The Boy In The Striped Pajama Essay Topics And Using Multiple Texts
Saturday, January 25, 2020
Scramjet Powerplants :: Essays Papers
Scramjet Powerplants Higher, further, faster, carry more. These have always been the goals of aircraft designers from the very beginning of aviation history. Even today engineers and researchers attempt to build aircraft that will be able perform better. Throughout the history of aircraft design, the main limiting factor has been the performance of power plants. This is still going on today as we attempt to build engines that allow superior performing aircraft. Scramjet engines offer one potential solution to this problem. By the end of World War II we had the technology to build airframes that would fly higher, go further, faster and carry more, but there were no power plants available to power such aircraft. With the introduction of the jet engine aircraft took an enormous step forward. Although the jet engine offers a multitude of advantages over jet engines, there are still limitations. One of these is that jet engines have a limited operating speed. A speeds much higher than Mach 3 the turbine engines, with rotating blades and other moving parts are unable to stand the stress and pressures associated with high speed flight. Rocket power has been used in some applications. Some of these include experimental aircraft such as the X-15. Rocket power is also used in spacecraft as the main means of propulsion. Rocket powered aircraft must carry a supply of hydrogen and oxygen. The requirement to carry large supplies of fuel severely limits the payload capabilities of the ship. In addition it is cost prohibitive for most operations. Commercial transportation is out of the question. Ramjet engines offer some improvements, but are still speed limited. A ramjet engine works in a similar manner to a turbine engine, but there are no moving parts. Instead of using a compressor section to produce high-density air, the forward speed of the aircraft is used to compress the air. The air is then slowed to subsonic speed through a reverse venturi. Fuel is ignited and creates thrust is a fashion similar to that of a turbine engine. (Ramjet/Scramjet...) Scramjet is the name given to a supersonic compression ramjet. It operates in a similar manner to a ramjet, however the air passing through the engine maintains supersonic speed. The scramjet uses hydrogen fuel, just like a rocket engine, but is does not require an onboard supply of oxygen.
Friday, January 17, 2020
History of Computer Virus
THE HISTORY OF COMPUTER VIRUSES A Bit of Archeology There are lots and lots of opinions on the date of birth of the first computer virus. I know for sure just that there were no viruses on the Babbidge machine, but the Univac 1108 and IBM 360/370 already had them (ââ¬Å"Pervading Animalâ⬠and ââ¬Å"Christmas treeâ⬠). Therefore the first virus was born in the very beginning of 1970s or even in the end of 1960s, although nobody was calling it a virus then. And with that consider the topic of the extinct fossil species closed. Journey's Start Let's talk of the latest history: ââ¬Å"Brainâ⬠, ââ¬Å"Viennaâ⬠, ââ¬Å"Cascadeâ⬠, etc. Those who started using IBM PCs as far as in mid-80s might still remember the total epidemic of these viruses in 1987-1989. Letters were dropping from displays, crowds of users rushing towards monitor service people (unlike of these days, when hard disk drives die from old age but yet some unknown modern viruses are to blame). Their computers started playing a hymn called ââ¬Å"Yankee Doodleâ⬠, but by then people were already clever, and nobody tried to fix their speakers ââ¬â very soon it became clear that this problem wasn't with the hardware, it was a virus, and not even a single one, more like a dozen. And so viruses started infecting files. The ââ¬Å"Brainâ⬠virus and bouncing ball of the ââ¬Å"Ping-pongâ⬠virus marked the victory of viruses over the boot sector. IBM PC users of course didn't like all that at all. And so there appeared antidotes. Which was the first? I don't know, there were many of them. Only few of them are still alive, and all of these anti-viruses did grow from single project up to the major software companies playing big roles on the software market. There is also an notable difference in conquering different countries by viruses. The first vastly spread virus in the West was a bootable one called ââ¬Å"Brainâ⬠, the ââ¬Å"Viennaâ⬠and ââ¬Å"Cascadeâ⬠file viruses appeared later. Unlike that in East Europe and Russia file viruses came first followed by bootable ones a year later. Time went on, viruses multiplied. They all were all alike in a sense, tried to get to RAM, stuck to files and sectors, periodically killing files, diskettes and hard disks. One of the first ââ¬Å"revelationsâ⬠was the ââ¬Å"Frodo. 4096â⬠virus, which is far as I know was the first invisible virus (Stealth). This virus intercepted INT 21h, and during DOS calls to the infected files it changed the information so that the file appeared to the user uninfected. But this was just an overhead over MS-DOS. In less than a year electronic bugs attacked the DOS kernel (ââ¬Å"Beast. 512â⬠Stealth virus). The idea of in visibility continued to bear its fruits: in summer of 1991 there was a plague of ââ¬Å"Dir_IIâ⬠. ââ¬Å"Yeah! ââ¬Å", said everyone who dug into it. But it was pretty easy to fight the Stealth ones: once you clean RAM, you may stop worrying and just search for the beast and cure it to your hearts content. Other, self encrypting viruses, sometimes appearing in software collections, were more troublesome. This is because to identify and delete them it was necessary to write special subroutines, debug them. But then nobody paid attention to it, until â⬠¦ Until the new generation of viruses came, those called polymorphic viruses. These viruses use another approach to invisibility: they encrypt themselves (in most cases), and to decrypt themselves later they use commands which may and may not be repeated in different infected files. Polymorphism ââ¬â Viral Mutation The first polymorphic virus called ââ¬Å"Chameleonâ⬠became known in the early '90s, but the problem with polymorphic viruses became really serious only a year after that, in April 1991, with the worldwide epidemic of the polymorphic virus ââ¬Å"Tequilaâ⬠(as far as I know Russia was untouched by the epidemic; the first epidemic in Russia, caused by a polymorphic virus, happened as late as in 1994, in three years, the virus was called ââ¬Å"Phantom1â⬠). The idea of self encrypting polymorphic viruses gained popularity and brought to life generators of polymorphic code ââ¬â in early 1992 the famous ââ¬Å"Dedicatedâ⬠virus appears, based on the first known polymorphic generator MtE and the first in a series of MtE-viruses; shortly after that there appears the polymorphic generator itself. It is essentially an object module (OBJ file), and now to get a polymorphic mutant virus from a conventional non-encrypting virus it is sufficient to simply link their object modules together ââ¬â the polymorphic OBJ file and the virus OBJ file. Now to create a real polymorphic virus one doesn't have to dwell on the code of his own encryptor/decryptor. He may now connect the polymorphic generator to his virus and call it from the code of the virus when desired. Luckily the first MtE-virus wasn't spread and did not cause epidemics. In their turn the anti-virus developers had sometime in store to prepare for the new attack. In just a year production of polymorphic viruses becomes a ââ¬Å"tradeâ⬠, followed by their ââ¬Å"avalancheâ⬠in 1993. Among the viruses coming to my collection the volume of polymorphic viruses increases. It seems that one of the main directions in this uneasy job of creating new viruses becomes creation and debugging of polymorphic mechanism, the authors of viruses compete not in creating the toughest virus but the toughest polymorphic mechanism instead. This is a partial list of the viruses that can be called 100 percent polymorphic (late 1993): Bootache, CivilWar (four versions), Crusher, Dudley, Fly, Freddy, Ginger, Grog, Haifa, Moctezuma (two versions), MVF, Necros, Nukehard, PcFly (three versions), Predator, Satanbug, Sandra, Shoker, Todor, Tremor, Trigger, Uruguay (eight versions). These viruses require special methods of detection, including emulation of the viruses executable code, mathematical algorithms of restoring parts of the code and data in virus etc. Ten more new viruses may be considered non-100 percent polymorphic (that is they do encrypt themselves but in decryption routine there always exist some nonchanging bytes): Basilisk, Daemaen, Invisible (two versions), Mirea (several versions), Rasek (three versions), Sarov, Scoundrel, Seat, Silly, Simulation. However to detect them and to restore the infected objects code decrypting is still required, because the length of nonchanging code in the decryption outine of those viruses is too small. Polymorphic generators are also being developed together with polymorphic viruses. Several new ones appear utilizing more complex methods of generating polymorphic code. They become widely spread over the bulletin board systems as archives containing object modules, documentation and examples of use. By the end of 1993 there are seven known generators of polymorphic code. They are: MTE 0. 90 (Mutation Engine), TPE (Trident Polymorphic Engine), four versions NED (Nuke Encryption Device), DAME (Dark Angel's Multiple Encryptor) Since then every year brought several new polymorphic generators, so there is little sense in publishing the entire lists. Automating Production and Viral Construction Sets Laziness is the moving force of progress (to construct the wheel because that's too lazy to carry mammoths to the cave). This traditional wisdom needs no comments. But only in the middle of 1992 progress in the form of automating production touched the world of viruses. On the fifth of July 1992 the first viral code construction set for IBM PC compatibles called VCL (Virus Creation Laboratory) version 1. 00 is declared for production and shipping. This set allows to generate well commented source texts of viruses in the form or assembly language texts, object modules and infected files themselves. VCL uses standard windowed interface. With the help of a menu system one can choose virus type, objects to infect (COM or/and EXE), presence or absence of self encryption, measures of protection from debugging, inside text strings, optional 10 additional effects etc. Viruses can use standard method of infecting a file by adding their body to the end of file, or replace files with their body destroying the original content of a file, or become companion viruses. And then it became much easier to do wrong: if you want somebody to have some computer trouble just run VCL and within 10 to 15 minutes you have 30-40 different viruses you may then run on computers of your enemies. A virus to every computer! The further the better. On the 27th of July the first version of PS-MPC (Phalcon/Skism Mass-Produced Code Generator). This set does not have windowed interface, it uses configuration file to generate viral source code. This file contains description of the virus: the type of infected files (COM or EXE); resident capabilities (unlike VCL, PS-MPC can also produce resident viruses); method of installing the resident copy of the virus; self encryption capabilities; the ability to infect COMMAND. COM and lots of other useful information. Another construction set G2 (Phalcon/Skism's G2 0. 70 beta) has been created. It supported PS-MPC configuration files, however allowing much more options when coding the same functions. The version of G2 I have is dated the first of January 1993. Apparently the authors of G2 spent the New Year's Eve in front of their computers. They'd better have some champagne instead, this wouldn't hurt anyway. So in what way did the virus construction sets influence electronic wildlife? In my virus collection there are: â⬠¢ several hundreds of VCL and G2 based viruses; â⬠¢ over a thousand PS-MPC based viruses. So we have another tendency in development of computer viruses: the increasing number of ââ¬Å"construction setâ⬠viruses; more unconcealably lazy people join the ranks of virus makers, downgrading a respectable and creative profession of creating viruses to a mundane rough trade. Outside DOS The year 1992 brought more than polymorphic viruses and virus construction sets. The end of the year saw the first virus for Windows, which thus opened a new page in the history of virus making. Being small (less than 1K in size) and absolutely harmless this non resident virus quite proficiently infected executables of new Windows format (NewEXE); a window into the world of Windows was opened with its appearance on the scene. After some time there appeared viruses for OS/2, and January 1996 brought the first Windows95 virus. Presently not a single week goes by without new viruses infecting non-DOS systems; possibly the problem of non-DOS viruses will soon become more important than the problem of DOS viruses. Most likely the process of changing priorities will resemble the process of DOS dying and new operating systems gaining strength together with their specific programs. As soon as all the existing software for DOS will be replaced by their Windows, Windows95 and OS/2 analogues, the problem of DOS viruses becomes nonexistent and purely theoretical for computer society. The first attempt to create a virus working in 386 protected mode was also made in 1993. It was a boot virus ââ¬Å"PMBSâ⬠named after a text string in its body. After boot up from infected drive this virus switched to protected mode, made itself supervisor and then loaded DOS in virtual window mode V86. Luckily this virus was born dead ââ¬â its second generation refused to propagate due to several errors in the code. Besides that the infected system ââ¬Å"hangedâ⬠if some of the programs tried to reach outside the V86 mode, for example to determine the presence of extended memory. This unsuccessful attempt to create supervisor virus remained the only one up to spring of 1997, when one Moscow prodigy released ââ¬Å"PM. Wandererâ⬠ââ¬â a quite successful implementation of a protected mode virus. It is unclear now whether those supervisor viruses might present a real problem for users and anti-virus program developers in the future. Most likely not because such viruses must ââ¬Å"go to sleepâ⬠while new operating systems (Windows 3. xx, Windows95/NT, OS/2) are up and running, allowing for easy detection and killing of the virus. But a full-scale stealth supervisor virus may mean a lot of trouble for ââ¬Å"pureâ⬠DOS users, because it is absolutely impossible to detect such a stealth virus under pure DOS. Macro Virus Epidemics August 1995. All the progressive humanity, The Microsoft and Bill Gates personally celebrate the release of a new operating system Windows95. With all that noise the message about a new virus using basically new methods of infection came virtually unnoticed. The virus infected Microsoft Word documents. Frankly it wasn't the first virus infecting Word documents. Earlier before anti-virus companies had the first experimental example of a virus on their hands, which copied itself from one document to another. However nobody paid serious attention to that not quite successful experiment. As a result virtually all the anti-virus companies appeared not ready to what came next ââ¬â macro virus epidemics ââ¬â and started to work out quick but inadequate steps in order to put an end to it. For example several companies almost simultaneously released documents- anti-viruses, acting along about the same lines as did the virus, but destroying it instead of propagation. By the way it became necessary to correct anti-virus literature in a hurry because earlier the question, ââ¬Å"Is it possible to infect a computer by simply reading a fileâ⬠had been answered by a definite ââ¬Å"No way! with lengthy proofs of that. As for the virus which by that time got its name, ââ¬Å"Conceptâ⬠, continued its ride of victory over the planet. Having most probably been released in some division of Microsoft ââ¬Å"Conceptâ⬠ran over thousands if not millions of computers in no time it all. It's not unusual, because text exchange in the format of Microsoft Word became in fact one of the industry standards, and to get infected by the virus it is sufficient just to open the infected document, then all the documents edited by infected copy of Word became infected too. As a result having received an infected file over the Internet and opened it, the unsuspecting user became ââ¬Å"infection peddlerâ⬠, and if his correspondence was made with the help of MS Word, it also became infected! Therefore the possibility of infecting MS Word multiplied by the speed of Internet became one of the most serious problems in all the history of existence of computer viruses. In less than a year, sometime in summer of 1996, there appeared the ââ¬Å"Larouxâ⬠virus, infecting Microsoft Excel spreadsheets. As it had been with ââ¬Å"Conceptâ⬠, these new virus was discovered almost simultaneously in several companies. The same 1996 witnessed the first macro virus construction sets, then in the beginning of 1997 came the first polymorphic macro viruses for MS Word and the first viruses for Microsoft Office97. The number of various macro viruses also increased steadily reaching several hundreds by the summer of 1997. Macro viruses, which have opened a new page in August 1995, using all the experience in virus making accumulated for almost 10 years of continuous work and enhancements, actually do present the biggest problem for modern virology. Chronology of Events It's time to give a more detailed description of events. Let's start from the very beginning. Late 1960s ââ¬â early 1970s Periodically on the mainframes at that period of time there appeared programs called ââ¬Å"the rabbitâ⬠. These programs cloned themselves, occupied system resources, thus lowering the productivity of the system. Most probably ââ¬Å"rabbitsâ⬠did not copy themselves from system to system and were strictly local phenomena ââ¬â mistakes or pranks by system programmers servicing these computers. The first incident which may be well called an epidemic of ââ¬Å"a computer virusâ⬠, happened on the Univax 1108 system. The virus called ââ¬Å"Pervading Animalâ⬠merged itself to the end of executable files ââ¬â virtually did the same thing as thousands of modern viruses do. The first half of 1970s ââ¬Å"The Creeperâ⬠virus created under the Tenex operating system used global computer networks to spread itself. The virus was capable of entering a network by itself by modem and transfer a copy of itself to remote system. ââ¬Å"The Reeperâ⬠anti-virus program was created to fight this virus, it was the first known anti-virus program. Early 1980s Computers become more and more popular. An increasing number of program appears written not by software companies but by private persons, moreover, these programs may be freely distributed and exchanged through general access servers ââ¬â BBS. As a result there appears a huge number of miscellaneous ââ¬Å"Trojan horsesâ⬠, programs, doing some kind of harm to the system when started. 1981 ââ¬Å"Elk Clonerâ⬠bootable virus epidemics started on Apple II computers. The virus attached itself to the boot sector of diskettes to which there were calls. It showed itself in many ways ââ¬â turned over the display, made text displays blink and showed various messages. 1986 The first IBM PC virus ââ¬Å"Brainâ⬠pandemic began. This virus infecting 360 KB diskettes became spread over the world almost momentarily. The secret of a ââ¬Å"successâ⬠like this late probably in total unpreparedness of computer society to such a phenomenon as computer virus. The virus was created in Pakistan by brothers Basit and Amjad Farooq Alvi. They left a text message inside the virus with their name, address and telephone number. According to the authors of the virus they were software vendors, and would like to know the extent of piracy in their country. Unfortunately their experiment left the borders of Pakistan. It is also interesting that the ââ¬Å"Brainâ⬠virus was the first stealth virus, too ââ¬â if there was an attempt to read the infected sector, the virus substituted it with a clean original one. Also in 1986 a programmer named Ralph Burger found out that a program can create copies of itself by adding its code to DOS executables. His first virus called ââ¬Å"VirDemâ⬠was the demonstration of such a capability. This virus was announced in December 1986 at an underground computer forum, which consisted of hackers, specializing at that time on cracking VAX/VMS systems (Chaos Computer Club in Hamburg). 1987 ââ¬Å"Viennaâ⬠virus appears. Ralph Burger, whom we already now, gets a copy of this virus, disassembles it, and publishes the result in his book ââ¬Å"Computer Viruses: a High-tech Diseaseâ⬠. Burger's book made the idea of writing viruses popular, explained how to do it, and therefore stimulated creating up hundreds and in thousands of computer viruses, in which some of the ideas from his book were implemented. Some more IBM PC viruses are being written independently in the same year. They are: ââ¬Å"Lehighâ⬠, infecting the COMMAND. COM file only; ââ¬Å"Suriv-1â⬠a. k. a. ââ¬Å"April1stâ⬠, infecting COM files; ââ¬Å"Suriv-2â⬠, infecting (for the first time ever) EXE files; and ââ¬Å"Suriv-3â⬠, infecting both COM and EXE files. There also appear several boot viruses (ââ¬Å"Yaleâ⬠in USA, ââ¬Å"Stonedâ⬠in New Zealand, ââ¬Å"PingPongâ⬠in Italy), and the first self encrypting file virus ââ¬Å"Cascadeâ⬠. Non-IBM computers are also not forgotten: several viruses for Apple Macintosh, Commodore Amiga and Atari ST have been detected. In December of 1987 there was the first total epidemics of a network virus called ââ¬Å"Christmas Treeâ⬠, written in REXX language and spreading itself under the VM/CMS operating environments. On the ninth of December this virus was introduced into the Bitnet network in one of West German universities, then via gateway it got into the European Academic Research Network (EARN) and then into the IBM Vnet. In four days (Dec. 13) the virus paralyzed the network, which was overflowing with copies of it (see the desk clerk example several pages earlier). On start-up the virus output an image of the Christmas tree and then sent copies of itself to all the network users whose addresses were in the corresponding system files NAMES and NETLOG. 1988 On Friday the 13 1988 several companies and universities in many countries of the world ââ¬Å"got acquaintedâ⬠with the ââ¬Å"Jerusalemâ⬠virus. On that day the virus was destroying files which were attempted to be run. Probably this is one of the first MS-DOS viruses which caused a real pandemic, there were news about infected computers from Europe, America and the Middle East. Incidentally the virus got its name after one of the places it stroke ââ¬â the Jerusalem University. ââ¬Å"Jerusalemâ⬠together with several other viruses (ââ¬Å"Cascadeâ⬠, ââ¬Å"Stonedâ⬠, ââ¬Å"Viennaâ⬠) infected thousands of computers still being unnoticed ââ¬â anti-virus programs were not as common then as they are now, many users and even professionals did not believe in the existence of computer viruses. It is notable that in the same year the legendary computer guru Peter Norton announced that computer viruses did not exist. He declared them to be a myth of the same kind as alligators in New York sewers. Nevertheless this delusion did not prevent Symantec from starting its own anti-virus project Norton Anti-virus after some time. Notoriously false messages about new computer viruses started to appear, causing panic among the computer users. One of the first virus hoaxes of this kind belongs to a Mike RoChenle (pronounced very much like ââ¬Å"Microchannelâ⬠), who uploaded a lot of messages to the BBS systems, describing the supposed virus copying itself from one BBS to another via modem using speed 2400 baud for that. Funny as it may seem many users gave up 2000 baud standard of that time and lowered the speed of their modems to 1200 baud. Similar hoaxes appeared even now. The most famous of them so far are GoodTimes and Aol4Free. November 1988: a total epidemic of a network virus of Morris (a. k. a. Internet Worm). This virus infected more than 6000 computer systems in USA (including NASA research Institute) and practically paralyzed their work. Because of erratic code of the virus it sent unlimited copies of itself to other network computers, like the ââ¬Å"Christmas Treeâ⬠worm virus, and for that reason completely paralyzed all the network resources. Total losses caused by the Morris virus were estimated at 96 millions of dollars. This virus used errors in operating systems Unix for VAX and Sun Microsystems to propagate. Besides the errors in Unix the virus utilized several more original ideas, for example picking up user passwords. A more detailed story of this virus and the corresponding incidents may be found in a rather detailed and interesting articles. December 1988: the season of worm viruses continues this time in DECNet. Worm virus called HI. COM output and image of spruce and informed users that they should ââ¬Å"stop computing and have a good time at home!!! There also appeared new anti-virus programs for example, Doctors Solomon's Anti-virus Toolkit, being one of the most powerful anti-virus software presently. 1989 New viruses ââ¬Å"Datacrimeâ⬠, ââ¬Å"FuManchuâ⬠appear, as do the whole families like ââ¬Å"Vacsinaâ⬠and ââ¬Å"Yankeeâ⬠. The first one acted extremely dangerously ââ¬â from October 13th to December 31st it formatted hard disks. This virus ââ¬Å"broke freeà ¢â¬ and caused total hysteria in the mass media in Holland and Great Britain. September 1989: 1 more anti-virus program begins shipping ââ¬â IBM Anti-virus. October 1989: one more epidemic in DECNet, this time it was worm virus called ââ¬Å"WANK Wormâ⬠. December 1989: an incident with a ââ¬Å"Trojan horseâ⬠called ââ¬Å"AIDSâ⬠. 20,000 copies were shipped on diskettes marked as ââ¬Å"AIDS Information Diskette Version 2. 0â⬠. After 90 boot-ups the ââ¬Å"Trojanâ⬠program encrypted all the filenames on the disk, making them invisible (setting a ââ¬Å"hiddenâ⬠attribute) and left only one file readable ââ¬â bill for $189 payable to the address P. O. Box 7, Panama. The author of this program was apprehended and sent to jail. One should note that in 1989 there began total epidemics of computer viruses in Russia, caused by the same ââ¬Å"Cascadeâ⬠, ââ¬Å"Jerusalemâ⬠and ââ¬Å"Viennaâ⬠, which besieged the computers of Russian users. Luckily Russian programmers pretty quickly discovered the principles of their work, and virtually immediately there appeared several domestic anti-viruses, and AVP (named ââ¬Å"-Vâ⬠) those time, was one of them. My first acquaintance with viruses (this was the ââ¬Å"Cascadeâ⬠virus) replaced in the world 1989 when I found virus on my office computer. This particular fact influenced my decision to change careers and create anti-virus programs. In a month the second incident (ââ¬Å"Vacsinaâ⬠virus) was closed with a help of the first version of my anti-virus ââ¬Å"-Vâ⬠(minus-virus), several years later renamed to AVP ââ¬â AntiViral Toolkit Pro. By the end of 1989 several dozens of viruses herded on Russian lands. They were in order of appearance: two versions of ââ¬Å"Cascadeâ⬠, several ââ¬Å"Vacsinaâ⬠and ââ¬Å"Yankeeâ⬠viruses, ââ¬Å"Jerusalemâ⬠, ââ¬Å"Viennaâ⬠, ââ¬Å"Eddieâ⬠, ââ¬Å"PingPongâ⬠. 1990 This year brought several notable events. The first one was the appearance of the first polymorphic viruses ââ¬Å"Chameleonâ⬠(a. k. a. ââ¬Å"V2P1â⬠, ââ¬Å"V2P2â⬠, and ââ¬Å"V2P6â⬠). Until then the anti-virus programs used ââ¬Å"masksâ⬠ââ¬â fragments of virus code ââ¬â to look for viruses. After ââ¬Å"Chameleonâ⬠ââ¬Ës appearance anti-virus program developers had to look for different methods of virus detection. The second event was the appearance of Bulgarian ââ¬Å"virus production factoryâ⬠: enormous amounts of new viruses were created in Bulgaria. Disease wears the entire families of viruses ââ¬Å"Murphyâ⬠, ââ¬Å"Nomenclaturaâ⬠, ââ¬Å"Beastâ⬠(or ââ¬Å"512â⬠, ââ¬Å"Number-of-Beastâ⬠), the modifications of the ââ¬Å"Eddieâ⬠virus etc. A certain Dark Avenger became extremely active, making several new viruses a year, utilizing fundamentally new algorithms of infecting and covering of the tracks in the system. It was also in Bulgaria that the first BBS opens, dedicated to exchange of virus code and information for virus makers. In July 1990 there was an incident with ââ¬Å"PC Todayâ⬠computer magazine (Great Britain). It contained a floppy disk infected with ââ¬Å"DiskKillerâ⬠virus. More than 50,000 copies were sold. In the second half of 1990 there appeared two Stealth monsters ââ¬â ââ¬Å"Frodoâ⬠and ââ¬Å"Whaleâ⬠. Both viruses utilized extremely complicated stealth algorithms; on top of that the 9KB ââ¬Å"Whaleâ⬠used several levels of encrypting and anti-debugging techniques. 1991 Computer virus population grows continuously, reaching several hundreds now. Anti-viruses also show increasing activity: two software monsters at once (Symantec and Central Point) issue their own anti-virus programs ââ¬â Norton Anti-virus and Central Point Anti-virus. They are followed by less known anti-viruses from Xtree and Fifth Generation. In April a full-scale epidemic broke out, caused by file and boot polymorphic virus called ââ¬Å"Tequilaâ⬠, and in September the same kind of story happened with ââ¬Å"Amoebaâ⬠virus. Summer of 1991: ââ¬Å"Dir_IIâ⬠epidemic. It was a link virus using fundamentally new methods of infecting files. 1992 Non-IBM PC and non-MS-DOS viruses are virtually forgotten: ââ¬Å"holesâ⬠in global access network are closed, errors corrected, and network worm viruses lost the ability to spread themselves. File-, boot- and file-boot viruses for the most widely spread operating system (MS-DOS) on the most popular computer model (IBM PC) are becoming more and more important. The number of viruses increases in geometrical to progression; various virus incidents happen almost every day. Miscellaneous anti-virus programs are being developed, dozens of books and several periodic magazines on anti-viruses are being printed. A few things stand out: Early 1992: the first polymorphic generator MtE, serving as a base for several polymorphic viruses which follow almost immediately. Mte was also the prototype for a few forthcoming polymorphic generators. March 1992: ââ¬Å"Michelangeloâ⬠virus epidemics (a. k. a. ââ¬Å"March6â⬠) and the following hysteria took place. Probably this is the first known case when anti-virus companies made fuss about this virus not to protect users from any kind of danger, but attract attention to their product, that is to create profits. One American anti-virus company actually announced that on the 6th of March the information on over five million computers will be destroyed. As a result of the fuss after that the profits of different anti-virus companies jumped several times; in reality only about 10,000 computers suffered from that virus. July 1992: The first virus construction sets were made, VCL and PS-MPC. They made large flow of new viruses even larger. They also stimulated virus makers to create other, more powerful, construction sets, as it was done by MtE in its area. Late 1992: The first Windows virus appears, infecting this OS's executables, and starts a new page in virus making. 1993 Virus makers are starting to do some serious damage: besides hundreds of mundane viruses which are no different than their counterparts, besides the whole polymorphic generators and construction sets, besides new electronic editions of virus makers there appear more and more viruses, using highly unusual ways of infecting files, introducing themselves into the system etc. The main examples are: ââ¬Å"PMBSâ⬠, wording in Intel 80386 protected mode. Strangeâ⬠(or ââ¬Å"Hmmâ⬠) ââ¬â a ââ¬Å"masterpieceâ⬠of Stealth technology, however fulfilled on the level of hardware interrupts INT 0Dh and INT 76h. ââ¬Å"Shadowgardâ⬠and ââ¬Å"Carbunkleâ⬠, which widened debt range of algorithms of companion viruses. ââ¬Å"Emmieâ⬠, ââ¬Å"Metallicaâ⬠, ââ¬Å"Bomberâ⬠, ââ¬Å"Uruguayâ⬠and ââ¬Å"Cruncherâ⬠ââ¬â the us e of fundamentally new techniques of ââ¬Å"hidingâ⬠of its own code inside the infected files. In spring of 1993 Microsoft made its own anti-virus MSAV, based on CPAV by Central Point. 1994 The problem of CD viruses is getting more important. Having quickly gained popularity CD disks became one of the main means of spreading viruses. There are several simultaneous cases when a virus got to the master disk when preparing the batch CDs. As a result of that a fairly large number (tens of thousands) of infected CDs hit the market. Of course they cannot be cured, they just have to be destroyed. Early in the year in Great Britain there popped out two extremely complicated polymorphic viruses, ââ¬Å"SMEG. Pathogenâ⬠and ââ¬Å"SMEG. Queegâ⬠(even now not all the anti-virus programs are able to give 100% correct detection of these viruses). Their author placed infected files to a BBS, causing real panic and fear of epidemics in mass media. Another wave of panic was created by a message about a supposed virus called ââ¬Å"GoodTimesâ⬠, spreading via the Internet and infecting a computer when receiving E-mail. No such virus really existed, but after some time there appeared a usual DOS virus containing text string ââ¬Å"Good Timesâ⬠. It was called ââ¬Å"GT-Spoofâ⬠. Law enforcement increases its activities: in Summer of 1994 the author of SMEG was ââ¬Å"sorted outâ⬠and arrested. Approximately at the same time also in Great Britain there was arrested an entire group of virus makers, who called themselves ARCV (Association for Really Cruel Viruses). Some time later one more author of viruses was arrested in Norway. There appear some new unusual enough viruses: January 1994: ââ¬Å"Shifterâ⬠ââ¬â the first virus infecting object modules (OBJ files). ââ¬Å"Phantom1â⬠ââ¬â the cause of the first epidemic of polymorphic virus in Moscow. April 1994: ââ¬Å"SrcVirâ⬠ââ¬â the virus family infecting program source code (C and Pascal). June 1994: ââ¬Å"OneHalfâ⬠ââ¬â one of the most popular viruses in Russia so far starts a total epidemics. September 1994: ââ¬Å"3APA3Aâ⬠ââ¬â a boot-file virus epidemic. This virus uses a highly unusual way of incorporating into MS-DOS. No anti-virus was ready to meet such kind of a monster. In 1994 (Spring) one of the anti-virus leaders of that time ââ¬â Central Point ââ¬â ceased to exist, acquired by Symantec, which by that time managed to ââ¬Å"swallowâ⬠several minor companies, working on anti- viruses ââ¬â Peter Norton Computing, Cetus International and Fifth Generation Systems. 1995 Nothing in particular among DOS viruses happens, although there appear several complicated enough monster viruses like ââ¬Å"NightFallâ⬠, ââ¬Å"Nostardamusâ⬠, ââ¬Å"Nutcrackerâ⬠, also some funny viruses like ââ¬Å"bisexualâ⬠virus ââ¬Å"RMNSâ⬠and BAT virus ââ¬Å"Winstartâ⬠. The ââ¬Å"ByWayâ⬠and ââ¬Å"DieHard2â⬠viruses become widespread, with news about infected computers coming from all over the world. February 1995: an incident with Microsoft: Windows95 demos disks are infected by ââ¬Å"Formâ⬠. Copies of these disks were sent to beta testers by Microsoft; one of the testers was not that lazy and tested the disks for viruses. Spring 1995: two anti-virus companies ââ¬â ESaSS (ThunderBYTE anti-virus) and Norman Data Defense (Norman Virus Control) announce their alliance. These companies, each making powerful enough anti- viruses, joined efforts and started working on a joint anti-virus system. August 1995: one of the turning points in the history of viruses and anti-viruses: there has actually appeared the first ââ¬Å"aliveâ⬠virus for Microsoft Word (ââ¬Å"Conceptâ⬠). In some month the virus ââ¬Å"tripped around the worldâ⬠, pesting the computers of the MS Word users and becoming a firm No. 1 in statistic research held by various computer titles. 1996 January 1996: two notable events ââ¬â the appearance of the first Windows95 virus (ââ¬Å"Win95. Bozaâ⬠) and the epidemics of the extremely complicated polymorphic virus ââ¬Å"Zhengxiâ⬠in St. Petersburg (Russia). March 1996: the first Windows 3. virus epidemic. The name of the virus is ââ¬Å"Win. Tentacleâ⬠. This virus infected a computer network a hospital and in several other institutions in France. This event is especially interesting because this was the FIRST Windows virus on a spree. Before that time (as far as I know) all the Windows viruses had been living only in collections a nd electronic magazines of virus makers, only boot viruses, DOS viruses and macro viruses were known to ride free. June 1996: ââ¬Å"OS2. AEPâ⬠ââ¬â the first virus for OS/2, correctly infecting EXE files of this operating system. Earlier under OS/2 there existed only the viruses writing themselves instead of file, destroying it or acting as companions. July 1996: ââ¬Å"Larouxâ⬠ââ¬â the first virus for Microsoft Excel caught live (originally at the same time in two oil making companies in Alaska and in southern African Republic). The idea of ââ¬Å"Larouxâ⬠, like that of Microsoft Word viruses, was based on the presence of so-called macros (or Basic programs) in the files. Such programs can be included into both electronic spreadsheets of Microsoft Excel and Microsoft Word documents. As it turned out the Basic language built into Microsoft Excel also allows to create viruses. December 1996: ââ¬Å"Win95. Punchâ⬠ââ¬â the first ââ¬Å"memory residentâ⬠virus for Windows95. It stays in the Windows memory as a VxD driver, hooks file access and infects Windows EXE files that are opened. In general the year 1996 is the start of widespread virus intervention into the Windows32 operating system (Windows95 and WindowsNT) and into the Microfoft Office applications. During this and the next year several dozens of Windows viruses and several hunsdreds of macro viruses appeared. Many of them used new technologies and methods of infection, including stealth and polymorphic abilities. That was the next round of virus evolution. During two years they repeated the way of improving similar to DOS viruses. Step by step they started to use the same features that DOS viruses did 10 years beforehand, but on next technological level. 1997 February 1997: ââ¬Å"Linux. Blissâ⬠ââ¬â the first virus for Linux (a Unix clone). This way viruses occupied one more ââ¬Å"biologicalâ⬠niche. February-April 1997: macro viruses migrated to Office97. The first of them turned out to be only ââ¬Å"convertedâ⬠to the format macro viruses for Microsoft Word 6/7, but also virtually immediately there appeared viruses aimed at Office97 documents exclusively. March 1997: ââ¬Å"ShareFunâ⬠ââ¬â macro-virus hitting Microsoft Word 6/7. It uses is not only standard features of Microsoft Word to propagate but also sends copies of itself via MS-Mail. April 1997: ââ¬Å"Homerâ⬠ââ¬â the first network worm virus, using File Transfer Protocol (FTP) for propagation. June 1997: There appears the first self encrypting virus for Windows95. This virus of Russian origin has been sent to several BBS is in Moscow which caused an epidemic. November 1997: The ââ¬Å"Esperantoâ⬠virus. This is the first virus that intends to infect not only DOS and Windows32 executable files, but also spreads into the Mac OS (Macintosh). Fortunately, the virus is not able to spread cross the platforms because of bugs. December 1997: new virus type, the so-called ââ¬Å"mIRC Wormsâ⬠, came into being. The most popular Windows Internet Relay Chat (IRC) utility known as mIRC proved to be ââ¬Å"holeâ⬠allowing virus scripts to transmit themselves along the IRC-channels. The next IRC version blocked the hole and the mIRC Worms vanished. The KAMI ltd. nti-virus department has braked away from the mother company constituting the independent one what, certainly, is considered the main event of 1997. Currently the company known as Kaspersky Labs and proved to be a recognized leader of the anti-virus industry. Since 1994 the AntiViral Toolkit Pro (AVP) anti-virus scanner, main product of the company, constantly shows high results wh ile being tested by various test laboratories of all world. Creation of an independent company gave the chance to the at first small group of developers to gain the lead on the domestic market and prominence on the world one. For short run versions for practically all popular platforms were developed and released, the new anti-virus solutions offered, the international distribution and the product support networks created. October 1997: the agreement on licensing of AVP technologies use in F-Secure Anti-Virus (FSAV) was signed. The F-Secure Anti-Virus (FSAV) package was the DataFellows (Finland) new anti-virus product. Before DataFellows was known as the F-PROT anti-virus package manufacturer. 1997 was also the year of several scandals between the anti-virus main manufacturers in US and Europe. At the year beginning McAfee has announced that its experts have detected a ââ¬Å"featureâ⬠in the antivirus programs of Dr. Solomon, one of its main competitors. The McAfee testimony stated that if the Dr. Solomon's antivirus while scanning detects several virus-types the program switches to the advanced scanning mode. What means that while scanning some uninfected computer the Dr. Solomon's anti-virus operates in the usual mode and switches to the advanced mode ââ¬â ââ¬Å"cheat modeâ⬠according to McAfee ââ¬â enabling the application to detect the invisible for the usual mode viruses while testing virus collections. Consequently the Dr. Solomon's anti-virus shows both good speed while scanning uninfected disks and good virus detection ability while scanning virus collections. A bit later Dr. Solomon stroked back accusing McAfee of the incorrect advertising campaign. The claims were raised to the text ââ¬â ââ¬Å"The Number One Choice Worldwide. No Wonder The Doctor's Left Townâ⬠. At the same time McAfee was in the court together with Trend Micro, another antivirus software manufacturer, concerning the Internet and e-mail data scanning technology patent violation. Symantec also turned out to be involved in the cause and accused McAfee of using the Symantec codes in the McAfee products. And etc. The year completion by one more noteworthy event related to McAfee-name was marked ââ¬â McAfee Associates and Network General have declared consolidation into the new born Network Associates company and positioning of their services not only on the anti-virus protection software market, but also on the markets of computer safety universal systems, encryption and network administration. From this the virus and anti-virus history point McAfee would correspond to NAI. 998 The virus attack on MS Windows, MS Office and the network applications does not weaken. There arose new viruses employing still more complex strokes while infecting computers and advanced methods of network-to-computer penetration. Besides numerous the so-called Trojans, stealing Internet access passwords, and several kinds of the latent administration utilities came into the computer world. Several incidents with the infected CDs were revealed ââ¬â Some computer media publishers distributed CIH and Marburg (the Windows viruses) through CDs attached to the covers of their issues, with infected. The year beginning: Epidemic of the ââ¬Å"Win32. HLLP. DeTroieâ⬠virus family, not just infecting Windows32 executed files but also capable to transmit to the ââ¬Å"ownerâ⬠the information on the computer that was infected, shocked the computer world. As the viruses used specific libraries attached only to the French version of Windows, the epidemic has affected just the French speaking countries. February 1998: One more virus type infecting the Excel tables ââ¬Å"Excel4. Paixâ⬠(aka ââ¬Å"Formula. Paix) was detected. This type of a macro virus while rooting into the Excel tables does not employ the usual for the kind of viruses macro area but formulas that proved to be capable of the self-reproduction code accommodation. February ââ¬â March 1998: ââ¬Å"Win95. HPSâ⬠and ââ¬Å"Win95. Marburgâ⬠ââ¬â the first polymorphous Windows32-viruses were detected and furthermore they were ââ¬Å"in-the-wildâ⬠. The anti-virus programs developers had nothing to do but rush to adjust the polymorphous viruses detecting technique, designed so far just for DOS-viruses, to the new conditions. March 1998: ââ¬Å"AccessiVâ⬠ââ¬â the first Microsoft Access virus was born. There was no any boom about that (as it was with ââ¬Å"Word. Conceptâ⬠and ââ¬Å"Excel. Larouxâ⬠viruses) as the computer society already got used to that the MS Office applications go down thick and fast. March 1998: The ââ¬Å"Crossâ⬠macro-virus, the first virus infecting two different MS Office applications ââ¬â Access and Word, is detected. Hereupon several more viruses transferring their codes from one MS Office application to the other have emerged. May 1998 ââ¬â The ââ¬Å"RedTeamâ⬠virus infects Windows EXE-files and dispatches the infected files through Eudora e-mail. June 1998 ââ¬â The ââ¬Å"Win95. CIHâ⬠virus epidemic at the beginning was mass, then became global and then turned to a kind of computer holocaust ââ¬â quantity of messages on computer networks and home personal computers infection came to the value of hundreds if not thousands pierces. The epidemic beginning was registered in Taiwan where some unknown hacker mailed the infected files to local Internet conferences. Therefrom virus has made the way to USA where through the staff oversight infected at once several popular Web servers that started to distribute infected game programs. Most likely these infected files on game servers brought about this computer holocaust that dominated the computer world all the year. According to the ââ¬Å"popularityâ⬠ratings the virus pushed ââ¬Å"Word. CAPâ⬠and ââ¬Å"Excel. Larouxâ⬠to second cabin. One should also pay attention to the virus dangerous manifestation ââ¬â depending on the current date the virus erased Flash BIOS what in some conditions could kill motherboard. August 1998: Nascence of the sensational ââ¬Å"BackOrificeâ⬠(ââ¬Å"Backdoor. BOâ⬠) ââ¬â utility of latent (hacker's) management of remote computers and networks. After ââ¬Å"BackOrificeâ⬠some other similar programs ââ¬â ââ¬Å"NetBusâ⬠, ââ¬Å"Phaseâ⬠and other ââ¬â came into being. Also in August the first virus infecting the Java executed files ââ¬â ââ¬Å"Java. StangeBrewâ⬠ââ¬â was born. The virus was not any danger to the Internet users as there was no way to employ critical for the virus replication functions on any remote computer. However it revealed that even the Web servers browsers could be attacked by viruses. November 1998: ââ¬Å"VBScript. Rabbitâ⬠ââ¬â The Internet expansion of computer parasites proceeded by three viruses infecting VisualBasic scripts (VBS files), which being actively used in Web pages development. As the logical consequence of VBScript-viruses the full value HTML-virus (ââ¬Å"HTML. Internalâ⬠) was born to life. Virus-writers obviously turned their efforts to the network applications and to the creation of full value Network Worm-Virus that could employ the MS Windows and Office options, infect remote computers and Web-servers or/and could aggressively replicate itself through e-mail. The anti-virus manufacturers world was also considerably rearranged. In May 1998 Symantec and IBM announced the union of their forces on the anti-virus market. The collective product would be under the Norton Anti-Virus trade mark distributed and the IBM Anti-Virus (IBMAV) program is liquidated. Response of the main competitors, Dr. Solomon and NAI (former McAfee), followed immediately. They issued the press-releases offering the IBM product users to promotionally replace the dead anti-virus with their own products. Less then one month later Dr. Solomon ââ¬Å"committed suicideâ⬠. The
Wednesday, January 8, 2020
Essay on Why Religion Is Important - 1017 Words
You cannot believe in God until you believe in yourself. -- Swami Vivekananda I would rather live my life as if there is a God and die to find out there isnt, than live as if there isnt and to die to find out that there is. -- Albert Camus In this essay, I will explore the religious experience in general and some of its variations around the world. The focus will be on the types of religious beliefs and religious leaders, especially in small-scale societies. An exploration of Christianity, Judaism, Islam, or any other major religion is beyond the scope of this essay. The approach taken is that of cultural relativity--religious practices or beliefs are not evaluated in terms of their correctness or sophistication but,â⬠¦show more contentâ⬠¦At the heart of this experience is a sequence of traditional ritual acts that symbolically represent aspects of the life, teachings, and death of Jesus. Most religious rituals are performed in special places and under special conditions, such as in a dedicated temple or at a sacred spot. This is an intentional separation between the secular and the sacred. By being removed from the ordinary world, the sacred acts are enhanced for the believers. The separation makes the rituals more effective. Only allowing initiated people to participate in religious rituals also can have the same effect. Religious ritual reinforces the basic tenets of religion. For instance, the partaking of the host in the Catholic mass is a symbolic participation in the last supper of Jesus and, by extension, an affirmation of the acceptance of his teachings. Rituals are often charged with high emotions. The exalted feelings people experience during rituals provide positive reinforcement for continuing them. When rituals make people feel good, they reinforce the belief that their religion is the correct one. Non-Religious Rituals Not all rituals are religious. Brushing your teeth every morning in the same place and in the same way is a non-religious ritual. Like religious rituals, it also can make you feel good, which reinforces your continuance of the practice. However, it rarely involves a belief in supernatural beings orShow MoreRelated Why Is Religion Important?995 Words à |à 4 PagesThis is my simple religion. There is no need for temples; no need for complicated philosophy. Our own brain, our own heart is our temple; the philosophy is kindness. -- Dalai Lama In a world where religions plays such a major role in peopleââ¬â¢s lives, it is not surprising why it is such a major focus in the way choices and decisions are made. There are many religions throughout the world. Some are faiths with a very concentrated following in specific geographic areas, while others span the entireRead MoreEssay on Why Is Religion Important?1417 Words à |à 6 PagesIn this essay we will discuss the importance of religion in society. We will attempt to explain why societies have religions and what functions their belief system has for them. We will also ask if these functions are now out-dated and if religions have any meaningful function in todays world or are they just stained glass windows into a bygone era? Religion can be defined by two main groupings. The inclusive definition covers all topics and subjects of a persons life including, not only, theirRead MoreEssay on Why Is Religion Important?579 Words à |à 3 Pagesopened for you. --Jesus Christ Whether you consider yourself a religious person or not, or whether you think religion has played a positive or negative role in history, it is an incontrovertible fact that from the beginning of time, humans have engaged in activities that we now call religion, such as worship, prayer, and rituals marking important life passages. Moreover, religions have always asked fundamental questions, such as: What is the true meaning of life? What happens to us after deathRead MoreWhy Is Personal Meaning So Important For Individuals? How Can Religion Help One Find A Sense Of Meaning850 Words à |à 4 Pages1. Why is personal meaning so important to individuals? How can Religion help one find a sense of meaning? Personal meaning is very important because it gives the individual the choice to explore what gives meaning to them. What gives meaning and fulfillment to one individual not necessarily does the same for a different individual. For instance, many find the meaning of life through their religion while atheist find fulfillment in other things different than religion. For many, religion continuesRead MoreWhy Is Personal Meaning So Important For Individuals? How Can Religion Help One Find A Sense Of Meaning853 Words à |à 4 Pages1 Why is personal meaning so important to individuals? How can Religion help one find a sense of meaning? Personal meaning is so important to individuals because it is what makes them unique as a person. Everyone has their own meaning when it comes to religion, personal life and personal success and achievements. People find their own meaning is different aspects throughout their lifetime. For many people, religion continues to well serve as a provider of meaning. There are four criteria in whichRead MoreDifferentiating Between Faith and Religion Essay1201 Words à |à 5 Pagesand why is it important? People believe faith is worth more to people then religion. The person may have the benefits of loving god and excepting him into that persons life without all the so called ââ¬Å"workâ⬠. Many people believe that in order to accept God into the life of that person will need to have religion. But is that all wrong? People would rather use faith because they do not want to be apart of a religion. The mentality that people have is that all religions are the same this is why faithRead MoreReligion, Religion And Religion1418 Words à |à 6 Pages When discussing religion, many people have different perspectives about religion beliefs and how to approach it. Religion is grouped in different sections such as, religion and spirituality, religion and philosophy, and religion and politics. Religion has many different views from different cultures because everyone approaches it differently with different beliefs also. To make something religion, is to have some type of belief in God, but everyoneââ¬â¢s belief is different depending on the cultureRead MoreReligious Accommodation For Public Schools Essay955 Words à |à 4 PagesReligion Debate Papers ââ¬Å"Freedom of religion includes both the right to manifest beliefs and practices and the right to be free from state coercion or constraint in matters of religion ().â⬠One of the most controversial places in which freedom of religion manifests itself is the public school. In order to protect freedom of religion, it is important to make sense of how a school must treat religion so the school does not compromise its role within society. This paper will establish current rulingsRead MoreReligion Toolkit Response By John Morreall And Tamara Sonn1616 Words à |à 7 PagesReligion Toolkit Response p. 1-14 The introduction to The Religion Toolkit: A Complete Guide to Religious Studies by John Morreall and Tamara Sonn establishes the basic purposes behind studying religion. It tries to show its readers that religion may be a much broader and undefined topic than they might be expecting. The Religion Toolkit discusses how the academic study of religion differs from the normative study of religion, how religion is not clearly described, and how Religious Studies comparesRead MoreA Study Of Ethics And Morality Essay1474 Words à |à 6 Pagesthis paper is to examine and clarify why, as humans, we should be concerned with the sexual morality of ourselves and others. While other major themes covered prior may not relate to all humans directly (such as abortion or the debate of taking a life), moral issues in sexuality are experienced by every member of humanity. In certain societies, the sexual behavior of a person is intensely dependent on the policies and rules of their religion. Even tho ugh religion serves as the mighty tradition holder
Tuesday, December 31, 2019
Obama Speaks At The Dnc American Family And The Need Of...
Obama speaks at the DNC: American Family and the Need of Clinton It is that time of the year again where American politicians stand under the spotlight and appeal to the worldââ¬â¢s attention. The Democrats gathered in Philadelphia together this night to support their party. Presidential candidate Hilary Clinton and her better half. Those who are on the Capitol Hill and surely, our standing President and the First Lady, Barack and Michelle Obama. It is of no surprise that the President speaks for his party during election season; Obama is well-known for his unpretentious and engaging speech. It is one of his last speeches before the end of his tenure and, by dissecting his speech, we learn how he managed to entertain the Democrats for almost fifty minutes. With the ultimate goal of bringing the Clintons to the limelight. Obama appears in the sea of clamors and cheers on the stage. Pay Specific attention to a manââ¬â¢s tie, as it conveys essential nonverbal communication message (Dorrance 4). He has a necktie of a shade of blue that is slightly lighter than his wifeââ¬â¢s dress. It is extremely hard to convince the public to vote for a candidate who had been covered with tabloid news, national safety concern and debates with ââ¬Å"test qualities that have virtually nothing to do with governingâ⬠(Drew 1). According to the BBC, blue, is an all-purpose hue and seen as an international power color. It is also, according to the National Post, the second-safest color for politicians. NotShow MoreRelatedGeorge Washington And The President Of The United States2323 Words à |à 10 PagesSince the start of the United States, there have been politics. Starting with those in charge of the new colonies, leaders of battles for land all the way to the leaders of the revolution, politics have played a r ole in American life. Once the revolution occurred and it was determined that George Washington would be the nationââ¬â¢s first president, a new track for politics was formed. It was from this line of presidents and official democratic government that political parties, ways of voting, and the
Monday, December 23, 2019
Tuberculosis As A Infectious Disease - 1339 Words
Tuberculosis (TB) is a highly infectious disease that can harm any organ of the body, especially the lungs. Every year about over a million people die due to tuberculosis and even more are infected. A person in contact with an infected individual can easily put themselves at risks of getting TB. Due to the emergence of human immunodeficiency virus (HIV), tuberculosis infections commenced to increment more rapidly. A person with HIV has an impotent immune system which is not able to fight infections such as tuberculosis. There are many ways to diagnose, prevent and treat the further spread of this disease. There are many ways to identify and diagnose the presence and severity of tuberculosis. One of the most prevalent ways to test for TB isâ⬠¦show more contentâ⬠¦Sputum tests may be required for testing if the chest x-ray reveals signs of TB. Tuberculosis can spread by contagious airborne droplets that are passed on easily through close contact with a person who has active or untreated TB. As a person coughs, sneezes, or interacts, it can relinquish infectious droplets into the air. Once a person inhales the infectious droplet (bacillus), it settles in the upper airways. ââ¬Å"Bacteria in droplets that bypass the mucociliary system and reach the alveoli are expeditiously circumvented and engulfed by alveolar macrophages, the most abundant immune effector cells present in alveolar spacesâ⬠(Knechel, 2009). These macrophages are a component of the immune system that fights to destroy the mycobacteria to obviate infection. ââ¬Å"The outcome is essentially determined by the quality of the host bulwarks and the balance that occurs between host bulwarks and the invading mycobacteriaâ⬠(Knechel, 2009). If the alveolar macrophage fails to overcome the inhaled mycobacteria, the bacteria will replicate until the macroph age lysis. As the monocytes are magnetized to the infection site, it then separates into macrophages and consumes the free bacilli. The mycobacteria then multiply within the macrophages causing it to become infected. The infected macrophages may then be transported to the lymph nodes where it can easily reach the blood stream. After two to three weeks of infection, the helper T cells are
Sunday, December 15, 2019
The Holocaust â⬠Why was this happening to me Free Essays
I could hardly breathe or move in the cramped animal wagon. The stench of filth and disease surrounded me and I longed for fresh air. My name is David Cohen and I cannot believe how my life was torn apart in such a short space of time, nor do I understand why it happened even after all these years later. We will write a custom essay sample on The Holocaust ââ¬â Why was this happening to me? or any similar topic only for you Order Now I will never forget that warm April afternoon when I rushed home from helping in my Fatherââ¬â¢s jewelerââ¬â¢s store. I was surprised that the front door was open, but nevertheless ran in shouting for my Mother. I heard thuds and screeching as if the heavy furniture from upstairs was being moved. Whatââ¬â¢s the matter, Mother? â⬠I yelled. Two burly soldiers dragged her out of the living room. ââ¬Å"GO! â⬠she screamed, through heavy sobbing. I just stood there, in the doorway, speechless with shock. I hesitated, but I turned and started to run in the direction of the door, but a third lofty soldier appeared as if from nowhere dived after me and just lifted me up as if I weighed nothing. We were rigorously marched down to the depressingly grey train station, which was in total and utter chaos. There was a massively indistinct mixture of hundreds of people sobbing, crying and arguing. ââ¬Å"Where are we going? ââ¬Å"Whatââ¬â¢s happening? â⬠ââ¬Å"Iââ¬â¢ve lost my Mummy! â⬠a child snivelled. ââ¬Å"Where is she? â⬠but nobody answered. The thickset soldiers shoved us brutally into a waiting cattle truck. There must have been fifty or more people already in this ââ¬Ëcarriageââ¬â¢. Daniel Leigh 11Saul Holocaust Coursework On the way to this man-made hell, I could smell the fear from all the people around me. In addition, there was the stench of remains of old bodies which had most likely died on the most treacherous journey from one place to another (I didnââ¬â¢t want to think about it then, but I figured that out after the war). As well as this, there was the reek of infection as the train was juddering past the sunny countryside. When we got out of the ââ¬Ëtrainââ¬â¢, my eyes throbbed as I had to strain, a product of the very little amount of light in the ââ¬Ëcarriageââ¬â¢. It seemed to be a pleasant day. We were shoved into several ââ¬Ësorting fieldsââ¬â¢ where the men were separated from the women, the thin from the broad, and the weak from the strong. Also, there was a sorting field where people were made to say if they had an occupation. I said that I was a jeweler (I only had the experience from my Fatherââ¬â¢s shop, but I did not tell them). After the painful separation, the SS men ordered the teen-aged to the middle-aged and strong men and women into what they called ââ¬Ëdrillââ¬â¢ and instructed us into ââ¬Ërankââ¬â¢. Everybody was then divided into groups of two or three and told to proceed to a wooden hut. We were marched there. It must have been over a mile long. In the wooden hut there were the same machines that my Father used in his shop. I was deployed with a boy named Eric Drench, who was my age, which was then fifteen. The first night I was there was a terrible howling wind. I did not sleep at all, as I sensed that the future is not a particularly bright one. I asked Eric where he was from and where his family came about. He started to tell me his story: ââ¬Å"Well my family lived in Poland, but the Nazi SS men came to take us away. My mother hid my brother, sister and me into our wine cellar and locked us up for a few days and told us not to worry. On the third day that we were in there, we heard thuds and screeching as if the heavy furniture from upstairs was being moved we stay put but Daniel Leigh 11Saul Holocaust Coursework we had the impulse to shout out: ââ¬Å"Whatââ¬â¢s the matter, mother? â⬠but we couldnââ¬â¢t. My eighteen year old rother David tried to open the hatch for the door of the wine cellar but it wouldnââ¬â¢t come open so somebody must have been standing on it. David tried again after about half an hour. He managed to open it. I said to be careful and open it slowly. He opened it very slowly and cautiously and he saw our parents being taken away as if they had committed a crime. David fell backwards in shock, he fainted. As my sister tried to comfort him, I looked outside the hatch, and to my utter astonishment, three burly soldiers were dragging my mother and shoving my father out of the door. I then had the most uncontrollable rge just to try and rescue my parents but I knew in my heart I couldnââ¬â¢t. Then, we waited and waited for the houses and the street to go quiet. After a while, we came out of the wine-cellar and I donââ¬â¢t know how I knew but I had knew that I would never see my parents again. We managed to collect as much food and water as possible and we went. We traveled the country for a couple of months, but inevitably we knew that we could not go on living like this so we found refuge in a church. They knew that we were Jews, but they didnââ¬â¢t hesitate to help. They employed, fed and clothed us for about a onth and then sent us on our way. This way, we had money, food, water and we did not look so Jewish- which I thought was a bad thing to give in to, but we had no choice. Eventually, in the freezing winter of last year, 1940, my sister Eva had died due to pneumonia, but my brother and I were still alive. We had stopped at an empty farm- only to discover that when we rested we found it incredibly hard to go on. Having sat down to rest, I suddenly realized how hungry we were. We carried on after a couple hours or so and then we were captured by four lofty Nazi soldiers and were sent here. By the Eric time had finished telling me about his experience, it was morning. I felt it first. I felt the cold air float over me, around me, and through me, like a spirit filling the room with nothing but the knowledge of its presence. We were dragged out of the cabin and were expected to sprint to another field. Daniel Leigh 11Saul Holocaust Coursework At the time when we had to queue to receive our lunch, it was completely out of control. When Eric finally got to the front of the ââ¬Ëlineââ¬â¢ there were two soldiers, one holding a whip. Eric said ââ¬Å"Please may I have food, Sir? ââ¬Å". They did not give him any food. The soldier holding the whip shouted for everyone to go back, but no-one did. He repeated it again, but this time he said: ââ¬Å"GO BACK OR ELSE THE BOY ACQUIRES 30 LASHES!!! â⬠Still, everyone kept pushing forward. As a result of this, the SS men canceled lunch and Eric got the 30 lashes. After this, he found it hard to breathe, let alone move or even work These sort of events continued for two more terrible years. After this period of time, Eric and I had formed a secret legion of the Jews which had survived through the loss of their families, the loss of some of the Jews which had tried to escape, but either died on the way (mines) or they were shot by the SS men. In this legion, we could practice our Jewish laws including praying and lighting the holy Shabbat candles (if we could scavenge them). One Friday night, we could not get hold of any candles so we prayed and sang through the night. The next day, Eric, whom I had become very friendly with gathered a few men together and we discussed our immediate future, and how that if we do not receive any help from people who have knowledge about the SS men, how they operate and what were their weaknesses. The next day, Shabbat, there was a battalion of Russian soldiers brought in to the concentration camp for ââ¬Ëwar crimesââ¬â¢, some of them were Jewish others were not but supported the Jewish way of life. One week after they arrived, the squadron leader approached our small but cosy gathering and started to mix with us. We hesitated at first but we adapted. After a while, they trained us as soldiers and we eventually escaped from the ultimate hell (for us) and Eric and myself lived on to fight in the American army and to the end of the war. Of the events of which I witnessed and live through, a nightmare invaded reality. How to cite The Holocaust ââ¬â Why was this happening to me?, Papers
Saturday, December 7, 2019
Cost Economics and Supply Chain Management â⬠MyAssignmenthelp.com
Question: Discuss about the Cost Economics and Supply Chain Management. Answer: Introduction Outsourcing is a very common activity in businesses. It is an agreement between companies where a company contracts out one or more of its activities to another company. Outsourcing may involve domestic contracting or foreign contracting. In domestic contracting, a company contracts its activities to another company in the same country while foreign contracting involves contracting of activities between companies in different countries (Tomiura, 2009, pp. 219-226). Some of the companies which have engaged in outsourcing in a great way are the IT companies and different manufacturing companies (Goo, Kishore, and Nam, 2009, pp.119-145). We have many other businesses and companies which have engaged in outsourcing in the modern world to enjoy the many advantages of outsourcing. This research will cover outsourcing in details and give some its major advantages, and some disadvantages of outsourcing in businesses. The main objective of our research is to research on the main advantages of outsourcing in businesses. In our research, we shall also consider some of the disadvantages which businesses have experienced from engaging in outsourcing activities. Comparison of the advantages and the disadvantages of outsourcing will help us to conclude if businesses should engage in outsourcing or not. This project will cover the advantages of outsourcing in businesses in details. It will help us to understand some of the major benefits which have resulted from outsourcing in businesses. It will also highlight some of the challenges and disadvantages facing the businesses which engage in outsourcing. The research will also compare the advantages and disadvantages of outsourcing in businesses, and this will help us to make a conclusive statement about outsourcing in businesses. In the modern world, most businesses have adopted the use of outsourcing to enjoy the numerous benefits associated with outsourcing. As we discussed earlier, outsourcing involves contracting of activities between companies or businesses in the same country or between companies in different countries (Ellram, Tate, and Billington, 2008, pp.148-163). Outsourcing has very many benefits to the companies involved, and these benefits have attracted many companies to the outsourcing activities. Some of the major advantages which result from outsourcing include the following: Outsourcing helps to increase the profits of the businesses. One of the major reasons why most businesses outsource their activities is to increase their profits. Outsourcing helps to improve the profits of the businesses in various ways, for instance, outsourcing helps to improve the quality of the services offered by the businesses, and this helps to attract more customers to the business, and this increases the profits of the business (Varadarajan, 2009, pp. 1165-1172). Reducing the overall cost of production. Outsourcing helps to reduce the overall cost of production in companies. The companies always outsource the activities or services from the companies which have specialized in providing the outsourced activities or services, and therefore, charge amount which is less compared to the amount which could have been used by the parent companies to do those activities on their own. This will help the companies to reduce the overall cost of production (Gorg, Hanley, and Strobl, 2008, pp.670-688). High-quality of the outsourced services. The companies will outsource the activities or services from some other companies which have specialized in delivering the outsourced services (Willcocks and Leslie, 2008). Therefore, they offer high-quality services which could have not been met easily by the outsourcing company. Outsourcing helps the businesses to concentrate on their core activities. In most cases, the businesses outsource some secondary activities which are not in line with their primary or core activities. This will give the businesses an ample time to concentrate on their core activities rather than the secondary activities. Outsourcing helps in sharing of risks between the two contracting companies. In outsourcing, when some risks appear the two contracting companies are responsible for the risks and share the risks accordingly. It is also good to note that companies outsource their activities from experts who have handled such activities before, and therefore, they have better ways to mitigate some risks which can appear in those activities (Tsai, Lai, and Lloyd, 2012, pp.178-189). Outsourcing helps in improving the customers satisfaction. The outsourced activities or services are done by highl-skilled experts who provide high-quality services to the parent company. The customers of the parent company will benefit from the high-quality outsourced activities or services, and this will help to improve the satisfaction of the customers. Outsourcing also helps to improve the competitiveness of businesses. The businesses which outsource their activities or services get high-quality services which improve the satisfaction of their customers (Hill, 2008). This will improve the popularity of the business as compared to the competitors and will automatically earn more customers to the business. This will help the business to become more successful as compared to those who dont outsource activities. Outsourcing has many other benefits to the companies involved. However, it also comes with some challenges and disadvantages to the companies. It is good for the companies to try and address the challenges which can be avoided (Lacity, Willcocks, and Rottman, 2008, pp.13-34). Some of the major disadvantages of outsourcing include: The risks associated with sharing of some confidential information between the contracting companies. The transacting companies share much of their information which may include some confidential information which increases the vulnerability of the companies to security attacks. Another disadvantage associated with outsourcing is some hidden charges which may incurred by the outsourcing company. When the companies are contracting, they sign various documents concerning payment of the contract, but later some other hidden charges such as legal procedures charges or expenses on online documents verification may emerge which makes the parent company incur some unexpected extra charges(Williamson, 2008). We may also have some administrative limitations especially when outsourcing involves companies in different countries. We have some countries which have very strict rules about businesses, and this makes the outsourcing process to be very difficult. As we have discussed, outsourcing has very many advantages which outweigh the disadvantages, therefore all the businesses should adopt outsourcing in their operations. Problems and challenges faced by businesses which engage in outsourcing. They also seek to make a conclusive statement of whether businesses should engage in outsourcing or not. Qualitative research is a research design which involves collection and analysis of non-numerical data (Liamputtong, 2013). In this research design, the data is normally collected in some forms like texts, photos, videos, sound recordings or many other non-numerical forms. The main steps followed in qualitative research are: Decide on the research topic and formulate the research questions and objectives. This is usually the first step in qualitative research. In our case, our main topic of research is advantages and disadvantages of outsourcing in businesses. Conducting a literature review. This is where the researcher caries an extensive analysis on the available systems. The knowledge of the available systems is very vital in any research as it will always be used as references. We have already carried the literature review of our research in the section of literature review. Sampling and sample size. This step involves choosing the best sampling technique and sample size of the research. In our research, well take a sample size of a hundred different businesses selected randomly which engage in outsourcing to do our research. The data collection method. This is the step which involves the collection of data needed for the research to be completed. We have various methods which can be used in collecting the required data. In our research, we shall use questionnaire method to collect the data of advantages and disadvantages of outsourcing in the selected businesses. To increase the chances of getting more reliable and more valid data, we should make sure we prepare good questionnaires which will be favorable to the respondents. (A questionnaire form which can be used in data collection is shown on the appendix section) Variable specifications and data analysis. After collecting the data, we should specify all the variables accordingly before we start analyzing the data. After variable specifications, we should carry out an extensive data analysis which will help us to get the solution to our research questions. After doing the data analysis, we can now draw the conclusions of our research. Preparation of the final research project. This is the last step in qualitative research and involves preparing a detailed report which summarizes all the findings of the research (Bowen, 2009, pp.27-40). In quantitative research, data is collected and analyzed in numerical form. The analysis of simple data is normally done manually, but in cases where the data is very complex, some mathematical devices or software such as Excel or SPSS are employed in the data analysis process (Muijs, 2011). The main steps used in quantitative research are: Definition of the main problem or topic of research. Like in qualitative research, the first step used in quantitative research involves defining the main topic of research and stating all the research questions and objectives. Doing a literature review. This involves analyzing the available systems which is very necessary in any research. Sampling and sample size. This step is undertaken to determine the best sampling technique and the best sample size which will help us to get the best results out of our research. Preparation of the research instruments. The research instruments are some tools which are used in research. Such tools include the questionnaire forms used in data collection and the computers used in data analysis (Hardre, Crowson, and Xie, 2010). Data collection. After preparing the research instruments, the researchers go to the field to collect the required data. The researchers should use all the posssible means to make sure they get valid and reliable data. Data analysis. After collecting the required data, we should specify all the variables accordingly and do a detailed analysis of the collected data. The analysis will help us to answer our research questions and make the conclusion. Preparation of the final report. Like in qualitative analysis, the final step of quantitative analysis is preparing a detailed report which summarizes the whole research process. Our research has some limitations. Some of the major limitations facing our research include: The accuracy or correctness of the data collected. Sometimes, some respondents may give wrong data either knowingly or unknowingly. This leads to the analysis of the wrong data which leads to wrong results. Unwillingness of some respondents to give information. Some respondents just take the questionnaire forms but refuse to fill the forms, and this will automatically affect our research negatively. The cost of research is also a limitation to our research. For us to obtain very accurate results, we should carry our research in very many businesses, but this is limited by the capital available for the research. The results obtained from the research are not 100% accurate but are just a good approximation of the real-life situations based on the sample size used (Neuman, 2014). Time Schedule (Research plan) Research Activity Proposed Start Date Proposed Duration (weeks) Proposed End Date Deciding on the topic of research 18TH September 2017 1 24TH September 2017 Doing a literature review 25TH September 2017 1 1ST October 2017 Preparation of the initial business research proposal 2ND October 2017 2 16TH October 2017 Preparation of the research instruments 17TH October 2017 1 23RD October 2017 Collection and analysis of the data 24TH October 2017 3 15TH November 2017 Preparation of the final business report 16TH November 2017 2 30TH November 2018 Conclusion In our research, we have discussed outsourcing in details. We have seen the numerous advantages associated with outsourcing in businesses. Outsourcing also comes with some problems and challenges, and its the responsibilities of the businesses to addresses these challenges for them to enjoy the numerous benefits of outsourcing maximumly. As we have seen in our research, the advantages of outsourcing overweigh the disadvantages, and therefore, many businesses should embrace outsourcing for them to enjoy the many benefits. References Bowen, G. A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. Hill, C. (2008). International Business: Competing in the Global Market Place. Strategic Direction, 24(9). Holger Gorg, A. H. (2008, March 31). Productivity effects of international outsourcing: evidence from plant-level data. Canadian Journal of Economics, 2, 670688. Jahyun Goo, R. K. (2009). The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study. MIS Quarterly, 33(1), 119-145. Liamputtong, P. (2013). Qualitative Research Methods . South Melbourne: Oxford University Press. Lisa M. Ellram, W. L. (2008). Offshore outsourcing of professional services: A transaction cost economics perspective. Journal of Operations Management, 26(2), 148-163. Mary C. Lacity, L. P. (2008). Global outsourcing of back office services: lessons, trends, and enduring challenges. Strategic Outsourcing: An International Journal, 1(1), 13-34. Ming-Chih Tsai, K.-h. L. (2012, January). The dark side of logistics outsourcing Unraveling the potential risks leading to failed relationships. Transportation Research Part E: Logistics and Transportation Review, 48(1), 178-189. Muijs, D. (2011). Doing Quantitative Research in Education with SPSS (2nd ed.). London, UK: Sage Publications. Neuman, L. (2014). Basics of Social Research. New York: Pearson. Patricia Hardre, M. C. (2010). Differential Effects of Web-Based and Paper-Based Administration of Questionnaire Research Instruments in Authentic Contexts-of-Use. Journal of Educational Computing Research, 42(1). Tomiura, E. (2009). Foreign versus domestic outsourcing: Firm-level evidence on the role of technology. International Review of Economics Finance, 18(2), 219-226. Varadarajan, R. (2009). Outsourcing: Think more expansively. Journal of Business Research, 62(11), 1165-1172. Willcocks, L. L. (2008). Information systems and outsourcing: studies in theory and practice. Springer. Williamson, O. (2008). Outsourcing: Transaction Cost Economics and Supply Chain Management. Journal of Supply Chain Management, 44(2), 5-16.
Subscribe to:
Posts (Atom)