Recent orders

Critical Response Magical realism is a style used by artist and writers to portray a very real view of the world today while

Name

Professor

Course

Date

Critical Response.

Magical realism is a style used by artist and writers to portray a very real view of the world today while adding some magical elements in it. Magical realism is a dominant theme in Gabriel Garcia Marquez writing a very Old Man with Enormous Wings. The writer of this particular piece tries to make a very vivid connection between heaven and earth by illustrating the old man and the confusion that come about among the people. The subsequent paragraphs also illustrate how magical realism was portrayed in the story.

The people strongly believed that the flesh-and-blood angel had been held captive in Pelayo’s house. The family had a sick child the previous night. Pelayo did find an old man with wings laying in the mud and he looked so worn out and tired. The owners of the house were certainly mesmerized by what they saw. Such occurrences were not common or rather had never been experienced in that society and hence they had to seek the counsel of an older woman. The older woman stated that the mystical creature was certainly an angel from heaven and been sent to take the child but also it must have been so old and hence knocked down from the rain and they could not get to their destination. “He’s an angel,” she told them. “He must have been coming for the child, but the poor fellow is so old that the rain knocked him down.” (Marquez 458) The angel spent some time with the family and the news about the creature did spread far and wide and people from all works of life came to see the “angel”.

Among those who came to see the creature that was believed it fell from heaven was the local father, Father Gonzaga who to his disappointment the angel did not understand the language of God’s ministers. The creature spent some time in Pelayo and Elisenda house. The owners did make a fortune out of the “angel” and the money enabled them to make some improvements in their house, as they had place the angel in a chicken coop where individuals seeking divine interventions for their problems could come to see the angel. However despite the angel being believed to come from heaved he did cause a lot of frustrations to the family contrary to what we believe and what is expected of a creature from heaven. Elisenda, Pelayo’s wife states, “That it was miserable living in that hell that had angels” (Marquez 461). Just like any other person could have thought, Elisenda believed that the angel from heaven could have brought good tidings, happiness, peace, love, joy, health and even light to their lives. However, what was being witnessed was the family did feel that “angel was a bother, was not friendly, and could not communicate and was also of no use to any of the people that came looking for his help, his wings were also damaged and he could not do much for himself. From the strory the frustration is evident as Elisenda kept watching the creature as it made its flight after wings had grew back, from her words she could not believe that the annoyance that had been with them for the longest time was no longer in their home but only an imaginary dot on the horizon of the sea. (Marquez 462).

In the case of the story of the angel in A very Old Man with Enormous Wings, the people saw before them, what they believed to be an angel and yet they treated this angel poorly, knowing truly well that the creature was sent from heaven it was absolutely unbecoming of them to treat the creature with contempt as they did. The theory that can be derived from the story is, seeing and believing. From the story, one is left thinking that seeing is actually believing, the phrase is a popular today. The individuals in the story did travel from far and wide to witness the creature they believed had fallen from heaven and some held the belief that the same creature might heal their predicaments. However there are those that did not believe even after setting their eyes on the “angel”.

Works Cited

Marquez, Gabriel Garcia, and Fernando Birri. A very old man with enormous wings. Fox Lorber Home Video, 1988.

it is a fact that education will increase the chances of someone securing employment. The level of education largely determines the wages that one will be able to get. Government policies also play a huge role in what the families will be able to attain. The government is allowed to intervene on the various measures that the income can have. For instance

the government can reduce the amount of taxes that families below a certain pay grade can attain. The cost of reducing poverty among children through education is very high. It is more sustainable to think of education as a long term goal where people are educated from a young age so that it becomes part of the culture. It is more realistic to see measures to increase

Devising an attack plan for the target network using the CYB 608 scans

Title

Your Name

Your Institution name

Devising an attack plan for the target network using the CYB 608 scans

For an attack plan to work, the attacker must have the knowledge of the target network (like the operating systems assets, TCP connectivity features and the nature of the server in use) (Sarraute, 2009, p. 11). The attacker, armed with this knowledge, and the aims and objectives for his/her attack, must devise the actions of his/her attack as outlined below.

Target the IP address through the control of his/her machine (box) by using a set of exploits and IG tools.

Carry out port probing (testing if given ports are open)

Start with port 80/tcp first and as soon as it is discovered that it is open carry out an exploit on it, and if the exploit fails keep probing other ports trying the exploit until it succeeds.

Exploit ssh and Wu-ftpd on an OpenSSH and linux respectively

A list of vulnerabilities that the target machine might be susceptible to

Vulnerability is a weakness on the target machine that an attacker can exploit to gain access to the system. In this case, only one IP address was scanned and below is a list of the possible vulnerabilities identifiable from the CYB 608 scan:

System specifications vulnerability (like the type and version of operating system in use-linux telnet, the type of server-apache httpd 2.2.8 and version of mySQL 5.0.51a-3ubuntu5 in use) which enables the attacker to carry out background study on the system prior to attack execution.

Race condition/Validity period/Time-of-check-to-time-of-use vulnerability at for RSA algorithm.

Specifying the programs and their versions that can be used to support Remote Procedural Calls (RPC) to the system through port 80/tcp and also Java-Remote Innovation Methods (RMI) at port 1099/tcp, hence offering homogeneous programming interface vulnerability to the system.

Specifying the authentication (login) port at port 21/tcp (FTP code 230) and making visible to the attacker (Authentication vulnerability)

Specifying the encryption algorithms (DSA and RSA) in use and even going a step further to specify the type of key for RSA algorithm type (public key type) and its bit as 1024, and even specifying the host keys for DSA and RSA () Encryption vulnerability)

Graphical User Interface (GUI) errors at open port 8009/tcp (ajp-auth: ERROR: Failed to connect to AJP server ajp-methods: ERROR: Failed to connect to server) and port 6000/tcp (access denied).

The CVE or OSVDB number for the vulnerabilties, the metasploit exploit name (if available) and the mitigation which would correct the vulnerability.

Name: Authentication vulnerability, CVE Number: CVE-1999-0014-Caused by unauthorized privileged access or denial of service and can be rectified through hiding the authentication port and GUI from the public network

Name: Explicit system specification vulnerability in telnet, CVE Number: CVE-1999-0073- “Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.” (CVE Organisation, 2014) It can be avoided by hiding the system specification in the network or declaring them implicitly in relation to the network the system is in.

Name: Race condition in Linux mailx, CVE Number: CVE-1999-0123- allows local users to read user files. It can be mitigated by hiding the validity period of all the software in use win the system.

References

Sarraute, C. (2007). Probabilistic Attack Planning in Network and WebApps Scenarios. Core

Security Technologies

Kak, A. (2014). Port and Vulnerability Scanning, Packet Sniffing, Intrusion Detection, and

Penetration Testing. Lecture Notes on “Computer and Network Security”, Purdue University

CVE Organisation. (2014). Common Vulnerabilities and Exposure. Retrieved from

http://cve.mitre.org/data/downloads/allitems.html