Typing your password or credit card number into a computer is a moment’s work. But if yo

Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.

       As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.

       When you type in a password ,it is stored in random access memory(RAM), where it is held temporarily until other data overwrites it or the computer is switched off.

       But every so often ,the computer copies the contents of its RAM onto hard disk ,where it is easy prey for a hacker ,who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM ,the more likely it is to be copied onto the disk ,where it stays until it is overwrittenwhich might not happen for years.

       Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next ,Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer ,the Windows login script and Apache server software.

       In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained .Some of the tested software even copied the sensitive information ,apparently without restraint.

       This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.

1Which of the following statements is true according to the passage?

       AIt is secure to use your password as long as you hit the Return key.

       BYour personal details is likely to be in danger if you spend more time on the web.

       CYour password will be safe if you have some safeguards.

       DNever allowing your computer to store your passwords will be safe.

2Which of the following is NOT the reason for the unsafely of a password?

       AIt will be stored in RAM.

       BIt will be copied onto hard disk.

       CIt might not be overwritten.

       DIt will disappear as soon as you hit the return key.

3Tal Garfinkel and his team measured the extent of security of        .

       Asimulating the working of a complete computer system

       Btagging sensitive data

       Cpassing through the system

       Drunning common software

4What can be inferred from the passage?

       AThe length of the time the information is stored is not limited.

       BThe programs can not retain the information.

       CThe security problem should be paid more attention to.

       DSome sensitive information has been copied.

答案

BDAC

相关题目

如图所示,有利于实现社会结构由“金字塔型“向“橄榄型”
如图所示,有利于实现社会结构由“金字塔型“向“橄榄型”转变的措施是 ①改革税制增加社会各阶层收入 ②不断加强社会保障体系的建设 ③提高初次
The research project has only been under way for three months, so it’s too ear
The research project has only been under way for three months, so it’s too early to ____________ (评价) its success.
在长期的生产劳动和社会生活中,东北人民创作了富有东北
在长期的生产劳动和社会生活中,东北人民创作了富有东北地方特色的二人转节目。这说明 ①人们在社会生活中获得和享用文化②人们在实践中创造和
请标出通电螺线管两端的极性,并画出图中放置的小磁针北
请标出通电螺线管两端的极性,并画出图中放置的小磁针北极在螺线管通电是的受力方向(黑色部分表示小磁针的N级)。
—How was your vacation there? —Great!Although the weather was ______,I h
—How was your vacation there? —Great!Although the weather was ______,I had a good time there. A.fine  B.awful  C.sunny
如图所示,一列简谐横波沿x轴正方向传播,实线表示t=0时刻
如图所示,一列简谐横波沿x轴正方向传播,实线表示t=0时刻的波形,虚线表示t=0.7s时刻的波形。则这列波的 A.波长为4m B.周期可能为0.4s C.频率可能
20国集团领导人第五次会议于2010年11月12日在韩国首都首尔举
20国集团领导人第五次会议于2010年11月12日在韩国首都首尔举行。峰会上发表题为《再接再厉 共促发展》的讲话。为实现促进世界经济强劲、可持续、平
         Most British telephone cards are just plain green, but card co
         Most British telephone cards are just plain green, but card collecting is becoming a popular hobby in Britain and collectors even have their own magazine, International Telephone C

最新题目