Tuesday, August 6, 2019
Boys donââ¬â¢t play with dollsââ¬â¢ Essay Example for Free
Boys donââ¬â¢t play with dollsââ¬â¢ Essay The Vietnam War is still the United Statesââ¬â¢ most famous (or infamous) war even if new conflicts have risen over the years. The numerous films made about the Vietnam War are a testament to its fame (or infamy). This paper would be a review of two internet sites reviewing the cause of conflict, social stratification, type of conflict, and how the war ended. According to vietnampix. com the war on Vietnam started because of the splitting of the country. The French used to dominate Vietnam but when they were defeated, the country was divided into two. Sometime between 1955 and 1960, the communist occupied North Vietnam tried to invade the Democratic South. Aided by two other communist countries China and Russia, the North was determined to conquer the whole country. Fearing the spread of communism, the US had to interfere. (The Vietnam War Background). Social Stratification had a big role in the war; in fact, it is part of the cause. Communism is based on a form of society where everybody else is equal, except for the officials. Democracy on the other hand believes in open opportunities for all. Not being able to agree on this divided the country which would eventually lead to the Vietnam War. The type of conflict of the Vietnam War is a mixture of different types. It was first a revolution against France which has ruled the country for a long time. And then it became a Civil War as the country was divided into two halvesââ¬âthe communist North and the democratic South led by Ngo Dinh Diem. (Vietnam. vassar. edu). It quickly became a feud of all sorts when America decided to take part in the war in order to stop the spread of communism in the world. On paper, the conflict was ended through the Paris Peace Agreement in January 1973 but hostilities between opposing forces were still happening. (Vietnam. vassar. edu). The result of the conflict were, a rare US loss, millions of lives gone, and a country devastated. References Vietnampix. com (n. d). The Vietnam War: Background. Retrieved June 25, 2009. from: http://www. vietnampix. com/intro. htm Vassar College (n. d). The Wars of Vietnam. Retrieved June 25, 2009. from: http://vietnam. vassar. edu/overview. html
Monday, August 5, 2019
An Architecture for Source Code Protection
An Architecture for Source Code Protection Abstractââ¬âDue to great competition in software industry the source code and binaries have to be protected. Source code available in plain form could be easily stolen and launched on any computer using IDE. We will discuss a protocol that will be used in both (single user and teaming environment) in order to provide source code protection. This would be achieved though authentication, authorization, encryption/decryption and hashing. Keywordsââ¬âEncryption; Authentication; Authorization; Hashing; Source code SC; Binaries; Integrated development environment (IDE); Authentication server Ticket Granting Server (ATGS) INTRODUCTION In software industry, the most important asset of the industry is the source code of the software which is being developed. There is a lot of work that has been done in the secure communication, secure databases, and other security services in applications but the source code itself is not being protected which might result in a great financial and data loss for an organization. Due to great competition in software Industry Company coming up with new and unique ideas and launches it in the market will in return generate great revenue. So in software industry itââ¬â¢s just about the idea that matters. Most of the software companies donââ¬â¢t leak out their upcoming products until they are ready to be released in the market. Due to the importance of the idea and source code, source code theft is the biggest threat in software industry. Source code theft could be physical or via some botnet. In physical source code theft a person might get access to your system and copies the source files and takes it to his own system to recompile with the IDE. He got access to all of your work without any difficulty. The other case could be a Lab environment where many users have access to a common machine. In this situation any person logging on the system can view history in the IDE he could also access those source files if they are made available. In the second type where your competitors know the importance of your system might launch a botnet on your machine. In this ways all your important files (including source files etc) could be stolen and sent to a remote machine. The person getting access to these source files might get a great benefit from it. Our work is to encrypt these source files and binaries generated by the IDE using cryptographic technique. Because if we donââ¬â¢t protect the binaries, the binary could be reversed engineered to extract source code using some decompiler [1]. JAD could be used to launch a reverse engineering attack on binaries [2]. Some softwareââ¬â¢s are available in the market that encrypts your files (including source files etc) but these files have to be encrypted manually every time. Due to this extra effort people just skip it. In our model source files and binaries would be automatically encrypted whenever the user performs the Save, Save As and Execute operation. In this way the developer could pay his full attention on software development without caring about its protection. Our technique will provide confidentiality to source code and binaries, tempering of source code and idea leaking. RELATED WORK The idea of protecting source code and its binaries was influenced from some of its related work Guy-Armand Yandji, Lui Lian Hao, Amir-Eddine Youssouf, Jules Ehoussou [3] presented a model for normal file encryption and decryption. The paper describes a methodology using AES and MD5 for encrypting files. The outcome file that will as a result be hashed and strongly encrypted through the software. Xiufeng Zhang and Qiaoyan Wen [4] described the flexibility of Java language, which makes the protection become very difficult. Using decompiler [5] such as Jad we can easily extract the source code from the binary file. Therefore, any malicious users can use the anti-compiler tools to make reverse-engineering attacks. The paper presented an AOP-Based J2EE Source Code Protection technique in they gave solution to the problem that arises when encrypting J2EE applications. ByungRae Cha [6] presented a CRYPTEX model for protecting software source code. The model presented safe protection and access control of software source codes. The access control to the source code was achieved using digital certificate. The CRYPTEX consisted of software source codes and an algorithm to control access. A White Paper sponsored by CA Technologies [7] for Protecting APIââ¬â¢s against attack and hijack presented a secure API architecture. APIs are windows into applications and as with any window an API can easily be misused. APIs put applications under the hacker mi croscope and increase attack surface on client application. So a solution was presented using SecureSpan API proxy. SVN [8] and CVS [9] are used to control versions. A version control system keeps track of all work and all changes in a set of files, and allows several developers to access them. Access to these files is controls using authentication and authorization if the files are not open source. Subversion can operate on network which will allow various people to modify and manage the same set of data. RISK FACTORS Source code is the main asset of any product, if somehow the source code is compromised the whole product get compromised. It should be necessary to become aware of the threats that are caused when source code or the binaries are compromised: Source code can be used to steal the idea behind that product and can be used to make a similar product. Source code can give attackers information about the working of your application and it will also provide him the loopholes in your application which would help him to launch attacks. Binary files can be revered engineered to generate source files using a decompiler and possible attacks could be launched by those source files. By having the source code or binaries the attacker can add some unwanted feature to that product and make that malicious product available to the public Bypass license checks (patching) in your product and make a free copy available to public. MANUALLY ENCRYPTING AND DECRYPTING You can encrypt and decrypt the source files and binaries manually using some software but in our approach the source files and binaries would be encrypted and decrypted automatically without any extra effort. Time Consuming Because we have to do encryption and decryption manually with the help of some software so existing approach might be more time consuming then ours. Purchase of extra Software We might need to purchase extra software in order to perform this encryption and decryption of source files and binaries. In our approach no extra software is required to perform this task. This would be a feature inside the IDE. More Secure Our approach is more secure than the existing one because the developer might forget to do this operation and leave the source files and binaries unencrypted. While in our approach whenever you exit the IDE the source files and binaries would be encrypted before closing IDE. In our approach developer wonââ¬â¢t need to care about the protection of source files and binaries these would be secured automatically at backend. SOURCE CODE PROTECTION ENVIRONMENTS Our focus is on two types of source code protection environments Single User Environment Teaming Environment Single User Envirnoment In a single user environment a single user using IDE on his system would face all the challenges to the source code that we have discussed above. The Source code is stored on the local drive onto the system in plain form. Anyone getting access to that drive can misuse the source code. We have to protect this source code by providing some kind of security measures. Proposed Solution First the user will be authenticated. So when the user launches the IDE a login screen will appear he would enter his username and password if his logging for the first time he has to get registered and the hash of the password would be taken and stored with username at some secure place (i.e. database ). If his already registered the entered password has to be hashed and is compared with the hash that is already stored with a particular username. Now if the both hash match then the user would be logged in to the IDE with a particular ID as shown in figure 1. If there is some kind of error the user would be asked to re-enter again, Skip and run IDE normally or exit. Fig. 1. Authentication sequence diagram Our main emphasis would be on Save, Save As, Open and execute operations because these operations require security enforcement. Say the user tries to open an existing
Sunday, August 4, 2019
joan of arc :: essays research papers
One of the most heroic legends of a woman is Joan of Arc. She was a brave and outstanding woman. She was a leader and had a lot of courage for all that she has battled and conquered. à à à à à Joan of arc was born at Domerey in Champagne, around 1412. In French, her name was Jeanne dââ¬â¢Arc. She was born the third of five children to a peasant farmer, Jacques dââ¬â¢Arc and third of five children to a peasant farmer, Jacques dââ¬â¢Arc and mother Isabelle de Vouthon. They were poor, but not needy. Her childhood was spent attending her fatherââ¬â¢s herds in the fields. She never learned to read or write but was skilled in sewing and spinning. Some thought her to be a unique child. à à à à à Up until the age of thirteen, in the summer of 1425, Joan became aware of her ââ¬Å"voicesâ⬠. Joan believed that these ââ¬Å"voicesâ⬠were the voices of St. Michael, St. Margaret, St. Catherine and many others. They told her they were sent from god. They also told her to cut her hair, dress in menââ¬â¢s attire and pick up the arms. Her confessor did not believe her, just as many others didnââ¬â¢t. She told her judges ââ¬Å"I saw them with these very eyes, as well as I see you.â⬠The voices also said that it was her divine mission to free her country from the English and help the dauphin gain the French throne. à à à à à By 1429 the English and their Burgundian allies occupied Paris and all of France north of Loire. Joan convinced the captain of the dauphinââ¬â¢s forces that these voices were real. She had to pass an examination by the board of theologians. They passed her and gave her troops to command and the rank of captain. à à à à à In May of 1429 of the battle of New Orleans, Joan led the troops to a miraculous victory over the English. As she continued to fight in other locations, fear came over the other troops. à à à à à On July 17, 1429 in Riems Cathedral, Charles VII was crowned King of France. Joan was given a place of honor next to the King. Later on, she was ennobled for her services. à à à à à In 1430 she was captured and sold to the English, while defending Compiegne hear Paris. Then the English handed Joan over to the Ecclesiastical court at Roven led by Pierre Cauchun. They tried her for witchcraft.
Saturday, August 3, 2019
Friendship in Dandelion Wine :: essays research papers
Friendship in Dandelion Wine How important is friendship in the lives of teenagers today? In the book Dandelion Wine friendship is one of the main and supporting themes that intertwines throughout the book. Friendship can come in all shapes and sizes, but when you lose a friend there are many affects. People can't imagine surviving high school and adolescence without their friends. John the best friend of Doug moves away, the aspects of losing his best friend were devastating bringing a turning point in to Doug's life with many affects. It was a sunny day until a sudden cloud came over Doug’s head, when the reality of John moving hit him (Bradbury 103) “John took the yellow and green train ticket solemnly from his pocket and they both looked at it'; (Bradbury 103). With this type of situation kids are forced to make decisions to cope with the environment around them. “Whether they’re gossiping on the telephone or huddled in school hallways, teen-agers are constantly reaching out to their friends. They can’t imagine surviving high school and adolescence without them.'; The very word of friendship is complicated in the world today. When someone leaves you for any reason you are going to miss him or her with many affects. As memories flow through your head remembering the person that left seems to get harder and harder. In the book Dandelion Wine John started to notice little things that he never noticed before, and this scared him for he was afraid that Doug wouldn’t remember him. & #8220;Shut your eyes, Doug. Now, tell me, what color eyes I got? Don’t peek. What color eyes I got?'; Douglas began to sweat. His eyelids twitched nervously. Aw heck, John that’s not fair. Tell me. Brown! John turned away. No sir. What you mean, no? You’re not even close!'; John closed his eyes. Turn around here, said Douglas. “Open up, let me see. It’s no use, said John. You’re forgot already. Just the way I said. Turn around here! Douglas grabbed him by the hair and turned him slowly. Okay Doug. John opened his eyes. Green.'; (Bradbury 105-106). The very sentimental aspect of these affects can help to shape yourself by the environment around you. “Maintaining friendship can cause a lot of anxiety among teens. One of the biggest issues is trust. Confiding in people can be tricky, a betrayal of a confidence can break a friendship'; (Ellis H1+).
Friday, August 2, 2019
Renaissance and Nineteenth Century Architecture Essay examples -- Arch
Renaissance and Nineteenth Century Architecture There are many different styles of architecture. All these styles depend on the time period, and the architecture. Today, many architects incorporate many styles into one building, giving it uniqueness. Introduction The dictionary defines architecture as the "art and science of designing and erecting buildings" (dictionary.com). Since the beginning of civilization, architects have been designing structures and buildings. They are sometimes conventional, and at other times, they are not. There are many different styles of architecture. All these styles depend on the time period, and the architecture. Today, many architects incorporate many styles into one building, giving it uniqueness. Two of the styles of architecture are Renaissance and Nineteenth Century: iron, steel and glass architecture. Renaissance Architecture The Renaissance period followed the Gothic period. It covered everything from painting to buildings to sculptures. Renaissance architecture is evident within many structures, even today. It began in 15th century, and lasted till the 16th century. This form was not considered practical, but it was quite artistic. Arcs and columns were taken from the Roman period, and artistically integrated into their designs. Some of the building, practically churches, had domes. All over the world, architects incorporated this form into their designs, from Italy to Spain; although the styles differed. Some famous ar...
Man vs. Society
Society excludes, torments, and sometimes kills people simply because of their religion. We might not always see it or hear it, but itââ¬â¢s there. Religious persecution is everywhere. It is in our schools, it is in our government, it is engrained in our society. Naturally people persecute and torment those who are not like them, be them Muslim, Mormon, Hindu, or even Christian. Yes, even Christians are being persecuted. We in America hear ââ¬Å"so often about Muslims [being] victims of abuse in the Westâ⬠(Ali).But what we donââ¬â¢t realize that there is another war. An ââ¬Å"unrecognized warâ⬠(Ali) taking place everywhere from West Africa to the Middle East to South Asia and Oceania. A war on Christians. Christians are the most persecuted group in the contemporary world. ââ¬Å"According to the World Evangelical Alliance, over 200 million Christians in 60 countries are denied fundamental human rights solely because of their faithâ⬠(Persecution of Christians). In Egypt, Christians are forced under strict rules that do not apply to mosques and other religious institutions.For example, under Hamayouni Decree, Christians have to go through the federal government in order to build, or even repair their buildings (Persecution of Christians). Not only does Egypt restrict Christiansââ¬â¢ ability to build and maintain churches, but also their ability to hold positions. Christians cannot hold senior government positions, diplomatic positions, be in the military, or hold teaching positions (Persecution of Christians).Also, the Egyptian government does not recognize conversions from Islam to Christianity, and since inter-faith marriages in the country are illegal, converts cannot marry people born in Christian communities, and their children receive an Islamic education (Persecution of Copts). After the ââ¬Å"Arab Springâ⬠movement, there have been even more accounts of Christian persecution. Arab Spring is ââ¬Å"a revolutionary wave of de monstrations that has been taking place in the Arab world â⬠¦ [that is] successfully overthrowing their repressive governmentsâ⬠(Cha-cha).The overthrow of the government of Libya, the civil uprisings in Bahrain, Syria, and Yemen, and the major protests in Algeria, Iraq, Jordan, Kuwait, Morocco, and Oman (Arab Spring) are allowing Islamic extremists to gain power, and this is very worrisome for many Christians. The Arab Spring movement is also causing a Muslim ââ¬Å"revivalâ⬠of sorts, causing them to question their tolerance of Christians thus far. This revival has caused numerous incidents such as ââ¬Å"church-burnings, rapes, mutilations, and murdersâ⬠(Ali). Christians are being killed in Islamic cultures simply because of their religion.Yet this raises no alarm. Here in the West we have no idea how badly our fellow Christians suffer at the hands of Muslim countries. They constantly live in fear that their houses will be burned, their children killed, and them imprisoned with no hope of a fair trial. ââ¬Å"From blasphemy laws to brutal murders to bombings to mutilations and the burning of holy sites, Christians in so many nations live in fearâ⬠(Ali). Christians and Muslims in Nigeria have been on the edge of civil war for years. A new Islamic radical group called Boko Harem provokes most of this action.This organization has stated that ââ¬Å"it will kill all Christians living in the countryâ⬠(Ali). ââ¬Å"In the month of January 2012 alone, Boko Haram was responsible for 54 deathsâ⬠(Ali). This is insane! In the first month of this year, a month with a mere 31 days, Boko Haram has already killed 54 people. Thatââ¬â¢s almost two people a day. And this is only one group. In 2011, they killed at least 510 and burned down or destroyed more than 350 churches. This ââ¬Å"Christophobiaâ⬠that Africa is also found in Sudan, but in a very different form.The Sudanese authoritarian government has ââ¬Å"for decades tormente d the Christian minorities in the southâ⬠(Ali). In Sudan, it is not extremist groups that are targeting Christians, but the government itself. It began in 2003, at the infamous genocide at Darfur. Since then, the Muslim president, Omar al-Bashir, has been indicted in the International Criminal Court in The Hauge of three counts of genocide (Omar al-Bashir). Even though he granted partial independence to south Sudan, the violence has not ended. Christians in south Sudan are still subject to aerial bombings, targeted killings, and the kidnapping of children (Ali).The UN reports that between 53,000 and 75,000 innocent civilians have been displaced from their homes (Ali). Not only are African Christians suffering, but also ones in the Middle East. Since 2003, more than 900 Iraqi Christians have been killed by terroristsââ¬â¢ actions and 70 churches have been burned in Baghdad alone. ââ¬Å"Christians might disappear altogether from Iraqâ⬠says the chairman of the U. S. Comm ission on International Religious Freedom (Muslim Persecution of Christians). In Iran, the government is making laws that make it illegal to spread the Christian faith to the rest of the Iranians.Their goal is to ââ¬Å"cleanse Iranian Christiansâ⬠(Wahdat-Hagh), completely eradicating them from their country. There is so much hatred from the Islamic society that is directed towards Christians, and for no good reason. They torment and rape and mutilate and murder all Christians who are willing to stand up for what they believe in. And what do we do? What does western civilization do? We stand aside and allow it to happen. We turn a blind eye to our brothers and sisters who are being tortured and murdered for their beliefs, and allow it all to go on. We know itââ¬â¢s happening, but why do we stand aside?Why is America, the country that was founded on the principals of Christianity, the country that was founded for the purpose of escape from religious persecution, standing asid e and allowing people to be massacred? Are we so wrapped up in things of this world, are we so wrapped up in economy and money and oil that we stand aside and allow people to be brutally killed so that we can keep our gas prices low and our people safe? Even if we donââ¬â¢t all agree that Christians are right are wrong, donââ¬â¢t we all believe that human life is valuable, and that it must be preserved?We went to war with the Middle Eastern countries to fight this ââ¬Å"War on Terror,â⬠but what did that accomplish? Safety for our own borders, and not even that to its fullest extent. It did nothing to help the hundreds of thousands of Christians living in fear all around the world. So what should we do? We the people, of the United States of America, must go back to our roots, go back to the reason why we came here in the first place, and abandon all of our petty arguments, so that we can aid those who are the oppressed and the persecuted because of their faith.
Thursday, August 1, 2019
The CBD (the Central Business District)
The typical CBD is in the commercial and cultural activity in a city. In many large cities, it is immediately recognizable by tall skyscrapers, the neon lights at night and the very high density of buildings, traffic and people. The CBD is usually highly accessible. It is the focus of roads, with bus and railway stations near by. The CBD usually has the highest density of bus services and taxis in the whole of the urban area. Although the residential population is only very small, during the day and evening the CBD is crowded with people working, shopping or seeking entertainment. Main functions of the CBD Shops: The CBD is usually at the top of the shopping hierarchy in a city. It has the widest range of shops and the largest department stores. Shops mainly sell comparison or high-order goods and they draw their customers from a wide sphere of influence. The highest land costs are in the centre of the CBD. In the core of the CBD, there are large department stores and branches of many national chains of shops. Smaller shops, often privately owned, are located on the edges of the CBD in the fringe area called the frame. Some shops, such as clothing, shoe and jewellery shops tend to cluster together to take advantage of competition, while others are more dispersed, such as newsagents and chemists. Offices: Banks, building societies, solicitors, company headquarters, insurance companies and government offices occupy high-rise office blocks or the upper floors above shops in the CBD. Culture & entertainment: Parts of the CBD ââ¬Ëcome alive' at night as the theatres, cinemas, clubs, bars and restaurants attract customers. Certain parts of cities have become famous for their nightlife, such as London's West End. The CBD of a city is not static; it is a dynamic area going through phases of growth and decline. You will see some areas in decay in a CBD of a large city, with closed shops and a rundown appearance, and others that appear lively, smart and successful. The CBD also has problems with traffic congestion, parking and pollution, as well as those caused by lack of space and shortage of land. Local planners have implemented a variety of different schemes to attempt to solve the problems of the CBD. Problems and attempted solutions in the CBD: Traffic congestion: Lots of cars and shops, services and employment in the CBD create massive problems of congestion and parking in the city centres. Roads are often narrow, with little pavement space. Some solutions include: * Ring roads and by-passes to divert traffic not going into the city centre * Urban motorways and flyovers * Public transport schemes such as ââ¬Ëpark and ride', the Newcastle metro, trams in Manchester * Multi-storey car parks * Pedestrianization of high streets Lack of space and the high cost of land: Competition for land has led to high prices, and growing firms find it difficult to find space. In some CBDs the smaller retailers have been forced away from the city centre because of the high costs. Some solutions include: * High-rise buildings to increase the floor area available * New retailing areas in out-of-town shopping centres in the suburbs or rural-urban fringe, in a process called decentralization Pollution: Water, land, air and noise pollution are all common in city centres. Pollution is thought to contribute to the stresses of living in urban areas and to some diseases, such as asthma and bronchitis. Some solutions include: * Laws against litter and dumping sewage in rivers * Improved provision of litter bins and road sweeping * Clean Air Acts that allow only the use of smokeless fuels * Clean-fuel technology and vehicles that run on methane gas or electricity * Banning heavy lorries from passing through city centres * Increased planting of trees and shrubs Urban decline: Parts of some CBDs have declined. Shops and offices have closed down and the empty buildings and vandalized. City centres compete with out-of-town shopping centres to cater for the growing demands of shoppers. Some solutions include: * Redevelopment of zones of decline in the CBD such as King's Cross and Covent Garden in London * Expansion of the CBD into areas of the inner city ââ¬â old factories and substandard terraced housing have been cleared, rehousing the occupants in the suburbs or New Towns and filling the space with new shopping and office developments
Subscribe to:
Comments (Atom)