Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Магистры ВМИ, ММ.doc
Скачиваний:
28
Добавлен:
16.03.2016
Размер:
542.72 Кб
Скачать

3. Read the text and arrange the paragraphs (a-f) in the logical order:

A) Sometimes hackers even got prizes for their skills from computer companies that needed to develop sophisticated software. However, as the computer industry grew, such companies became more concerned with protecting, and exploiting intellectual property. To hackers intellectual property was a barrier to the free exploration and exploitation of the computer, so they sometimes copied and distributed not only their own work but also commercial systems software and utilities.

B) In response to public fears about hackers’ capabilities, federal and local law enforcement agencies have united their efforts to find and prosecute criminals who crack or vandalize systems or Web sites. Antiterrorism experts now worry that hacker attacks could be used by terrorist groups to paralyze the economies of different countries and even destruct vital infrastructure such as air traffic control. In this atmosphere the older, more positive image of the hacker is fading, although the creativity of hacking continues to be manifested in cooperative software development.

C) During the late 1970s and 1980s, the microcomputer created a mass consumer software market, and a new generation of hackers tried to get the most out of machines that had a tiny amount of memory and only rudimentary graphics and sound capabilities. At that time a new term - software piracy - appeared. Pirate hackers cracked the copy protection on games and other commercial software so the disks could be copied freely and exchanged at computer fairs, club meetings, and on illicit bulletin boards.

D) In the late 1950s, researches form various universities began to encounter people with unusual programming skills and an obsession with the inner workings of the machines. While ordinary users viewed the computer simply as a tool for solving particular problems, these programmers liked to extend the capabilities of the system and create tools that would make it easier to create even more powerful programs. The movement from mainframes that could run only one program at a time to machines that could simultaneously serve many users created a specific field in which these hackers could flourish. Indeed, while administrators sometimes complained that hackers took up too much of the available computer time, they often needed their help to fix the bugs that infested the first versions of time-sharing operating systems. Hackers also worked at night while normal users slept.

E) The growing use of on-line services and networks in the 1980s and 1990s brought new opportunities to exploit computer skills for stealing valuable information such as credit card numbers. The mass media always used the term hacker to refer to clever programmers, software pirates, and people who stole information or spread viruses across the Internet. Meanwhile, sensational stories about the notorious real world hackers (e.g. Kevin Mitnick, Jonathan James, Kevin Poulsen, Robert Tappan Morris) showed the dark side of hacking to people. Criminal hackers started to cooperate with more-traditional criminal organizations, creating rings that can efficiently turn stolen information into cash.

F) Early hackers had their own philosophy and supported the following ideas:

• computers should be freely accessible, without any limits on their use;

• information should be free so that it can reach its full potential. So, people should struggle against governments that want to restrict information access;

• the most important thing is the quality of the “hack”—the cleverness and utility of the code;

• the reputation of a hacker depends on his work— not on age, experience, academic attainment, or anything else.