Sunday, December 29, 2019

Rhetorical Analysis Of Ted Talk - 1075 Words

â€Å"Stop trying to be good people.† It is only human to be biased. However, the problem begins when we allow our bigotry to manifest into an obstacle that hinders us from genuinely getting to know people. Long time diversity lawyer, Verna Myers, in her 2014 Ted Talk, â€Å"How to overcome our biases? Walk boldly toward them† discusses the implicit biases we may obtain when it comes to race, specifically black men. Myers purpose is quite like the clichà © phrase â€Å"Face your fears.† Her goal is to impress upon us that we all have biases (conscious or unconscious). We just have to be aware of them and face them head on, so that problems such as racism, can be resolved. Throughout the Ted Talk, Verna Myers utilizes an admonishing yet entertaining tone in†¦show more content†¦That â€Å"contamination† is sheer narrow-mindedness. In relation to the â€Å"Implicit association test,† which â€Å"measures unconscious bias,† Myers ackno wledges that â€Å"Seventy percent of white people taking that test prefer white.† Not only do â€Å"white people prefer† someone of their race, but â€Å"Fifty percent of black people taking that test prefer white† as well. Informing us of the results from the â€Å"IAT (Implicit Association Test)† helps showcase that there is a clear bias among us that â€Å"we’ve been schooled in.† Myers provides this data in order to further justify that we all play a role in â€Å"the prejudices that fuel those kinds of tragic incidents† that happened to the black men mentioned in the previous paragraph. Conversely with a grandiose tone, the diversity advocate explains that the problem isn’t so much that â€Å"we see color† it’s â€Å"what we do when we see the color.† Bringing this issue to light is effective in the sense that it makes her audience re-evaluate their standpoint within these specific instances. Are the ir prejudices a part of the problem?† Yes. Verna Myers is well aware that â€Å"we are not shooting people down in the street†; nonetheless, we still contribute to the issue until we areShow MoreRelatedAnalysis Of Hillary Clintons Illness Revealed By Dr. Ted Noel1337 Words   |  6 Pagespotential president of the United States, Hillary Clinton, had an illness that could possibly make her incapable of running the country? How would you react? Apparently there is more to Clinton than we know. This analysis will over view the YouTube video of â€Å"Hillary Clintons Illness Revealed† by Dr. Ted Noel. Noel goes in depth about Clinton’s potential disease and his evidence he researched on incidents that make Clinton susceptible to being linked to Parkinson’s disease. Even though there are incidentsRead MoreRhetorical Analysis Essay examples848 Words   |  4 Pagesï » ¿Neil Boris Dr. Coyle Engl-101E 19 Sept. 2014 Rhetorical Analysis of â€Å"A Guerilla Gardener in South Central L.A.† In South Central, Los Angeles, there is a food epidemic taking place among the population. For miles and miles, the only easily attainable food source is fast food; causing the overconsumption of un-nutritious, greasy, and fattening food. This is the problem brought to the public’s attention by speaker Ron Finley in his Ted Talks speech, â€Å"A Guerilla Gardener in South Central L.A.† FinleyRead MoreEssay on Written Speech Analysis - Sunni Brown- Doodlers, Unite!1288 Words   |  6 PagesPlaybook for Innovators, Rulebreakers, and Changemakers†, makes a sound and coherently proficient case in which she suggests that the definition of ‘Doodling’ be changed to â€Å"make spontaneous marks to help yourself think†. Brown’s speech at the March 2011 ‘TED’ conference in Long Beach, California before academics and her peers, was entitled â€Å"Doodlers, unite!†. She suggests in a both informative and persuasive manner that the act of doodling is undervalued, at times ridiculed but more often than not willRead MoreAn Evaluation Of Iranian Artist And The Role2283 Words   |  10 Pagesright to do it. It could still be done in such a way that it s not aggressive or overly didactic. I m trying to find that form. (Neshat) . However, before I do any of this I must first define a few terms that will be essential throughout this analysis. Coming from a critical rhetoric background, I will apply some terms and theories from various scholars in that field as well to give a better understanding of the material being studied. David R. Croteau discusses hegemony in detail in chapterRead MoreHow Art Is Affected By Hegemony And Vice Versa2218 Words   |  9 PagesEastern societies that often are run by patriarchal governments. And how that affects the message and or the ability for women to be artistic. However, before I do any of this I must first define a few terms that will be essential throughout this analysis. Coming from a critical rhetoric background, I will apply some terms and theories from various scholars in that field as well to give a better understanding of the material being studied. David R. Croteau discusses hegemony in detail in chapterRead MoreCultural Imperialism And Iranian Art2292 Words   |  10 Pagesright to do it. It could still be done in such a way that it s not aggressive or overly didactic. I m trying to find that form. (Neshat,2016) However, before I do any of this I must first define a few terms that will be essential throughout this analysis. Coming from a critical rhetoric background, I will apply some terms and theories from various scholars in that field as well to give a better understanding of the material being studied. David R. Croteau discusses hegemony in detail in chapterRead MoreMutilating Self Into Spirit: Sylvia Plaths Poems.4131 Words   |  17 Pagessometimes using irony changes the actual theme of the context. Therefore it is very important to be careful while using irony, as it is a very important element. The Design of the paper: The paper is divided into three major parts. Firstly, the analysis of the poem â€Å"Daddy†, secondly, relating the poem with the essay and lastly, looking at the poem, â€Å"lady lazarus† in the light of the earlier discussion. About her personal life: Born in Boston, Massachusetts, Plath was the eldest child of AureliaRead MoreGeorge W Bush s Presidency Essay2151 Words   |  9 Pagespolicy towards these states was going be (Baxter and Akbarzadeh, 2008). This comment would then define George W Bush’s presidency, due to the controversy over this phrase and the results that it would have on US foreign policy as â€Å"rarely had such a rhetorical device had such devastating consequences† (Ansari, 2006:186). This paper will argue how the use of the word ‘evil’, and the categorisation of these ‘evil’ countries, had a large impact on US-Iran relations. The hypothesis of this essay will focusRead MorePoem Analysis of Lady Lazarus by Sylvia Plath3011 Words   |  13 PagesPoem Analysis: Lady Lazarus In American culture, suicide is considered to be one of the darkest taboos. It has the particular quality of being equally gripping and repulsive. Although suicide is seen as overtly morbid, gruesome and disturbing, it has made many people famous. Sylvia Plath, the illustrious 20th century poetess, is one of them. Sylvia Plath was born on October 27th, 1932 of two parents in a middleclass household in Boston. At a very young age, she demonstrated great literary talentRead MoreMetamorphoses Within Frankenstein14861 Words   |  60 Pagessuch established Pro methean masterpieces as Shelley’s Prom eth eus Unbound and Byron’s Manfred’, to quote Sandra Gilber t and Susan Gubar, and Mary Shelley her self only acknowledged because of the ‘literary /familial relationships’ sh e repr esen ted.5 G ilb ert and Gubar may well hav e had in mind H arold Bloom’s influen tial visionary h ierar chy: what mak es Frankenstein an importan t book, though it is only a strong, flawed novel with frequen t clumsiness in its narr ative and characterization

Saturday, December 21, 2019

Anatomy Evolution Worksheet Essay - 1692 Words

Howard Hughes Medical Institute 2011 Holiday Lectures on Science Skeletons Reveal Human and Chimpanzee Evolution Student Worksheet About This Worksheet This worksheet complements the Click and Learn â€Å"Skeletons Reveal Human and Chimpanzee Evolution† developed in conjunction with the 2011 Holiday Lectures on Science, â€Å"Bones, Stones, and Genes: The Origin of Modern Humans†. Author: Mark Eberhard, St. Clair High School Web Link: www.hhmi.org/biointeractive/skeletons-reveal-human-and-chimpanzee-evolution Click the arrow in the bottom right corner of the screen to proceed to Slide 2 and begin the Click and Learn. 1. What is a phylogenetic tree used to illustrate? __________________________________________________ A phylogenetic tree is used to†¦show more content†¦8. Bones are one anatomical feature that can provide a wealth of information. List SEVEN things scientists can learn about an organism by examining its bones. a. Bones reveal an animals size and shape. ____________________________________________________________________________________ b. Bone composition reveals age. ____________________________________________________________________________________ c. ____________________________________________________________________________________ A ridge on the skull tells you about the size of the muscles that control the lower jaw. d. The position of the eyes may indicate whether an animal is prey or predator. ____________________________________________________________________________________ e. ____________________________________________________________________________________ Teeth tell you about diet and social behavior. f. The size and shape of the pelvis gives clues to how an animal may reproduce. ____________________________________________________________________________________ g. ____________________________________________________________________________________ The pelvis and spine tell you whether on organism walked upright or on all fours. Proceed to Slide 13. Click on the video of Dr. White to listen to his description of the discovery of Ardipithecus ramidus, or Ardi, and then answer the following questions. 9. Once the finger bones of Ardi wereShow MoreRelatedDiscussion Of A Discussion Leader s Worksheet1633 Words   |  7 PagesBI 222 Discussion Leader’s Worksheet Your name: Emily Hansen Name of Taxon (clade): Chondrichthyes and Osteichthyes Description How do they†¦ Obtain food They are predators; mostly carnivores that feed on fish, squid, molluscs, crustaceans and marine animals; some are herbivores that feed on plankton. They can also be filter-feeders or scavengers. They are heterotrophs and predators; they can be omnivores, herbivores, carnivores, or detritivores. Some species use suction feeding, in which theyRead MoreNfpa 100630569 Words   |  123 Pagesregarding a particular excavation. 3.3.47 Cut Station. A functional area or sector that utilizes lumber, timber, and an assortment of hand and power tools to complete operational objectives for stabilizing or shoring at a rescue incident or training evolution. 3.3.48 Decontamination. The removal or neutralization of a hazardous material from equipment and/or personnel. 3.3.49 Descending a Line. A means of traveling down a fixed line using a descent control device. 3.3.50 Descent Control Device. An auxiliaryRead MoreNfpa 100630576 Words   |  123 Pagesregarding a particular excavation. 3.3.47 Cut Station. A functional area or sector that utilizes lumber, timber, and an assortment of hand and power tools to complete operational objectives for stabilizing or shoring at a rescue incident or t raining evolution. 3.3.48 Decontamination. The removal or neutralization of a hazardous material from equipment and/or personnel. 3.3.49 Descending a Line. A means of traveling down a fixed line using a descent control device. 3.3.50 Descent Control Device. An auxiliaryRead MoreSolution Manual, Test Bank and Instructor Manuals34836 Words   |  140 PagesBrands (TB) Americas Courts and the Criminal Justice System, 10th Edition_David W. Neubauer, Henry F. Fradella (IM+TB) An Applied Course in Real Options Valuation, 1st Edition_Richard L. Shockley (SM) An Integrated Approach to Health Sciences Anatomy and Physiology, Math, Chemistry and Medical Microbiology, 2nd Edition _Bruce J. Colbert, Jeff Ankney, Joe Wilson, An Introduction to Derivatives and Risk Management, 7th Edition_Don M. Chance,Robert Brooks (SM+TB+Technical Notes) An IntroductionRead MoreLibrary Management204752 Words   |  820 PagesConclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 . .6 . .6 . .8 . .8 . 10 . 12 . 13 . . . . . . . 16 . . . . . . . 17 2—The Evolution of Management Thought . . . . . . . . . . . 19 Management in Ancient History . . . . . . . . . . . . . . . . . . . 20 The Effects of the Industrial Age on Management . . . . . 22 Classical Perspectives . . . . . . . . . . . . . . . . . . . . . .

Friday, December 13, 2019

10 Worst Computer Viruses of All Time Free Essays

string(36) " Onel de Guzman of the Philippines\." 10 Worst Computer Viruses of All Time Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you’ve never had a machine fall victim to a computer virus, you may wonder what the fuss is about. We will write a custom essay sample on 10 Worst Computer Viruses of All Time or any similar topic only for you Order Now But the concern is understandable — according to Consumer Reports, computer viruses helped contribute to $8. 5 billion in consumer losses in 2008 [source: MarketWatch]. Computer viruses are just one kind of online threat, but they’re arguably the best known of the bunch. Computer viruses have been around for many years. In fact, in 1949, a scientist named John von Neumann theorized that a self-replicated program was possible [source: Krebs]. The computer industry wasn’t even a decade old, and already someone had figured out how to throw a monkey wrench into the figurative gears. But it took a few decades before programmers known as hackers began to build computer viruses. While some pranksters created virus-like programs for large computer systems, it was really the introduction of the personal computer that brought computer viruses to the public’s attention. A doctoral student named Fred Cohen was the first to describe self-replicating programs designed to modify computers as viruses. The name has stuck ever since. |Old-school Viruses | |Some of the earliest viruses to infect personal computers included the Apple Viruses, which attacked Apple II computers | |and the Brain virus, which could infect PCs. | In the good old days (i. e. , the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and then distribute the disks to other people. It wasn’t until modems became common that virus transmission became a real problem. Today when we think of a computer virus, we usually imagine something that transmits itself via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs like these can spread much faster than the earliest computer viruses. We’re going to take a look at 10 of the worst computer viruses to cripple a computer system. Let’s start with the Melissa virus. Worst Computer Virus 10: Melissa In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus â€Å"Melissa,† saying that he named it after an exotic dancer from Florida [source: CNN]. [pic] Daniel Hulshizer/AFP/Getty Images A courtroom photo of David L. Smith, the alleged creator of the Melissa virus. Rather than shaking its moneymaker, the Melissa computer virus tempts recipients into opening a document with an e-mail message like â€Å"Here is that document you asked for, don’t show it to anybody else. † Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient’s e-mail address book. The virus spread rapidly after Smith unleashed it on the world. The United States federal government became very interested in Smith’s work — according to statements made by FBI officials to Congress, the Melissa virus â€Å"wreaked havoc on government and private sector networks† [source: FBI]. The increase in e-mail traffic forced some companies to discontinue e-mail programs until the virus was contained. After a lengthy trial process, Smith lost his case and received a 20-month jail sentence. The court also fined Smith $5,000 and forbade him from accessing computer networks without court authorization [source: BBC]. Ultimately, the Melissa virus didn’t cripple the Internet, but it was one of the first computer viruses to get the public’s attention. Flavors of Viruses In this article, we’ll look at several different kinds of computer viruses. Here’s a quick guide to what we’ll see: †¢ The general term computer virus usually covers programs that modify how a computer works (including damaging the computer) and can self-replicate. A true computer virus requires a host program to run properly — Melissa used a Word document. †¢ A worm, on the other hand, doesn’t require a host program. It’s an application that can replicate itself and send itself through computer networks. †¢ Trojan horses are programs that claim to do one thing but really do another. Some might damage a victim’s hard drive. Others can create a backdoor, allowing a remote user to access the victim’s computer system. Next, we’ll look at a virus that had a sweet name but a nasty effect on its victims. Worst Computer Virus 9: ILOVEYOU A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm — it was a standalone program capable of replicating itself. It bore the name ILOVEYOU. [pic] Robyn Beck/AFP/Getty Images A screenshot of the ILOVEYOU computer virus The ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU. TXT. vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting [source: McAfee]. According to anti-virus software producer McAfee, the ILOVEYOU virus had a wide range of attacks: †¢ It copied itself several times and hid the copies in several folders on the victim’s hard drive. †¢ It added new files to the victim’s registry keys. †¢ It replaced several different kinds of files with copies of itself. †¢ It sent itself through Internet Relay Chat clients as well as e-mail. †¢ It downloaded a file called WIN-BUGSFIX. EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker’s e-mail address. Who created the ILOVEYOU virus? Some think it was Onel de Guzman of the Philippines. You read "10 Worst Computer Viruses of All Time" in category "Essay examples" Filipino authorities investigated de Guzman on charges of theft — at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence, the Filipino authorities dropped the charges against de Guzman, who would neither confirm nor deny his responsibility for the virus. According to some estimates, the ILOVEYOU virus caused $10 billion in damages [source: Landler]. Gotcha! As if viruses, worms and Trojan horses weren’t enough, we also have to worry about virus hoaxes. These are fake viruses — they don’t actually cause any harm or replicate themselves. Instead, the creators of these viruses hope that people and media companies treat the hoax as if it were the real deal. Even though these hoaxes aren’t immediately dangerous, they are still a problem. Like the boy who cried wolf, hoax viruses can cause people to ignore warnings about real threats. Now that the love fest is over, let’s take a look at one of the most widespread viruses to hit the Web. Worst Computer Virus 8: The Klez Virus [pic] Joe Raedle/Getty Images Fortunately for consumers, there’s no shortage of antivirus software suites on the market. The Klez virus marked a new direction for computer viruses, setting the bar high for those that would follow. It debuted in late 2001, and variations of the virus plagued the Internet for several months. The basic Klez worm infected a victim’s computer through an e-mail message, replicated itself and then sent itself to people in the victim’s address book. Some variations of the Klez virus carried other harmful programs that could render a victim’s computer inoperable. Depending on the version, the Klez virus could act like a normal computer virus, a worm or a Trojan horse. It could even disable virus-scanning software and pose as a virus-removal tool [source: Symantec]. Shortly after it appeared on the Internet, hackers modified the Klez virus in a way that made it far more effective. Like other viruses, it could comb through a victim’s address book and send itself to contacts. But it could also take another name from the contact list and place that address in the â€Å"From† field in the e-mail client. It’s called spoofing — the e-mail appears to come from one source when it’s really coming from somewhere else. Spoofing an e-mail address accomplishes a couple of goals. For one thing, it doesn’t do the recipient of the e-mail any good to block the person in the â€Å"From† field, since the e-mails are really coming from someone else. A Klez worm programmed to spam people with multiple e-mails could clog an inbox in short order, because the recipients would be unable to tell what the real source of the problem was. Also, the e-mail’s recipient might recognize the name in the â€Å"From† field and therefore be more receptive to opening it. Antivirus Software It’s important to have an antivirus program on your computer, and to keep it up to date. But you shouldn’t use more than one suite, as multiple antivirus programs can interfere with one another. Here’s a list of some antivirus software suites: †¢ Avast Antivirus †¢ AVG Anti-Virus †¢ Kaspersky Anti-Virus †¢ McAfee VirusScan †¢ Norton AntiVirus Several major computer viruses debuted in 2001. In the next section, we’ll take a look at Code Red. Worst Computer Virus 7: Code Red and Code Red II [pic] Chris Hondros/Getty Images The CERT Coordination Center at Carnegie-Mellon university published an advisory alerting the public to the dangers of the Code Red virus. The Code Red and Code Red II worms popped up in the summer of 2001. Both worms exploited an operating system vulnerability that was found in machines running Windows 2000 and Windows NT. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White House. That means all the computers infected with Code Red tried to contact the Web servers at the White House at the same time, overloading the machines. A Windows 2000 machine infected by the Code Red II worm no longer obeys the owner. That’s because the worm creates a backdoor into the computer’s operating system, allowing a remote user to access and control the machine. In computing terms, this is a system-level compromise, and it’s bad news for the computer’s owner. The person behind the virus can access information from the victim’s computer or even use the infected computer to commit crimes. That means the victim not only has to deal with an infected computer, but also may fall under suspicion for crimes he or she didn’t commit. While Windows NT machines were vulnerable to the Code Red worms, the viruses’ effect on these machines wasn’t as extreme. Web servers running Windows NT might crash more often than normal, but that was about as bad as it got. Compared to the woes experienced by Windows 2000 users, that’s not so bad. Microsoft released software patches that addressed the security vulnerability in Windows 2000 and Windows NT. Once patched, the original worms could no longer infect a Windows 2000 machine; however, the patch didn’t remove viruses from infected computers — victims had to do that themselves. What do I do now? What should you do if you find out your computer has been hit with a computer virus? That depends on the virus. Many antivirus programs are able to remove viruses from an infected system. But if the virus has damaged some of your files or data, you’ll need to restore from backups. It’s very important to back up your information often. And with viruses like the Code Red worms, it’s a good idea to completely reformat the hard drive and start fresh. Some worms allow other malicious software to load onto your machine, and a simple antivirus sweep might not catch them all. Worst Computer Virus 6: Nimda [pic] SMobile Systems The Symbian Skull Virus affects cell phones, causing them to display a series of skull images like this. Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time. In fact, according to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks [source: Anthes]. The Nimda worm’s primary targets were Internet servers. While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail. This helped spread the virus across multiple servers in record time. The Nimda worm created a backdoor into the victim’s operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker would also have limited access to the computer’s functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control. The spread of the Nimda virus caused some network systems to crash as more of the system’s resources became fodder for the worm. In effect, the Nimda worm became a distributed denial of service (DDoS) attack. Phoning it In Not all computer viruses focus on computers. Some target other electronic devices. Here’s just a small sample of some highly portable viruses: †¢ CommWarrior attacked smartphones running the Symbian operating system (OS). The Skulls Virus also attacked Symbian phones and displayed screens of skulls instead of a home page on the victims’ phones. †¢ RavMonE. exe is a virus that could infect iPod MP3 devices made between Sept. 12, 2006, and Oct. 18, 2006. †¢ Fox News reported in March 2008 that some electronic gadgets leave the factory with viruses pre-installed — these viruses attack your computer when you sync the d evice with your machine [source: Fox News]. Next, we’ll take a look at a virus that affected major networks, including airline computers and bank ATMs. Worst Computer Virus 5: SQL Slammer/Sapphire pic] Chung Sung-Jun/Getty Images The Slammer virus hit South Korea hard, cutting it off from the Internet and leaving Internet cafes like this one relatively empty. In late January 2003, a new Web server virus spread across the Internet. Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank of America’s ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. The culprit was the SQL Slammer virus, also known as Sapphire. By some estimates, the virus caused more than $1 billion in damages before patches and antivirus software caught up to the problem [source: Lemos]. The progress of Slammer’s attack is well documented. Only a few minutes after infecting its first Internet server, the Slammer virus was doubling its number of victims every few seconds. Fifteen minutes after its first attack, the Slammer virus infected nearly half of the servers that act as the pillars of the Internet [source: Boutin]. The Slammer virus taught a valuable lesson: It’s not enough to make sure you have the latest patches and antivirus software. Hackers will always look for a way to exploit any weakness, particularly if the vulnerability isn’t widely known. While it’s still important to try and head off viruses before they hit you, it’s also important to have a worst-case-scenario plan to fall back on should disaster strike. A Matter of Timing Some hackers program viruses to sit dormant on a victim’s computer only to unleash an attack on a specific date. Here’s a quick sample of some famous viruses that had time triggers: †¢ The Jerusalem virus activated every Friday the 13th to destroy data on the victim computer’s hard drive †¢ The Michelangelo virus activated on March 6, 1992 — Michelangelo was born on March 6, 1475 †¢ The Chernobyl virus activated on April 26, 1999 — the 13th anniversary of the Chernobyl meltdown disaster †¢ The Nyxem virus delivered its payload on the third of every month, wiping out files on the victim’s computer Computer viruses can make a victim feel helpless, vulnerable and despondent. Next, we’ll look at a virus with a name that evokes all three of those feelings. Worst Computer Virus 4: MyDoom [pic] Alex Wong/Getty Images The MyDoom virus inspired politicians like U. S. Senator Chuck Schumer to propose a National Virus Response Center. The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer’s operating system. The original MyDoom virus — there have been several variants — had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 2, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec]. Later that year, a second outbreak of the MyDoom virus gave several search engine companies grief. Like other viruses, MyDoom searched victim computers for e-mail addresses as part of its replication process. Bu t it would also send a search request to a search engine and use e-mail addresses found in the search results. Eventually, search engines like Google began to receive millions of search requests from corrupted computers. These attacks slowed down search engine services and even caused some to crash [source: Sullivan]. MyDoom spread through e-mail and peer-to-peer networks. According to the security firm MessageLabs, one in every 12 e-mail messages carried the virus at one time [source: BBC]. Like the Klez virus, MyDoom could spoof e-mails so that it became very difficult to track the source of the infection. Oddball Viruses Not all viruses cause severe damage to computers or destroy networks. Some just cause computers to act in odd ways. An early virus called Ping-Pong created a bouncing ball graphic, but didn’t seriously damage the infected computer. There are several joke programs that might make a computer owner think his or her computer is infected, but they’re really harmless applications that don’t self-replicate. When in doubt, it’s best to let an antivirus program remove the application. Next, we’ll take a look at a pair of viruses created by the same hacker: the Sasser and Netsky viruses Worst Computer Virus 3: Sasser and Netsky [pic] David Hecker/AFP/Getty Images Sven Jaschan, creator of the Sasser and Netsky viruses, leaves the Verden Court. Sometimes computer virus programmers escape detection. But once in a while, authorities find a way to track a virus back to its origin. Such was the case with the Sasser and Netsky viruses. A 17-year-old German named Sven Jaschan created the two programs and unleashed them onto the Internet. While the two worms behaved in different ways, similarities in the code led security experts to believe they both were the work of the same person. The Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn’t spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed them to download the virus. The virus would scan random IP addresses to find potential victims. The virus also altered the victim’s operating system in a way that made it difficult to shut down the computer without cutting off power to the system. The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment [source: CERT]. As it spreads, it can cause a denial of service (DoS) attack as systems collapse while trying to handle all the Internet traffic. At one time, security experts at Sophos believed Netsky and its variants accounted for 25 percent of all computer viruses on the Internet [source: Wagner]. Sven Jaschan spent no time in jail; he received a sentence of one year and nine months of probation. Because he was under 18 at the time of his arrest, he avoided being tried as an adult in German courts. Black Hats Just as you’d find good and bad witches in Oz, you can find good and bad hackers in our world. One common term for a hacker who sets out to create computer viruses or compromise system security is a black hat. Some hackers attend conventions like the Black Hat conference or Defcon to discuss the impact of black hats and how they use vulnerabilities in computer security systems to commit crimes. So far, most of the viruses we’ve looked at target PCs running Windows. But Macintosh computers aren’t immune to computer virus attacks. In the next section, we’ll take a look at the first virus to commit a Mac attack. Worst Computer Virus 2: Leap-A/Oompa-A [pic] Kevin Mazur Archive 1/WireImage/Getty Images We can thank â€Å"Weird Al† Yankovic for warning us of the dreaded â€Å"Stinky Cheese† virus. Maybe you’ve seen the ad in Apple’s Mac computer marketing campaign where Justin â€Å"I’m a Mac† Long consoles John â€Å"I’m a PC† Hodgman. Hodgman comes down with a virus and points out that there are more than 100,000 viruses that can strike a computer. Long says that those viruses target PCs, not Mac computers. For the most part, that’s true. Mac computers are partially protected from virus attacks because of a concept called security through obscurity. Apple has a reputation for keeping its operating system (OS) and hardware a closed system — Apple produces both the hardware and the software. This keeps the OS obscure. Traditionally, Macs have been a distant second to PCs in the home computer market. A hacker who creates a virus for the Mac won’t hit as many victims as he or she would with a virus for PCs. But that hasn’t stopped at least one Mac hacker. In 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image. The Leap-A virus doesn’t cause much harm to computers, but it does show that even a Mac computer can fall prey to malicious software. As Mac computers become more popular, we’ll probably see more hackers create customized viruses that could damage files on the computer or snarl network traffic. Hodgman’s character may yet have his revenge. Breaking into Song While computer viruses can pose a serious threat to computer systems and Internet traffic, sometimes the media overstates the impact of a particular virus. For example, the Michelangelo virus gained a great deal of media attention, but the actual damage caused by the virus was pretty small. That might have been the inspiration for the song â€Å"Virus Alert† by â€Å"Weird Al† Yankovic. The song warns listeners of a computer virus called Stinky Cheese that not only wipes out your computer’s hard drive, but also forces you to listen to Jethro Tull songs and legally change your name to Reggie. We’re down to the end of the list. What computer virus has landed the number one spot? Worst Computer Virus 1: Storm Worm The latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer security experts first identified the worm. The public began to call the virus the Storm Worm because one of the e-mail messages carrying the virus had as its subject â€Å"230 dead as storm batters Europe. † Antivirus companies call the worm other names. For example, Symantec calls it Peacomm while McAfee refers to it as Nuwar. This might sound confusing, but there’s already a 2001 virus called the W32. Storm. Worm. The 2001 virus and the 2006 worm are completely different programs. [pic] Gabriel Bouys/AFP/Getty Images Professor Adi Shamir of the Weizmann Institute of Sciences in Israel is the leader of the Anti-Spyware Coalition. The Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create a botnet and use it to send spam mail across the Internet. Many versions of the Storm Worm fool the victim into downloading the application through fake links to news stories or videos. The people behind the attacks will often change the subject of the e-mail to reflect current events. For example, just before the 2008 Olympics in Beijing, a new version of the worm appeared in e-mails with subjects like â€Å"a new deadly catastrophe in China† or â€Å"China’s most deadly earthquake. † The e-mail claimed to link to video and news stories related to the subject, but in reality clicking on the link activated a download of the worm to the victim’s computer [source: McAfee]. Several news agencies and blogs named the Storm Worm one of the worst virus attacks in years. By July 2007, an official with the security company Postini claimed that the firm detected more than 200 million e-mails carrying links to the Storm Worm during an attack that spanned several days [source: Gaudin]. Fortunately, not every e-mail led to someone downloading the worm. Although the Storm Worm is widespread, it’s not the most difficult virus to detect or remove from a computer system. If you keep your antivirus software up to date and remember to use caution when you receive e-mails from unfamiliar people or see strange links, you’ll save yourself some major headaches. Malware Computer viruses are just one kind of malware. Other types include spyware and some kinds of adware. Spyware spies on what a user does with his or her computer. That can include logging keystrokes as a way to discover login codes and passwords. Adware is a software app that displays ads to users while they use a larger application like a Web browser. Some adware contains code that gives advertisers extensive access to private information. Want to learn more about computer viruses? Take a look at the links on the next page, if you dare. COMPUTER VIRUSES Markus Hanhisalo Department of Computer Science Helsinki University of Technology Markus. Hanhisalo@hut. fi This report briefly introduces computer viruses and how they effect network security. I have introduced today’s virus situation. Many people are afraid of viruses, mostly because they do not know much about them. This report will guide you in the event of a virus infection. Computer viruses and network security is important. There are things that are not public information. Therefore it is good to be a weare of possible network security problems. [pic] Table of Contents 1. Introduction to computer viruses 2. General information about computer viruses . 1 Different Malware types 2. 1. 1 Viruses 2. 1. 2 Trojan 2. 1. 3 Worms 2. 2 Macro viruses 2. 3 Virus sources 2. 3. 1 Why do people write and spread viruses? 2. 4 How viruses act 2. 4. 1 How viruses spread out 2. 4. 2 How viruses activate 2. 5 Viruses in different platforms 2. 5. 1 PC viruses 2. 5. 2 Macintosh viruses 2. 5. 3 Other platforms 3. How to deal with viruses 3 . 1 What are the signs of viruses 3. 2 What to do when you find viruses 4. How to protect from viruses 4. 1 How to provide against viruses 4. 2 Different anti-virus programs 5. Computer viruses in Finland 5.   Ã‚  Ã‚   A questionnaire survey in Finland about viruses 5. 2  Ã‚  Ã‚   It is going to be a criminal act to make viruses in Finland 6. How computer viruses have spread out around the world 7. Computer viruses and network security 8. Conclusions [pic] 1. Introduction to Computer Viruses The person might have a computer virus infection when the computer starts acting differently. For instance getting slow or when they turn the computer on, it says that all the data is erased or when they start writing a document, it looks different, some chapters might be missing or something else ubnormal has happened. The next thing usually the person whose computer might be infected with virus, panics. The person might think that all the work that have been done is missing. That could be true, but in most cases viruses have not done any harm jet, but when one start doing something and are not sure what you do, that might be harmful. When some people try to get rid of viruses they delete files or they might even format the whole hard disk like my cousin did. That is not the best way to act when the person think that he has a virus infection. What people do when they get sick? They go to see a doctor if they do not know what is wrong with them. It is the same way with viruses, if the person does not know what to do they call someone who knows more about viruses and they get professional help. If the person read email at their PC or if they use diskettes to transfer files between the computer at work and the computer at home, or if they just transfer files between the two computers they have a good possibility to get a virus. They might get viruses also when they download files from any internet site. There was a time when people were able to be sure that some sites we secure, that those secure sites did not have any virus problems, but nowadays the people can not be sure of anything. There has been viruses even in Microsoft’s download sites. In this report I am going to introduce different malware types and how they spread out and how to deal with them. Most common viruses nowadays are macro viruses and I am going to spend a little more time with them. I am going to give an example of trojan horses stealing passwords. 2. General information about computer viruses 2. 1 Different malware types Malware is a general name for all programs that are harmful; viruses, trojan, worms and all other similar programs [1]. 2. 1. 1  Ã‚  Ã‚   Viruses A computer virus is a program, a block of executable code, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user. There are a couple of different types of computer viruses: boot sector viruses, parasitic viruses, multi-partite viruses, companion viruses, link viruses and macro viruses. These classifications take into account the different ways in which the virus can infect different parts of a system. The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate. [2] Most viruses are pretty harmless. The user might not even notice the virus for years. Sometimes viruses might cause random damage to data files and over a long period they might destroy files and disks. Even benign viruses cause damage by occupying disk space and main memory, by using up CPU processing time. There is also the time and expense wasted in detecting and removing viruses. 2. 1. 2  Ã‚  Ã‚   Trojan A Trojan Horse is a program that does something else that the user thought it would do. It is mostly done to someone on purpose. The Trojan Horses are usually masked so that they look interesting, for example a saxophone. wav file that interests a person collecting sound samples of instruments. A Trojan Horse differs from a destructive virus in that it doesn’t reproduce. There has been a password trojan out in AOL land (the American On Line). Password30 and Pasword50 which some people thought were wav. files, but they were disguised and people did not know that they had the trojan in their systems until they tried to change their passwords. 9] According to an administrator of AOL, the Trojan steals passwords and sends an E-mail to the hackers fake name and then the hacker has your account in his hands. 2. 1. 3  Ã‚  Ã‚   Worms A worm is a program which spreads usually over network connections. Unlike a virus which attach itself to a host program, worms always need a host program to spread. In practice, worms are not normally associated with one person computer s ystems. They are mostly found in multi-user systems such as Unix environments. A classic example of a worm is Robert Morrisis Internet-worm 1988. [1,5] [pic] Picture 1  Ã‚  Ã‚   An example of a worm. . 2 Macro virus Macro viruses spread from applications which use macros. The macro viruses which are receiving attention currently are specific to Word 6, WordBasic and Excel. However, many applications, not all of them Windows applications, have potentially damaging and infective macro capabilities too. A CAP macro virus, now widespread, infects macros attached to Word 6. 0 for Windows, Word 6. 0. 1 for Macintosh, Word 6. 0 for Windows NT, and Word for Windows 95 documents. What makes such a virus possible is that the macros are created by WordBASIC and even allows DOS commands to be run. WordBASIC in a program language which links features used in Word to macros. A virus, named â€Å"Concept,† has no destructive payload; it merely spreads, after a document containing the virus is opened. Concept copies itself to other documents when they are saved, without affecting the contents of documents. Since then, however, other macro viruses have been discovered, and some of them contain destructive routines. Microsoft suggests opening files without macros to prevent macro viruses from spreading, unless the user can verify that the macros contained in the document will not cause damage. This does NOT work for all macro viruses. Why are macro viruses so successful? Today people share so much data, email documents and use the Internet to get programs and documents. Macros are also very easy to write. The problem is also that Word for Windows corrupts macros inadvertently creating new macro viruses. [pic] Picture 2  Ã‚  Ã‚   New macro virus by corruption [12] Corruption’s also creates â€Å"remnant† macros which are not infectious, but look like viruses and cause false alarms. Known macro virus can get together and create wholly new viruses. [pic] Picture 3  Ã‚  Ã‚   Macro virus growth, July 1995 to May 1997 [12] There have been viruses since 1986 and macro viruses since 1995. Now about 15 percent of virus are macro viruses. There are about 2. 000 macro viruses and about 11. 000 DOS viruses, but the problem is that macro viruses spreads so fast. New macro viruses are created in the work-place, on a daily basis, on typical end-user machines, not in a virus lab. New macro virus creation is due to corruption, mating, and conversion. Traditional anti-virus programs are also not good at detecting new macro viruses. Almost all virus detected in the Helsinki University of Technology have been macro viruses, according to Tapio Keihanen, the virus specialist in HUT. Before macro viruses it was more easy to detect and repair virus infections with anti-virus programs. But now when there are new macro viruses, it is harder to detect macro viruses and people are more in contact with their anti-virus vendor to detect an repair unknown macro viruses, because new macro viruses spread faster than new anti-virus program updates come up. 2. 3 Virus sources Viruses don not just appear, there is always somebody that has made it and they have own reason to so. Viruses are written everywhere in the world. Now when the information flow in the net and Internet grows, it does not matter where the virus is made. Most of the writers are young men. There are also few university students, professors, computer store managers, writers and even a doctor has written a virus. One thing is common to these writers, all of them are men, women do not waste their time writing viruses. Women are either smarter or they are just so good that never get caught. [1] 2. 3. 1 Why do people write and spread viruses? It is difficult to know why people write them. Everyone has their own reasons. Some general reasons are to experiment how to write viruses or to test their programming talent. Some people just like to see how the virus spreads and gets famous around the World. The following is a list from news group postings alt. comp. virus and tries to explain why people write and spread viruses. ?   they don’t understand or prefer not to think about the consequences for other people ? they simply don’t care ?   they don’t consider it to be their problem if someone else is inconvenienced ? hey draw a false distinction between creating/publishing viruses and distributing them ? they consider it to be the responsibility of someone else to protect systems from their creations ? they get a buzz, acknowledged or otherwise, from vandalism ? they consider they’re fighting authority ? they like ‘matching wits’ with anti virus vendors ? it’s a way of getting attention, getting recognition from their pe ers and their names (or at least that of their virus) in the papers and the Wild List ? they’re keeping the anti virus vendors in a job . 4 How viruses act Viruses main mission is to spread out and then get active. Some viruses just spread out and never activate. Viruses when they spread out, they make copies of self and spreading is harmful. 2. 4. 1  Ã‚  Ã‚   How viruses spread out Viruses mission is to hop from program to other and this should happen as quickly as possible. Usually viruses join to the host program in some way. They even write over part of the host program. A computer is infected with a boot sector virus if it is booted from an infected floppy disk. Boot sector infections cannot normally spread across a network. These viruses spread normally via floppy disks which may come from virtually any source: ? unsolicited demonstration disks ? brand-new software ? disks used on your PC by salesmen or engineers ? repaired hardware A file virus infects other files, when the program to which it is attached is run, and so a file virus can spread across a network and often very quickly. They may be spread from the same sources as boot sector viruses, but also from sources such as Internet FTP sites and newsgroups. Trojan horses spread just like file viruses. A multipartite virus infects boot sectors and files. Often, an infected file is used to infect the boot sector: thus, this is one case where a boot sector infection could spread across a network. 2. 4. 2  Ã‚  Ã‚   How viruses activate We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate. Some viruses just spread out, but when viruses activate they do very different things. Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files. As an example, in one unnamed company: over a long period of time, the files in a server were corrupted just a bit. So backup copies were taken from the corrupted files. And after they noticed that something was wrong, it was too late to get back the data from the backups. That kind of event is the worst that can happen for the uses. There is also talk that viruses have done something to hardware like hard disk or monitor. Viruses can not do any harm to hardware but they can do harm to programs and for example to BIOS so that computer does not start after that. Usually you can start the computer from a boot diskette if the computer does not start otherwise. 2. 5  Ã‚  Ã‚   Viruses in different platforms 2. 5.   Ã‚  Ã‚   PC viruses Viruses are mostly written for PC-computers and DOS environment. Even though viruses are made for DOS environment, they are working also in Windows, Windows95, Windows NT and OS/2 operating systems. Some viruses like boot sector viruses, do not care what about operating systems. [1] 2. 5. 2  Ã‚  Ã‚   Macintosh viruses Macintosh viruses are not as a big problem as PC viruses are. There are not so many viruses in Macintosh operating system. Macintosh viruses has been found mostly from schools. How many Mac viruses there are? I found out that there are about 2-300 Mac-specific viruses. There are virtually no macro viruses which have a Mac-specific payload, but all macro viruses can infect on Macs and other platforms which runs Word 6. x of better. 2. 5. 3  Ã‚  Ã‚   Other platforms Viruses can be found from in almost any kind of computer, such as HP calculators used by students like HP 48-calculators and old computers like Commodore 64 and Unix computers too. [1] In general, there are virtually no non-experimental UNIX viruses. There have been a few Worm incidents, most notably the Morris Worm,. the Internet Worm, of 1988. There are products which scan some Unix systems for PC viruses. Any machine used as a file server (Novell, Unix etc. ) can be scanned for PC viruses by a DOS scanner if it can be mounted as a logical drive on a PC running appropriate network client software such as PC-NFS. Intel-based PCs running Unix e. g. Linux, etc. can also be infected by a DOS boot-sector virus if booted from an infected disk. The same goes for other PC-hosted operating systems such as NetWare. While viruses are not a major risk on Unix platforms, integrity checkers and audit packages are frequently used by system administrators to detect file changes made by other kinds of attack. . How to deal with viruses 3. 1  Ã‚  Ã‚   What are the signs of viruses Almost anything odd a computer may do, can blamed on a computer â€Å"virus,† especially if no other explanation can readily be found. Many operating systems and programs also do strange things, therefore there is no reason to immediately blame a virus. In most cases, when an anti-virus program is then run, no virus c an be found. A computer virus can cause unusual screen displays, or messages – but most don’t do that. A virus may slow the operation of the computer – but many times that doesn’t happen. Even longer disk activity, or strange hardware behavior can be caused by legitimate software, harmless â€Å"prank† programs, or by hardware faults. A virus may cause a drive to be accessed unexpectedly and the drive light to go on but legitimate programs can do that also. One usually reliable indicator of a virus infection is a change in the length of executable (*. com/*. exe) files, a change in their content, or a change in their file date/time in the Directory listing. But some viruses don’t infect files, and some of those which do can avoid howing changes they’ve made to files, especially if they’re active in RAM. Another common indication of a virus infection is a change to the reassignment of system resources. Unaccounted use of memory or a reduction in the amount normally shown for the system may be significant. In short, observing â€Å"something funny† and blaming it on a computer virus is less productive than scanning regularly   for po tential viruses, and not scanning, because â€Å"everything is running OK† is equally inadvisable. 3. 2  Ã‚  Ã‚   What to do when you find viruses First thing what you should do when you find virus is count to ten and stay cool. You should keep notes on what you do and write down what your virus programs and you computer tells you. If you are not sure what to do, you should call the administrator for future action. In some cases it is not good to start you computer from hard disk, because the virus may active and then do some harm. Second,make sure that you should get sure that it is virus and what virus it is. It is important to know what kind of virus we are dealing with. Companies that make anti-virus programs knows what different viruses does and you can ether call them and ask about that viruses or you can go to their web pages and read about the virus you have. When you start you computer you should do it from a clean (non-infected) floppy diskette and after that run the virus program. The boot diskette should be write protected so that virus can not infect the boot diskette too. [6] It is good to take a backup of the file that was infected. Virus program could do some damage to the file and that is why it is good to have a backup. It is good to let you administrator to know about the virus, so viruses would not spread around so much. In TKK PC classes are protected by anti-virus program and that virus program reports to a person, responsible for virus protection. . How to protect from viruses 4. 1  Ã‚  Ã‚   How to provide against viruses Best way to protect yourself is to prepare your computer against viruses in advance. One way to protect you computer is to use updated anti-virus program. When you get an email attachment, you should first check the attachment by checking the file with a anti-virus program. As an example in one unnamed F innish company all information was mailed in email attachments. There was this one Word document that was mailed to everybody. That email attachment was infected by a macro virus. Everyone got the infected attachment and those who opened that attachment by Word got that CAP-macro virus. After all there were a few thousand infections. It took lots of time and money to clear that virus. One can protect the computer against boot sector viruses by setting the BIOS to start from a hard disk rather than from a floppy disk. Write protection is a good way to prohibit against viruses. Write protection works well in floppy disks, Windows NT and UNIX, but not that well in Windows and Windows95. 4.   Ã‚  Ã‚   Different anti-virus programs There are three different kind of anti-viral packages: activity monitors, authentication or change-detection software, and scanners. Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions. [7] There are over ten good anti-viral programs. Most knows programs are Data Fellows F-Prot, EliaShim ViruSafe, ESaSS ThunderBYTE, IBM AntiVirus, McAfee Scan, Microsoft Anti -Virus, Symantec Norton AntiVirus and SS Dr Solomon’s AVTK. On a day-to-day basis, the average corporation should be very interested in the scan time; these impact strongly the users, who should be scanning hard drives and disks on a daily basis. If a product takes too long to carry out these basic tasks, users will be unwilling to wait, and will stop using it. This is clearly undesirable – the perfect anti-virus product would be one which takes no time to run and finds all viruses. 5. Computer viruses in Finland 5. 1  Ã‚  Ã‚   A questionnaire in Finland about viruses Computer viruses are not uncommon in Finland, especially not in schools and universities. Virus prevention was not well organized in some organizations and tended to be better in government organizations than in local government or in firms† writes Marko Helenius in his Computer viruses in Finland report. He did a large scale questionnaire survey in Finland in the summer 1993. There were not macro viruses at that time yet, so today the virus situation is a bit dif ferent, but some results were pretty interesting. The knowledge of viruses was quite poor in all sectors: government, local authorities and companies. Respondents’ knowledge of viruses was best in government organizations. How importance is virus prevention? The most positive attitude to virus prevention was in government organizations. 90% of the government organizations used some kind of anti-virus program, the same in local authority organizations was about 55 % and in companies it was over 60 %. [3] 5. 2  Ã‚  Ã‚   It is going to be a criminal act to make viruses in Finland There is a new government bill about writing and spreading viruses. If the bill goes through, it is going to be a criminal act to make and spread viruses in Finland and one could get two years in prison or a fine, if one spread or write viruses. If a person make a virus it would be same thing in court than a person were planning to burn something. It is criminal to make viruses in England, Italy, Netherlands, Switzerland and Russia. It is not punished to make or spread viruses in Finland, according today’s penal code. If viruses make harm to somebody that could be punished. Nobody has been punished for that in Finland, even though some Finns has made viruses, for example Finnish Spryer. That virus formatted about 600 hard disks and did lots of damage. They say that it was made in Espoo, but they never got the persons that made that virus. Virus business in Finland is pretty big. Businesses that have specialized in viruses have about 100 million in sales together. It costs money to stop working and clean up the viruses. Computer viruses put in danger general safety, says Pihlajamaki from Ministry of Justice. It is dangerous if viruses gets to programs that control trains or airplanes. Computer viruses can also be used as a weapon. It is sad that America used computer viruses to slay and to make Iraq’s computers non-functional. [4] 6. How computer viruses have spread out around the world Computer viruses are a problem all over the world. The following picture tells us how many times people have accessed Data Fellows, a company that makes anti-virus program F-Prot, more than 1,672,846 per month[10]. It means that people are interesting in virus information. One reason is that people have to deal with viruses. Viruses in not only a problem in Finland and USA, it is a problem around the world. [pic] Picture 4  Ã‚  Ã‚   Accesses per month Today’s most common virus is the macro virus. Cap virus is one of the macro viruses. Last month there were 3100 Cap macro virus accesses during the last 30 days in Data Fellows. Next common virus was Join the Crew with 1171 accesses and third common was Pen pal Greetings with 895 accesses. [10] [pic] Picture 5  Ã‚  Ã‚   Twenty most accessed virus descriptions during the last 30 days 7. Computer viruses and network security Computer viruses are one network security problem. A few people when asked if computer viruses can cause network security problems answered as follows. Dave Kenney answered from National Computer Security Assoc: â€Å"There is one macro virus for MSWord that is received as an attachment to MS Mail messages. If a user has Word open, and double clicks to see the ontents of the attachment, MS Word and the open document is infected. Then the document is mailed to three other users listed in the original user’s address book. † â€Å"The only information that is leaked is the thing you should be worried about, your password! The trojan sends an E-mail to the hackers fake name and then he has your account at his hands,† wro te CJ from American Online. â€Å"Rarely, a Word macro virus may accidentally pick up some user information and carry it along; we know of one case where a macro virus â€Å"snatched† an innocent user macro that contained a password, and spread it far outside the company where that happened. In the future, however, it is entirely possible that more network-aware viruses will cause significant network security problems,† wrote David Chess from IBM. Marko Helenius wrote from Virus Research Unit, that there has been some cases when hackers have used trojan horses to gain information. There is one example in one finnish corporation where some money were transferred illegally a year ago. There has been a trojan in the University of   Tampere too where the trojan pretend to be a host transfer program. The trojan saved users login name and password to hard disk. 8. Conclusions There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry. There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found. It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware. A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random damage to data files. A trojan horse is not a virus because it doesn’t reproduce. The trojan horses are usually masked so that they look interesting. There are trojan horses that steal passwords and formats hard disks. Marco viruses spread from applications which use macros. Macro viruses spreads fast because people share so much data, email documents and use the Internet to get documents. Macros are also very easy to write. Some people want to experiment how to write viruses and test their programming talent. At the same time they do not understand about the consequences for other people or they simply do not care. Viruses mission is to hop from program to other and this can happen via floppy disks, Internet FTP sites, newsgroups and via email attachments. Viruses are mostly written for PC-computers and DOS environments. Viruses are not any more something that just programmers and computer specialist have to deal with. Today everyday users have to deal with viruses. How to cite 10 Worst Computer Viruses of All Time, Essay examples

Thursday, December 5, 2019

Sociological Description on Health and Illness †MyAssignmenthelp.com

Question: Discuss about the Sociological Description on Health. Answer: Introduction The sociological description on health and illness signifies the interaction between the health and society. Particularly, it describes the impact of society on mortality and morbidity rates. Similarly, it identifies the impact of both morbidity and mortality rates on the social life. Such discipline has the clear focus on the health and illness in referring to the social institutions, such as school, family, religion, and work as the major reasons behind the illness (World Health Organization, 2014). The perceptions of the society influence the health determinants. It is notable that the health illness was merely attributed to the natural or biological conditions. The sociological theories are concerned with the identification of the factors residing within the society that influence the health illness (Berkman, Kawachi Glymour, 2014). The biologists have presented the clear demonstration on the spreading nature of the diseases that is highly influenced by an individuals socioecono mic status. In addition to this, it even depends on the traditions and beliefs as well as the other cultural factors. The study would thus discuss the sociological concerns related to the health determinants. The study would also specify the difference between the sociological theories and the medical model. Discussion The extensive research on the health sociology signifies that the social environment has the clear and recognizable impact on the health determinants. It has been signified that apart from the medical issues, the health sickness of the individuals is highly influenced by the social policies and perceptions. The social model of health is formulated from the social model of disability that is advocated by the disability rights movement (Benach et al., 2014). The social model of health is formulated from the social model of disability that is advocated by the disability rights movement. The development of this social model of disability is the traditional approach to the medical model. The medical model is quote different to the sociological theories related to the health determinants (Braveman Gottlieb, 2014). The development of this social model of disability is the traditional approach to the medical model. The medical model is quote different to the sociological theories related to the health determinants. The sociological theory identifies the inequalities and the social determinants that are causing the health illness among the individuals in the society. In the study of Epidemiology, the distribution of the mortality and morbidity is clearly portrayed. According to Marmot Allen (2014), Epidemiologists are extensively focusing on the disease patterns and the group of victims. In fact, they are paying more attention in identifying the effects of the related interventions. The perceptions of the society influence the health determinants. Some of the health diseases like Eating disorder, extra consumption of alcohol, mental or physical disabilities are much influenced by the societal perspectives (Johnston, Fanzo Cogill, 2014). The sociological perspectives on health and illness are described further in detail. There are four major concepts associated with the sociological perspectives on the health determinants. First is Functional Perspectives, which depicts that the illness is one form of deviance that affects the social functions of the society. Structuralism is the sociological theory that presents the views of society elements as a part of self-supporting structure (Cockerham, 2014). Functionalism explains the societal perspectives in terms of the health illness in a specific society. The functionalist theorists like Herbert Spencer, Auguste Comte, Talcott Parsons, Robert Merton, and others have pointed out the complexities in the society to promote stability and solidarity. The functionalism framework perceives society as the complex system that has the significant impact on the social structure (Allen et al., 2014). Parson argued that the most effective process of understanding sociological health illness is to describe it as the emblem of deviance, which creates obstacle in the soc ial functionalities. Many of the critics even have argued the view point mentioned in the functionalism theory. Another theory is Conflict Perspective that implies the influence of the political and economical structure. It has been specified that due to the recognizable influence of the political and economic values in the society, the inequalities, social divisions, and conflicts are created (Eldredge et al., 2016). The conflict theory is mostly associated with the Marxist perspective that points out the power of capitalism. As per the theoretical concept, it is notified that capitalism creates the tension among the society people that influence the health illness. On the other hand, C. Wright Mills argued that the social structures are generally created by recognizing conflicts between the diverse people in the society. The unequal distribution of power among the individuals in the society is instigating the health determinants in a significant way. The next conceptual theory is Interactionist Perspective that deals with the social constructed health determinants. The symbolic interactionists investigated about the meaning that has been created during social interactions. According to Castaeda et al., (2015), recognition of the situation is essential during the social interaction. As per the constructivist grounded theory, it has been specified that establishing the linking between the mutual constructivism helps in creating the relation between the researcher and the participants. Poverty, poor housing, social exclusion, and poor health systems are the major reasons behind the health determinants (Ash, 2016). According to the social theorists, the inequality among the individuals in society is also one of the major reasons for the health illness. The quality of life depends on the condition of the country or the society. It is reported that there is the expectancy of life signifies 20 years of gap between the Torres Strait Island and Australian Aboriginal land. In fact, the health determinants even depends on the income rate of the individuals within a society. Even though the government has imposed several policies to tackle socially determined health inequalities, some of the effects are still remaining in the society (Garg, Boynton-Jarrett Dworkin, 2016). The social model of health is formulated from the social model of disability that is advocated by the disability rights movement. The development of this social model of disability is the traditional approach to the medical model. The medical model is quote different to the sociological theories related to the health determinants. The sociological theory identifies the inequalities and the social determinants that are causing the health illness among the individuals in the society. On the other hand, the medical model examines the factors that c ontribute to such health determinants. The medical model helps in preventing the health illness by developing the societal awareness. For example, in current time, the eating disorder is one of the most foreseeable health determinants among the youth group in the society. It is notable that the societal influence has been the major cause behind such eating disorder. The youth group of people is much conscious about their appearance since they usually face the judgments of the society. In order to maintain the health standard, they often consume the lesser amount of foods that increases the health determinants (Berkman, Kawachi Glymour, 2014). Such societal perspectives are invoking the mental health of the young people that are leading them towards health illness recognizably. It is already mentioned that capitalism creates the tension among the society people that influence the health illness. Hence, it can be stated that due to the shortage of money or the unequal income rate, many people in the society are unable to afford adequate food. Due to such lesser consumption of the healthy food, most of the people fac e the challenges in terms of their health illness. Moreover, the inequality residing among the social perceptions are also affecting the mental health of the individuals (Garg, Boynton-Jarrett Dworkin, 2016). The medical model is examining the process of preventing such issues to develop the societal constructivism. In fact, it is necessary to reduce the social stratification to develop the better health approaches and eliminate the determinants in the society. Conclusion Social stratification and societal perspectives are the key elements that instigate the health determinants among the individuals. The perceptions of the society influence the health determinants. The sociological theories are concerned with the identification of the factors residing within the society that influence the health illness. The functionalism framework perceives society as the complex system that has the significant impact on the social structure. On the other hand, the medical model examines such factors and identifies the method of mitigating such social issues. The critics and arguments presented by the different theorists specify the social influence upon the youth group. Eating disorder is one of the most common health determinant recognized within a society. It was noticed that the societal perspectives invokes the mental health of the young group. They often skip consuming adequate food which causes the health illness. Moreover, the inequality maintained in the soc iety is also sometimes affecting the health factors of the individuals. The social model of health is formulated from the social model of disability that is advocated by the disability rights movement. The development of this social model of disability is the traditional approach to the medical model. The medical model is quote different to the sociological theories related to the health determinants. References Allen, J., Balfour, R., Bell, R., Marmot, M. (2014). Social determinants of mental health.International Review of Psychiatry,26(4), 392-407. Ash, A. S. (2016). Medical, Social, and Other Determinants of Health Care Costs in MassHealth. Benach, J., Vives, A., Amable, M., Vanroelen, C., Tarafa, G., Muntaner, C. (2014). Precarious employment: understanding an emerging social determinant of health.Annual review of public health,35. Berkman, L. F., Kawachi, I., Glymour, M. M. (Eds.). (2014).Social epidemiology. Oxford University Press. Braveman, P., Gottlieb, L. (2014). The social determinants of health: it's time to consider the causes of the causes.Public Health Reports,129., 19-31. Castaeda, H., Holmes, S. M., Madrigal, D. S., Young, M. E. D., Beyeler, N., Quesada, J. (2015). Immigration as a social determinant of health.Annual review of public health,36, 375-392. Cockerham, W. C. (2014).Medical sociology. John Wiley Sons, Ltd. Eldredge, L. K. B., Markham, C. M., Ruiter, R. A., Kok, G., Parcel, G. S. (2016).Planning health promotion programs: an intervention mapping approach. John Wiley Sons. Garg, A., Boynton-Jarrett, R., Dworkin, P. H. (2016). Avoiding the unintended consequences of screening for social determinants of health.Jama,316(8), 813-814. Johnston, J. L., Fanzo, J. C., Cogill, B. (2014). Understanding sustainable diets: a descriptive analysis of the determinants and processes that influence diets and their impact on health, food security, and environmental sustainability.Advances in Nutrition: An International Review Journal,5(4), 418-429. Marmot, M., Allen, J. J. (2014). Social determinants of health equity. World Health Organization. (2014).Social determinants of mental health. World Health Organization.

Sunday, November 24, 2019

Olympic Country Codes

Olympic Country Codes Each country has its three-letter abbreviation or code that is used during The Olympic Games to represent that country. The following is a list of the 204 countries that are recognized by the  IOC (International Olympic Committee) as National Olympic Committees. An asterisk (*) indicates a territory and not an  independent country; a listing of the independent countries of the world is available. Three-Letter Olympic Country Abbreviations Afghanistan - AFGAlbania - ALBAlgeria - ALGAmerican Samoa* - ASAAndorra - ANDAngola - ANGAntigua and Barbuda - ANTArgentina - ARGArmenia - ARMAruba* - ARUAustralia - AUSAustria - AUTAzerbaijan - AZEThe Bahamas - BAHBahrain - BRNBangladesh - BANBarbados - BARBelarus - BLRBelgium - BELBelize - BIZBermuda* - BERBenin - BENBhutan - BHUBolivia - BOLBosnia and Herzegovina - BIHBotswana - BOTBrazil - BRAThe British Virgin Islands* - IVBBrunei - BRUBulgaria - BULBurkina Faso - BURBurundi - BDICambodia - CAMCameroon - CMRCanada - CANCape Verde - CPVCayman Islands* - CAYCentral African Republic - CAFChad - CHAChile - CHIChina - CHNColombia - COLComoros - COMCongo, Republic of the - CGOCongo, Democratic Republic of the - CODThe Cook Islands* - COKCosta Rica - CRCCote dIvoire - CIVCroatia - CROCuba - CUBCyprus - CYPCzech Republic - CZEDenmark - DENDjibouti - DJIDominica - DMAThe Dominican Republic - DOMEast Timor (Timor-Leste) - TLSEcuador - ECUEgypt - EGYEl Salvador - ESAEquatorial Guinea - GEQ Eritrea - ERI Estonia - ESTEthiopia - ETHFiji - FIJFinland - FINFrance - FRAGabon - GABThe Gambia - GAMGeorgia - GEOGermany - GERGhana - GHAGreece - GREGrenada - GRNGuam* - GUMGuatemala - GUAGuinea - GUIGuinea-Bissau - GBSGuyana - GUYHaiti - HAIHonduras - HONHong Kong* - HKGHungary - HUNIceland - ISLIndia - INDIndonesia - INAIran - IRIIraq - IRQIreland - IRLIsrael - ISRItaly - ITAJamaica - JAMJapan - JPNJordan - JORKazakhstan - KAZKenya - KENKiribati - KIRKorea, North (PDR of Korea) - PRKKorea, South - KORKuwait - KUWKyrgyzstan - KGZLaos - LAOLatvia - LATLebanon - LIBLesotho - LESLiberia - LBRLibya - LBALiechtenstein - LIELithuania - LTULuxembourg - LUXMacedonia - MKD (Officially: Former Yugoslav Republic of Macedonia)Madagascar - MADMalawi - MAWMalaysia - MASThe Maldives - MDVMali - MLIMalta - MLTMarshall Islands - MHLMauritania - MTNMauritius - MRIMexico - MEXFederated States of Micronesia - FSMMoldova - MDAMonaco - MONMongolia - MGLMontenegro - MNEMorocco - MARMozambique - MOZMyanmar (Burma) - MYA Namibia - NAMNauru - NRUNepal - NEPNetherlands - NEDNew Zealand - NZLNicaragua - NCANiger - NIGNigeria - NGRNorway - NOROman - OMAPakistan - PAKPalau - PLWPalestine* - PLEPanama - PANPapua New Guinea - PNGParaguay - PARPeru - PERPhilippines - PHIPoland - POLPortugal - PORPuerto Rico* - PURQatar - QATRomania - ROURussian Federation - RUSRwanda - RWASaint Kitts and Nevis - SKNSaint Lucia - LCASaint Vincent and the Grenadines - VINSamoa - SAMSan Marino - SMRSao Tome and Principe - STPSaudi Arabia - KSASenegal - SENSerbia - SRBSeychelles - SEYSierra Leone - SLESingapore - SINSlovakia - SVKSlovenia - SLOSolomon Islands - SOLSomalia - SOMSouth Africa - RSASpain - ESPSri Lanka - SRISudan - SUDSuriname - SURSwaziland - SWZSweden - SWESwitzerland - SUISyria - SYRTaiwan (Chinese Taipei) - TPETajikistan - TJKTanzania - TANThailand - THATogo - TOGTonga - TGATrinidad and Tobago - TRITunisia - TUNTurkey - TURTurkmenistan - TKMTuvalu - TUVUganda - UGAUkraine - UKRUnited Arab Emirates - UAEUnited Ki ngdom (Great Britain) - GBR United States - USAUruguay - URUUzbekistan - UZBVanuatu - VANVenezuela - VENVietnam - VIEVirgin Islands* - ISVYemen - YEMZambia - ZAMZimbabwe - ZIM Notes on the List The territory formerly known as Netherlands Antilles (AHO) was dissolved in 2010 and subsequently lost its status as an official National Olympic Committee in 2011. The Olympic Committee of Kosovo (OCK) was established in 2003 but as of this writing, remains unrecognized as a National Olympic Committee due to Serbias dispute over Kosovos independence.

Thursday, November 21, 2019

Mind You Own Business Essay Example | Topics and Well Written Essays - 250 words

Mind You Own Business - Essay Example Health care managers (HMOs, POSs and PPOs) coordinate and manage the quality and cost of health care (Themedica, 2006). Due to the global financial crisis, health care managers must employ good management skills in determining the services to offer, the costs to incur and how to allocate the funds. They are they creating more focus on preventive and comprehensive care services for enrollees and their families. Careful and considerate allocation of funds and economic management of the funds ensures that the operational costs are reduced without reducing the quality of service offered. Despite the health sector being a business, it does not operate like a typical business market. In a normal market, the consumer chooses what to take from the supplier whereas in the medical field the doctors choose what is best for the patient. The current economic status in the world has spear rocketed the cost of medical care. Political and social factors have contributed to the prevailing economic status. With high rates of unemployment, people are not being able to pay the cost of their medical services which is creating financial problems to the medical sector (Themedica, 2009). Economy specialists have prospected that in the next decade the rates of unemployment and cost of living will continue to increase. It is expected that the medical resources available will be strained by the expected population increase (Themedica, 2009). There is a need for the medical sector to make changes that will suit the current situation so that high-quality health care will be maintained. The sector should improve their services by employing the latest technology and researching on better

Wednesday, November 20, 2019

Leading a Multicultural Team through a Change Process Case Study - 18

Leading a Multicultural Team through a Change Process - Case Study Example The current discourse hereby aims to present an action plan to get the team back on track, using your new knowledge of multicultural teams and communication, the change process, decision making, and ethics. From the complaints that were relayed, as well as with the diversity of the team members, not only in cultural orientation but also in age and gender, it was evident that the team leader is currently faced with challenges to get the team back on track. The problems apparently stem from lack of unified interest and commitment to achieve a common goal. Likewise, there is lack of motivation to improve the performance and productivity of team members. As such, the means to solve the problems that were relayed by the members include application of leadership theories (leadership style and skills, motivational strategies), effective communication, change management, conflict resolution, as well as emphasis on the adherence to ethical, moral, and legal standards (Martires & Fule, 2004). Thus, emphasize time schedules, delineation of roles and responsibilities, reporting protocols, communication procedures, conflict resolution, and the need to change behaviour and attitude of members to attain the identified goal. Forge commitment from all the team members into collaborative and participative efforts to ensure that costs are minimized, identified projects phases and activities are undertaken according to schedule, and group cohesiveness is effectively manifested. Likewise, aside from the rewards, sanctions for violating policies and procedures for the project should also be developed. For instance, failure to produce expected outcome according to assigned tasks should be sanctioned or penalized according to the organization’s code of discipline (Hill & Jones, 2012). As emphasized, â€Å"the impetus for change is dissatisfaction with the old behaviour† (Martires & Fule, 2004, p. 358). The previous project leader was fired due to unethical behaviour.  Ã‚  

Monday, November 18, 2019

Is there such a thing as fair trade Essay Example | Topics and Well Written Essays - 1500 words

Is there such a thing as fair trade - Essay Example hough fair trade is often regarded as simply as reform initiative, it becomes apparent that Fair Trade is an intervention in the market to mitigate social exclusion, alienation, and economic inequality that uses the productive means of the communities instead of charity. Fair trade has its roots not only in civil society organizations but also includes private sector participants. Critics of corporations may be skeptical to the engagement of profit seeking firms but they offer potential to expose the broader society to Fair Trade products through shelf space in supermarkets and possible future advertising and educational promotions. In the following sections, I offer evidence from the involvement of MNCs role in shaping and formulating economic policies that hinder effective implementation of Fair Trade principles. Thus, through these evidences and in the absence of implementation of these principles, I argue that there is no such thing as Fair Trade, especially when we consider it i n the context of globalization and the role of MNCs. In the past two decades, MNCs have emerged as the dominant player in many industries. In the food industry, where Fair Trade is active, the top five parent companies of roasted and instant coffee (Nestle, Phillip Morris, Sara Lee, Proctor & Gamble, and Tchibo) control about 70% of the market1 and the banana industry is dominated by three oligopolies (Dole, Chiquita, & Del Montel) that control over 65% of the market. In 2003, these three companies had 56% of world banana export shares and 80% of export shares in Central America (FAO, 2003) Economics of scale enable MNCs to reduce the costs of manufacturing and lower prices to benefit consumers but they can also provide the basis for concentrated markets such as an oligopoly with high prices and monopsony power. Evidence of the power of MNCs is seen in the vertical integration where MNCs own banana plantations and control packaging, shipping, importing, and ripening to closely control

Friday, November 15, 2019

The Life Of William Harvey

The Life Of William Harvey William Harvey an English physician, was the first to describe the circulation of the human body and properties of blood being transported throughout the body by its mechanical pump, the heart. He studied medicine at the University of Padua in Italy and was tutored by surgeon Hieronymus Fabricius. Fabricius, was fascinated by anatomy, and discovered that the veins in the human body had one-way valves, but was not too sure as to what their function was. Harvey went on, based on Fabriciuss findings, to figure out the role valves play in circulation of the body. He returned from Italy in 1602 and established himself as a physician. His career was taken to a whole new, better level when he married Elizabeth Browne, the daughter of Elizabeth Is physician. They were married in 1604. He became a fellow of the Royal College of Physicians in 1607 and, in 1609, was appointed physician to St Bartholomews Hospital. The highlight of his career, however was probably when he became physician to Elizabeths successor James I and to James son Charles when he ascended to the throne, in 1618. Both King James and King Charles took a close interest in and encouraged Harvey in every step of his research. Harveys research was furthered through the dissection of animals. He first revealed his theories at the College of Physicians in 1616. In 1628 he published these theories in a book titled Exercitatio Anatomica de Motu Cordis et Sanguinis in Animalibus (An Anatomical Study of the Motion of the Heart and of the Blood in Animals). Here was where he explained how the heart pumped the blood in a circular course through the body. His discovery received great accolades and interest in England, although it was greeted with some scepticism on the Continent. Harvey was also the first to theorize that humans and other mammals reproduced via the fertilisation of an egg by sperm. It took another two centuries before a mammalian egg was finally observed, but Harveys theory still won credibility during his lifetime. Harvey held a close relationship with the royal family through the English Civil War and also witnessed the Battle of Edgehill. Harvey is often credited as the Father of Cardiovascular Medicine. His observations of dissected hearts showed that the valves in the heart allowed blood to flow in only one direction. Also, even though he lacked a microscope, he theorized that the arteries and veins were connected to each other by capillaries, which were later be discovered by Marcello Malpighi some years after Harveys death. William Harveys work became the foundation for all modern research on the heart and cardiovascular medicine. It has been said that Harveys proof of the continuous circulation of the blood within a contained system was the seventeenth centurys most significant achievement in physiology and medicine. He is also often referred to as the Father of Scientific Method. Harvey believed that direct observation was the correct way to draw conclusions about scientific facts. He kept records of his experiments. He did not record his findings until he proved them. This practice became known as the scientific method, and Harvey has received much credit for having promoted its use. Historical background William Harvey was the eldest child of merchant Thomas Harvey and Joan Halke and was born in Folkestone, Kent on the 1st of April, 1578 . His father was known to be a styled gentleman, who upon referring to the register of Williams matriculation at Cambridge, was designated a yeoman of Kent. He must have been a man of some substance and position, as all of his seven sons followed careers, and attained positions necessitating the possession of capital at the outset. William had five brothers who were all merchants of repute in the city of London. They traded extensively with Turkey and the Levant. John, the second son, was at one time Member of Parliament for Hythe, and afterwards became Kings Beceiver for Lincolnshire, and Footman to His Majesty. Of Joan Halke, Harveys mother, but little has been preserved to us, and that little has been derived from the inscription on a monumental slab in Folkestone Church. She is there described as having died in her 50th year, the mother of seven sons and two daughters. A Godly harmles Woman: A chaste loveing Wife: A charitable quiet Neighbour: A cofortable frendly Matron: A pevident diligent Huswyfe: A careful teder-harted Mother. Deere to her Husband: Eeverensed of her Children: Beloved of her Neighbours: Elected of God. Whose Soule Best in Heaven: her Body in this Grave: To Her a Happy Advantage: To Hers an Unhappy Loss. Conjecture has attributed the authorship of the inscription to her son William. There were two daughters, one of whom died young, and of the other nothing beyond her name is known. Harvey attended Kings School in Canterbury from 1588 to 1593. There he worked at the ordinary subjects of an English education, and acquired a good knowledge of both Latin and Greek. This was essential at a time when the influence of authority was triumphant, and when even contemporary literature, to appear learned, must needs be expressed in Latin. He then studied at Cambridge University and Gonville and Caius College from 15 93 to 1599. He spent these years in the study of classics, dialectics and physics. Such a course of training was then, as now, considered a fitting prelude to the study of the science and art of medicine. In 1597, being then nineteen years of age, he was made a Bachelor of Arts of his university. At that time, and indeed until quite recently, the University of Cambridge was in a very different position with regard to the teaching of medicine from what we now find. Divinity was its chief glory, and the well equipped medical school of the present was almost unrepresented, one or two professorships only being devoted to medical subjects. Hence he decided to attend one of the premier institutes of Medicine in the Continent, located in Padua, to pursue his career in medicine. It was there that he worked with Hieronymus Fabricius, who was a well known anatomist and had observed the one-way valves in blood vessels. After graduating from Padua, he returned to England to establish himself as a physician and joined the College of Physicians on the 5th of October, 1604. After marrying Elizabeth Browne, daughter of physician Lancelot Browne, he accepted his position at St. Bartholomews Hospital, succeeding a Dr. Wilkinson, as the physician in charge of the hospital. At this point, the physicians function consisted of a simple but thorough analysis of patients who were brought to the hospital once a week and the consequent writing of prescriptions. Hieronymus Fabricius The next important phase of Harveys life began when he was appointed to the office of Lumleian lecturer on 4 August 1615. The Lumleian lectureship, consisted in giving lectures for a period of seven years, with the purpose of enlightening and increasing the general knowledge of anatomy throughout England. Harvey began his lectures in April 1616. At this time, at the age of thirty-seven, he was described as a man of lowest stature, round faced; his eyes small, round, very black and full of spirit; his hair as black as a raven and curling ( Book : William Harvey; author : Sir DArcy Power; year: 1897) . Some of the notes which he used at the time are preserved in the British Museum (the manuscript notes of which contain the first account of blood circulation). At the beginning of his lectures, Harvey laid down the canons for his guidance: To show as much as may be at a glance, the whole belly for instance, and afterwards to subdivide the parts according to their positions and relations. To point out what is peculiar to the actual body which is being dissected. To supply only by speech what cannot be shown on your own credit and by authority. To cut up as much as may be in the sight of the audience. To enforce the right opinion by remarks drawn far and near, and to illustrate man by the structure of animals. Not to praise or dispraise other anatomists, for all did well, and there was some excuse even for those who are in error. Not to dispute with others, or attempt to confute them, except by the most obvious retort. To state things briefly and plainly, yet not letting anything pass unmentioned which can be seen. Not to speak of anything that can be well explained without the body or can be read at home. Not to enter into too much detail, or in too minute dissection, for the time does not permit. To allot a definite time to each part of the body i.e. first days lectures dedicated to the abdomen, the second to the thorax, the third to the brain and so on. (Book: William Harvey; author: Sir DArcy Power; year: 1897) . He soon attained a practice of great importance, when he was appointed the Physician Extraordinary to King James I, on the 3rd of February 1618. Although Harveys practice suffered because of his radical views, he was also in the picture during King Charles Is reign. Harvey accompanied King Charles I wherever he went as Physician in Ordinary. In particular, Charles hunting expeditions gave Harvey access to many deer carcasses. Harvey made use of these deer carcasses by conducting most of his experiments on them; from these, he made his many observations and consequent theories. King James I King Charles I During the English Civil War a mob of citizen-soldiers against the King entered Harveys lodgings, stole his goods, and scattered his papers. The papers consisted of the records of a large number of dissections of diseased bodies, with this observations on the development on insects, and a series of notes on comparative anatomy. ( Book: William Harvey; author: Sir DArcy Power; year: 1897). Harvey continued to maintain his position and helped the wounded on several occasions. He also protected the Kings children. The conflicts of the Civil War soon led King Charles to Oxford, with Harvey attending, where the physician was made Doctor of Physic in 1642 and later Warden of Merton College in 1645. In Oxford he (Harvey) very soon settled down to his accustomed pursuits, unmindful of the clatter of arms and of the constant marching and countermarching around him, for the city remained the base of operations until its surrender ( Book: William Harvey; author: Sir DArcy Power; year: 1897) Merton College The surrender of Oxford in 1645 marked the beginning of Harveys gradual retirement from the medical world. Now sixty-eight years old and childless, Harvey had lost three brothers and wife at this time. He decided to return to London and live with his brothers Eliab and Daniel separately and in different periods of time. Having retired from St BartholomewHYPERLINK http://en.wikipedia.org/wiki/St_Bartholomews_HospitalHYPERLINK http://en.wikipedia.org/wiki/St_Bartholomews_Hospitals Hospital and his various other aforementioned positions, he passed most of this time reading general literature. Several attempts to bring Harvey back into the working world were made, however; here is an excerpt of one of Harveys answers: Would you be the man who should recommend me to quit the peaceful haven where I now pass my life and launch again upon the faithless sea? You know full well what a storm my former lucubrations raised. Much better is it oftentimes to grow wise at home and in private, than by publishing what you have amassed with infinite labour, to stir up tempests that may rob you of peace and quiet for the rest of your days. (Book: William Harvey; author: Sir DArcy Power; year :1897) He died of a stroke on June 3, 1657, and, lapt in lead, was buried in Hempstead church. Apparently, he died of a cerebral hemorrhage from vessels long injured by gout: it is highly probable that the left Sylvian artery malfunctioned, leading to a gradual accumulation of blood to the brain which eventually overwhelmed it, resulting in his death. There exists a fairly detailed account of what happened on that day; according to the information at hand, Harvey: went to speak and found that he had the dead palsy in his tongue; then he saw what was to become of him. He knew there were then no hopes of his recovery, so presently he sends for his young nephews to come up to him. He then made signs (for seized with the dead palsy in his tongue he could not speak) to let him blood his tongue, which did him little or no good, and so ended his days, dying in the evening of the day on which he was stricken, the palsy giving him an easy passport. (Book: William Harvey; author: Sir DArcy Power; year: 1897) Experimental Procedures Harvey was well trained in anatomy, and he, like his idols Versalius and Fabricius, was convinced that the interventricular septum was not leaky to blood. Also, he was born into an era in which experimentation, computation and simple observation, became recognized as essential tools of the scientific method. He was well aware of the works of Copernicus and Kepler, and of his contemporary Galileo, for whom the combination of careful observation and computation resulted in nothing less than a switch between the earth and the sun as the center of our universe; Galileos dictum Measure all that is measurable, and make those things measurable which have hitherto not been measured (Book: William Harveys Biological Ideas; author: W. Pagel; year: 1967) was deeply impressed upon him. He was also familiar with the somewhat earlier writings of Santorio Santoro, who, sitting on an exquisitely sensitive balance, compared his body weight and the difference between the ingested food and his excreta and was capable of observing that the body lost a certain amount of weight continuously in the form of insensible perspiration (Book: History of Physiology; author: E. Rothschuh; year: 1973). But Harvey himself was a pioneer (Book: Handbook of Physiology: Circulation; author: CD Leake; year: 1962 ). Unlike the great Kepler, who improved upon Copernicus observations, and Galileo, whose telescope unequivocally established the Copernican revolution, Harvey did not build on anything, revise anything, or improve on anything. This revolution was set forth in his book entitled Exercitatio Anatomica de Motu Cordis et Sanguinis in Animalibus or Anatomical Essay on the Motion of the Heart and Blood in Animals (Book: On the Motion of the Heart and Blood in Animals; author: William Harvey, translated by Keynes G; year: 1978), commonly referred to as De Motu Cordis or simply De Motu. It was published in 1628 when Harvey was already 50 years old. Knowing that he was challenging a big fish, he opened the monograph with a letter to the King, Prince Charles, with the statement : The heart of animals is the foundation of their life, the sovereign of everything within themfrom which all power proceeds. The King, in like manner, is the foundation of his kingdom, the sun of the world around him, the heart of the republic, the foundation whence all power, all grace doth flow. (Book: Scientific Papers: Physiology, Medicine, Surgery, Geology, with Introductions, Notes and Illustrations; author: William Harvey, translated by Willis R; year: 1910) His dedication to the President of the Royal College of Physicians reads like: Hey, Im really not out to get anyone, all I want to do is tell the truth! For example, in this dedication he states the studious and good and true do not esteem it discreditable to desert error, though sanctioned by the highest antiquity, for they know full well that to err, to be deceived, is human.I would not charge with willful falsehood anyone who was sincerely anxious for truth, nor lay it at any ones door as a crime that he had fallen into error. I avow myself the partisan of truth alone. (Book: Scientific Papers: Physiology, Medicine, Surgery, Geology, with Introductions, Notes and Illustrations; author: William Harvey, translated by Willis R; year: 1910) He closes: Farewell, most worthy Doctors, and think kindly of your Anatomist (Book: Scientific Papers: Physiology, Medicine, Surgery, Geology, with Introductions, Notes and Illustrations; author: William Harvey, translated by Willis R; year: 1910), suggesting that he feared the worst. Harveys revolutionary conclusion that blood is conserved and circulates was based on only a few observations, the major ones were as follows: First, he measured the total amount of blood that could be drained from sheep, pigs, and some other subprimate mammals. He then measured the volume of the left ventricles of these animals and calculated that, if the left ventricle were to empty with each beat, in one hour the total volume of blood pumped would be much greater that in the ingesta( material taken into the body by means of the digestive tract) or even that contained in the entire animal. Indeed, this would be true even if one-tenth of the blood contained by the ventricle were ejected per beat. Therefore, he concluded, it is a matter of necessity that the blood perform a circuit, that it returns to whence it set out. He then demonstrated, publicly, that when a live snake is laid open, compression of the vein entering the heart leads to a small heart that is devoid of blood upon opening it. If on the contrary, the artery instead of the vein be compressed or tied you will observe the part between the obstacle and the heart, and the heart itself to become largely distended and, in the end, to become so oppressed with blood that you will believe it about to be choked. (Book: Scientific Papers: Physiology, Medicine, Surgery, Geology, with Introductions, Notes and Illustrations; author: William Harvey, translated by Willis R; year: 1910) He also showed that, following light application of a tourniquet to the arm, the veins become engorged and that blood can only be milked from an engorged vein in the oral direction toward the heart but when the vein is thus emptied it only fills from the periphery. Also, when one knows the diameter and length of the cylinder of vein, one can calculate the volume of blood that flows through the vein during rapid emptying and refilling. Harvey showed that in a day more blood flows through that segment alone than the quantity of food ingested. Harveys experiment illustrating the venous valves (nodes or portals) and the unidirectional nature of emptying and filling. He also states: Now if you reckon the business, how much by one compression moves upwards by suppression of the portal, and multiplying that by thousands, you shall find so much blood passd by this means through a little part of a vein, that you will find yourself perfectly persuaded concerning the circulation of the blood, and of its swift motion (Book: Scientific Papers: Physiology, Medicine, Surgery, Geology, with Introductions, Notes and Illustrations; author: William Harvey, translated by Willis R; year: 1910). Harvey also possessed a lifelong obsession with animal generation. His fascination with the perfection of animals brought about his desire to find out how the organisms arise. This is described in his introduction to his Essays on the Generation of Animals. His fascination sprouted from his study of Aristotles ideas of generation. Harvey decided to further investigate Aristotles views by studying a hens eggs in order to understand the meaning of generation in animals. He justified his decision and his plan of pursuing his research in Of the Method to be pursued in studying Generation passage of the introduction to Essays of the Generation of Animals. First of all, a hens egg had a simple structure and readily available for frequent experimentation. In the introduction to his essays, he further explained that his choice of using a chicken egg was acceptable because the other animals had similar means of generation. Results drawn from the experiment he would conduct on a hens egg coul d be related to the reproduction in more complex animals; even animals that did not produce eggs. All animals reproduce with some form of an egg, which he considered to be a metaphor for the simple origin of any new life form. Harvey considered it necessary to start with the less complicated animals because this would allow him to repeat the tests many number of times to ensure accurate results. His strategy was to observe the formation of a chick to create a history of its development. Harvey would then use this information to show the cause of generation and the order in which it proceeded in. Before Harveys research, scientists believed in a theory known as pre-formation, which assumed that an animal already possessed the traits of the mature mammal and grew in size in the mothers womb. William Harvey refuted these prior theories in his consideration of the history of an eggs development. He noticed that the fetus began as a single drop of blood and then further differentiated into an egg which later became the chick. As a result, he rejected the idea that an exact replica of the organism could be found in reproductive material of either the male or the female. Harvey, however, learned by investigating the stages of development in the eggs that some parts of the animal are engendered before others. (Book: William Harvey and the Purpose of Circulation; author: Walter Pagel; year: 1951). Another concern of Harveys was the theories of previous scientists on the role of the male and the female in animal generation. Scientists before attempted to find an answer to this mystery. Galen assumed the yolk in a hens egg was a joint of male and female secretions (Book: Investigations into Generation; author: Elizabeth Gasking; year: 1967). Aristotle hypothesized that the cause of generation was the males semen acting on the menstrual blood of the female making the menstrual blood the source of matter and the semen the efficient source (Book: William Harvey and the Primacy of Blood; author: John White; year: 1986). Fabricius presumed the male caused the material and the female provided the nourishment. Harvey wanted to solve the mystery of the purpose of each sex, so he examined the male and female genital systems of the deer carcasses he found in King Charles Royal Parks (Book: Investigations into Generation; author: Elizabeth Gasking; year: 1967). Through Harveys investigation, he disproved Aristotles theories and clarified this in the passage Of the manner, according to Aristotle, in which a perfect and fruitful egg is produced by the male and female fowl in his essays (Book: The Works Of William Harvey; translated by Robert Willis; year: 1847). He did not consider Aristotles efficient cause as relevant in the discussion of reproduction because Aristotles agent of the efficiency was only semen from the male. According to Harvey, semen was an external cause and could not produce an effect on the soul of the offspring because it was not with it throughout its lifetime of the offspring (Book: Investigations into Generation; author: Elizabeth Gasking; year: 1967). Also, Harvey expla ined the female must have a role in the efficiency when he stated, The earth, too, spontaneously engenders many things without seed, and among animals, certain females, but females only, procreate of themselves and without the concurrence of the male: hens, for example, lay hypenemic eggs; but males; without the intervention of females, engender nothing (Book: The Works Of William Harvey; translated by Robert Willis; year: 1847). He deduced that if the female can reproduce without the male, then the male must not be the only agent to produce the efficiency. He was able to develop this view by looking at less complex organisms and extending it to more evolved animals because he considered all animals to share similar reproductive processes. Accordingly, he allowed himself to make broad generalizations about generation through species barriers. One of the many reasons for William Harveys success was his meticulous experimentation, now known as the scientific method. Scientists precedi ng William Harvey used experimentation in order to investigate; however, Harvey set a new standard for testing. He made precise calculations before and during experiments. For example, in his study of circulation, he calculated the exact amount of blood released from the heart with every thrust (Book: Early Reactions to Harveys Circulation Theory: The Impact on Medicine; author: Steven Lubitz; year: 2004). Harvey closely examined and dissected various animals. While many scientists such as Galen used only careless observation, Harvey tested physically and then retested numerous times to ensure his results lacked error. In fact, William Harvey was the first to apply quantitative and observational methods simultaneously within his research. He picked test subjects that would be immediately available for many experiments. In the examination of blood and animal generation, Harvey used hens eggs because they were cheap and available in abundance. As the Kings physician, Harvey examined d eer in his studies of animal generation. King Charles was fascinated by Harveys research, so he gave the carcasses of his weekly deer hunting to Harvey to dissect (Book: Where Do Babies Come From? ; author: R.V. Short; year: 2000). The substitution of the mammal into testing greatly advanced Harveys research because he could relate his concepts of reproduction to an organism that did not produce an actual egg. Contributions Harvey was awestruck by the way blood flowed through the human body. Most people of the day believed that food was converted into blood by the liver, and then was consumed as fuel by the body. Harvey knew this was false by the understanding of his firsthand observations of the human and animal dissections he made earlier to study on. In 1628 Harvey published An Anatomical Study of the Motion of the Heart and of the Blood in Animals which explained how blood was pumped from the heart throughout the body, then returned to the heart and re-circulated. This book expressed views that were very controversial and lost Harvey many patients, but it ultimately became the basis for all modern research on the heart and blood vessels. Unlike the other anatomical textbooks written in the past, Harveys book has only one illustration with a set of four related figures. This absence of pictures was probably deliberate to show Harveys dedication to the scientific experimental method. The reader by act ually recreating Harveys experiments was forced to follow each step of Harveys methods specifically, in a way that a general examination of illustrations did not require. The four figures depict a simple but persuasive experiment that can be performed on a human arm without dissection. The experiment involves tying the arm with a tourniquet and adjusting the tightness to demonstrate that the blood can either be cut off from the arm or permitted to overfill the arm, causing the veins to bulge. This procedure was also used for bloodletting: the removal of blood from the vein in the arm was a common treatment for a variety of medical conditions and was also a means of preventing disease. Bloodletting was a common therapy of early medicine. It was done by cutting into a vein, called venesection or phlebotomy. This work was often done by a surgeon or a barber-surgeon. The veins near the elbow were commonly used. In this book, Harvey proves the following: that it is the contraction, not the dilation, of the heart which coincides with the pulse, and that the ventricles as true muscular sacs squeeze the blood which they contain into the aorta and pulmonary artery; that the pulse is not produced by the arteries enlarging and so filling, but by the arteries being filled with blood and so enlarging; that there are no pores in the septum of the heart, so that the whole blood in the right ventricle is sent to the lungs and around by the pulmonary veins to the left ventricle, and also that the whole blood in the left ventricle is again sent into the arteries, around by the smaller veins into the vena cava, and by them to the right ventricle again thus making a complete circulation; that the blood in the arteries and that in the veins is the same blood; that the action of the right and left sides of the heart, auricles, ventricles and valves, is the same, the mechanism in both being for reception and propulsion of liquid and not of air, since the blood on the right side, though mixed with air, is still blood; that the blood sent through the arteries to the tissues is not all used, but that most of it runs through into the veins; that there is no to and fro undulation in the veins, but a constant stream from the distant parts towards the heart; that the dynamical starting-point of the blood is the heart and not the liver. This demonstration of the circulation was incomplete in one point only, though. Harvey could not discover the capillaries through which the blood passes from the arteries into the veins. This gap in the circulation was filled in several years later by the great Italian anatomist Marcello Malpighi, who in 1661, a few years after Harveys death, observed in the lungs of a frog, by the newly invented microscope, how the blood passes from the one set of vessels to the other. Harvey saw all that could be seen by the naked eye in his observations on living animals; Malpighi, four years after Harveys death, by another observation on a living animal, completed the marvelous chain of evidence. A second ground-breaking book published by Harvey in 1651, Essays on the Generation of Animals, is considered the basis for modern embryology. In the seventeenth and eighteenth centuries, theories of embryology and development were superimposed with theories of sexual reproduction, along with a number of theories on the origins of life, most of which supported the idea of spontaneous generation. During this period debates raged over spontaneous generation, the idea that life was spontaneously created out of inanimate matter. The popular belief that living organisms propagated from mud in streams, dirt, or environments such as rotting meat was supported by a number of scholars. William Harveys research into reproduction, published in 1651 as Exercitationes de Generatione Animalium (Essays on the generation of animals), began to cast doubt on spontaneous generation. Harvey believed that all life reproduced sexually, a view that he stated with his famous dictum Ex ovo omnia (Everything comes from the egg). Although he was taught by Fabricius, William Harvey criticized his teachers views about reproduction. In fact, the inaccuracy he saw in Fabriciuss beliefs prompted his investigation of animal generation (Book: The Ovary of Eve: Egg and Sperm and Pre-formation (The organism is preformed as a complete miniature structure in the sperm or the egg and simply grows larger as it develops. This means that the first reproducing human would have had to have all succeeding generations within itself. Sort of like Russian dolls.) ; author: Pinto-Correia, Clara; year: 1997). The flaws Harvey detected were in Fabriciuss idea of the role semen played in reproduction. His teacher thought that after the male had been in contact with the female, all the eggs are made fertile. But upon his experimentation, Harvey discovered that the hen laid an egg ten days after interaction with the male, and then another thirteen days after. Hence, he concluded that the male did fertilize more than one of the yolks. Awards/ Prizes William Harvey never won any awards or prizes, al