Millions of people are now using what are called“peer-to-peer”networks. Basically, you

Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.

  Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”

   Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.

  Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”

   The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.

Thieves are trying to get access to your computer in order to      .

  A. find your personal information

  B. see how your computer is working

  C. talk with you

  D. help you with your system

Why did Beth Pope use peer-to-peer software?

  A. Because she wanted others to use her information.

  B. Because she wanted to try it.

  C. Because she wanted to increase her music library.

  D. Because she wanted to get others' financial information.

Susan Koeppen tried to       .

  A. warn the readers of dangers of sharing music files with others.

  B. warn the readers not to share music files with others.

  C. tell us a true and funny story

  D. advertise the peer-to-peer networks.

From the passage we get to know       .

  A. we shouldn't believe others.

  B. computers make our life easy and comfortable.

  C. softwares help us to share music with others

  D. everything has two sides, the good side and the bad one

答案

【小题1】A

【小题2】C

【小题3】A

【小题4】D


解析:

相关题目

抗日战争胜利后,共产党同国民党进行的重庆谈判是
抗日战争胜利后,共产党同国民党进行的重庆谈判是一场政治斗争。下列对这场斗争的评述,不正确的是 A 国民党进行谈判是政治欺骗 B 中国人
在区间[-1,1]上随机取一个数x,的值介于0到之间的概率为 A.
在区间[-1,1]上随机取一个数x,的值介于0到之间的概率为 A.          B.        C.        D.  
已知是一元二次方程的两个实数根. (1)是否存在实数,使
已知是一元二次方程的两个实数根. (1)是否存在实数,使成立?若存在,求出的值;若不存在,请你说明理由; (2)求使为负整数的实数的整数值.
已知向量a=(2,6),b= ,若a∥b,则        .
已知向量a=(2,6),b= ,若a∥b,则        .
已知命题,命题恒成立。若为假命题,则实数的取值范围为
已知命题,命题恒成立。若为假命题,则实数的取值范围为(     A.      B.   C.     D.
在我国汽车市场上,既有自主品牌的汽车,也有进口汽车和中外
在我国汽车市场上,既有自主品牌的汽车,也有进口汽车和中外合资企业生产的汽车。以下选项中,可能使我国消费者享受到更低汽车价格的因素有( ) ①国
“每个生产队办一个食堂,社员家里不开伙,铁锅铜勺都献
“每个生产队办一个食堂,社员家里不开伙,铁锅铜勺都献出去大炼钢铁,只管到时候到食堂打饭打菜。”这种现象发生在(   )A.抗日战争时期   
下列各元素,最易形成离子化合物的是①第三周期第一电离
下列各元素,最易形成离子化合物的是①第三周期第一电离能最小的元素    ②外围电子构型为2s22p6的原子③2p能级为半满的元素    ④电负性最大的

最新题目