课程咨询
托福培训

扫码免费领资料

托福全科备考资料

免费水平测试及规划

托福培训

扫码关注掌握一手留学资讯

回复XDF免费水平测试

科学美国人60秒:非联网状态下电脑遭入侵-托福听力下载

2016-12-09 15:53:53来源:科学美国人60秒

点击查看>>科学美国人60秒音频:非联网状态下电脑遭入侵

  科学美国人60秒中英文翻译:非联网状态下电脑遭入侵

  科学美国人60秒英文文本

  Connecting your computer to the Internet gives would-be spies an obvious entry point to your machine.

  But other ways exist to snoop.

  Because even computers that aren't connected to the Internet broadcast their activity in the form of electromagnetic radiation.

  Basically your computer is full of transistors.

  And they're switching current from high to low depending if it is a zero or a one of the bit that they're trying to execute."

  Alenka Zajic, an electrical engineer at Georgia Tech.

  "When you do that you're creating a voltage fluctuation and current fluctuation.

  And that basically creates electromagnetic field."

  By hooking an antenna and receiver up to a laptop, Zajic and her colleagues were able to log the keystrokes of a computer in the next room, by measuring exceedingly tiny fluctuations in the computer's radiation.

  The same technique can reveal which programs you're using, too.

  Every one of them has a different signature in electromagnetic fields.

  So I can tell which application you opened by looking into the spectrum.

  The researchers quantified the signal available to eavesdroppers in a recent paper,presented at the IEEE/ACM International Symposium on Microarchitecture in the U.K.

  Of course, real spies at the NSA and the CIA probably already know about this trick, she says.

  But by alerting developers to the problem, it might be possible to mask these electromagnetic leaks.

  And keep your computer's activity to yourself.

  中文翻译请点击下一页

托福辅导

关注新东方在线托福

托福机经·Official题目练习

考前重点突破·听说读写海量资料

更多资料
更多>>
更多内容

免费获取托福备考大礼包

微信扫描下方二维码 立即领取

托福辅导
更多>>
更多公益讲座>>
更多>>
更多资料