Millions of people are now using what are called“peer-to-peer”networks. Basically, you

Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.

  Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”

   Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.

  Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”

   The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.

Thieves are trying to get access to your computer in order to      .

  A. find your personal information

  B. see how your computer is working

  C. talk with you

  D. help you with your system

Why did Beth Pope use peer-to-peer software?

  A. Because she wanted others to use her information.

  B. Because she wanted to try it.

  C. Because she wanted to increase her music library.

  D. Because she wanted to get others' financial information.

Susan Koeppen tried to       .

  A. warn the readers of dangers of sharing music files with others.

  B. warn the readers not to share music files with others.

  C. tell us a true and funny story

  D. advertise the peer-to-peer networks.

From the passage we get to know       .

  A. we shouldn't believe others.

  B. computers make our life easy and comfortable.

  C. softwares help us to share music with others

  D. everything has two sides, the good side and the bad one

答案

【小题1】A

【小题2】C

【小题3】A

【小题4】D


解析:

相关题目

某承包户承包了两块鱼塘,一块准备放养鲫鱼,另一块准备
某承包户承包了两块鱼塘,一块准备放养鲫鱼,另一块准备放养鲤鱼,现知放养这两种鱼苗时都需要鱼料A、B、C,每千克鱼苗所需饲料量如下表:鱼类
下列关于平均速度和瞬时速度的说法中正确的是    A.做变
下列关于平均速度和瞬时速度的说法中正确的是    A.做变速运动的物体在相等时间间隔内的平均速度是相同的    B.瞬时速度就是运动物体在一段
下列离子反应方程书写正确的是( ) A.H2O+H2O⇌H3O++OH﹣  B
下列离子反应方程书写正确的是( ) A.H2O+H2O⇌H3O++OH﹣  B.CO32﹣+2H2O⇌H2CO3+2OH﹣ C.Ca(OH)2+2H+⇌Ca2++2H2O    D.Al3++3H2O═Al(OH)3↓+3H+
19世纪末20世纪初,世界资本主义发展的新趋势对中国历史产
19世纪末20世纪初,世界资本主义发展的新趋势对中国历史产生了什么主要影响?中国民族资产阶级为此先后进行了哪些重要活动?这些活动有何突出特征?
读“太阳辐射中各种波长的光所占比例(%)图,完成: 太
读“太阳辐射中各种波长的光所占比例(%)图,完成: 太阳辐射分为三部分,其中A、B、C分别代表 A.红外光、紫外光、可见光  B.紫外光、可见光
该文中共有十处错误,每句中最多有两处,错误涉及一个单词的
该文中共有十处错误,每句中最多有两处,错误涉及一个单词的增加、删除或修改。 增加:在缺词处加一个漏字符号(∧), 并在此符号下面写出该加的词。
1932年,英国外交大臣奥斯汀•张伯伦在评论国际形势时说:
1932年,英国外交大臣奥斯汀•张伯伦在评论国际形势时说:“世界近两年正在倒退,各国相互之间不是更加接近,不是在增进友好的程度,不是在向稳
人们总以为,倘要表现人物的寂寞、凄凉,最好是将他(她
人们总以为,倘要表现人物的寂寞、凄凉,最好是将他(她)放在孤身独处的清秋,因为那最能烘托人物的凄清心境。但《涉江采芙蓉》在这一点上却

最新题目