英语课要的英文演讲,关于计算机黑客方面的稿子,额.本人英语刚过四级,难度方面简单一些吧.

来源:学生作业帮助网 编辑:六六作业网 时间:2024/11/16 09:21:43
英语课要的英文演讲,关于计算机黑客方面的稿子,额.本人英语刚过四级,难度方面简单一些吧.英语课要的英文演讲,关于计算机黑客方面的稿子,额.本人英语刚过四级,难度方面简单一些吧.英语课要的英文演讲,关于

英语课要的英文演讲,关于计算机黑客方面的稿子,额.本人英语刚过四级,难度方面简单一些吧.
英语课要的英文演讲,关于计算机黑客方面的稿子,
额.本人英语刚过四级,难度方面简单一些吧.

英语课要的英文演讲,关于计算机黑客方面的稿子,额.本人英语刚过四级,难度方面简单一些吧.
Hacker culture
The roots of open source go back to computer science practices in the 1960s in academia and early computer user groups.Computer programmers frequently and informally shared code that they had written (鈥渉acked鈥?,quickly recycling and freely modifying code that solved common technical problems.Several different technical cultures began to develop,in parallel and semi-independently,practices similar to modern open-source development鈥攖hough without today's apparatus of common licenses and fast communication via the Internet.
The practice of sharing code was most effective and consistent among developers of the UNIX operating system,which was central to UNIX's early success.UNIX was first developed about 1970 at the Bell Laboratories subsidiary of the AT&T Corporation for use on the Digital Equipment Corporation PDP-7 minicomputer.As UNIX was adapted for various computer hardware systems,new variants of the operating system were developed.By the time that AT&T and Sun Microsystems,Inc.(a proponent of the UNIX variant developed at the University of California,Berkeley),finally decided to commercialize UNIX in 1987,a large segment of computer manufacturers and software developers decided that they needed an 鈥渙pen鈥 system and formed the Open Software Foundation.This set off the so-called 鈥淯NIX wars鈥 among minicomputer enthusiasts.
The shift from informal sharing of code to explicit open-source practice actually began a few years earlier with Richard M.Stallman.Stallman,a charismatic programmer who had thrived in the computer science environment at the Massachusetts Institute of Technology (MIT),collided with the increasing commercialization of software in the early 1980s.With more companies blocking access to their source codes,Stallman felt frustrated in his efforts to fix and improve these codes,so he decided that proprietary software must be publicly opposed.In 1984 he resigned from MIT to found the GNU Project,with the goal of developing a completely free UNIX-like operating system.(GNU is a recursive acronym for 鈥淕NU's not UNIX.In 1985 he delivered the GNU Manifesto outlining his program of free software development,formed the Free Software Foundation (FSF),and launched what he called the free software movement.
Stallman may have been the first to propose a label for what many computer programmers had been doing all along,but the term free software was never universally accepted among programmers.Before Stallman issued the GNU Manifesto,few programmers had any sense of being members of a social movement,and,once that sense developed,Stallman's label carried too much ideological freight for many of them.
In pursuit of his ends,Stallman wrote the General Public License (GPL),a document attached to computer code that would legally require anyone distributing that code to make available any of their modifications and distributed works (a property Stallman called 鈥渃opyleft鈥?.In effect,he sought to codify the hacker ethos.By the end of the century,the GPL was the license of choice for approximately half of all open-source projects.The other half was divided among non-copyleft licenses,notably the MIT license,and various licenses based on the Berkeley Software Distribution (BSD),developed in the 1970s at the University of California at Berkeley.
After 1987 the availability of Intel Corporation's 32-bit 386 microprocessor meant that inexpensive personal computers (PCs) had sufficient power to run UNIX鈥攊n fact,the SCO Group released the first version of UNIX to run on the 386 that year.Some programmers who had been key players in the development of the BSD variant of UNIX founded a project called 386BSD to port that variant to PCs.The Free Software Foundation's HURD operating system project also refocused on the 386-based PC.But both projects lagged at a critical time,386BSD because of a lawsuit and HURD because of unrealistic design goals.
Hacking
While breaching privacy to detect cybercrime works well when the crimes involve the theft and misuse of information,ranging from credit card numbers and personal data to file sharing of various commodities鈥攎usic,video,or child pornography鈥攚hat of crimes that attempt to wreak havoc on the very workings of the machines that make up the network?The story of hacking actually goes back to the 1950s,when a group of phreaks (short for 鈥減hone freaks鈥?began to hijack portions of the world's telephone networks,making unauthorized long-distance calls and setting up special 鈥減arty lines鈥 for fellow phreaks.With the proliferation of computer bulletin board systems (BBSs) in the late 1970s,the informal phreaking culture began to coalesce into quasi-organized groups of individuals who graduated from the telephone network to 鈥渉acking鈥 corporate and government computer network systems.
Although the term hacker predates computers and was used as early as the mid-1950s in connection with electronic hobbyists,the first recorded instance of its use in connection with computer programmers who were adept at writing,or 鈥渉acking,鈥 computer code seems to have been in a 1963 article in a student newspaper at the Massachusetts Institute of Technology (MIT).After the first computer systems were linked to multiple users through telephone lines in the early 1960s,hacker came to refer to individuals who gained unauthorized access to computer networks,whether from another computer network or,as personal computers became available,from their own computer systems.Although it is outside the scope of this article to discuss hacker culture,most hackers have not been criminals in the sense of being vandals or of seeking illicit financial rewards.Instead,most have been young people driven by intellectual curiosity; many of these people have gone on to become computer security architects.However,as some hackers sought notoriety among their peers,their exploits led to clear-cut crimes.In particular,hackers began breaking into computer systems and then bragging to one another about their exploits,sharing pilfered documents as trophies to prove their boasts.These exploits grew as hackers not only broke into but sometimes took control of government and corporate computer networks.
One such criminal was Kevin Mitnick,the first hacker to make the 鈥渕ost wanted list鈥 of the U.S.Federal Bureau of Investigation (FBI).He allegedly broke into the North American Aerospace Defense Command (NORAD) computer in 1981,when he was 17 years old,a feat that brought to the fore the gravity of the threat posed by such security breaches.Concern with hacking contributed first to an overhaul of federal sentencing in the United States,with the 1984 Comprehensive Crime Control Act and then with the Computer Fraud and Abuse Act of 1986.
In 2001 hackers cost U.S.firms approximately $455 million; in 2003 the total fell to roughly $202 million as firms instituted better security measures.Earlier,in 2000 an 鈥渦nauthorized intruder鈥 stole eight million credit card numbers from the United States,Canada,the United Kingdom,Japan,and Thailand.The scale of such crimes is among the most difficult to assess,however,because the victims often prefer not to report the crimes鈥攕ometimes out of embarrassment or fear of further security breaches.Officials estimated that hacking cost the world economy roughly $2.5 billion in 2000.Hacking is not always an outside job鈥攁 related criminal endeavour involves individuals within corporations or government bureaucracies deliberately altering database records for either profit or political objectives.The greatest losses stem from the theft of proprietary information,sometimes followed up by the extortion of money from the original owner for the data's return.In this sense,hacking is old-fashioned industrial espionage by other means.