Academic Writing Samples

Term Paper: Uninitialized Memory Corruption Vulnerability

Sample Term Paper

Term Paper: The Uninitialized Memory Corruption Vulnerability which has been given the ID of CVE-2010-0247 is a vulnerability which given an attacker the ability to remotely execute code (CWE Website 2010). Any attackers who are successfully able to exploit this vulnerability can gain the same right to the system as the current logged-in user. This implies that the user who posses account with restricted rights to the system would be less impacted than those who have administrative access.

(more…)

Academic Writing Samples

Term Paper: Deductive and Inductive Approaches to Research

Sample Term Paper

Apart from quantitative and qualitative research approaches, there are two wider aspects of research that are used by various researchers as well as organizations to conduct their researches. These aspects of researches are deductive and inductive approaches. The deductive research approach is taken by making a detailed overview of a specific hypothesis. Usually, this is performed by first declaring the objective of the research and then proceeding to make a comprehensive and focused statement for the purpose of research. After this, the research then moves forward and at the end of the research the hypothesis is either accepted or rejected. The subject of the research is tested as well as examined to determine the implications involved.

(more…)

Academic Writing Samples

Term Paper: Hacking Ethics

Sample Term Paper

Always yield to Hands on Imperative

The access to computer and other hardware devices should be complete (Levy 1984). This is important because it helps in removal of any barriers between people and the understanding of the technology, regardless of how big, complicated, perilous, labyrinthine or powerful it is (Edgar 2002).

(more…)

Academic Writing Samples

Term Paper: Censorship in Islamic Tradition towards Women

Sample Term Paper

“Censorship is the systematic use of group power to broadly control the freedom of speech and expression, largely in regard to secretive administration matters. It is also used as an act of hiding, removing, altering or destroying copies of art or writing so that general public access to it is partially or completely limited, ” (Chitu, 2006). The censorship in Islam aims to provide for everyone’s needs but some scholars draft new rules specially designed for women whom they think are right that bring about a bad name to Islam (Bhawana, 2005). As a result, they end up curtailing women’s rights. Islam in general does not forbid all these things for women.

(more…)

Academic Writing Samples

Term Paper: Characteristics of LAN Architecture

Sample Term Paper

Identify and describe the characteristics of LAN architecture.

The characteristics of LAN architecture include its topology, the access method used, the transmission techniques used to propagate information across the network, the media used for transmission, implementation of protocols as well as the interconnectivity of the LAN. The topology of a network defines how different nodes (computers or devices) are connected to each other. In other words it defines the physical layout of a network.  Typical network topologies include Bus Topology, Ring Topology, Tree Topology, Star Topology and Mesh Topology.

(more…)

Academic Writing Samples

Term Paper: Computer Forensics Technology

Sample Term Paper

Answer 1

The fact that computer forensics tools and methods can be successfully use to identify user passwords, computer logons, as well as other transparent information is absolutely correct. A simple example of this can be the extraction of password through file sharing. If a file sharing is enabled on a computer, then services such as NetBIOS can be sued to retrieve sensitive information about the system, such as the user names, configuration of the system as well as registry keys. These pieces of information can then be used to allow for a brute force password attack against any Windows NT system.  Furthermore, on a network, software such as packet sniffers can be used to extract data from the packets travelling a particular segment of a network, which can contain confidential information such as user credentials.

(more…)