大明山周边农家乐:哪位大虾帮帮忙啊,帮我翻译一下!在此万分感激啊!

来源:百度文库 编辑:查人人中国名人网 时间:2024/04/29 09:42:01
How to Protect Your Data
Nobody's data is completely safe. But everybody’s computer can still be well guarded against would-be attackers. Here’s your arsenal:
Password Protection
At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the net work administrator know. PC users should avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases that combine uppercase and lowercase letters, such as “The moon Also RISES.” In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row.
Virus Checkers
Viruses generally infect local area networks through workstations; so anti-virus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network---personal computers as well as dumb workstations---should be protected individually.
Firewall
These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks---including the Internet a separate local area network at a customer’s site, or a telephone company switch.
Encryption
Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs---Microsoft Windows NT, Novell NetWare, and Lotus Notes, among others---offer add-to encryption schemes that encode all data sent on the network.
Audit Trails
Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. This log---which, ironically, is turned off by many network administrators who don’t appreciate its importance---is an excellent way of recording what occurred during an attack by hackers. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. In addition, this auditing log can prevent internal intrusions before they occur---when employees know such a trail exists.

各们同仁,帮帮忙,翻译一下,不要用软件翻哦,那不准的,这可关系到本人的升学!所以,请大家在百忙这中抽点时间,帮帮小妹!在此谢谢大家了!
由于时间紧迫,这篇翻译,本人周一就要用了,请各位辛苦一下!帮忙今天翻译好,谢谢了!

How to Protect Your Data
Nobody's data is completely safe. But everybody’s computer can still be well guarded against would-be attackers. Here’s your arsenal:
Password Protection
资料保存
没有哪一个人的资料是完全处于安全状态下的。但是每个人的电脑仍然可以在一定程度上防止可能遇到的病毒。它是通过这一途径来实现的:密码保护。

At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the net work administrator know. PC users should avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases that combine uppercase and lowercase letters, such as “The moon Also RISES.”
每次登陆时最起码你得输入只有你自己和电脑协管系统识别的密码。电脑拥护应尽量避免使用让人容易猜到的词组,短语或数字。像生日啊,小孩的名字或首写字母。你应选择比较隐秘的由大小写组成的短语,像“The moon Also RISES.”

In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row.
另外,系统会提示用户至少每个月换一次密码,如果一次登陆时连续三次错误输入密码该系统则会拒绝此用户登陆。

Virus Checkers
Viruses generally infect local area networks through workstations; so anti-virus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network---personal computers as well as dumb workstations---should be protected individually.
电脑病毒检测
电脑病毒通过工作站向该网络区域的电脑上传播病毒。所以仅在服务器上安装杀毒软件是不够的。最理想的方法是,网络连接上的各个终端机--个人电脑及工作站--应该分开来进行杀毒工作。

Firewall
These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks---including the Internet a separate local area network at a customer’s site, or a telephone company switch.
防火墙
通过由硬件和软件设施共同作用下的防护系统来屏蔽未经允许的个人登陆或只让他们使用规定权限内的电脑访问。只要电脑系统一经与其他网络连接防火墙就应设置--包括独立的用户区域或通过拨号上网。

Encryption
Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs---Microsoft Windows NT, Novell NetWare, and Lotus Notes, among others---offer add-to encryption schemes that encode all data sent on the network.
电脑加密
就算闯入者打破防火墙进入,如果你的资料已转译为密码则不会有危险。很多软件套和网络程序--Microsoft Windows NT, Novell NetWare, and Lotus Notes以及还有其他的此类工具都提供将资料转译为密码上传到网络的功能。

Audit Trails
Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. This log---which, ironically, is turned off by many network administrators who don’t appreciate its importance---
审查记录
几乎所以的防火墙,加密系统,密码保护包括审查功能记录下了网络的每一次操作。这些记录--讽刺的说,被很多网络管理员所忽视掉了它的重要性--

is an excellent way of recording what occurred during an attack by hackers. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. In addition, this auditing log can prevent internal intrusions before they occur---when employees know such a trail exists.
这是个很好的当电脑被黑客袭击过程记录的途径。这项审查记录不仅仅只是保护了电脑系统的薄弱环节,而是确认密码并安装保护电脑受内部操作的影响。另外,该项审查记录可以在电脑内部出现问题时做出防护--只要是拥护了解到了这么个审查程序的重要性的话。

如何保护你的数据

没有人的数据是完全的安全的,但每个人的计算机都能收到良好的保护以防止可能的破坏。以下是可以采取的措施:

密码保护

一般,每一次用户打开电脑,所有的电脑都应要求输入只有合法用户和网络管理员才知道的密码。电脑密码设置时应该避免使用一些容易被其他人猜出来的单词、短语和数字,例如一个小孩的名字,或名字的缩写。一个安全的密码最好使用含有大小写字母混合的不容易被猜出的密码,像“The moon Also RISES”。另外,还应该要求所有的用户定期更改密码,并在登录系统时连续三次输入密码错误后锁定系统。

病毒防护

病毒通常通过工作站来感染本地网络,因此单单在一台服务器上工作的防病毒软件是不够的。最好网络上所有的终端——个人电脑和工作站——都能有受到单独的防护。

防火墙

防火墙分为软件防火墙和硬件防火墙两种,它们通过阻止未授权的用户并只允许用户进行已授权的访问。每一台和其他网络有联系的系统都应该安装有防火墙——包括局域网内的客户端或电话交换器。

数据加密

即使入侵者闯入了防火墙内,数据依然能通过加密的方式来保证安全。很多软件和网络程序——包括Microsoft Windows NT、Novell NetWare、Lotus Notes等——都提供有对所有发送到网络上的数据进行加密的功能。

日志

差不多所有的防火墙、加密软件和口令设置都包含有记录日志的功能,在日志中包含了所有的操作。但具有讽刺意味的是日志记录的功能通常都被很多不看重它们的网络管理员关掉了,其实记录日志是一个极好的记录黑客们踪迹的方法。日志文件不仅能保护工作网络的弱点,也能记录用来侵入系统的密码和工具。另外,当人们知道有日志记录的时候,还能够防止内部人员的破坏和捣乱。

不错,收下

如何保护你的数据

没有人的数据是完全的安全的,但每个人的计算机都能收到良好的保护以防止可能的破坏。以下是可以采取的措施:

密码保护

一般,每一次用户打开电脑,所有的电脑都应要求输入只有合法用户和网络管理员才知道的密码。电脑密码设置时应该避免使用一些容易被其他人猜出来的单词、短语和数字,例如一个小孩的名字,或名字的缩写。一个安全的密码最好使用含有大小写字母混合的不容易被猜出的密码,像“The moon Also RISES”。另外,还应该要求所有的用户定期更改密码,并在登录系统时连续三次输入密码错误后锁定系统。

病毒防护

病毒通常通过工作站来感染本地网络,因此单单在一台服务器上工作的防病毒软件是不够的。最好网络上所有的终端——个人电脑和工作站——都能有受到单独的防护。

防火墙

防火墙分为软件防火墙和硬件防火墙两种,它们通过阻止未授权的用户并只允许用户进行已授权的访问。每一台和其他网络有联系的系统都应该安装有防火墙——包括局域网内的客户端或电话交换器。

数据加密

即使入侵者闯入了防火墙内,数据依然能通过加密的方式来保证安全。很多软件和网络程序——包括Microsoft Windows NT、Novell NetWare、Lotus Notes等——都提供有对所有发送到网络上的数据进行加密的功能。

日志

差不多所有的防火墙、加密软件和口令设置都包含有记录日志的功能,在日志中包含了所有的操作。但具有讽刺意味的是日志记录的功能通常都被很多不看重它们的网络管理员关掉了,其实记录日志是一个极好的记录黑客们踪迹的方法。日志文件不仅能保护工作网络的弱点,也能记录用来侵入系统的密码和工具。另外,当人们知道有日志记录的时候,还能够防止内部人员的破坏和捣乱