Thursday, July 9, 2020

Social Sciences The National Alliance To End Homelessness - 550 Words

Social Sciences: The National Alliance To End Homelessness (Essay Sample) Content: The National Alliance to end homelessnessName:Course:Instructor:Institution:Date of Submission:The name of the organization is the national alliance to end homelessness. It is located in 1518 K street North West Washington DC. The organization is aimed at ending homeless and preventing it.All in all the organization is a nonprofit making venture and which is also nonpartisan .Its mission is the aforementioned one with its focus and operation on the United States. This it does it by ensuring that policies are developed, ensuring that there is capacity building and by educating leaders on homelessness on America. The organization also does independent research which it provides to policy makers and other stake holders in terms of housing.The organization supports the local community via collaboration with different sectors ranging from public, non- profit sector etc. the programs are all aimed at terminating homelessness among communities. This is in addition to provisi on of data and other crucial information to policy makers and stakeholders in the housing sector to prevent homelessness. Notably the organization has spread its influence across American communities.The majority of the homelessness in America is the minorities notably the African Americans. Thus by its mission statement of eradication of homelessness in amerce, it helps in influencing policies thus meeting more than one theme of our discussion. These include those of class inequality reduction and ensuring that all people have shelter thus at least equal treatment of the people of different races. This is because homelessness though suffered by minorities some sections of white people are also homeless. The same idealism is espoused by Rothenberg.The organization work are pivotal in ensuring all people are equal with at the very least a place to call home. In addition it trains communities on how to resolve social issues relating to housing and via this it does not discriminate aga inst any racial grouping in its work. This is contrast to the racial segregation we for example saw covered by ARC on the blatant racism on American public schools (ARC, 2000).I learned that this organization is a positive means to eradication of racial and inequality in the American society. The organization goals premised on volunteerism are crucial in ensuring equality though inertia is real for example the organization depen...

Thursday, July 2, 2020

Computer sciences and Information Technology Networking - 275 Words

Computer sciences and Information Technology: Networking (Coursework Sample) Content: Studentà ¢Ã¢â€š ¬s Name:Tutorà ¢Ã¢â€š ¬s Name:Course:Date Due:Computer sciences and Information technology:Question oneWhat search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the password file?[Directory String] + (inurl:)[file type] + [limitors]Question twoYou are analyzing network traffic and you see the stringÂdXNlcjpwYXNzd29yZA==Âin a Web request where the client is authenticating with the server. The username from this request isÂÂand the password is.Question threeBefore you embark on a penetration test, what is the very first thing you want to get?Reconnaissance- I should first identify publicly accessible services from the home network such as web servers or emails.Question fourWhat type of scan are you running if you use the following? Nmap à ¢Ã¢â€š ¬sS 192.168.0.0/2?Port Scanning by ping sweeping using NmapQuestion fiveWhat tool would you use to get passwo rds on a voice over IP network?ÂVoiPongQuestion sixYou find the following in Web logs.ÂPOST/scripts/postit. php?p=%3Ealert (document. Cookie ())%3C%2Fscript%3E. What is going on?It shows the URL is encoded using a custom scheme by the web and the javaScript is not isolated in the URL parameter.Short essay answer:Question sevenIs a vulnerability scanner completely accurate and reliable? Why or why not?NO. Because vulnerability scanner will only identify the possible vulnerabilities based on other network responses that are not what they seem.Question eightYou see someone using the command "ncÂÂ80". What is it they are trying to do?They are trying to test a transmission control protocol connection to a remote host () on port 80.Question nineExplain clearly, in your own words, what a buffer overflow is.Buffer overflow is a software bug that happens when sequence of instructions coded to a physical memory storage are overstored than intended.Question tenYou are periodi cally running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation. How concerned are you about this finding? Include your reasoning.