PDA

View Full Version : Mỗi ngày một bài dịch trên technewsworld !



johan_tran
03-12-2007, 15:02
Từ hôm nay mỗi ngày mình sẽ luyện từ vựng bằng cách dịch một bài tin bên technewsworld, mọi người nếu thấy mình dịch sai thì nhớ chỉ bảo mình nhé. Xin chân thành cảm ơn.

thagnv
03-12-2007, 15:26
Hehe... ủng hộ hết mình... bác cứ post nguyên mẫu lên rồi ngồi dịch, có gì cùng trao đổi...

johan_tran
04-12-2007, 17:02
The Evolution of Spam, Part 1: New Tricks

"Storm uses complex programming techniques to automatically repackage itself," remarked Randy Abrams, director of technical education at ESET. "It's a bit like someone changing their costume at a party every five minutes. Inside it is the same, but outside it looks different. ... The Storm authors look at how they are being detected and then devise counter attacks."

It's not a comforting thought, but while you're sleeping peacefully, your PC may be hard at work acting as a spam server See the HP Proliant DL380 G5 Server with Systems Insight Manager – Click here. or peer-to-peer node, providing processing power to a malware Webroot AntiSpyware 30-Day Free Trial. Click here. network See the HP StorageWorks All-in-One Storage System. Click here. engaging in any of a variety of criminal activities online.

Spam is being used by botnet operators in a multiplicity of new forms -- such as those behind the now prolific Storm spam-malware hybrid -- to build distributed robot networks, or botnets, made up of spam recipients' enslaved "zombie" PCs. Taken together, the zombie armies provide raw processing power rivaling, and sometimes even surpassing, that of the most powerful supercomputers.

What's especially disturbing is that some legitimate businesses and regulatory and enforcement regimes are complicit, in that they make it more difficult than it needs to be curtail the problem.

"Spam is much bigger than the Storm worm," Randy Abrams, director of technical education at ESET, told the E-Commerce Times.

"Not the least of the problems is the American Congress legalizing spam through the 'Canned Spam Act,' which companies like Microsoft (Nasdaq: MSFT) Latest News about Microsoft strongly supported," he maintained. "The spammers have very big businesses backing their efforts. Any company that supports 'opt out' instead of 'opt in' is an integral part of the problem."
Faster Mutation

Storm's combination of spam and malware has infected an estimated 10 million PCs, though the number is constantly changing. However, there's really no way of knowing how many PCs are infected at any one time.

"In reality, it is a dynamic number," explained Shane Coursen, senior technical consultant at Kaspersky Lab.

"The number of Storm-infected machines is in constant flux. Nobody really knows the exact number of Storm-infected machines that exist in the world, but you can be assured it is quite a significant amount," he told the E-Commerce Times. "New machines are constantly being folded into the Storm botnet, just as machines already compromised by Storm are being cleaned and removed from the botnet."

Another thing that's changing is the degree of sophistication and the scale of the botnets spam manufacturers now employ.

"Spam continues to get more sophisticated. Over the past 12 months, we have seen the evolution of spam mutation change as much as it did over the entire previous decade," noted Troy Saxton-Getty, vice-president and general manager at St. Bernard, developer of the LivePrism on-demand e-mail E-Mail Marketing Software - Free Trial. Click Here. and PC security platform.

"The significance is that detection methods are needing to evolve just as quickly," he told the E-Commerce Times.

"Every day, spammers make tools and use methods to get around the current defenses available in the market," said Saxton-Getty. "It takes only a number of weeks to see the majority of spammers utilizing these same methods, which on a given day can decrease our effectiveness significantly."

This, of course, means that spam detection and prevention specialists have to run faster and do more to keep up.

"Anti-spam defenses are having to deploy multifactor solutions to maintain the same level of detection as they once had with single factor tools," Saxton-Getty pointed out. "This means an increase in the time it takes to process through multiple tools, an increase in cost of goods to the service or appliance vendor, and it opens up the potential for an increase in the false positive rate."
Storm's Resurgence

Following a brief period of quiescence, massive Storm-driven spam attacks are once again lighting up security researchers' radar screens. Spam links to MP3 audio files, YouTube videos and Adobe .pdf documents are being used to gull recipients into downloading infected attachments and visiting Web sites that serve as malware distribution nodes -- further infecting their PCs and turning them into part of a network of remotely controlled zombie slaves.

This latest evolutionary wave follows an earlier Storm-driven spam onslaught in which recipients were lured into pump-and-dump stock trading schemes.

The first mass mailing of stock trading spam used specially crafted graphics files that contained background noise, as well as Adobe .pdf files, which at the time were not detected by spam filters, according to Kaspersky Lab.

Storm and other spam creators are notorious for making creative use of timely events and topics -- dancing skeletons for Halloween, cheap pharmaceuticals, messages touting links to popular YouTube videos, e-greeting cards, and ads for credit report services -- in order to entice recipients to open file attachments or follow links to infected Web sites.

Storm spammers, in particular, are also known for their innovation when it comes to evading spam filters and other network and PC security defenses.

"Spammers once again made several attempts to modernize the technology used in creating graphical attachments in spam e-mails (image spam) during the first six months of 2007," Kaspersky researchers note in a recent Viruslist report.

For example, in February 2007, renewed attempts were made to use with animated graphics, which spammers had all but abandoned by the end of November 2006. This new type of animation differs from the previous type in that the source image is broken into fragments, and each fragment is skewed at a different angle," the report states.

Image spam is a huge problem for two main reasons, said ESET's Abrams.

"First, simply identifying a known image is not always effective. It is trivial to programmatically alter an image by a few pixels, which breaks traditional identification. There are millions of minor alterations that can be made without visibly affecting the image," he explained.

"Secondly, spammers are using links to images hosted on Web sites. The image itself is not in the e-mail until it is opened. One potential approach is to blacklist Web sites and e-mail addresses," Abrams suggested. "This is somewhat effective, but not only does it require a lot of maintenance -- it isn't foolproof. Images can be stored on hacked Web sites for legitimate companies, and botnets use millions of legitimate e-mail addresses to do their sending."
Resiliency Through Adaptation

Though not usually overtly threatening -- that is, they don't typically embed code that could erase disk drives, disable PCs or install keyloggers to capture confidential data such as passwords -- Storm worms or Trojan horses are proving to be the most adaptable malware yet seen.

Storm spam has demonstrated an ability to adapt and change its own code extremely quickly based on the spam filters and other defenses it encounters while attempting to make its way through network and PC defenses, for instance.

"Storm uses complex programming techniques to automatically repackage itself," remarked Abrams. "It's a bit like someone changing their costume at a party every five minutes. Inside it is the same, but outside it looks different. There are still recognizable attributes of the person, such as size, shape, voice and mannerisms, though. The Storm authors look at how they are being detected and then devise counter attacks."

It's the tenacity of Storm programmers in evading detection that has made it such a high-profile malware, Abrams commented.

"From a spam perspective, it is simply one of a large number of botnets that are used to send out spam. Fundamentally, Storm is no better at spamming than any other botnet," he asserted. "Storm is better at getting itself installed and avoiding detection. That said, ESET's heuristics have been detecting the new variants of Storm proactively for several months now. It is not unbeatable."

Bài dài quá có lẽ mình không thể dịch hết ngay một lúc được

thagnv
04-12-2007, 17:13
Bài này Tuổi trẻ đăng rồi... http://www.tuoitre.com.vn/Tianyon/Index.aspx?ArticleID=232126&ChannelID=65

study one
04-12-2007, 21:21
ước gì mình ngủ 1 giấc rồi khi tỉnh dậy biết nói mấy thứ tiếng liền như Anh, Pháp, Đức, Trung Quốc, Nhật nhỉ :D

Let's-me-see
04-12-2007, 21:24
ước gì mình ngủ 1 giấc rồi khi tỉnh dậy biết nói mấy thứ tiếng liền như Anh, Pháp, Đức, Trung Quốc, Nhật nhỉ :D

:eek:
:eek:
bác hồ nói được 25 thú tiếng ước gì tui được như vậy !!
:eek:

silkroadpro
04-12-2007, 21:43
trời ơi tưởng post cái nào ngắn ngắn ai dè Ctrl C 1 đống mới kéo chuột đã thấy nản rồi,hơi sức đâu mà lao vào vái đống đó nữa.

ThaiYen
04-12-2007, 21:48
Đúng là bài dài quá! Nếu để trao đổi và thảo luận thì nên chọn bài ngắn hơn! Tui cũng rất muốn tham gia vì cái món từ IT này không biết lắm, muốn học hỏi thêm từ những người chuyên nghiên cứu về IT.

baba22
05-12-2007, 12:59
Dài thiệt. Bác post nhiều wé 1 lần làm nhìn nhiều chữ quá sẽ tạo cảm giác chán đó.
Post từng đoạn thui.

johan_tran
05-12-2007, 16:53
Thật rất xin lỗi các bro(mình nhìn cũng nản lắm:buck:) tại bài đầy đủ nó thế. Để mình kiếm cái ngắn ngắn vậy.

hien752
10-12-2007, 11:20
Trang này hay đấy, đúng là trang mình cần tìm

Pagan
10-12-2007, 11:53
Chắc ý bác là 1 tuần/bài, chứ 1 ngày thì e khó đấy :) .

tanokalidi
14-12-2007, 01:32
Thật rất xin lỗi các bro(mình nhìn cũng nản lắm:buck:) tại bài đầy đủ nó thế. Để mình kiếm cái ngắn ngắn vậy.


Hài quá... phải khẩu hiệu thế này này, Tôi ơi cố lên...

johan_tran
14-12-2007, 21:42
Sau sự thất bại nặng nề của technewsworld project hôm nay mình trở lại với một project rất triển vọng đó là nghe-hiểu+đọc-hiểu với V.O.A.
Với project này nội công của các bạn sẽ tăng kinh khủng.
Và mở đầu là một bài của bản tin ngày hôm nay.
Tiêu đề:Erie Canal (http://www.voanews.com/specialenglish/2007-12-11-voa1.cfm)
Download mp3 để nghe tại đây (http://www.voanews.com/mediaassets/specialenglish/2007_12/Audio/mp3/se-exp-erie-canal-11dec07.mp3)

July Fourth, eighteen seventeen, was a special day in Rome, New York. People there celebrated the anniversary of America’s independence from Britain. They also marked the groundbreaking for the building of the Erie Canal. When it was completed eight years later, the canal became America’s first national waterway.
http://www.voanews.com/specialenglish/images/Buffalo_erie_canal_w_11dec0_1.jpg
The Erie Canal crossed the state of New York from the city of Buffalo on Lake Erie to Albany and Troy on the Hudson River. The Hudson River flowed into the Atlantic Ocean at New York City. So the canal joined the Great Lakes with the Atlantic Ocean. The canal made New York City a major port.
The difficulty of traveling through the Appalachian Mountains had kept many people from going west. The mountains also prevented people in the West from sending their wood and farm products east. But the canal overcame the natural barrier of those mountains. It helped open the American West. The Erie Canal made the United States a richer and stronger young nation.
Politicians, businessmen, farmers and traders had talked about creating a canal connecting the Great Lakes with the Atlantic Ocean for one hundred years. A lawyer and politician named De Witt Clinton finally succeeded in getting the canal built.

As early as eighteen-oh-nine, Clinton saw the need for the canal. Then he had to defend his idea against people who laughed at him. Some critics called the canal “Clinton’s Folly” -- a stupid project. In eighteen twelve, the federal government rejected a proposal to provide money for the canal.

But five years later, the New York State legislature provided more than seven million dollars for the project. The lawmakers named Clinton to head a committee to supervise the development of the canal. De Witt Clinton was elected governor of New York that same year.

Và sau đây mình xin tạm dịch:

Ngày 4-7-1817, là một ngày đặc biệt tại Rome,New York.Cùng ngày đó họ khởi công xây dựng kênh Erie. Tám năm sau, khi hoàn thành nó trở thành tuyến đường thủy xuyên quốc gia đầu tiên của Mỹ.
Kênh Erie đi qua New York từ Buffalo trên hồ Erie tới Albany và Troy trên sông Hudson. Sông Hudson hòa vào Đại tây dương tại New York. Do vậy kênh Erie đã nối hồ Great với Đại Tây Dương. Con kênh này đã biến New York trở thành một cảng quan trọng.
Sự khó khăn khi đi qua những ngọn núi Appalachian đã ngăn nhiều người từ phía Tây. Những dãy núi đã cản trở người dân miền Tây đưa nông lâm phẩm của họ sang phía Đông. Nhưng kênh Erie đã giải quyết được những vấn đề đó. Nó mở ra con đường giữa hai miền Đông Tây và làm cho USA trở thành một đất nước giàu có.
Những chính trị gia,thương gia,nông dân và những người buôn bán nhỏ nói về việc nối giữa Great Lake và Đại Tây Dương suốt 1 trăm năm. Cuối cùng luật sư,chính trị gia có tên De Witt Clinton đã thành công trong việc xây dựng kênh Erie.
Vào đầu năm 1809, ông Clinton đã thấy được sự cần thiết của con kênh. Sau đó ông phải bảo vệ ý tưởng của ông trước những kẻ đã cười nhạo nó. Một vài người không đồng ý gọi dự án là”sự điên rồ của Clinton”–một dự án ngớ ngẩn. Trong năm 1820 chính phủ liên bang đã bác bỏ yêu cầu cấp tiền cho dự án này.
Nhưng 5 năm sau, cơ quan lập pháp New York cấp hơn 7 triệu USD cho dự án. Những nhà lập pháp mang họ Clinton đã lãnh đạo một ủy ban triển khai việc xây dựng con kênh. De Witt Clinton cũng được bầu làm thống đốc New York cùng năm đó.
Còn rất nhiều thiếu sót mong các bạn tận tình sửa sai.