Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Магистры ВМИ, ММ.doc
Скачиваний:
27
Добавлен:
16.03.2016
Размер:
542.72 Кб
Скачать
    1. Variants

  1. Attachment: LOVE-LETTER-FOR-YOU.TXT.vbs Subject Line: ILOVEYOU Message Body: kindly check the attached LOVELETTER coming from me.

  2. Attachment: Very Funny.vbs Subject Line: fwd: Joke Message Body: empty

  3. Attachment: mothersday.vbs Subject Line: Mothers Day Order Confirmation Message Body: We have proceeded to charge your credit card for the amount of $326.92 for the mothers day diamond special. We have attached a detailed invoice to this email. Please print out the attachment and keep it in a safe place. Thanks Again and Have a Happy Mothers Day! mothersday@subdimension.com

  4. Attachment: virus_warning.jpg.vbs Subject Line: Dangerous Virus Warning Message Body: There is a dangerous virus circulating. Please click attached picture to view it and learn to avoid it.

  5. Attachment: protect.vbs Subject Line: Virus ALERT!!! Message Body: a long message regarding VBS.LoveLetter.A

    1. Legislative aftermath

As there were no laws against virus-writing at the time, on August 21, 2000, the prosecutors dropped all charges against Onel A. de Guzman in a resolution signed by Jovencito Zuno. The original charges brought against de Guzman dealt with the illegal use of passwords for credit card and bank transactions. The Philippines E-Commerce Law (Republic Act No. 8792), passed on June 14, 2000, laid out penalties for cybercrime. Under the law, those who spread computer viruses or otherwise engage in cybercrime (including copyright infringement and software cracking) can be fined a minimum of 100,000 pesos (about USD$2,000), and a maximum commensurate with the damage caused, and imprisoned for six months to three years.

4. Answer the questions to the text:

  1. What kind of attachment was in the ILOVEYOU worm?

  2. In what language was the ILOVEYOU worm written?

  3. When was the ILOVEYOU worm detected?

  4. Who created the Barok trojan?

  5. What action did the Pentagon take in order to protect itself from the ‘I Love You’ virus? Why was this virus so dangerous and harmful?

  6. Why did it attack only Windows Operating Systems?

  7. What legal consequences should be faced by the authors of computer viruses?

  8. What action can each computer user take to protect their computers against computer worms?

5. There are several different variants of emails with this virus in the article. Write your own variant of email that will encourage people to open the attachment.

Text 16. The changing image of a hacker

1. Discuss the following questions in pairs:

  1. What is the difference between a skillful programmer and a hacker? What is the main purpose of a hacker’s actions?

  2. Can you give any examples of the well-known hackers?

  3. According to the title of the text, the image of a hacker changed in the course of time. Can you suggest how and why it happened?

2. Match the synonyms:

    1. to encounter

    2. to flourish in

    3. attainment

    4. to make the most of

    5. a tiny amount of

    6. rudimentary

    7. to crack

    8. illicit

    9. notorious

    10. to prosecute

      1. elementary

      2. to break

      3. to pursue

      4. a very small quantity of

      5. achievement

      6. infamous

      7. to succeed in

      8. to use in the best way

      9. illegal

      10. to meet

Using the words from the first column in part A) make up word combinations with the words given below. Translate the word combinations into Russian:

academic; the copy protection; criminals; people; memory; hackers; graphics; bulletin boards; machines