Tuesday, December 24, 2019

The Kite Runner By Khaled Hosseini - 1574 Words

Arnav Tripathi Mrs. Gommerman Honors English 10 18 October 2017 Lao Tzu once said, â€Å"Being deeply loved by someone gives you strength, while loving someone deeply gives you courage†. To break it down, love can be meaningful as it can give one confidence. A main theme present in Khaled Hosseini’s, The Kite Runner, is love. The Kite Runner follows Amir, the main character, finding redemption from a series of traumatic childhood events. Throughout the novel, the author uses many powerful symbols to represent the complexity of love that many experience in relationships. The use of the kite, the pomegranate tree, the slingshot, and the cleft lip all tie together to underscore a universal theme of love. To begin, the most explicit symbol†¦show more content†¦But Amir hung onto the string of this kite. He loved Baba and Baba loved him, but they could not express this in Amir’s childhood because of their clashing personalities. When Baba comes to realization that Amir did everything for his love, he empathizes with Amir more. As described above, the kite represents Amir and Baba’s complicated relationship in the book where they are unable to express their love for each other. Next, the slingshot is used to represent the complication of protecting loved ones and things that they love. The author uses the book’s setting in Afghanistan to create personal experiences in the plot of the book to help highlight these complications. As known by many, the war in Afghanistan created much pain and suffering for its people. It changed how Afghans thought and acted. Hosseini clearly and effectively represents the changed mindset of Afghans before and after the war. The author does this through the symbolism of the slingshot. The use of the slingshot by Hassan, Amir’s best friend, and Sohrab, Hassan’s son, portrays this. When Hassan and Amir were confronted by Assef, the novel’s main antagonist, in their childhood, â€Å"Hassan held the slingshot pointed directly at Assef s face †¦ [Assef] then turned around, walked away†(42) and then, â€Å"[Hassan] tuck[ed] the slingshot in his waist†(43). This excerpt shows us how one protected in pre-war Afghanistan. They only had toShow MoreRelatedThe Kite Runner, by Khaled Hosseini883 Words   |  4 Pagesregret from past encounters and usually feel guilty and bitter about the situation. The Kite Runner, by Khaled Hosseini, revolves around the theme of redemption. Redemption can be used as a cure for guilt. Throughout the novel, the author shows that redemption requires some sort of sacrifice and the only way that is possible is if you can forgive yourself from the mistakes you have made in the past. Khaled Hosseini effectively portrays redemption through motifs such as rape, irony and flashbacks, symbolismRead MoreThe Kite Runner By Khaled Hosseini1651 Words   |  7 Pages  Ã‚  Ã‚   The novel â€Å"The Kite Runner† by Khaled Hosseini describes the life of a boy, Amir. Amir’s best friend and brother (although that part isn’t known until towards the end), Hassan, plays a major role in Amir’s life and how he grows up. Hosseini p ortrays many sacrifices that are made by Hassan and Amir. Additionally, Amir seeks redemption throughout much of the novel. By using first person point of view, readers are able to connect with Amir and understand his pain and yearning for a way to be redeemedRead MoreThe Kite Runner By Khaled Hosseini1655 Words   |  7 PagesSarah Singer Major Works Data Form Title: The Kite Runner Author: Khaled Hosseini Date of Publication: 2003 Genre: Historical Fiction Historical information about the period of publication: Since the September 11th attacks in 2001, the United States has been at war with Afghanistan. Their goals were to remove the Taliban, track down those in charge of the attacks, and destroy Al-Qaeda. Biographical information about the author: Khaled Hosseini was born in Kabul, Afghanistan, in 1965. HIs motherRead MoreThe Kite Runner by Khaled Hosseini1098 Words   |  5 PagesIn The Kite Runner by Khaled Hosseini, we learn a lot about Amir the main character, and Hassan his servant/brother. In the beginning Hassan and Amir’s relationship was one of brotherly love despite the fact that Hassan was a Hazara and Amir a Pashtun. Back in the 1970’s race and religion played a big part in Kabul and these two races were not suppose to have relationships unless it was owner (Pashtun) and servant (Hazara). Baba Amir’s father had an affair with Hassan’s mother, but it was kept aRead MoreThe Kite Runner By Khaled Hosseini1050 Words   |  5 Pagesâ€Å"There is a way to be good again.† (Hosseini 334). This quote given by Rahim Khan to Amir holds a great amount of force and symbolism. In theory, this quote symbolizes the beginning of Amir’s path to redemption. The eye-opening Kite Runner by K haled Hosseini tells about the struggles of Afghanistan before and during the Taliban, and one’s struggle for redemption and acceptance. With regards to the opening quote, some see Amir’s actions as selfish. However, others may believe that Amir truly changedRead MoreThe Kite Runner By Khaled Hosseini1583 Words   |  7 Pagesnovel the Kite Runner by Khaled Hosseini, Amir, the main character, shares his thoughts and actions due to his poor decisions. The problems he encountered were all because of the sin committed in his youth. His sins taunted the beginning of his life and gave him a troublesome memory full of guilt. As the novel continued, Amir attempted to disengage the memory of his sin and forget about it. Amir then faced the long bumpy road to redemption. Khaled Hosseini’s novel the Kite Runner is about sinRead MoreThe Kite Runner by Khaled Hosseini1313 Words   |  5 Pagesis not unique to just J.K. Rowling. Khaled Hosseini also incorporates life experiences into some of his novels. A prime example of this is The Kite Runner. The storyline of this novel reflects his past to create a journey of a young Afghanistan boy, whose name is Amir. This boy changes drastically throughout his lifetime from a close minded, considerably arrogant boy to an open hearted and minded man. This emotional and mental trip is partially based on Khaled Hosseini’s own life. Throughout Hosseini’sRead MoreThe Kite Runner By Khaled Hosseini1908 Words   |  8 Pages​In the novel, â€Å"The Kite Runner†, written by Khaled Hosseini, was taken place in Afghanistan during the 1970’s to the year of 2002. Many historical events happened during this time period and Hosseini portrayed it into his novel. Kabul, the capitol of Afghanistan, was a free, living area for many Afghanistan families to enjoy the life they were given. Until one day, Afghanistan was then taken over and attacked. In the novel, Amir, the protagonist, must redeem himself and the history behind his actionsRead MoreThe Kite Runner, by Khaled Hosseini871 Words   |  4 Pagesthat person is trying to fix that mistake. This also applies to the novel The Kite Runner. The story revolves around the main character Amir, and his childhood friend, Hassan. After Amir came to America with Baba, his father, he still regrets the things he had done to his childhood friend. He left Hassan getting raped by Assef in a small alley in 1975. Thereafter, Amir always feel regret and seeks for redemption. Hosseini -the author, argues that redemption can be achieved by helping others, teachRead MoreThe Kite Runner By Khaled Hosseini2522 Words   |  11 PagesIn The Kite Runner, Khaled Hosseini creates an awareness and humanization of Afghanistan as a nation and as a culture. Throug h a postcolonial perspective, the main character, Amir resembles the internal conflicts and external tribulations that a country and its citizens’ face when living in a war-torn region. Postcolonial criticism offers a unique perspective by highlighting the destructive events that lead to death and misery, rather than glorifying the exploratory nature of colonists as they

Monday, December 16, 2019

Supreme court Free Essays

Write a speech from your characters point of view about why they don’t like the New Deal and what they think should happen instead. We, the Supreme Court are strongly opposed to the legislations of the New Deal; we can declare that we will do everything in our power to stop President Roosevelt and his New Deal. As you may be aware, we have currently found two of President Roosevelt laws unconstitutional. We will write a custom essay sample on Supreme court or any similar topic only for you Order Now The National Industrial Recovery Act and the Agricultural Adjustment act but unfortunately by doing this we have angered President Roosevelt who is now a great threat to us. He sees us as a group of angry old republicans who have denied democracy by throwing out the laws that he was elected to pass. Unfortunately, he has recently taken the matter so far as to ask congress to give him the power to appoint 6 more Supreme Judges who dare I say would have been more democratic and more sympathetic towards the New Deal. Thankfully, the American people caused an national outcry strongly against Roosevelt plans as they saw him as attacking the American system of government, The rumors that we have heard also suggest that even many of his close friends were strongly opposed to what he suggested and we are known pleased to say that yes, Roosevelt has realized that Hal plan to pack the court with his own allies does make him indeed appear to be a dictator and yes, he has backed down. He obviously knew that Congress would never approve. We, the Judges of the Supreme Court have been shaken by Roosevelt actions and we will definitely be less obstructive In the future, and will definitely be more cautious in the way we Interpret our duties, so It does appear to us that Roosevelt efforts haven’t all gone to waste. Although I hardly doubt he’ll be trying that again with us any time soon. How to cite Supreme court, Papers

Sunday, December 8, 2019

Information Technology Network Security

Question: Snort Rules This question presents a fictitious security vulnerability in a range of lasers printers. The question requires that you develop SNORT IDS rules to detect exploits of this fictitious vulnerability. All information regarding this vulnerability is fabricated to give the illusion of a real security threat. As a result, searches on the Internet will not yield any information regarding the signature of this vulnerability. Answer: 1. Rule -1 Define the Class type include classification.config Indicate a variable which contains a list of IP addresses representing all vulnerable printers subject to an attack. var variable_name (Specify all ip addresses of printer) alert tcp any any - any (ephimaral port i.e. printer port) msg: write the message you want to display ; alert tcp any any - any any (content:"%%For: "; content:"| 124 185 30 135 99 214 51 29 |"; distance:8;msg: " ALERT printer exploit exposed") Rule-2 It have to discover endeavors by the vindictive payload running on any tainted printer to email archives to clients outside the organization this standard ought to recognize bundles sent to any SMTP server on TCP port 25 from just given 6 powerless printers in the system caution tcp $variable_name any - any 25 msg:""; At that point include one more control: for The association's space name is: xyzcorp.com.au. So any emails sent to a location of structure: user@xyzcorp.com.au ought not be recognized as these addresses are for organization representatives. Whatever other email addresses without the careful space name above ought to be caught. Any mail server could be utilized to convey the email. On locating an email from one of these printers to a location outside the association, your tenet ought to produce an alarm with the message: "Traded off printer endeavoring to email report outside association" alert tcp $EXTERNAL_NET any - $SMTP_SERVERS 25 (msg:" Traded off printer endeavoring to email report outside association "; flow:to_server,established; content:USER root; offset:10; nocase; isdataat:300,relative; pcre:"/^RCPT TOx3as[^n]{300}/ism"; reference:bugtraq,2283; reference:bugtraq,9696; reference:cve,2001-0260; classtype:attempted-admin; sid:654; rev:14;) 2. A. A full-benefit Kerberos environment, comprising of a Kerberos server, various customers and various application servers, obliges that the Kerberos server must have the client ID (UID) and hashed passwords of all taking an interest clients in its database. All clients are enrolled with the Kerberos server. Such an environment is alluded as a domain. Besides, the Kerberos server must impart a mystery key to every server and each server is enlisted with the Kerberos server. A basic verification method must include three steps: 1. The customer C demands the client password and afterward make an impression on the AS of the Kerberos framework that incorporates the client's ID, the server's ID and the client's password. 2. The AS check its database to check whether the client has supplied the best possible password for this client ID and whether this client is allowed access to the server V. In the event that both tests are passed, the AS acknowledge the client as legitimate and must now persuade the server that this client is real. Along these lines the AS makes and sends once again to C a ticket that contains the client's ID and network address and the server's ID. At that point it is encoded with the mystery key imparted by the AS and the server V. 3. C can now apply to V for the administration. It makes an impression on V containing C's ID and the ticket. V unscrambles the ticket and checks that the client ID in the ticket is the same of the particular case that accompanied the ticket. In the event that these two match, the server allows the asked for administration to the customer. B. The Third segment (C as explained above) that matches the information communicated from the client and server and if it is proved to be correct or the information communicated is same from both the sides it lets the client to be authenticated and correct. C. Client: Client is the computer on the network that has to have resources from the server, in order to do so the computer needs to communicate with the Key Distributor to obtain the key request so that it could be authenticated from the user. Server: The server is any server on the network and it generally have no special security features installed it gives out permissions based on the Kerberos level authentication. Key Distributor: The presentation of a plan for dodging plaintext passwords and another server, known as the Ticket-Granting Server (TGS). The new administration issues tickets to clients who have been verified to AS. Each one time the client oblige access to another administration, the customer applies to the TGS utilizing the ticket supplied by the AS to confirm itself. The TGS then concedes a ticket to the specific administration and the customer spares this ticket for future utilization. D. As opposed to sending the encrypted session keys to both of the principals, the KDC sends both the customer's and the server's duplicates of the session key to the customer. The customer's duplicate of the session key is encrypted with the customer's master key and in this manner can't be decoded by whatever other substance. The server's duplicate of the session key is implanted, alongside approval information about the customer, in an information structure called a ticket. The ticket is altogether encrypted with the server's master key and thusly can't be perused or changed by the customer or some other element that does not have entry to the server's master key. It is the obligation of the customer to store the ticket securely until contact with the server. E. At the point when the customer gets the KDC's reaction, it extricates the ticket and its own particular duplicate of the session key, putting both aside in a protected reserve. To make a safe session with the server, it sends the server a message comprising of the ticket, still encrypted with the server's master key, and an authenticator message encrypted with the session key. Together, the ticket and authenticator message are the customer's accreditations to the server. At the point when the server gets certifications from a customer, it unscrambles the ticket with its master key, removes the session key, and uses the session key to unscramble the customer's authenticator message. On the off chance that everything looks at, the server realizes that the customer's accreditations were issued by the KDC, a trusted power. For shared verification, the server reacts by encoding the time stamp from the customer's authenticator message utilizing the session key. This encrypted message is sent to the customer. The customer then decodes the message. In the event that the returned message is the same as the time stamp in the first authenticator message, the server is verified. 3. A. A typical network get to, three-part building design emphasizes a supplicant, access gadget (switch, access point) and verification server (RADIUS). This building design influences the decentralized access gadgets to give versatile, however computationally lavish, encryption to numerous supplicants while in the meantime centralizing the control of access to a couple of validation servers. This last peculiarity makes 802.1x validation sensible in extensive establishments. At the point when EAP is run over a LAN, EAP bundles are encapsulated by EAP over LAN (EAPOL) messages. The arrangement of EAPOL parcels is characterized in the 802.1x determination. EAPOL correspondence happens between the end-client station (supplicant) and the remote access point (authenticator). The RADIUS convention is utilized for correspondence between the authenticator and the RADIUS server. The verification procedure starts when the end client endeavors to unite with the WLAN. The authenticator gets the solicitation and makes a virtual port with the supplicant. The authenticator goes about as an intermediary for the end client passing validation data to and from the verification server for its sake. As far as possible movement to confirmation information to the server. A transaction happens, which incorporates: the customer may send an EAP-begin message. the access point sends an EAP-demand character message. the customer's EAP-reaction parcel with the customer's personality is "proxied" to the verification server by the authenticator. the confirmation server challenges the customer to substantiate themselves and may send its certifications to substantiate itself to the customer (if utilizing shared verification). the customer checks the server's accreditations (if utilizing common confirmation) and after that sends its qualifications to the server to substantiate itself. the validation server acknowledges or rejects the customer's appeal for association. if the end client was acknowledged, the authenticator changes the virtual port with the end client to an approved state permitting full network access to that end client. at log-off, the customer virtual port is changed over to the u B. PEAP (Protected Extensible Authentication Protocol) is a variant of EAP, the validation convention utilized as a part of remote networks and Point-to-Point associations. PEAP is intended to give more secure confirmation to 802.11 Wlans (remote neighborhood) that help 802.1x port access control. PEAP verifies the server with an open key testament and conveys the validation in a safe Transport Layer Security (TLS) session, over which the WLAN client, WLAN stations and the confirmation server can verify themselves. Each one station gets an individual encryption key. At the point when utilized as a part of conjunction with Temporal Key Integrity Protocol (TKIP), each one key has a limited lifetime. Cisco Systems, Microsoft and RSA Security are advancing PEAP as an Internet standard. Presently in draft status, the convention is picking up help and is relied upon to remove Cisco's exclusive Lightweight Extensible Authentication Protocol (LEAP). PEAP addresses the weaknesses of 802.11 security, imparted key validation being boss among these. Shortcomings in 802.11 Wired Equivalent Privacy (WEP) permit an aggressor to catch encrypted casings and dissect them to focus the encryption key. (In this framework, the same imparted key is utilized for both confirmation and encryption.) With the imparted key, the aggressor can decode edges or stance as a honest to goodness client. PEAP is comparative in outline to EAP-TTLS, obliging just a server-side PKI testament to make a protected TLS shaft to secure client verification, and uses server-side open key authentications to validate the server. It then makes an encrypted TLS burrow between the customer and the confirmation server. In many arrangements, the keys for this encryption are transported utilizing the server's open key. The resulting trade of verification data inside the passage to confirm the customer is then encrypted and client accreditations are protected from listening stealthily. C. AES remains for "Cutting edge Encryption Standard." This was a more secure encryption convention presented with Wpa2, which supplanted the interval WPA standard. AES isn't some creaky standard created particularly for Wi-Fi networks; its a genuine overall encryption standard that is even been received by the US government. Case in point, when you scramble a hard drive with Truecrypt, it can utilize AES encryption for that. AES is for the most part considered very secure, and the fundamental shortcomings would be savage energy assaults (forestalled by utilizing a solid passphrase) and security shortcomings in different parts of Wpa2. The undertaking mode is still defenseless to assaults. One way a Wi-Fi programmer could conceivably join with your undertaking secured remote network is by breaking the client passwords by means of animal energy lexicon assaults. Despite the fact that not as straightforward as breaking WPA/Wpa2 Psks, its still conceivable with the privilege devices. They'd need to set up a fake network, a right to gain entrance point matching the SSID and security settings of the genuine network with expectations of getting clueless clients of the genuine network to interface keeping in mind the end goal to catch their login accreditations. The assailant could sit tight for customers to join or attempt to constrain it by sending de-confirmation parcels and/or utilizing speakers and reception apparatuses to help the fake sign. The aggressor would likewise need to set up a fake RADIUS server to catch these client login accreditations. They could utilize the prevalent open source Freeradius server with the Freeradius-WPE patch. This patch changes a portion of the settings so the server will acknowledge and dependably react with a fruitful validation (regardless of the password) for all the diverse EAP sorts and after that logs the verification demands. Inside the logs, an aggressor can typically see the username the customer is utilizing to unite with the genuine network. They wouldn't see the client's password however would have the test and reaction that they could gone through a word reference based saltine to uncover the password. D. Wpa2 Personal (AES) is right now the strongest manifestation of security offered by Wi-Fi items, and is suggested for all employments. At the point when empowering Wpa2, make sure to choose a solid password, one that can't be speculated by outsiders. On the off chance that you have more established Wi-Fi gadgets on your network that don't help Wpa2 Personal (AES), a great second decision is WPA/Wpa2 Mode (regularly alluded to as WPA Mixed Mode). This mode will permit more current gadgets to utilize the stronger Wpa2 AES encryption, while as yet permitting more established gadgets to unite with more established WPA TKIP-level encryption. In the event that your Wi-Fi switch doesn't help WPA/Wpa2 Mode, WPA Personal (TKIP) mode is the following best decision. E. "Malignant affiliations" are when remote gadgets can be effectively made by assailants to unite with an organization network through their portable computer rather than an organization access point (AP). These sorts of laptops are known as "delicate Aps" and are made when a digital criminal runs some product that makes his/her remote network card resemble an authentic access point. Once the hoodlum has gotten access, he/she can take passwords, dispatch assaults on the wired network, or plant trojans. Since remote networks work at the Layer 2 level, Layer 3 insurances, for example, network verification and virtual private networks (Vpns) offer no boundary. Remote 802.1x validations do help with some assurance however are still helpless against hacking. The thought behind this sort of assault may not be to break into a VPN or other efforts to establish safety. Undoubtedly the criminal is simply attempting to assume control over the customer at the Layer 2 level.