Millions of people are now using what are called“peer-to-peer”networks. Basically, you

Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.

  Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”

   Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.

  Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”

   The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.

Thieves are trying to get access to your computer in order to      .

  A. find your personal information

  B. see how your computer is working

  C. talk with you

  D. help you with your system

Why did Beth Pope use peer-to-peer software?

  A. Because she wanted others to use her information.

  B. Because she wanted to try it.

  C. Because she wanted to increase her music library.

  D. Because she wanted to get others' financial information.

Susan Koeppen tried to       .

  A. warn the readers of dangers of sharing music files with others.

  B. warn the readers not to share music files with others.

  C. tell us a true and funny story

  D. advertise the peer-to-peer networks.

From the passage we get to know       .

  A. we shouldn't believe others.

  B. computers make our life easy and comfortable.

  C. softwares help us to share music with others

  D. everything has two sides, the good side and the bad one

答案

【小题1】A

【小题2】C

【小题3】A

【小题4】D


解析:

相关题目

已知函数f(x)=log2(x+1),将函数y=f(x)的图象向左平移一个单
已知函数f(x)=log2(x+1),将函数y=f(x)的图象向左平移一个单位,再将图象上所有点的纵坐标伸长到原来的2倍(横坐标不变),得到函数y=g(x)的图象.求
下列实验误差分析错误的是 A.用润湿的pH试纸测稀碱溶液的p
下列实验误差分析错误的是 A.用润湿的pH试纸测稀碱溶液的pH,测定值偏小 B.用容量瓶配制溶液,定容时俯视刻度线,所配溶液浓度偏小 C.滴定前滴
中学化学中很多“规律”都有其使用范围,下列根据有关“
中学化学中很多“规律”都有其使用范围,下列根据有关“规律”推出的结论合理的是     A.通入NaClO溶液中能生成HClO2根据较强酸可以制取较弱酸的
中亚5国与我国接壤的国家有(    )   A.土库曼斯坦、哈
中亚5国与我国接壤的国家有(    )   A.土库曼斯坦、哈萨克斯坦、塔吉克斯坦   B.塔吉克斯坦、吉尔吉斯斯坦、哈萨克斯坦   C.乌兹别克斯坦、哈
(08年南宁二中)4本不同的书全部分给3个同学,每人至少一
(08年南宁二中)4本不同的书全部分给3个同学,每人至少一本,则不同的分法有 种.(数字作答)
如图为一列在均匀介质中沿x轴正方向传播的简谐横波在某时
如图为一列在均匀介质中沿x轴正方向传播的简谐横波在某时刻的波形图,波速为2m/s,则    A. 质点P此时刻的振动方向沿y轴负方向     B. P点振幅比Q
下列有关实验操作、现象和解释或结论都正确的是实验操作
下列有关实验操作、现象和解释或结论都正确的是实验操作现象解释或结论 A将等体积的CH4和Cl2装入硬质大试管混合后,再将试管倒置于饱和食盐水中
弹簧振子在振动过程中,_________能和_________能相互转化;在
弹簧振子在振动过程中,_________能和_________能相互转化;在平衡位置_________能最大;在最大位移处_________能最大;振幅越小则振动能越_________.

最新题目