王朝知道
分享
 
 
 

哪位大虾帮帮忙啊,帮我翻译一下!在此万分感激啊!

王朝知道·作者佚名  2010-08-28  
宽屏版  字体: |||超大  
 
分类: 教育/科学 >> 外语学习
 
问题描述:

How to Protect Your Data

Nobody's data is completely safe. But everybody’s computer can still be well guarded against would-be attackers. Here’s your arsenal:

Password Protection

At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the net work administrator know. PC users should avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases that combine uppercase and lowercase letters, such as “The moon Also RISES.” In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row.

Virus Checkers

Viruses generally infect local area networks through workstations; so anti-virus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network---personal computers as well as dumb workstations---should be protected individually.

Firewall

These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks---including the Internet a separate local area network at a customer’s site, or a telephone company switch.

Encryption

Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs---Microsoft Windows NT, Novell NetWare, and Lotus Notes, among others---offer add-to encryption schemes that encode all data sent on the network.

Audit Trails

Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. This log---which, ironically, is turned off by many network administrators who don’t appreciate its importance---is an excellent way of recording what occurred during an attack by hackers. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. In addition, this auditing log can prevent internal intrusions before they occur---when employees know such a trail exists.

各们同仁,帮帮忙,翻译一下,不要用软件翻哦,那不准的,这可关系到本人的升学!所以,请大家在百忙这中抽点时间,帮帮小妹!在此谢谢大家了!

参考答案:

How to Protect Your Data

Nobody's data is completely safe. But everybody’s computer can still be well guarded against would-be attackers. Here’s your arsenal:

Password Protection

资料保存

没有哪一个人的资料是完全处于安全状态下的。但是每个人的电脑仍然可以在一定程度上防止可能遇到的病毒。它是通过这一途径来实现的:密码保护。

At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the net work administrator know. PC users should avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases that combine uppercase and lowercase letters, such as “The moon Also RISES.”

每次登陆时最起码你得输入只有你自己和电脑协管系统识别的密码。电脑拥护应尽量避免使用让人容易猜到的词组,短语或数字。像生日啊,小孩的名字或首写字母。你应选择比较隐秘的由大小写组成的短语,像“The moon Also RISES.”

In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row.

另外,系统会提示用户至少每个月换一次密码,如果一次登陆时连续三次错误输入密码该系统则会拒绝此用户登陆。

Virus Checkers

Viruses generally infect local area networks through workstations; so anti-virus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network---personal computers as well as dumb workstations---should be protected individually.

电脑病毒检测

电脑病毒通过工作站向该网络区域的电脑上传播病毒。所以仅在服务器上安装杀毒软件是不够的。最理想的方法是,网络连接上的各个终端机--个人电脑及工作站--应该分开来进行杀毒工作。

Firewall

These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks---including the Internet a separate local area network at a customer’s site, or a telephone company switch.

防火墙

通过由硬件和软件设施共同作用下的防护系统来屏蔽未经允许的个人登陆或只让他们使用规定权限内的电脑访问。只要电脑系统一经与其他网络连接防火墙就应设置--包括独立的用户区域或通过拨号上网。

Encryption

Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs---Microsoft Windows NT, Novell NetWare, and Lotus Notes, among others---offer add-to encryption schemes that encode all data sent on the network.

电脑加密

就算闯入者打破防火墙进入,如果你的资料已转译为密码则不会有危险。很多软件套和网络程序--Microsoft Windows NT, Novell NetWare, and Lotus Notes以及还有其他的此类工具都提供将资料转译为密码上传到网络的功能。

Audit Trails

Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. This log---which, ironically, is turned off by many network administrators who don’t appreciate its importance---

审查记录

几乎所以的防火墙,加密系统,密码保护包括审查功能记录下了网络的每一次操作。这些记录--讽刺的说,被很多网络管理员所忽视掉了它的重要性--

is an excellent way of recording what occurred during an attack by hackers. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. In addition, this auditing log can prevent internal intrusions before they occur---when employees know such a trail exists.

这是个很好的当电脑被黑客袭击过程记录的途径。这项审查记录不仅仅只是保护了电脑系统的薄弱环节,而是确认密码并安装保护电脑受内部操作的影响。另外,该项审查记录可以在电脑内部出现问题时做出防护--只要是拥护了解到了这么个审查程序的重要性的话。

小贴士:① 若网友所发内容与教科书相悖,请以教科书为准;② 若网友所发内容与科学常识、官方权威机构相悖,请以后者为准;③ 若网友所发内容不正确或者违背公序良俗,右下举报/纠错。
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
如何用java替换看不见的字符比如零宽空格​十六进制U+200B
 干货   2023-09-10
网页字号不能单数吗,网页字体大小为什么一般都是偶数
 干货   2023-09-06
java.lang.ArrayIndexOutOfBoundsException: 4096
 干货   2023-09-06
Noto Sans CJK SC字体下载地址
 干货   2023-08-30
window.navigator和navigator的区别是什么?
 干货   2023-08-23
js获取referer、useragent、浏览器语言
 干货   2023-08-23
oscache遇到404时会不会缓存?
 干货   2023-08-23
linux下用rm -rf *删除大量文件太慢怎么解决?
 干货   2023-08-08
刀郎新歌破世界纪录!
 娱乐   2023-08-01
js实现放大缩小页面
 干货   2023-07-31
生成式人工智能服务管理暂行办法
 百态   2023-07-31
英语学习:过去完成时The Past Perfect Tense举例说明
 干货   2023-07-31
Mysql常用sql命令语句整理
 干货   2023-07-30
科学家复活了46000年前的虫子
 探索   2023-07-29
英语学习:过去进行时The Past Continuous Tense举例说明
 干货   2023-07-28
meta name="applicable-device"告知页面适合哪种终端设备:PC端、移动端还是自适应
 干货   2023-07-28
只用css如何实现打字机特效?
 百态   2023-07-15
css怎么实现上下滚动
 干货   2023-06-28
canvas怎么画一个三角形?
 干货   2023-06-28
canvas怎么画一个椭圆形?
 干货   2023-06-28
canvas怎么画一个圆形?
 干货   2023-06-28
canvas怎么画一个正方形?
 干货   2023-06-28
中国河南省郑州市金水区蜘蛛爬虫ip大全
 干货   2023-06-22
javascript简易动态时间代码
 干货   2023-06-20
感谢员工的付出和激励的话怎么说?
 干货   2023-06-18
 
>>返回首页<<
 
 
 
静静地坐在废墟上,四周的荒凉一望无际,忽然觉得,凄凉也很美
© 2005- 王朝网络 版权所有