阅读理解

Directions: There are 7 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A, B, C, and D. You should decide on the best choice.

Passage 3

Experts say these programs are probably the ones used to jam the Internet’ s most popular sites: Called Tribal Village, abbreviated TFN, and Trinoo. They are Internet time bombs.

Allison Taylor of Network Associates says, "They’ re road maps for people to copy from and then you have copycat attacks over and over and over. " We found them in several places; they’ re prepackaged. The hacker downloads and hacks the program into a number of unsuspecting computers.

John Vranesevich of Antionline. com says, "That software application simply sits there dormant until a hacker has gotten a large enough collection that he chooses to activate those, and then from his machine he can activate those and point then to a specific target. "

The targets so far this week, at least, Yahoo, eBay, Amazon, CNN, Buy, eTrade and zdNet. The costs are mounting.

 Philip Allingham of ZDTV says, "There’ s advertising revenue that comes from the banners, but more importantly, providing news and information out there for our viewership. They can’ t come and find out from us; they’ re going to go somewhere else. "

This kind of hack floods a website with so many requests it can’ t cope.

Sources tell CNN that Yahoo was hammered with requests at one gigabyte per second. That’ s like 104-million people dialing in at once.

The website AntiOnline posts the software publicly hoping someone will create a fix.

Richard Power of the Computer Security Institute says, "The only things you can do is secure your site well enough so that your site can’ t be used by a hacker as a launching point. "

And many failed the test.

Allison Taylor says, "For this attack to happen on all these companies, there had to be lots of computers out there that were vulnerable. "

Webmasters are in a tough spot.

Kevin Purseglove of eBay says, "The basic aspect of an Internet site is to be open and accessible to the public. "

And vulnerable to what experts are now calling hacktivists. Why do this? Best guess: acclaim from other hackers.

Kevin Purseglove says, "and if they weren’ t out breaking these sites and trying to take them down, they’ d be out tagging their initials on tall buildings. "

Richard Power says, "It could be a hacktivist or a number of hacktivists who are sick and tired of the commercialization of the Internet. "

So far all of the targets have been very large, and very commercial. 

单选题 A hacker is ______.
【正确答案】 A
【答案解析】由第二段“The hacker downloads and hacks the program into. . . ” 可知, 黑客可以入侵并使用别人的电脑。
单选题 The programs which were used by the hackers were______.
【正确答案】 C
【答案解析】第二段中说到“We found them in several places; they’ re prepackaged. ” , 因此C项正确。
单选题 Yahoo, eBay, Amazon, CNN, Buy, eTrade and zNet are______.
【正确答案】 B
【答案解析】由最后一段最后一句“So far all of the targets have been very large, and very commercial. ” 可知, 这些网站都是“large” 、 “commercial” 。
单选题 If someone sends a message the size of one gigabyte,______.
【正确答案】 A
【答案解析】根据第七段“one gigabyte per second” 就像是“104-million people dialing in at once” , 由此可见其非常大。
单选题 Hackers can do this because ______.
【正确答案】 C
【答案解析】由Allison Taylor的话可知, 受攻击的电脑都很“vulnerable” , 也就是不安全。