Федеральное агентство по образованию Федеральное государственное образовательное учреждение высшего профессионального об...
24 downloads
169 Views
291KB Size
Report
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
Report copyright / DMCA form
Федеральное агентство по образованию Федеральное государственное образовательное учреждение высшего профессионального образования «ЮЖНЫЙ ФЕДЕРАЛЬНЫЙ УНИВЕРСИТЕТ»
А.Д. Байдельдинова, Н.М. Улеева Методические указания по развитию навыков чтения и говорения на материале профессионально-ориентированных текстов для студентов 3-4 курсов (электив) факультета механики, математики и компьютерных наук
Ростов-на-Дону 2007
Методические указания разработаны преподавателями кафедры английского языка естественных факультетов Байдельдиновой А.Д., Улеевой Н.М. Рецензент - ст. преп. Бзезян Р.В. Печатается в соответствии с решением кафедры английского языка естественных факультетов, протокол № 8 от 6 апреля 2007 г.
2
Методическая записка Данные методические указания по элективному курсу предназначены для студентов 3-4 курсов механико-математического факультета. Они включают 9 оригинальных текстов проблемного характера, содержащих информацию о последних разработках и достижениях в области информационных технологий на английском языке. Каждый текст направлен на совершенствование навыков различных видов чтения, расширение словарного запаса, характерного для специальности «Computer Science». Каждый текст снабжен рядом предтекстовых упражнений, нацеленных на снятие лексических и фонетических трудностей, проблемными вопросами и коммуникативными заданиями, направленных на развитие навыков разговорной речи. Задания варьируются с учетом содержания конкретного текста. Целью методических указаний является развитие и совершенствование навыков чтения и разговорной речи на основе лексики, характерной для специальности «Computer Science».
3
UNIT 1 Computer > Hardware This unit introduces such part of a computer as hardware. Hardware, the basic parts that make up your computer, can seem pretty mysterious at first glance. For instance, how is a USB connector able to work with so many different devices? And what are the functions of all those bridges and sockets on a motherboard? The articles in the Hardware section shed light on these essential components of your computer. I Pronounce the words: bandwidth complimentary code keying frequency band frequency hop orthogonal frequency-division multiplexing router USB connector WiFi
[׳bændwidθ] [kəmplimentriə kə d kiiŋ] [´fri:kwənsi bænd] [´fri:kwənsi h p] [ ´θ g nəl] [´fri:kwənsi divi n m ltipleks] [´ru:tə:] [ uəsbi kə´nektə] [waifai]
Lead - in activities II Scan the article and try to guess what it is about. III Answer the following questions: 1 What is hardware? 2 How do you usually use it? 3 How often do you upgrade it? 4 How does WiFi work? 5 When can you use it? IV Read the article to know more about WiFi technology. How WiFi Works by Marshall Brain and Tracy V. Wilson If you've been in an airport, coffee shop, library or hotel recently, chances are you've been right in the middle of a wireless network. Many people also use wireless networking, also called WiFi or 802.11 networking, to connect their computers at home, and an increasing number of cities use the technology to provide free or low-cost Internet access to residents. In the near future, wireless networking may become so widespread that you can access the Internet just about anywhere at any time, without using wires. WiFi has a lot of advantages. Wireless networks are easy to set up and inexpensive. They're also unobtrusive - unless you're on the lookout for a place to use your laptop, 4
you may not even notice when you're in a hotspot. In this article, we'll look at the technology that allows information to travel over the air. We'll also review what it takes to create a wireless network in your home. We'll start with a few WiFi basics. A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: 1 A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. 2 A wireless router receives the signal and decodes it. It sends the information to the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. The radios used for WiFi communication are very similar to the radios used for walkietalkies, cell phones and other devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s. But WiFi radios have a few notable differences from other radios: •
•
•
They transmit at frequencies of 2.4 GHz or 5GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data. They use 802.11 networking standards, which come in several flavors: o 802.11b was the first version to reach the marketplace. It's the slowest and least expensive standard, and it's becoming less common as faster standards become less expensive. 802.11b transmits in the 2.4 GHz frequency band of the radio spectrum. It can handle up to 11 megabits of data per second, and it uses complimentary code keying (CCK) coding. o 802.11g also transmits at 2.4 GHz, but it's a lot faster than 802.11b - it can handle up to 54 megabits of data per second. 802.11g is faster because it uses orthogonal frequency-division multiplexing (OFDM), a more efficient coding technique. o 802.11a transmits at 5GHz and can move up to 54 megabits of data per second. It also and uses OFDM coding. Newer standards, like 802.11n, can be even faster than 802.11g. However, the 802.11n standard isn't yet final. WiFi radios can transmit on any of three frequency bands. Or, they can "frequency hop" rapidly between the different bands. Frequency hopping helps reduce interference and lets multiple devices use the same wireless connection simultaneously. 5
As long as they all have wireless adapters, several devices can use one router to connect to the Internet. This connection is convenient and virtually invisible, and it's fairly reliable. If the router fails or if too many people try to use high-bandwidth applications at the same time, however, users can experience interference or lose their connections. V Comprehension check: 1 What do you need WiFi for? 2 What does WiFi use to connect a user to the Internet? 3 What allows the signal to carry more data? 4 What is a hotspot? 5 Can several devices use one router? VI Comment on the following: 1 Using WiFi is possible in your town. 2 WiFi is safe for health. 3 There are only three types of frequencies at which WiFi works. 4 A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. VII Match the words with their definitions: 1 frequency
A. The information in a form that can be stored and used
2 data
B. The number of radio waves for every second that a radio signal
3 frequency
broadcast
band 4 wireless adapter
C. Unwanted noise on radio or faults in signal receiving D. A device containing no wires F. A range of different radio waves which can be broadcast
5 interference
VIII Summarize the article. IX Supplementary reading: How can a Windows virus end up on an iPod? by Julia Layton It seems that iPod has run into a bit of a snag regarding its Windows support, considered by many in the industry to be crucial to the iPod's near-complete dominance in the portable media player market. One might think that because iPods are Apple 6
devices, they're not susceptible to the viruses that plague Microsoft's Windows operating system. Apparently, not so. If you bought an iPod video between September 12, 2006 and October 18, 2006, there is, according to Apple, a 1 percent chance it contains a worm called RavMonE.exe. The worm is of the sort that opens a "back door" on a PC so that a remote user can start controlling the infected computer. The iPod shuffles and iPod nanos shipped after September 12 are not infected with the malware; the worm does nothing to harm the iPod device itself; and people who only connect the iPod video to a Mac running Mac OS X will never activate the worm. The malware is in the Windows-support programs that live on the iPod. The worm jumps into action when you connect an infected iPod video to a machine running Windows that is set to automatically run iPod applications when it detects a connected iPod. So the easiest way to make sure your PC doesn't get infected is simply to disable the autorun/autoplay capabilities in your iTunes interface. That way, you'll be prompted to approve each application the iPod software wants to run. If your computer asks you to run something called RavMonE.exe, also known as Win32.RJump.a, Troj/ Bdoor-DIJ, WORM_SIWEOL.B, Backdoor. Rajump and numerous other names, just say no. In fact, it's probably best to put e-mail rules into effect and just say no to running anything that looks unfamiliar. So how does this type of thing happen? Apple Vice President Greg Joswiak explains in a CIO Tech Informer article: As you’re probably aware, the majority of iPod sales are made to Windows users, so we have some Windows terminals on our production line. We discovered that one of these computers was propagating this virus. The machine that was doing the infecting was apparently the last Windows machine on that particular production line -- the quality-control computer. If you do end up connecting an infected iPod to your PC, your anti-virus software should be able to detect it, so hopefully you won't get infected. If you do get infected, running a standard virus-detection-and-removal program should be able to clean your machine. Splotlighting News recommends that all Windows users who have connected a potentially infected iPod to their machine run one of these: • • • •
Microsoft Live OneCare Safety Scanner Microsoft Live OneCare McAfee Symantec Norton Anti-Virus
Apple says that all iPods shipped as of October 18, 2006, are free of malware. UNIT 2 Computer > Peripherals Peripherals are those pieces of hardware that you add on to your computer. Despite their name, peripherals are often central to the computing experience. For instance, where 7
would you be without your monitor, mouse or keyboard? The articles explore the functions of these essential devices, so you can see exactly how they communicate with your computer. I Pronounce the words: competitor compatibility compliment PDA (pulse distributor amplifier) remote control rival tech pundit wibree wireless keyboard
[kəm´petitə] [kəm pætə´biləti] [´k mplimənt] [p ls dis´tri:b u:tə əmpli´faiə] [ri´mə t kən´trə l] [´raivl] [´tek ´p ndit] [´waibri:] [´waiəlis ´ki:b :d]
Lead - in Activities II Scan the article and try to guess what it is about. III Answer the following questions: 1 What kind of mobile phones do you have? 2 What devices are your mobile phones provided with? 3 Do you use such device as Bluetooth? 4 What do you use Bluetooth for? 5 Does it require any money to send information with the help of Bluetooth? 6 Could you say about anything similar to it? 7 Have you heard anything about such device as Wibree? IV Read the text to learn more about new technologies. Is Wibree going to rival Bluetooth? by Ed Grabianowski December 8, 2006 Mobile-phone-maker Nokia announced a new short-range wireless technology, Wibree, in October 2006. With several other formats for short-range wireless already on the market or in development, tech pundits questioned what niche Wibree would fill, or even if there was room for it at all. While the long-term success of Wibree remains to be seen, it does have several advantages over the competition, and it has been positioned as a compliment to Bluetooth technology rather than as a competitor. Both Wibree and Bluetooth allow devices to communicate via short-range radio signals. Bluetooth can be used to perform a variety of tasks, including sharing files between a PC and a PDA, downloading an address book into a cell phone from a PC, and transmitting a signal from a remote control to a television. The Bluetooth radio operates at 2.4 GHz, "hopping" rapidly around different bands close to that frequency to 8
provide security and resistance to interference from other signals. Wibree, it turns out, will use the same radio frequency as Bluetooth, a major advantage over competitors. Using the same basic mechanism for wireless communication will make it much easier for devices to build in both Wibree and Bluetooth compatibility. So why is Wibree a compliment to Bluetooth? It performs many of the same functions that Bluetooth does while using far less power. Wibree would allow for the use of wireless technology in many devices that require long battery life. People don't want to change the battery in their wireless keyboard or wireless-enabled watch every week, and with Wibree they wouldn't need to. Wibree chips are also smaller than Bluetooth chips, which would make it easier to use them in certain applications where space is at a premium. However, Wibree transmits data more slowly than Bluetooth -- up to 1 megabit per second, compared to Bluetooth's 3 megabits per second. It's easy to see that Wibree can't go head to head with Bluetooth in applications in which more bandwidth is needed. Some potential applications of Wibree include: • Wireless keyboards • Wireless mice • Electronic toys • Medical devices, possibly implanted • Watches • Cell phones • Sports sensors The future of Wibree is complicated by the fact that existing wireless technologies are still evolving. While Nokia is likely hoping that Wibree will be completely integrated into Bluetooth at some point, developers are working to reduce the power draw of Bluetooth devices. If Bluetooth can work under low power, that pretty much invalidates the need for Wibree. Specific details on Wibree's power consumption are not yet available -- Nokia's 2006 unveiling was a preliminary announcement, and the full specs won't be released until 2007. Wibree-enabled devices should hit the market in the next few years. By the way, if you're wondering where they got the name Wibree, Nokia hasn't offered any information, but it could be related to the name of another wireless technology that is in direct competition with Wibree: Zigbee. For more information on Wibree and related topics, check out the following links: BBC News: Bluetooth rival unveiled by Nokia - Oct. 4, 2006 PCMagazine: Will Low-Power Wibree Spec Replace Bluetooth? - Oct. 3, 2006 Wibree V Comprehension check: 9
1 2 3 4 5 6
What is Wibree? How does Bluetooth work? What is the difference between Wibree and Bluetooth? What device has slower data transmission speed? What can one do with the help of Bluetooth? When is Nokia going to release the first Wibree-enabled devices?
VI Agree or disagree with the following statements: 1 Wibree will use different frequency from that of Bluetooth. 2 Wibree transmits data more slowly than Bluetooth. 3 Some potential applications of Wibree include kitchen appliances. 4 Wibree uses less power than Bluetooth 5 Wibree chips are also smaller than Bluetooth chips. VII Give definitions to the words below: bluetooth cell phone compatibility download remote control VIII Summarize the article. Text 2 I Pronounce the words and phrases: accelerometer [əkselə´r mi:tə] bevy [´bevi] blogosphere [´blə g sfiə] bookmark [´bukma:k] groundbreaking [´graund breikiŋ] high end smartphone [hai end ´sma:t fə n] infringe [in´fri:n ] iPhone [´aifə n] iPod [´aip d] keynote [´ki:nə t] latte [´lætei] overdrive [´ə vədraiv] visual voicemail [´vi uəl voismeil] Lead - in Activities II Scan the article and try to guess what it is about. 10
III Answer the following questions: 1 Have you heard anything about Apple company? 2 Who was the founder of this company? 3 What kind of computers does this company produce? 4 What characteristic features distinguish Apple computers from others? 5 Do you know anything about other devices this company produces? 6 Would you like to have such a device? 7 What prevents you from buying it now? IV Read the text to know more about new technologies concerning peripherals What is the Apple iPhone? by Jacob Silverman January 11, 2007 For several years, Apple enthusiasts have been asking each other the question, "Does it exist? Is Apple really making a cell phone?" Rumors came and went, but Apple, a company known for its secrecy about products in development, said nothing. In the last six months, those rumors began to take on a life of their own as industry analysts joined the blogosphere in predicting that Apple would produce a phone sometime in the first half of 2007. In mid-November, news broke that Apple had placed an order with Hon Hai Precision Industry, Co., a longtime Taiwanese manufacturing partner, for 12 million units of a new device believed to be the fabled "iPhone" [Forbes]. That news sent the rumor mill into overdrive, but Apple and Steve Jobs, the company's chief executive officer, again said nothing. Analysts began issuing predictions of cost, features and when the phone would be available, with many of them claiming to have inside information. Given Apple's extraordinary track record with the iPod and its recent innovations in desktop and laptop design, expectations were very high, perhaps impossibly so. On January 9, at Apple's annual product showcase, Macworld Expo, Jobs finally revealed the already legendary phone, and it's beyond what anyone expected. Jobs briefly tricked his audience during his Macworld Expo keynote address, announcing three new Apple products: a widescreen iPod, a cell phone and an "Internet communicator." Each announcement drew thunderous applause from the crowd, but what Jobs then revealed was that these three products were actually all part of one device -- the Apple iPhone. Touted as a "revolutionary mobile phone," the iPhone can make calls, play music, navigate the Web, edit photos, play movies and text message, among many other capabilities. Although many of the iPhone's functions can be found in other devices, the iPhone appears to be unique in that it seamlessly blends these abilities together, while also throwing a bevy of innovations into the mix. Jobs demonstrated many of the iPhone's features for the audience. One sequence began with a call from Phil Schiller, Apple's senior vice president of Worldwide Product Marketing. Jobs answered the call on his iPhone, added Schiller to his address 11
book, and when Schiller asked for a photo, Jobs emailed it to him -- all while continuing the call. Later Jobs showed off the phone's ability to integrate multiple applications by using the integrated Google maps application, which knew his location, and typing in a search for Starbucks. Every Starbucks location in San Francisco showed up on screen. Jobs chose one and in a few minutes he was on the phone with Starbucks, ordering 4,000 lattes before abruptly hanging up. In order to seamlessly integrate Web, phone, media and messaging features, the iPhone employs remarkable, groundbreaking technology. Unlike traditional smartphones that have small, finger-cramping keyboards, the iPhone has only one button for "home." Instead, its 3.5-inch high resolution, color screen, which occupies most of the phone's face, doubles as a "multi-touch" display. The display shows different controls based on what you're doing. If you're typing a text message or e-mail, a keyboard appears at the bottom of the screen, and you can easily type a message and send it to someone from your address book. The multi-touch technology also has an auto-corrective feature that accounts for unintentional taps and corrects misspellings. For music and video, volume and playback controls appear on the screen, and so on for other applications. The iPhone's multi-touch interface also allows the opportunity for innovative uses of the touch display. When viewing a photo or surfing the Web, simply perform a pinching motion with two fingers, and the photo or Web page zooms in. Spread two fingers apart, and the display zooms out. Scrolling in any application is done by just brushing a finger up or down on the screen. An intriguing innovation in the phone is what Apple calls visual voicemail. No longer will you have to listen to all of your voicemails if you don't want to. Instead, they will appear in a list, much like an e-mail inbox, and you can simply point to the voicemail you want to play. Apple has also integrated three sensors into its phone. One is an accelerometer, and it senses when you turn the phone on its side, automatically shifting the display to a landscape mode. This feature is incredibly useful for viewing panoramic pictures, videos or shuffling through your albums, which you view by their cover art. A second sensor detects ambient light and adjusts the screen's brightness accordingly in order to save power. The third sensor deactivates the screen when you bring the phone towards your face, so you won't be dialing with your cheek while talking on the device. Like many of Apple's products, iPhone syncs easily with a Mac or PC. The phone runs a version of Apple's reliable OSX operating system, and its programs and iPod connector (located on the bottom of the phone) will be familiar to many Mac users. Use the iPod connector or a docking station to connect the phone to your computer, the iPhone will automatically sync your address book, photos, movies, music and bookmarks between the computer and the phone. Now, all of this may sound great, but there are a few catches. First, the iPhone isn't available until June -- Apple needs to get FCC approval before the iPhone can start 12
using a radio band. Second, Apple has an exclusive contract with Cingular through 2009, so if you want an iPhone, you'll have to be a Cingular customer. And third, it's not cheap. A 4 GB iPhone will set you back $499 with a two year service plan, while an 8 GB iPhone will cost $599 with a two year plan. Still, when compared to other high end smartphones, you're getting a lot. This is essentially a small, powerful computer in the palm of your hand, and of course it has Apple's famous sleek, stylish, minimalist design. Here's a quick rundown of some of the iPhone's other features: • • • • • • • • •
802.11 b/g WiFi and Bluetooth 2.0 wireless capabilities Quad-band GSM and Cingular EDGE network 3.5-inch high resolution screen with 160 ppi (pixels per inch) 2.0 megapixel digital camera Battery life: 5 hours talk/video/browsing, 16 hours audio playback 11.6 mm thin, 4.8 ounces IMAP and POP email support, with integrated Yahoo! e-mail client Text messages are displayed like instant message conversations, making keeping track of many messages much easier Speaker and standard headphone jack
So will the iPhone change the cell phone industry forever? That depends on who you ask. Keep in mind that very few people have even used the iPhone. But given Jobs' impressive demonstration and Apple's recent track record -- over 100 million iPods and 3 billion songs sold -- it's difficult to doubt that this is an extraordinary and important product. Apple's stock surged 7 percent on the day of Jobs' announcement and appears headed for record prices. In other news, Cisco has filed suit against Apple for infringing on Cisco's trademarked "iPhone" name. Apparently, Apple and Cisco were in talks to negotiate the licensing of the name "iPhone" for Apple's product, but they had not yet reached an agreement when Jobs announced the product at CES. V Comprehension check: 1 When was Apple iPhone presented to the audience? 2 Who presented Apple iPhone to the audience? 3 What device took a priority of the iPhone? 4 What are the capabilities of this device? 5 What does accelerometer allow to do? 6 How can you use voicemail in a way you couldn’t before? VI Work in pairs. Discuss the advantages and disadvantages of this device. VII Explain the meaning of the words and phrases below: 13
accelerometer blogosphere bookmark groundbreaking high end smartphone iPod Speaker and standard headphone jack To send the rumor mill into overdrive VIII Summarize the article. UNIT 3 Computer > Software This unit introduces some important technology from the world of computing: software. Software refers to all of the programs your computer uses to perform the actions you want it to. Software helps you get your work done, surf the Internet and play video games – or it may work behind the scenes. I Pronounce the words: consumer [ĸən'suj:mə (r)] spyware ['spiwεə ] nightmare ['naitmεə] nonetheless [ֽnʌnðə'les] revenue ['revinju:] regain [ri:gein] gist [ ist] infancy ['infænsi] doctrine ['d ktrin] infrastructure ['infrəstrʌkt∫ə] Lead - in Activities II Scan the article and try to guess what it is about. III Answer the following questions: 1) What is DRM? 2) Does this notion exist in Russia? 3) What is your attitude to illegal distribution of CDs and DVDs? 4) Is it possible to solve the problem of “pirating”? 5) Does you country have laws which limit the illegal distribution of the movie and music production? 6) Should the government take past in solving this problem? 7) What are the most typical steps to be able to do to defend artist’s copy rights? 14
IV Read the article to know more about DRM. The DRM Reality by Julia Layton In 2005, Sony sold millions of “special” music CDs consumers who thought they were getting regular old compact discs. When people played these CDs on their computer, what happened in many cases was the equivalent of a spyware nightmare: Programs froze up, applications slowed and a series of hidden files that were the source of the problem proved to be nearly impossible to uninstall. Why would Sony do this its customers? The answer is “to protect its copyright”. The digital revolution that has empowered consumers to use digital content in new and innovative ways has also made in nearly impossible for copyright holders to control the distribution of their property. Digital rights management is a far – reaching term. It encompasses any scheme to control access to copyrighted material using technological means. In essence, DRM removes usage control from the person in possession of digital content and puts it in the hands of a computer program. The applications and methods are endless - - here are just a few examples of digital rights management: • A company sets its servers to block the forwarding of sensitive e-mail. • An e-book server restricts access to, copying and printing of material based on constraints set by the copyright holder of the content. • A movie studio includes software on its DVDs that limits the number of copies a user can make to two. • A music label releases titles on a type of CD that includes bits of information intended to confuse ripping software. While many consumers see DRM methods as overly restrictive - - especially those methods employed by the movie and music industries - - digital rights management is nonetheless trying to solve a legitimate problem. The distribution of digital content over the Internet via file-sharing networks has made traditional copyright law obsolete in practice. Every time someone downloads an MP3 file of a copyrighted song from a free file-sharing network instead of buying the CD, the music label that owns the copyright and the artist who created the song lose money. In the case of the movie industry, some estimates place revenue losses from illegal distribution of DVD content at around $5 billion a year. The nature of the Internet makes it impractical to try to sue every person who breaks the law in this way, so companies are trying to regain control of distribution by making it technologically impossible for consumers to make digital copies. The problem is that when you buy a DVD, it’s perfectly legal for you to make a copy of it for your own use. This is the gist of the fair use doctrine in copyright law - - there are certain situations that negate copyright protection in favor of the content user, including copying protected material for personal use and copying anything in the public domain for any use. Most digital rights management schemes cannot take fair use into account, 15
because a computer program cannot make subjective decisions. In 2005, a French court ruled that DRM-encoded DVDs that make copying impossible violate fair use laws because the rightful owner of that DVD cannot make a copy for his own use. DRM Framework The ideal DRM system is flexible, entirely transparent to the user and pretty complex stuff for a computer program to handle. First-generation DRM software sought merely to control copying. Second- generation DRM schemes are in their infancy right now and seek to control viewing, copying, printing, altering and everything else you can possible do with digital content. A digital rights management scheme operates on three levels: establishing a copyright for a piece of content, managing the distribution of that copyrighted content and controlling what a consumer can do with that content once it has been distributed. To accomplish this level of control, a DRM program has to effectively define and descried three entities - - the user, the content and the usage rights - - and the relationship between. Rights Expression Language “Rights” is not a very computer-friendly concept, and programmers have developed new computer languages to define the idea in digital terms. Two rights expression languages in use right now are the MPEG Right Expression Language (MPEG REL) and the Open Digital Rights Language (ODRL), both XML-based computer languages. ODRL utilizes rights terminology like “excerpt”, “install”, ”lend’, ‘modify”, “play” and “sell”. It also sets forth constraints (“fixed amount’, “interval” and “range”) and defines payments (“fee Type”, “prepay” and “postpay”). Automated DRM Companies like ContentGuard, Digimarc, InterTrust and Macrovision sell automated “DRM solutions” that include everything you need to set up a DRM scheme. ContentGuard’s complete DRM toolkit lets copyright holders create and enforce licenses for their digital products and a service, including everything from movie downloads to software use to Web-site access. The Rights Express software uses the MPEG REL rights- expression language and guides the copyright holder through the process of defining a piece of content, defining a user and defining usage rights. The copyright holder can set access levels and encryption modes for the content, create a custom interface that lets users obtain content based on those settings, develop an enforcement model that verifies user identification and track the use of that content. 16
V Comprehension check: 1) Why did Sony sell millions of “special” music CDs? 2) What is DRM? 3) What are the most typical applications and methods of DRM? 4) How do the movie and music industries want to solve the problem of copyright? 5) How much does the movie industry lose from illegal distribution of DVD? 6) How does a DRM scheme operate? 7) What does The Rights Express software use? 8) What can the copyright holder do? VI Agree or Disagree with the following statements: 1) It’s possible for copyright holders to control the distribution of their property. 2) DRM removes usage control from the person possession of digital content and puts it in the hands of a computer program. 3) When you buy a DVD it’s perfectly legal for you to make a copy of it for your own use. 4) Most DRM schemes can take fair use into account. 5) First general DRM software sought merely to control copying. 6) “Rights” is a very computer friendly concept and programmers have developed new computer languages to define the idea in digital terms. VII Explain the meaning of these words in English: 1) Spyware 2) File-sharing networks 3) MP3 Files 4) Fair use 5) JD number VIII Match the following words with definitions: 1) consumer 2) copyright 3) restrictive 4) legimate 5) regain 6) gist 7) violate 8) constraint 9) fee 10) adjust
17
a) if a person or organization holds the copyright on a piece of writing, music, etc., they are only people who have the legal right to publish, broadcast, perform it, etc., and other people must ask their permission to use it or any part of it. b) a person who buys goods or uses services. c) to get back smth you no longer have, especially an ability or a quality. d) the main or general meaning of a piece of writing, a speech or a conversation. e) preventing people from doing what they want. f) to change smith slightly to make it more suitable for a new set of conditions or to make it work better. g) to go against or refuse to obey a law, an agreement, etc. h) allowed and acceptable according to the law. i) a thing that limits or restricts smth, or your freedom to do smth. j) an amount of money that you pay for professional advice or services. IX Give Russian equivalents to the following words and word combinations: spyware nightmare, uninstall, holders, far-reaching, release titles, ripping, to sue, fair use, standpoint, copyright, managing distribution. X Comment on the following statements. 1) DRM methods are restrictive especially those methods employed by movie and music industries. 2) The ideal DRM system is flexible. 3) Digital Rights Management is a far-reaching term. XI Supplementary Reading What is the Year 2038 problem? The Year 2000 problem is understood by most people these days because of the large amount of media attention it received. Most programs written in the C programming language are relatively immune to the Y2K problem, but suffer instead from the Year 2038 problem. This problem arises because most C programs use a library of routines called the standard time library. This library establishes a standard 4-byte format for the storage of time values, and also provides a number of functions for converting, displaying and calculating time values. The standard 4-byte format assumes that the beginning of time is January 1, 1970, at 12:00:00 a.m. This value is 0. Any time/date value is expressed as the number of seconds following that zero value. So the value 919642718 is 919,642,718 seconds past 12:00:00 a.m. on January 1, 1970, which is Sunday, February 21, 1999, at 16:18:38 Pacific time (U.S.). This is a convenient format because if you subtract any two values, what you get is a number of seconds that is the time difference between them. Then you can use other functions in the library to determine how many minutes/hours/days/months/years have passed between the two times. 18
If you have read How Bits and Bytes Work, you know that a signed 4-byte integer has a maximum value of 2,147,483,647, and this is where the Year 2038 problem comes from. The maximum value of time before it rolls over to a negative (and invalid) value is 2,147,483,647, which translates into January 19, 2038. On this date, any C programs that use the standard time library will start to have problems with date calculations. This problem is somewhat easier to fix than the Y2K problem on mainframes, fortunately. Well-written programs can simply be recompiled with a new version of the library that uses, for example, 8-byte values for the storage format. This is possible because the library encapsulates the whole time activity with its own time types and functions (unlike most mainframe programs, which did not standardize their date formats or calculations). So the Year 2038 problem should not be nearly as hard to fix as the Y2K problem was. An alert reader was kind enough to point out that IBM PC hardware suffers from the Year 2116 problem. For a PC, the beginning of time starts at January 1, 1980, and increments by seconds in an unsigned 32-bit integer in a manner similar to UNIX time. By 2116, the integer overflows. Windows NT uses a 64-bit integer to track time. However, it uses 100 nanoseconds as its increment and the beginning of time is January 1, 1601, so NT suffers from the Year 2184 problem. On this page, Apple states that the Mac is okay out to the year 29,940! UNIT 4 Computer > Internet This unit represents the idea about e – learning through the Internet. The Internet is so often accessed these days that we may take its functionality for granted. We look to the Internet for news, socializing, shopping, research and more. I Pronounce the following words: buoyancy ['b iənsi] gauge [gei ] exhale [eks'heil] inhale [in'heil] descend [di'send] shallowly ['∫æləuli] chime [t∫aim] synthesize ['sinθəsaiz] maneuver [mə'nu:və(r)] vertigo ['vε:tigəu] Lead - in Activities 19
II Give Russian equivalents to the following words and word combinations: air supple equipment, choppy, fins, to bob to the surface, to prevent, to exhale, to inhale, to adjust, to pick up, to immerse. III Answer the following questions: 1) What do you know about e – learning? 2) In what connections is it with distance education, correspondence study, virtual education? 3) What do these notions have in common, what is difference between them? 4) What pros and cons of this process can you foresee? IV Read the article. How E-learning Works by Lee Ann Obringer The buoyancy and air supply equipment have been checked. All gauges are working correctly. The divemaster is directing you to the dive platform. It’s sunny, but slightly windy, so the water is choppy. Your wet suit is on, and you have your fins in hand. You’re diving from a small boat so you choose the seated backroll to enter the water. You place your fins on your feet, position yourself on the boat and check to make sure your tank bottom is extending out beyond the edge of the boat over the open water. You turn on your air and place the regulator mouthpiece in your mouth. One hand holds your mask while the other holds your regulator. So far so good. Time to make the entry. You enter the water backward, reorient yourself and bob to the surface. While thinking about what you need to do next, you forget to move out of the way for your buddy to enter the water, and you get a warning from the divemaster. After moving back from the boat, you place the regulator mouthpiece in the water. You place it facedown to prevent free-flow. You then replace the regulator mouthpiece in your mouth and exhale to clear it. You carefully inhale to make sure it is completely cleared. You adjust your buoyancy compensator (BC) to make yourself more buoyant while you wait for the others to enter the water. While you are waiting, you remember to clear your mask. Now the divemaster has signaled that it’s time to descend. You vent your BC using the deflator valve and concentrate on breathing shallowly. You descend slowly down into the darkness. As you descend, you remember to exhale some air into your mask to prevent a mask squeeze. Your fins are still as you descend. A glance at your dive calculator shows you that you’ve passed the 15- foot mark. You’re beginning to see some fish and other marine life. A large jellyfish glides past you. You’re finally at the bottom and see your buddy and some of the other divers, but something is wrong. A bell chimes and a red box with text flashes on your monitor. A synthesized female voice calmly reports, “You did not equalize the pressure in your ears by using either the Valsalva maneuver or the Frenzel maneuver. You have just ruptured your ear 20
drums, which can also result in vertigo. Vertigo can be deadly when experienced underwater. Please return to the online training module, then try the simulation again”. This passage an example of e-learning in a simulated electronic environment. Elearning, Computer - Based Training (CBT), Internet - Based Training (IBT), WebBased Training (WBT) and a host of other names picked up along the way may be the wave of the learning future for people of all ages. Immersing yourself in a 3-D environment or simple interacting with characters or objects on the screen can be a very good way to learn a new skill. The popularity of online training has grown significantly since the early 1990s. The field of electronic learning, find out how it works and what makes it effective both from the learner’s perspective and the training producer’s perspective. We’ll also take a look at the reality of e- learning by examining the technology from a company called Trainersoft®. Trainersoft’s technology helps to create e - learning modules using non-technical interfaces that allow almost anyone to get started very quickly. V 1) 2) 3) 4)
Comprehension check: What is the example of e - learning from this article? Why has the popularity of online training grown since 1990s? What are the most typical bases for e - learning? Do you think it is difficult to follow the instructions through e - learning?
VI Give synonyms to the following words: to extend, to make the entry, to bob, to prevent, to exhale, to interact. VII Work in groups and discuss the problem highlighted in this article: 1) What are the usual ways of students’ collaborating with each other? 2) Which courses, do you think, could be taught through e - learning? Can this method be introduced in your University? 3) What kinds of people are more probable to get interested in e - learning? What about you? VIII Mini – presentation. Find the article describing the use of e – learning. Sum up this article (5-7 min). UNIT 5 Computer > Security This unit introduces some important technology from the world of computing: Security. Computer security is an increasingly important consideration these days, thanks to networking and the Internet, which mean our computers are more interconnected than ever before. Are you concerned about how to keep your computer’s hand drive protected and your personal information safe? 21
I Pronounce the following words: phishing ['fi:∫iŋ] phisher ['fi:∫ə] scheme [ski:m] spoof [spu:f] scam [skæm] technique [tek'ni:k] fraud [fr :d] hustler ['hʌslə] lure [luə(r) ; ljuə(r)] malicious [mə'li∫əs] pharming ['fa:miŋ] trojans ['trou əns] spyware ['spiwεə ] proxy ['pr ksi] obfuscate [' bfʌskeit] Lead - in Activities II Give Russian equivalents to the following words and word combinations: to seem suspicions, identity theft, to convince, money laundering, to deceive, to reveal personal information, to target, reputable source, popup window, to commit fraud, deceptive attempt, padlocks, play-by-play, to disguise. III Answer the following questions. 1) What is computer security? 2) What kind of security programs do you know? 3) What are the most popular, modern and effective anti-viruses programs nowadays? 4) Which measures would prevent or limit the effects of different viruses? IV Read the headline and try to guess what it is about. Are your predictions correct? How Phishing Works by Tracy V. Wilson Does the latest e-mail from e-mail from your bank seem suspicious? It may actually be an example of phishing. Learn about the common trains of phishing schemes and the technological tricks that phishers use to deceive people and software. V Read the text to learn more about “phishing”. You have an account with HSW Bank, and you’ve gotten e-mail from them before. But this one seems suspicions, especially since it threatens to close your account if you don’t reply immediately. What do you do? 22
This message and others like it are examples of phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering. In this article, we’ll examine the common traits of phishing schemes and the technological tricks that phishers use to deceive people and software. Phishing Facts • 13,776 phishing attacks linked to 5,259 Web sites took place in August of 2005 • They targeted 84 different businesses, but three businesses received 80 percent of the attacks. • 85 percent of the attacks targeted banks and other financial institutions. Source: AntiPhishing. Org Most people associate phishing with e-mail messages that spoof, or mimic, banks, credit card companies or other business like Amazon and eBay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam. Phishing Origins The first document use of the word “phishing” took place in 1996. Most people believe it originated as an alternative spelling of “fishing”, as in “to fish for information” [ref]. From beginning to end, the process involves: 1 Planning. Phishers decide which business to target and determine how to get e-mail addresses for the customers of that business. They often use the same mass-mailing and address collection techniques as spammers. 2 Setup. Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collection the data. Most often, this involves e-mail addresses and a web page. 3 Attack. This is the step people are most familiar with - - the phisher sends a phony message that appears to be from a reputable source. 4 Collection. Phishers record the information victims enter into web pages or popup windows. 23
5 Identity Theft and Fraud. The phishers use the information they’ve gathered to make illegal purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover [ref]. If the phisher wants to coordinate another attack, he evaluates the successes and failures of the completed scam and begins the cycle again. Phishing scams take advantages of software and security weaknesses on both the client and server sides. But even the most high-tech phishing scams work like oldfashioned con jobs, in which a hustler convinces his mark that he is reliable and trustworthy. Since most people won’t reveal their bank account, credit card number or password to just anyone, phishers have to take extra steps to trick their victims into giving up this information. This kind of deceptive attempt to get information is called social engineering. Most phishing messages give the victim a reason to take immediate action, prompting him to act first and think later. Messages often threaten the victim with account cancellation if he doesn’t reply promptly. Some thank the victim for making a purchase he never made. Since the victim doesn’t want to lose money he didn’t really spend, he follows the message’s link and winds up giving the phisher exactly the sort of information he was afraid they had in the first place. In addition, a lot of people trust automatic processes, believing them to be free from human error. That’s why many messages claim that a computerized audit or other automated process has revealed that something is amiss with the victim’s account. The victim is more likely to believe that someone has been trying to break into his account than believe that the computer doing the audit made a mistake. Phishing: Not Just for E-mail Anymore E-mail is the most common way to distribute phishing lures, but some scammers seek out victims through: • Instant messages • Cell phone text (SMS) messages [ref] • Chat rooms • Fake banner ads • Message boards and mailing lists • Fake job search sites and job offers • Fake browser toolbars [ref] The most common trick is address spoofing. Many e-mail programs allow users to enter their desired information into the “From” and “Reply-to” fields. While convenient for people who use multiple email address, this makes it for phishers to create messages that look like they came from a legitimate source. 24
Other tricks include: • Obfuscated links. These URLs look real but direct the victim to the phisher’s web site. • Graphics. By determining which e-mail client and browser the victim is using, the phisher can place images of address bars and security padlocks over the real status and address bars. • Popup windows and frames. Malicious popup windows can appear the site, or invisible frames around it can contain malicious code. • HTML. Some phishing e-mails look like plain text but really include HTML markup containing invisible words and instructions that help the message bypass anti-spam software. • DNS cache poisoning. Also called pharming, this is when a phisher (often by speaking to customer service representatives) changes DNS server information. This causes everyone trying to reach the spoofed company’s web site to be directed to another site. Pharming can be hard to detect and can ensnare multiple victims at once. Phishers can use proxy computers situated between the victim and the site to record victims’ transactions. They can also take advantage of poor security at a company’s web page and insert malicious code into specific pages. Phishers who use these methods don’t have to disguise their links because the victim is at a legitimate Web site when the theft of their information takes place. Phishers also use malicious programs in their scams: • Key loggers and screen capture Trojans record and report information to the phisher. • Remote access Trojans turn victims’ computers into zombies – machines phishers can use to distribute more phishing web pages. • Bots maintain fabricated conversations with victims in chat rooms or coordinate zombie networks. • Spyware tracks and records users’ online behavior, which can help phishers plan other attacks. You can read more about other techniques used for phishing in Next Generation Security Software’s Phishing Guide. Antiphishing. org also has a play-by-play of exactly how one phisher tries to fool his victims. VI Comprehension check: 1) What is “phishing”? 2) How do phishers involve people in their deals (tricks)? 3) What are the most common ways to distribute phishing lures? 4) What is the most common trick? 25
5) What is the gist of DNS cache poisoning? 6) How can phishers use malicious programs in their scans? VII Give definitions to the following words using English - English dictionary: phishing, virus, pop-up window, money laundering, software, browser, spain, padlock, spyware. VIII Agree or Disagree with the following statements: 1) Phishing is a method of online identity theft. 2) Some e-mail servers allow computer to connect to the SMTP port without the use of a password. 3) E-mail is the most common way to distribute phishing lures. 4) Popup window can’t appear over the site, or invisible frames around it can contain malicious code. 5) Pharming can be easy to defect. 6) Phishers can’t take advantage of poor security at a company’s web page. 7) Phishing messages often threaten the victim with account cancellation if he doesn’t reply promptly. IX Give synonyms to the following words: Suspicious, theft, to infect, to convince, to deceive, sophisticated, effective, legimate, malicious, bypass, transaction, advantage, to disguise, information, access. X Work in groups and discuss: 1) What are common motivations for computer crime? 2) What steps can be taken to prevent theft or alteration of data? Is it possible to do? XI Comment on the following statements. 1) Phishing is a method of online identity theft. 2) Phishing is a good opportunity to earn money. 3) E-mail is the most common way to distribute phishing lures. XII Supplementary Reading How Spyware Works Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Spyware may be to blame. Spyware has been known to masquerade as a prizenotification pop-up window. Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer’s processing 26
power. They are designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to recent estimates, more than two-thirds of all personal computers are infected with some kind of spyware [ref]. but before you chuck your computer out the window and move to a desert island, you might want to read on. In this article we’ll explain how spyware gets on your computer, what it does there and how to get rid of it. Other “Ware” Some people mistake spyware for a computer virus. □ Malware - a general term A computer virus is a piece of code designed to for any program that makes replicate itself as many times as possible, spreading changes(does malicious or from one host computer to any other computers “bad” things) without your connected to it. It usually has a payload that may express permission damage your personal files or even your operating system. Spyware, on the other hand, is generally not designed □ Adware - programs designed to damage your computer. Spyware is broadly defined specifically to deliver as any program that gets into your computer without unrequested advertising permission and hides in the background while it makes unwanted changes to your user experience. The damage □ Stealware- specific spyware it does is more a by-product of its main mission, which designed to capture clicks or is to serve you targeted advertisements or make your Web-site referral credits browser display certain sites or search results. At present, most spyware targets only the Windows operating system. Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solytions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse.
□ Browser hijacker - a malicious program that becomes deeply embedded in your browser’s code and core functionality
Next, we’ll look at the different ways that spyware can get onto computer. How You Get Spyware Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you install them, from fake system alert messages to buttons that say “cancel” when they really do the opposite. Here are some of the general ways in which Spyware finds its way into your computer: • Piggybacked software installation – Some applications – particularly peerto-peer file-sharing clients -- will install spyware as a part of their standard install. If you don’t read the installation list closely, you might not notice that 27
you’re getting more than the file-sharing application you want. This is especially true of the “free” versions that are advertised as an alternative to software you have to buy. There’s no such thing as a free lunch. While it officially claims otherwise, Kazaa has been known to include spyware in its download package. • Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get world be your browser’s standard message telling you the name software and asking if it’s okay to install it. Internet Explorer security warning If you security setting are set low enough, you won’t even get the warning. • Browser add-ons – These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware themselves. Particularly nasty add-ons are considered browser hijacker -- these embed themselves deeply in your machine and take quite a bit of work to get rid of. Bonzi Buddy is an ‘add-on” application that includes spyware in its package. • Masquerading as anti - spyware – This is one of the cruelest tricks in the book. This type of software convinces you that it’s a tool to detect and remove spyware.
Microsoft Internet Explorer ?
If your computer is slowing down or crashing, get a free scan of your computer to make sure it is not infected. Scan now and get a fully functional spam blocker for free! Click OK to start installation. Advertisement. OK
Cancel 28
When you run the tool, it tells you computer is clean while it installs additional spyware of its own. What Spyware Can Do Spyware can do any number of things once it is installed on your computer. At a minimum, most spyware runs as an application in the background as soon as you start your computer up, hogging RAM and processor power. It can generate endless pop-up ads that make your Web browser so slow it becomes unusable. It can reset your browser’s home page to display an ad every time you open it. Some spyware redirects your Web searches, controlling the results you see and making your search engine practically useless. It can also modify the DLLs (dynamically linked libraries) your computer uses to connect to the Internet, causing connectivity failures that are hard to diagnose. Snitches and Sneaks There are computer programs that truly “spy” on you. There are applications designed to silently sit on your desktop and intercept personal information like usernames and passwords. These programs include Bugdrop, Back Orifice and VX2. These are more likes viruses or hacker tools than spyware. Certain types of spyware can modify your settings so that you connect through dial-up service, your modem dials out to expensive, pay telephone numbers. Like a bad guest, some spyware changes your firewall settings, inviting in more unwanted pieces of software. There are even some forms that are smart enough to know when you try to remove them in the Windows registry and intercept your attempts to do so. The point of all this from the spyware makers’ perspective is not always clear. One reason it’s used is to pad advertisers’ Web traffic statistics. If they can force your computer to snow you tons of pop-up ads and fake search results, they can claim credit for displaying that ad to you over and over again. And each time you click the ad by accident, they can count that as someone expressing interest in the advertised product. Another use of spyware is to steal affiliate credits. Major shopping sites like Amazon and eBay offer credit to a Web site that successfully directs traffic to their item pages. Certain spyware applications capture to view sites like Amazon and eBay and then take the credit for sending you there. Legality So is it legal to install difficult-to-remove software without the user’s permission? Not really. There’s an increasing body of state legislation that explicitly bans spyware, including the Spyware Control Act in Utah and the Consumer Protection Against Computer Spyware Act in California. But even without these new state laws, federal 29
law already prohibits spyware. The Computer Frand and Abuse Act covers any unauthorized software installations. Deceptive trade practices of any kind also violate the Federal Trade Commission Act. Additionally, the Electronic Communications Privacy Act makes it unlawful for companies to violate the security of customers’ personal information. Just like anti-spam legislation, these spyware laws can be very difficult to enforce in practice, and the perpetrators know in. it can be tough to find hard evidence connecting individual companies to their spyware products, and, as with all Internet-related lawsuits, there are often battles over which court’s jurisdiction applies to the case. Just because it’s illegal doesn’t mean it’s easy to stop. How can you protect yourself against spyware, and what can Spyware Help You do if you think you already have some on your computer? ▪ Microsoft DLL Help Here are a few suggestions. Database - Download Original DLLs Use a spyware scanner. There are several applications you can turn to for trustworthy ▪ SpywareGuide: List of spyware detection abd removal, including Ad-aware, Spybot Spyware - Find and Microsoft AntiSpyware, which is currently in beta. All information on a three are free for the personal edition. These work just like specific piece of your anti-virus software and can provide active protection as spyware well as detection. They will also detect Internet cookies and ▪ SpywareInfo: Browser tell you which sites they refer back to. Hijacker: Hijack Removal – Find Note-Once you now which spyware is on your computer, in detailed instructions Some cases you’ll need to seek specific instructions on how on removing a to remove it. Links to some of those instructions are listed browser hijacker in the “Spyware Help” box to the right, and more are included in the Lots More Information section at the end this article. Here are a few more solutions: Use a pop-up blocker. Many of the current browsers, including Internet Explorer 6.0 and Mozilla Firefox 1.0, have the ability to block all Web sites from serving you pop-up windows. This function can be configured to be on all the time or to alert each time a site wants to pop up a new window. It can also tell you where the pop-up is coming from and selectively allow windows from trusted sources. Disable Active-X. Most browsers have security settings in their preferences which allow you to specify which actions Web sites are allowed to take on your machine. Since many spyware 30
applications take advantage of a special code in Windows called Active-X, it’s not a bad idea to simply disable Active-X on your browser. Note that if you do this, you will also disallow the legitimate uses for Active-X, which may interfere with the functionality of some Web sites. Be suspicions of installing new software. In general, it pays to be suspicions when a site asks to install something new on your computer. If it’s not a plug-in you recognize, like Flash, QuickTime or the latest Java engine, the safest plan of action is to reject the installation of new components unless you have some specific reason to tryst them. Today’s Web sites are sophisticated enough that the vast majority of functionality happens inside your browser, requiring only a bare minimum of standard plug-in. besides, it never hurts to reject the installation first and see if you can get on without it. A trustworthy site will always give you the opportunity to go back and download a needed component later. Use the “X” to close pop-up windows. Get to know what your computer’s system messages look like so that you can spot a fake. It’s usually pretty easy to tell the difference once you get to know the standard look of your system alerts. Stay away from the ‘No thanks” buttons if you can help it, and instead close the window with the default “X” at the corner of the toolbar. For an even more reliable option, use the keystroke combination for “close window” built into your software. You can look in your browser’s “File” menu to find it. For more information on spyware, spyware removal and related topics, check out the links on the next page.
31