Friday, July 19, 2019
The Three Little Users and the Big Bad Wolf Essay examples -- Creative
The Three Little Users and the Big Bad Wolf Once upon a time, there were three little computer users of three different professions and the time came for them to leave home and seek their fortunes. The first little user with the screen name LiLestPiggy, the youngest, bought his computer at the local chain computer store CompUSA, and had just recently installed a modem so he could surf the net. Email being the primary reason for the use of his computer, LiLestPiggy purchased a computer with the most basic set up. He was planning to surf the web and play games online, pursuing a job as an English teacher at the nearby elementary school. It was the most basic set up for a beginner. The second little user with the screen name LiLPiggy, the middle of the three, bought a laptop, installed Norton Anti-Virus, and installed a cable modem to insure a fast and safe internet connection. He was planning to pursue a business job so he needed a fast and safe computer. The third little user with the screen name of IllestPiggy, the eldest of three, built his own computer, installing several Anti-Virus programs and setting up a firewall and top-notch secret government security devices. A firewall protects your network from unwanted Internet traffic. The primary functions of a firewall are to let good traffic pass through while ââ¬Ëbadââ¬â¢ traffic is blocked. The most important part of a firewall is its access control features that distinguish between good and bad traffic. One night, a hacker with the screen name BigBadWolf, who dearly loved to ruin little pigs lives, was out and about. The BigBadWolf instant messaged (IMââ¬â¢ed) LiLestPiggy who has the most basic internet connection. The BigBadWolf said, ââ¬Å"Hello, I was wondering if ... ...estions brought up was whether the government should take action and patrol cyberspace for possible dangers. Some of the blame of the extensive abuse of the First Amendment can be pointed at the government. However, cyberspace is a place for people to act as they wish and speak freely, unless it would be breaking the first amendment of freedom of speech. If the government took action, there would most likely be conflict and it would be a big deal. In conclusion, hackers have tremendous power to cause trouble due to the unlimited resources and possibilities of the internet. Although they are capable of trouble, most hackers create viruses because of the purposes of it being challenging and entertaining. In this case, the government should step in and regulate cyberspace to a certain degree. We cannot let people commit crime and let them get away with it.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.