Thursday, January 23, 2020

Richard II in William Shakespeare Essay -- Hero Richard II Shakespeare

Richard II in William Shakespeare The plays of William Shakespeare are generally easy to categorize, and the heroes of these plays are equally so. However, in the history play Richard II, Shakespeare’s king is more ambiguous than Hamlet or Romeo– there is no clear cut answer to whether Richard II is a tragic hero... or simply a tragedy. Historically, Richard II was crowned at a very young age, forced into the role of monarch, and thrust without hesitation into the murky world of political intrigue, which perhaps lends his character sympathy because he had no choice in his fate. However, despite his forced role in life, Richard II seems to rely on the concept of divine right to secure his throne, making no effort to sustain it once it is â€Å"irrevocably† his. Richard II is both the tragic hero and the tragedy– simply playing the role of King for the majority of the play, but only coming into his own after he is deposed, and only then to fight for his own existence. From the beginning of the play, Richard II is apathetic at best in his royal role. By exiling Bolingbroke and...

Wednesday, January 15, 2020

Faceless Crimes

Part I. Computer crimes or cybercrimes have been on the rise since the introduction of the Internet. More so with the onset of mobility and the launch of wireless networking, the increase in mischievous computer activities was exponentially high. Since cybercrimes are considered â€Å"faceless crimes† where a criminal hacker can do their misdeeds miles or continents away, or set-up a logic bomb a few hours later, it has been more difficult to trace these malicious acts. In determining specific categories or types of IT-related attacks, it is noteworthy to examine the lists prepared by Mandia et al. (2001) in the book â€Å"Incident Response: investigating Computer Crime: 1.Denial-of-service attacks are some of the easiest incidents to respond to, because they do not involve actual intrusions. 2.Unauthorized uses of resources are typically insiders using their computers in an inappropriate manner. These investigations are often more oriented around personnel rather than technical issues. 3.Theft of information attacks involves unauthorized read-only access to information. While these are typically solved easily through configuration, it is very difficult to tell through an initial investigation if the attacker's access is read-only or actually involved a full-blown computer intrusion. 4.Vandalism is really a subset of computer intrusion, because it is not possible without access to the victim system. 5.Computer intrusions are the â€Å"mother of all incidents,† in that they require the most involved response. The best way to determine unauthorized computer access, downloading, copying and transferring of classified or confidential materials is by examining and evaluating the log files and access control lists. Unless the intruder or attacker is a sophisticated or high-caliber criminal hacker, this is the quickest and simplest method available, otherwise hiring trained professionals who will do computer forensics investigation is necessary to establish criminal liability and culpability. Part II. Depending upon the forensics investigator, there are various techniques or methodologies in investigating cybercrimes. But in general, there are four major steps namely; â€Å"evidence identification, evidence preservation, evidence analysis and evidence presentation (Solomon et al., 2005). There are two major tools required in forensics investigation, the first are the disk imaging and validating tools and the second are the forensics tools. Disk imaging and validating tools basically check the integrity of the hard disks and creates a mirror copy of the hard disk involved in the investigation. Forensics tools are the hardcore equipment that does data analysis, recovery and rebuilding, for deleted files and data. Numerous tools are available commercially on the market. One important note for an aspiring computer forensics investigator is that all tools to be utilized in the course of their trade should be properly licensed and the used is authorized by the vendor otherwise the case might be thrown out of court for using pirated or illegally purchased software. Some of the common disk imaging and validation tools as listed by Solomon et al. (2005) are: ByteBack by Tesch Assist, inc. and used for data recovery; EnCase from Guidance Software is one of the best drive duplicators; and Norton Ghost by Symantec provides the ability to create disk copies that are almost exact copies of the original. Solomon et al. (2005) also listed SMART by ASR Data Acquisition as a suite of forensics examination tool and WinHex ftom X-Ways is a universal hexadecimal editor and disk management utility.

Tuesday, January 7, 2020

Censorship Of The World Wide Web - 1326 Words

We live in the age of information, a world that has now been largely digitalized. The World Wide Web is the central component of our era, as it allows people across the globe to share and receive information in an instance. It used to take months before a letter from China could reach the U.S, now it just takes a second with E-Mail. This fast pace information processing has allowed human society to move forward with unprecedented speed, but it also raises many concerns for government authorities. Sharing information is a powerful tool, and too much of it will make any government nervous. Censorship of information has had a long history throughout the world. In ancient China for example, censorship was considered a legitimate instrument†¦show more content†¦That is a 718% increase compared with the 757 items that Google had to remove in the six months prior (Suter). Dorothy Chou, a senior policy analyst at Google wrote in her blog post, â€Å"It s alarming not only because free expression is at risk, but because some of these requests come from countries you might not suspect -- Western democracies not typically associated with censorship.† Other countries can also send in requests to Google and ask them to take things down, but Google rarely complies with those requests. Being a U.S based company; Google has complied with 93% of the government requests from our own government authorities. It only complied or partially complied with only 24% of such requests from Canada, and 44% from France (Sutter). The numbers are significantly lower, which shows tha t Google is clearly under more pressure by the U.S government. Other nations like China and Russia have completely banned Google all together. These data suggests that the U.S government also actively monitors the World Wide Web, George Orwell’s worst nightmare. The U.S. government has even gone as far as to ask Google for data on its users more than 31,000 times in 2012 alone. Google said that they ended up turning over at least some data in every single case (Quain). However, some have argued that these monitoring isn’t all that bad. Censorship to some extent, as some would argue, is to