Recent orders

Deploying IDS and IPS with Snort

Information Technology

Name

Date

Deploying IDS/IPS with Snort

Question 1

SNORT can be used as a packet sniffer, packet logger and as a NIDS application. It can serve as a packet sniffer because it has ability to record all the network packets which pass through a given computer, network or internet interface. At the same time, it can help in extracting sensitive information and troubleshoot any kind of network menace. This makes it possible for it to detect probes and such as credentials received from unencrypted login sessions (Ptacek, T.H. & Newsham, T.N., 2008).

On the other hand, this package can be used as a packet logger to generate a copy of the packets which are transmitted through a network system. This is mainly possible since it has ability to record data. Hence, it can be used in tracing the kind of information that may be suspicious within a given network. Lastly, SNORT can be used as Network Intrusion Detection System (NIDS) to assist in managing security for any computer network system (Mohan, K. et al., 2008). SNORT can be used to identify a specific server point in which anti-threat software like spyware, antivirus, firewalls can be configured. This will make it easier for the server to identify and counteract any threat from crackers and hackers, thus, becoming fully protected.

Question 2

SNORT is a very important application because its role in real time protocol and traffic analysis; detecting attacks; content matching and searching. However, for it to function well, it should be properly installed. This implies that an administrator configuring it must follow all the recommended steps. It is paramount to begin this process by downloading and installing the latest versions of the Windows Packer Capture Library. This should be followed by the downloading and configuring of the most updated versions of SNORT. If this is done, the application will get access to the IPv6 support used in a guided selection of check boxes. Then, the administrator should proceed by downloading the most appropriate SNORT rule to use for the server. The right choice of this rule will enable the application to the right thing because it will direct it on the exact thing to do in order to identify a threat and capture it. A successful completion of this procedure means that this application is property configured and should now be run.

Question 3

During the testing of SNORT application, one can decide to choose any of the following options. First, he may begin from downloading the SNORT rule to apply in the testing process. This will enable him to transfer traffic from the network being monitored, to the target host. On the other hand, one may use a tool such as Metasploit. This will help in detecting any traffic attack which may be present in the SNORT rule. When carrying out such a test, it is advisable to use one’s own host system which is immune to the kind of attack it is exposed to. If this is done, it will be possible to exploit the available MS01-23. Hence, the system will generate WEB-IIS IS ISAPT which will assist in ascertaining if the application is properly configured (Mohan, K. et al., 2008).

Question 4

Some of the most important command-line options include the following:

Ipconfig

This option is the top most command used in troubleshooting and viewing IP problem. It has ability to see default gateway, IP address and subnet mask.

Systeminfo

Systeminfo can display information about operating system configuration for a remote or local machine. This gives the administrator an opportunity to access information about boot time, product ID, hardware info, install date and OS type. Its syntax is denoted as follows:

SYSTEMINFO /S system /U user

Tasklist and taskkill

This indicates a task which is currently running in the widow. It is most appropriate when working with the task manager. However, when using it, there is an option of applying the image ID or process ID.

Save

This command helps in saving what has been done.

Exit

This gives the administrator an option of quitting especially after finalizing the task being performed.

References

Mohan, K. et al. (2008). 4. Introducing Intrusion Detection and Snort. How to Cheat at

Securing Linux. Burlington, MA: Syngress Publishing Inc.

Ptacek, T.H. & Newsham, T.N. (2008) Insertion, Evasion, and Denial of Service: Eluding

Network Instrusion Detection. London: Oxford University Press.

Covert and Overt Racism – Copy

Subject

Students Name

Institution of Affiliation

Date

Covert and Overt Racism

Covert racism is a form of racial discrimination to which is subtle and disguised rather than obvious and public. Covert racism is concealed in the fabric of society and tends to discriminate against the individuals through often evasive or the use of methods that are seemingly passive. In this type of racism, the decisions that are racially biased often tend to be hidden or even rationalized with an explanation that the society is more willing to admit. And these racial biases cause multiple problems that work to the empowerment of the suppressors while at the same time diminishing the rights as well as the powers of the oppressed. In covert racism, racialism is propagated subliminally, and most often much of the segregation and discrimination is perpetrated subconsciously.

On the other hand, overt racism refers to the intentional or the apparent harmful attitudes and behaviors that are directed towards the other groups to which are considered as minors based on their skin color. Overt racism is therefore direct unlike the covert racism and points directly to a particular group of individuals based on a specific characteristic such as skin color. Unlike the covert racism to which is ambiguous as the actions of racism are indirect, overt racism is direct, and there are no cases of ambiguity. Overt racism can be clearly identified as the actions of a person, or those of the superior race are vivid, and therefore one doesn’t have to take much time to discern the racist behavior.

Jeff Chang in his book ‘We Gon’ Be Alright,’ he uses both covert and overt racism to develop an image on the nature of racism in the United States. Covert racism has been used in various instances throughout the book. Chang states that “Institutional neglect of racism and injustice in the exercise of power, the kind of power that refuses to notice and refuses to speak.” The statement above has reference to covert racism as the society perpetuates the biasness on racism through the institutions. According to his statement, he argues that the institutions are mandated with the powers to discern and neglect racism and injustice through exercising the powers provided, but in contrast, the institutions refuse to use the powers granted to them to bring to light the issues of segregation and discrimination and at the same time refuses to speak about racism. Through this, we get to know that the institutions propagate racism as they don’t take the front line if fighting against it.

In another instance, Chang state, “People of color are allowed, even required to perform, and, especially these days on issues of race, to edify as well. ‘Here you are, now entertain us.’ But are we allowed to lead?”. From his statement, we unquestionably become aware that the people of color are provided with the privilege to entertain at every platform, but at the same time, Chang questions why the people of color are not allowed to lead, but they are given permission to entertain. The statement provided by Chang at this instance means that the society in the United States promotes racism in the much-hidden manner that is not recognizable. Blacks are allowed to provide entertainment to the other races but the same society restricts the people of color to take leadership positions, and therefore they are subjects to propagate covert racism.

Apart from covert racism, Chang as well uses the aspects of overt racism in his book. Donald Trump, the US president, is a racist who according to history has been involved in various allegations of racism since the time he was a businessman. It is possible to conclude that all through his campaign for the presidency, Donald Trump used racial comments and to which gained him more support from the whites. Trump is a white supremacist in that he makes direct attacks to the people of color making negative comments about them. When he was a businessman, Trump said that he would not prefer having a black secretary in his office because the blacks are known to be lazy. Through this statement, overt racism is propagated, and according to him, the whites are hardworking and therefore demeaned the black people denying them a chance to prove themselves.

In another occasion of overt racism, Chang states “For Trump diehards in a time of danger and disjunction, the media’s job was not to challenge but to affirm. So when demonstrators poured not the streets to protest police killings of Blacks, the media was supposed to confirm for them that those chaos makers were supporting the killing of cops, that somehow the Movement for Black Lives was a Black version of the Ku Klux Klan.” The issue of protesting against the killings of black people by the American police was met with the unexpected reaction by the diehards of Donald Trump claiming that the protesters were indeed in support of the police killing. Something that was not in the agenda of the people of color as they had demonstrated to air their grievances and to urge the government to protect their lives by stopping brutal shootings of the black people. Most of the Trump supporters are whites, and therefore they continue to oppress the black people in the sense that their president attacks them considering their race as a minor while they are superior. According to them, the lives of the black people don’t matter and therefore eliminating them does not attract the call for justice.

Between the two types of racism, covert and overt racism, overt racism is worse in various ways. For one, the individuals or the societies that propagate overt racism accelerates hatred among the races, and it may lead to war. Again, one of the race, and to this case, the white race tend to assume the role of being superior and that only their interests need to be catered for while the rest of the races are neglected being termed as useless. Covert racism is not worse as most of the people oppressed doesn’t recognize the presence of racism, for example, being allowed to entertain but denied the chance to lead might trigger less questioning of oppression.

Work Cited

Chang, Jeff. We gon’be alright: Notes on race and resegregation. Macmillan, 2016.

Depilation and Hair Removal Rids Unwanted Hair

Depilation and Hair Removal Rids Unwanted Hair

It is unimaginable to think of our body without hair. Body hair has a lot of biological importance to our body, the most vital of which is protecting our skin from the elements in the environment. Hair also gives us aesthetic beauty.

While hair is essential to our body, excessive body hair affects aesthetic beauty. Most women want to get rid of excessive body hair in their legs, armpits, upper lip, eyebrows and in some instances, bikini lines because they feel it is aesthetically right to do so. Women simply just hate excessive and unwanted body hair and want to get rid of them! The easiest and most convenient way to remove excessive hair are through the depilation and hair removal process which is removing part of the hair above the surface of the skin.

The most common, simplest and oldest depilation and hair removal process is shaving. However, chemical products or depilatories are an easier way of removing unwanted hair. Depilatories weaken and cause hair to break up, so they can easily detach from the skin.

The depilation and hair removal process using depilatories takes only all of 15 minutes. The process is simple. The depilatory, which is usually a cream, is applied to the unwanted body hair and allowed to remain for between 3 to 15 minutes. While the cream is at work, a slight tickle sensation will be felt. The cream will liquefy the hair and cause it to be in jelly form. Wipe the jelly, off with a warm towel. There, unwanted hair is gone!

The depilation and hair removal process is reasonably cheap because hair removal creams can be easily bought at a local drugstore. However, the process gives short term results because it is only the hair above the surface of the skin that has been removed. Who cares? You have gotten rid of unwanted hair instantly. You can simply repeat the process when unwanted hair shows up again.

.