Monday, November 4, 2019

Birth Control Essay Example for Free (#2)

Birth Control Essay Birth control is a way or method used to prevent pregnancy. There are different kinds of methods of birth control that can be used by man and woman. All of these methods have positive effects or sides. The pros of birth control are the following: (1) lessen the possibility of sexually transmitted diseases (STDs) (â€Å"Pros and Cons of Different Contraceptive Methods â€Å"); (2) it is helpful in preventing pregnancy, but the degree of the effectiveness of the birth control method depends on the type of method that is being used by the couple (â€Å"Pros and Cons of Different Contraceptive Methods â€Å"); (3) allows active participation of men in the prevention of pregnancy (when using condom or withdrawal method) (â€Å"Pros and Cons of Different Contraceptive Methods â€Å"); (4) it helps regulate the menstrual cycle of a woman; (5) it lessens the pain and difficulty of having a menstruation (â€Å"Pros and Cons of Different Contraceptive Methods â€Å"); (6) prevents or lessen the possibility of having uterine and ovarian cancer, anemia, ovarian cyst and pelvic inflammatory disease (â€Å"Pros and Cons of Different Contraceptive Methods â€Å"). There are also some other pros of birth control method but it depends on the method that the couple is using (â€Å"Birth Control Pill Faq: Benefits, Risks and Choices†). There are many types of birth control. The following are the types of birth control that is being used: (a) male condoms which are also called as barrier because it blocks the sperm cells from getting near or into the egg cells; (b) oral contraceptives or birth control pills prevent the ovary from releasing eggs; (c) female condom is also called as a barrier because it prevents or blocks the sperm cells from reaching the egg cells; (d) Depo-Provera hormonal injections is a type of birth control that uses hormone progestin. Continuous injection of this for more than two years has an adverse effect on woman; (e) spermicides; (f) contraceptive sponges is also a barrier type of birth control. Although using this type of birth control would still have a risk of having a toxic syndrome. Woman that are very sensitive to spermicide nonoxynol-9 are not encourage to use this type of method; (g) diaphragm and cervical caps also blocks the sperm cells going inside the cervix. This type of method needs the assistance of the doctor for proper usage and fitting of the cervical cap or diaphragm; (h) intra – uterine devices is used and placed inside the uterus to prevent the sperm cells from entering it and reaching the egg cells; (i) surgical sterilization or tubal ligation is a permanent birth control that needs a surgical process; (j) periodic abstinence or natural family planning. In this type of birth control, the woman should have the knowledge about the fertility process so that this method would be successful (â€Å"Birth Control Methods â€Å"). There are some mild health risks related to the use of birth control methods. But there is also one severe health risk when using birth control method such as pills for a longer period of time like cardiovascular diseases such as heart failure, cardiovascular accident or stroke, high blood pressure and other cardio related diseases (â€Å"Birth Control Methods†). Both man and woman are responsible in birth control planning. They have an active participation in the birth control method. Although their physician would prescribe a pill or appropriate birth control method, still the couple would be responsible to the possible outcome of that method. They are the one who can observe to the negative or positive effect of that particular method. When a serious or life threatening situation or death happens, the couple is more reliable than their physician. In choosing birth control method, couples or person that is going to use it must consider if (1) it will affect your health like if they have history of breast cancer, have high blood pressure, has low density of the bone, diabetes, sexually transmitted disease (STD), and heart disease; (2) those possible side effects of the method; (3) frequency of having sexual intercourse; (4) the benefits that the method can give; (5) the quality of that certain drug or method in birth control; and (6) the possible outcome if ever the couple decided to have a child (â€Å"Birth Control Guide†). Shop Lifting Shop lifting is very common especially on malls and convenient stores. People shop lift because they need that particular thing or that they can’t afford to buy the things they wanted to (â€Å"Teenagers Shop Lifting†). Some shop lifters that has the money to buy things thinks that shop lifting gives them the adrenalin rush or thrill that cannot be caught, they think that what they have stolen is not important and they also think that they are not stealing because the owner or the store can afford to buy that again or the store is insured (â€Å"Teenagers Shop Lifting†). In some cases, people shop lifts especially students because of peer pressure. Shop lifters always carry a small bag or large jacket with a large pocket or umbrella (â€Å"Preventing Shoplifting†). Those things can be use to shop lift. Store management or staff should also be aware and alarm when a person puts down their bag because they may place the thing they get simply by dropping it into the bag (â€Å"Preventing Shoplifting†). There are also times that shop lifters are into a group (â€Å"Preventing Shoplifting†). Some of them will distract the attention of the staff while the others do the crime. Shop lifters can be seen mostly in malls that are crowded and convenient stores. The similarities of these two places are that they have a big space and do not have enough staff that would assist and guard the clients or buyers. Those shop lifters know that in places were there’s enough employee to assist and guard them, they won’t be able to the deed because there’s a big chance of getting caught while in malls and convenient store, they can easily place the things they get and hide it in their bags or clothes without being notice by the employees. Shop lifting is a crime that can be categorize as light. In some states, the fine depends on the amount that the shop lifter stolen while the jail time depends on the repetition of the incident (Zukowski). The penalty or fine ranges from 40 to 1000 dollars and the jail time is only 30 days up to 6 months (Zukowski). The society and justice system give the offenders a second chance to correct their action. If they are going to repeat their action, they will be punished again with a higher penalty and possible longer jail time. Compiling an Annotated Bibliography ? â€Å"Birth Control Guide† Ed. US Department of Health and Human Services: FDA Consumer Magazine, 2003. This article focuses on different approved birth control methods. It also provides information about the different types of birth control method and also the severe health risk that may be obtain from the prolonged use of contraceptive pills. ? â€Å"Birth Control Methods†. 2005. Planned Parenthood of Connecticut. June 27 2007. http://www. ppct. org/medical/services/bc_method. shtml. This article talks about different birth control methods. It also provides knowledge about pros and cons of different types of birth control method especially tubal sterilization. ? â€Å"Birth Control Methods† Ed. Us Department of Health and Human Services: National Women’s Health Information Center, 2005. This article provides birth control methods that can be use. It also provides knowledge on what they should take into consider when choosing a birth control method. ? â€Å"Teenage Shop Lifting†. 2006. Indian child. com June 26 2007. http://www. indianchild. com/parenting/teenagers/teenagers_shop_lifting. htm. The article provides the reasons why teenagers try to steal and ways to handle and persuade them. ? â€Å"Birth Control†. 2007. Cool Nurse. June 25 2007. http://www. coolnurse. com/birthcontrol. htm. The article tackles about having safe sex with the use of birth control methods. This provides idea or knowledge about the effectives of each method and the reasons why it is not recommended for teenagers. ? â€Å"Preventing Shoplifting. † Namibian Police 2007. The Namibian Police Force carries out their duty by informing the public of the different crimes and ways how to handle that situation. They encourage the public to have an active participation in fighting the crime to maintain the peace and order in their place. ? â€Å"Birth Control Pill Faq: Benefits, Risks and Choices†. 2007. Mayo Foundation for Medical Education and Research. June 25 2007. . The staff focuses on the advantages and disadvantages of taking contraceptive pills. The staff also discusses other contributing factors that make birth control pills unsafe to use than any other birth control methods. Birth Control. (2016, Aug 09). We have essays on the following topics that may be of interest to you

Saturday, November 2, 2019

Reward Principles and Performance Management in Organisations Assignment

Reward Principles and Performance Management in Organisations - Assignment Example The researcher states that the primary objective of performance management is to develop capacity in terms of both abilities and required skills for employees to achieve the set targets in an organization. Further, it enables individuals within an organization to discover their full potential, which enhances excellent performance in their tasks within an organization. In addition, it aims at enabling non-performers within an organization to do what is required. Communication is also an important component in this area where management aims at ensuring proper and organized communication within an organization. Also, reward strategies should also be considered to ensure that the performing employees are rewarded in the right way in order to motivate them. Performance management implementation in organizations faces a myriad of challenges. They can be either internal or external; hence, it is the role of management to ensure that all these challenges are handled with immediate effect. F irstly, the process experiences integration issues within the organization. Communication and cooperation must be enhanced in all the departments that are involved in this system. In most cases, the culture that has been adopted by the employees within an organization always has an impact in these areas. This is because they are people involved in departments, which are expected to enhance the efficiency of the system in an organization. All systems within an organization must be harmonized to ensure the success and reliability of this system. This also comes in hand with design challenges within the system. In some organization, some of the tools, which are designed for the system, do not address immediate needs of an organization in this area. The heads of the departments involved are supposed to seek consultation from experts in the field of ICT and interact with colleagues from other organizations who have implemented a similar strategy within their organization and it has been successful.

Thursday, October 31, 2019

Costco Wholesale Corporation Essay Example | Topics and Well Written Essays - 750 words

Costco Wholesale Corporation - Essay Example The department is often responsible for conducting all the staffing functions of the business; additionally, it ensures that all the people recruited in the company are working under the best conditions that can inspire effective and maximum performance from them. Some of the most effective functions of this department include staff recruitment. Here, the department is expected to conduct a job evaluation, and then call for applications to get the best candidate suited for the job. The department helps new employees get acquainted to the job and nurture some of the best talents for future success of the company. Costco corporations has managed to build its success around effective human resource development strategies, that have seen the corporation establish more that 670 branches in Europe and other countries in Asia (Runkle 9). Costco is one of the most successful wholesale corporations operating in the United States under membership-only basis, providing a wide variety of merchandise. The growth and development approaches that the corporation has established have seen it rise to become the world’s third largest retail warehouse and the second largest in the United States. Currently, the warehouse is headquartered in Issaquah, Washington D.C. The corporation was established in 1976 in San Diego, California, creating it’s the first of its warehouses in under the name Costco in Seattle, California, which came seven years after its establishment (Runkle 11). Currently, the corporation has grown and expanded, managing to establish about 671 warehouses that have been widely spread across the United States, Canada, Mexico, Spain, United Kingdom, Japan, South Korean and Taiwan (Runkle 13). It is important to note that currently, Costco Corporation has been successful in its strategies for human resource development in comparison to those adopted by its

Tuesday, October 29, 2019

Challenges and Contributions of Feminism to Organizational Theories Term Paper

Challenges and Contributions of Feminism to Organizational Theories - Term Paper Example Additionally, feminism must be seen as something that creates a totally different way of looking at the genders in that women are not inferior beings. Consequently, feminism challenges old assumptions about the sexes. Feminism can be treated in a number of ways. In certain circumstances, it may be seen as something that is a union of ideologies. This is because unlike many other beliefs, it can be the incorporation of both intellectual as well as social movements. Many experts have argued that feminism lacks objectivity and as such may not be regarded as a whole genus. However, this is beside the point; many other philosophies grew out of a postulation by a certain individual or expert. However, in the case of feminism, the idea grew out of the experiences and times of women. Consequently, one cannot be called a feminist if they do not demonstrate any sort of commitment to activism. Feminism must be a combination of ideology, philosophy, and activism. In other situations, feminism may be treated as a historical aspect. However, today, feminism in the UK and other western countries may be regarded as the fight against institutionalized prejudices against the genders within organizations. In other words, feminism may have changed substantially over the years but all these historical moments have certain things in common; the commitment to reinforcing equality of the sexes. It should be noted that feminism should not be regarded as an ideology that attempts to eliminate men or women out of positions of power. Consequently, one must be able to recognize the fact that feminism understands the differences between men and women but seeks to look for ways in which these two genders can co-exist in harmony.

Sunday, October 27, 2019

Analysis of Windows Operating System and Microsoft

Analysis of Windows Operating System and Microsoft What is Windows? Windows is a personal computer operating system from Microsoft that, together with some commonly used business applications such as Microsoft PowerPoint, Word and Excel, has become a de facto standard for individual users in most corporations as well as in most homes. It provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. According to OneStat.com, as of August, 2006, Windows as a whole dominates the personal computer world, running on about 97% of the operating system market share, with XP accounting for about 87% of that. In comparison Mac OS has about 2% and Linux (with all distributions) about .36% The reason why this is so is mainly because Windows is much more user friendly and everything comes pre-packaged so user just have to run the application and follow instructions for it to install. There are many versions of Windows Operating System available namely: Windows 286 Windows 386 Windows 3.0 and 3.11 Windows 95 Windows 98 Windows NT Windows 2000 Windows CE for use in small mobile computers Windows Me Windows XP Windows Vista Windows 7 Among all those versions, Windows XP is the most popular one and it is used by 61.9 percent of Internet users, according to data from Net Applications, followed by Windows 7 which has 14.46 percent of users and Vista -14.34 percent. A Brief Story On Windows Windows mainly concentrated on providing an operating system which was user-friendly, stable and less prone to crashes when they were implementing earlier versions. Now, even though XP is generally referred to being stable and efficient compared to other copies of Windows, it is still critised for being overly susceptible to security risks. Therefore the successor of XP- Vista, released in January of 2007 was designed in such a way so as it provides more security. The transition time between Vista and XP is the longest one between versions of windows. Vulnerabilities Of Windows What is vulnerability? â€Å"It is a weakness that makes a threat possible. â€Å" These vulnerabilities are used by attackers who exploits them to convey multiple attack, including enticing the users to open harmful and malicious media or to visit website which has a lot of viruses. These can have a lot of consequences. In the worst case, a hacker or attacker can get full access to the computer. Fortunately, windows provide a lot of solution to these vulnerabilities. The user just has to install the appropriate Microsoft patches or they are sometimes installed automatically with the help of Windows Update. Window Update Vulnerabilities can be compared to holes. They are like holes in the system. Windows periodically releases security patches mostly as Window Updates to fix those defects. There exists different level of security known as the â€Å"security level system† in Windows which describes the different levels of security holes: A critical security hole is â€Å"a vulnerability whose exploitation could allow the propagation of an Internet worm without user action.† An important hole is â€Å" A vulnerability whoses exploitation could result in compromise of the confidentiality, integrity, or availability of users data, or of the integrity or availability of processing recources.† A moderate security rating signifies that â€Å"Exploitability could result is mitigated to a significant degree by factors such as default configuration, auditing or difficulty of exploitation. And a low hole is â€Å"A vulnerability whose exploitation is extremely difficult or whose impact is minimal.† Source: Windows XP all-in-one desk reference for dummies Below is a list of Vulnerabilities in Windows MS10-033: Two Media Decompression Code Execution Vulnerabilities Description: It involves vulnerabilities in Media Decompression. â€Å"Windows ships with various components that help it process and play media files, such as videos. According to Microsoft, these media handling components suffer from two unspecified code execution vulnerabilities, involving the way they handle compressed data within specially crafted media. â€Å" Potential effect on system: An attacker can exploit these vulnerabilities by encouraging user to open specially crafted media file, download and install harmful software, by luring them to a website containing such media or by receiving specially crafted streaming content from a web site or any application that delivers Web content. In doing so, an attacker can exploit these vulnerabilities to gain the same user rights as the local user. If this happens, then the attacker will gain the complete control of that PC. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft rating: Critical. Solution: MS10-033. Since media files are most often the common targets of exploitation by attackers due to the increased potential for circulation via social group and the fact that it has been publicly been disclosed, it is estimated that the possibility that malware authors will look to exploit these types of vulnerabilities are high and hence, update must be installed. Targeted Software: Windows 2000 Service Pack 4 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 Itanium based Systems No Pack Service Pack 2 Windows XP Service Pack 2 and 3 Professional x64 Edition Service Pack 2 Windows Server 2008 No Service Pack Service Pack 2 Windows Server 2008 x64 Edition No Service Pack Service Pack 2 Windows Server 2008 for Itanium Based Systems No Pack Service Pack 2 Windows Vista Service Pack 1 2 Windows Vista x64 Edition Service Pack 1 2 MS10-034: Cumulative ActiveX Kill Bit Update Description:â€Å"ActiveX controls are small programs or animations that are downloaded or embedded in web pages which will typically enhance functionality and user experience. Many web design and development tools have built ActiveX support into their products, allowing developers to both create and make use of ActiveX controls in their programs. There are more than 1,000 existing ActiveX controls available for use today.† Source: http://msisac.cisecurity.org/advisories/2010/2010-043.cfm Potential effect on system: There are several Microsoft and third party ActiveX controls which particularly suffer from various security vulnerabilities, found by Microsoft and other external researchers. This vulnerability allows remote code execution if a user views malicious website that has an ActiveX control with Internet Explorer. An attacker could exploit any ActiveX controls to execute code on the users computer, with that users privileges. If user has administrative privileges, the attacker will gain full access to the users pc. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft rating: Critical. Solution: MS10-008 This updates protects the pc by activating the Kill bit for every vulnerable ActiveX controls, they are this disabled in Windows. Microsoft Internet Explorer provides security feature which will prevent an ActiveX control from being downloaded without the users permission. Targeted Software: Windows 2000 Service Pack 4 Windows XP Service Pack 2 Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 or 32-bit Systems Windows 7 for x64-based Systems Windows Server 2008 R2 for x64-based Systems** Windows Server 2008 R2 for Itanium-based Systems MS10-032: Three Privilege Elevation Vulnerabilities in the Kernel-mode Driver (Win32k.sys) Description:†The kernel is the core component of any computer operating system. In Windows, access to the kernel is provided via the Windows kernel-mode device driver (Win32k.sys). Win32k.sys suffers from three elevation of privilege (EoP) vulnerabilities†.† The flaws are caused due to the way windows kernel-mode driver, improperly allocate memory when copying data from user mode frees objects that are no longer in use manage kernel-mode driver objects validate input passed from user mode. â€Å" Potential effect on system: â€Å"By running a specially crafted program on one of your Windows computers, an attacker can leverage any of these flaws to gain complete control of that system, regardless of his original user privileges. However, the attacker needs to have local access to one of your computers in order to run a malicious program. So these vulnerabilities primarily pose an internal risk.† Microsoft rating: Important. Solution: MS10-032 MS10-041: .NET Framework Data Tampering Vulnerability Description: â€Å"The .NET Framework is software framework used by developers to create new Windows and web applications. Among other things, the .NET framework includes capabilities to handle cryptographically signed XML content, to ensure unauthorized attackers cant alter XML messages being sent to your application. Unfortunately, the .NET framework doesnt implement XML signature checking properly. As a result, attackers could potentially send maliciously altered XML messages to applications youve created with the .NET framework† Potential Effect on system: The impact of this vulnerability differs greatly depending on the application youve designed, and what type of data you passed in your XML. If user havent been exposed to any web applications that rely on signed XML, then the flaw doesnt affect him at all. Microsoft rating: Important. Targeted Software: Microsoft .NET Framework 1.1 Service Pack 1 Microsoft .NET Framework 1.0 Service Pack 3 Microsoft .NET Framework 2.0 Service Pack 1 2 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5 Service Pack 1 Microsoft .NET Framework 3.5.1 MS10-037: OpenType Compact Font Format (CFF) Driver Privilege Elevation Vulnerability Description: This vulnerability mainly occur when a driver that helps to display the OpenType CFF font, does not validate certain data passed from user space to kernel space. Moreover the driver can grant complete control of the affected system to any user who is logged in and is executing code. Potential effect on system: â€Å"By running a specially crafted program on one of your Windows computers, an attacker can exploit this flaw to gain complete control of that system, regardless of the attackers original user privileges. However, the attacker needs to have local access to one of your computers in order to run his malicious program. So this vulnerability primarily poses an internal risk.† Microsoft rating: Critical. Solution: MS10-037 Targeted Software: Microsoft Windows 2000 Service Pack 4 Windows XP Service Pack 2 3 Windows XP Professional x64 Edition Service Pck 2 Windows Server 2003 Service Pack 2 x64 Edition Service Pack 2 Windows Server 2003 for Itanium-based Systems Service Pack 2 Windows Vista Service Pack 1 2 Windows Vista x64 Edition Service Pack 1 and 2 Windows Server 2008 for 32-bit Systems No Service Pack and Service Pack 2 Windows Server 2008 for x64-based Systems No Service Pack and Service Pack 2 Windows Server 2008 for Itanium-based Systems No Service Pack and Service Pack 2 R2 for x64-based Systems Windows 7 for 32-bit Systems x64-based Systems These are a few examples of vulnerabilities that Windows Operating Systems mainly face. This list keeps on increasing with time, and fortunately Microsoft provides update so as to overcome these problems. Source: http://www.newagedev.net/2010/06/five-vulnerabilities-in-windows-and-its-components-two-critical/ http://www.sophos.com/ Threats Attacks There are many types of threats and attacks that Windows has to face. Also the fact that Windows operating system are most common among computer users, they are thus the more targeted by attackers. Threat V/S Attack What is a threat? â€Å"A potential occurrence malicious or otherwise that may harm an asset† What is an attack? â€Å"An action taken to harm an asset† From the two definitions above, we can say that a threat is more the possibility of doing harm to the Windows system, while attack is mainly the action taken to violate security settings. Types of Threats Attacks Below is a list of threats and attacks that are most common which can affect your Window Operating Systems. Types Of Threats Description Countermeasures Spoofing It mainly deals entering a system by stealing the identity of an authorised user. Example: Using the password and username of a person to enter his account and make changes without his permission. Do not keep password at the reach of other person. (for example in a plain text) Use spyware such as Spybot SD â€Å"Protect authentication cookies with Secure Sockets Layer (SSL).† â€Å"Do not pass credentials in plaintext over the wire.† Use strong and long password which is not easy to guess. Repudiation It involves the denial of participation in a communication which has occurred or denying that information has been received. Make use of digital signatures. Create secure audit trails. Tampering with data It mainly involves changing data manually to generate unexpected result. Example: Changing data on a web site. â€Å"Use data hashing and signing. Use digital signatures. Use strong authorization. Use tamper-resistant protocols across communication links. Secure communication links with protocols that provide message integrity.† Denial of service Prevent legitimate user from accessing a network or compuer by saturating it with requests. â€Å"Use resource and bandwidth throttling techniques. Validate and filter input.† Use software available on the net such as Radwares APSolute OS Information Disclosure It mainly involves making confidential information accessible to public or a group of unauthorised person. Encrypt file where information is stored. Keep back-up in secure places and use strong authorisations. Use passwords to be able to gain access to these information Use secure network when sending information. Malware (malicious Programs) It consists of any program that is installed either with or without permission of user, and whose aim is to cause harm to users pc by either gaining partial or full access to the system. Its impact can vary from slight as changing a folders name to full control of your machine without the ability for the user to easily find out. Types of Malicious Programs: computer viruses worms Trojan horses spyware Harmful adware scareware, crimeware, Most rootkits, and other malicious and unwanted software or program. Computer Viruses They are programs designed to cause harm to our computer system or the applications on the software. They are often attached to files which appear to be harmless to the operating system, but as soon as it is installed, the computer will operate different. There are viruses which even manage to close your computer without your permission. Types of Computer Viruses: * Boot sector computer viruses These types of viruses mainly affect the boot sector of the computer which is mainly in the bootable disk or in particular location in user computer hard drive. The boot sector viruses mainly affected the windows 2000 and examples of such viruses are: Disk Killer and Michelangelo. * Email viruses Emails viruses are transmitted through email as it name suggest. Normally they can be found as attachment and as soon as they are opened the computer gets the virus. Some may even replicate by themselves by forwarding themselves to all the e-mail addresses in the users address book. This type of virus is spread very quickly. Even though most of the mail system provides users with scan, a precaution one can take is opening mail from known-people only. * Companion viruses Companion viruses mainly affect a computers MS-DOS system. They create dangerous program that appears to be like the other normal files that are found on the computer. When a wrong command is enter into the prompt of the computer, it may end up executing the virus instead of the program that initially wanted to run. Fortunately, Windows like XP prevent such viruses from installing into computer as they do not require to use the MS-Dos command prompt. Worms Worms have the characteristic of self-replicating itself and they are thus spread very quickly. They exploit vulnerability on operating system and provide a gateway for other malware such as Trojan horse. An example of a worm which caused a lot of harm to mainly Window Operating system is: the ILOVEYOU virus. According to an article on WordPressTidBits For the Rest Of Us(WPTidBits), the ILOVEYOU worm (a.k.a. VBS/Loveletter and Love Bug worm), is a computer worm written in VBScript and it is considered by many as the most damaging worm ever. It started in the Philippines on May 4, 2000, and spread across the world in one day (traveling from Hong-Kong to Europe to the United States), infecting 10 percent of all computers connected to the Internet and causing about $5.5 billion in damage. Most of the â€Å"damage† was the labor of getting rid of the virus. The worm arrived in e-mail boxes with the simple subject of â€Å"ILOVEYOU† and an attachment â€Å"LOVE-LETTER-FOR-YOU.TXT.vbs†. The Pentagon, CIA, and the British Parliament had to shut down their e-mail systems to get rid of the worm, as did most large corporations. The worm overwrote important files, as well as music, multimedia and more, with a copy of itself. It also sent the worm to everyone on a users contact list. This particular worm only affected computers running the Microsoft Windows operating system. While any computer accessing e-mail could receive an â€Å"ILOVEYOU† e-mail, only Microsoft Windows systems would be infected. The worm propagates by sending out copies of itself to all entries in the Microsoft Outlook address book. It also has an additional component, in which it will download and execute an infected program called variously â€Å"WIN-BUGSFIX.EXE† or â€Å"Microsoftv25.exe†. This is a password-stealing program which will e-mail cached passwords. Trojan horse It is a malware which is difficult to detect, since it masquerades itself into files which appear to be normal. It can be on the computer without doing anything, and finally one day it can be the reason why your operating system has crashed. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Spyware Spyware normally a tool used by companies to record web surfing habits Spyware is also known as the Advertising Supported software. They normally do not do any harm to the operating system as such, but they transmit personal identifiable information from a computer to some place in the internet without the permission of the user. Harmful adware â€Å"Adwareis the common name used to describe software that is given to the user with advertisements embedded in the application† They usually run advertisement or downloads posters without the permission of the user which often cause problem. Scareware Scareware are usually software used for marketing but which has unethical marketing tactics. For example, software which scans the computer and informs user that his computer is infected, and the later will have to download the following antivirus to be able to remove them. Hence, as its name says â€Å"scare† ware is a software designed to scare people by providing them with inexact information so as to promote a particular software/applications. Crimeware Crimeware consists of an application or a program which helps people to perform illegal activities. For example, software to hack windows live messenger password. They normally steal personal information about user of an account. Rootkit â€Å"It enables an attacker to have root access to the computer, which means it runs at the lowest level of the machine. A rootkit typically intercepts common API calls. For example, it can intercept requests to a file manager such as Explorer and cause it to keep certain files hidden from display, even reporting false file counts and sizes to the user. Rootkits came from the UNIX world and started out as a set of altered utilities such as the Is command, which is used to list file names in the directory (folder).† Source: http://www.pcmag.com/encyclopedia_term/0,2542,t=root+kiti=55733,00.asp Rootkits are normally inserted by the intruder so that he can again have access to it a later stage. Rather than just being a piece of code, it is a system of many linked programs designed to take control of a machine at the administrator level, and remain hidden to the systems users or legitimate administrators. The purpose of rootkits include collecting information about computers (including other computers on a network) and their users (such as passwords and financial information), causing such computers to malfunction and creating or relaying spam. Prevention against Malware Antivirus Antivirus should be installed to prevent malware from gaining access to the computer. Anti-spyware It helps user to identify and remove spyware from Operating system. Moreover it defends users computer from them Anti-adware It scans the computer and removes adware. Moreover it can also detect other miscellaneous codes which the antivirus has not detected. Firewall It is a set of device or devices that can be used to monitor both incoming malware from network or on users pc when he enters an external disk. Window Update Allow windows to update automatically, since it provides users computer with required patches to fight against new type of malware. Making Windows more secure 1. Virtualisation This method mainly involves using another computer in your computer. What is meant by that is software like Adware, allow you to install windows and use it. Thus you can connect to any device or any site and if the pc crash, there will still be your main Operating system running. 2. User Account Control It is a method which is mainly applicable for users of Vista and Windows 7 only. It an effective measure that Microsoft has made to ensure that user does not perform any action which can turn out to be harmful for the system. Also, user is being asked for permission whenever a program is installed. If a virus tries to run without the knowledge of the user or his permission, UAC will pop up with the usual continue or cancel message giving him one last chance to stop that particular infection. UAC can be adjusted in the Control Panel under User Accounts. 3. Browser Internet Explorer is not a safe browser. (Not including IE9) and they are the most targeted browser. Firefox, Chrome and Safari have support for extensions, and the options available for each browser Internet Explorer can be used however any version below 7 does not meet the required security level. When using it make sure that the â€Å"InPrivate and SmartScreen filters are active†. Also, make sure that the activeX and file being downloaded are safe. 4. Safe Internet Practices Internet contains many viruses and one will never know when they might hit. Below is a guideline for a few good practices to follow when using the internet: If its questionable in real life, its probably the same online. Downloading illegal torrents, visiting sites, and looking for bomb-making information is an easy way to ask for a virus infection. Know what is being clicking on. Avoid pop up messages, congratulations message etc.. Maintain computer by updating anti-virus. If not maintained, the system becomes slow and vulnerable. Monitor all activity on computer. If the computer is being used by other user, ensure that they too is using the computer correctly. Reach out and ask questions. Its ok not to know if a certain website is safe or if an email is a scam. Ask more knowledgeable people or research the subject to find out if it is or not. OpenDNS OpenDNS -redirects requests through a third party server which is managed and updated to optimize speed and security. Using the OpenDNS server can keep user from visiting known malicious sites or keep malicious scripts from running. This is especially useful for multi-user environments because user can create an account and manage in more detail what sites the computers are allowed to visit (parental controls).

Friday, October 25, 2019

The French Revolution :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  The year 1789 brought France the biggest period of change she had or would ever experience. During the next ten year period, now known as the French Revolution, saw the overturn of and murder of Louis XVI, a time of chaos and much bloodshed, and the establishment of a new government that would change France forever. Many aristocrats were murdered during the Reign of Terror, and many leaders of the revolution themselves were murdered as the people continued to revolt. A new constitution was written and then another immediately followed as the Declaration of the Rights Man was proclaimed throughout the land. This time period ended when Napoleon Bonaparte became the first consul of France. France Before the Revolution   Ã‚  Ã‚  Ã‚  Ã‚  Before the revolution, France was divided into three classes, or estates as they were called. The first two, the nobility and the clergy, received many privileges that the other classes did not. The third class was made up of merchants, professional people, the workers, and the peasants. This caused a major division between the classes and the third class was becoming very upset with the way they were being treated.   Ã‚  Ã‚  Ã‚  Ã‚  At this point in French history, the kings of France had believed that they were only responsible to God for the way they chose to rule. However, if they wanted to receive advice, they could ask a legislative body called the Estates General that contained representatives from all three classes. The problem was that the kings were not required to do this and had not done so since 1614.   Ã‚  Ã‚  Ã‚  Ã‚  The royal taxes were very heavy which drained all the money from the third class and was then used by the king to live luxuriously. The nobles also drained all of the money from their estates so that they could continue to live a rich lifestyle. Causes of the Revolution The Philosophers. The philosophers were brilliant men who wanted to reorganize the government and society on a basis of reason. They’re were some who thought that the English system of government was better while one man’s writings, Jean Jacques Rousseau, even influenced the writers of the United States Constitution. Louis XVI Becomes King. Louis XVI became king when he was after his grandfather Louis XV died. The young king meant well for his country, but was inexperienced, immature, and not very intelligent in his dealings with government.   Ã‚  Ã‚  Ã‚  Ã‚  When Louis XVI came to the throne, there were some big problems in France, the main problem being money.

Thursday, October 24, 2019

Huckleberry Finn’s Moral Compass

Nathan Walker Mr. Dickenson Period 3 1/7/12 Critic Keith Neilson writes, â€Å"And so Huckleberry Finn ends, one of the saddest happy endings in literature. Jim is free, after an awful initiation that nearly gets him lynched. Tom is almost killed, yet learns nothing from the experience. But Huck’s loss seems the greatest of all. After finally letting his heart overcome all of the prejudices and moral inhibitions that society has put into his head, having determined to defy society to ‘go whole hog’ to rescue his friend Jim, he meets Tom Sawyer and immediately crawls back under Tom’s Romantic Wing.Huck’s character and moral nature seem violated†¦One of the greatest characters in literature has been forced to go backwards and we feel cheated. † For years, critics have argued over the ending of Huckleberry Finn. Critics tear apart the  racial content, issues about gender and sexuality, and most interestingly the ongoing controversy over th e final chapters. The debate remains  regarding  whether or not Twain wrote the ending with a purpose, or if he just took an easy way out. For example, the ending comes abruptly.In addition, readers are upset about  how Huck disappears and Tom reemerges. On the other hand, others feel that the ending is a masterpiece. Personally, I can see both sides of the debate. On one hand, it seems that Twain created a masterpiece just to throw it away at the end. We see that Huck, who we were rooting for all along, has not changed and will continue to carry out Tom’s whims and fantasies. All the progress he has made with Jim has been destroyed. This is one of the many  aspects that make the novel picaresque. On the other hand however, I can see why Twain did what he did.In order to be honest with Huck’s character, Twain could not have allowed Huck to become the hero. Furthermore, in the time period of the Southern 1800? s, if Huck had changed his ways, society would have been shocked. If society hated the book, Twain’s message would not have been so wide spread as it was, as the book would have probably banned. Another possible idea is that Twain wanted to make his reader’s wonder, and leave them to make their own decisions. One thing is sure however, either way you translate the ending; Twain sure knows how to stir controversy.