【正文】
helf malware. This is sort of ready for use, outofthebox stuff, which you can deploy even if you’re not a terribly sophisticated hacker. And so CarderPlanet became a sort of supermarket for cybercriminals. And its creators were incredibly smart and entrepreneurial, because they were faced with one enormous challenge as cybercriminals. And that challenge is: How do you do business, how do you trust somebody on the Web who you want to do business with when you know that they’re a criminal? (Laughter) I mean it’s axiomatic that they’re dodgy, and they’re going to want to try and rip you off. So the family, as the inner core of CarderPlanet was known, came up with this brilliant idea called the escrow system. They appointed an officer who would mediate between the vendor and the purchaser. The vendor, say, had stolen credit card details。 III. Lecture ListeningListening: Lecture 1 help puter users to be aware of the ethical uses of puters and the Internet.2. Because more and more people have started using puters and the Internet. Eight. Nine.5. Respect and fairness. 1 addresses the topic “how a puter user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a puter and electronic threats a puter faces. Commandments of Computer Ethics.Lecture 1 Computer ethics 8 Good morning. Did anyone hear the news about the teenager in New York who hacked into a bank’s database and stole about 30,000 credit card numbers over the week end? Hacking is related to puter ethics. Computer ethics deals with the proper use of information technology, such as puters and the Internet. By proper use, I mean socially responsible use. We’ll first talk about what ethical behavior is and then how this applies to puter use. Ethics is about right and wrong or it deals with moral judgment, with what is acceptable or unacceptable to do. Now we learn ideas about what is right and wrong from our families, our friends, and from the culture we live in. Because of differences in our backgrounds, we may not always agree on what is right and wrong. However, for our discussion today, I will define for you what I mean by an ethical action. An ethical action is something someone does that benefits someone and doesn’t hurt anyone. So, for example, if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and don’t give it back to the man, this benefits you, but hurts the man. This is not an ethical action. Now what about puters? What are the ethical boundaries for using puters and Internet? Most people agree that it is wrong to steal from a store. Would they also say it’s wrong to copy music files from the Internet? Or, to take another example, most people agree that it is wrong to open an envelope and read a letter to someone else. Would they also say it’s wrong to read someone else’s ?In the past decade or so, many more people have started using puters and the Internet, so these issues have bee important. In 1992, the Computer Ethics Institute was founded in the United States. This is a research, education, and policy study group whose goal is to increase awareness of the ethical issues that are likely to e up as technology develops. One concept the Computer Ethics Institute has developed is the Ten Commandments of Computer Ethics. These rules are important guidelines the Institute thinks all puter users should follow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” The Ten Commandments of Computer Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For example, they use the phrase “Thou shalt not”, “Thou shalt not” means “don’t” or “you shouldn’t”.Let’s look at each mandment or rule.The first mandment says: Thou shalt not use a puter to harm other people. Simple enough, right?Number Two: Thou shalt not interfere with other people’s puter work. I interpret this to mean don’t use a puter in any way that will affect or change the work someone else is doing. Don’t move or edit someone else’s files without telling them. Number Three: Thou shalt not snoop in other people’s files. To snoop means to try to find out something without another person knowing it. If you look at someone else’s files on the puter or read their , you’re snooping. Respect other people’s privacy.Number Four: Thou shalt not use a puter to steal. There are situations on the Internet in which you have to decide if you are stealing or not, like downloading music files, as I mentioned earlier. Number Five: Thou shalt not use a puter to say things that are untrue. It is up to you to be truthful in your website, in your ebusiness, and in your .Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is free on the Internet, it’s okay to download and use it. However, it is not okay to copy software from a friend, because you didn’t pay for it.Number Seven: Thou shalt not use other people’s puter resources without telling them, or without paying them. For example, you shouldn’t use someone else’s puter, password, or Internet connection without asking them first.Number Eight: Thou shalt not appropriate someone else’s ideas. Appropriate means to take words someone else wrote and say they’re yours. Uh, for example, you have to write a report for school. If you copy a term paper from the Internet and hand it in, you’re breaking the rule. Copying even a few sentences off the Internet and presenting them as your own is breaking the rule. Number Nine: The ninth mandment says: Thou shalt think about the social consequences of the program you are writing. Now, this applies mostly to puter programmers. Social consequences means how the program you’re writing might affect others in so