男人天堂日韩,中文字幕18页,天天伊人网,成人性生交大片免费视频

學(xué)術(shù)英語(yǔ)課文翻譯資料

時(shí)間:2023-06-28 01:02:20 課文大全 我要投稿
  • 相關(guān)推薦

通用學(xué)術(shù)英語(yǔ)課文翻譯資料

  《通用學(xué)術(shù)英語(yǔ)》是一本于2016年9月2日高等教育出版社出版的圖書(shū),作者是呂燕彬。以下是小編整理的通用學(xué)術(shù)英語(yǔ)課文翻譯,歡迎閱讀。

通用學(xué)術(shù)英語(yǔ)課文翻譯資料

  學(xué)術(shù)英語(yǔ)課文翻譯資料

  【課文】

  How do computer hackers get into computers

  It seems like a direct question, but the implications are complex and the answer is not simple. If you answer it casually, then the hacker enters the target computer system using the weakness. But to provide more details, let's start at the beginning.

  The word "hacker" is controversial in meaning and interpretation. Some people say that hackers (open circuit) is a good man, they just push the boundaries of knowledge, and not for any damage (at least not intentionally), and crackers (smash) is really bad.

  This argument has little effect, and if it is for the purposes of this discussion, the term "unauthorised user" (UU) is sufficient. The term includes all different types of people, from those involved in organized crime to those who are inside, who break through the authority granted in the system.

  Now let's talk about what it means to "get into" the computer. This can mean something stored on a computer system.

  Get the processing power of the system, or capture the information exchanged between the system. Each attack requires a different skill set, with different vulnerabilities.

  So what are "unauthorised users" using? Weaknesses exist in every system, and there are two weaknesses:

  Known and unknown. Known weaknesses usually exist because of the need for certain abilities. For example, for a business process, you need different people to use a system, and you have a known weakness: the user. Another example of a known weakness is the ability to communicate through the Internet. In order to have this ability, you have to open a path to the unknown and the untrusted entity. The unknown weakness is what the owner or operator of the system does not know, may be the result of shoddy engineering, or the unintended consequences of some of the required capabilities.

  By definition, weaknesses can be exploited. These weaknesses can be low-level password protection, or it can be left to the computer to make use of the office visitors. As long as you sit at a receptionist's desk and use his computer to get the information you need, more than one technology is being used. Low-level code (for example, the user name "Joe Smith", the password is "Joe Smith") is close to the rich resources of a computer: password cracking program can be easily in a few minutes to confirm the word in the dictionary, name, or common phrases. By replacing letters with Numbers, these passwords are more complex. For example, replacing the letter O with 0 does not make the task more complicated. When an unauthorized user USES a valid user name - password combination, the entry system is simply logged in.

  If the target system is well protected (through the technical control, such as a firewall or security software, control and management, clear policies and processes, for example), and remote into hard, unauthorized users may use low technology, these policies may include bribery authorized users, in the cleaning company do temporary workers, or to find information in the dump.

  If the target system is not well protected, then unauthorized users can access it using technology.

  Users who are not authorized to use technical means must first determine the specifications of the target system. For unauthorised users, there is no benefit to using technology that attacks Microsoft's weaknesses if the target system is a Macintosh. They have to know what the target system is, how it is configured, and what networking capabilities it has. Once you know these parameters (they can be obtained remotely from multiple methods), they can take advantage of the known vulnerabilities of these configurations. For common configurations, you can use the first set of attacks to make the task simple.

  People who use these pre-set attacks are sometimes derided as "script kiddies". A skilled person can remotely determine the configuration of the target system, one of which is the ability to pass through the hypertext transfer protocol. People close to the web site send configuration information, such as the type of browser being used, to the requested address. Once the system is configured, you can choose the means.

  Another type of attack is targeting a specific vulnerability, without any specific target to launch an attack - it

  Like a shotgun attack, the aim is to attack as many potential targets as possible. The attack took a first step. But the results and effectiveness of any given target are less predictable.

  It should be noted that the unauthorised access to its ultimate purpose is different from the motivation of the entrant, for example, if he

  Want to collect a lot of zombies, but don't want to attack at the service, that his purpose is to make client secretly installed on the computer as much as possible, a effective way to do this is through the use of the so-called Trojan horse program, it is in the user without knowing or not install malicious programs, some of the more recent large-scale attacks, some of the more recent large-scale attacks, there are such a stance as the attack types of elements.

  It is a multi-step process to protect yourself from attacks, with the goal of limiting and managing the weaknesses of the system (it is not likely to be complete

  Eliminate these weaknesses. First, make sure you have the operating system and application of the latest patches - these patches often repair can take advantage of weaknesses, make sure your password is complicated enough: include letters, Numbers, and symbols, and meaningless.

  Also, consider hardware firewalls and limit the flow of data to and from the Internet. When you really need a few carefully selected ports, such as email and web traffic, make sure your anti-virus software is the latest, check whether there is a new virus definitions (if you are using Windows, ideally you should upgrade virus definition) every day. Finally, back up your data so that if the bad situation does happen, at least you can recover the important things.

  【翻譯】

  電腦黑客如何進(jìn)入電腦

  這好像是一個(gè)直接的問(wèn)題,但是內(nèi)涵很復(fù)雜,答案絕不簡(jiǎn)單,如果隨便地回答,那么黑客通過(guò)利用弱點(diǎn)進(jìn)入目標(biāo)電腦系統(tǒng)。但是為了提供更多細(xì)節(jié),我們還是從頭說(shuō)起。

  “hacker” 這個(gè)詞在意義和解釋上都很有爭(zhēng)議。有些人說(shuō)hackers(開(kāi)路人) 是好人,他們只是推動(dòng)了知識(shí)的邊界,并沒(méi)造成什么傷害(至少不是故意的),而crackers (打砸者)是真正的壞蛋。

  這種爭(zhēng)論沒(méi)有什么效果,如果是為了這種討論的目的,術(shù)語(yǔ)“未授權(quán)的使用者”(UU)就足夠用了。這個(gè)術(shù)語(yǔ)包含了所有不同類(lèi)型的人,從那些參與有組織犯罪行為的人到那些內(nèi)部人士,他們突破了在系統(tǒng)中被授予的權(quán)限。

  接下來(lái)我們探討一下“進(jìn)入”電腦意味著什么。這可以指獲得電腦系統(tǒng)儲(chǔ)存的內(nèi)容,

  獲得系統(tǒng)的處理能力,或者捕獲系統(tǒng)之間交流的信息。每種攻擊都需要不同的技巧,以不同的弱點(diǎn)為目標(biāo)。

  那么“未授權(quán)的使用者”利用的是什么?弱點(diǎn)存在于每個(gè)系統(tǒng)中,并且有兩種弱點(diǎn):

  已知的和未知的。已知的弱點(diǎn)通常因?yàn)樾枰承┠芰Χ嬖凇1热,為了某個(gè)商業(yè)過(guò)程,你需要不同的人使用一個(gè)系統(tǒng),你就有一個(gè)已知的弱點(diǎn):使用者。另一個(gè)已知弱點(diǎn)的例子是通過(guò)互聯(lián)網(wǎng)交流的能力,為了具備這個(gè)能力,你要給未知和不被信任的實(shí)體開(kāi)通一條路徑。未知的弱點(diǎn)是系統(tǒng)的擁有者或操作者所不了解的,可能是劣質(zhì)工程的結(jié)果,或者是某些被需要的能力產(chǎn)生的非故意的結(jié)果。

  按照定義,弱點(diǎn)可能被利用。這些弱點(diǎn)可以是低級(jí)的密碼保護(hù),也可以是讓電腦開(kāi)著,讓辦公室的訪(fǎng)客可以利用。只要坐在接待員的桌前,用他的電腦獲得需要的信息,就有超過(guò)一種技術(shù)被利用。低級(jí)的密碼(比如,用戶(hù)名“Joe Smith”, 密碼也是“Joe Smith”)也是接近電腦的豐富的來(lái)源:密碼破譯程序可以很容易在幾分鐘內(nèi)確認(rèn)字典中的單詞、姓名,甚至常見(jiàn)短語(yǔ)。通過(guò)用數(shù)字代替字母,使這些密碼更復(fù)雜。比如用0來(lái)代替字母O,并不會(huì)使任務(wù)更復(fù)雜。當(dāng)未獲授權(quán)的使用者使用有效的用戶(hù)名—密碼組合,進(jìn)入系統(tǒng)就是簡(jiǎn)單的登錄了。

  假如目標(biāo)系統(tǒng)被很好地保護(hù)(通過(guò)技術(shù)控制,比如防火墻或安全軟件,還有管理控制,比如明確的政策和過(guò)程),并且遠(yuǎn)程難以進(jìn)入,未獲授權(quán)的使用者可能會(huì)使用低技術(shù)的攻擊,這些策略可能包括賄賂獲授權(quán)的使用者,在清潔公司做臨時(shí)工,或者在垃圾堆里翻找信息。

  如果目標(biāo)系統(tǒng)沒(méi)有得到很好的保護(hù),那么未獲授權(quán)的使用者可以使用技術(shù)手段進(jìn)入。

  為了使用技術(shù)手段未獲授權(quán)的使用者必須先決定目標(biāo)系統(tǒng)的規(guī)格。對(duì)未獲授權(quán)使用者來(lái)說(shuō),如果目標(biāo)系統(tǒng)是Macintosh, 使用攻擊微軟弱點(diǎn)的技術(shù)手段沒(méi)有任何好處。他們必須知道目標(biāo)系統(tǒng)是什么,它是怎樣配置的,它有哪種聯(lián)網(wǎng)能力。一旦知道了這些參數(shù)(它們可以通過(guò)多種方法遠(yuǎn)程獲得),他們就可以利用這些配置的已知弱點(diǎn)。對(duì)于常見(jiàn)的配置可以利用先設(shè)置好的攻擊方式,這樣能讓這次任務(wù)很簡(jiǎn)單。

  使用這些預(yù)先設(shè)置的攻擊能力的人有時(shí)被嘲笑為“腳本小子”。 技術(shù)熟練的人可以遠(yuǎn)程決定目標(biāo)系統(tǒng)的配置,其中一個(gè)辦法是通過(guò)超文本傳輸協(xié)議內(nèi)在的能力。接近固有網(wǎng)站的人把配置信息,比如正在被使用的瀏覽器類(lèi)型,發(fā)送到發(fā)出請(qǐng)求的地址。一旦系統(tǒng)配置已知,就可以選擇手段。

  另一種攻擊類(lèi)型是針對(duì)特定的弱點(diǎn)預(yù)設(shè)好,沒(méi)有任何特定的目標(biāo)就發(fā)起攻擊——它

  就像獵*一樣猛烈攻擊,目的是盡可能多地攻擊潛在目標(biāo)。這種攻擊略去了第一步。但是對(duì)于任何給定的目標(biāo)其結(jié)果和有效性都不太好預(yù)測(cè)。

  應(yīng)該注意到未獲授權(quán)的進(jìn)入其最終目的因?yàn)檫M(jìn)入者的動(dòng)機(jī)而有不同,比如,如果他

  想收集很多僵尸電腦,而又不想在服務(wù)時(shí)進(jìn)行攻擊,那他的目的就是把客戶(hù)程序偷偷安裝到盡量多的電腦上,這樣做的一種有效方式就是通過(guò)使用所謂的特洛伊木馬程序,它是在用戶(hù)不知情或不同意的情況下安裝惡意程序,有些更近期發(fā)生的大規(guī)模網(wǎng)絡(luò)攻擊,有些更近期發(fā)生的大規(guī)模網(wǎng)絡(luò)攻擊,有這樣的姿態(tài)作為攻擊類(lèi)型的要素。

  保護(hù)好自己不受攻擊是多步的過(guò)程,目的是限制和管理系統(tǒng)的弱點(diǎn)(并不可能完全

  消除這些弱點(diǎn))。首先,保證你有操作系統(tǒng)和應(yīng)用程序的最新補(bǔ)丁——這些補(bǔ)丁通常會(huì)修補(bǔ)可以利用的弱點(diǎn),保證你的密碼夠復(fù)雜:包括字母、數(shù)字和象征符號(hào),并且毫無(wú)意義。

  同時(shí),要考慮硬件防火墻,并且限制往來(lái)因特網(wǎng)的數(shù)據(jù)流。在你真正需要的幾個(gè)精心挑選的端口上,比如email 和網(wǎng)絡(luò)交通,保證你的反病毒軟件是最新的,經(jīng)常檢查是否有新的病毒定義(如果你正在使用Windows 系統(tǒng),理想狀態(tài)下你應(yīng)該每天升級(jí)病毒定義)。最后,備份你的數(shù)據(jù),那樣如果不好的情況真的發(fā)生,至少你可以恢復(fù)重要的東西。

  學(xué)術(shù)英語(yǔ)讀寫(xiě)課文翻譯

  cyberspace :if you don't love it ,leave it信息空間:出入隨愿

  something in the American psyche loves new frontiers. We hanker after wide-open spaces ;we like to explore ;we like to make rules but refuse to follow them .But in this age it's hard to find a place where you can go and be yourself without worrying about he neighbours .

  美國(guó)人的內(nèi)心深處具有一種酷愛(ài)探索新領(lǐng)域的'氣質(zhì)。我們渴求寬敞的場(chǎng)地,我們喜歡探索,喜歡制定規(guī)章制度,卻不愿去遵守。在當(dāng)今時(shí)代,卻很難找到一塊空間,可以供你任意馳騁,又不必?fù)?dān)心影響你的鄰居。

  There is such a place : cyberspace . Formerly a playground for computer fans ,cyberspace . Formely a playgroundfor computer fans ,cyberspace now embraces every conceivable constituency : school lchildren , flirtatious ,singles ,dirty pictures behind their bedroom doors provoke a crackdown ?

  確實(shí)有這樣一個(gè)空間,那就是信息空間。這里原本是計(jì)算機(jī)迷的游戲天地,但如今只要想像得到的各類(lèi)人群應(yīng)有盡有,包括少年兒童、輕佻的單身漢、美籍匈牙利人、會(huì)計(jì)等。問(wèn)題是他們都能和睦相處嗎?人們是否會(huì)因?yàn)楹ε潞⒆觽兌阍谂P室里看網(wǎng)上的淫穢圖片而將它封殺?

  The first order of business is to grasp what cyberspace is . It might help to leave beind metaphors 隱喻 of highways and frontiers and to think instead of real estate . Real estate ,remember ,is an intellectual ,legal ,artificial environment constructed on top of land. Real estate recognizes the difference between parkland and shopping mall ,between red-light zone and school district ,between church ,state and drugstore .

  首先要解決的問(wèn)題是,什么是信息空間。我們可以?huà)侀_(kāi)高速公路、前沿新領(lǐng)域等比喻,把信息空間看作一個(gè)巨大的房地產(chǎn)。請(qǐng)記住,莊園是人們智慧的結(jié)晶,是合法的、人工營(yíng)造的氛圍,它建立在土地之上。在房地產(chǎn)業(yè)中,公園和商業(yè)中心、紅燈區(qū)與學(xué)校、教堂、政府機(jī)構(gòu)與雜貨店都能區(qū)分開(kāi)來(lái)。

  in the same way , you could think of cyberspace as a giant and unbounded world of virtual real estate .Some property is privatedly owned and rented out ; other property is common land ; some places are suitable for children , and others are best avoided by all citizens . Unfortunately ,it's those places that are now capturing the popular imagination ,places that offer bombmaking instructions ,pornography, advice on how to steal credit cards .They make cyberspace sound like a nasty place . Good citizens jump to a conclusion : Better regulate it .

  你可以用同樣的方法把信息空間想像為一個(gè)巨大的、無(wú)邊無(wú)際的虛擬房地產(chǎn)業(yè)。其中有些房產(chǎn)為私人擁有并已租出,有些是公共場(chǎng)所;有的場(chǎng)所適合兒童出人,而有些地方人們最好避開(kāi)。遺憾的是,正是這些應(yīng)該避開(kāi)的地方使得人們心向神往。這些地方教唆你如何制造炸彈、為你提供淫穢材料、告訴你如何竊取信用卡。所有這些使信息空間聽(tīng)起來(lái)像是一個(gè)十分骯臟的地方。正直的公民紛紛作出這樣的結(jié)論:最好對(duì)它嚴(yán)加管理。

  But before using regulations to counter indecency ,it is fundamental to interpret the nature of cyberspace . Cyberspace isn't a frontier where wicked people can grab unsuspecting children ,nor is it a giant television system that can beam offensive messages at unwilling viewers . In this kind of real estate ,users have to choose where thy visit ,what they see ,what they do .It's optiona .In other words,cyberspace is a voluntary destination --in reality ,many destinations .You don't just get "onto the Net" ;you have to go someplace in particular . That means that people can choose where to go and what to see .Yes , community standards should be enforced ,but those standards set by cyberspace communities themselves ,not by the courts or by politicians in Washington .

  但是,在利用規(guī)章制度來(lái)反擊下流之舉之前,關(guān)鍵是從根本上理解信息空間的性質(zhì)。惡棍并不能在信息空間搶走毫無(wú)提防之心的兒童;信息空間也不像一臺(tái)巨大的電視機(jī),向不情愿的觀(guān)眾播放令人作嘔的節(jié)目。在信息空間這個(gè)房地產(chǎn)業(yè)中,用戶(hù)對(duì)他們所去之處、所見(jiàn)所聞、所做所為都要作出選擇,一切都出于自愿。換句話(huà)說(shuō),信息空間是個(gè)出入自便的地方,實(shí)際上,信息空間里有很多可去之處。人們不能盲目上網(wǎng),必須帶著具體的目標(biāo)上網(wǎng)。這意味著人們可以選擇去哪個(gè)網(wǎng)址、看什么內(nèi)容。不錯(cuò),規(guī)章制度應(yīng)該在群體內(nèi)得以實(shí)施,但這些規(guī)章制度必須由信息空間內(nèi)各個(gè)群體自己來(lái)制定,而不是由法庭或華盛頓的政客們來(lái)制定。

  what makes cyberspace so alluring is precisely the way in which it's different from shopping malls , television ,highways and other terrestrial jurisdictions.But let's define the territor: 信息空間之所以具有如此大的誘惑力,正是因?yàn)樗煌谏虉?chǎng)、電視、公路或地球上的其他地方。那么,讓我們來(lái)描述一下這個(gè)空間。

  First ,there are private e-malil conversations ,similar to the conversations you have over the teleophone .These are private and consensualand require no regulation at all .

  首先,信息空間里人與人之間可以進(jìn)行電子郵件交流。這種交流類(lèi)似于電話(huà)交談,都是私人之間的、兩相情愿的談話(huà),不需要任何規(guī)章制度加以限制。

  Second , there are information and entertainment services , wehre people can download anytihing from legal texts and lists of "great new restaurants " to game software or dirty pictures . These places are like bookstores ,malls and movie houses --places whre you go to buy something .The customer needs to request an item or sign up for a subscription; stuff (especially pornography ) is not sent out to people who don't ask for it .Some of these services are free or included as part of a broader service like ComputerServe or America Online ; others charge may and may bill their customers directly .

  其次,信息空間提供信息與娛樂(lè)服務(wù)。人們可以從中下載各種信息,從法律文件、“大型新飯店”名單,到游戲軟件、下流圖片,無(wú)奇不有。這里如同書(shū)店、商場(chǎng)和電影院,屬購(gòu)物區(qū)域。顧客必須通過(guò)索求或者登記來(lái)購(gòu)物,物品(特別是淫穢之物)不會(huì)發(fā)送給那些沒(méi)有索取的人。有些服務(wù)可以

  免費(fèi),或作為總服務(wù)費(fèi)用的一部分計(jì)算,如“計(jì)算機(jī)服務(wù)”和“美國(guó)在線(xiàn)”就是如此。而有些服務(wù)要向顧客收費(fèi),而且可能會(huì)讓顧客直接支付賬單。

  Third ,there are "real" communities ---groups of people who communicate among themselves . In real-estate terms ,they're like bars or restaurants or bathhouses . Each active participate contributes to a general conversation ,generally through posted messages . Other participant may simply listen or watch .Some services are supervised by a moderator ; others are more like bulletin boards ---anyone is free to post anything .Many of these services started out unmoderated but are now imposing rules to keep out unwanted advertising ,extraneous discussions or increasingly rude participants .

  三,信息空間里還有真正意義上的群體,那就是在內(nèi)部互相交流思想的人群。從莊園的角度來(lái)看,這些群體就像酒吧、飯店或公共浴室。每個(gè)活躍的人都積極參與談話(huà),談話(huà)一般通過(guò)郵件方式進(jìn)行;而有的人也許只充當(dāng)旁觀(guān)者或旁聽(tīng)者。有些活動(dòng)由專(zhuān)人監(jiān)督,有些則像公告牌,任何人可以任意在上面張貼。很多活動(dòng)起初都無(wú)人監(jiān)督,但現(xiàn)在實(shí)行強(qiáng)制管理,用規(guī)章制度來(lái)掃除那些不受歡迎的廣告、不相干的討論或日漸粗魯?shù)某蓡T。

  cyberspace communitis evolve just the way terrestrial ommunities do : people with like-minded interests band together . Every cyberspace community has its own character . Overall , the communities on CompuServe tend t be more professsional ; those on AmericaOnline , affluent young singles ;Prodigy family-oriented itself there are lots of passionate non-commercial discussion groups on topics ranging from Hungarian politics (hungary Online ) copyright law .

  信息空間里群體的演變過(guò)程正如陸地社會(huì)團(tuán)體的演變過(guò)程,即情趣相投的人們聚在一起。信息空間里每一個(gè)團(tuán)體都各具特色。總的來(lái)說(shuō),“計(jì)算機(jī)服務(wù)”上的團(tuán)體一般由專(zhuān)業(yè)技術(shù)人員組成;“美國(guó)在線(xiàn)”上的團(tuán)體一般為富有的獨(dú)身者;“奇才”主要面向家庭。另外還有一些具有獨(dú)到見(jiàn)解的服務(wù)機(jī)構(gòu),“共鳴”為其中之一,是紐約市中心一家時(shí)髦的服務(wù)機(jī)構(gòu)。再如“婦女專(zhuān)線(xiàn)”,是專(zhuān)為女性開(kāi)辟的,她們希望逃避網(wǎng)上其他地方盛行的男性文化。就因特網(wǎng)本身也有大量情緒激昂的討論小組,都屬非商業(yè)性質(zhì),討論話(huà)題廣泛,從匈牙利政治(匈牙利在線(xiàn))到版權(quán)法,無(wú)所不及。

  what's unique about cyberspace is that it allows communities of any size and kind to flourish ; in cyberspace ,communities are chosen by the users , not forced on them by accidents of geography . This freedom gives the rules that precise in cyberspace a moral authority that rules in terrestrial environments don't have . Most people are stuck in the country of their birth, but if you don't like the rules of a given cyberspace community ,they can restrict their children's access to it .

  信息空間的獨(dú)特之處在于允許任何規(guī)模、任何種類(lèi)的團(tuán)體發(fā)展繁榮。在信息空間,用戶(hù)自愿參加任何團(tuán)體,而不是因?yàn)榈乩砦恢玫那珊隙黄葏⒓幽硞(gè)團(tuán)體。這種自由賦予主宰信息空間的準(zhǔn)則一種道義上的權(quán)威,這種權(quán)威是地球空間里的準(zhǔn)則所沒(méi)有的。多數(shù)

  人呆在自己出生的國(guó)土上動(dòng)彈不得,而在信息空間,假若你不喜歡某一群體的準(zhǔn)則,脫離這個(gè)群體即可。出入自由。同樣,如果做父母的不喜歡某一群體的準(zhǔn)則,便可以限制孩子,不讓他們參與。

  what's likely to happen in cyberspace is the formation of new communities ,free of the constraits that cause conflict on earth . Instead of a global village ,which is a nice dream but impossible to manage , we'll have invented another world of self-contained communities that cater to their own members' inclinations without interfering with anyoneelse's The possibility of a real market-style evolution of governance is at hand .In cyberpace ,we'll be able to test and evolve rules governing what needs to be governed --intellectual property ,content and access control , rules about privacy and free speech .Some communities will allow anyone in ;others will restrict access to members who qualify on one basis or another .Those communites that prove self-sustaining will prosper (and perhaps grow and split into subsets wiht ever-more-particular interests and identities ) Those that can't survive --either because people lose interest or get scared off --will simply wither away .

  在信息空間,可能會(huì)發(fā)生的情況是形成新的群體,新群體的形成不像在地球上那樣受到限制,產(chǎn)生沖突。我們不是要建立一個(gè)夢(mèng)寐以求、而又難以管理的全球村,而是要建立一個(gè)由各種獨(dú)立的、不受外界影響的群體組成的世界,這些群體將投其成員所好,而又不干涉他人。一種真正的市場(chǎng)型管理模式很快成為可能。在信息空間,我們將能夠檢驗(yàn)并完善所需要的管理制度——知識(shí)產(chǎn)權(quán)制度、服務(wù)內(nèi)容與使用權(quán)的控制制度、個(gè)人隱私權(quán)與自由言論制度等。有些群體允許任何人加入,而有些則只允許符合這樣或那樣條件的人加入。能夠自立的群體會(huì)興旺發(fā)展(或許也會(huì)因?yàn)橹救づc身份日趨特殊,而發(fā)展成為幾個(gè)分支)。有些群體或因?yàn)槌蓡T失去興趣,或因?yàn)槌蓡T被嚇跑而不能幸存下來(lái),它們將漸漸萎縮消亡。

  in the near future ,explorers in cyberspace will need to get better at defining and identifying their communities . they will need to put in place --and accept ---their own local governments apart from terrestrial governments ,just as the owners of expensive real estatet often have their own security guards though they can call in the police to get ride of undesirable customers .

  在不久的將來(lái),信息空間的探索者應(yīng)該更善于解釋和辨別各群體的性質(zhì)。除了現(xiàn)實(shí)中的政府之外,他們將有必要安置并接受自己的地方政府,就如同豪華莊園的業(yè)主一樣.盡管可以叫警察來(lái)驅(qū)逐不受歡迎的顧客,但還是寧愿雇傭自己的保安。

  then what should be done about undesirable material in cyberspace ? What to do ,for instance ,about pornography . The answer is labeling ,besides banning ,questionable material .it makes sense for cyberspace participants themselves to agree on a scheme for uestionable items ,so that people or automatic filters can avoid them . It's easy enough for

  software manufacturers to build an automatioc filter that would prevent you or your child from ever seeing the undesired item on a menu . (it's as if all the items were wrapped , with labels on the wrapper.)

  Someone who posted pornographic material under the title "Kid-Fun" could be sued for mislabeling .

  那么,該如何處置信息空間不受歡迎的材料呢?例如,淫穢材料該怎么辦?答案除了禁止以外,就是在有問(wèn)題的材料上貼上標(biāo)簽。信息空間的成員對(duì)有問(wèn)題的內(nèi)容應(yīng)該達(dá)成共識(shí),拿出一個(gè)解決方案來(lái),使人們或自動(dòng)過(guò)濾系統(tǒng)避開(kāi)這些內(nèi)容,這樣可能會(huì)有助于解決問(wèn)題。軟件制造商很容易建立一套自動(dòng)過(guò)濾系統(tǒng),使你和孩子們?cè)诓藛紊弦?jiàn)不到不想見(jiàn)到的內(nèi)容。(就好像所有的內(nèi)容都被包裝了起來(lái),并在包裝紙上貼有標(biāo)簽。)如果有人在色情材料上貼上“童趣”的標(biāo)簽,便可能會(huì)因錯(cuò)貼標(biāo)簽而被起訴。

  Without a lot of fanfare , private enterprises and local groups are already producing a variety of labeling services ,along with kid-oriented sites like Kidlink and Kid's Space .People differ in their tastes and values and can find services on the Net that suit them in the same way they select books and magazines . Or they can wonder freely if they prefer , making up their own itinerary .

  一些私人組織和地方團(tuán)體已經(jīng)在不聲不晌地建立各種標(biāo)簽服務(wù)系統(tǒng),并建立了適合兒童的網(wǎng)站,如“兒童連接”、“兒童空間”等。具有不同品味和抱有不同價(jià)值觀(guān)念的人如同挑選書(shū)刊、雜志一樣,可以從網(wǎng)上挑選出適合自己的服務(wù)機(jī)構(gòu)。如果愿意,他們還可以在網(wǎng)上無(wú)拘無(wú)束地逍遙漫游,完成自己的旅程。

  In the end , our society needs to grow up . Growing up means understanding thtat there are no perfect answers , no all-purpose solutions , no government sanctioned safe havens .We haven't created a perfect society on earth , and we won't have one in cyberspace either . But at least we can have individual choice and individual responsibility .

  總之,我們的社會(huì)需要發(fā)展,要發(fā)展就意味著我們必須明白,世上沒(méi)有完美無(wú)缺的答案,沒(méi)有能夠解決各種問(wèn)題的妙方,沒(méi)有政府認(rèn)可的安全避難所。我們不能在地球上建立一個(gè)十全十美的社會(huì),同樣也不能在信息空間營(yíng)造一個(gè)這樣的社會(huì)。但是至少我們可以有個(gè)人的選擇——也有個(gè)人的責(zé)任。

【學(xué)術(shù)英語(yǔ)課文翻譯資料】相關(guān)文章:

大學(xué)英語(yǔ)2翻譯課文05-25

英語(yǔ)手抄報(bào)資料翻譯05-23

《離騷》課文資料01-07

岳飛課文翻譯01-05

《杞人憂(yōu)天》課文翻譯11-30

《愛(ài)蓮說(shuō)》課文翻譯05-09

《過(guò)秦論》課文翻譯04-01

詠雪課文翻譯10-11

勸學(xué)課文翻譯09-18

離騷課文翻譯03-25