Monday, November 25, 2019

Emperor Penguin Facts (Aptenodytes forsteri)

Emperor Penguin Facts (Aptenodytes forsteri) The emperor penguin (Aptenodytes forsteri) is the largest type of penguin. The bird is adapted to living its entire life in the cold of the Antarctic coast. The generic name Aptenodytes means diver without wings in Ancient Greek. Like other penguins, the emperor does have wings, but it cannot fly. Its stiff wings act as flippers to help the bird swim gracefully. Fast Facts: Emperor Penguin Scientific Name: Aptenodytes forsteriCommon Name: Emperor penguinBasic Animal Group: BirdSize: 43-51 inchesWeight: 50-100 poundsLifespan: 20 yearsDiet: CarnivoreHabitat: Antarctic coastPopulation: Fewer than 600,000Conservation Status: Near Threatened Description Adult emperor penguins stand between 43 and 51 inches tall and weigh between 50 and 100 pounds. Weight depends on sex and season. Overall, males weigh more than females, but both males and females lose weight when incubating eggs and raising hatchlings. After the breeding seasons, both sexes weigh around 51 pounds. Males enter the season between 84 and 100 pounds, while females average around 65 pounds. Adults have black dorsal plumage, white feathers under their wings and on their bellies, and yellow ear patches and upper breast feathers. The upper part of the bill is black, while the lower mandible may be orange, pink, or lavender. Adult plumage fades to brown before molting each year in summer. Chicks have black heads, white masks, and gray down. Emperor penguins have bodies streamlined for swimming, flipper-like wings, and black feet. Their tongues are coated with rear-facing barbs that help prevent prey from escaping. Penguin bones are solid rather than hollow to help the birds survive the pressure of deep water. Their hemoglobin and myoglobin help them survive at the low blood oxygen levels associated with diving. On land, emperor penguins either waddle or slide on their bellies. Sian Seabrook, Getty Images Habitat and Distribution Emperor penguins live along the coast of Antarctica between 66Â ° and 77Â ° south latitudes. Colonies live on land, shelf ice, and sea ice. Breeding occurs on pack ice as far as 11 miles offshore. Diet Penguins are carnivores that prey upon fish, crustaceans, and cephalopods. They are social birds that often hunt together. They can dive to 1,500 feet, spend up to 20 minutes underwater, and forage over 300 miles from their colony. Chicks are hunted by Southern giant petrel and south polar skuas. Adults are only preyed upon by leopard seals and orcas. Behavior Penguins live in colonies ranging from 10 to hundreds of birds. When temperatures drop, penguins huddle in a rough circle around juveniles, slowly shuffling around so each adult gets a chance to shelter from the wind and cold. Emperor penguins use vocal calls to identify each other and communicate. Adults can call at two frequencies simultaneously. Chicks modulate the frequency of their whistle to call parents and indicate hunger. Reproduction and Offspring Although sexually mature at three years of age, most emperors dont start breeding until they are four to six years old. In March and April, adults begin courtship and walk 35 to 75 miles inland to nesting areas. The birds take one mate each year. In May or June, the female lays a single greenish-white egg, which weighs about one pound. She passes the egg to male and leaves him for two months to return to the sea to hunt. The male incubates the egg, balancing it on his feet to keep it off the ice. He fasts about 115 days until the egg hatches and his mate returns. For the first week, the male feeds the hatchling crop milk from a special gland in his esophagus. When the female returns, she feeds the chick regurgitated food, while the male leaves to hunt. The parents take turns hunting and feeding the chick. The chicks molt into adult plumage in November. In December and January all of the birds return to the sea to feed. Less than 20% of chicks survive the first year, as a parent must abandon a chick if its mate doesnt return before the guardians energy reserves are depleted. The adult survival rate from year to year is about 95%. The average lifespan of an emperor penguin is around 20 years, but a few birds may live as long as 50 years. Males keep chicks warm by resting them on their feet and snuggling them in an area of feathers called the brood patch.. Sylvain Cordier, Getty Images Conservation Status The IUCN updated the conservation classification status of the emperor penguin from least concern to near threatened in 2012. A 2009 survey estimated the number of emperor penguins to be about 595,000 individuals. The population trend is unknown, but suspected to be decreasing, with a risk of extinction by the year 2100. Emperor penguins are highly sensitive to climate change. Adults die when temperatures rise high enough to reduce sea ice coverage, while low temperatures and and too much sea ice increases chick deaths. Melting sea ice from global warming not only affects the penguin habitat, but also the species food supply. Krill numbers, in particular, fall when sea ice melts. Emperor Penguins and Humans Emperor penguins also face threats from humans. Commercial fishing has reduced food availability and tourism disrupts breeding colonies. Emperor penguins have been kept in captivity since the 1930s, but only successfully bred since the 1980s. In at least one case, an injured emperor penguin was rescued and released back into the wild. Sources BirdLife International 2018. Aptenodytes forsteri. The IUCN Red List of Threatened Species 2018: e.T22697752A132600320. doi:10.2305/IUCN.UK.2018-2.RLTS.T22697752A132600320.enBurnie, D. and D.E. Wilson (Eds.). Animal: The Definitive Visual Guide to the Worlds Wildlife. DK Adult, 2005. ISBN 0-7894-7764-5.Jenouvrier, S.; Caswell, H.; Barbraud, C.; Holland, M.; Str Ve, J.; Weimerskirch, H. Demographic models and IPCC climate projections predict the decline of an emperor penguin population. Proceedings of the National Academy of Sciences. 106 (6): 1844–1847, 2009. doi:10.1073/pnas.0806638106Williams, Tony D. The Penguins. Oxford, England: Oxford University Press, 1995. ISBN 978-0-19-854667-2.Wood, Gerald. The Guinness Book of Animal Facts and Feats. 1983. ISBN 978-0-85112-235-9.

Thursday, November 21, 2019

Security in New Generation Cell Phones Research Paper

Security in New Generation Cell Phones - Research Paper Example Technology in every new generation provides major improvements from the previous generations. In the cellular communications, there was first the 1G and 2G generations. These generations contributed to the provision of the internet for the mobile phones through the 3G dominated the scene. The third generation cell phone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the wireless internet. This makes it suitable for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the security of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and distribution of cell phones leads to the rise in the security risks in different ways. Users of electronic gadgets like cell phones should be more concerned about their safety. Lately, electronic devices such as the Apple’s iPhone latest version and the Google’s Android have committed themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes great conveniences, it also comes with severe security risks. Both the new and future generations of cell phones require the setting up and update of security software. This software includes firewalls, anti-virus software, operating system patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of information technology has enabled most financial institutions to adopt mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial transactions online. As a result, they will need to store their login passwords w ith the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it can also lead to the denial of disseminated service attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to desktop computers. Since most theft cases occur unexpectedly, a cell phone user can lose a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the user’s location and movements. One such application is the opt-in text advertisements that give information on the whereabouts of t he user round the clock. Hacker stalkers can use this information to trail their victims and even do felony acts to them.

Wednesday, November 20, 2019

Folic acid food fortification is associated with a decline in Essay

Folic acid food fortification is associated with a decline in neuroblastoma - Essay Example Neuroblastoma is one of the most common cancers affecting children today, forming 8%-10% of the total seen from birth through age 14 years.   It affects one in every 6,000 to 7,000 children in North America (Nutra ingredients.com, 2003). It is a disease in which cancer cells are found in certain nerve cells within the body. Neuroblastoma typically begins in the abdominal area either in the adrenal gland (located just above the kidney) or around the spinal cord in the neck, chest, or pelvis (Pressinger & Sinclair, N.D.). Studies show that folic acid food fortification has more than halved the incidence in Canada of the deadly childhood cancer neuroblastoma. Chemically Folic acid has the molecular formula C19H19N7O6 with a molecular weight of 441.40. The scientific name of folic acid is N-[p-[2-Amino-4-hydroxy-6-pteridinyl) methyl] amino] benzoyl]-L-glutamic acid. It is a complex organic compound present in liver, yeast, and natural sources; it also may be prepared synthetically (RxList, 2004). Metabolically, folic acid is converted to coenzyme forms required in numerous one-carbon transfer reactions involved in the synthesis, interconversion and modification of nucleotides, amino acids and other essential structural and regulatory compounds (Bailey, et al, 2003). As an essential cofactor for the de novo biosynthesis of purines and thymidylate, folate plays an important role in DNA synthesis, stability and integrity, and repair, aberrations of which have been implicated in colorectal carcinogenesis. Folate may also modulate DNA methylation, which is an important epigenetic determinant in gene expression, maintenance of DNA integrity and stability, chromosomal modifications, and the development of mutations. (Kim, 2004). Daily ingestion of 400  µg of folic acid alone during the preconception period reduced a womans risk of having a fetus or infant with a neural-tube defect. The

Monday, November 18, 2019

Nike Research Paper Example | Topics and Well Written Essays - 500 words - 1

Nike - Research Paper Example In the year 2012, Nike paid Indonesian workers 1 million US dollars after it emerged that the workers had worked an overtime of 600,000hrs for two years without pay (The Guardian, 2012). In the year, 1987, Nike was sued by capitol record for using a beatles song in their advertisement, the paid capitol records $250,000 who had the rights for the song at that time. In late June 2005, a case against Nike by Minor threat of them using their cover photo in their album also led to out of the court settlement where Nike apologized to the band and settled them (Brian, 2002).. Nike like most of the multinational companies has huge stash of profits offshore that it hasn’t paid U.S taxes on. It’s also known that they have paid little or no taxes in these foreign countries. Nike reportedly said that its cache of â€Å"permanently reinvested offshore profits† ballooned from $5.5 billion to $6.7 billion in the past year — this means that the corporation moved up by $1.2 billion of its profits offshore. It also reveals that if it were to pay the U.S taxes on its offshore stash profits, it would be approximately $2.2 billion, which is a tax rate just under 33 percent. The federal income tax is usually known to be 35% deducting any taxes corporations have paid to foreign jurisdictions (CTJ, 2013). With this information it’s easy to reach a conclusion that Nike has paid no tax on its offshore profit stash. Nike has a long list of various offshore subsidiaries others with different names while others bear Nike’s own shoes b rand. In the year 2012, Nike signed a deal with the state of Oregon where its headquarter is based, to enable it pay its current tax for the next 40 years as long as it invests more than 150 million dollars within the state and be able to create 500 jobs within a five-year term (Brian, 2002).. This is a good gesture for Nike by

Saturday, November 16, 2019

Process of Meiosis | Experiment

Process of Meiosis | Experiment In this experiment we observed the process of meiosis by looking at different slides. Meiosis is a process in which a diploid (2n) parent cell is divided into four haploid (n) daughter cells. The daughter cells have half the number of chromosomes as the parent cell. Meiosis mainly occurs in sex cells (gametes) of humans through the process of spermatogenesis (males) or oogenesis (females). It is essential for sexual reproduction, and thus is seen in all eukaryotes that reproduce sexually. Before the cell undergoes meiosis, it first replicates its DNA. Meiosis includes 2 cycles of division- meiosis I and meiosis II. After meiosis I is completed, DNA is not replicated, which leads to the final daughter cells being haploid (n). The first step of meiosis I is prophase I. During prophase I, DNA can be exchanged between homologous chromosomes by tetrads crossing over, a process referred to as recombination. The new combination of DNA provides for genetic variation for the daughter cells. I n addition, in prophase I, the nuclear envelope disintegrates, and the two centrioles move to opposite ends of the cell. In metaphase I, homologous chromosomes are aligned at the metaphase plate (site where the cell will divide) in pairs. The side at which homologous pairs will lineup is random and further improves the chances for genetic variation. The centrioles attach kinetochore microtubules to the chromosomes, so that they can be pulled apart to the different ends as the cell divides. In anaphase I, the microtubules shorten, pulling the pairs of homologous chromosomes apart from one another. In telophase I, the chromosomes arrive at their respective ends and the cell divides to form two haploid cells. The nuclear membrane is reformed, and the microtubules disappear. The chromosomes uncoil back into chromatin. Note, that even though the first meiotic division led to two haploid cells, each chromosome still contains a pair of sister chromatids. Thus, meiosis II begins without DNA replicating beforehand. The steps in meiosis II are very similar to the ones in meiosis I. In prophase II, the nuclear envelope disintegrates, the centrioles move to the opposite end of the pole, the chromosomes condense and prepare for the second division. In metaphase II, the chromosomes again line up randomly at the plate, but this time independently, not in pairs. The spindle network is formed is also formed. In anaphase II, the sister chromatids are pulled apart and move toward the opposite ends of the pole. Lastly, in telophase II, the cells are cleaved and the nuclear envelope reappears. The chromosomes uncoil and the end result is 4 haploid daughter cells. In spermatogenesis, the 4 daughter cells are the spermatids. However, in oogenesis, even though 4 haploid daughter cells are created, 3 are polar bodies, while the last is an ootid (egg), which might be fertilized by a spermatid. During fertilization (when the spermatid and ootid join), the number of chromosomes reverts b ack to 2n (diploid). The random alignment and crossing over are very important to the process of meiosis because they provide for greater genotypic diversity. However, if the chromosomes are not able to separate, several errors can arise. Klinefelter and Turner syndromes are due to nondisjunction, during which there is an extra X chromosome present in males, or missing an X chromosome in females, respectively (Russell, 346-349). We also observed the life cycle of the insect drosophila. We will be experimenting on them in the coming weeks. This insect serves as a great experimental organism in the field of genetics due to its short, unique life cycle, and since Mendels laws of inheritance (law of segregation, law of independent assortment) are clearly visible when they mate. The law of segregation states that when any individual produces gametes, the copies of a gene separate so that each gamete receives only one copy. The law of independent assortment states that alleles of differen t genes assort independently from each other during gamete formation. The purpose of this experiment was to familiarize ourselves with the process of meiosis and the insect drosophila, as we will be working with them in future experiments. We used slides from human testis, rat testis, and chorthippus testis, to compare the process of meiosis in different eukaryotes. I predict that I will be able to see the stages of prophase, metaphase, anaphase and telophase in the slides. Hypothesis: I believe that the process of meiosis will be the same in all three eukaryotes, and I will be able to view the cells differentiating. I should be able to see the different structures of the insects and be able to distinguish male and female drosophilas based on their appearance. I believe that I will be able to witness the different stages of meiosis in the slides. Methods: Obtain the slides and the compound light microscope from the instructor. Place the first slide on the stage of the microscope (the microscope should be on the lowest power- 40x) and use the coarse adjustment knob to focus the slide. Turn to the next highest power (100x), and this time, use only the fine adjustment knob to bring the slide into focus. Turn the microscope to the 400x power, and again focus the slide. Sketch what you see on a separate sheet of paper and label the different structures. Before moving on to the oil immersion power, put a little drop of oil in the middle of the slide. Focus the image under oil immersion and sketch the results once again. After youre done sketching the slide, lower the stage and put the microscope back to the lowest power (CAUTION: be careful not to get oil on the 400x power when turning the objectives as this will ruin the lens). Repeat these steps for the rest of the slides (NOTE: for the drosophila male and female slide, the lowest power, 40x, is good enough to get a good overview). The slides we viewed were: chorthippus testis, generalized animal cell, human chromosome (metaphase state), turtle liver mitochondria, drosophila chromosome, drosophila (male and female), rat testis, and human testis. At the end of the experiment, clean all the slides that have oil on them, wipe the oil immersion lens, and return the materials to the instructor. Results: Questions: 1. What major chromosomal event occurs between leptonema and zygonema? Between leptonema and zygonema, the major chromosomal event that occurs is the pairing of the homologous chromosomes. 2. Do any of the chromosomes at zygonema appear to consist of two parallel parts? How do you account for this appearance? Yes, chromosomes at zygonema appear to consist of two parallel parts, which is probably due to the paired homologues. 3. Consult your textbook for a definition of the term chromomere. Can you detect chromomeres in any of the meiotic cells you are examining? At what substages of prophase I are chromomeres evident? Chromomeres are dark regions of chromatin condensation. Yes, you can detect chromomeres in meitotic cells; they are usually seen in zygonema of prophase I. 4. Do you observe a large, darkly staining structure in the nucleus during leptonema and zygonema? This body represents an already highly condensed (heterochromatic) X chromosome. Can you follow the fate of this chromosome through the rest of the substages of prophase I and metaphase I? Yes, it should be possible to follow the fate of this chromosome through the rest of the substages of prophase I and metaphase I. This X chromosome will not align with the rest of the chromosomes at the metaphase plate and will be near one end of the splitting cell or the other. 5. Briefly list major differences between zygonema and pachynema. At zygonema, the chromosomes are much less condensed than those at pachynema. Crossing over occurs at pachynema. The number of chromosomes can be determined at pachynema, but not at zygonema. 6. Locate cells in diplonema. Can you observe a) the two homologous chromosomes in a pair? b) individual chromatids in a chromosome? c) chiasmata? a) Yes, the homologous chromosomes in pairs are visible. b) Yes, the chromatids are also visible, since the chromosomes at this stage are much coiled. c) Yes, the chiasmata is visible, it is the point where the pair of homologous chromosomes exchange genetic material. 7. Because of the degree of condensation of the chromosomes, diakinesis is an ideal stage at which to determine the chromosome number. Count the chromosomes in a grasshopper cell at diakinesis. Record the number here. Does this represent the diploid number? Justify your answer. Note that sex in grasshoppers is determined by an XO mechanism in which the female is XX, but the male has a single X chromosome. Therefore, the X chromosome that you observe in diakinesis is not a tetrad. What is the significance of this information for determining chromosome number in grasshopper males versus females? Since grasshopper males are missing an X chromosome, to find their diploid number of chromosomes, one would have to count the haploid number (n), double it (2n), but then subtract 1, since it is missing an X chromosome. In females, the subtraction will not be necessary; they will always have double their haploid number of chromosomes (example- if haploid number equals 14 chromosomes, male diploid number will equal (2n-1 = 28-1) 27 chromosomes, while the females will have 28 chromosomes in a diploid cell). 8. Observe several cells in metaphase I. Do you notice a chromosome in an unusual position with respect to the other chromosomes in the cell? What chromosome might this be? Yes, this chromosome could be the X or Y chromosome. 9. Can you find cells in other stages of meiosis or sperm differentiation? If so, briefly describe their appearance and state what stages you think they might be. Yes, it is possible to find other stages of meiosis. In metaphase, the chromosomes are lined up at the metaphase plate. In anaphase, the chromosomes are being pulled apart, and in telophase the cells should be separating via cytokinesis. Conclusion: The process of meiosis is very complicated, but is necessary for sexual reproduction. There are five substages of prophase I in meiosis. Prophase I is the most important stage in meiosis, since this is the stage where crossing over occurs between homologous pairs of chromosomes, which is essential for genetic variation. The first substage is leptonema where chromosomes begin to condense into long strands and begin to look for their homologous pair. In the second substage, zygonema, the chromosomes have found their pairs. The third substage, pachynema, is where crossing over occurs. In addition, the chromosomes are condensed enough so that one can count the number of chromosomes. In the fourth substage, diplonema, portions of the chromosome begin to separate, and the chiasmata (the site where crossing over takes place) is made visible. The last stage, diakenisis, is where the nucleoli disappears, the nuclear membrane disintegrates, and the four tetrads of a pair of homologous chromoso mes are clearly visible (the chromosomes are fully condensed) (Meiosis Prophase I). When looking at the drosophilas, males were easily distinguishable from females. Males were smaller in size compared to the females. The end of the male was more rounded, while the female was pointier. Females had more of a striped pattern on their ends, while males have black as the dominant color. Lastly, males have a sex comb at the joint of each front leg (males also have a penis) (Hammersmith Mertens, 5). In the generalized animal cell, I was able to identify the nucleus and the nuclear envelope. In the human chromosome slide of metaphase, the chromosomes were lined up, which means they were about to be separated. In the human, rat and chorthippus testis, I had a difficult time identifying the different cell types, or cells in different phases of meiosis. Meiosis is an essential process, and if an error occurs, the consequences could be lethal.

Wednesday, November 13, 2019

Anne Sexton : Life into Art :: Literature Poetry Papers

Anne Sexton : Life into Art A story, a story! (Let it go. Let it come.) I was stamped out like a Plymouth fender into this world. First came the crib with its glacial bars. Then dolls and the devotion to their plastic mouths. Then there was school, the little straight rows of chairs, blotting my name over and over, but undersea all the time, a stranger whose elbows wouldn't work. Then there was life with its cruel houses and people who seldom touched - though touch is all- but I grew, like a pig in a trenchcoat I grew, and then there were many strange apparitions, the nagging rain, the sun turning into poison and all of that, saws working through my heart, but I grew, I grew, and God was there like an island I had not rowed to, still ignorant of Him, my arms and my legs worked, and I grew, I grew, I wore rubies and bought tomatoes and now, in my middle age, about nineteen in the head I'd say, I am rowing, I am rowing though the oarlocks stick and are rusty and the sea blinks and rolls like a worried eyeball, but I am rowing, I am rowing, though the wind pushes me back and I know that that island will not be perfect, it will have the flaws of life, the absurdities of the dinner table, but there will be a door and I will open it and I will get rid of the rat inside of me, the gnawing pestilential rat. God will take it was his two hands and embrace it. As the African says: This is my tale which I have told, if it be sweet, if it be not sweet, take somewhere else and let some return to me. This story ends with me still rowing. - "Rowing" by Anne Sexton, from The Awful Rowing Towards God Introduction I chose to start this paper by quoting an entire poem of Anne Sexton's. Why? Because no one told the story of Anne Sexton's life as often or as well as Anne Sexton herself. Over and over she wrote, recounted, and recast her struggles with madness, her love affairs, her joys and griefs in parenting, and her religious quests. For example, "Rowing" touches upon the need for Anne to tell stories about herself, her longing for connection with others, her mental problems, and her searching for God - one could not ask for a better introduction to the world of Anne Sexton. Sexton was a pioneer. As member of the "confessional school" of poetry that arose in America in the early '60s, she helped put an emphasis in American culture on revelation that continues today.

Monday, November 11, 2019

Background Study of the Effect of Study Habit

Background Study of the Effect of Study Habit on the Academic Performances of 3rd Year H. S Students S. Y 2012 – 2013 Study habit is a technique or a strategy used every time a person is studying. Some students would have the same study habit or may have a different one. It depends on whether a specific study habit is effective for them. The stress on good study habits will undoubtedly improved the students’ level of performance. Study habits are important on the part of the students so that it can make use of their time effectively and purposely instead of wasting their time with insufficient study accomplishments.It is a common knowledge that many students fail in studying; even those who work hard often study in ways considered unproductive. Several others are just contented with barely passing grades, never developing their skills and abilities to the highest level attainable. What to study, where to study and how to study are indispensable to every student in class . In fact, proper study habits are the tool for acquiring deeper understanding in different subjects.Good study habits largely influence the level of performance of the student on the subject. In view of this, the researcher proposes to conduct their study on the study habits of students to help the teachers raise the level of performance of their students through the development of proper study habits. The growing number of low performers on the subject point to the need for the redirection and development of students study attitudes and practices in the teaching learning process. The research work is an attempt to address to this need.

Saturday, November 9, 2019

Attacks Used to Hack Email Accounts and Their Preventive Measures Essays

Attacks Used to Hack Email Accounts and Their Preventive Measures Essays Attacks Used to Hack Email Accounts and Their Preventive Measures Essay Attacks Used to Hack Email Accounts and Their Preventive Measures Essay The present-day network threat scenario is unprecedented in both scale and impact. CYBER CRIMINALS has become increasingly confident in their own abilities because of good organization skills and years of experience in evading law enforcement. Armed with sophisticated technical knowledge, a whole bunch of tools and operating systems with exploits, their sole objective today is to cause irreparable damage to the security and business interests of organizations. The biggest brand name between all terrorist groups across the world The Al-Qaeda, Islamic militant group Tehrik-I-Taliban Pakistan and many more terrorist organizations perform cyber terrorism i. e. , disrupt attacks against information systems for the primary purpose of stealing confidential information regarding the nation’s security issues and secondary purpose is creating alarm and panic among the cyber army of the nation. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically.Therefore there is a huge requirement for each and every one of us to know the minimum preventive measures so as to avoid the exploitation of a hacker as he may use our computer as a shield to hide his identity. Our paper discusses on the types on hackers and the main motto behind these people performing these attacks in an attempt to compromise any computer system. Our paper emphasizes on various methods by which passwords can be stolen and then used for personal purpose. A live performance on how an account can be hacked (say facebook) will be demonstrated by using the phishing attack.All the preventive measures that needs to be taken to overcomes these problems and stay safe from this cyber world attackers will be briefly explained so as to make everyone technically strong and preventing their computers getting exploited†¦ Let’s build a stronger nation†¦. JAI HIND†¦ Vamshi Krishna Gudipati A. K. A h4x0r le610n, 4th year b. tech, COMPUTER SCIENCE AND ENGINEERING, WARANGAL INSTITUTE OF TECHNOLOGY AND SCIENCE. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security. Governments, military, corporations , hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status.Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. WHAT IS HACKING? Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e. g. software piracy), computer hacking is more difficult to define. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal.There is an aura of mystery that surrounds hacking, and a prestige that accompanies being part of a relatively elite group of individuals who possess technological savvy and are willing to take the risks required to become a true hacker. An interesting alternative view of how hackers positively impact areas such as software development and hacker ideology is presented in Technology and Pleasure: Considering Hacking Constructive. WHO IS A HACKER? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer or computer network.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. KINDS OF HACKERS White HatA white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term white hat in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, courseware, classes, and online training overing the diverse arena of Ethical Hacking. Black Hat A black hat hacker is a hacker who violates computer security for little reason beyond maliciousness or for personal gain (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are the epitome of all that the public fears in a computer criminal Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.They choose their targets using a two-pronged process known as the pre-hacking stage. Part 1: Targeting The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports- those that do respond- will allow a hacker to access the system. Part 2: Research and Information GatheringIt is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from social engineering, which will be explained below. Aside from social engineering, hackers can also use a technique called dumpster diving. Dumpster diving is when a hacker will literally search through users garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.Part 3: Finishing The Attack This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many hackers will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel). Grey Hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example.Then they may offer to repair their system for a small fee. Hacktivists Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment. State Sponsored Hackers Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, He who controls the seas controls the world, and then it was, He who controls the air controls the world. Now it’s all about controlling cyberspace.State sponsored hackers have limitless time and funding to target civilians, corporations, and governments. Spy Hackers Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid. Cyber Terrorists These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures.Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder. VARIOUS ATTACKS USED BY A HACKER PHISHING Phishing is a way of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity in anelectronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.Phishing is typically carried out by e-mailspoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. A phishing technique was described in detail in 1987, and the first recorded use of the term phishing was made in 1996.The term is a variant of fishing, probably influenced by phreaking, and alludes to baits used in hopes that the potential victim will bite by clicking a malicious link or opening a malicious attac hment, in which case their financial information and passwords may then be stolen. KEY LOGGING These are software programs designed to work on the target computer’s operating system. From a technical perspective there are five categories: * Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched.It effectively becomes a virtual machine. Blue Pill is a conceptual example. * Kernel-based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboard device driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system. API-b ased: These keyloggers hook keyboard APIs; the operating system then notifies the keylogger each time a key is pressed and the keylogger simply records it. Windows APIs on such as GetAsyncKeyState(), GetForegroundWindow(), etc. are used to poll the state of the keyboard or to subscribe to keyboard events. [1] These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage, and can also miss the occasional key.A more recent example simply polls the BIOS for pre-boot authentication PINs that have not been cleared from memory. * Form grabbing based: Form grabbing-based keyloggers log web form submissions by recording the web browsing onsubmit event functions. This records form data before it is passed over the Internet and bypasses HTTPS encryption. * Packet analyzers: This involves capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords. Remote access software keyloggersThese are local software keyloggers with an added feature that allows access to the locally recorded data from a remote location. Remote communication may be achieved using one of these methods: * Data is uploaded to a website, database or an FTP server. * Data is periodically emailed to a pre-defined email address. * Data is wirelessly transmitted by means of an attached hardware system. * The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.Related features Software Keyloggers may be augmented with features that capture user information without relying on keyboard key presses as the sole input. Some of these features include: * Clipboard logging. Anything that has been copied to the clipboard can be captured by the program. * Screen logging. Screenshots are taken in order to capture graphics-based information. Applications with screen logging abilities may take screensh ots of the whole screen, just one application or even just around the mouse cursor.They may take these screenshots periodically or in response to user behaviours (for example, when a user has clicked the mouse). A practical application used by some keyloggers with this screen logging ability is to take small screenshots around where a mouse has just clicked; these defeat web-based keyboards (for example, the web-based screen keyboards that are often used by banks) and any web-based on-screen keyboard without screenshot protection. * Programmatically capturing the text in a control. The Microsoft Windows API allows programs to request the text value in some controls.This means that some passwords may be captured, even if they are hidden behind password masks (usually asterisks). * The recording of every program/folder/window opened including a screenshot of each and every website visited, also including a screenshot of each. REMOTE ADMINSTRATIVE TOOL(RAT) A remote administration tool (a RAT) is a piece of software that allows a remote operator to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, RAT software is usually associated with criminal or malicious activity.Malicious RAT software is typically installed without the victims knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software. The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities: * Screen/camera capture or image control * File management (download/upload/execute/etc. ) * Shell control (from command prompt) * Computer control (power off/on/log off if remote feature is supported) * Registry management (query/add/delete/modify) Other software product-specific functions Its primary function is for one computer operator to gain access to remote PCs. One computer will run the client software appl ication, while the other computer(s) operate as the host(s). CLICK-JACKING Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired actions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer.The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page, therefore the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page. Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions.A clickjacked page tricks a user into performing undesired actions by clicking on a conceal ed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page, therefore the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.Examples A user might receive an email with a link to a video about a news item, but another valid page, say a product page on amazon. com, can be hidden on top or underneath the PLAY button of the news video. The user tries to play the video but actually buys the product from Amazon. Other known exploits include: * tricking users into enabling their webcam and microphone through Flash (which has since been corrected by Adobe); * tricking users into making their social networking profile information pub lic; * making users follow someone on Twitter; share links on Facebook SPAMS Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. One subset of UBE is UCE (unsolicited commercial email). The opposite of spam, email which one wants, is called ham, usually when referring to a messages automated analysis (such as Bayesian filtering). Email spam has steadily grown since the early 1990s.Botnets, networks of virus-infected computers, are used to send about 80% of spam. Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. The legal status of spam varies from one jurisdiction to another. In the United States, spam was declared to be legal by the CAN-SPAM Act of 2003 provided the message adheres to certain specifications. ISPs h ave attempted to recover the cost of spam through lawsuits against spammers, although they have been mostly unsuccessful in collecting damages despite winning in court.Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users address books, and are sold to other spammers. They also use a practice known as email appending or epending in which they use known information about their target (such as a postal address) to search for the targets email address. According to the Message Anti-Abuse Working Group, the amount of spam email was between 88–92% of email messages sent in the first half of 2010. PREVENTIVE MEASURES TO OVERCOME THE ATTACKS OF HACKERS KEYLOGGERSSCAN THE FILE WITH DR. WEB LINK CHECKERBEFORE DOWNLOADING. SCAN THE FILE WITH ONLINE MULTIPLE ANTI-VIRUS ENGINE IE. , www . novirusthanks org USE ANTI KEYLOGGERS LIKE ZEMANA,KEYSCRAMBERS ETC.. RATS STRICTLY FOLLOW THE INSTRUCTIONS OF THE ANTI-VIRUS.. ALWAYS USE AN UPDATED ANTI-VIRUS. DONT DOWNLOAD ANY FILE FROM AN ANONYMOUS WEBSITE. PHISHING ALWAYS TYPE THE COMPLETE URL OF THE INTENDED WEBPAGE FOR LOGIN. USE ANTI-VIRUS WHICH HAS WEB BROWSER INTERGRATION FACILITY TO COMBAT PHISHING LIKE KASPERSKY ETC.. NEVER LOGIN IN ANY LINK WITHOUT VERIFING ITS AUTHENTICATION. SPAMSome Facebook users were fooled into verifying’ their account. Many Facebook walls were flooded with verify your/my account’ spam messages/wall posts. My advice to all Facebook users. To get rid of FB spams, do not click the link. As simple as that. Clicking the link will just cause you to become one of the spam victims. It will automatically post the same spam messages on different Facebook walls. CONCLUSION * Data Security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. * . The Internet is a scary place.Criminals have the ability to hide behind their computers, or even other people’s computers ,they attempt to break into computer to steal personal information or to use it for their own purposes. * So to protect your Data with a firewall so that you are not an easy target to hackers and viruses in the future * When you leave your house, you lock your doors to prevent robbery, why not use a firewall to put a lock on your computer. AUTHORS: G. VAMSHI KRISHNA A. K. A h4x0r le610n, Computer Science amp; Engineering, 4nd year B. Tech, WARANGAL INSTITUTE OF TECHNOLOGY amp; SCIENCE.

Wednesday, November 6, 2019

Ocean Dumping Essays - Waste, Aquatic Ecology, Marine Debris

Ocean Dumping Essays - Waste, Aquatic Ecology, Marine Debris Ocean Dumping Ocean Dumping The practice of ocean dumping should be banned. Marine pollution is at the heart of interest in todays search for a clean environment. Not only does ocean dumping add to the unsightliness of the once beautiful and pristine waters; it also kills the marine life which inhabits those waters. Pollution on a grand-scale is wreaking havoc on the Earth. The ocean is not an exception. In 1996, a bill, which would ban the dumping of dredge spoils in the Long Island Sound, was submitted in congress by Michael Forbes (Freedman). At that time, Congressman Forbes predicted that all dumping in the United States would end in the foreseeable future. He sees ocean dumping ending in the 21st century (Freeman). Unfortunately, ocean dumping is the least expensive way to dispose of dredged materials and other pollutants (Freeman). Although an uphill battle, ocean dumping should be outlawed altogether. In New York City, proposed building of treatment plants was conceptualized (Murphy). This allowed an alternative to ocean dumping; since ocean court decisions and legislation (Murphy) had banned dumping. The sludge may be transported to other states for use as fertilizer (Murphy). Treatment plants are less of an eyesore than pollutants in the ocean. Unfortunately, no one wants a treatment facility in his back yard. Many miles of beaches have been closed over the years, due to ocean dumping. For communities where beaches are tourist attractions, this causes devastating economic consequences. At one point, medical debris washed ashore (Bauman). Congress passed a law at that time that banned the dumping of sewage into the ocean (Bauman). In 1987, an international agreement was signed and a national law was enacted to prevent ocean dumping (Miller). As late as 1995, ocean dumping continued to remain a serious threat (Miller). Tons of trash continued to pollute the nations beaches. The trash not only threatens marine life; it also threatens the lives of humans (Miller). There was no national plan for managing vessel waste. Enforcement powers for ocean dumping is spread among several agencies. This severely hampered the situation. The Marie Conservation Volunteers scoured more than 95,000 miles of United States coastlines on September 16, 1995 (Miller). More than 140,000 volunteers were involved in this campaign (Miller). In 1994, over 2.8 million pounds of trash were picked up off of lakes, estuaries, and ocean beaches (Miller). This shows that the problem of ocean dumping is not a small one. This is a huge environmental problem. The Environmental Protection Agency should require ocean waste-management plans, in addition to those that have been created for land (Miller). Plastic particles, particularly six-pack rings, are damaging to marine animals. When ingested, plastic is harmful to marine animals. Discarded fishing gear leads to a high mortality rate among birds, fish, turtles, whales, and dolphins (Miller). Unfortunately, humans are also at risk fr om this form of pollution, due to the fact that trash, which surfaces on the beach, can easily be stepped on. This garbage could (and does) contain such contaminates as syringes (Miller). In 1996, a dispute halted the dredging of shipping channels in New York and New Jersey. This allowed silt to pass into the channels and made them too small for large ships. One hundred eighty thousand jobs were threatened, as well as $20 billion in freight business (Bauman). The collapse of ocean fisheries is a major environmental problem. Environmental issues such as ocean dumping are a public concern. Ocean dumping is not only an issue of concern for America. The entire world must take a stand. International cooperation is vital for the preservation of marine life. Environmental concerns are evidenced to shape international treaties. The Montreal Protocol; the UN Summit on the Environment; agreements to the North American Free Trade Agreement (NAFTA) and the World Trade Organization (WTO) attest to this fact (Burnett). There is a commonality in most global problems. This commonality occurs when

Monday, November 4, 2019

Abortion, Right and Wrong Essay Example | Topics and Well Written Essays - 500 words

Abortion, Right and Wrong - Essay Example The wealthy were able to travel abroad or pay high fees to a local doctor willing to perform the procedure, but a poor woman was required to resort to less safe options. Prohibiting abortions does not and has never stopped them from occurring; it just acts to harm women. Those opposed to Roe also argue that if the Constitution does not directly address an issue, then the Congress, not the courts should decide matters such as this which have weighty moral implications. The Roe decision essentially addressed this question by asserting the government’s concern for the life of the unborn does not outweigh the constitutional rights of the born and thus their decision to allow pregnancy terminations. The Court did draw a line distinguishing what is considered murder of a child. On this issue, those that oppose abortion rights do have legal justification for debate. Viability seems to be an appropriate benchmark because in the early weeks following conception, the fetus is not a conscious being although those of religious conviction argue that it does have a soul. Viability is somewhat scientifically determined while the presence of a soul is not. Therefore, the line can only be drawn at the viability of the unborn as any other method by which to de termine when abortions are considered murder is unclear (Dorf, 2003). Those opposed to abortion claim that the fetus, viable or not, is a living being much the same as a child or adult. Mothers who have had abortions certainly cannot believe she is killing a living child or the practice would be a rare procedure. â€Å"I don’t think, in most cases, that the woman who aborts her child, consciously believes she is killing a person. As philosopher Francis Beckwith points out, â€Å"why do women only kill their fetuses when confronted with practical difficulties, rather than their already born children, if they truly believe their fetuses are fully human?† (cited in Smith,

Saturday, November 2, 2019

Planning of Instruction in a Systematic Way Assignment

Planning of Instruction in a Systematic Way - Assignment Example To guide them through the college application process and how the needy students can apply for aid. The supervisors must oversee this guidance and counselling process. After reviewing the learning objectives stated above, I have come to the conclusion that they are sound. This is because I am aiming to achieve specific objectives such as the learner acquiring skills and knowledge in writing college application letters and essays. The first objective, however, sounds a little subjective. After thinking about it critically, I have decided to change it from â€Å"Demonstrate knowledge of high school courses that prepare them for college† to â€Å"List at least five high school courses that prepare them for college.† I have arrived at this conclusion realizing that a learning objective should be measurable. When the students are asked to actually list those specific courses then the supervisors will be able to determine whether or not the learning objectives have been met. A colleague commented that my objectives are too few. Even though I am looking to have a full day’s training, I intend to have breaks in between (it is important that learners get time to have lunch and to interact with one another). In my experience as a teacher, I have learnt that students learn better when they get time to interact and discuss issues taught in class. I will also make a PowerPoint presentation in class. I will also show the students a video in class to further clarify the points presented in class. This is because students learn better when they get a chance to view real-life situations on video. It is important for me to establish whether or not the content taught in the classroom is effective. I would want those admitting these students to college to actually report that the students are able to enrol better after the guidance and counselling sessions. I am of the opinion that the best way to determine whether or not the sessions are successful is by conducting random interviews on campus to establish the level of success of these sessions.  Ã‚