Examples of online speeches

Examples of Network Speech Part I: Network Speech of College Students in the Information Age.

With the advent of the information age, computer internet has become an essential learning tool and communication tool for people from all walks of life in the most advanced way. Its purpose is to transform us into a real new human in the information age: a person who can use new tools; A person who creates a new life; A person who really keeps pace with the times! Unfortunately, most people today have not really felt the role of the Internet, and they don't know that they are about to become illiterate in the new era: they can't study computer application technology with peace of mind, and they don't have their own e-mail; Files will not be uploaded or downloaded; You can't quickly enter text or edit a document. Even without touching the mouse, simple things like sending and receiving emails or drawing forms at work should be invited everywhere. Why not teach yourself when you have time? We have entered the information age. We are people from different eras. How can we be indifferent to the network? But I still don't think so every day, killing time in trivial daily affairs. On the contrary, we should learn from the old comrades who are studying in the computer class of the university for the aged. Although they are over 60 years old, they are still diligent and eager to learn computer knowledge. They meditate on Wang's youth and Mayday, the 20-inch rain on the toast, and tap a string of words on the keyboard with their fingers, which is more energetic than us young people! Even these old people can do this, so why don't we young people learn and master computer knowledge? Today, with the rapid development of information, we must attach importance to the development trend of the network, actively learn and master new skills, and become experts in the information age. Otherwise, you will become illiterate in the new era! So, what should we do well in the information age? First of all, we must have a lifelong learning mentality. To understand the truth that "outdated knowledge is waste", we must study hard the basic knowledge of electronic computers and the professional knowledge of computer networks. Learning new knowledge, absorbing new information and storing new ideas means accumulating intangible capital, putting money in your own account and purchasing goods into your own brain, so as not to be out of touch with the times and be eliminated by the times. Gorky said: The wider a person's knowledge, the more perfect he is. There is no doubt that in this era, no one can be indifferent to the expansion of the network and sit idly by. Learning network and applying network learning will be the general trend. People entering the information age must be soberly aware of the requirements of the times, constantly enhance their self-awareness, study hard, improve their knowledge, bravely shoulder the heavy responsibility of history and meet the challenges of the information age!

Internet Speech Part II: Internet Information Speech

Improve students' ability to identify and discriminate network information. . . Don't believe rumors. . There are no rumors. . .

International:

1. Not long ago, there were more than 40 websites in America. KR domain names, including Korean government and important institutions, were attacked by distributed denial of service (DDoS) respectively. Hackers invaded at least four local P2P file sharing networks in South Korea, and implanted malicious program codes in some shared files, allowing users to install malicious files without knowing it. It has had some negative effects on the intelligence work of the Korean government.

2. In a recent report, the Bureau of Investigation pointed out that 20 10 was the year of botnets, and botnets ranked first in the number of attacks in the world. Not long ago, Taiwan Province authorities cracked a national botnet; The botnet is connected to the main control console (CNC) in Taiwan Province Province, carrying more than 20,000 viruses and launching denial of service attacks on more than 30 countries. In 2005 1 month, a 20-year-old American used botnet to paralyze the medical system of Seattle-Northwest Medical Center, resulting in a loss of about1500,000 dollars and endangering the lives of patients in this hospital. In 2008, China hackers launched an army of botnet, and DDoS attacked the famous Bahamut game social networking site, demanding that the site cooperate with its propaganda, otherwise it would continue to block its services; The FBI pointed out that more than one million computers in the world are controlled by bot and become a member of botnet. Hackers unconsciously use your computer to do whatever they want.

3. The death of Osama bin Laden, the leader of Al Qaeda, made the whole Internet boil. An IT consultant in Abbottabad, Pakistan, broadcast the helicopter hovering and explosion live on his Twitter six hours before the official news agency announced the incident. This makes his personal website address become the object of many people and media chasing this incident.

Places to visit. Websense security lab found that hackers attacked Athar's website for the first time and directed it to a black hole attack development tool. ) Websense wants to remind everyone that you must be careful when clicking on the new link to view the information about bin Laden's death, and don't be trapped. Hackers will target personal popular websites like Athar and threaten all users who come through search engines. This kind of attack with explosive news as bait is also very dangerous for enterprises, because employees usually search for such news in the enterprise network, which eventually leads to risks or data leakage threats for enterprises.

China: 4. In recent years, the "spike" shopping craze has sprung up on the Internet. Many shopping websites will have a large number of "seconds kill" advertisements flashing constantly, and the countdown timer in seconds will beat quickly. Click on the "second kill" advertisement to buy low-priced or even free goods. However, some criminals set up their own "second kill" websites to lure netizens into being fooled. At present, there are four main ways for criminals to commit "second kill" fraud: one is to make fake websites in the name of regular companies or organizations, and publish a large number of advertisements for "second kill" of low-priced goods, so that the victims can make money to their designated accounts to defraud property by lying about the success of "second kill" of goods; The second is to make a large number of "second kill" phishing websites similar to a well-known website to trick victims into entering. Once the victim fills in the bank account number, password and other information on the website page, the property security will be threatened; Third, through a large number of "second kill" advertisements, netizens are tricked into clicking on their websites, Trojan virus is hidden in the "second kill" software of websites, and the victim's computer is controlled by Trojan virus, thus stealing personal and business-related information. The fourth is to defraud money by deceiving online consumers to recharge and buy goods such as "seconds kill coins".

Measures:

5. How to identify the authenticity of network information? The network was originally a good information tool, but its value has not been fully exerted at present. The main reason lies in the falsity of network information. In fact, it is not difficult to judge the authenticity of network information. First, by reading the materials comprehensively, we should first judge their authenticity from common sense. The so-called common sense, such as: you have to pay for things, and the approximate price of things is easy to know. No pains, no gains, no pie in the sky, and so on. If you want to buy something, don't just be greedy for cheap, as the saying goes, "cheap things are not good" is also true; Don't expect others to give you something without taking money. That could be bait. When you find some information that says there are good things, you should judge whether things are reasonable or not. Things that are too cheap may be fakes and inferior products; Others give you benefits for no reason, perhaps to make you pay some sweetness first and then kill you.

Second, see if there is any information released by the information publisher, such as telephone number, fax number, address, qualification documents, accuracy of technical terms, etc. Through these, we can judge the authenticity of about 70% information. We also see many people who publish information. Most of those false information only have QQ number, no telephone, especially no fixed telephone, no website, let alone qualification information. For some "things" with certain technical content, false information publishers can't even say a word or two.

Third, judging from time. If the same news is false, he will shoot and change places, or change his face in a day or two; Just can't stand the test of time. The real information is not. Publishers will want to keep it forever and expect it to appear in the public eye.

Fourth, multi-party research. If you want to know what a company is like, you should judge it from the industry situation, know the situation from the customers you have served, and know whether it is operating normally through the industrial and commercial administration department, and so on.

5. Experience is the best teacher. We live in this era of declining integrity, and a large number of people have been cheated; Even if you are lucky not to have seen them, it is easy to hear stories about people around you, or relatives and friends, or colleagues being cheated. Therefore, our own or other people's experience is the best teacher to judge the authenticity of information. Don't take it as a "lesson from the past", remember it firmly and always be alert.

Sixth, be vigilant and always be on guard. While doing the above, don't forget the most important link-vigilance. It is necessary to "wake up the alarm" and prevent problems before they happen!

7. Some large websites are the source of false information. Many large websites have no auditing measures for the information released for free or for a fee for the sake of traffic. Take the online shop as an example. Since you can open a shop without auditing, even if you guarantee payment through Alipay, it will inevitably be shoddy or even replaced by second-hand goods. Therefore, judging the authenticity of information cannot be measured by the integrity or guarantee of website settings. Because honesty and guarantee are for commercial purposes and driven by interests, it is more likely to be false than the information released for free. Just like many advertising products, the purpose of spending money on advertising is to make "falsehood become superficial truth", and the purpose of collecting money is to collect money. Interest-driven always makes it an "accomplice".

Eight, the more false things there are in websites with large traffic, just like the black market. And those websites that don't pursue traffic for the purpose and purposefully guide traffic are often "people flow" rather than "real businessmen are browsing".

Nine, the owner of false information is generally not the real name, and its traces on the Internet are generally few, because it is difficult to escape the relationship after the accident.

Ten, the contact information of false information is generally mobile phone, because the mobile phone is easy to change the number, and now you can handle the mobile phone number without an ID card.

Eleven, false information gives people the feeling that it is always true, and the performance of information is comprehensive. Just like a liar in our real life, he is personable and wears gold and silver, giving people an imposing manner.

Twelve, false information always requires us to contact him (her) by email or mobile phone information, because in fact, the information itself is false, and he (she) is not doing it specifically at all. In fact, it is not difficult to distinguish false information. Search through the search network first to see if you can find the owner's experience. If not, there is a great possibility of fraud. Secondly, see if the contact information is only mobile phone, can you contact him (her) immediately, and analyze the expression of his (her) information to see if it is intentionally modified; Finally, try to find the ID number corresponding to his name, and judge the authenticity of this person through the ID number query.

With the general public relying more and more on the global information network in their work and life, Trend Micro suggests that all countries should regard network security as a necessary part of national defense security. Large enterprises, ISPs and government agencies should (reposted in: W: online comments) work together in Qi Xin to prevent the proliferation of botnets and detect botnet activities in advance.

The third part of online speech: online buzzword speech.

Discourse of network catchwords

Hello, teachers and children's shoes! I'm Kang Linan from Class 176, and I'm really nervous standing here. Can my friends feel any difference in the way I speak? Yes, online buzzwords.

In other words, just over one third of 20XX, the latest and hottest list of top ten online buzzwords has been released. It is said that in 20XX, there was a stunt called duang, a male god called Xiao Xian rou, and a popular girl heart harvester. In 20XX, being rich is willful, and if you have no money, you will read more and run more. In 20XX, Li became a cat science man and a national male ticket. It's really important to draw curtains at 20XX. 20XX, it is important to say that people are handsome, but ugly and can't bear to look directly at them. Are these online buzzwords made in 20XX?

Then the question is, why are online words so popular?

First of all, it is inseparable from the popularity of the Internet. The Internet has created a trustworthy virtual space for netizens, where everyone can give full play to their creativity and imagination, speak freely and express their feelings. Therefore, online buzzwords are the product of the Internet age.

Secondly, online buzzwords have their own advantages. First, the form is concise and the image is intuitive. Wang Wenjin, a boy from the College of Literature, Huazhong University of Science and Technology, spent 2 12 days writing a love letter of160,000 words, involving prose, poetry and other styles, and bound it into a book named "I don't want to leave you alone". Look, how kind this boy is! But what about the result? The girl was very moved and then turned him down. Such a thing can be summed up in one sentence: "ten strokes and rejection", which is concise enough and vivid enough. Second, the network language itself is humorous, novel and easy to imitate. For example, "Fiona Fang, what do you think?" There is a Wang Fang in our class. What do you think? "Mayili style", "Chen European style" and so on. 20XX is the most humorous and popular year, which has been adapted into different versions, including the wedding version, the breakup version, Sanlu milk powder version and so on. Among them, our student version reads: "When I first asked me to go to school, I actually refused. No, I'll go if you want me to. I told my mother that I refused. I want to be the woman of One Piece. If I go to school, I will be humiliated. Mom told me that learning to add special effects, duang, duang~ is very handsome and cool. I will study well after adding special effects. I want you to see that I was like this when I went to school, and you will be like this when you go to school. "

Furthermore, online buzzwords interact with people's daily lives. Network buzzwords originated from social life.

It once again serves daily life, thus promoting its popularization. I don't know if you found that Coca-Cola changed its packaging when you bought it in the supermarket. At present, there are different labels on the package of Coke, including Starman, Moonlight Family, Cat, Oxygen Beauty, White, Natural Treat, Gao Fushuai, Girl Next Door, Pure Man, Little Literary Man, Little Loli and Fans. They come from the internet and are favored by people in reality. Perhaps this is an era of labeling.

However, is the popularity of online words happy or sad? Some young people think that the use of online buzzwords can make the dialogue and communication between netizens more relaxed, vivid and humorous, thus narrowing the distance between netizens. However, the distance on the network has narrowed. What about the distance in reality? What about the distance between us and our parents and relatives? Not long ago, I saw this sentence in Weibo: "Internet buzzwords, please walk slowly and wait for your parents, grandparents." This kind of words makes people feel distressed. The virtual world is very close, but the distance in reality is getting farther and farther. If you do this, your mother will really die!

The generation gap between the frequently used online buzzwords and the previous generation is growing. What is the education and language acquisition environment of children now? As for me, I have a little nephew. When he was three years old, I took him to play and passed a supermarket. He shouted, "Auntie, Auntie, do something." I asked him, "What to buy?" He always said, "Buy something, buy something." Later, I got impatient and said, "buy wool." So, it really became "aunt, buy wool, buy wool." The Analects of Confucius, which we often recited when we were young, is now like this: "I save myself three times a day." Is it tall? Rich? Handsome? " This practice is actually misleading children, and then it will lead to nonstandard language phenomena in their communication and writing, and even they don't know what a standardized language phenomenon is. Therefore, the State Administration of Press, Publication, Radio, Film and Television issued a notice on1October 27, and 20 165438+ banned the use of certain online buzzwords in TV dramas and other media. And this, it is estimated, will clear some obstacles for standardizing modern Chinese, and its future road is still very long.