Thursday, October 31, 2019

Historiographical Review Assignment Example | Topics and Well Written Essays - 1000 words

Historiographical Review - Assignment Example This paper will provide a historiography of the way US warfare has been impacted by the use of helicopters during the Vietnam War. When the United Sates engaged Vietnam in military combat in the 60s, the former was undoubtedly the most powerful in air combat in the entire world1. However, the general idea of bombing the enemy to stone-age could not work in this case as it had worked in other wars before. This was mainly because the nature of the war was much different from those of the past. One of the major differences in this case was the fact that there was no clear definition of the enemy as one side rolled and rumbled across the skies while the other tried to garner success from the ground. The events preceding the Vietnam War include the training of South Vietnamese by the US’ Military Assistance Advisory Group according to Bradley, Jayne, and Luu. This view is also held by Wiest and Barbier. Wiest and Barbier further state that this training was conducted in the 1960s s o that the region would have the capacity to defend itself in the event of attack by its neighbors some of whom were communists. The US Air Force in a show of might presented a number of powerful planes with which their trained Vietnamese soldiers in aerial techniques and tactics. The boundary between the original objective of the US and reconnaissance however began to blur in time as the US military personnel got onboard the planes as against the Viet Cong2. Later, attacks on American planes by communist forces began prompting President Johnson to issue an order for the bombing of the communist forces. The campaign dabbed Rolling Thunder which whose operations and commands came from Washington faced serious problems as decision making and flow of command was slow. This made the Viet Cong to escape attack every so often. The use of ware planes and fighter jets became real as the war ranged in earnest. One thing however that is evoked by the mention of the Vietnam war is the sound of whirling powerful helicopter blades. Both the United States and South Vietnam used helicopters and powerful weapons in combating the enemy3. Helicopters were literally engaged in every aspect of the war according to Centennialofflight and Bradley, Jayne, and Luu. While only hoping to sell 500 units of helicopters, Bell Incorporated managed to make a big catch by selling over 15000 units of the same4. Bell’s Huey was so powerful as to be a solution to several problems including rescuing downed military personnel and cargo according to Bradley, Jayne, and Luu. Huynh. In agreement with Bradley, Jayne, and Luu, Allen further states that the Helicopters were also used for ferrying ground troops to and from the battle front. The use of helicopters proved very reliable as the mobility of ground troops increased thereby improving the efficiency of the military significantly. Apart from being used or transportation, they were also equipped with heavy armament so as to serve as gun sh ips flying over targets and destroying them with significant ease according to Heath and Everett. This kind of operation ended up being a great relief to the ground troops. In 1975, North Vietnam conquered in a couple of months South Vietnam. The US with the use of only about 70 military helicopters evacuated over 8000 individuals from Saigon in just about 18 hours5. This event has been recorded in

Tuesday, October 29, 2019

Human Activities Undermine the Environment Research Paper

Human Activities Undermine the Environment - Research Paper Example Interestingly, man’s exploitation of the environment can be traced throughout medieval history from the days of the scratch-plow and cross-plowing in the European continent; the subsequent invention of a more efficient plow that could cut the line of the furrow sharply defined man as the master of the environment rather than part of nature. Man’s power over nature has been captured vividly in western illustrated calendars before A.D. 830, which depict man as the exploiter of the environment through actions such as plowing, harvesting, chopping trees as well as butchering pigs (White, 1974). This clearly shows that man and the environment are entirely different things and that man has authority over his surroundings; in that respect, man’s exploitative relation with nature is not an entirely new phenomenon, given its documentation in medieval times. Biblically, man is charged as the custodian of the environment with all creation meant for man’s use; this al so underscores man’s authority over nature that has been the focus of Christian beliefs. The idea that man is superior to nature has inevitably informed man’s exploitative attitudes and tendencies that have in most cases rendered ecologies derelict through human maneuverings that have inevitably instigated numerous negative impacts.  There is great need for rethinking of man’s relation to nature, particularly given that the conceptualization of this man-nature relationship determines man’s impact on the environment.

Sunday, October 27, 2019

Environmental Pollution In Malaysia

Environmental Pollution In Malaysia Malaysia is rapidly developing towards being an industrial country. Many industries such as heavy and light industries, small and medium industries and backyard industries have been growing in the last ten years. The increase in industrial and agricultural activities has created a new demand in housing, urbanization, transportation and medication as the population increase. All these will contribute to environmental problems especially pollution due to the accumulation of hazardous chemicals such as heavy metals in environment. Environmental pollution has become a major issue that requires immediate action as it may effects human health. Pollution can take many forms such as water and air that we breathe. Urbanization in developed and development country, civilization and industrialization make the situation of the environment worsened as such that there is no more safe place to live. From the chemistry dictionary, pollution can be define as an undesirable change in the physical, chemical, or biological characteristics of the natural environment, brought about by mans activities. It may be harmful to human or non living things. Basically there are two main classes of pollutants which are biodegradable which means it can be rendered harmless by natural processes and need therefore cause no permanent harm if adequately dispersed or treated such as sewage. Another type is nonbiodegradable which cannot be decomposing by microbial activity. For example heavy metals such as lead, DDT and other chlorinated hydroca rbons used as pesticides, which eventually accumulate in the environment and may be concentrated in food chains. Pollution also can be describes as the introduction of foreign substances into the biosphere. It may affect the soil, rivers, seas, or the atmosphere. The pollutants that are released from the anthropogenic activities such as agricultural industries, open burning, solid waste disposal, sewage treatment plants and transportation produce hazardous and poisonous pollutants such as SO2, NOx, heavy metals and hydrocarbon compounds that effects not only human but also both plants and animals that can cause death. Some of these hazardous pollutants find their way into the human system through the food web. They may undergo biotransformation, metabolism and excreted without the risk of toxicity depending on the chemical characteristics of the compound and the dose in human body. However, some of the pollutants resist chemical and biological transformation and accumulate in the tissues, including the nerves, to cause toxicity. The adverse effects of these pollutants on the nerves system give rise to neurotoxicity. Rana et al.,(2004); Katranitsas et al., (2003) found that there is evidence that increasing exposure to toxic elements in marine and terrestrial organisms is having adverse toxicological consequences. Therefore heavy metals pollution become serious issues that must been concerned. Unlike other pollutants such as petroleum hydrocarbons and domestic and municipal litter which may visibly build up in the environment, trace metals in the environment may accumulate unnoticed to toxic levels. Generally, human health problems associated with trace metal contamination have been well-highlighted in the literature. In spite of the relatively low level of industrial activity in less developed regions there is nevertheless a high potential of toxic heavy metal pollution. The distribution of metals in the environment is a result of natural processes (volcanoes, erosion, spring water, bacterial activity) and anthropogenic activities (fossil fuel combustion, industrial and agricultural processes) (Florea and Busselberg, 2006). Heavy metals such as arsenic lead, copper, cadmium, or zinc are released from the earthà ¢Ã¢â€š ¬Ã¢â€ž ¢s crust into the environment through anthropogenic sources such as non-ferrous metal industry or non-renewable energy consumption. These substances can cause major damage to human health or to ecosystem stability even at low concentrations in soils. To overcome this issue, many countries have taken numerous initiatives especially the developed country. For example, in 2001 the European Union council signed the 1979 Convention on Long-range Transboundary Air Pollution on Heavy Metals (Europa, 2007). Therefore there are many methods to evaluate and assess the presence of these substances. One of them is biological used. The application of biological forms as the indicators is the best ways to evaluate the environmental condition. According to (Szczepaniak and Biziuk, 2003; Bargagli, 1998), in order to detect, evaluate and minimize the effects, there has been an emphasis in the use of natural bioindicators to monitor atmospheric quality in both urban and rural environments. Examples of bioindicators are lichens, fish, and mosses. One of the bioindicators that can be used is lichens. Lichens are widely known as an excellent indicator to assess our environment. Lichens play importance roles to forest communities. Lichens represent a rare source of readily digestible food at all times of year and in diverse environments due to their ability to survive in extreme climate condition. More generally, lichens act as pioneer species in barren or disturbed environments; their growth on rock surfaces is one of the primary stages of soil formation in such environments (BrÃÆ' ¥kenhielm, 1998; Cooper, 1953 in Dawson, 2008). Lichens are small, non-vascular plants consisting of a fungus and an alga growing together in one tissue. Normally lichens are found on the bark of trees, or the reindeer lichens growing on the ground, but many other species grow on rocks, fences, roofs, tombstones, and other objects. The characteristic of lichen that sensitive to the changes of the surrounding makes them as an excellent bioindicator s and biomonitors for air pollution, especially sulfur dioxide pollution, since they derive their water and essential nutrients mainly from the atmosphere rather than from the soil. A lot of studies towards lichens had been done related to pollution especially air pollution in most Europen countries and North America Asia. During the period 1973-1988, approximately 1500 papers were published on the effects of air pollution on lichens Richardson (1988) cited in Ahmadjian (1993), and many general reviews of lichens and air pollution have been compiled (Ahmadjian, 1993). The legislation about air quality that they made has been passes through out the countries especially in developing countries where air pollution is bad. In Malaysia, several studies has been conducted (Mokhtar et al., 2006) to determine the heavy metals pollution level using lichen at difference places. From the research, they found out that the sensitivity of lichens towards heavy metals vary from each species. Most of species of lichen have a wide geographical distribution, which allows for a study of pollution covering wide areas and its high capacity to accumulate metals (Burton, 1986). Hutchi nson et al., (1996) stated that lichens do not have seasonal variations and therefore accumulation of pollutants can occur all year-round. Lichens and mosses usually have considerable longevity, which led to their use as long-term integrators of atmospheric deposition (Sloof, 1993). The benefits of using lichens as quantitative biological monitors of air metal deposition compare to conventional air sampling techniques rise from that lichens are present in most terrestrial habitats, are perennial, inexpensive and easy reproduced (Baffi et al., 2002). Problem statement Nowadays the level of heavy metals in the environment increasing day by day as the world becomes much more developed. This is because the uncontrolled released of heavy metals leads to the pollution due to the excessive anthropogenic activities. The continuous loading of heavy metals into inland and coastal water make the situation worsens. Anthropogenic activities such as mining, smelting and agriculture have locally increased the levels of heavy metals such as cadmium (Cd), copper (Cu), chromium (Cr), lead (Pb), arsenic (As) and nickel (Ni) in soil up to dangerous levels for plants, animals and human beings. Although with the forest around us, the status of heavy metals level quite crucial as the result of human daily activities, dense population area near the forest and also an increasing of the transportation. These activities give adverse effect to the life being as they enter into the environment. Other than that the regulations provided by Malaysian government which is the Env ironmental Quality Act 1974 by Department of Environment, still not fully been forced due to the involvement other parties such as local authority to take action when the level of pollutants exceed the standard given especially in coastal area. This is due to the different department have different responsibilities. Nevertheless these parties can be work together to create a better life. Meanwhile due to the lack of studies towards the lichens in our country, the data obtained can help the local authority in decision making process thus maintained the quality. Besides that, it would help to make an assessment about the environmental condition and perhaps to improve environmental quality status. Objective This study was carried out in order to achieve as the followings: To quantify the heavy metals present in lichens. To evaluate the level of heavy metals in lichens. To establish the correlation of heavy metals pollutants in lichens with the surrounding environment. Significant of study By knowing that different species has different sensitivity towards heavy metals, it allow bettering understanding about the sensitivity of lichens towards heavy metals at surrounding environment. The presence or absences of species in areas can give better understanding about the sensitivity of lichens towards the pollutants. The data obtained also can be used to assess the toxicology effects not only to the lichens but also on human. Heavy metals can very toxic if the level of the pollutants higher than the limited given. The data also can create the distribution patterns of lichens at that place. The pollution level and status place also can be determined. This study provides a reference record for conducting further biomonitoring studies. Thesis organization The determination of heavy metals in lichens as bioindicators is a thesis based on previous research in different sampling location. Overall, this thesis consists of five chapters which are to assist in understanding and ease to organize through writing process. The chapters in this thesis have been organizing as follows: Chapter 2 generally discuss about the used on lichens as bioindicators. In this chapter, it also has detailed explanation on the morphology of lichens that play important role in accumulate heavy metals. It also include the history on the scientific research on lichens, the significant role on absorb the heavy metals and the effects of air pollution and metal pollution towards lichens. Chapter 3 is more focusing on research methodology. In this part, it is divided into three parts which are the description on area of study, sampling collection and lastly laboratory analysis which is the procedure to determine heavy metals using Inductively Coupled Plasma-Mass Spectrometer (ICP-MS). Chapter 4 is focusing on the results obtained and discussion. In this chapter, it discuss about the data obtained after analyze by ICP-MS. It also include the statistical tools to analyze the precision of the data obtain in order to have a good data. It also states the results and the data interpretation between the samples. Chapter 5 is the last chapter which is the conclusion. In this part, it concludes for the whole chapter in the thesis. It related on the objective of the study including the recommendation to improve the research on lichens.

Friday, October 25, 2019

Employee Compensation and Turnover Essay -- Human Resources Management

Employee Compensation and Turnover Often, "an excessively high turnover rate compared to the industry standard is a symptom of problems within the organization" (Gomez-Mejia, Balkin & Cardy 1998). Managers must realize that "high staff turnover can prove costly, particularly to small businesses" (Oliver 1998). Strategies have to be crafted that will minimize turnover and the costs associated with it. Although strategies used to retain employees can be expensive, turnover is a cyclical problem that usually becomes more expensive in the long run (Brannick 1998). Costs that organizations face when employees depart include recruitment costs associated with finding replacements, selection costs associated with interviewing, relocating and screening, training costs and separation costs such as severance pay (Gomez-Mejia, Balkin, & Cardy 1998). Managers can reward employees with tangible or intangible compensation (Brannick 1998). Tangible compensation includes salary increases, benefits, bonuses, potential for advancement a nd stock options (Brannick 1998). The good news for managers is that there are also inexpensive strategies that can be implemented to make and keep employees happy with their jobs. Intangible compensation includes respect, feedback, recognition, the opportunity to be heard and encouragement (Armentrout 1998). All of these means of compensation can be effective if managers take the time to get to know their employees and what makes them happy. The human resource function, compensation management is at the center of all of these issues. THE EFFECTS OF TURNOVER Employee turnover rate is defined as the measure of the rate at which employees leave a firm (Gomez-Mejia, Luis, Balkin & Cardy 1998). Turnover has b... ... (1998). Controlling employee turnover [5 paragraphs]. [Online]. Available WWW:http://www.auxillium.com/staffing.htm Brannick, Joan (1998). Decreasing the staggering costs of turnover in your organization [14 paragraphs]. [Online]. Available WWW:http://www.florida-speakers.com/turnover-costs.htm Condodina, Jen, Ermel, Lauren (1997). Compensating packages changing shape. HRFocus, p.S-1. Davis, Barbara (1997). Strategies for managing retention. HRFocus, p.S-3. Gomez-Mejia, Luis, Balkin, David, Cardy, Robert (1998). Managing Human Resources, New Jersey: Prentice Hall. Oliver, Judith (1998). High staff turnover- find out why your staff are leaving. Management Today, p.84. Shaw, Jason, Delery, John, Jenkins, Douglas, Gupta, Nina (1998). An organization-level analysis of voluntary and involuntary turnover. Academy of Management Journal, 41, p.511.

Thursday, October 24, 2019

Erick Ericksons Stages of Development Essay

Erick Erickson was a German psychoanalyst. His interest in identity was developed from his personal experiences he had at school. One of the main elements of his stage theory, which are known as Erikson’s Stages of Development, is the development of ego identity. Ego identity is the sense of connection or belonging between a person and a particular social religion, political group, value, sexual orientation, and so on. He believed that our ego identity changed constantly due to new experiences or different interactions you have with people daily. To explain his ideas more clearly he organized life into eight stages that start from birth to death, According to the theory if you complete each stage you will have a healthy personality and feel a sense of satisfaction with yourself. If you fail to complete each or an individual stage it can result in having an unhealthy personality or a bad self-esteem. Each stage has two outcomes. The first four stages occur in childhood, the next four are at adulthood. Since adulthood includes too many years he divided them into adolescence, middle adulthood, and seniors or maturity. The stages of development are: trust vs. mistrust, autonomy vs. hame and doubt, initiative vs. guilt, industry vs. inferiority, identity vs. identity diffusion, intimacy vs. isolation, generativity vs. stagnation, and integrity vs. despair. The fifth stage of development, identity versus identity diffusion, occurs in adolescence, which includes teens from ages 12 to 18. In this stage, adolescents discover who they really are. They begin to know what their role in gender is, what their role in society is, discover their strengths, weaknesses, and make goals. In order to accomplish this stage adolescents need to explore different identities and commit to one or try to â€Å"fit in†. I think that it is very obvious when you see a teenager in this stage because one day you might see them with a group of friends that are athletic and dressed in jerseys, running shoes and so on, then later you might see them with a group of Goths who dress in black. Deciding whether you will attend college or just go to a vocational school, and simply finding what you want to become in the future, or study is also a part of your identity, even religion and political views are part of finding out who you really are. It is a complicated process but that is why you need to mature to make the correct choices. You need the encouragement and reinforcement of your loved ones to help you. If you fail to accomplish this stage you have what is called an identity crisis or also known as a diffusion which means you are not committed to an occupation, a religion, or your cultural identity. This is considered to be a normal problem in a teenager’s life. There is a solution to this problem because but you explore the different identities and decide which one appeals to your life style and you commit to it, you are ready to move on to the next stage and be an independent adult. Erickson’s fifth stage is influenced from James Marcia identity statuses, which are, identity diffusion, foreclosure, moratorium, and identity achieved. Marcia’s ideas will help you better understand the importance of Erickson’s stages of development. Identity diffusion refers to when there is neither an identity crisis nor commitment. Identity achieved is when the person has gone through an exploration of different identities and made a commitment to one. Moratorium is the status in which the teen is currently in a crisis, while exploring a variety of identities and is ready to make choices but not ready to commit to one. Last is foreclosure which is when the adolescent is committed to an identity but they commit to an identity because it has been handed to them. These are not stages but rather a process to finding an identity. So how does this stage affect you personality? A teen who has answered the question â€Å"Who am I? †, and â€Å"Where will I go later in life†, learn fidelity. Fidelity is being loyal to a person, cause, or belief. Devotion is also learned through this stage. Devotion is defined as love, loyalty, or enthusiasm for a person, activity, or cause. You also become a more social person and do well with social relationships. Those who receive proper encouragement and reinforcement when exploring will move on to the next stage with a strong sense of self and a feeling of independence and control. Being independent is admitting you did wrong, being able to think for yourself, you also learn how to take care of yourself. We need independence in order to survive. A teen learns to be true to themselves. The other outcome to this is stage, not finding who you are, can make you confused about your role in society, and cause you to have a weak self-esteem. You can also be an insecure individual who feels lost in the world. A person that has identified diffusion may be described as disorganized, complicated, and somewhat unethical. Finding your identity is a process full of anxiety, but it is very normal for a teen to go through all this trouble. A lot of the choices you make at this point in life are influenced by your peers. This is the time of age when you get the most peer pressure, you begin to rebel against your parents, and begin to explore your role as a men or women. I believe the process might be different for a female compared to a male. So the purpose of finding an identity is to know who you are, what you want in life, and what you want to become, to be an independent individual with a strong sense of self, who knows how to develop social relationships. People will begin to look at you different when you develop an identity, and they can treat you more serious, and more like an adult.

Wednesday, October 23, 2019

Computer Hacking is Ethical

Austin Areas English Ill Honors Mrs.. Mills 14 December 2012 Computer Hacking is Ethical Computer hacking is a term that most everyone in today's society is familiar with. When the average person hears news about computer hacking, most likely they think about cyber-crimes, website defacement's, or knocking various websites offline. This inaccurate description is Just the image that today's media creates. In reality, true hackers are much different. Computer hacking is not the only type of hacking in today's society.Hacking actually originated from partaking, which is the art of racking a telephone network (â€Å"A Brief History of Computer Hacking†). Hacking is seen as being blackball, or wrong, when hacking can also be beneficial to the world. There are different types of computer hackers: â€Å"Hastiest,† ones who hack to express a political opinion, â€Å"Hobbyist† hackers, those who hack for enjoyment, and â€Å"Research hackers,† those who hack to lea rn about security and fix vulnerabilities (â€Å"License to hack? Ethical hacking†). As mentioned before, the first computer hackers were not people who were hacking to earn some quick cash. In 1878, two years after the telephone was invented y Alexander Graham Bell, a group of teenagers who worked to maintain the New York switchboard were fired because they were interested in seeing how the phone connections were made and how the calls were distributed to specific locations. Their actions were essentially the equivalent of early computer hackers.These boys were trying to break into the telephone system to understand and see how the switchboard worked (â€Å"Timeline: A 40-Year History of Hacking†). Computers were not always in the easy to use, graphical interface they are today. Along the time period of the ass, mainframe computers were very popular. Most universities and companies would have rooms dedicated to containing these mainframe computers, which were essentia lly a large chunk of metal locked away in a controlled environment. Due to the prices and exclusivity, users had to fight for time to obtain access to these slow- moving machines.Since these mainframe computers were so expensive and resource intensive, meaning they required time, knowledge, electricity, and money, computer programmers went out on a ledge to learn and create ways to speed up processes and modify hardware to increase performance speed (â€Å"Computer hacking: Where did it begin and how did it grow? ). In return, the machine would be able to complete more tasks and operations in a shorter time period. Hiring a hacker to modify one's machine in the ass and ass would definitely increase business functionality (Parks).The term â€Å"Hacker† did not earn the definition it has in today's world until the sass. Users discovered that they could apply their knowledge of the inner workings of a computer for their own gain. This was the time period when viruses, mallard, and other nasty cyber infections were created to earn their coder or hacker money (â€Å"Timeline: A 40-Year History of Hacking†). In the early sass, a man named John Draper discovered that he could recreate the pitch a telephone used by using a whistle obtained from a box of cereal.By using this whistle, Draper could recreate the 2600-hertz audio tone and score some free long-distance calls. Draper's actions were one of the first illegal actions committed by a hacker, which earned him the nickname â€Å"Captain Crunch. † Later in the sass, devices called â€Å"Blue Boxes† were invented by a computer club in California. These boxes were used to help change a tone to match the tone created by a telephone, thus making telephone tampering easier to use. These boys went by the names of Steve Jobs and Steve Woozier, the creators of Apple Inc. â€Å"Timeline: A 40-Year History of Hacking†). Attention towards partaking was created during this decade, resulting i n a few computer and telephone hacking magazines being created. These magazines would benefit those who wanted to become partakers and computer hackers, by teaching them techniques, and giving access to those who had already accomplished these illegal acts (â€Å"Timeline: A 40-Year History of Hacking†). Another effect from the huge amounts of attention towards hackers was a new law being passed, called The ComprehensiveCrime Control Act, giving the Secret Service Jurisdiction over cases including credit card and computer fraud (â€Å"INCURS Abstract†). Later in 1987, a seventeen-year-old hacks into AT's computer network, which led to his arrest. This boy was caught because he did want most teenage boys do, he bragged on an online bulletin board about it. Federal authority says he committed the hacking from his bedroom, and was one step away from breaching into AT&T's switching system, the system that controlled most of the nation's communication access fine (â€Å"Ti meline: A 40-Year History of Hacking†).In the year 1988 the first self-replicating virus was created by a twenty-two year old graduate named Robert Morris from Cornell University that was designed to take advantage of an exploit in UNIX-based systems. The Morris-worm, named after the creator, infected nearly one tenth of machines connected to the internet. Morris was arrested for releasing the virus and was sentenced to three years of probation, 400 hours of community service, and a $10,000 fine (â€Å"Zen and the Art of the Internet†).No other major hacks occurred until the mid to late ass, when two hackers known as Data Stream hacked into computers and systems owned by institutions such as NASA and Korean Atomic Research Institute. One of the two was caught by detectives form Scotland Yard and was discovered to be sixteen years old (â€Å"The Case Study: Rome Laboratory, Griffins Air Force Base, and NY Intrusion†). The year after, Vladimir Levin allegedly used his laptop to transfer funds from Citibank's computer network to various accounts across the world. Eventually Levin was extradited to the US, sentenced to three years in prison, and ordered to pay Citibank $240,000.The exact amount of money stolen is unknown, but is estimated to be around $3. -$10 million, not all of which has been recovered (â€Å"How To Hack A Bank†). Later that year legendary computer hacker Kevin Nitpick was arrested in Raleigh, North Carolina, and accused of breaking security violations, such as copying computer software, breaking into various networks and stealing information, including close to 20,000 credit cards. He spent four years in Jail without trial and was released in early 2000. Nitpick was accused of crimes dating back to the mid-sass (â€Å"Timeline: A 40-year history of hacking†).After the year 2000, many to most cyber- attacks or hacks have been caused by mallard users unknowingly downloading them onto their PC. Most newly created enamelware bypasses anti-virus scans, which means no one is ever one hundred percent safe on the internet. The graph below displays the type of virus or mallard threats received on various US computers (â€Å"Microsoft Security Intelligence Report†). Every computer hacker is powered by a motive or several motives. Usually malicious hackers are motivated from self-gain, either money or fame.Malicious programmers create mallard programs to do their bidding; such software can log every key one presses, steal sensitive data such as passwords for personal and banking websites, r add one's computer to a ring of infected computers that can be used to Dos websites (â€Å"Ethics in Computing†). A Dos attack is when packets of data are sent to a Webster that eventually overload the server with data to the point where the server crashes, therefore knocking the website offline. More recently, Anonymous has taken credit for Dosing major banking websites offline (â€Å"Bank of Amer ica Hit By Anonymous Dos Attack†).There are many different types of Dos attacks; the most common is a JODI Flood, which sends a JODI packet to random ports on a server. When a packet is sent to a port where there is no application listening on that port, the server replies with a Destination Unreachable packet, so the server has to respond to every single JODI Packet with an Unreachable; the part that crashes the server is when the Unreachable Packet is sent (â€Å"UDP Flood Attack†). Hackers sometimes will sell their bootee, which is the term that describes a ring of infected computers.When a hacker sells or rents his bootee, the infected PC's are transferred over to the buyer for their use, which is usually for more illegal Dos attacks. There is extremely easy money when it comes to selling information attained from hacking, whether it is selling hacked website accounts for popular websites like Youth or websites that require a monthly subscription. Most of the transa ctions are made online and are close to untraceable. Finding a competent hacker on the internet is the equivalent of going to Iraq and looking for AY Quad.Hackers know how to hide, where to hide, and how to stay safe (â€Å"Hackers Selling Cheap BOOTEES and DOS on Forums†). Even though hackers know how to hide, that does not mean they cannot get caught. Hacker Jon Paul Soon illegally hacked into his previous employer's network with malicious intent. This network was a medical network that contained health records, names, addresses, and provided services to seventeen different clinics in San Diego. Soon was punished with five years in prison and a combined fine of over four hundred thousand dollars, along with a ban from using a computer (â€Å"Hackers: Crimes and punishments†).Teenage hackers usually get off easier, with punishments like time in a Juvenile center, a ban from computers, community service, or very light prison sentences depending on age. FBI informant Ma x Butler was a hacker who was charged in 2001 with possession of stolen passwords, computer intrusion, and thirteen other counts. He risked going to prison for forty years because he decided to stop helping the FBI catch other hackers. These are Just a few cases of the risks hackers take for the thrill or self-gain from hacking (â€Å"5 Of the World's Most Famous Hackers & What Happened to Them†).With such strong consequences, one might wonder why an individual would want to become a computer hacker. Internet users become hackers because they know how to work the system; they know how to yap's the law and do close to anything they want (â€Å"The Hacker Work Ethic†). Hackers are purely cyber thieves who terrorize innocent users using their superior knowledge of how computers and the internet work. There are indeed an abundance of hackers who have malicious intent, but there are those who hack for a higher purpose (Roberts).Identifying what type of hacker one is dealing with is extremely easy; all one must do is look at the end product and ask a few questions. Is this hacker trying to steal information? Is the hacker trying to infect systems? If so, then that hacker is malicious. Other hackers hack for the learning experience. They want to learn more about computers and how systems change when modifying specifications. Hacker Sarah Flannels describes the work she put into her encryption algorithm as, â€Å"l had a great feeling of excitement †¦ Worked constantly for whole days on end, and it was exhilarating.There were times when I never wanted to stop. † Pursuing knowledge has been the fuel for many computer users since the first computers were created in the sass. These people live by the idea that the best way to learn is to take a hands on approach (â€Å"Types of computer hackers†). Contrary to black hat hackers, a type of hacker exists known as the white hat hacker. White hat hackers are the people who help infected users on the web. Many black hat hackers such as Kevin Nitpick, Kevin Paulsen, and Mark Been have turned white hat after serving time in prison or on probation (â€Å"12 â€Å"White Hat† hackers you should know').Not only to white hat hackers try to reverse the effects of black hats, but they also hack websites. Many businesses hire penetration testers, A. K. A. White hat hackers to try to penetrate the businesses' servers or databases to test how protected the businesses' websites are. Penetration testers, commonly referred to as Pen Testers, report back any exploits they have covered while hacking their employer's website or database, and then they patch the exploit, thus making a safer internet.Companies believe that if a white hat hacker can penetrate their security, then so can a mischievous black hat hacker (â€Å"tithe hat' hackers in demand†). An example of a famous white hat hacker is computer analyst and expert Touts Samurai, who police used to track down and appr ehend Kevin Nitpick in 1995 after Nitpick had evaded the FBI for years, and caused well over $100,000 in damage to systems belonging to Motorola, Monika, Sun Microsystems, and NECK (â€Å"The trials of Kevin MitoticThis is Just one example of a hacker being caught by another hacker. Police computer security analysts and hackers to look decipher cyber evidence that is related to crimes under investigation, along with cyber-forensics to break down crimes and solve them quickly (â€Å"The Kevin Nitpick/ Touts Samurai affair†). Hollywood has also tried to portray computer hacking in movies such as Hackers, from 1995, and War Games from 1983.The movie Hackers is about two computer hackers named Crash Override and Acid Burn, who seemingly fight each other with silly fonts and awful homepage graphics. Later on in the movie, he US Secret Service is involved when another associate of Overrides hacks into a school's mainframe and downloads a garbage file. This file actually contained a computer virus that could apparently capsize the company's oil tanker fleet. After a few other friends are arrested, everyone is cleared of their charges and the movie ends happily.In reality, all of these hackers would have been in prison, and would not had their charges dropped, not to mention the fact that a company had the code to a computer virus that could control their entire oil tanker fleet on a garbage file in their easily hackle mainframe (â€Å"Hackers†). Legitimate hackers later defaced the movie Hacker's website to express how they felt about the silliness in this movie (â€Å"Hacked Movie Site†). Nothing really big happened, only some text was changed and a few pictures were defaced with satirical pictures drawn over them.The website still has the hacked version of their website mirrored, meaning it is still accessible to the web. Included in the text of the defaced website were lines describing how Hollywood misunderstands technology and will never be able to comprehend the hard work and time needed to perform some of the acts that hackers accomplish. No en can tap a few keys on a keyboard and hack into a company's mainframe, website, or database.Hackers included a scene where someone managed to access a supercomputer with Just the password â€Å"GOD† and has the UNIX operating system replaced with some other three dimensional interface does not represent the real world in any manner (â€Å"Episode – Hackers†). The movie Live Free or Die Hard also butchers computer hacking in the sense that the computer hacks in it are so good at hacking that they can control entire cities, including quotes like â€Å"Okay, I want you to hack into that traffic light and make it red.Almost all of the incredible feats provided by Hollywood in movies is practically impossible, or would require months of research to perform. Many hackers believe that Hollywood will never portray legitimate hackers correctly (â€Å"Hollywood Ha cking – Television Tropes & Idioms†). Computer fanatics are compelled by the mystery of the machine. When Mr.. Hake, the Computer Applications teacher from Erwin High was asked why he was so fascinated by computers when he first had access to them, he replied with, â€Å"They were new and exciting; no one really knew where we were going to go with amputees, but everyone seemed to want to use them. † Mr..Hake described that people were compelled to study computers due to their mysteriousness and interesting possibilities (Hake). Switching from being a computer fanatic to being a computer hacker can happen really quickly when one may see how easy earning, or stealing money actually is on the internet. Or maybe the thrill of breaking past security will push the moderately to advanced computer user to turn to the dark side of computer hacking. Malicious hackers will always have a hard time as long as the be is full of white hat hackers to make their Job, or hobby mor e difficult (â€Å"Meaning of Hacking and the Different Kinds of Hackers†).In conclusion, not every person who knows their way around a computer's boundaries is unethical. While there are many intelligent and malevolent hackers loose on the web, it is still a safe place. Today's media does not accurately portray hackers or the hacker's philosophy, and neither do cut-rate Hollywood movies. Media websites control how civilians see cyber criminals, due to that factor, most innocents see hackers has people who are out to no good. The white knights of the internet are never given the appreciation they deserve, because of them we are as safe as we are now.White hat hackers have patched countless exploits caused by bad-natured hackers. Governments can Jail as many hackers as they want, but they can never Jail a philosophy. Hackers will always exist; they will always be out to gain something out of their exploits. Society needs to understand that hackers also hack to prevent collater al damage, or to catch the worst of the worst hackers. There are good hackers and bad hackers, Just as there are good people and bad people; not all hackers are unethical.