Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.
Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”
Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.
Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”
The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.
【小题1】Thieves are trying to get access to your computer in order to .A.find your personal informationB.see how your computer is workingC.talk with youD.help you with your system【小题2】Why did Beth Pope use peer-to-peer software?A.Because she wanted others to use her information.B.Because she wanted to try it.C.Because she wanted to increase her music library.D.Because she wanted to get others' financial information.【小题3】Susan Koeppen tried to .A.warn the readers of dangers of sharing music files with others.B.warn the readers not to share music files with others.C.tell us a true and funny storyD.advertise the peer-to-peer networks.【小题4】 From the passage we get to know .A.we shouldn't believe others.B.computers make our life easy and comfortable.C.softwares help us to share music with othersD.everything has two sides, the good side and the bad oneA
Millions of people are now using what are called“peer-to-peer”networks. Basically, you lin
答案:2 悬赏:70 手机版
解决时间 2021-01-03 19:12
- 提问者网友:流星是天使的眼泪
- 2021-01-03 14:56
最佳答案
- 五星知识达人网友:动情书生
- 2021-01-03 16:00
(答案→)A 解析:可联系答.案.网客服索取。
全部回答
- 1楼网友:神鬼未生
- 2021-01-03 17:40
我明天再问问老师,叫他解释下这个问题
我要举报
如以上回答内容为低俗、色情、不良、暴力、侵权、涉及违法等信息,可以点下面链接进行举报!
点此我要举报以上问答信息
大家都在看
推荐资讯