Thursday, January 30, 2020

The so called threat Essay Example for Free

The so called threat Essay Computer Viruses, what are they? Deadly programs wrote by the best of the best, or super weapons used by powerful countries against their enemies? Or, just harmless (mostly) little creations made by bored programmers? I think the latter is more correct. Most viruses are harmless, only a very small percentage causes harm to a computer, either deliberately or due to errors in the code. But, it is certainly due to the media that everyone is scared of them. All most all just spread and do something annoying, not format your hard drive. Take the Stoned virus for example, all it does is infect the boot sector of a disk then loads itself in memory. When the Stoned virus is in memory, it waits for the 13^th of any month then displays on your screen Your computer is now stoned. While in memory it infects any disk that is in your computer and any entered after that. In this essay I intend to describe the different types of viruses, how they work, how they are written, how to get rid of them and how to find out if you have one. There are many different types of computer viruses. They cover a wide area of infecting your computer. In fact, there are more viruses than legitimate programs, about 3 or 4 times more! Boot sector viruses are a strange type of viruses. They dont infect files, but instead they infect the disk directly. When you double click on a disk the disk I `run like an application (such as Word, Claris or Windoze itself). It is when the disk is run that is usually tells the computer that it is a disk and to open a window saying what is in it. But, if the disk is infected with a boot sector virus then the virus is run instead. Usually the virus will call the `real part of the disk so that it appears to run normally. Also the virus is almost never the size of the boot sector so it has to install partly in the boot sector and the rest hidden somewhere on the disk. So your disk will be smaller than usual even if you have no files installed. File viruses usually add a copy of themselves to the beginning or end of a program, usually to files that end in exe, com, cpl or dll. There is now a new type of viruses that infect vbs or js files either as well or instead. The I_Love_You virus is an example of a virus that infects vbs files. Although the I_Love_You virus isnt correctly speaking a file virus, it is more of a worm than a file virus, but as infects files as well Ill just use it for this example. Macro viruses only infect MS Word and MS Excel. MS Word and MS Excel. have their own programming language built into them, Visual Basic. VB (Visual Basic) enables programmers to write programs to automate tasks in Word Documents or Excel Spreadsheets. But it also enables virus writers to create viruses that can spread through the most popular package documents by just reading the documents. And, MS Word and MS Excel has another stupid feature, it comes by the name of normal. dot. It enables the user to put macros in it so that they are run every time you open any document or create a new one. You can also put viruses there. Microsoft at their best as usual. Worms are not actually viruses. Normal computer viruses have to be run by the user somehow to spread, but worms spread all by themselves, with no human intervention at all. They almost always spread through either networks or the Internet. You probably have heard of the second most famous worm ever, the I_Love_You letter worm that took the worlds media by storm in late 1999, early 2000. Or maybe youre old enough to remember the most famous and most destructive worm ever, the Morris Worm that brought down the entire Internet and most electronic communication. It worked by using a flaw in SendMail, a program that is used to send and received emails by almost every ISP in the world to spread. Basically it was an accident that it brought down the Internet because it was spreading to quickly for the primitive computers to handle, and just crashed them. Worms generally use flaws in programs that are wide spread like Windoze and Outlook Express to spread. The I_Love_You letter virus used Outlook Express to spread, Morris Worm, SendMail. The Tune. G worm uses a flaw in Microsofts (Oh, no surprise there then! ) Network Server to spread around the network. Generally all worms do is spread. In this next section, I intend to list the basic methods of getting rid of viruses, not forever though, but for the meanwhile. 1) Boycott Microsoft Almost all viruses are written for Windoze or DOS (What Microsoft brought out before Windoze, very primitive, but very good) 2) Get one or more decent anti-virus and update them regularly I personally use CA Inoculate IT get it at [1]www. antivirus. cai. com, you can update it every day if you want for free, but I usually only update it every 2 weeks. 3) Be careful where you get your software from Only get it from reputable stores or websites. If you are suspicious, dont buy / download / run it! 4) Read, read and read Keep up to date on all security issues and virus information. Good sites include [2]www. bugtraq. com, [3]www. rootshell. com and [4]www. microsoft. com (Hmmm, isnt that the source of all the problems? Well, they do have all the updates for Windoze and Microsoft products). Basically viruses arent as big a threat as the media makes them out to be. I personally have a collection of around twenty or more viruses, some harmful, some not. In the finally edit / copy of this essay there will be a floppy disk containing the source code for some of the most famous and not so (but just a dangerous) famous viruses. But, before you go mental at me for giving out viruses to anyone, I have edited them so that they dont do any damage unless you know good programming then you could change it back. But, I leave that choice to you, and remember, if you use the source (edited or not) and get caught, then dont blame me, I didnt tell you to do it. (PS. You can get the full unedited source code and a few of my own at my website. Ill tell you where it is in the next edit / copy). Graeme Ford,3K1. References 1. http://www. antivirus. cai. com/ 2. http://www. bugtraq. com/ 3. http://www. rootshell. com/ 4. http://www. microsoft. com/.

Wednesday, January 22, 2020

Susan B. Anthony Essay -- Biography

Susan B. Anthony On February 15, 1820 in Adams, Massachusetts, a woman by the name of Susan Brownell Anthony was born to parents Daniel and Lucy (Read) Anthony. She was the second born of a strongly rooted Quaker family of eight (Hist.Bio.-1). Because they lived in a Quaker neighborhood, Susan was not heavily exposed to slavery. The family made anti-slavery talks an almost daily conversation over the dinner table. She also saw men and women on the same level (Stoddard 36). â€Å"A hard working father, who was not only a cotton manufacturer, but a Quaker Abolitionist also, prevented his children from what he called childish things such as toys, games and music. He felt that they would distract his children from reaching their peak of performance. â€Å"With a strong household influence like her father, Anthony became a very bright student. She knew how to read and write at the very tender age of three. She was put in a home school type school setting at the age of six because her teacher refused to teach her how to do long division. Because the school was run by a very strong-willed group of women, Anthony received a new image of womanhood by being taught not only arithmetic and grammar, but also manners and self-worth. Upon leaving this school, Susan B Anthony attended a boarding school in Philadelphia where she remained until two years before her father’s business was lost (Boynick 47). At the age of fifteen, Susan B. Anthony began teaching (Holland). At the age of nineteen she had already taught at the boarding school which she had attended, been a governess at in the home of a merchant in Fort Edward, New York, then helped her family move to Rochester. Once her family got settled she began doing work around the house. At the house, her father had daily conversations about the current issues of the day. She would shuffle back and forth between the kitchen and dining room to participate in these discussions which she so passionately loved. She was then appointed principal over the girls’ department Canajoharie Academy and would maintain at that stature until she reached the age of thirty (Holland). It was at her school where principal Anthony became exposed to the Daughters of temperance. This group of women went right along with Susan B. Anthony’s Quaker moral standards. They fought for prohibition. They fought to prevent abus... ...ing rights for women. Little did she know, that fourteen years after her death at the age of eighty-six, the nineteenth amendment would be passed. This amendment, also known as the â€Å"Anthony amendment†, gave women the right to vote. Susan Brownell Anthony has left many marks in the present day world we live in. If it were not for her, many minorities would not have the benefits that they have right now. If she had not lived the life she lived, women might still be fighting for the rights they have now. If it were not for her, we would have never had her printed on the silver dollar. The world would not be as good of a place. Works Cited Boynick, David K. Women Who Led the Way: Eight Pioneers for Equal Rights. New York: Thomas Y. Crowell Company. 1959. Dorr, Rheta Louise. Susan B. Anthony, the Woman Who Changed the Mind of a Nation. New York: Frederick A. Stokes Company, 1928. Holland, Patricia G. â€Å"Anthony, Susan B(rownell)†. Encarta 97 Encyclopedia. CD-ROM. New York: Houghton Mifflin Company. 1994. Stoddard, Hope. Famous American Women. New York: Thomas Y. Crowell Company. 1970. â€Å"Untitled†. Online. Internet. www.history.rochester.edu/class/sba/bio.html.

Monday, January 13, 2020

HIPAA and Information Technology

A â€Å"standardized medical records database† can offer providers promptness in receiving pertinent materials from the patient’s chart. This documentation may entail access to the patient’s medical, family history, contact numbers, and any other relative to notify in case of an emergency. Electronic prescribing, and sharing of reports, test results, and public health alerts with other entities promotes coordination of care. Diagnostics and readings, such as blood pressure, and sugar, are just examples of the data that is immediately available through the â€Å"health information exchange (HIE).Physicians, hospitals, and clinics will enter these facts and figures into â€Å"patient vault,† the central database for the patient. Along with these recordings, patients can leave messages for the physician, and request medication refills. With the convenience of the automated charting format, the doctor, and patient does not have to wait while paper reports are sorted through because of misfiles, disorganized records, poor communication with staff, or typographical errors. The electronic system ensures that records are in chronological order, and that all reports are current, adequately preparing the provider for the appointment.The Detroit Medical Center, which purchased the equipment to convert its paper record format into electronic, as has been developing the process since, has produced some promising statistics. Chief Nursing Officer Patricia Natale, credits the automated application for reducing the length of prolonged admissions, and misjudgments in administering medications through the â€Å"EMR-enabled medication scanning† feature. The hospital’s management team affirms that the electronic filing â€Å"system† has already generated nearly $5 in â€Å"savings† for the facility, and has been upgrading security for â€Å"patients.†This feat is accomplished by effectively supervising imperative acti vities conducted daily, and diminishing the occurrences of prescription inaccuracies by â€Å"75 percent,† as per the current assessments, observes DMC Chief Medical Information Officer Leland Babitch, MD. Findings by The United States Institute of Medicine indicate that hospital blunders are responsible for approximately 100,000 of patient deaths a year. DMC Vice President for Quality and Safety Michelle Schreiber, MD claims that the automated charting format has proven to greatly assist providers with treating patients throughout the day.The HIPAA issues that could arise are as follows. In the article in GreenvilleOnline. com website, â€Å"Growing Medical Identity Theft Puts Patients at Risk,† Osby, (2013) cites a report issued by The U. S. Department of Health and Human Services, (2010). As a concern, health care â€Å"identity theft,† is in competition with the â€Å"other† most prominent national â€Å"identity† crimes, claiming over â€Å"5 million â€Å" victims in the year Osby (2013) apprises. Mark Savage, a senior attorney for Consumers Union, announced that breaking into patient’s â€Å"personal information† via automated databases is a problem that is worsening in the medical office.He recognizes that â€Å"electronic medical records† are capable of offering advantages to the health care industry, and its patrons. However, he adds that quandary lies in the assurance of safeguarding patient’s sensitive materials (2012). Individually identifiable information, such as â€Å"birthdates,† demographics, â€Å"social security,† and contact numbers, provide an abundance of facts which prospective felons find extremely attractive to when attempting to extort funds from â€Å"hospitals, or for other monetary rewards.These illicit activities wreak havoc on the patient, in the form of erroneous invoices, which can compromise â€Å"their credit,† their employment, and even s ubject them to improper â€Å"treatments,† stemming from inaccurate â€Å"medical† documentation (Osby, 2013). The author also alerts that â€Å"security† measures fail to match the demand for electronic records, data sharing, and social media and mobile technology to manage patient data, or the new uses for digital health information.†Stealing is the primary offender in the â€Å"medical† field, impacting over â€Å"500 patients,† trailed only by â€Å"authorized â€Å"disclosure â€Å"to,† or with â€Å"health information,† and staff oversights, and misplacing automated, or â€Å"paper† files (The Department Health and Human Services, 2010) GreenvilleOnline interviewed Chad Lawson, a spokesman for â€Å"Spartanburg Regional,† (where an information security council was comprised in 2012, to guarantee that regulations put in place to shield â€Å"patient information are† resilient, and dependable).During t his conversation, Lawson advised that â€Å"as technology grows and changes and becomes even more vital to the continuing development of improved quality, we must promise that our efforts to keep information safe are adaptable to the fast growth of electronic medical records and other portals for speed and efficiency in patient care† (2012).I believe technology in the medical records management industry is so far behind other industries primarily because of affordability, and that the perception of cost can outweigh the value. Although the president has allocated nearly â€Å"$3 million Medicare/Medicaid bonuses† to various health care establishments, including â€Å"clinics,† and hospitals,† to aid in the transition, the expense of purchasing, and operations still hinder progress.Despite the positive reviews from current customers of the electronic system, less than â€Å"4 percent† of facilities have followed through with conversion, having alread y limiting funding of many IT projects, The University of Michigan School Of Medicine reported. A quarter of American â€Å"hospitals,† â€Å"already† fiscally impaired by the down-spiraling economy, have upgraded only partially to automated â€Å"records,† or have remained with paper. Healthcare reform in general has been a political â€Å"hotbed† of controversy throughout several presidencies.The nation’s failing economy, rising unemployment, terrorism, natural disasters are already on the forefront of many debates. The fiscal budget â€Å"puts the squeeze† on any other programs, particularly those which would most likely require enormous funding to proceed. I am of the opinion that these are some of the reasons that the push to incorporate a universal electronic records format has been delayed, and still continues lagging behind other industries.

Sunday, January 5, 2020

Economics - 1291 Words

Problem Set 9 (75 points) 1. A student argues, If a monopolist finds a way of producing a good at lower cost, he will not lower his price. Because he is a monopolist, he will keep the price and the quantity the same and just increase his profit. Do you agree? Use a graph to illustrate your answer. The argument is incorrect. As the graph shows, a reduction in marginal cost will cause a monopolist to reduce his price. 2. Economist Harvey Leibenstein argued that the loss of economic efficiency in industries that are not perfectly competitive has been understated. He argued that when competition is weak, firms are under less pressure to adopt the best techniques or to hold down their costs. He referred to this effect as x-inefficiency.†¦show more content†¦Gardner using economic theory to justify your answer. Economic theory suggests that price should be equal to MC to achieve allocative efficiency. P = 28 - 0.0008Q MC = 0.0012Q 28 - 0.0008Q = 0.0012Q 28 = 0.002Q Q = 14,000 P = 28 - 0.0008(14,000) P = 28 - 11.20 P = 16.80 c. Compare the economic efficiency implications of (a) and (b) above. Your answer need not include numerical calculations, but should include relevant diagrams to demonstrate deadweight loss. In (a), the price is higher ($20 as opposed to $16.80), and quantity lower (10,000 as opposed to 14,000). The monopolistÊ ¹s higher price and smaller quantity result in a deadweight loss as shown below. 5. A pure monopsony buyer of a resource has a marginal value curve for the resource expressed as: MV = 100 - 0.4Q. Its marginal and average expenditure functions are: ME = 20 + 0.023Q AE = S = 20 + 0.011Q. a. What is the price and quantity that would prevail in a competitive market? The QC is computed as follows: Equate S to MV. 20 + 0.011Q = 100 - 0.4Q 0.411Q = 80 QC = 194.65 PC = 20 + 0.011(194.65) = 22.14 b. What quantity is purchased by a monopsonist, and at what price? The QM is computed as follows: Equate ME to MV. 20 + 0.023Q = 100 - 0.4Q 0.423Q = 80 QM = 189.13 PM = 20 + 0.011(189.13) = 22.08 c. Compute the deadweight loss that results when the firm acts to maximize profit (that is, takes advantage of its monopsony power). Compute the height of MV between HM and HC. HM = 100 -Show MoreRelatedEconomics And Economics On Economics Essay1142 Words   |  5 PagesWhen we talk about economics we must first defined the word. Economics is a social science that studies human behavior and how to allocate our limited (scares) resources, efficiently and effectively to meet our unlimited human wants. Now as we dive deeper in to the field of economics we realized that there are two separate categories that the study of economics breaks off into. The first is macroeconomics, macroeconomics is the study of the whole picture when it comes to economics. Macroeconomics willRead MoreEconomics : Economics And Micro Economics1238 Words   |  5 Pages Economics is the study of how our unlimited demand of certain things can be met by our limited amount of supply. For instance, if there was an unlimited amount of money for everyone, then everyone would have everything they had always wanted and would not have to work to get the money. Everyone would have billion dollar homes and the nicest cars in the world. Unfortunately, we do have a limited amount of money, so the economists find ways to get around that. There are two types of economicsRead MoreEconomics : Economics Of Business1361 Words   |  6 PagesHND Accounting Economics FINAL REPORT: The Economics of Business DUE DATE: 20 May 2015 Catherine Macintosh 11006620 For the attention of Sarah Sutherland Word count: 1,243 (Excluding Acknowledgements, Abstract/Executive Summary, Terms of Reference, References Appendices TABLE OF CONTENTS Page 1.0 Costs 3 1.1 Total costs 3 1.2 Average costs Read MoreEconomics1444 Words   |  6 Pagesresource is inefficient it means the resources are not used in the best distribution by firms or organizations. An ETS is executed when the environment has been polluted and the government intervenes in order to control the pollution by providing economic encouragements towards the firms and organizations to reduce the amount of pollution emitted in the environment (Brown* 2001). When ETS is implemented it reduces the pollution of the environment caused by different firms thus making it its main goalRead MoreEconomics1654 Words   |  7 Pagesï » ¿1. What is the ‘economic problem’? The fundamental economic problem is related to the issue of scarcity. Scarcity means that resources are limited and short in supply in the world (e.g. diamond). Because of limited resources and unlimited demands, society needs to decide how much to produce and distribute these relatively scarce resources. The basic economic problem can be define as what to produce, how much to produce and for whom to produce. Some countries are lucky to have great naturalRead MoreEconomics999 Words   |  4 PagesManagerial Economics MIDTERM Exam What changes can you envision to the real economy, should Rifkin’s vision of a zero marginal cost society, become reality? For me, Jeremy Rifkin is a great social theorist. I’m mostly agreeing with him, with his conclusions and visions of the future economy. They looks like perfect and definitely it’s a â€Å"think big† way of delivering the information. His book â€Å"The Zero Marginal Cost Society† is must read, of course. Trigger is a zero marginal cost. I’m completelyRead MoreEconomics1000 Words   |  4 Pagesconsumer change, there will be a much greater change in the production output in the capital equipment required to make those consumer goods. This change in the production of capital equipment, that is , investment spending speeds up the rate of economic growth or slump Since we are focused on short-run business-cycle fluctuations here, it is reasonable to ignore changes in K/Y that may be associated with long-run advances in technology. 15 – 10 proportional to the level of output in t, Kt Read MoreEconomics1134 Words   |  5 PagesMF 7701 Managerial Economics Quiz #1 Fall 2014 Instructions: 1. You may work on this quiz alone or with as many other students as you wish. If you work with other students, please submit only one (common) answer. 2. You may not talk about this exam with anyone outside of the two managerial economics sections. 3. You may work with people from the other section if they are taking this course. In all cases, please submit only one, common answer. 4. You must e-mail your finalRead MoreEconomic Growth And Economic Development917 Words   |  4 PagesEconomic growth refers to an increase in the capacity for an economy to produce goods and services as compared from one period of time to another. It can be measured either in nominal terms which include inflation, or in real terms that are adjusted for inflation. It is mainly influenced by unemployment, inflation, technology levels, rate of investment, population growth rate, among other factors. These factors are used further to explain the differences in the varying level of output per capitaRead MoreEconomic Indicators : A Economic Indicator1337 Words   |  6 PagesIntroduction Economic Indicators are pieces of data that is usually of the macroeconomic scale that is used by investors to calculate current and future investment opportunities. They also help them decide the health of an economy. An economic indicator can be anything the investor chooses, but certain kinds of data that is released by the government and non-profit organizations are widely followed (Investopedia, 2015). Economic Indicators An economic indicator can have one of the three types