Free Essay

Hack Doc

In:

Submitted By donalds3
Words 414
Pages 2
To start this reflection it would be wrong if I didn’t briefly illustrate the person I was talking to. The person was a women, middle-aged, and originally from a different country. She was very pleasant to talk to, but quickly wanted to make the subject of our talk a way for her to educate and unintentionally brag. She used almost no hand gestures, but was very dramatic in how she talked and the way she tried to convey her emotions. Throughout the conversation she would try to draw other people in and get their attention but I feel that this might have been because we were talking about her home country and the foreign language that she would speak when talking to her children and friends. To be completely honest I am always paying close attention when I have a conversation with people so it wasn’t much of a problem for me to do it in this situation, and it didn’t really affect my perception. I find that when I first meet someone if I’m going to be seeing them again in a less formal manner I try to absorb as much information about them as I can. This allows me avoid saying or doing something that may seem insensitive, such as possibly asking about one’s home country or language without a proper reason. While I strive to pay attention to the person I’m talking to as much as possible that does leave me with the problem with trying to pay attention to myself. The only self-image I was trying to project was that I was respectful and attentive. Other than those two things I rarely try to project anything else, which even I can appreciate is not going be enough for future relationships. What I want to be able to project is confidence at the very least since I’m rather quick to let others speak and only talk when I feel that it is necessary. While I was concentrating on both the person I was speaking to and myself, I believe that I was able to retain everything that was said by the two of us. We spoke of her home country of Malaysia briefly, then discussed her ability to speak Chinese, Cantonese specifically, as well as five other dialects of the language, and then discussed that while the spoken language had numerous forms the written language spanned all of the Chinese language because it is a picture based alphabet.

Similar Documents

Free Essay

Biggest Challenges Today Are to Control the Network Security

...Biggest challenges today are to control the network security. Network security is having protection of networks and their services from unauthorized access, destruction, or disclosure. Malicious acts bring up the important topic of disaster recovery. Companies must have up to date copies of their important documents and software to prevent extended downtime. The saved information will let the company's employees continue to work while the IT department deals the damaged media. Hacking Into a Website Some being able to hack into a person’s web site is never going to be justifiable. A hacker is someone who illegally gets a hold to personal and private information in a computer system. This person then tampers with the information and start to cause problems. AT&T was a victim of someone hacking into their computer system and stealing the email addresses that Ipad buyers use when they were updating their information or activating there devices. There was a group called Goats Securite that uses different hacking ideas to get into AT&T website.   A total of 110,000 email addresses where obtained during this illegal entry into the website. During this attack on AT&T new technology that was only out for a month, they quickly shut the product down and website to deal with the problem that occurred. The problem was handled very quickly, AT&T was notified on Monday that there system was hacked into and peoples information was taken and compromised, the very next day the...

Words: 399 - Pages: 2

Free Essay

Assessment 4: Major Case Analysis and Evaluation

...in the case and recommend ways that Nokia could address each of these challenges so as to enhance its performance post 2010. Justify your answer. Assessment Criteria      Demonstrate knowledge of frameworks and business concepts covered in lectures, tutorials and unit readings. (35%) Show evidence of critical thinking in analysing the assigned case. (30%) Demonstrate responsible application of ethical and social awareness. 20% Use of accurate and effective academic writing style. (10%) Adherence to the BSRG. (5%) BUSS5000 Assessment 4_ Semester 1 2016 Page 1 of 2 Formatting and layout  Assignments are to be written using MS Word. Assignments to be submitted only in one of the following file formats: .doc, .docx Assignment are not to be submitted in html files, web pages, CAD...

Words: 470 - Pages: 2

Free Essay

Hacking

...information exposed by hackers. In December 8 at New Hampshire the hackers are alleged to have collected the credit and debit card data from over 80,000 victims by hacking. China has highest percentage of hackers, is that 41%. Kevin Mitnick, he has the world best hacking recode and he’s known as “black hate”. In now times big multination brands or company offers prize to hack his own brand or company. For Example google offer $2.7 Million prize fund for those that can hack the chrome OS and Apple offers $1 Million. Hackers are problem because of cybercrime, cyber extortion and virus attack. Hackers are problem because of earning money through business (cybercrime) for example transection money, hack data and sell those data to some on else, hack social sites and expose personal information. Cybercrime is on the increase as new technology allows hackers to be even more anonymous and more dangerous when attacking your computer, network or site. The number, type and seriousness of cybercrime attacks have all increased. Black hat hacker claim he can make $15k to $20k an hour and also he claim like that they can hack 300 billion bits of data in second. Black hat says like that “making money by hacking is easier than brushing your teeth”. For example in 2014 international hacking rings has stolen as much as $1 Billion from more than 100 banks in 30 countries. In Australia, one hacking group hacked almost $154 Million data thru marketing company. Facebook is the King of social networks...

Words: 677 - Pages: 3

Premium Essay

Terra Cog Wac

...Flame School of Business Written Analysis and Communication II To : PGDM Students From : Danesh Gojer WAC II ASSIGNMENT 1 Case : Terracog Global Positioning Systems Class : Wednesday, 7 March, 2012 Assignment : You are Emma Richardson, Executive Vice President. Using the WAC format prepare a full report on your decision concerning Project Aerial. The report is to be sent to your direct boss – Richard Fiero, President. Deadline : 12 AM on Monday, March 12, 2012 in a soft copy format to the following address fsbwac@flame.edu.in. Please send the copy in both a doc or docx format as well as a PDF format. Guidelines for submission 1) Word limit Word limit for your report: 1200 (Exclude from the count the cover page, executive summary, the contents page, and any exhibits). Penalty for exceeding the word limit: one sub-grade if the total number of words is between 1201 and 1300; one full grade if the number of words is more than 1300. Please write down at the end of the assignment the number of words you have used in the body of the assignment. Please block the body (that is, the report excluding the executive summary, contents page, references, exhibits, and cover page) and use the word count in MS Word to arrive at the number of words. Any verbal tables (as opposed to predominantly quantitative tables) and footnotes (other than references) that you use in the body of the report should be counted. If you use any text boxes in the body of the...

Words: 300 - Pages: 2

Premium Essay

Informatics

...KSAs Improvement Plan Form Your Name: K.S Date: 11/10/2013 Your Instructor’s Name: Dr. Directions: Refer to the KSA Improvement Plan guidelines and grading rubric found in Doc Sharing for specific information on how to fill in the form below. Type your answers on this form. Click Save As and save the file with the assignment name and your last name (e.g., NR360PL_KSA_Improvement_Plan_Form_Smith). When you are finished, submit the completed form to the KSA Improvement Plan Form Dropbox by the end of Week 2. KSA Competency(Write each competency you selected in a separate row.) | SMART Goal(Write a SMART goal for the competency.) | Evaluation Plan(Develop a brief plan on how you will achieve your SMART goal. Include how you will evaluate your success.) | Resources for improvement(Find and cite two resources that will help you achieve each goal.) | EXAMPLE:KSA competency: In Word—Inserting headers/footers | I will locate an MS Word 2007 tutorial and practice how to use the header function this week. | I will complete the tutorial. I will know I have achieved this goal when I can successfully insert a header and a footer into my Word document. | Resource #1:MS Office website: Word TutorialResource #2:APA template that is provided in Doc Sharing | KSA competency #1:Request an item from the Chamberlain library catalog. | I will log onto the chamberlain database and log into the library catalog and familiarize myself with its use through practice each week. | I will request...

Words: 550 - Pages: 3

Free Essay

Gm454

...Week 2 Homework Help 1. State the administrative agency which controls the regulation. Explain why this agency and your proposed regulation interests you (briefly). Will this proposed regulation affect you or the business in which you are working? If so, how? Submit a copy of the proposed regulation along with your responses to these five questions. The proposed regulation can be submitted as either a separate Word document (.doc) or Adobe file (.pdf). This means you will submit two attachments to the Week 2 Dropbox: (1) a Word doc with the questions and your answers and (2) a copy of the proposed regulation you used for this assignment. (10 points) Interstate Commerce Commission (ICC) regulated interstate surface transportation between 1887 and 1995. This interests me because of the changes of transportation. Yes, it does affect me because they are doing price controls and entry controls on the collective vendor’s price setting in the United States transportation. 2. Describe the proposal/change. (10 points) It is regulated through varies transportation modes starting with the railroad industry and later the trucking and airline industry. 3. Write the public comment which you would submit to this proposal. If the proposed regulation deadline has already passed, write the comment you would have submitted. Explain briefly what you wish to accomplish with your comment. (10 points) Deregulation—freeing up the trucking market to permit much more flexible pricing and service...

Words: 269 - Pages: 2

Premium Essay

LInux and the CLI

...discussed as factors in your decision. Formatting using the CLI, while works fine for simple forms, is too limiting for complex documents. We have not gotten far enough to input things like pictures/graphs/diagrams ect, but when using a GUI I know from personal use that it is relatively simple. I will say, however, that when dealing with formatting from version to version of a program (lets say from a .doc to a .docx) can be frustrating. I have had times that there was no way that the file could be fixed, and that I had to make a whole new document, because the newer program would just not accept the old file in its original format. This is an advantage when using the CLI. .txt is .txt no mater what program it was created on, or platform that you were using. This is a HUGE advantage that using the CLI has over the GUI. If I am using Open Office on a Linux system to create a document, and then you want to open that same document using Microsoft Word on a Windows system there are huge problems in the “conversion” process. Even if you save said file using Open Office as a .doc file, when opening with Word, Its just not right. I think we have all ran into this issue, and it can be vexing. So I think that using the CLI to create and manipulate files is, overall, more efficient; we will always be visual beings and want to have our pretty buttons to...

Words: 310 - Pages: 2

Free Essay

Paper

...CLC: Marketing Analysis Research Report: Product Selection and List of Sources Due Date: Jan 18, 2014       Max Points: 50.0 Description This is a Collaborative Learning Community assignment - 1. Identify a product that will be the focus of your research. The product might be one of personal interest (e.g., computers/electronics, cell phones, cars, food services, home health care) or concern (e.g., blood diamonds, tobacco). 2. In a Word document, briefly describe the consumer appeal and environmental factors that you think might influence the market for this product. 3. Also, propose how this product could have implications for ethical, social responsibility, or global issues in the market. Refer to “Research Report Outline” for a list of possible ethical and social responsibility issues in marketing. With instructor approval, you may also choose an issue that is not on the list. Do some preliminary research (on the Internet and/or in the GCU Library) to ascertain if source information on the product (and/or industry) is available. Avoid choosing a product for which data is difficult to find. Find a minimum of three sources that you think will provide sufficient information for your analysis and make a list for instructor approval. Submit the assignment for instructor approval by the end of Topic 1. Instructor must approve product selection and sources and will advise the student by the third day of Topic 2. You are not required to submit this assignment...

Words: 483 - Pages: 2

Premium Essay

Hacking

...understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime, a study showing that nearly 90% of attacks happen on the inside [1] raising concerns of how easy it is to be working on the inside to be able to infiltrate attacks. Has ethical hacking finally come to the rescue for solving the problems or has it created new ones? 2. DISCUSSION A. Education and training The problem of teaching students to hack is still...

Words: 3982 - Pages: 16

Premium Essay

Computer Memory Hacking

...dSniff, Netcat and John the Ripper. DSniff passively monitors a network for interesting data like passwords, e-mails, files etc. Netcat is designed to be a dependable back-end that has features that include port scanning, transferring files, port listening, and worse used as a backdoor. John the Ripper is a popular password testing and breaking programs but hackers would use it for the later. For dSniff, someone would have to first have access to your computer by the user either downloading the program by accident or the hacker pushing it to you. Then the tool is activated and monitors your computer for the right information. John the Ripper is used to break into computers and external hard drives. It would not be a tool that would be used to hack into a Facebook or Gmail account as they have extra measures for that method. Now that we know some different tools that hackers use we need to know some basic steps to stopping the hackers from entering your space. These few simple tasks will make it that much harder for someone that you don’t know have access to all of your valuable information. Keeping your system...

Words: 774 - Pages: 4

Free Essay

Ethichs

...Ok so, there have been a few issues with the server that people are talking about. I understand a lot of people have issues and I appreciate on how fast the admins/Developer are taking care of these issues. I for one as a kohi player have never complained, but im here today to do just that *lul* I have no idea on how mods/admins do the banning, most likely reporting to the antiskid and the reports that come up in chat and responding to them as quickly as possible. (Sources: streams). I've died to hackers and understand the issue of people playing unlegit, so I do my part as a player, and ./report (name) him/her. In one scenario I've died countless amount of times to one hacker and nothing was done about it. Ive been acting professional about it and became so salty at the end, I screamed "help hacker, please tp" while getting a new bumhole from this hacker. I get that most of you reading up to this point will be arguing on how mods and admins are busy doing whats good for the server. Let me remind you, I was fighting a hacker, ./reported him/her, also did /helpop and screamed in chat while this person was blantely hacking and nothing was done about it. Minutes later, mods as well as admins are talking to each other about non - related issues, nothing to do with the server, streams, and something about Stimpay (cough fenboyz). I respect Kohi, the effort given by Prplz/ Travisvv as from what Ive seen is amazing. Im here suggesting that the server "hire, recruit" more mods/trials...

Words: 319 - Pages: 2

Free Essay

Hacking

...prevent hacking, one must first understand what is at risk to be hacked and the way in which the act is done. Technology has become a constant part of every day life. People now manage their bank accounts, pay bills, deal with highly confidential information, and even personal information online. All these aspects of technology in daily life are a temptation to others throughout the internet. Those who find themselves tempted perform the task of hacking, which leaves others and their personal information vulnerable. This paper will discuss society’s reliance of technology in all aspects of life; thereby, leaving personal information vulnerable. Also being discussed will be information hackers find tempting, the steps that some take to hack into systems allowing them access to normally unavailable information and the steps that can be used to help prevent hacking from occurring. Method In the task of preventing hackers from gaining access to information that could be harmful to the individual, you must first understand what information is at risk and how hackers perform the task of hacking. In order to do this, I had to research what systems/files are at risk to be hacked and the way in which hackers perform the task of hacking. By assessing these factors, one can find the programs and actions they can take that can help protect their personal...

Words: 307 - Pages: 2

Premium Essay

Operation Get Rich or Die Tryin

...Operation Get Rich or Die Tryin Albert Gonzalez’s convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison crimes were committed mostly between 2005 and 2008 while he was drawing a $75,000 salary working for the U.S. Secret Service as a paid undercover informant. The string of hacks began in 2005 when Gonzalez and accomplices conducted war-driving expeditions along a Miami highway and other locations in search of poorly protected wireless networks, and found easy access into several retailer networks. Once inside a local TJX outlet’s network, the hackers forged their way upstream to its corporate network in Massachusetts. Gonzalez obtained a packet sniffer from best friend Stephen Watt, which he and accomplices installed on the TJX network to siphon transaction data in real time, including the magstripe data on the credit and debit cards. Gonzalez’s sentencing follows two others related to the TJX hacks. Stephen Watt, a former coder for Morgan Stanley, was sentenced to two years in prison for providing the sniffer that Gonzalez used in the TJX hack. Watt was also ordered to pay restitution to TJX, jointly with other accomplices, in the amount of $171.5 million. Humza Zaman, a former network security manager at Barclays Bank, was sentenced to 46 months in prison and fined $75,000 for serving as a money courier for Gonzalez. He was charged with laundering between $600,000 and $800,000 for Gonzalez. Gonzalez’s sentence is among the stiffest imposed for...

Words: 353 - Pages: 2

Free Essay

Lab1

...LAB 1 Tuesday Hacking and Countermeasures Reconnaissance, scanning, Gaining Access, Maintaining Access, Covering Tracks I would follow the fives steps of hacking and start with step number one, reconnaissance, and a bit of scanning. I believe google would be a great tool for performing the first step in hacking, there is a lot of information on most things there. Other tool sthat could be used are NMap, Paratrace, and ScanRand. Social engineering is one of the best ways to get information abotu a company or person. In social engineering one could pretend to be a higher up just trying to run a check and get all sorts of information. One of the most common forms of social engineereing is a method called phishing. Enumeration is similiar to scanning a system for vulnerabilitiesthat can be used to attack the system. This is vital to a hackers object since it reveals the information needed to access the target. To avoid detection a good hacker will always cover their tracks. This is done by purging any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t. An attacker will leave some sort of backdoor into the system. This allows for re-entry at a later time that doesnt appear in scans by the company As the security professional your job is to find holes in the...

Words: 442 - Pages: 2

Free Essay

Chapter 9

...Service Agency (FSA). FSA is an agency of the U.S. Department of Agriculture (USDA). 3. Where and how would a Large Company borrow to finance inventory? To build a new factory? To buy another company. Companies can borrow from banks or sell stock and issue bonds to raise money. 4. Where and how would a city borrow to build a new baseball stadium? New schools? Replace a sewer system? Cities can issue municipal bonds where to raise money for such new projects. 5. Where an how would the Federal Government borrow to finance the Federal Debt of over $17 trillion? The Federal government issues debt by selling treasury securites suchas bonds notes, savings bonds. Compose a document and attach the file in Microsoft Word (.doc, .docx) or Rich Text (.rtf) format. If I can't open your attachment you will receive a zero. If you have any questions about how to format your work contact ANGEL...

Words: 266 - Pages: 2