电脑密码

雕龙文库 分享 时间: 收藏本文

电脑密码

  2023复习正是强化复习阶段,在考研英语中占了40分,所以考研英语阅读是英语科目中重要的一项。名师老师曾建议过考研生需要坚持每天泛读10-15分钟的英文原刊。强烈推荐了杂志《经济学人》.杂志中的文章也是考研英语的主要材料来源.希望考研考生认真阅读,快速提高考研英语阅读水平。   Computer passwords   电脑密码   Speak, friend, and enter   说,朋友和进入   Computer passwords need to be memorable andsecure.   电脑密码须具备两个特性:易记及难猜。   Most people s are the first but not the second.   但是大部分人的密码只注重了前者却忽略了后者。   Researchers are trying to make it easier for them to be both   研究人员正努力让两者兼而有之变得更以实现。   PASSWORDS are ubiquitous in computer security.   密码在电脑安全领域的应用相当普遍。   All too often, they are also ineffective.   但他们往往没起什么作用。   A good password has to be both easy to remember and hard to guess, but in practice peopleseem to plump for the former over the latter.   一个好密码必须具备易记及难猜两个特征,而实际上人们好像只注意到了前者而忽略了后者。   Names of wives, husbands and children are popular.   以妻子,丈夫或孩子的名字作为密码的人大有人在。   Some take simplicity to extremes: one former deputy editor of The Economist used z formany years.   有些人的密码简单到了极点:The Economist的一位前副主编多年来一直用Z作密码。   And when hackers stole 32m passwords from a social-gaming website called RockYou, itemerged that 1.1% of the site s users365,000 peoplehad opted either for 123456 or for12345.   当黑客在社交游戏网站盗取了3200万用户的密码后,人们才发现原来这个网站大约1.1%的用户-也就是365,000人-选择了12345或123456作为密码。   That predictability lets security researchers create dictionaries which list commonpasswords, a boon to those seeking to break in.   安全性研究人员于是根据密码的这种可预见性编制了一些罗列处各种常见密码的字典,这对那些有志于破解他人密码的人来说可说是找到了福音。   But although researchers know that passwords are insecure, working out just how insecurehas been difficult.   但即使研究人员已经知道了密码不安全,要确切地给出个不安全系数却是很困难的。   Many studies have only small samples to work ona few thousand passwords at most.   许多研究项目的对象只有一小块样本-最多只有几千个密码。   Hacked websites such as RockYou have provided longer lists, but there are ethical problemswith using hacked information, and its availability is unpredictable.   像Rockyou这样被黑的网站能够提供更多的密码,但使用黑客盗取的密码不仅会引发道德问题上的争议,其可行性也是未知的。   However, a paper to be presented at a security conference held under the auspices of theInstitute of Electrical and Electronics Engineers, a New York-based professional body, inMay, sheds some light.   然而,在五月份由总部位于纽约的一个专业组织-电气电子协会支持下召开了一场安全性研讨会议,会上公布的一份文件让我们看到了解决这个难题的一丝曙光。   With the co-operation of Yahoo!, a large internet company, Joseph Bonneau of CambridgeUniversity obtained the biggest sample to date70m passwords that, though anonymised,came with useful demographic data about their owners.   在一家大型网络公司-雅虎的协助下,剑桥大学的Joseph Bonneau得到了一份迄今为止最大的研究样本,虽然是匿名的,但是包含了其用户极为有用的人口学数据。   Mr Bonneau found some intriguing variations.   在这份样本中Mr Bonneau发现了一些有趣的差异。   Older users had better passwords than young ones.   相较于年轻用户,老用户设置的用户更好。   People whose preferred language was Korean or German chose the most secure passwords;those who spoke Indonesian the least.   母语为韩语或德语的用户所设置的密码安全系数最高,而说印尼语的最低。   Passwords designed to hide sensitive information such as credit-card numbers were onlyslightly more secure than those protecting less important things, like access to games.   被设置用来隐藏像信用卡卡号这样的敏感信息的密码,相比较于另外一些保护游戏登录入口这样不那么重要的信息所设置的密码,其安全性高不了多少。   Nag screens that told users they had chosen a weak password made virtually no difference.   那些提醒用户设置的密码安全性较低的唠叨屏幕其实没有什么作用。   And users whose accounts had been hacked in the past did not make dramatically moresecure choices than those who had never been hacked.   相对于那些从没被黑过的,有过账户被黑经验的用户的安全防范意识也并没得到显著提高。   But it is the broader analysis of the sample that is of most interest to security researchers.   但是,对研究样本进行更为综合性的分析才是安全性研究人员的兴趣所在。   For, despite their differences, the 70m users were still predictable enough that a genericpassword dictionary was effective against both the entire sample and any demographicallyorganised slice of it.   因为尽管存在各种差异,但是通过分析样本中那7000万用户的资料还是可以预见到,一部通用的密码暴力破解字典就能够有效应付这一整个样本,或者任何根据某项人口学特征而从中抽取的一小块资料。   Mr Bonneau is blunt: An attacker who can manage ten guesses per accountwillcompromise around 1% of accounts.   Mr Bonneau直言不讳地说:只要每个账号给破解者10次猜测密码的机会...会有大约1%的密码被破解。   And that, from the hacker s point of view, is a worthwhile outcome.   这在黑客看来绝对值得一试。   One obvious answer would be for sites to limit the number of guesses that can be madebefore access is blocked, as cash machines do.   对网站而言,很显然,他们可以在系统上进行类似于ATM机的设置:一旦密码输入错误次数达到规定者,即封锁登录入口。   Yet whereas the biggest sites, such as Google and Microsoft, do take such measures,many donot.   然而,只有谷歌、微软这样的大型网站采取了类似的措施,很多其他网站对此不以为意。   A sample of 150 big websites examined in 2010 by Mr Bonneau and his colleague SrenPreibusch found that 126 made no attempt to limit guessing.   在2010年,Mr Bonneau和他的同事Sren Preibusch曾对一份囊括了150家大型网站的样本做过调查,结果显示其中126家并没有对密码输入错误次数作出限制。   How this state of affairs arose is obscure.   这种状况的状况的出现实在是令人费解。

  

  2023复习正是强化复习阶段,在考研英语中占了40分,所以考研英语阅读是英语科目中重要的一项。名师老师曾建议过考研生需要坚持每天泛读10-15分钟的英文原刊。强烈推荐了杂志《经济学人》.杂志中的文章也是考研英语的主要材料来源.希望考研考生认真阅读,快速提高考研英语阅读水平。   Computer passwords   电脑密码   Speak, friend, and enter   说,朋友和进入   Computer passwords need to be memorable andsecure.   电脑密码须具备两个特性:易记及难猜。   Most people s are the first but not the second.   但是大部分人的密码只注重了前者却忽略了后者。   Researchers are trying to make it easier for them to be both   研究人员正努力让两者兼而有之变得更以实现。   PASSWORDS are ubiquitous in computer security.   密码在电脑安全领域的应用相当普遍。   All too often, they are also ineffective.   但他们往往没起什么作用。   A good password has to be both easy to remember and hard to guess, but in practice peopleseem to plump for the former over the latter.   一个好密码必须具备易记及难猜两个特征,而实际上人们好像只注意到了前者而忽略了后者。   Names of wives, husbands and children are popular.   以妻子,丈夫或孩子的名字作为密码的人大有人在。   Some take simplicity to extremes: one former deputy editor of The Economist used z formany years.   有些人的密码简单到了极点:The Economist的一位前副主编多年来一直用Z作密码。   And when hackers stole 32m passwords from a social-gaming website called RockYou, itemerged that 1.1% of the site s users365,000 peoplehad opted either for 123456 or for12345.   当黑客在社交游戏网站盗取了3200万用户的密码后,人们才发现原来这个网站大约1.1%的用户-也就是365,000人-选择了12345或123456作为密码。   That predictability lets security researchers create dictionaries which list commonpasswords, a boon to those seeking to break in.   安全性研究人员于是根据密码的这种可预见性编制了一些罗列处各种常见密码的字典,这对那些有志于破解他人密码的人来说可说是找到了福音。   But although researchers know that passwords are insecure, working out just how insecurehas been difficult.   但即使研究人员已经知道了密码不安全,要确切地给出个不安全系数却是很困难的。   Many studies have only small samples to work ona few thousand passwords at most.   许多研究项目的对象只有一小块样本-最多只有几千个密码。   Hacked websites such as RockYou have provided longer lists, but there are ethical problemswith using hacked information, and its availability is unpredictable.   像Rockyou这样被黑的网站能够提供更多的密码,但使用黑客盗取的密码不仅会引发道德问题上的争议,其可行性也是未知的。   However, a paper to be presented at a security conference held under the auspices of theInstitute of Electrical and Electronics Engineers, a New York-based professional body, inMay, sheds some light.   然而,在五月份由总部位于纽约的一个专业组织-电气电子协会支持下召开了一场安全性研讨会议,会上公布的一份文件让我们看到了解决这个难题的一丝曙光。   With the co-operation of Yahoo!, a large internet company, Joseph Bonneau of CambridgeUniversity obtained the biggest sample to date70m passwords that, though anonymised,came with useful demographic data about their owners.   在一家大型网络公司-雅虎的协助下,剑桥大学的Joseph Bonneau得到了一份迄今为止最大的研究样本,虽然是匿名的,但是包含了其用户极为有用的人口学数据。   Mr Bonneau found some intriguing variations.   在这份样本中Mr Bonneau发现了一些有趣的差异。   Older users had better passwords than young ones.   相较于年轻用户,老用户设置的用户更好。   People whose preferred language was Korean or German chose the most secure passwords;those who spoke Indonesian the least.   母语为韩语或德语的用户所设置的密码安全系数最高,而说印尼语的最低。   Passwords designed to hide sensitive information such as credit-card numbers were onlyslightly more secure than those protecting less important things, like access to games.   被设置用来隐藏像信用卡卡号这样的敏感信息的密码,相比较于另外一些保护游戏登录入口这样不那么重要的信息所设置的密码,其安全性高不了多少。   Nag screens that told users they had chosen a weak password made virtually no difference.   那些提醒用户设置的密码安全性较低的唠叨屏幕其实没有什么作用。   And users whose accounts had been hacked in the past did not make dramatically moresecure choices than those who had never been hacked.   相对于那些从没被黑过的,有过账户被黑经验的用户的安全防范意识也并没得到显著提高。   But it is the broader analysis of the sample that is of most interest to security researchers.   但是,对研究样本进行更为综合性的分析才是安全性研究人员的兴趣所在。   For, despite their differences, the 70m users were still predictable enough that a genericpassword dictionary was effective against both the entire sample and any demographicallyorganised slice of it.   因为尽管存在各种差异,但是通过分析样本中那7000万用户的资料还是可以预见到,一部通用的密码暴力破解字典就能够有效应付这一整个样本,或者任何根据某项人口学特征而从中抽取的一小块资料。   Mr Bonneau is blunt: An attacker who can manage ten guesses per accountwillcompromise around 1% of accounts.   Mr Bonneau直言不讳地说:只要每个账号给破解者10次猜测密码的机会...会有大约1%的密码被破解。   And that, from the hacker s point of view, is a worthwhile outcome.   这在黑客看来绝对值得一试。   One obvious answer would be for sites to limit the number of guesses that can be madebefore access is blocked, as cash machines do.   对网站而言,很显然,他们可以在系统上进行类似于ATM机的设置:一旦密码输入错误次数达到规定者,即封锁登录入口。   Yet whereas the biggest sites, such as Google and Microsoft, do take such measures,many donot.   然而,只有谷歌、微软这样的大型网站采取了类似的措施,很多其他网站对此不以为意。   A sample of 150 big websites examined in 2010 by Mr Bonneau and his colleague SrenPreibusch found that 126 made no attempt to limit guessing.   在2010年,Mr Bonneau和他的同事Sren Preibusch曾对一份囊括了150家大型网站的样本做过调查,结果显示其中126家并没有对密码输入错误次数作出限制。   How this state of affairs arose is obscure.   这种状况的状况的出现实在是令人费解。

  

信息流广告 网络推广 周易 易经 代理招生 二手车 网络营销 招生代理 旅游攻略 非物质文化遗产 查字典 精雕图 戏曲下载 抖音代运营 易学网 互联网资讯 成语 成语故事 诗词 工商注册 注册公司 抖音带货 云南旅游网 网络游戏 代理记账 短视频运营 在线题库 国学网 知识产权 抖音运营 雕龙客 雕塑 奇石 散文 自学教程 常用文书 河北生活网 好书推荐 游戏攻略 心理测试 石家庄人才网 考研真题 汉语知识 心理咨询 手游安卓版下载 兴趣爱好 网络知识 十大品牌排行榜 商标交易 单机游戏下载 短视频代运营 宝宝起名 范文网 电商设计 免费发布信息 服装服饰 律师咨询 搜救犬 Chat GPT中文版 经典范文 优质范文 工作总结 二手车估价 实用范文 爱采购代运营 古诗词 衡水人才网 石家庄点痣 养花 名酒回收 石家庄代理记账 女士发型 搜搜作文 石家庄人才网 铜雕 词典 围棋 chatGPT 读后感 玄机派 企业服务 法律咨询 chatGPT国内版 chatGPT官网 励志名言 河北代理记账公司 文玩 朋友圈文案 语料库 游戏推荐 男士发型 高考作文 PS修图 儿童文学 买车咨询 工作计划 礼品厂 舟舟培训 IT教程 手机游戏推荐排行榜 暖通,电采暖, 女性健康 苗木供应 主题模板 短视频培训 优秀个人博客 包装网 创业赚钱 养生 民间借贷律师 绿色软件 安卓手机游戏 手机软件下载 手机游戏下载 单机游戏大全 免费软件下载 网赚 手游下载 游戏盒子 职业培训 资格考试 成语大全 英语培训 艺术培训 少儿培训 苗木网 雕塑网 好玩的手机游戏推荐 汉语词典 中国机械网 美文欣赏 红楼梦 道德经 网站转让 鲜花 社区团购 社区电商