電腦密碼

        雕龍文庫 分享 時間: 收藏本文

        電腦密碼

          2023復(fù)習(xí)正是強(qiáng)化復(fù)習(xí)階段,在考研英語中占了40分,所以考研英語閱讀是英語科目中重要的一項。名師老師曾建議過考研生需要堅持每天泛讀10-15分鐘的英文原刊。強(qiáng)烈推薦了雜志《經(jīng)濟(jì)學(xué)人》.雜志中的文章也是考研英語的主要材料來源.希望考研考生認(rèn)真閱讀,快速提高考研英語閱讀水平。   Computer passwords   電腦密碼   Speak, friend, and enter   說,朋友和進(jìn)入   Computer passwords need to be memorable andsecure.   電腦密碼須具備兩個特性:易記及難猜。   Most people s are the first but not the second.   但是大部分人的密碼只注重了前者卻忽略了后者。   Researchers are trying to make it easier for them to be both   研究人員正努力讓兩者兼而有之變得更以實現(xiàn)。   PASSWORDS are ubiquitous in computer security.   密碼在電腦安全領(lǐng)域的應(yīng)用相當(dāng)普遍。   All too often, they are also ineffective.   但他們往往沒起什么作用。   A good password has to be both easy to remember and hard to guess, but in practice peopleseem to plump for the former over the latter.   一個好密碼必須具備易記及難猜兩個特征,而實際上人們好像只注意到了前者而忽略了后者。   Names of wives, husbands and children are popular.   以妻子,丈夫或孩子的名字作為密碼的人大有人在。   Some take simplicity to extremes: one former deputy editor of The Economist used z formany years.   有些人的密碼簡單到了極點:The Economist的一位前副主編多年來一直用Z作密碼。   And when hackers stole 32m passwords from a social-gaming website called RockYou, itemerged that 1.1% of the site s users365,000 peoplehad opted either for 123456 or for12345.   當(dāng)黑客在社交游戲網(wǎng)站盜取了3200萬用戶的密碼后,人們才發(fā)現(xiàn)原來這個網(wǎng)站大約1.1%的用戶-也就是365,000人-選擇了12345或123456作為密碼。   That predictability lets security researchers create dictionaries which list commonpasswords, a boon to those seeking to break in.   安全性研究人員于是根據(jù)密碼的這種可預(yù)見性編制了一些羅列處各種常見密碼的字典,這對那些有志于破解他人密碼的人來說可說是找到了福音。   But although researchers know that passwords are insecure, working out just how insecurehas been difficult.   但即使研究人員已經(jīng)知道了密碼不安全,要確切地給出個不安全系數(shù)卻是很困難的。   Many studies have only small samples to work ona few thousand passwords at most.   許多研究項目的對象只有一小塊樣本-最多只有幾千個密碼。   Hacked websites such as RockYou have provided longer lists, but there are ethical problemswith using hacked information, and its availability is unpredictable.   像Rockyou這樣被黑的網(wǎng)站能夠提供更多的密碼,但使用黑客盜取的密碼不僅會引發(fā)道德問題上的爭議,其可行性也是未知的。   However, a paper to be presented at a security conference held under the auspices of theInstitute of Electrical and Electronics Engineers, a New York-based professional body, inMay, sheds some light.   然而,在五月份由總部位于紐約的一個專業(yè)組織-電氣電子協(xié)會支持下召開了一場安全性研討會議,會上公布的一份文件讓我們看到了解決這個難題的一絲曙光。   With the co-operation of Yahoo!, a large internet company, Joseph Bonneau of CambridgeUniversity obtained the biggest sample to date70m passwords that, though anonymised,came with useful demographic data about their owners.   在一家大型網(wǎng)絡(luò)公司-雅虎的協(xié)助下,劍橋大學(xué)的Joseph Bonneau得到了一份迄今為止最大的研究樣本,雖然是匿名的,但是包含了其用戶極為有用的人口學(xué)數(shù)據(jù)。   Mr Bonneau found some intriguing variations.   在這份樣本中Mr Bonneau發(fā)現(xiàn)了一些有趣的差異。   Older users had better passwords than young ones.   相較于年輕用戶,老用戶設(shè)置的用戶更好。   People whose preferred language was Korean or German chose the most secure passwords;those who spoke Indonesian the least.   母語為韓語或德語的用戶所設(shè)置的密碼安全系數(shù)最高,而說印尼語的最低。   Passwords designed to hide sensitive information such as credit-card numbers were onlyslightly more secure than those protecting less important things, like access to games.   被設(shè)置用來隱藏像信用卡卡號這樣的敏感信息的密碼,相比較于另外一些保護(hù)游戲登錄入口這樣不那么重要的信息所設(shè)置的密碼,其安全性高不了多少。   Nag screens that told users they had chosen a weak password made virtually no difference.   那些提醒用戶設(shè)置的密碼安全性較低的嘮叨屏幕其實沒有什么作用。   And users whose accounts had been hacked in the past did not make dramatically moresecure choices than those who had never been hacked.   相對于那些從沒被黑過的,有過賬戶被黑經(jīng)驗的用戶的安全防范意識也并沒得到顯著提高。   But it is the broader analysis of the sample that is of most interest to security researchers.   但是,對研究樣本進(jìn)行更為綜合性的分析才是安全性研究人員的興趣所在。   For, despite their differences, the 70m users were still predictable enough that a genericpassword dictionary was effective against both the entire sample and any demographicallyorganised slice of it.   因為盡管存在各種差異,但是通過分析樣本中那7000萬用戶的資料還是可以預(yù)見到,一部通用的密碼暴力破解字典就能夠有效應(yīng)付這一整個樣本,或者任何根據(jù)某項人口學(xué)特征而從中抽取的一小塊資料。   Mr Bonneau is blunt: An attacker who can manage ten guesses per accountwillcompromise around 1% of accounts.   Mr Bonneau直言不諱地說:只要每個賬號給破解者10次猜測密碼的機(jī)會...會有大約1%的密碼被破解。   And that, from the hacker s point of view, is a worthwhile outcome.   這在黑客看來絕對值得一試。   One obvious answer would be for sites to limit the number of guesses that can be madebefore access is blocked, as cash machines do.   對網(wǎng)站而言,很顯然,他們可以在系統(tǒng)上進(jìn)行類似于ATM機(jī)的設(shè)置:一旦密碼輸入錯誤次數(shù)達(dá)到規(guī)定者,即封鎖登錄入口。   Yet whereas the biggest sites, such as Google and Microsoft, do take such measures,many donot.   然而,只有谷歌、微軟這樣的大型網(wǎng)站采取了類似的措施,很多其他網(wǎng)站對此不以為意。   A sample of 150 big websites examined in 2010 by Mr Bonneau and his colleague SrenPreibusch found that 126 made no attempt to limit guessing.   在2010年,Mr Bonneau和他的同事Sren Preibusch曾對一份囊括了150家大型網(wǎng)站的樣本做過調(diào)查,結(jié)果顯示其中126家并沒有對密碼輸入錯誤次數(shù)作出限制。   How this state of affairs arose is obscure.   這種狀況的狀況的出現(xiàn)實在是令人費(fèi)解。

          

          2023復(fù)習(xí)正是強(qiáng)化復(fù)習(xí)階段,在考研英語中占了40分,所以考研英語閱讀是英語科目中重要的一項。名師老師曾建議過考研生需要堅持每天泛讀10-15分鐘的英文原刊。強(qiáng)烈推薦了雜志《經(jīng)濟(jì)學(xué)人》.雜志中的文章也是考研英語的主要材料來源.希望考研考生認(rèn)真閱讀,快速提高考研英語閱讀水平。   Computer passwords   電腦密碼   Speak, friend, and enter   說,朋友和進(jìn)入   Computer passwords need to be memorable andsecure.   電腦密碼須具備兩個特性:易記及難猜。   Most people s are the first but not the second.   但是大部分人的密碼只注重了前者卻忽略了后者。   Researchers are trying to make it easier for them to be both   研究人員正努力讓兩者兼而有之變得更以實現(xiàn)。   PASSWORDS are ubiquitous in computer security.   密碼在電腦安全領(lǐng)域的應(yīng)用相當(dāng)普遍。   All too often, they are also ineffective.   但他們往往沒起什么作用。   A good password has to be both easy to remember and hard to guess, but in practice peopleseem to plump for the former over the latter.   一個好密碼必須具備易記及難猜兩個特征,而實際上人們好像只注意到了前者而忽略了后者。   Names of wives, husbands and children are popular.   以妻子,丈夫或孩子的名字作為密碼的人大有人在。   Some take simplicity to extremes: one former deputy editor of The Economist used z formany years.   有些人的密碼簡單到了極點:The Economist的一位前副主編多年來一直用Z作密碼。   And when hackers stole 32m passwords from a social-gaming website called RockYou, itemerged that 1.1% of the site s users365,000 peoplehad opted either for 123456 or for12345.   當(dāng)黑客在社交游戲網(wǎng)站盜取了3200萬用戶的密碼后,人們才發(fā)現(xiàn)原來這個網(wǎng)站大約1.1%的用戶-也就是365,000人-選擇了12345或123456作為密碼。   That predictability lets security researchers create dictionaries which list commonpasswords, a boon to those seeking to break in.   安全性研究人員于是根據(jù)密碼的這種可預(yù)見性編制了一些羅列處各種常見密碼的字典,這對那些有志于破解他人密碼的人來說可說是找到了福音。   But although researchers know that passwords are insecure, working out just how insecurehas been difficult.   但即使研究人員已經(jīng)知道了密碼不安全,要確切地給出個不安全系數(shù)卻是很困難的。   Many studies have only small samples to work ona few thousand passwords at most.   許多研究項目的對象只有一小塊樣本-最多只有幾千個密碼。   Hacked websites such as RockYou have provided longer lists, but there are ethical problemswith using hacked information, and its availability is unpredictable.   像Rockyou這樣被黑的網(wǎng)站能夠提供更多的密碼,但使用黑客盜取的密碼不僅會引發(fā)道德問題上的爭議,其可行性也是未知的。   However, a paper to be presented at a security conference held under the auspices of theInstitute of Electrical and Electronics Engineers, a New York-based professional body, inMay, sheds some light.   然而,在五月份由總部位于紐約的一個專業(yè)組織-電氣電子協(xié)會支持下召開了一場安全性研討會議,會上公布的一份文件讓我們看到了解決這個難題的一絲曙光。   With the co-operation of Yahoo!, a large internet company, Joseph Bonneau of CambridgeUniversity obtained the biggest sample to date70m passwords that, though anonymised,came with useful demographic data about their owners.   在一家大型網(wǎng)絡(luò)公司-雅虎的協(xié)助下,劍橋大學(xué)的Joseph Bonneau得到了一份迄今為止最大的研究樣本,雖然是匿名的,但是包含了其用戶極為有用的人口學(xué)數(shù)據(jù)。   Mr Bonneau found some intriguing variations.   在這份樣本中Mr Bonneau發(fā)現(xiàn)了一些有趣的差異。   Older users had better passwords than young ones.   相較于年輕用戶,老用戶設(shè)置的用戶更好。   People whose preferred language was Korean or German chose the most secure passwords;those who spoke Indonesian the least.   母語為韓語或德語的用戶所設(shè)置的密碼安全系數(shù)最高,而說印尼語的最低。   Passwords designed to hide sensitive information such as credit-card numbers were onlyslightly more secure than those protecting less important things, like access to games.   被設(shè)置用來隱藏像信用卡卡號這樣的敏感信息的密碼,相比較于另外一些保護(hù)游戲登錄入口這樣不那么重要的信息所設(shè)置的密碼,其安全性高不了多少。   Nag screens that told users they had chosen a weak password made virtually no difference.   那些提醒用戶設(shè)置的密碼安全性較低的嘮叨屏幕其實沒有什么作用。   And users whose accounts had been hacked in the past did not make dramatically moresecure choices than those who had never been hacked.   相對于那些從沒被黑過的,有過賬戶被黑經(jīng)驗的用戶的安全防范意識也并沒得到顯著提高。   But it is the broader analysis of the sample that is of most interest to security researchers.   但是,對研究樣本進(jìn)行更為綜合性的分析才是安全性研究人員的興趣所在。   For, despite their differences, the 70m users were still predictable enough that a genericpassword dictionary was effective against both the entire sample and any demographicallyorganised slice of it.   因為盡管存在各種差異,但是通過分析樣本中那7000萬用戶的資料還是可以預(yù)見到,一部通用的密碼暴力破解字典就能夠有效應(yīng)付這一整個樣本,或者任何根據(jù)某項人口學(xué)特征而從中抽取的一小塊資料。   Mr Bonneau is blunt: An attacker who can manage ten guesses per accountwillcompromise around 1% of accounts.   Mr Bonneau直言不諱地說:只要每個賬號給破解者10次猜測密碼的機(jī)會...會有大約1%的密碼被破解。   And that, from the hacker s point of view, is a worthwhile outcome.   這在黑客看來絕對值得一試。   One obvious answer would be for sites to limit the number of guesses that can be madebefore access is blocked, as cash machines do.   對網(wǎng)站而言,很顯然,他們可以在系統(tǒng)上進(jìn)行類似于ATM機(jī)的設(shè)置:一旦密碼輸入錯誤次數(shù)達(dá)到規(guī)定者,即封鎖登錄入口。   Yet whereas the biggest sites, such as Google and Microsoft, do take such measures,many donot.   然而,只有谷歌、微軟這樣的大型網(wǎng)站采取了類似的措施,很多其他網(wǎng)站對此不以為意。   A sample of 150 big websites examined in 2010 by Mr Bonneau and his colleague SrenPreibusch found that 126 made no attempt to limit guessing.   在2010年,Mr Bonneau和他的同事Sren Preibusch曾對一份囊括了150家大型網(wǎng)站的樣本做過調(diào)查,結(jié)果顯示其中126家并沒有對密碼輸入錯誤次數(shù)作出限制。   How this state of affairs arose is obscure.   這種狀況的狀況的出現(xiàn)實在是令人費(fèi)解。

          

        周易 易經(jīng) 代理招生 二手車 網(wǎng)絡(luò)營銷 旅游攻略 非物質(zhì)文化遺產(chǎn) 查字典 精雕圖 戲曲下載 抖音代運(yùn)營 易學(xué)網(wǎng) 互聯(lián)網(wǎng)資訊 成語 詩詞 工商注冊 抖音帶貨 云南旅游網(wǎng) 網(wǎng)絡(luò)游戲 代理記賬 短視頻運(yùn)營 在線題庫 國學(xué)網(wǎng) 抖音運(yùn)營 雕龍客 雕塑 奇石 散文 常用文書 河北生活網(wǎng) 好書推薦 游戲攻略 心理測試 石家莊人才網(wǎng) 考研真題 漢語知識 心理咨詢 手游安卓版下載 興趣愛好 網(wǎng)絡(luò)知識 十大品牌排行榜 商標(biāo)交易 單機(jī)游戲下載 短視頻代運(yùn)營 寶寶起名 范文網(wǎng) 電商設(shè)計 免費(fèi)發(fā)布信息 服裝服飾 律師咨詢 搜救犬 Chat GPT中文版 經(jīng)典范文 優(yōu)質(zhì)范文 工作總結(jié) 二手車估價 實用范文 石家莊點痣 養(yǎng)花 名酒回收 石家莊代理記賬 女士發(fā)型 搜搜作文 鋼琴入門指法教程 詞典 讀后感 玄機(jī)派 企業(yè)服務(wù) 法律咨詢 chatGPT國內(nèi)版 chatGPT官網(wǎng) 勵志名言 文玩 語料庫 游戲推薦 男士發(fā)型 高考作文 PS修圖 兒童文學(xué) 工作計劃 舟舟培訓(xùn) IT教程 手機(jī)游戲推薦排行榜 暖通,電地暖, 女性健康 苗木供應(yīng) ps素材庫 短視頻培訓(xùn) 優(yōu)秀個人博客 包裝網(wǎng) 創(chuàng)業(yè)賺錢 養(yǎng)生 民間借貸律師 綠色軟件 安卓手機(jī)游戲 手機(jī)軟件下載 手機(jī)游戲下載 單機(jī)游戲大全 石家莊論壇 網(wǎng)賺 職業(yè)培訓(xùn) 資格考試 成語大全 英語培訓(xùn) 藝術(shù)培訓(xùn) 少兒培訓(xùn) 苗木網(wǎng) 雕塑網(wǎng) 好玩的手機(jī)游戲推薦 漢語詞典 中國機(jī)械網(wǎng) 美文欣賞 紅樓夢 道德經(jīng) 標(biāo)準(zhǔn)件 電地暖 鮮花 書包網(wǎng) 英語培訓(xùn)機(jī)構(gòu) 電商運(yùn)營
        亚洲第一极品精品无码久久| 亚洲第一页在线观看| 亚洲色图在线播放| 国产成人无码综合亚洲日韩| 国产亚洲情侣一区二区无| 亚洲中文字幕视频国产| 亚洲成人高清在线| 亚洲А∨精品天堂在线| 久久精品国产亚洲AV未满十八| 亚洲乱亚洲乱妇无码| 亚洲日韩久久综合中文字幕| 亚洲精品美女久久7777777| 亚洲欧洲日产国码久在线| 中文字幕亚洲男人的天堂网络| 亚洲AV成人无码天堂| 狠狠色香婷婷久久亚洲精品| 天堂亚洲国产中文在线| 亚洲乱码av中文一区二区| 含羞草国产亚洲精品岁国产精品| 亚洲GV天堂GV无码男同| mm1313亚洲国产精品无码试看| 另类小说亚洲色图| 亚洲日韩精品无码专区网站| 国产亚洲精品久久久久秋霞| 亚洲精品制服丝袜四区| 亚洲AV无码国产在丝袜线观看 | 亚洲成A∨人片在线观看不卡| 国产亚洲一区二区三区在线| 久久久久亚洲AV无码专区首| 久久久亚洲AV波多野结衣| 亚洲成无码人在线观看| 91丁香亚洲综合社区| 亚洲妇女无套内射精| 亚洲AV伊人久久青青草原| 久久99亚洲综合精品首页| 日本红怡院亚洲红怡院最新| 久久丫精品国产亚洲av不卡| 亚洲午夜精品一区二区公牛电影院| 亚洲丁香婷婷综合久久| 亚洲熟妇成人精品一区| 精品亚洲成a人在线观看|