Academic Writing Samples

Term Paper: Uninitialized Memory Corruption Vulnerability

Sample Term Paper

Term Paper: The Uninitialized Memory Corruption Vulnerability which has been given the ID of CVE-2010-0247 is a vulnerability which given an attacker the ability to remotely execute code (CWE Website 2010). Any attackers who are successfully able to exploit this vulnerability can gain the same right to the system as the current logged-in user. This implies that the user who posses account with restricted rights to the system would be less impacted than those who have administrative access.

(more…)

Academic Writing Samples

Essay: Disadvantages of Software Telemetry Approach Usage

Sample Essay

As with any other approach the use of Software Telemetry has several disadvantages attached to it as well. For example, it is very much possible to misinterpret or misuse the software project telemetry data. Furthermore, the adoption of Software Project Telemetry approach for decision making and measurement purposes emphasize an increased use of tools to manage process and products which can incur additional cost in the project (Johnson, Kou and Paulding).

(more…)

Academic Writing Samples

Term Paper: Hacking Ethics

Sample Term Paper

Always yield to Hands on Imperative

The access to computer and other hardware devices should be complete (Levy 1984). This is important because it helps in removal of any barriers between people and the understanding of the technology, regardless of how big, complicated, perilous, labyrinthine or powerful it is (Edgar 2002).

(more…)

Academic Writing Samples

Term Paper: Characteristics of LAN Architecture

Sample Term Paper

Identify and describe the characteristics of LAN architecture.

The characteristics of LAN architecture include its topology, the access method used, the transmission techniques used to propagate information across the network, the media used for transmission, implementation of protocols as well as the interconnectivity of the LAN. The topology of a network defines how different nodes (computers or devices) are connected to each other. In other words it defines the physical layout of a network.  Typical network topologies include Bus Topology, Ring Topology, Tree Topology, Star Topology and Mesh Topology.

(more…)

Academic Writing Samples

Term Paper: Computer Forensics Technology

Sample Term Paper

Answer 1

The fact that computer forensics tools and methods can be successfully use to identify user passwords, computer logons, as well as other transparent information is absolutely correct. A simple example of this can be the extraction of password through file sharing. If a file sharing is enabled on a computer, then services such as NetBIOS can be sued to retrieve sensitive information about the system, such as the user names, configuration of the system as well as registry keys. These pieces of information can then be used to allow for a brute force password attack against any Windows NT system.  Furthermore, on a network, software such as packet sniffers can be used to extract data from the packets travelling a particular segment of a network, which can contain confidential information such as user credentials.

(more…)

Academic Writing Samples

Term Paper: The Use of DSL Technology

Sample Term Paper

Term Paper: DSL is perhaps the most widely use technology for Internet service in the US. This is because the high speed Internet enabled by DSL technology allows the user to experience and share rich multimedia content in way which was never possible before. With the help of DSL, Internet users are able to view, share and create multimedia content which helps them in effectively getting their point across.

(more…)

Academic Writing Samples

Term Paper: Typical Framework for ERP selection

Sample Term Paper

Term Paper: It can be said that the business objectives, wants and challenges of any mid-sized business organisations are remarkably similar despite the difference in the languages, culture and industry. Each day, these organisation make efforts to gain a strong financial foundation, increase in their customer satisfaction as well as positive business growth. Regardless of the fact if a business organisation has local market as its focus or participate in business across borders, the core components of mid-sized business success are universal.  Decisions regarding the cash flow as well as access to resources and their utilization are key in determining the future of mid-size business. And when these decisions are combined with the global economic and environmental challenges, the choice of the business data, information as well as process infrastructure becomes important.

(more…)