Friday, February 21, 2020

Answer questions related to psycholgy subject Coursework

Answer questions related to psycholgy subject - Coursework Example According to the video, a teenager needs more than nine hours of sleep for his well-being. My parents always made sure that I get enough sleep especially during my exams. Although the quantity of time they spent with me in my teenage was less as they were both working; still, the quality of time they spent communicating with me was high which compensated for their not being present 24/7. Sometimes, I wished they could talk to me more often when I would feel stressed out or emotionally disturbed. The only thing that I wish my parents would have done in my teenage is taking me out so that we could spend some time together outdoors as well. I have learned that, in order to reduce stress, it is important to drag myself to relax physically and mentally. I should do meditation or yoga function to de-stress myself. I should calm down my muscles and tell myself to relax no matter how much stress I am into. Since stress affects one’s ability to increase blood pressure and shut down pregnancy, it is something I should manage to save future inconveniences. High blood pressure cause cardiac problems which I definitely would not like to have, thus I will learn stress management techniques. How much control should parents have over their child’s genetic makeup is decided by Nature and not by the parents. No parents till date have been able to create the best baby according to their desires by manipulating with the genes, as the video says. Scientists believe that man knows very little of the complex machine that carries genes, and playing with genes is rather more complex. Man has been able to genetically modify animals and plants, but making changes to the genetic makeup of a child has not been possible as yet. Parents might want to operate with their unborn child’s genes but Nature has not given them full control over the genetic machinery. To foster healthy relationship with children, parents need to enjoy the bonding they share with them, play with them,

Wednesday, February 5, 2020

Ransomware Research Paper Example | Topics and Well Written Essays - 750 words

Ransomware - Research Paper Example The way the ransomware attacks a computer system is similar to the way a computer worm operates. This means that a ransomware uses the route of downloaded data and it may even enter a computer system through a network that is vulnerable against such attacks and is not properly secured. Ransomware developers use payload to password protect personal files of a user, encrypt data that is textual in nature or minimize the users communication with his/her personal computer by displaying notices that the system has been used for illegal purposes, it even overrides files in the windows registry area such as the file of explorer.exe or restrict the user from being able to use the system until the user has not repaired the entire system. The system of coercing the computer user through display of messages is regarded as scareware. The first ever created ransomware was created by Joseph Popp who named his ransomware as PC Cyborg Trojan (Emm, 2008, p.15). In this ransomware the developer had developed a payload that used to state that the license of a particular software has been expired and the ransomware even used to password protect the softwares on the hardrive and use to coerce the user into paying an amount of $189 to the developer if the user wanted to reuse the software or unlock the encrypted system. Josephy was caught by the criminal justice system and he was recognized as mentally unfit, Josephy gave his earned money to help in funding AIDS related research. During the season of 2010, ten people were arrested by the local authorities of Russia for developing a ransomware named as WinLock (Celtnet, 2012). This ransomware was indulged in the act of displaying images that were pornographic in nature and used to coerce the users into sending a premium rate text message which was priced at $10 in order if the users wanted to unlock their computer systems through a code. The developers of this ransomware earned more than $16 million; this ransomware did not use the technique of encrypting files and computer systems. During the year of 2012 a huge ransomware named as Reveton which was even recognized with the nick name of Police Trojan started spreading in US. This ransomware displayed a message on the user’s pc stating that the law enforcement organizations have detected illegal activities conducted on the computer system. For example: viewing and downloading of softwares that are pirated in nature and downloading of pornographic material. The playload used by this ransomware required users to reimburse the authorities by utilizing a voucher from an unknown cash service that was prepaid in nature. To increase the fear of the law enforcement agency, the developers used to display the IP address used by the user and the ransomware even showed the users that the intelligence agenc ies are recording their activities. During the month of August 2012, the developers of Reveton attacked US computer system and the message displayed by the playload stated that the user has to compensate for their illegal activities by paying a total of $200 to the FBI through MoneyPack card (PERLROTH, 2012). Defense Several methods have been identified by security software developers and other software develope