Friday, December 27, 2019

Throughout the world millions of laborers and children in...

Throughout the world millions of laborers and children in Third World Countries work in sweatshops. In these facilities workers are abused, underpaid, and cramped into unsanitary working conditions full of disease and death. Nonetheless, workers cannot abandon the sweatshops they work in, because they fear their families would starve. If fired they could easily be replaced by another readily worker; that is why workers dont oppose their employers injustices, because they fear becoming unemployed. In large corporations from third world countries, laborers only earn an insignificant percentage of the large revenue that the corporation makes daily. They work for long hours, more than what the U.S Department of Labor considers legal for one†¦show more content†¦As described in the article, â€Å"Outsourcing - Pros And Cons† by Kristin Carpenter; â€Å"Outsourcing is basically the practice of one company to contract another company to provide the services that could have been performed by their own staff†¦. One of the main reasons why companies are into outsourcing is diminished company resources, both in financial terms and in manpower costs† (Carpenter). Because the most powerful American corporations in the U.S are no longer producing their merchandise in the U.S but in developing nations, in order to reduce the cost of labor and increase productivity, the United States no longer has companies that produce jobs in America. And due to the gradual growth of the use of outsourcing, American employment opportunity has decline greatly, leaving many people unemployed and harming our economic strength in the world. In addition outsourcing is also the result of globalization; Jagdish Bhagwati’s definition of globalization says, â€Å"Globalization is integration of national economies into the international economy through trade, foreign direct investment, capital flow, migration, and the spread of technology throughout the world† (Bhagwati 8). Finn implies that globalization is the major factor for the exploitation of cheap foreign labor in third world countries and the main causeShow MoreRelatedVo : A Family Friend With An Interesting Story1004 Words   |  5 PagesKaiden Vo was born in Da Nang, Vietnam in 1978. He immigrated to the United states with his mother and his brother in September of 1992, when he was 14 years old. Kaiden is now 36 and has two daughters (ages 2 and 6). I chose to interview him because he is a family friend with an interesting story. Kaiden first migrated from Da Nang to Ho Chi Minh city by train. After that, he went to Thailand, Singapore, Los Angeles, then Minneapolis by plane, where he stayed for 16 years before coming to AtlantaRead More Monty Hall Problem in Ask Marilyn743 Words   |  3 Pagesit to your advantage to switch your choice? Marilyn vos Savant had answered that you should switch every time. An easier way to explain, she added, was suppose there are a million doors, and you pick door #1. Then the host, who knows what’s behind the doors and will always avoid the one with the prize, opens them all except door #777,777. You’d switch to that door pretty fast, wouldn’t you? However, readers werent convinced. Marilyn vos Savant started receiving criticism. Each day she was receivingRead MoreHeroes Or Ignorant : The United States1699 Words   |  7 Pagesback and excuse their actions as fighting against communism. These two facts contradict each other but it is not clear, if Americans understand it in that times. They did not try to understand Vietnamese mentality and that probably led to their defeat. Vo Nguyen Giap, Vietnamese member of Communist party, explain why they won, â€Å"We won the war because we would rather die than live in slavery (42).† The U.S. consider Vietnamese as weak human beings who do not speak in the movies, who have to be representedRead MoreEssay on Artifical Heart Can Save Lives554 Words   |  3 Pagesinstead he attended the University of Bologna in Italy. Shortly after that, he switched to New York University where he received an M.L.A. in occupational biomechanics in the year 1971. After he attended college, Robert Jarvik later met his wife, Marilyn vos Savant, who is accredited by the Guinness Book of World Records to have the top IQ in the world. Together they have two children whose names are, Tyler Jarvik and Kate Jarvik. In addition to Robert Jarvik’s education in biomechanics, which combinedRead MoreMy School Year Was My Sophomore Year Essay975 Words   |  4 PagesVocational Technical School. Students in grades ten through twelve from nine school districts in Lackawanna County and parts of surrounding counties were able to enroll. They attend classes at their home district for half of the school day, and classes at vo-tech for the other half of the school day. Some students who were interested in majoring in Architectural Engineering or Mechanical Engineering in college enrolled in Drafting and Design Technology. At one time there was also a Civil Technology programRead MoreThe Importance Of Change1610 Words   |  7 Pages CH-01 ... †¦ VO †¦ â€Å"Bad move Marc.† Eliminate pause between Bad move and Marc †¦ VO †¦ â€Å"My mind drifted to my brother, Karl, never far from my thoughts. He flew B-17 bombers over Germany from England. He was doing his part in the war effort. I very much wanted to do my part, too. But at age 17 I was locked out without parental permission. Despite many conversations, I could see that wasn’t going to happen.† CH-02 ... †¦ VO †¦ â€Å"He beckonedRead MoreWind Farm Mathematical Modelling And Frt Improvement Using Pmsg And Soft Computing Essay777 Words   |  4 Pagesu12] (12) 1. Definition of Axial Induction, â€Å"a† U = (1 - a) Vo (13) But, u = 0.5 (Vo + u1) (14) Combining equations 13 and 14, yields : u1 = (1 - 2a)Vo (15) 2. Introduction of Axial Induction, â€Å"a†, into External work rate(Power) Equation : We know : p = (∆w) ̇External work rate = 0.5 Ï  U A [Vo2-U12] Introduce Equation 13 and 14 into equation 16 to obtain : p = 0.5Ï  A(1 - a) Vo [Vo2- (1 - 2a)2Vo2] = 0.5Ï  A(1 - a) Vo3 [1 - (1 + 4a2 – 4a)] =0Read MoreThe Pros And Cons Of Solar Cells1095 Words   |  5 PagesVanadium dioxide (VO (-- removed HTML --) 2 (-- removed HTML --) ) is unique in having metal-insulator transition at 69  °C, is a candidate material to fill the gap in the absorption range mentioned above, and attracts much attention from the both points of various applications (-- removed HTML --) (-- removed HTML --) 15–20 (-- removed HTML --) (-- removed HTML --) and a mechanism of the phase transition. In particular, LSPR in the NIR range of 1000–2000 nm has been reported for VO (-- removed HTMLRead MoreAbc Company, A Premier Managed Care Health Insurance854 Words   |  4 Pagesconsumers’ perception of the company’s cost of health care and ample access to quality (Bhaskar Vo, 2012). With the new legislation consumers are hyper aware of the options in health care insurance products available. ABC had to adapt to new market realities: â€Å"consumers wanted a company that they perceived had a lower cost than competition and that provided an ample access to quality health care† (Bhaskar Vo, p.19, 2012). Due to the high elasticity of health insurance people are extremely sensitiveRead MoreFunctional Decline Of Hospitalized Older Adults1093 Words   |  5 Pagesolder adult with geriatric conditions and multiple comorbidities is at thirty-five to seventy percent risk for functional decline, as compared with pre-hospitalized function (de Vos et al. 2012). Multidisciplinary interventions while hospitalized, can prevent cognitive and functional decline in this population subset (de Vos et al. 2012). The hospital Interdisciplinary Team (IT) may be comprised of nursing managers, admitting/attending physicians, case managers, social workers, rehabilitation specialists

Thursday, December 19, 2019

The Holocaust Is Remembered As One Of The Most Vicious Events

The Holocaust is remembered as one of the most vicious events in history. We have gotten the chance to try and comprehend the pain that such evil genocide left on many, through those who witnessed it. Who sorely revive it, in an attempt to make sure that the world never forgets the millions of Jews that were unjustly tortured and murdered. It is sad to realize that many of these witnesses are getting older, and that many of them have died. Among them was author, professor, and activist Elizer â€Å"Elie† Wiesel, who just passed away a few days ago. As a professor he influenced many, but through his novels he managed to give his readers a glimpse of the horrors he survived during the Holocaust. He was a peaceful man who fought for human rights and won the Nobel Peace Prize in 1986 (Almasy, Sanchez). Many say that he was not only a leader for the Jewish community, but for all mankind (qtd. in Maslin, Correal). Wiesel became chairman of the Presidential Commission on the Holocaus t, in 1978; thanks to his hard work the United States Holocaust Memorial Museum was established in Washington (Almasy, Sanchez). Nonetheless, his legacy will remain alive through his precious memoirs. I think that the main point of Wiesel’s novel, Night, is to understand what Wiesel believed the Jews had lost during the Holocaust, specifically in the concentration camps. He describes multiple moments in which fear had completely changed him and the world around him. According to Wiesel, he felt as if theShow MoreRelatedFrom Human Wrongs to Human Rights Many Novels1045 Words   |  4 Pagesconflict and a vicious cycle of violence as more human rights are violated. To avoid such clashes, human rights have become a fundamental part of global law and policy. However, they have not always been that way. Catastrophic events in history that claimed thousands of lives ran their vicious course before it was recognized that there had to be human rights established. The most famous exa mple of genocide is the Holocaust, which killed around six million Jews. After the Holocaust, the United NationsRead MoreNazi Party And The Concentration Camp1008 Words   |  5 PagesAuschwitz-Birkenau On May 26, 1940, the largest and most horrifying concentration camp was established. Estimated around three million Jewish people died in the concentration camp, all thanks to Adolf Auschwitz-Birkenau. Auschwitz was the largest concentration camp out of the 20,000 created. Hitler. In this research paper, I will inform you on the horrific and inhumane terrors in Auschwitz, there psychotic leader Adolf Hitler, and the events that occur inside the camp. Adolf Hitler joined the NaziRead MoreThe Destruction Of The Holocaust1203 Words   |  5 Pagesmillion jews. Six million innocent men, women and children. Emerging from the ashes and corpses, one man had the intention of preserving this tragedy, yet at the same time preventing it. Elie Wiesel’s fulfilled his purpose of showing the heinous crimes of the Holocaust through the change of characterization of Elie before, during and after the events of Wiesel s 1940 memoir-Night. The Holocaust is remembered as a stain on history, where a massive genocide occurred. but we must also recognize the soulsRead MoreAtrocities of the Holocaust Essay1507 Words   |  7 Pagesinjustice against humanity in history, the Jewish Holocaust is one of the most prominent. From 1933 to 1945, the Nazis waged a vicious war against Jews and other lesser races. This war came to a head with the Final Solution in 1938. One of the most horrific results of the Final Solution were the scores of concentr ation and death camps spread across Nazi Germany, Poland, and other parts of Nazi-controlled Europe. In the aftermath of the Holocaust, people around the world were shocked by final talliesRead MoreTime of the Holocaust1673 Words   |  7 PagesHOLOCAUST 1 Title Page Goes Here I deleted mine from the post HOLOCAUST 2 German dictator, Adolf Hitler wanted a new order for Germany and his so-called Aryan race. As a part of achieving his ultimate goal, he would have to eliminate any and all other inferior races. This evil plan later became known as the Holocaust. Hitler, with the aid of the Nazis and concentration camps, brought terror and devastation to the Jewish communitiesRead MoreRacism in North America1353 Words   |  6 Pagesthat by the end of this speech you will try to put an end to racism when you hear it and when you see it. You see racism is a type of discrimination, probably one of the worst. Racism is like a revolting disease being passed down from generation to generation by vicious racists. Unfortunately, most of us will face racism in our lives in one form or another. What kind of world do we live in where we are judged by the colour of our skin rather than the content of our character? We can’t let racism continueRead MoreSchindlers List Essay2029 Words   |  9 Pagestwist of fate ends up saving the lives of 1100 Jews by bribing the Nazi with all his assets during one of the darkest period of history, the Holocaust. Although the film is based on a true story, it does get pampered with some Hollywood treatment to highlight Schindlers hero status, this makes us the audience feel strongly about the tragic mass murders of the Holocaust. Spielberg uses a wide range of filming techniques to manipulate us the viewers. He mixes facts with emotionRead MorePsychological Effects of the Holocaust3873 Words   |  16 PagesMind Over Matter The Holocaust was one of the most horrendous events ever to take place in our world’s history. It involved people all over the world and affected millions both directly and indirectly. It led to the death of over 11 million people, mostly Jews, and was started and controlled by the infamous German Nazis. Adolf Hitler, the mastermind behind the whole plan, was the chief organizer and began slowly starting to make those he thought were inferior suffer when he became Fuhrer in 1933Read MoreThe Timeless Truths of Homers Iliad1784 Words   |  8 Pagesis unknown whether or not the blind Greek poet intended to create a work that would have such an enduring impact on Western man, clearly the poems underlying themes and the ominous questions it raises remain relevant in the twenty-first century. One of Homers primary themes, the glorification of war and violence, is clearly relevant today. The celebration of war is omnipresent throughout The Iliad. To Homers characters, battlefield courage, skill, and savagery are seen as both the ultimate meansRead MoreAnalysis Of Aunt Chip And The Great Triple Creek Dam Affair1896 Words   |  8 Pages In most present-day societies, people have the freedom to read and think what they wish without censorship or restrictions. It is these very freedoms that allow the people of a society to explore the works of others and later accept them or criticize them with the thoughts that belong uniquely to them. Should a society lose the freedom of doing such things, could prove to be dangerous by tipping the scales of power where it would be unfavorable to a significant portion of the population. People

Tuesday, December 10, 2019

Rural Kenya free essay sample

Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail [emailprotected] uwo. ca. Copyright  © 2009, Ivey Management Services Version: (A) 2009-07-21 With the sun setting over the Rift Valley in Kenya, Sebastian Herrmann walked back to his tent with a head full of questions. He was at a loss as he wondered what kind of marketing campaign would ensure that every family that should use a WaterHarvester received one. If he could answer this question, he could see the potential to significantly improve the living conditions for many of the amazing people he had met over the last couple of weeks during his April 2007 visit. Just yesterday, the first prototype of the WaterHarvester had been installed and worked far better than he and his fellow students could have hoped for. We will write a custom essay sample on Rural Kenya or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page It had been thrilling to see that the prototype had collected enough water with last night’s short rainfall to give a cup of clean water to each of the family’s children, cook a small meal, and still have some water left for the rest of the day! As Hermann thought about the possibilities he became very excited about what this product might mean for the region’s â€Å"hardcore poor,† a group that was hit the hardest by the harsh living conditions in rural Kenya. Once he got back o camp, he started to realize that there were a lot of answers needed before everybody in the community could benefit from gathering rainwater with the new WaterHarvester. Rainwater was a lot cleaner than the river water that the hardcore poor were used to drinking. He began wrestling with questions such as: How should it be marketed in a world where few of the conventional marketing communication channels even existed? How was he going to convince people to spend what was (for them ) a large amount of money when they did not even have enough to provide food for their families? And, would he need to consider changing the culturally entrenched practice of meeting at the river to gather the contaminated water that passed for drinking water? Having almost reached his tent he found himself lost in the most important marketing challenge of his young career. Tomorrow morning he was going to sit down with his group to discuss how they should proceed. If he wanted to be able to propose any workable solutions that could be put into motion in the short time he had left to spend in Kenya, it was going to be a very long night. Page 2 9B09A015 Free the Children (FTC), a Canadian non-governmental organization, was amongst the world’s most successful charity organizations. The cofounders of FTC, Craig and Marc Kielburger, and their organization had been recognized for their efforts in numerous ways: the Order of Canada; the World’s Children’s Prize; and multiple Nobel Peace Prize nominations, just to name a few. Craig had also been honoured with a Doctorate of Education from Nipissing University and the resulting relationships created unique and close ties between FTC and Nipissing University. To begin with, education students from Nipissing began to travel to Kenya, one of FTC’s largest operations, to help build new schools and work together with the local children of the Chebinie primary school in the Rift Valley province. As the success of the Kenya project grew, FTC’s in-country personnel began to realize that it would take more than building schools to convince all parents in the area to prioritize their children’s education rather than having them work. They began to believe that achievement of a higher level of participation in education would require an improvement in the economic and financial situation of the individual households. In other, similar circumstances, other charitable organizations had found one of the most effective ways to provide economic help for the hardcore poor in other parts of the world had been the introduction of micro-credit programs. 1 In 2006, FTC began to think more seriously about designing such a program for Chebinie and it asked Nipissing’s business school for help. Three students, along with one of their business professors, answered and embarked on a three-week trip to Kenya in April of 2007. While the design of a new micro-credit program for small businesses was the focus of their work, they very quickly realized that there was one other significant contributor to poverty in particular — the lack of clean water. Working with groups of poor people throughout the world, FTC had learned that social change and lasting improvements in the standard of living only occur when the people it is working with assume ownership of the changes. As a consequence, its overriding operating philosophy was to â€Å"teach people to fish,† as opposed to â€Å"give them fish. † In the case of the WaterHarvester, this meant that any successful marketing program could not include outright gifting of the product and would likely need to cause a change in behaviour from the centuries-old practice of gathering water for domestic use from the river. Kenya lies on the western boundary of one of the most impoverished regions of the world — sub-Saharan Africa. With seven million people living in environments as diverse as poverty itself, the Rift Valley region was one of the more populated areas in Kenya. While the lush highlands were home to one of the province’s most profitable industries (tea harvesting), other areas in the valley such as the constituency of Narok South struggled to provide the basic needs for their residents. Cattle and goat farming as well as small agriculture were the backbone of what passed for the economy in these poorer areas. Micro-credit programs lent primarily to women that lived in the most impoverished regions of the world (small amounts of money starting as low as $50). While these loans basically worked like any other loan, they were intended solely for small business start-ups to provide the recipient with the opportunity to elevate themselves and their families out of the poverty cycle. Muhammad Yunus, Banker to the Poor, Public Affairs, New York, 1999, p. 41. 1 Page 3 9B09A015 An estimated 54 per cent of the population lived below the poverty line in Narok South2. In rural areas for Kenya, this translated to monthly expenditures of approximately 1,846 Kenyan shillings (Ksh). 3 However, this was the average value for Kenya — there were many households that lived on a lot less every month. Like everywhere in the world, poverty in Kenya was a multi-faceted problem with no single cause or solution. For developing nations such as Kenya, this means that poverty must be assessed based on a variety of factors. While monetary measures can be an important aspect of evaluating poverty, a simple and basic test of household assets is often just as important. Such a test often included a count of possessions including the number of farming animals belonging to the house, the ability to own and operate a kerosene lamp, or the nature of the house’s roof. As a result, impoverished households were commonly classified into hardcore poor and â€Å"just poor† segments. Kenya, in particular, showed how differentiated the face of poverty can be. While it was a sign of relative wealth in many nations to own a cell phone, it was not an uncommon sight in Kenya even in the poorest region of the country. The reason for this being that Kenya had recently undergone what was referred to as the â€Å"cell phone revolution. While this may seem like an odd â€Å"revolution† to put in front of so many other developmental goals, it was the result of a very rational decision. Proper communication is one of the most important aspects of a well-functioning economy and it was much more cost-effective to install cell phone towers than to lay d own land lines. As a result, virtually everyone had access to a telephone at relatively low prices: at the same time, basic needs such as clean water were yet to be addressed. Another important indicator of poverty throughout the Rift Valley province was the type of roof used on the houses. It was estimated that throughout Kenya’s rural areas, 23 per cent of households had thatched roofs. Within the villages around Chebinie (see Exhibits 1 and 2 for a description of the Chebinie area and the role of key stakeholders), this number was certainly higher. Although no verified numbers were available, after some quick counts Herrmann estimated that more than 70 per cent of households had thatched roofs. While just poor households were able to afford a tin roof, the hardcore poor were using thatched roofs, which were made of various types of grass and branches. The nature of one’s roof was one of the more important status symbols in rural Kenya. With respect to clean water collection and use, the important issue was that straight-edged, water-repellent, tin-roofed households were able to easily obtain cleaner rainwater off their roofs by simply gathering the run-off using an eavestrough made from a hollowed-out tree branch — something that is not possible to do on a circular, water-absorbing, thatched roof.   Access to enough clean water is one of multiple pressing issues a developing country faces on the road to sustainable development.

Tuesday, December 3, 2019

Password protecting wireless technology

Introduction The use of the wireless devices goes on to increase as they turn out to be cheaper and more affordable to the users (â€Å"Using wireless technology securely† 1). The increased use of the wireless technologies among the business as well as personal systems has led to better accessibility and interoperability.Advertising We will write a custom research paper sample on Password protecting wireless technology specifically for you for only $16.05 $11/page Learn More But, on the other hand, this same ubiquity has as well contributed to a rise in the level of risks to the computer networks. The attackers have been offered fresh ways to engage in the stealing of very sensitive information, messing about with the business processes, and sabotaging â€Å"network security enforcement systems† (â€Å"The risks of wireless technology† 1). While new threats as well as attacks â€Å"are found against wireless networks, they are addre ssed with changes and additions to the protocols and standards† (â€Å"The risks of wireless technology† 1). In this paper, the wireless technology is going to be discussed, including its benefits and security threats and later, focus will be on how to â€Å"password protect† the wireless technology. Benefits of Wireless Technologies It is pointed out that, in the current day, more than 165 million mobile experts as well as organizations make use of the wireless technologies in solving business problems and gaining competitive advantages (â€Å"Wireless technology 2). The increased reliance on networking in the business world and the internet growth as well as online services strongly indicates the â€Å"benefits of shared data and resources† (â€Å"Wireless technology† 2). The wireless solutions bring these benefits to a high level by giving room for users to have access to the shared information and applications, and eliminating the constraints t hat are associated with the wired connections. In addition, the wireless technology makes it possible for the managers of the networks to develop or expand networks without necessarily having to move or install wires. It is pointed out that nearly all the computing devices which include â€Å"monitors, desktops, tablets, workstations, printers and handhelds can be equipped to communicate wirelessly† (â€Å"Wireless technology† 2). The wireless solutions give out more convenience, productivity and more cost advantages as compared to the wired networks (â€Å"Wireless technology† 2).Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Wireless technology allows a large number of benefits and this includes allowing business organizations to derive benefits â€Å"from the value of their information† (â€Å"Wireless technology† 2). The wireless solutions are capable of off ering users, â€Å"access to real-time information from more places in their organization† (â€Å"Wireless technology† 2). Such mobility offer support to productivity and also offer service opportunities which can not otherwise be achieved by using the wired networks. Companies are currently implementing wireless solutions with an intention of improving their competitiveness in the market. Having wireless solutions that are easy-to-use and more secure has brought about the opportunity to bring down the level of costs and has also led to improvement in performance. It is also pointed out that â€Å"wireless networks extend core networks, provides greater utilization of existing networks† (â€Å"Wireless technology† 2). There can be configuration of wireless systems in various topologies in order to ensure meeting of some specific installations as well as applications. There can be easy changing of configurations and â€Å"range from peer-to-peer networks appropriate for few users to full infrastructure networks of thousands of users that enable roaming over a broad area† (â€Å"Wireless technology† 3). However, these benefits that come with the wireless technology can not be enjoyed where appropriate measures are not taken in order to deal with the security threats that are associated to the wireless technologies. Password protecting wireless technology Following the security threats that face the wireless networks, there is a need to protect these networks. The â€Å"wireless router or access point in a network is essentially a radio transmitter’ (Rodriguez 1). Similar to the case if a radio transmitter, any person that has the right tools can be able to pick up the signal in case he/she is within the range. Since radio transmissions â€Å"are broadcast through the air to target devices, any system properly configured within the radio broadcast range can also receive the wireless messages† (â€Å"The ri sks of wireless technology† 1). This implies that devices which are not supposed to be on the wireless network can get transmissions. It is observed that â€Å"the extension of the network wireless technologies has well increased the attack surface available to malicious users; an adversary can become part of a network and interact with systems that were not designed to operate in a hostile environment† (â€Å"The risks of wireless technology† 1).Advertising We will write a custom research paper sample on Password protecting wireless technology specifically for you for only $16.05 $11/page Learn More The most common activity that is employed in the attack of the wireless technology is â€Å"war driving† (â€Å"The risks of wireless technology† 1). A person with ill intentions can engage in moving around with a laptop having a wireless receiver while listening to the â€Å"radio traffic that is being broadcast† (à ¢â‚¬Å"The risks of wireless technology† 1). There can be setting of the programs that are run on the laptop in order to automatically carry out the analysis of the data and make an effort to â€Å"break in to the networks as they are found† (â€Å"The risks of wireless technology† 1). Moreover, a large number of attackers can as well engage in correlating data with GPS information to come up with a â€Å"wireless access points† map (â€Å"The risks of wireless technology† 1). Basing on where they are located, the attackers, at a later time, can engage in revisiting these access points in order to carry out more attacks. It is pointed out that â€Å"password protection can keep intruders out of your network, maintaining the privacy of your personal information† (Rodriguez 1). In order to â€Å"password protect† the wireless network, this may involve use of encryption. It is pointed out that â€Å"data encryption is used to ‘scram ble’ the signals the wireless network uses to send information back and forth between computers† (Rodriguez 1). It is only those users who know the password can be in a position to engage in the unscrambling of the signals â€Å"into useable data† (Rodriguez 1). In the present day wireless technology, there exist two encryption forms and these are â€Å"Wired Equivalency Privacy – WEP, and Wi-Fi Protected Access – WPA† (Rodriguez 1). WEP was the initial encryption form that was utilized in the wireless networks. This form of encryption is prevalent â€Å"in first generation network equipment and no-PC devices like PDAs, game consoles and media players† (Rodriguez 1). However, WEP do have a grave design weakness that enables the hostile entities to obtain the encryption key and be in a position â€Å"to see all traffic with relative ease† (â€Å"The risks of wireless technology† 1). It is also pointed out that the â€Å"a ccess control mechanisms that used the Media Access Control (MAC) address of networked devices no longer give IT professionals any guarantee a rogue device is within an easily identified physical area† (â€Å"The risks of wireless technology† 1).Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The synchronization capacities of the ‘address book’ found in the cellular phones among other portable devices facilitates stealing of the ‘address book’ in case it is not implemented in the right way, such as the â€Å"Bluesnarfing for Bluetooth-enabled devices† (â€Å"The risks of wireless technology† 1). It is pointed out that having advancements in cryptanalysis, the software that is used in the analysis of â€Å"wireless network traffic and deriving encryption keys and passwords has become commonplace† (â€Å"The risks of wireless technology† 1). Allocating encryption key that is much more complex for WEP remains to enable an attacker to identify what the key is in a very short period of time by making use of such software as WepLab and Aircrack. Making use of encryption algorithms that are stronger but which have keys that are weak still leaves the networks prone to the dictionary attacks that utilizes â€Å"list of words and permutations to try and guess encryption keys† (â€Å"The risks of wireless technology† 1) The WepLab as well as Aircrack support this operation method also. However, it is noted that even if WEP is not strong enough as compared to other encryption techniques, it offers a fundamental protection level which is better than not having one (Rodriguez 1). If a person is making use of WEP, he/she can make it be more effective by engaging in changing of the password on a more frequent basis (Rodriguez 1). In the current days, people prefer to use WPA as a â€Å"wireless network encryption† method (Rodriguez 1). This method gives room for passwords which utilize characters in addition to numbers and letters and this makes it possible to have passwords that are more secure to use. The method as well offers stronger encryption which is regarded as being harder to ‘conquer’ by the intruders. The WPA method â€Å"may not be supported by all hardware, but is designed to drop back to WEP in situations where hardware is not compatible† (Rodriguez 1). It is also suggested that, as an additional layer to the safeguarding of the passwords, one is supposed to consider enabling â€Å"MAC filtering† (Rodriguez 1). Every individual computer is assigned a â€Å"12-character identifier†, which is only one of its kind, referred to as MAC ID. MAC filtering enables creation of the MAC addresses which are permitted to access the network. The MAC ID serves as a second password and it enables â€Å"only a select number of computers in to the network† (Rodriguez 1) Conclusion In the current days, a large number of people and organizations are using the wireless technology on an increasing level because it has become more affordable and convenient to use. There are many benefits that are brought in by using the wireless technology. People and organizations can now access important information that can enable them to carry out t heir activities more comfortably and conveniently. The companies are becoming more competitive in the market as a result of using this technology. However, there has also been an increase in the level of risks to the computer networks. Attackers have tried to have access to information on the unprotected wireless networks. There is a need to protect one’s information since it can be wrongly used by another person. To achieve this protection, there is a need for password protecting the wireless technology. This can effectively be done by using such methods as WEP and the more advanced method, WPA. Works Cited Rodriguez, Gene. Password protect a wireless network. Life123, 2012. Web. â€Å"The risks of wireless technology.† Security4wireless.com. Security4wireless, 2010. Web. â€Å"Using wireless technology securely.† U.s-cert.gov. US-CERT, 2006. Web. â€Å"Wireless technology.† www2.hp.com. www2.hp, n.d. Web. This research paper on Password protecting wireless technology was written and submitted by user Samson Barton to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.