哪位大虾帮帮忙啊,帮我翻译一下!在此万分感激啊!
How to Protect Your Data
Nobody's data is completely safe. But everybody’s computer can still be well guarded against would-be attackers. Here’s your arsenal:
Password Protection
At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the net work administrator know. PC users should avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases that combine uppercase and lowercase letters, such as “The moon Also RISES.” In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row.
Virus Checkers
Viruses generally infect local area networks through workstations; so anti-virus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network---personal computers as well as dumb workstations---should be protected individually.
Firewall
These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks---including the Internet a separate local area network at a customer’s site, or a telephone company switch.
Encryption
Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs---Microsoft Windows NT, Novell NetWare, and Lotus Notes, among others---offer add-to encryption schemes that encode all data sent on the network.
Audit Trails
Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. This log---which, ironically, is turned off by many network administrators who don’t appreciate its importance---is an excellent way of recording what occurred during an attack by hackers. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. In addition, this auditing log can prevent internal intrusions before they occur---when employees know such a trail exists.
各们同仁,帮帮忙,翻译一下,不要用软件翻哦,那不准的,这可关系到本人的升学!所以,请大家在百忙这中抽点时间,帮帮小妹!在此谢谢大家了!
参考答案:How to Protect Your Data
Nobody's data is completely safe. But everybody’s computer can still be well guarded against would-be attackers. Here’s your arsenal:
Password Protection
资料保存
没有哪一个人的资料是完全处于安全状态下的。但是每个人的电脑仍然可以在一定程度上防止可能遇到的病毒。它是通过这一途径来实现的:密码保护。
At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the net work administrator know. PC users should avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases that combine uppercase and lowercase letters, such as “The moon Also RISES.”
每次登陆时最起码你得输入只有你自己和电脑协管系统识别的密码。电脑拥护应尽量避免使用让人容易猜到的词组,短语或数字。像生日啊,小孩的名字或首写字母。你应选择比较隐秘的由大小写组成的短语,像“The moon Also RISES.”
In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row.
另外,系统会提示用户至少每个月换一次密码,如果一次登陆时连续三次错误输入密码该系统则会拒绝此用户登陆。
Virus Checkers
Viruses generally infect local area networks through workstations; so anti-virus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network---personal computers as well as dumb workstations---should be protected individually.
电脑病毒检测
电脑病毒通过工作站向该网络区域的电脑上传播病毒。所以仅在服务器上安装杀毒软件是不够的。最理想的方法是,网络连接上的各个终端机--个人电脑及工作站--应该分开来进行杀毒工作。
Firewall
These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks---including the Internet a separate local area network at a customer’s site, or a telephone company switch.
防火墙
通过由硬件和软件设施共同作用下的防护系统来屏蔽未经允许的个人登陆或只让他们使用规定权限内的电脑访问。只要电脑系统一经与其他网络连接防火墙就应设置--包括独立的用户区域或通过拨号上网。
Encryption
Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs---Microsoft Windows NT, Novell NetWare, and Lotus Notes, among others---offer add-to encryption schemes that encode all data sent on the network.
电脑加密
就算闯入者打破防火墙进入,如果你的资料已转译为密码则不会有危险。很多软件套和网络程序--Microsoft Windows NT, Novell NetWare, and Lotus Notes以及还有其他的此类工具都提供将资料转译为密码上传到网络的功能。
Audit Trails
Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. This log---which, ironically, is turned off by many network administrators who don’t appreciate its importance---
审查记录
几乎所以的防火墙,加密系统,密码保护包括审查功能记录下了网络的每一次操作。这些记录--讽刺的说,被很多网络管理员所忽视掉了它的重要性--
is an excellent way of recording what occurred during an attack by hackers. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. In addition, this auditing log can prevent internal intrusions before they occur---when employees know such a trail exists.
这是个很好的当电脑被黑客袭击过程记录的途径。这项审查记录不仅仅只是保护了电脑系统的薄弱环节,而是确认密码并安装保护电脑受内部操作的影响。另外,该项审查记录可以在电脑内部出现问题时做出防护--只要是拥护了解到了这么个审查程序的重要性的话。