’s kind of a tough sentence.
So I think we should go back to that word:
moniker.
That’s right.
First of all, a moniker is another word for a nickname.
Actually most people know this, if... if my friends know this about me.
I go by the name Chip which is a nickname or a moniker of my real name
Christopher.
Ah, so Chip is your moniker.
So again, it’s like a nickname for a person.
And that’s why we call these hackers uh, White Hat hackers or Black Hat hackers.
And this moniker clarifies the hackers’ motives.
You see, each person has different motives. Some might have the motive to steal
information.
Others have the motive to help a company.
And if you clarify something, you make it clear.
So that moniker makes it clear what the hacker is going to do.
That’s right.
To make something clear or to clarify, to make it easily understood.
So these monikers help make their motivations more easily understood to
everybody.
Right.
So just to review again,
the hackers who commit crimes are known as the Black Hat hackers.
And those who fight to prevent crime or to stop crime are known as White Hat
hackers.
So if you’re a hacker out there, I sure hope you’re a White Hat hacker.
Yeah, I think so.
I... I think I...
It would be very tempting to be a Black Hat hacker.
But I think, I hope, if I had those tactics and skills,
I would want to be a White Hat hacker as well.
I think we’re going to go to a skit now.
Thanks for joining us.
Hackers to the rescue.
Whoa!
Who are you?
I’m a skilled computer hacker.
Uh, what kind of systems do you hack into?
Almost every kind.
Financial institutions, law firms, multimillion-dollar companies and top-secret
laboratories.
Oh, you have tactics that send chills down my spine.
Never fear.
Never fear.
I only use my knowledge for good.
Phew!
Very happy to hear that.
My team does freelance work for banks and businesses in need of airtight
security.
Good for you.
We breach security systems and then report how we did it.
Oh, that’s important information.
Yes.
Companies use it to protect themselves from real attacks.
That’s great.
But don’t hackers break into computers systems, steal information and money?
Not always.
Hacking can be used for good or evil.
Can you please clarify your motives?
Are you a Black Hat hacker that commits crimes?
No, no.
I’m a White Hat hacker.
I flight to prevent crimes.
That’s why you’re wearing a white hat.
Thank you, Mr. White Hat hacker.
(Backgroud Noise).
(Music).
(Chinese).
And that concludes our Language Tips today.
See you tomorrow.
Well, most of the time we read news about hackers.
That’s discouraging or even frightening to us.
Hackers can cause a lot of trouble, right?
But I think it’s pretty refreshing to learn that there are computer hackers who
actually want to help prevent crime.
Friends, we’re out of time.
But we’ll have more of this technology lesson tomorrow.
We hope you join us for it then.
And we hope that you have a great day.
From all of us here at Studio Classroom Worldwide, bye-bye.
(Music).