Friday, December 27, 2019

Calculate MD5 Hashing for a File or String Using Delphi

The MD5 Message-Digest Algorithm is a cryptographic hash function. MD5 is commonly used to check the integrity of files, like to make sure that a file has been unaltered. One example of this is when downloading a program online. If the software distributor gives out the MD5 hash of the file, you can produce the hash using Delphi and then compare the two values to make sure theyre the same. If theyre different, it means the file you downloaded is not the one you requested from the website, and therefore may be malicious. An MD5 hash value is 128-bits long but is typically read in its 32 digit hexadecimal  value. Finding the MD5 Hash Using Delphi Using Delphi, you can easily create a function to calculate the MD5 hash for any given file. All you need is included in the two units IdHashMessageDigest and idHash,  both of which are a part of  Indy. Heres the source code: uses IdHashMessageDigest, idHash; //returns MD5 has for a file function MD5(const fileName : string) : string; var   Ã‚  idmd5 : TIdHashMessageDigest5;   Ã‚  fs : TFileStream;   Ã‚  hash : T4x4LongWordRecord; begin   Ã‚  idmd5 : TIdHashMessageDigest5.Create;   Ã‚  fs : TFileStream.Create(fileName, fmOpenRead OR fmShareDenyWrite) ;   Ã‚  try   Ã‚  Ã‚  Ã‚  result : idmd5.AsHex(idmd5.HashValue(fs)) ;   Ã‚  finally   Ã‚  Ã‚  Ã‚  fs.Free;   Ã‚  Ã‚  Ã‚  idmd5.Free;   Ã‚  end; end; Other Ways to Generate the MD5 Checksum Apart from using Delphi are other ways you can find the MD5 checksum of a file. One method is to use Microsoft File Checksum Integrity Verifier. Its a free program that can be used only on the Windows OS. MD5 Hash Generator is a website that does something similar, but instead of producing the MD5 checksum of a file, it does so from any string of letters, symbols, or numbers that you put in the input box.

Wednesday, December 18, 2019

My Views On Education, Sports, And My Readings Of The Bible

I am who I am because of the experiences I have had through education, organized sports, and my readings of The Bible. I have never been an individual who loves to read. I have read many books, but mainly for school purposes. My values and attributes come from being accepted into the Skip a Book Program in sixth grade, my love for soccer and how it devoured most of my time from the ages of three to sixteen, and my own personal beliefs I have acquired through studying The Bible. To begin, the values I have about education all began from being accepted into a program which ultimately changed my view on education. I remember it clearly. I was at the dinner table when my mother yelled from across the house that my letter was there. This letter was going to determine exactly how my next year in school would be. If I were to be accepted into this program, I would skip a whole year of math. I had taken the test, and now I was awaiting the results. I opened the envelope and there it was. â⠂¬Å"You have been accepted into the Skip a Book Program!† This was just what I had hoped for! And the story continues from there. After being accepted into this program, I was placed in a learning environment where everyone was high achieving. I was not the â€Å"smart one† anymore, but rather I was â€Å"average.† During this program, I was determined to work hard and do my best, because the environment I was in encouraged me to do so. It was because of this program that I met my 8th grade math teacher, Mr.Show MoreRelatedMusic and Christians Essay1335 Words   |  6 Pagesform, people listen to music. For Christians, specially those at bible college, this can be in chapel day to day. For others it may be in a car or even in the workplace, which can be the case for Christians also. Music for me is an everyday occurrence, not only in chapel but also in other places such as my dorm room and when I get ready for sports. These things has caused me to research the topic of music. It has a huge impact on my life. I have sometimes listened to music when I am stressed outRead MoreFaith, Freedom, and Public School Notes2796 Words   |  12 Pages LIBERTY UNIVERSITY SCHOOL OF EDUCATION FAITH, FREEDOM, AND PUBLIC SCHOOL NOTES Session 1 Notes Legally Supported Abington School District v. Schempp Many people think this is the case that the Bible had been thrown out of public schools, but it was really the type of Bible reading that had been thrown out of Schools. There was a PA law that said, â€Å"At least ten verses from the Holy Bible shall be read, without comment, at the openingRead More Prayer in Public School Essay3032 Words   |  13 Pagesassemble, and to petition the government for the redress of grievances (Greenberg). This first amendment protects both believers and nonbelievers from government interference in their decision to pray. Students have the right to pray and read the Bible in public schools. Yet the educators and administrators who facilitate our schools cannot lead children in prayer or force them to pray. The constitution also prohibits the following: requiring students to recite prayers in class, saying public prayerRead MorePlato s Allegory Of A Cave1727 Words   |  7 Pagesher school, and how others there do not understand her and banish her as an outsider instead of trying to learn from her. This demonstrates how members of the society are bound by the pleasure received from technology, sports, and violence, and refuse to see the true value of education, which comes from books and other forms of literature. The other enlightened character, Faber, is unwilling to pass his knowledge onto other members of society because he is afraid of the consequences if he is caughtRead MoreTeaching, Loving, And Protecting Our Future3013 Words   |  13 Pages Teaching, Loving, and Protecting our Future Charlon Lei Gibbs – L24744789 EDUC 604 Dr. Murray Williams Liberty University July 2013 Abstract Education has changed since the start of the American Revolution and educational institutions have changed according to the different influential philosophers. In the modern educational system, teachers are more than just instructors; they serve as parents, mentors, friends, Social Workers, and sometimes security guards. The modern educationalRead MorePersonal and Corporate Spiritual Truths Essay2344 Words   |  10 Pagesto God. Wheeler and Whaley view Great Commission worship as formational, it should sculpt, form, and shape us.3 God uses worship to change us just as much as He uses the message taught every Sunday morning. A. W. Tozer in his book The Crucified Life, writes of the great obstacle in ones walk with Christ, self-trust. Self-trust robs God of what belongs to Him. He defines self-trust as the respectability and self-assurance of self that one learns through education, friends, and experiences. Read More Models of God, Humanity, and Nature My Experiences, Thoughts, and Critical Analyses5752 Words   |  24 PagesHumanity, and Nature My Experiences, Thoughts, and Critical Analyses I ask a lot of questions; I’m a curious person. I once asked my mom why people die, why there are bad things in the world if God is so good and all-powerful. Her response was that we just couldn’t really understand why God does anything because we can’t comprehend God’s â€Å"master plan.† I’m sure that she was right, but that response is not very satisfying to a curious little boy. I saw an inconsistency in my understanding ofRead MoreSports17369 Words   |  70 PagesAvenue, New York, NY 10016. IM-1826 CONTENTS Introduction Chapter 1. Introduction to Sports, Sportscasters, and Sportscasting Chapter 2. The Historical Development of Sports and Sportscasting Chapter 3. The Economics of Sports, Sportscasters, and Sportscasting Chapter 4. Audiences for Sports and Sportscasting Chapter 5. The Role of Media in Sports and Sportscasting Chapter 6. Sociocultural Perspectives on Sports and Sportscasting Chapter 7. Practicum on Sportscasting Chapter 8. The Future of Sportscasters/SportscastingRead MoreSports17363 Words   |  70 PagesAvenue, New York, NY 10016. IM-1826 CONTENTS Introduction Chapter 1. Introduction to Sports, Sportscasters, and Sportscasting Chapter 2. The Historical Development of Sports and Sportscasting Chapter 3. The Economics of Sports, Sportscasters, and Sportscasting Chapter 4. Audiences for Sports and Sportscasting Chapter 5. The Role of Media in Sports and Sportscasting Chapter 6. Sociocultural Perspectives on Sports and Sportscasting Chapter 7. Practicum on Sportscasting Chapter 8. The Future of Sportscasters/SportscastingRead MoreAmerican Family and Traditions6646 Words   |  27 PagesLIANA SLATINA 2012 Table of Contents 1. INTRODUCTION 3 2. CHAPTER 1: The American Family 4 2.1 A Definition of the Family 4 2.2 What is it Like to be a Young Person in the United States? 4 2.3 Education 5 2.4 The Effects of Divorce in the United States 6 2.5 Interview with an American Teenager 6 3. CHAPTER 2: American Traditions 8 3.1 Christmas Traditions 8 3.2 The Yellow Ribbon 10 3.3 The Window Candle 10 3.4 The Recipe Box

Tuesday, December 10, 2019

IT Ethics Techniques and Theories

Question: Discuss about the IT Ethics Techniques and Theories. Answer: Introduction Here in this document we will analyze the article and explain it through using two different classical ethical theories and will observe what exactly its impact using DET (Doing Ethic Techniques). There is some unethical work that is performed in Australia, which is related to hacking. In the given case study it has been observed that so basically the article tells about how other persons are hiring hackers to hack into something which is entirely unethical. Hacking in Australia is completely unethical, but somehow people do need them to utilize them for their personal and professional reasons. Mainly it's personal, for example, a wife needs to hack her husband phone to check if he is cheating on her or not. Likely, a student wants to get good marks so he needs a hacker too (Pro et al., 2015). So in this regard, the owner of Hacker for hire website has decided to publish their client details on the website so that it goes public so that everyone should know what their order was. The presented document explains the chosen unethical activity and it in terms of ethical theories. Discussion on Virtue ethic and Deontology Deontology is something which is related to action rather than the consequences. For example, if a person wants to do a job and before starting the job he or she needs to think what the job is and if it is a right thing to do or not, then it can be called as Deontology (Sunstein, 2013). The reason is that Deontology first review the task purpose then goes to the consequences of it. The Virtue ethic is some very practical it rather relate to someone's character rather than action. For example, if an individual needs to perform a task, he will first consider him or her to be Virtue, which means that the person has to have honesty, integrity, happiness and other character elements rather than thinking about rules and consequences. Let us consider one example to understand the Virtue ethics in much detail. In a bank the cashier is given responsibility to keep a significant amount to transfer it tomorrow to the banks vault, the number is too big and if the clerk stole it, then it will cha nge is life completely. Here Virtue ethics plays an important role; the person needs to have honestly on his work and integrity that he will never perform such act and will be loyal to the company or bank he or she operates in (Hursthouse, 2013). So the Virtue ethics rather focus on the character than the consequences or rules. The bank employee has to feel happy about the action he or she is going to perform. Describing Virtue Ethics on hacking and other factors The primary purpose of obtaining these ethics is that to be happy based on their day to day activities by been Virtue. Aristotle describes that there should be Virtue persons in this world. What he was meant to say is that people should have happiness, integrity, honesty in their character then the world will be a better place (Harrist Richardson, 2014). On the topic above the individuals who are hiring the hackers need to understand that the job they are outsourcing to a hacker does not have any integrity and honesty in it, even though they know that it is completely wrong they do perform such task. Now this implies to the service provider as well; they do know that the job is completely unethical but they still complete the job. So this needs to be stopped by a government to protect the people from going against their virtue (integrity, honesty and happiness (Weiss, 2014). So they are happy with the outcome but they are failing regarding their characters. Describing Deontology on hacking and other factors Deontology is related to their action and asks two questions to them if the task is right or wrong rather than thinking about the consequences (Thomas, 2015). So here, this theory explains the importance of action that is rather than the consequences. Let us consider the article for an example if we see the case study we can observe that there are few hackers like Jarmaa, who has hacked a company database for a certain amount of money, but he also wrote that the performed task is ethical or not can be decided based on the effectiveness (Jackson Smith, 2015). The hacker wanted to say that hacking can be ethical if it does not hurt anyone in any way or another. But here as per the theory hacking is completely unethical and it needs to be stopped at any cost and immediately. Because as per the Australian government law hacking is a crime and can lead to a maximum of 10 years of incarceration. So basically here the hackers and the individuals who are hiring them for their works need to understand that hacking is a wrong thing and it has to be stopped. Recommendation Securing Social media websites: The government needs to focus on secure the social media sites because people share all their social life activities in social media pages and it can lead to many other consequences (Bertot et al., 2012). Legal Action Taken: The police commander of NSW of the Fraud Cybercrime Squad needs to take some serious actions against such website owners and charge them with high penalties and legal action should be taken against both the service buyer and provider. High Authentication Required: The authentication procedure needs to be much more strong and better. An awareness program can be conducted using a video promoting how unethical is hacking and its impacts and effects. Conclusion The study explains about the two different theories that are implied in the case study and is analyzed accordingly. The document describes two theories one is Deontology and another one is Virtue Ethics. These two methods are applied in the case study and an essay is written by the researcher. The document explains how virtue ethics and deontology is significant and what kind of impact does it leave for individuals. What needs to be done and what exactly has to be done to apply those theories based on the case study is discussed. References Bertot, J. C., Jaeger, P. T., Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations. Government information quarterly, 29(1), 30-40. Harrist, R. S., Richardson, F. C. (2014). Pathologizing the Normal, Individualism, and Virtue Ethics. Journal of Contemporary Psychotherapy, 44(3), 201-211. Hursthouse, R. (2013). Normative virtue ethics.ETHICA, 645. Jackson, F., Smith, M. (2015). The Implementation Problem for Deontology.Weighing Reasons, 279. Pro, I., IT, S., addresses, R. (2015).Rent-a-hacker site leaks Australian buyers' names and addresses.The Sydney Morning Herald. Retrieved 27 May 2016, from https://www.smh.com.au/it-pro/security-it/rentahacker-site-leaks-australian-buyers-names-and-addresses-20150529-ghca3f.html Sunstein, C. R. (2013). Is Deontology a Heuristic? On Psychology, Neuroscience, Ethics, and Law. On Psychology, Neuroscience, Ethics, and Law (August 1, 2013). Thomas, A. J. (2015). Deontology, Consequentialism and Moral Realism. MinervaAn Open Access Journal of Philosophy, 19. Weiss, J. W. (2014).Business ethics: A stakeholder and issues management approach. Berrett-Koehler Publishers.

Tuesday, December 3, 2019

Software Requirement Specification free essay sample

The description and overview of everything included in this SRS document is explained here. Also, the purpose for this document is described and a list of abbreviations and definitions is provided. 1. 1 Purpose The purpose of this document is to give a detailed description of the requirements for the †Department Attendance and CPE Management† software. It will illustrate the purpose and complete declaration for the development of system. This document is primarily intended to be proposed to the CSE department’s office staff and the staff-in-charge for CPE management. Scope The †Department Attendance and CPE Management† is a Computer based software system which is capable of the following : 1) The CPE management system has in it the details about the conferences that are organised in the college, the conferences attended by the students or staff from SSN and also the details of the Guest Lectures that took place. 2) It keeps track of the conference title, the type of conference, the type of participants, sponsor and resource person of conferences organised in the college. We will write a custom essay sample on Software Requirement Specification or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page On demand, the system can generate details such as number of workshops organised within a period, number of conferences organised for students/ staff/ both and other required reports. 4) The attendance system monitors the attendance record of all the students in the department period wise. The system also maintains period wise accumulation of attendance of all students in each subject. 5) This system keeps track of marks obtained by students in each of the Unit Tests in all subjects. The records are maintained for all three Unit Test cycles. The system includes features that can generate reports such as class wise Unit Test mark sheets, period wise accumulation of attendance on demand. 1. 3 Definitions, acronyms, and abbreviations Term Definition Admin/Administrator System administrator who is given specific permission for managing and controlling the specific part of the system. CPE Management Keeping track of different conferences, workshops and guest lectures attended or organized by staff and students Student Attendance The attendance and mark details of each student in the department DACM system Department Attendance and CPE Management 1. 4 References [1]IEEE Software Engineering Standards Committee, â€Å"IEEE Std 830-1998, IEEE Recommended Practice for Software Requirements Specifications†, October 20, 1998. [2] Pressman, Roger (2010). Software Engineering: A Practitioners Approach. Boston: McGraw Hill. 1. 5 Overview A general description, including characteristics of the users of this project, the products hardware, and the functional and data requirements of the product is portrayed in the Overview. General description of the project is discussed in section 2 of this document. Section 3 gives the functional requirements, data requirements and constraints and assumptions made while designing the system. Section 3 also gives the specific requirements of the product, external interface requirements and gives detailed description of functional requirements. 2. Overall description An overview of the whole system is given here. The system is explained in its context to show how the system interacts with other systems and introduce the basic functionality of it. It will also describe what type of stakeholders who will use the system and what functionality is available for each type. 2. 1. Product perspective This Department Attendance and CPE Management system will be a package used by the Department of CSE to improve the efficiency in maintaining the attendance and mark database of the students and facilitating in keeping track of conferences, workshops and guest lectures attended and organised by staff or students. 2. 1. 1. User interfaces The DACM system will be placed available to the office staff and the staff-in-charge with separate login so as not to end up in chaos. There will be a login page which will prevent unauthorized use. 2 An interface for managing and updating student marks and attendance will be available to the office staff after authentication. Reports can also be generated via the interface. 3 The CPE management system to be managed by the staff-in-charge after authentication will have an interface to update details about conferences organized by the department, conferences attended by staff and guest lectures delivered by staff. Reports can be generated periodically via the interface. 2. 1. 2. Hardware interfaces The DACM system is intended to be platform independent. Therefore no specific hardware is excluded. But it will at least work on x86 systems without any additional porting efforts. There is a necessity of a printer if a hard copy of the reports is needed. Moreover, no special hardware is needed for software operation. 2. 1. 3. Software interfaces The DACM system is intended to be operating system independent. Therefore no specific operating system is excluded. Databases would be configured using SQL and the front end will be designed using Java. Memory constraints This DACM system is expected to use no more than 512 MB of RAM and 100 MB of external storage. 2. 2. Product functions With this software system, the management of student attendance and mark details by the department’s office and the CPE management by the staff-in-charge will be hassle-free. Updates are done on a button-click and the reports are available instantly. Any sort of information can be gathered with a great ease. 2. 3. User characteristics There are two types of users who use this system. Staff-In-Charge :The department staff who uses this system to keep track of the events organized and attended by staff and students of the department and generates reports for a particular period. 2 Office Staff:The office staff who inputs the system with the student details, Unit Test marks and periodical attendance and generates reports for a particular period. 2. 4. Constraints The Network connection is a constraint for the application. Since the application fetches data from the database over the same network, it is crucial that there is a network connection preferably a LAN connection for the application to function. Further the capacity of the database also affects the system since the database is shared between both applications it may be forced to queue incoming requests and therefore increase the time it takes to fetch data. 3. Specific Requirements The functional and quality requirements of the system are described here. It gives a detailed description of the system and all its features. 3. 1 External interface requirements The DACM system will use the standard input/output devices for a personal computer. This includes the following: Keyboard Mouse Monitor Printer 3. 2 Functional Requirements Functional requirements define the fundamental actions that system must perform. The functional requirements for the system are divided into two main categories 1 Department Attendance Management: a The system after authentication can collect information of students such as i Student Register Number ii Student Name iii Student Class (Semester) and Section iv Subjects v Unit Test Marks vi Attendance b The office staff will also be capable of updating these details especially, the marks and attendance. Required type of reports for each class or student can be generated depending on the constraints specified by the office staff. 2 CPE management: a The staff-in-charge after authentication can enter information about the conferences, seminars and workshops organised in the college. b The staff-in-charge can then add entries whenever staff have attended these events in other institutions or have delivered guest lectures in other institutions. c Provisions for generating periodic reports based on staff and students are also available. 3. 3 Non Functional Requirements Non Functional requirements define the needs in terms of performance, logical database requirements, design constraints, standards compliance, reliability, availability, security, maintainability, and portability. 3. 3. 1 Performance Requirements Performance requirements define acceptable response times for system functionality. The system developed must comply with the following non-functional requirements: 1 The load time for user interface screens shall take no longer than two seconds. 2 The log in information shall be verified within five seconds. 3 Queries shall return results within five seconds. Software Quality Attributes. The graphical user interface of the DACM system is to be designed with usability as the first priority. The application will be presented and organized in a manner that is both visually appealing and easy for the user to navigate. There will be feedbacks and visual cues such as notifications to inform users of updates. 3. 3. 3 Fault Tolerance The system is designed to tolerate faults to certain extent. Improper data such as wrong username or password is acceptable up to 3 times after which the system will be locked for 10 minutes. 3. 3. Security Requirements Security of the system is guarded primarily through proper authorization. The system is resistant to hackers as it cannot be hacked through brute-force and such other attacks. 3. 3. 5 Platform constraints The DACM system shall run in any Microsoft Windows/Linux environment that contains Java Runtime and the SQL database. 3. 3. 6 Logical Database requirements Since this system handles voluminous data for numerous students, the database plays a major role in determining the system security and performance. SQL database will be used to store and retrieve the information. Software Requirement Specification free essay sample Students to several process modeling techniques for representing business processes. Although this chapter focuses primarily on data flow diagramming, brief overviews of functional hierarchy modeling and Oracle’s process modeler are given. After a brief introduction to process modeling, data flow diagramming techniques are introduced in a section called â€Å"Data Flow Diagramming Mechanics. † This section demonstrates the basic DFD symbols, definitions, and rules. The authors use the Gane and Sarson symbol set throughout the book, and these symbols are explained in this section. Hoosier Burger, the food ordering system first mentioned in Chapter 2, is used to illustrate basic data flow diagramming concepts. This section also includes explanations of decomposition and balancing. Chapter 8’s third major section introduces four different types of DFDs: current physical, current logical, new logical, and new physical. Hoosier Burger’s inventory control system (which is manual) is used to illustrate the first three types of DFDs. Current practice in using DFDs indicates that very little time should be spent on the current physical DFD. We will write a custom essay sample on Software Requirement Specification or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The fourth major section in this chapter, â€Å"Using Data Flow Diagramming in the Analysis Process,† introduces guidelines for drawing and using DFDs. This is different from the mechanical rules presented earlier. Topics include completeness, consistency, timing, iterative development, primitive DFDs, and analyzing DFDs for system inefficiencies and discrepancies among DFDs that are supposed to be modeling the same system. A Hoosier Burger example helps illustrate these guidelines. The â€Å"Oracle’s Process Modeler and Functional Hierarchy Diagrams† section introduces students to two other process modeling tools. These tools are Oracle Designer’s process modeler and functional hierarchy modeling, a tool found in several CASE products. In this section, the authors show how to prepare basic process models and functional hierarchy diagrams. Additionally, the authors compare and contrast Oracle’s process models to data flow diagramming. In the last section of this chapter, the authors’ overview process modeling for Internet-based electronic commerce applications. As they explain, process modeling for Internet-based electronic commerce applications does not differ from more traditional applications development projects. Instructional Objectives Specific student learning objectives are included at the beginning of the chapter. From an instructor’s point of view, the objectives of this chapter are to: 1. Show how to logically model processes with data flow diagrams. 2. Teach students data flow diagram symbols and the mechanical rules necessary to create accurate, well-structured process models. 3. Show students how to decompose data flow diagrams into lower-level diagrams. For people who are not familiar with data flow diagrams, the students should find that it is relatively easy to show them that data flow diagrams are a better way to model processes. Chances are that this person’s original picture already has many of the elements of a standard data flow diagram anyway. Research has found that process modeling is a very natural activity for most people, even when they are not formally trained in this technique.