Tuesday, March 4, 2008

THE FAMOUS....PRISION BREAK SEASON 3

VIEWER DISGRATION IS ADVISED..........
Prison Break 1 - OrientacionNow locked up in a Panamanian prison known as Sona, Michael, T-Bag, Bellick, and Mahone try to find a way out. Much to their devastation, they soon find out that the prison has been abandoned by the authorities because of the immense threat from the vile inmates. Michael seeks for an inmate named Whistler in the prison sewers. As Lincoln is puzzled by Sara's sudden disappearance, he learns that LJ has gotten into some trouble.
Prison Break 2 - Fire/Water
Michael and Mahone try to lure Whistler out of his hiding place. T-Bag gains some upward momentum in the prison hierarchy as the water supply is running low. Lincoln meets familiar and not so familiar faces on his quest to free MichaelPrison Break 3 - Call Waiting
Whistler tells the truth to Michael. Michael tries to get in touch with Sara but the only phone is in Lechero's quarters, so he has to rely on T-Bag's help. Mahone battles his addiction. Bellick steps on some toes.
Prison Break 4 - Good Fences
After taking delivery of a package from The Company, Lincoln realizes that they are deadly serious. Michael's new break out plan relies on electricity. Haywire is back from the dead, haunting disoriented Mahone. Bellick and T-Bag get special attention from Lechero.

Prison Break 5 - Interference
A new inmate named Tyge is brought to Sona. After he seemingly recognizes Whistler, Michael's doubts arise. T-Bag enters a new area of commerce. Lincoln goes to the seaside with Sofia. Sucre takes over the side-business of his predecessor.
Prison Break 6 - Photo Finish
Michael threatens to cancel the escape plan unless he sees a proof that Sarah is still alive. Whistler is accused of murdering an inmate and it is up to Michael to prove his innocence and save his life. Lincoln and Sofia help in monitoring the morning guards. Mahone may have another way to get out of Sona.
Prison Break 7 - Vamonos
Everything goes wrong for Michael as he tries to create a diversion. Lincoln tries to outsmart Susan who has his son. Sucre offers his assistance to Lincoln.
Prison Break 8 - Bang & Burn
Susan jeopardizes Michael's life as she puts her own escape plan into motion. Whistler's past catches up to his girlfriend.
The Company goes after Lincoln and Sucre. Justice prevails for Mahone.
Lechero sheds light into an empty tunnel.

Prison Break 9 - Boxed In
The Panamanian Army arranges Michael to get a taste of solitary.
T-Bag reserves a spot in the escape. Bellick's life turns into an uphill battle. Susan traps Sucre.
Prison Break 10 - Dirt Nap
Lechero's demotion devastates Michael's breakout plan as Sammy takes reigns at Sona. T-Bag forces Bellick to fight in a fight where the odds are stacked heavily against him.
Lincoln and Sucre have some surprise fireworks set for Susan.Prison Break 11 - Under & Out
Michael's escape may be in jeopardy because of heavy rain. T-Bag and Lechero join forces, while Bellick hopes to do the same with Mahone.

Prison Break 11 - Under & Out (HDTV 720p x264)
Prison Break 12 - Hell or High WaterMichael, Whistler, and Mahone make their break from Sona. But Mahone seems like the odd man out along the way.

Saturday, February 23, 2008

MODERATE DEFINATIONS OF CYBER CRIMES

Cyber crimes are so much obvious that they are checked by law. But the question is: who is going to check that i.e. what is the crime or what is the intended. Unfortunately there is no proper way to check the extents of these so called cyber crimes. Mostly cyber crimes include spamming, spoofing, cyber stocking, fishing, virus propagation and malicious code. As it is described earlier that are these are declared crimes, so it should be precisely defined the proper definitions. It also should be decided as if these are crimes or not. Spoofing generally means to hide the identification. critically speaking the spoofing includes sms spoofing, ip spoofing, Mac spoofing, email spoofing, websites spoofing etc. in sms spoofing one hides his cellular no. or may provide a wrong no. in ip spoofing while surfing the internet one hides or provides the wrong ip address for whatever he or she intended to. Similar is the case with Mac address. The email spamming and spoofing is very extensively practiced. It is done by wrong or hidden email address. Web site spoofing is another Claus of spoofing. To provide the seemingly similar name instead of the original name is called web spoofing. Now let us see what are the intentions of these cyber crimes (so called) specifically spoofing. There could be many reasons may be it is intentionally or un-intentionally. One thing is wrong for one person at the same time it is not as wrong as for another person. There are always been different aspects of a same thing. One may use spoofing in order to hide his\her identity to do some destructing activities like fishing, spamming, wrong URL, junk mailing, and other kind op cyber crimes. This is the intention to not to be traced. But on the other side one may use spoofing in order to use a single ip address for many users i.e. sharing of one ip address for more than one user. It seems to be a positive use of the spoofing. Every wireless device that is WiFi compatible has its own unique code or Mac address; they cover them so people don't steal their code. There is a chat application in Perl that used fake ARP requests as the transport called ARPArp (ARP Anonymous Relay Protocol). It's cool for interoffice chatting without any possibility of remote detection (since you're necessarily limited to the local network).
Now let us see that is it more useful or more harmful at all. It is use full in the sense that it provides the facility to use one ip for more users. But this use is also a root cause of many cyber crimes as one can not be traced in this case. If every one is assigned with a unique ip then every one committing a cyber crime could be checked.
concluding all this i recommend that spoofing is not as big issue that it should be declared as a crime.because all hackers,spammers,virus propogator did not necesserly use spoofing.there are hundured more ways to do so.moreover if we manage to provide a unique id to alll users(which is very difficult ),even then spoofing is possible.so what for punising the wrong person who did not even know about spoofing at all. i tink this is injustice to declare it a crime and to punish for it.because most of the time the innocent people get caught.which is ,in every law,WRONG. And laws are for protection but not for disturbing innnocent people. So consequently spoofing is more useful than it is harmful.

Thank you.

Review Of Chapter 1

  • How does copyright impede creativity?

copy rights impede the creativity in the sense that it bounds the production of mind capabilities in positive and innovative way.it repels the individuals to rely on their individual capabilities.

  • What 'blindness' is Lessig talking about on page 6?
it is about the striving for property.
  • Two types of constraints - technical and legal - hamper innovation . What actual constraints does Lessig mention in the text?

He is talking about "technical and legal".

  • Why are costs of production falling?

The cost of production is falling because of new innovations in technology.for example it happens sometimes that newly innovated things tend the consumer to leave the "OLD "thing behind.

  • What, according to Lessig, does the word 'consumer' signify? Do you think that blog writers, digital artists and music mixers are strictly consumers of Internet services? Why or why not?

The consumers are the people who uses the technology, in fact creativity and in other words become a part of creative process.

  • How does 'socialism' differ with 'capitalism' in the regulation of resources [p12]

Socialism is the power which is guided by the community,the control is ensured by the community itself.On the other hand socialism mean the manging power for different tasks are some individuals not the whole community.

  • What defines 'free resource' in a society?

A resource is said to be free when one can use it without the anyone's permission.

  • How is resource production different from resource access?


Resource production means to create or produce anything which is required by people where resource access is to utilize that things.

  • What might be the disadvantage of forcing all resources to be free?

Control produces more and more creativity and inovative power,without that one may not rely on its mental power.