Tuesday, August 6, 2019

Blood Brothers Essay Example for Free

Blood Brothers Essay Within a Blood Brothers. Compare the role of the narrator in the Play Blood Brothers and consider how you Would present the narrator to an audience if you were the director. The dictionary definition of narrate VT (a story) to tell, relate; to give an account of; (film, TV) to provide a spoken commentary for narration n narrator n The tradition of narration came from the Greek chorus. Their were thirteen people in the chorus; all singing and dancing. The chorus which served as the narrator, asked probing questions, and also gave great advice to the heroes. If there was any violence it was merely narrated, and not presented for fear of offending the audience. The purpose of the narrator is to let the audience know what is going on. Narration is one of the most important components of a story. The characters, plot, setting, and theme are also significant; however the narrator sets the mood and also the pace of the story, as well as predicting what might happen when the narrator is omniscient. In Blood Brothers the narrator plays a variety of roles for example sometimes he is at a higher status than them and also is sometimes very negative. The original Greek narrator was in a chorus which consisted of thirteen people, in the play Blood Brothers the narrator sang with the characters but he was much more involved and not separated, as the Greek chorus were. The Greek chorus usually stayed as part of the chorus or on the side of the stage. They knew everything about the characters and sometimes they could see into the future like in Blood Brothers when the narrator was preparing the audience for what was going to come next in throughout the play. They usually spoke the beginning and end of the play. He narrated the beginning of the play to set the scene and at the end he was the last one to speak before they in Blood Brothers case this was just after the twins died. In act 1 scene 1 the narrator is a storyteller. He also sounds, very negative in what he is saying as he says Brother parted from brother Wrenched apart A stone in the place of a heart which is negative. His mother gave him away because she didnt think she would be able to cope and also because of money as well as her other seven children. I feel that the narrator is being very harsh because the way he says A stone in the place of a heart but she knew that she might be able to cope with one more children but not with two as its only her to look after them. I dont think its good that the narrator manipulates the characters minds as it is coming away from the tradition so I dont think thats a good idea because as soon as one thing changes they change everything. In this scene Act 1 scene 3 the shoes the shoes Whats wrong with them on. On the table take them off take them off oh god you never put new shoes on a table Miss Lyons. You never know what might happen. The narrator is forcing the idea of superstitions and it makes the audience wonder if it will have any effects, as it appears to. Eventually he is also trying to enforce that as she was not very well educated and believe in superstition like that but as the educated ones know more and are better off so they dont believe in as much superstition as them. The narrator appears to be working in Mrs Lyons favour and against the mother. In act 1 scene 6 the narrator informs the audience he has also set up his plan on controlling the families, that the mother reminding the audience of the decision and is regretting giving her baby away, The debt makes it sound like its a business deal and is also a metaphor, Paid those words are both cold. The narrator is also blaming the mother for giving her child away. I think that it is her fault for giving her child but at the end of the day she knew she wouldnt be able to cope with any more children so she had to do something. The narrators main role throughout the show is to act as a constant reminder to us of the brothers tragic fate for example Shoes upon the table which is repeated throughout both acts of the show. In Act 2 scene 1 the narrator makes this scene particularly eerie. The idea of the devil being there all the time indicates something terrible might happen. Here he is playing the part of the devil theres no use clutching at your rosary, the Devils in the back yard, he can see thought the gaps in the curtains he sees it all, theres no use in hiding in the hall. When he raps at the knocker then he knows youre in; No you wont no youll never get away from him. This raises an evil issue as hes everywhere. The last two lines No you wont, No youll never get away from him. Is an eerie writing that is repeated for even more effect. From Act 2 scene 11 we notice from the first two lines that there is repetition. The only difference is of the back yard working class garden middle class. Devil in your bones getting into your ghostly running away from someone you can run hide but hell always find you when he rings at the chimes it builds up tension as he is saying that you will never get away from the devil even if you run hide hell always find you and is also showing the ghostly side of him, and again the idea of the negative within the play. From Act 4 Scene 1 we notice the narrator in a positive light as he comments The summers never ever going to end The devil is hardly visible. There is not much evidence of negative. The narrator also makes the audience happy which also makes the m unprepared for what is coming. In Act 4 scene 2 there is as difference as the social class has divided them because Mickey wanted to work but Eddie has a lot of money and doesnt have to work which causes frustration for Mickey. Again the narrator hints at the idea that the social class division may lead to a negative outcome. In this scene (Act 4 scene 3) Mickey is offered a job from Eddie but refuses it and is sad because he cannot find one himself, the feels that he has lost the sense of pride. Again this gives the audience even more clue that because of this Mickey and Eddie will be torn apart even more. In Act 5 scene 1 Linda got Mickey and Eddie takes over his fathers business. Gradually throughout the play the narrator is not warning + predicting but gradually taking over the whole character by being within that character. If I was the director I would dress the narrator in black as that is a dark colour and also can represent the negativity in the play. But I would also dress him in a lighter colour like yellow to show the happier side of the narrator. I would make him dress in red to show the devil side of him or give him a red fork so show that there is also a devil with in him when he is manipulating the characters to do bad things or talking in a cold tone. Id also consider putting him at a higher status I would make him stand on the balcony or on staging blocks as he seems to be controlling the families but I would also ask him to walk around so he would be in with the cast to show the equality in status at times. He would have a deep voice as many people see god as having a deep voice and as he is controlling the families and is a higher status and people see god to be in the sky. My narrator would appear at the beginning and at the end of the play. He would also appear to sing with the characters so he will be interacting with the characters. He would also be standing on the balcony at the side when he would be controlling the families I would also want him to interact with the characters as I want him walking around in between the characters when they are frozen and he is explaining to the audience what is happening. For the body language if I was showing the bad side of him I would make him stand in one place at a higher status staring down at the characters but if hes in a good mood I want him walking around interacting with the characters. I would also give him a strong accent as many people perceive god to have a strong accent and a deep voice. He will also talk loud as thats how many people see god. Conclusion The understanding of the narrator has helped me to analyse this dramatic technique by setting the scene, also explaining to the audience what is going on. I found it particularly useful to be able to compare the Blood Brothers narrator with the original Greek narrator and this produced me with even more understanding.

Monday, August 5, 2019

Three Major Categories Of Software

Three Major Categories Of Software Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category. Software applications refer to programs on a client machine which are written to perform specific tasks. Nowadays, there is a wide range of software applications being developed including word processing programs, database management tools, photo editing software, etc. But during the last decade the web has become the new deployment environment for software applications. Software applications that were previously built for specific operating systems and devices are now being designed specifically for the web (web-enabled). Because of this new movement, and as the web becomes increasingly a universal interface for software development, the software industry is experiencing a major evolution toward web-related software applications (Festa 2001). For example, the recent release of Googles Chrome web browser which was specifically designed to enable the execution of web applications and services in the web browser confirms this trend. As the web evolves, the surrounding and supporting technologies are becoming more complex. This is especially relevant in web-enabled applications such as web browsers, email/news clients, VoIP and chat clients which allow the interaction with the web from the client side. Web browsers specifically have become the doorway to the Internet and are currently the most widely used applications and the standard tool for consuming Internet services. This evolution toward web-related applications had a direct impact on the security of such applications. For instance, vulnerabilities and attacks against web browsers became more popular as such attacks compromise the security and privacy and have serious implications for web users. Once a web-related software is infected, the users web interaction can be fully exposed to the attacker. For instance, an infected web browser can expose the victims web addresses, data typed into forms, user sessions and cookies. Moreover, vulnerability risks in a web browser can have a serious implication for intranets (Anupam and Mayer 1998). Most users use the same browser to access information on the intranet as well as the Internet. A user who has been attacked through vulnerable web browser has compromised his or her firewall for the duration of the browsing session (c). Examples of such vulnerability risks against web browsers include key loggers. Key loggers are a form of spyware which can be installed through vulnerability in a web browser and then logs all pressed keys whenever a user visits a certain online banking web site. The increase in vulnerability risks in web-related software is related to the exponential growth of the Internet. As we enter through the second decade of the 21st century, the rapid adoption of the Internet market along its ubiquitous presence will continue to make Internet technologies such as web-related applications a prime target for attackers as they constitute the largest mass of victims. Hypothesis 1a: Vulnerability type will be highly positively related to web-related software applications Hypothesis 1b: Frequency of vulnerability will be highly positively related to web-related software applications Hypothesis 1c: Severity of vulnerability will be highly positively related to web-related software applications System Software: System software refers to the set of computer programs which are required to support the execution of application programs and maintain system hardware. Operating systems, utilities, drivers and compilers are among the major components of system software. Such components are the enablers and service providers to software applications. Among these components, the operating system is the most popular and important one. The operating system market for client PCs has evolved along the lines predicted by theories of increasing returns and network externalities (Shapiro and Varian 1999). But with this increase in network externality, there has been a dramatic increase in vulnerabilities (cite xxx). For instance, between 2007 and 2009, the number of operating system vulnerabilities almost doubled from 220 to 420 vulnerabilities (CVE 2010). Such increase in vulnerabilities can be caused by several reasons. First, network externality implies larger user base which makes operating systems an a ttractive target for hackers. In addition to that, viruses and worms can spread more rapidly because of the large installed user base and network effect. Second, the architecture of some operating systems like Windows allows vulnerabilities to gain a direct access to the operating system files through external scripts; meaning that if malicious scripts are sophisticated enough, they can exploit system files through software applications or through system software directly. And last, the fame factor for discovering vulnerabilities in systems with significant installed user base make them potentially significant target for hackers. Lately, new technologies such as web-based cloud computing, virtualization and Just enough Operating System (JeOS) have been gradually diminishing the importance of the traditional operating system (Geer 2009). With cloud computing technologies, users can access web applications through their web browser; meaning that an OS like Google Chrome will only be needed to run the web-browser. Moreover, with virtualization technology a personal computer or a server is capable of running multiple operating systems or multiple sessions of a single OS at anytime without having the user rely on a single OS. Similarly, Just enough Operating System (JeOS) focuses on running applications which require minimal OS. As these technologies are gaining popularity and becoming more adopted by users, the role of an OS is starting to decrease so does its network externality. With this is mind, we hypothesize that attackers interests and vulnerability risks will gradually shift to other technologies as they become more popular. Hypothesis 1d: Vulnerability type will be positively related to system software Hypothesis 1e: Frequency of vulnerability will be positively related to system software Hypothesis 1f: Severity of vulnerability will be positively related to system software Web Applications: The remarkable reach of web applications into all areas of the Internet makes this field among the largest and most important parts of the software industry. As of today, the Internet consists of hundreds of thousands of small and large-scale web applications ranging from e-Commerce applications to social networking sites to online gaming. This popularity has attracted large user base which made web applications lucrative targets for attackers to exploit vulnerabilities. Web applications are currently subject to a plenty of vulnerabilities and attacks, such as cross-site scripting (XSS), session riding (CSRF) and browser hijacking (Mansfield-Devine 2008). Hence, the landscape of vulnerabilities has changed significantly during the first decade of the 21st century. Previously, buffer overflow and format string vulnerabilities accounted for a large fraction of all vulnerabilities during the 1990s, but as web applications became more popular, new vulnerabilities and attacks such as SQL injections and XSS attacks exceeded earlier vulnerabilities. According to CVE surveys, security issues in web applications are the most commonly reported vulnerabilities nowadays. In response, web application vendors dedicated more resources towards securing their products as they tend to receive more attention as potential targets because of their large pool of possible victims (Mercuri 2003). The problem of web application vulnerabilities is becoming more complicated with the recent movement towards Web 2.0 technologies. The landscape of Web 2.0 enables new avenue of vulnerabilities by using sophisticated scripts on the client side. Moreover, Web 2.0 websites are becoming riskier than traditional websites because they use more scripting capabilities to allow users to upload content, share information and gain more control. Despite the growth of web applications and Web 2.0, these technologies are still limited by the available resources such as network bandwidth, latency, memory and processing power. More specifically, its argued that web applications are constrained by the capabilities of the web browser they are running in. With this drawback, web application users will ultimately have to rely on their own resources to accomplish magnitudes of tasks. Compared to system and software applications, we hypothesize that web applications will continue to experience vulnerability risks but at a lower rate than other popular software. Hypothesis 1g: Vulnerability type will be least positively related to web applications Hypothesis 1h: Frequency of vulnerability will be least positively related to web applications Hypothesis 1i: Severity of vulnerability will be least positively related to web applications Targeted Operating System Software producers often create applications to run on a single or a combination of operating systems (OS). From a software viewpoint, maintaining security is the obligation of both the OS and the software program. But since computer hardware such as the CPU, memory and input/output channels are accessible to a software programs only by making calls to the OS, therefore, the OS bears a tremendous burden in achieving system security by allocating, controlling and supervising all system resources. For the most part, each of todays streamlines OSs has a main weakness. For instance, earlier OSs such as Windows NT, UNIX and Macintosh had a weakness in their access control policies (Krsul 1998). Such OSs didnt specify access control policies very clearly which meant that applications that ran by users inherited all the privileges that the access control mechanisms of the OS provided to those users (Wurster 2010). An access control policy requires an OS to give a program or a user the minimum set of access rights necessary to perform a task. In his work, Denning (1983) illustrated the working of an access control policy which typically consists of three entities namely, subjects, objects and access rights matrix. Subjects refer to users or domains whereas objects are files, services, or other resources and access rights matrix specifies different kinds of privileges including read, write and execute which are assigned to subjects over objects. A configuration of the access matrix d escribes what subjects are authorized to do. Vulnerabilities in OSs tend to rely on weaknesses in configuration of access control matrices to gain access to software applications and system software. This creates a serious problem since vulnerabilities can exploit software applications through the OS gain access and ultimately take over the system. An example of an access control policy failure is Java virtual application. The Java virtual machine was among the applications which defined, and enforced its own access control matrix. Its sandbox was compromised of a number of OS components which ensured that a malicious application cannot gain access to system resources. But once the access control mechanism of the virtual machine fails, a malicious applet can be given access beyond the sandbox (McGraw and Felten 1997). Meaning that the OS can allow a malicious applet full access to the users files because to the OS there is no difference between the virtual machine and the applet. Moreover, even with an access control policy in place, consideration must be given to system design. The OSs which are in use today have different architectures and are designed with different kernels without considering security and controlled accessibility as significant design criteria. For instance, a large portion of UNIX and Linux vulnerabilities result from boundary condition errors which are commonly known as buffer overflow (cite xxx). These boundary conditions result from a failure to properly check the bound sizes of buffers, arrays, strings. Attackers tend to exploit this weakness in UNIX and Linux OSs to gain access to system software and software applications. On the other hand, vulnerabilities in Windows OS tend to be evenly divided among exceptional conditions, boundary conditions and access control validations (cite xxx). With these types of vulnerabilities root break-in and execution of arbitrary code are common types of attacks. When it comes to writing software for different platforms, programmers must acknowledge the potential vulnerabilities and threats targeting their software. Since different OSs have different vulnerabilities, the task of designing a secure application tend to become much difficult since they have to consider vulnerability risks of each OS. Therefore we hypothesize that: Hypothesis 5a: Vulnerability type will be positively related to software which target more operating systems Hypothesis 5b: Frequency of vulnerability will be positively related to software which target more operating systems Hypothesis 5c: Severity of vulnerability will be positively related to software which target more operating systems Software Free Trial Free trial strategy is used by many vendors to promote and sell their goods. This strategy is especially popular and found to be effective to promote and sell digital goods such as software and music. Unlike physical goods, the intangibility of digital products prevents consumers from assessing the products before the consumption and adoption (Heiman and Muller 1996). Such uncertainty of product functionality reduces consumers motivation to adopt the product and is considered a source of market failure. Nowadays, offering software free trial at a low marginal production cost has resulted in the prevalence of free trials strategy. For the software market, there are two strategies of free trial, namely a fully functional free version with limited trial period (time locked version) and a limited functional version (demo version). Each of these strategies has its own advantages and disadvantages. For instance a demo version has an advantage of capturing the network effect from both trial users and the buyers. In contrast, some consumers may find it adequate to use only the limited functionalities provided in the demo version rather than purchasing the full version software. Similarly, offering time locked software version can negatively affect the software vendor as consumers with limited usage can utilize this short-term to fully take advantage of the free trial without buying the full software product. Based on these trial strategies, there have been numerous studies regarding the effect of free trial on software learning curve (Heiman and Muller 1996), software piracy (Chellappa and Shivendu 2005) and software performance (Lee and Tan 2007). For this study, we are interested in measuring the effect of free trial strategies on software vulnerabilities. Although software vendors often release demo or time locked versions, such versions can still contain good source of information for the attackers. Attackers typically misuse the trial versions to look for, find and exploit vulnerabilities. Furthermore, attackers can reverse engineer the limited code and find vulnerabilities (Sutherland et al. 2006). This technique has become particularly important as the attacker can apply vulnerabilities found in free trial versions to exploit full version software. Moreover, there are many hacker groups on the internet who specialize in cracking free trial and full versions software and releasing them on the internet under what is known as warez. Such groups usually compete with one another to be the first to crack and release the new software. These cracked versions (warez) can also serve as potential targets for attackers looking for vulnerabilities. Hence, while providing free trial versions of software by software vendors is a marketing strategy, vendors should also expect such free versions can become targets for vulnerabilities and early exploits. Hypothesis 6a: Vulnerability type will be positively related to software which offer trial versions Hypothesis 6b: Frequency of vulnerability will be positively to software which offer trial versions Hypothesis 6c: Severity of vulnerability will be positively to software which offer trial versions Software License The diversity of the software business model drives the need for different types of software licenses. A software license is a legal agreement forming a binding contract (relationship) between the vendor and the user of a software product and its considered an essential part in the evolution of the software to a market product. Software license is regarded as one of the fundamentals of OSS as there are currently close to 73 different licenses (Perens 2009). Most OSS licenses are classified based on the restrictions they impose on any derivative work (Lerner and Tirole, 2005). Examples of OSS licenses include GPL, LGPL and BSD. General Public License (GPL) is currently the most popular OSS license which states that any derived work from other GPL software has to be distributed under the same licensing terms. The Lesser GPL (LGPL) and the Berkeley Software Distribution (BSD) are other popular alternatives to GPL with similar characteristics. OSS projects rely heavily on code reuse as shown by DrDobbs (2009). In their work, 1311 OSS projects were analyzed and 365000 instances were found of code reuse among those projects. In principle, most of the OSS licenses allow programmers to modify and reuse existing code. This degree of code inheritance can have positive and negative effects on the security of the software. In their work, Brown and Booch (2002) discussed how reuse of OSS code can inherent insecurities and talked about the concerns which companies have regarding OSS code and how it was developed and in particular the origins and the reuse of its code. Indeed an analysis study by Pham et al. (2010) suggested that one of the key causes of vulnerabilities is due to software reuse in code, algorithms/standards, or shared libraries/APIs. They proposed the use of new model which uses algorithm to map similar vulnerable code across different systems, and use the model to trace and report vulnerabilities to software vendors . Reuse of OSS software has caused concerns as developers might inherent vulnerabilities from existing code but regardless of the open source community or software vendors positions on this debate, the possibility of security issues by reusing OSS code has been sufficient to the point where some vendors stopped reusing OSS code in their software. From a security perspective and when it comes to reusing OSS, vendors tend to follow one of the following approaches. Abandon OSS software; only reuse code which has been extensively reviewed; or maintain a relationship with the OSS community and get involved with the development process (Brown and Booch 2002). Its our belief that licenses which allow developers to reuse source code will be more susceptible to vulnerabilities than closed source proprietary licenses. Meaning that software licenses which allow code reuse are more likely to inherit or contaminate derivate work. In contrast, commercial licenses which dont share or allow code reuse are less susceptible to inherit or contaminate vulnerabilities. Hypothesis 4a: Vulnerability type will be positively related to open source software licenses Hypothesis 4b: Frequency of vulnerability will be positively related to open source licenses Hypothesis 4c: Severity of vulnerability will be positively related to open source licenses Source Code Availability Security of open source software (OSS) and closed source software has been a hot topic with many arguments repeatedly presented. Advocates of OSS argue that more reviewers strengthen the security of the software as it eases the process of finding bugs and speeds it up given enough eyeballs, all bugs are shallow (Raymond and Young 2000). Opponents of this idea disagree and claim that not all code reviewers and testers have enough skills and experience compared to code reviewers at companies who are more skilled at finding flaws. The argument is that oftentimes code reviewers and testers need to have further skills other than programming such as cryptography, stenography and networking. Moreover, proponents of closed source software claim that security by obscurity is the main strength of closed source software since its harder to find vulnerabilities when the code is not accessible. However, proponents of OSS argue that its possible to gain access to closed source code through publicl y available patches and disassembling software (Tevis 2005). Its important to note that the impact of the availability of source code on security depends on the open source development model. For instance, the open source cathedral model allows everyone to view the source code, detect flaws/bugs/vulnerabilities and open reports; but they are not permitted to release patches unless they are approved by project owners. OSS projects are typically regulated by project administrators who require some time to review and approve patches. Attackers can take advantage of the availability of source code and published vulnerability reports to exploit them (Payne 2002). However, proponents of OSS argue that vulnerabilities in OSS projects can be fixed faster than those in closed source software because the OSS community is not dependent on a companys schedule to release a patch. Despite the continuous debate on OSS security, advocates from both sides agree that having access to the source code makes it easier to find vulnerabilities but they differ about the impact of vulnerabilities on software security. First of all, keeping the source code open provides attackers with easy access to information that may be helpful to successfully launch an attack. Publically available source code gives attackers the ability to search for vulnerabilities and flaws and thus increase the exposure of the system. Second, making the source code publicly available doesnt guarantee that a qualified person will look at the source and evaluate it. In the bazaar style environment, malicious code such as backdoors may be sneaked into the source by attackers posing as trustful contributors. For instance, in 2003 Linux kernel developers discovered an attempt to include a backdoor in the kernel code (Poulsen 2003). Finally, for many OSS projects there is no a priori selection of program mers based on their skills; project owners tend to accept any help without checking for qualifications or coding skills. Given the issues surrounding source code availability in OSS, we hypothesize that making source code publically available will induce attackers and increase vulnerability risks. Hypothesis 1a: Vulnerability type will be positively related to source code availability Hypothesis 1b: Frequency of vulnerability will be positively related to source code availability Hypothesis 1c: Severity of vulnerability will be positively related to source code availability Software Programming Language Selecting a suitable programming language is one of the most important decisions which have to be made during software planning and design. A chosen programming language has direct effect on how software ought to be created and what means must be used to guarantee that the software functions properly and securely. Software programs which are written using an insecure language may cause system dependent errors which are known to be difficult to find and fix (Hoare 1973). For example, buffer overflows vulnerabilities and other low-level errors are well known issues in C and C++ languages (Cowan 1999). As of today, there exist numerous programming languages but the topic of security in programming languages has been widely disregarded as its believed that programming errors and flaws should be eliminated by the programmers themselves. Current approaches to this issue are essentially ad hoc where best programming practices and secure programming techniques are implemented during or after the design stage. Although this approach helps in preventing coding errors and flaws by relying on programmers skills and experience, it is difficult to say with any certainty what vulnerabilities are prevented and to what extent. More importantly, the ad hoc approach doesnt protect against new and evolving vulnerabilities as it only handles known vulnerabilities and specific coding flaws. In his paper, Hoare (1974) stated that a programming language is secure only if the compiler and run time support are capable of detecting flaws and violations of the language rules. The main issue with this statement is that current compilers and debugging tools are not reliable since they parse code differently; therefore, its impossible to guarantee the same results for programs. Additionally, such tools dont help the programmer in finding vulnerabilities or flaws as they only report syntax errors. Typically, compilers and debugging tools dont allow for security checks on debugging runs, therefore no trust can be put in the results. An evolving trend in secure programming has been the use of formal language semantics. Formal language semantics try to reason with and prove security properties of the code. For example, in their paper, Leroy and Rouaix (1998) developed a formal technique to validate a typed functional language to ensure that memory locations always contain appropriate values to avoid buffer overflow vulnerabilities. Although the use of formal language semantics has been advocated (Dean et al. 1996, Meseguer and Talcott 1997, Volpano 1997), it wasnt widely adopted among programmers. When it comes to software languages, security is essentially dependent on numerous factors such as language developers, programmers and debugging tools. With so many factors, we believe that correlating software language with vulnerability risks will be insignificant. Hypothesis 2a: Vulnerability type will be insignificantly correlated with software language Hypothesis 2b: Frequency of vulnerability will be insignificantly correlated with software language Hypothesis 2c: Severity of vulnerability will be insignificantly correlated with software language Targeted Software Users There are many different types of computer users with a wide range of background, skills, and learning habits. Computer users are typically classified into two distinct groups, namely sophisticated and novice (unsophisticated) users. Sophisticated users have an advanced understanding of computer and Internet technologies; they tend to be more security-aware. Novice users refer to non-technical personnel who are not experienced with computers and the Internet; they rely on computers for simple tasks such as word-processing, spreadsheets, and occasional web surfing. Such users are more prone to security issues due to their inexperience. For instance ignoring software updates and security patches, failing to run essential protection utilities such as an anti-virus or firewall applications are typical security issues with novice users. Because of differences in experience level between both groups, some argue that vulnerabilities affect novice users more than sophisticated ones. Although this might be true for viruses and worms and old vulnerabilities, but when it comes to dealing with zero-day vulnerabilities everyone becomes a victim regardless of their sophistication level. Zero day vulnerabilities refer to unreported exploitable vulnerabilities for which a patch is not available from software vendors (cite xxx). Moreover, when it comes to attackers and potential targets, eventually everyone is a target. Despite the type of computer users, the objective of vulnerability attacks is to hack as many computers as possible with the least amount of effort (Spitzer 2002). Attackers tend to focus on a single vulnerability and use automated scanning tools to search for as many systems as possible for that vulnerability. Such automated tools are often called autorooters and can be designed to scan a specific network for vulnerable machines or scan a range of IP addresses until a victim is found. Its important to note that these tools dont distinguish between software user s as they look for any vulnerable target in sight. Hypothesis 8a: Vulnerability type will be insignificantly correlated with to targeted software users Hypothesis 8b: Frequency of vulnerability will be insignificantly correlated with to targeted software users Hypothesis 8c: Severity of vulnerability will be insignificantly correlated with to targeted software users Software Price Software price plays an important role in modifying the individuals attitude toward the software in many ways. For example, research studies which looked at software piracy found that software price to be a significant factor (incentive) which influenced the intention to pirate (Gopal and Sanders 2000). In their work, Peace et al. (2003) conducted a survey of 201 respondents and found that software price was among the major reasons for illegally copying software. Following the same analogy, studies have shown that attackers attitudes and hackers motivations for finding vulnerabilities are associated with several factors such as: peer approval, self esteem, politics, publicity, financial gains, curiosity and sabotage (Shaw et al. 1999). Within the hackers community, hacking achievements typically help individuals gain higher and more respectable status as it refers to the persons skills and mastery level. Reaching a higher status is oftentimes associated with noteworthy achievements such as hacking popular software. For those hackers who seek publicity or peer approval, they tend to target software with large user base due to their significant reach. So despite software price, hackers look for vulnerabilities in open source and proprietary software as long as there is a significant user base. Similarly, infamous social networking sites such as Facebook and Myspace are constant vulnerability targets regardless of their service cost. Outside the hackers community, hackers incentives tend to vary among political reasons (example: Google-China Hacking 2010), financial gains (example: ransom money attacks), self esteem and sabotage. Again, by analyzing each incentive, we find that software price doesnt play any role in v ulnerability risks. We therefore hypothesize that: Hypothesis 7a: Vulnerability type will be insignificantly correlated with to software price Hypothesis 7b: Frequency of vulnerability will be insignificantly correlated with to software price Hypothesis 7c: Severity of vulnerability will be insignificantly correlated with to software price

Sunday, August 4, 2019

Free Essay on Euthanasia and Physician-Assisted Suicide - Mother Teresa :: Euthanasia Physician Assisted Suicide

Mother Teresa's Little Sisters and Euthanasia In this essay we see Mother Teresa of Calcutta's Little Sisters of the Poor responding to the Europena Parliament's pro-euthanasia measure. In their response is found an insight into death which the Western world lacks. The Little Sisters are knowledgeable from personal experience with the many whom they have seen die. They are also firmly rooted in a strong religious tradition. Both of these considerations make their advice the very best one can hear in the euthanasia debate. "How can the Little Sisters of the Poor, in the service of the elderly, not be concerned about the passing of the principle of euthanasia by a Commission in the European Parliament? We feel that the confusion caused by the text pertaining to the use of extraordinary means to prolong life, palliative care and euthanasia can easily mislead an uninformed public. Yet behind these extremely complicated phrases, the thought is clear: to give doctors the right to satisfy the request for euthanasia, that is to say, to take a person's life. Human dignity does not consist in being able to choose the time of one's death, but in being aware of the fact that one's basic right is the right of respect for life, of respect for human dignity"(Little) The Little Sisters have 150 years of experience in accompanying the elderly up until the end of their lives, and by this experience they are authorized to make known to the public what they have seen and learned. Since their foundation, 17,080 Little Sisters have lived with the dying, and today they are in 30 countries on six continents, with 74 homes in France and Belgium, First World nations. So the dear sisters have expertise with the dying of both the Third World and our world. Making the elderly happy, that is what counts!" Mother Teresa used to say, encouraging the Little Sisters to attain this goal by employing means adapted to each person, to his/her possibilities, tastes, past life, health, etc. Making the elderly happy means believing in the value of their life, and the Little Sisters are witnesses of the extraordinary resources of the elderly. Having a center of interest, doing something they like to do, feeling useful, being able to take initiatives, to communicate, to form friendships, maintaining a facilitated relationship with the family, having contacts with youth: these are factors which provide joy and happiness.

Saturday, August 3, 2019

Evaluation of The Woman In Black Essay -- Drama

Evaluation of The Woman In Black On the 26/6/05 we went to see a performance called the women in black with all the pupils who chose drama as their gcse. We made our way to the coach and got ready to leave. The coach drove into London and everyone was very enthusiastic about seeing this play as it was supposed to be scary and most people there hadn’t been to the theatre. First we went to the theatre where we were given a preview of how they used lighting and sound on the stage. I was incredibly interested at how the lighting was such a big part in a performance! It affected the whole mood of the audience meaning that the sound and lighting director can control our mood before the actors even get on the stage. This I think is vital for the actors, for example if the lights were very bright and you were trying to pull of a scary scene it just wouldn’t work or it would be very hard to pull off. But if the lights were dim or even on black out then the mood would change, darkness is a good tool to use, but used too often can ruin a play. Darkness played a major part in the play; it was used two or three times, but only one being used to scare the audience. This created tension as sometimes, nothing scary would happen when the lights got dim. Sounds were also used with the lighting to create or make you use your imagination on the stage. Different sounds were played, but I found that the best â€Å"trick† they used was the journey the main character does on the...

Friday, August 2, 2019

Religious Imagery in Flannery OConnors The Life You Save May Be Your

Religious Imagery in Flannery O'Connor's The Life You Save May Be Your Own The religious imagery in Flannery O'Connor's 'The Life You Save May Be Your Own' gives the story a cynical undertone along with a healthy dose of irony. O'Connor uses allusions to Jesus and Christianity to examine the hypocrisies of the religion and its adherents. Her character Tom T. Shiftlet is portrayed paradoxically as both the embodiment of Christ and an immoral, utterly selfish miscreant. By presenting these polarities side by side within one persona, O'Connor shows the dichotomies between so-called Christian morality and the reality of the Church. During his first encounter with the Lucynell Craters, Mr. Shiflet appears to be a harmless, generous wanderer. As he approaches the Crater?s home he ?swung ...

Video Game Violence

Video Game Violence â€Å"Video Game Violence Law Poses Questions†, is an editorial located in the online magazine V Planet. Vance Velez, the author of the controversial issue, opposes the Washington law involving specific forms of video game violence, which is on the verge of being passed in the Legislature. He successfully persuades his audience that the Washington law limits people’s rights and that they should take a stand against the proposed law. His audience includes people who are in favor of the Washington law, concerned parents, and adult video gamers that oppose the Washington law, who are, in his definition, those 18 or older.Those who are in favor of the law may include politicians, or mothers who can relate to influential violence on children. Adult video gamers are those who enjoy playing video games as a favorite pastime, just like golf or aerobics, for most Americans. â€Å"It's no argument that video games are becoming more violent†, states Vele z. â€Å"Many parents and politicians oppose the violence; some even want to get these kind of video games banned. † A politician who opposes this specific form of violence is Mary Lou Dickerson. Mary Lou Dickerson is a State Legislator who has proposed a law to restrict certain violent material in video games.The proposed law, which is quoted in the editorial, states: â€Å"Levies a fine up to 500 dollars on anyone who rents or sells to someone 17 or younger computer games in which the player kills or injures a human form that is depicted as a public law enforcement officer. Police officers and firefighters are included in that classification. † Velez addresses many flaws in the proposed law in detail and also explains some consequences that may occur if the law is passed. Vance Velez is the author of many editorials that appear on this online magazine. His broad knowledge of video games allows him to pinpoint the main problems of the law.He successfully persuades peo ple that are in favor of the law, that it may, in the long run, actually harm our youth. The author's main argument throughout the editorial is backed by issuing a series of examples how many games that do not endanger young children, may be banned because of a faulty law. He mentions that passing the law will limit people’s rights and may also act as a gateway law, to limit others rights. â€Å"If they take away our right to have fun and view what we enjoy, then what else will they take away when violence is still present in our society? †Vance Velez explains in detail why people should oppose the Washington law on video games. Although he does introduce and define many terms involving video games, he expects the reader to at least have some knowledge about video games. He addresses many games, like Simcity and Grand Theft Auto, which have been in the mainstream lately; therefore, readers must be up to date with video games and must be familiar with certain type of vi deo games in order to understand the author’s references. Velez addresses adult video gamers and let’s them know that their precious games may be lost, so he urges them to take action and protest this pending law.Velez opposes the Washington law because it violates people’s rights. Velez' stand that taking away things mature Americans enjoy would be a crime in itself because it violates the Freedom of Speech rights. In his definition a mature American is a person who knows right from wrong. He states, â€Å"The Washington law, because it’s built on fear of the unknown and lack of communication, fails to recognize the freedom of speech rights. † The author uses logos by referring to people’s values of their rights. The author opens the first paragraph with a question, â€Å"What's the right way to protect children from violence? He appeals to those who are against video game violence and lets them know that he wants safety for our youth with the use of good reasons. He gains trust from this audience by showing he wants things for the better. His definition of children includes those who have a sense of right and wrong but are still easily influenced. He believes that video games aren't harming children; it's some other factor that is the reason why video games are harming very young kids, such as lack of parent guidance and discipline. Velez talks about this later on in his editorial.He then uses pathos to appeal to the feelings of concerned parents, and those who are in favor of the Washington law, as he states, â€Å"This is the fourth time that politicians have tried to pass laws regulating violent content in video games. † This audience sees how helpless and unsuccessful the government is when it comes to passing these types of laws. This audience feels sorry for the government, they sort of look down at them shame. Those who are in favor of the Washington law may begin to think that people who can’t make up their minds organize our country.They may start to question the proposed law and wonder if it too, will fail. Velez quotes Mary Lou Dickerson, who explains what the state legislator actually thinks about video games in response to a lawsuit. â€Å"The lawsuit filed today against Washington's ban on sales or rentals of cop-killing games to children comes as no surprise. Certain elements of the video-game industry clearly want the right to sell any game, no matter how brutal, racist or sick, to any child, no matter how young. † Velez rebuts this argument by initially stating it’s in violation of Freedom of Speech rights. Politicians are actually trying to ban violent video games which are a pastime that many adult Americans enjoy. † By adult, Velez states that he means, â€Å"Those people who are 18 or older. † He persuades this audience to take action by standing up against the law. Velez remarks, â€Å"Taking away an individuals right to have fun and enjoy video games can be argued as a violation. † The author is addressing adult gamers when he states this because they have the ability to stand up against such laws.The author’s statements threaten adult gamers and make them have a sense of danger that their lives are being controlled. Velez begins his argument by mentioning games that are â€Å"harmless†, in his opinion, which may be banned because they violate the grounds of the Washington law. His example of the game Simcity, appeals to logos and ethos by explaining how an educational game would be in violation of the law. He says, â€Å"In the game of Simcity, you can cause a minor disaster in your city by causing a tornado, an earthquake or a flood.These disasters can destroy the police station or fire department, which would be in violation of the proposed Washington law. † His audiences are those who are for the Washington law and concerned parents when he explains how â€Å"innocent† games, according to Velez, are the victims of the proposed law. He persuades them by making them realize not all â€Å"violent video games† are harmful to children. I think if this audience is familiar with the game of Simcity, they would agree that it is not a violent game, but the author makes them realize that their values will be lost if the law passes, by the use of pathos.Many video gamers would find this offensive because they aren't able to enjoy their â€Å"innocent† games. The audience’s emotions are being involved in this paragraph with the use of pathos. The author’s ethos is clarified once his familiarity and expertise with video games begin to show and as he introduces situations that are possible once the law is passed. In another example of a â€Å"harmful† video game, the definition according the Washington law, Velez introduces the game Rampage, where giant gorillas and lizards destroy cities, similar to King Kong.The author expla ins that in the game the animals are capable of crushing police stations and police cars. Rampage, which attracts gamers between the ages of eight and sixteen, would be in violation of the Washington law. The author introduces the silliness of the Washington law. He makes the audience realize that highly fictional characters aren't harmful to children; however, he states, â€Å"In the governments eyes, they will make children grow up to be terrorists. † Velez describes the many holes the proposed law contains.Those who are for the Washington law are persuaded with logos in this situation because they believe it is only fair for children or even adults to have fun if the game is completely safe. They may also think of other forms of entertainment that may also be involved with this kind of law. They imagine other situations where law enforcement officers are portrayed or killed, such as in numerous movies such as, â€Å"Robin Hood† and â€Å"Lethal Weapon†. Why a ren't these issues being addressed? Are video games that much worse than violent movies and plays?In his last paragraph, Velez explains his beliefs involving the problems of violent video games. His finger points to government and most importantly, the children's parents. He explains that parents have the responsibility to judge what their child sees and hears. Some adult audiences might find his accusation offensive and may get turned off by his remarks, because they are blunt and obtrusive. An example of this is when he remarks, â€Å"The parents should be responsible enough to monitor their children and make sure that that particular game does not enter the console (videogame system) itself. Reasonable adult audiences may actually listen to hear what the author is trying to get across.His use of logos appeals to those who are in favor of the Washington law because he makes them think about how parents could be the source of the problem. They may agree that parents need to be on the look out for what is safe and unsafe for their children. Velez explains that parents allow children to play violent video games that influence children to do harm which portray video games as the main source of the problem. It's easier to blame an image or machine than it is to blame people†, Velez said. The â€Å"parent† problem may make more sense to his opposing audience if they aren't biased and read the editorial with an open mind. In conclusion, Vance Velez was very familiar with his topic, which gave him enough credibility to persuade those in his audience who are in favor of the Washington law, to think twice about their position and possibly accept his belief, that passing the Washington law is a mistake.He’s also successful at convincing adult gamers, those 18 or older, to take action against the proposed Washington law. His arguments were well thought out and convincing by using logos and pathos. However, his alternative to the Washington law was a bit broad and didn’t really include a solution. He identified the problems that might occur if the law is passed, such as the loss of Freedom of Speech Rights, but he had no feedback on how else to deal with the situation. I believe author’s overall argument was persuading even though he didn’t include a proposed solution. Video Game Violence Video Game Violence â€Å"Video Game Violence Law Poses Questions†, is an editorial located in the online magazine V Planet. Vance Velez, the author of the controversial issue, opposes the Washington law involving specific forms of video game violence, which is on the verge of being passed in the Legislature. He successfully persuades his audience that the Washington law limits people’s rights and that they should take a stand against the proposed law. His audience includes people who are in favor of the Washington law, concerned parents, and adult video gamers that oppose the Washington law, who are, in his definition, those 18 or older.Those who are in favor of the law may include politicians, or mothers who can relate to influential violence on children. Adult video gamers are those who enjoy playing video games as a favorite pastime, just like golf or aerobics, for most Americans. â€Å"It's no argument that video games are becoming more violent†, states Vele z. â€Å"Many parents and politicians oppose the violence; some even want to get these kind of video games banned. † A politician who opposes this specific form of violence is Mary Lou Dickerson. Mary Lou Dickerson is a State Legislator who has proposed a law to restrict certain violent material in video games.The proposed law, which is quoted in the editorial, states: â€Å"Levies a fine up to 500 dollars on anyone who rents or sells to someone 17 or younger computer games in which the player kills or injures a human form that is depicted as a public law enforcement officer. Police officers and firefighters are included in that classification. † Velez addresses many flaws in the proposed law in detail and also explains some consequences that may occur if the law is passed. Vance Velez is the author of many editorials that appear on this online magazine. His broad knowledge of video games allows him to pinpoint the main problems of the law.He successfully persuades peo ple that are in favor of the law, that it may, in the long run, actually harm our youth. The author's main argument throughout the editorial is backed by issuing a series of examples how many games that do not endanger young children, may be banned because of a faulty law. He mentions that passing the law will limit people’s rights and may also act as a gateway law, to limit others rights. â€Å"If they take away our right to have fun and view what we enjoy, then what else will they take away when violence is still present in our society? †Vance Velez explains in detail why people should oppose the Washington law on video games. Although he does introduce and define many terms involving video games, he expects the reader to at least have some knowledge about video games. He addresses many games, like Simcity and Grand Theft Auto, which have been in the mainstream lately; therefore, readers must be up to date with video games and must be familiar with certain type of vi deo games in order to understand the author’s references. Velez addresses adult video gamers and let’s them know that their precious games may be lost, so he urges them to take action and protest this pending law.Velez opposes the Washington law because it violates people’s rights. Velez' stand that taking away things mature Americans enjoy would be a crime in itself because it violates the Freedom of Speech rights. In his definition a mature American is a person who knows right from wrong. He states, â€Å"The Washington law, because it’s built on fear of the unknown and lack of communication, fails to recognize the freedom of speech rights. † The author uses logos by referring to people’s values of their rights. The author opens the first paragraph with a question, â€Å"What's the right way to protect children from violence? He appeals to those who are against video game violence and lets them know that he wants safety for our youth with the use of good reasons. He gains trust from this audience by showing he wants things for the better. His definition of children includes those who have a sense of right and wrong but are still easily influenced. He believes that video games aren't harming children; it's some other factor that is the reason why video games are harming very young kids, such as lack of parent guidance and discipline. Velez talks about this later on in his editorial.He then uses pathos to appeal to the feelings of concerned parents, and those who are in favor of the Washington law, as he states, â€Å"This is the fourth time that politicians have tried to pass laws regulating violent content in video games. † This audience sees how helpless and unsuccessful the government is when it comes to passing these types of laws. This audience feels sorry for the government, they sort of look down at them shame. Those who are in favor of the Washington law may begin to think that people who can’t make up their minds organize our country.They may start to question the proposed law and wonder if it too, will fail. Velez quotes Mary Lou Dickerson, who explains what the state legislator actually thinks about video games in response to a lawsuit. â€Å"The lawsuit filed today against Washington's ban on sales or rentals of cop-killing games to children comes as no surprise. Certain elements of the video-game industry clearly want the right to sell any game, no matter how brutal, racist or sick, to any child, no matter how young. † Velez rebuts this argument by initially stating it’s in violation of Freedom of Speech rights. Politicians are actually trying to ban violent video games which are a pastime that many adult Americans enjoy. † By adult, Velez states that he means, â€Å"Those people who are 18 or older. † He persuades this audience to take action by standing up against the law. Velez remarks, â€Å"Taking away an individuals right to have fun and enjoy video games can be argued as a violation. † The author is addressing adult gamers when he states this because they have the ability to stand up against such laws.The author’s statements threaten adult gamers and make them have a sense of danger that their lives are being controlled. Velez begins his argument by mentioning games that are â€Å"harmless†, in his opinion, which may be banned because they violate the grounds of the Washington law. His example of the game Simcity, appeals to logos and ethos by explaining how an educational game would be in violation of the law. He says, â€Å"In the game of Simcity, you can cause a minor disaster in your city by causing a tornado, an earthquake or a flood.These disasters can destroy the police station or fire department, which would be in violation of the proposed Washington law. † His audiences are those who are for the Washington law and concerned parents when he explains how â€Å"innocent† games, according to Velez, are the victims of the proposed law. He persuades them by making them realize not all â€Å"violent video games† are harmful to children. I think if this audience is familiar with the game of Simcity, they would agree that it is not a violent game, but the author makes them realize that their values will be lost if the law passes, by the use of pathos.Many video gamers would find this offensive because they aren't able to enjoy their â€Å"innocent† games. The audience’s emotions are being involved in this paragraph with the use of pathos. The author’s ethos is clarified once his familiarity and expertise with video games begin to show and as he introduces situations that are possible once the law is passed. In another example of a â€Å"harmful† video game, the definition according the Washington law, Velez introduces the game Rampage, where giant gorillas and lizards destroy cities, similar to King Kong.The author expla ins that in the game the animals are capable of crushing police stations and police cars. Rampage, which attracts gamers between the ages of eight and sixteen, would be in violation of the Washington law. The author introduces the silliness of the Washington law. He makes the audience realize that highly fictional characters aren't harmful to children; however, he states, â€Å"In the governments eyes, they will make children grow up to be terrorists. † Velez describes the many holes the proposed law contains.Those who are for the Washington law are persuaded with logos in this situation because they believe it is only fair for children or even adults to have fun if the game is completely safe. They may also think of other forms of entertainment that may also be involved with this kind of law. They imagine other situations where law enforcement officers are portrayed or killed, such as in numerous movies such as, â€Å"Robin Hood† and â€Å"Lethal Weapon†. Why a ren't these issues being addressed? Are video games that much worse than violent movies and plays?In his last paragraph, Velez explains his beliefs involving the problems of violent video games. His finger points to government and most importantly, the children's parents. He explains that parents have the responsibility to judge what their child sees and hears. Some adult audiences might find his accusation offensive and may get turned off by his remarks, because they are blunt and obtrusive. An example of this is when he remarks, â€Å"The parents should be responsible enough to monitor their children and make sure that that particular game does not enter the console (videogame system) itself. Reasonable adult audiences may actually listen to hear what the author is trying to get across.His use of logos appeals to those who are in favor of the Washington law because he makes them think about how parents could be the source of the problem. They may agree that parents need to be on the look out for what is safe and unsafe for their children. Velez explains that parents allow children to play violent video games that influence children to do harm which portray video games as the main source of the problem. It's easier to blame an image or machine than it is to blame people†, Velez said. The â€Å"parent† problem may make more sense to his opposing audience if they aren't biased and read the editorial with an open mind. In conclusion, Vance Velez was very familiar with his topic, which gave him enough credibility to persuade those in his audience who are in favor of the Washington law, to think twice about their position and possibly accept his belief, that passing the Washington law is a mistake.He’s also successful at convincing adult gamers, those 18 or older, to take action against the proposed Washington law. His arguments were well thought out and convincing by using logos and pathos. However, his alternative to the Washington law was a bit broad and didn’t really include a solution. He identified the problems that might occur if the law is passed, such as the loss of Freedom of Speech Rights, but he had no feedback on how else to deal with the situation. I believe author’s overall argument was persuading even though he didn’t include a proposed solution.

Thursday, August 1, 2019

Tones, Moods, and Irony in the Canterbury Tales

Forms of speech and intonation are extremely important to capture the attention of the audience, whether it is in writing or spoken aloud. In literature, the author uses some literary devices to entice the reader and extract some sort of reaction from him or her. Tone is a literary technique that shows the author’s attitude towards the audience or reader. The tone of a literary work can be informal, formal, serious, angry, playful, intimate, etc.Similar to tone is mood, which is the created atmosphere with the intention of coaxing a certain emotion from the audience, and is created through setting, theme, and tone. Irony, however, is a tone in which the real meaning is contradicted by the words that were used. The Canterbury Tales by Geoffrey Chaucer is a suitable novel for showing various examples of tone, mood, and irony through the many different characters, their personalities, and their narrations. As far as literary tone goes, it is basically the same as the tone used wh en verbally speaking.Chaucer balanced the serious and deathly tales with the tales set for comedy. In the General Prologue, the portrayals of the Knight, the Parson, and the Plowman show a solemn tone while the Prioress, the Monk, the Merchant and many of the others have comical, ironic, and satiric tales which settle in great comedy. In The Canterbury Tales, Chaucer uses irony and straightforwardness more often than other tones. In the Wife of Bath’s Tale, there is very little emotion within the narration.For example, the story goes that for the knight’s deed, he should die because it is the law. There is no room for argument or hesitation, just follow the law. The Knight’s Tale is one of great magnitude. One can notice how Chaucer had honor towards the Knight, because of how grand he is portrayed and how epic his tale is. Everything that happens in the tale feels extravagant and larger than life. The tone of the Knight’s Tale is Chaucer’s way of convincing the audience that the Knight is worthy and important.Throughout the entire novel, Chaucer creates different atmospheres that point out that not only are the characters traveling together, but some of them also have relations with one another. Sometimes, there are quick shifts of mood from sincerity to mockery and form criticism to sarcasm. Chaucer makes it clear that there is tension and hostility between the Reeve and the Miller in the General Prologue and their tales. The Miller, drunk, tells what seems to be a parody of the Reeve and includes that the Reeve’s wife has been cheating on him. As a comeback, the Reeve tells a tale about a miller who gets tricked and cuckolded.In addition to showing issues in the relationship, Chaucer also forms a comedic atmosphere through the novel. Chaucer makes a parody out of the Church, showing how all of the religious travelers in the story are, instead of being models of holiness, they are corrupt, break their vows, and are d efinitely not models of holiness. Ironically enough, the narrator, who is called Chaucer, gives the reader the impression that he is naive, but sometimes turns out to be knowledgeable about how the travelers want to be portrayed and how they actually are.When he describes the Monk, Chaucer agrees with the Monk’s opinions of how a monk is supposed to really act, whereas when he describes the Prioress, Chaucer paints her portrait to appear like a woman of high class while in reality, the Prioress is just a Nun who is concerned with how etiquette and how she eats. The Pardoner’s Tale is one that shows the most irony, because the three men vow to die for each other, but in the end, they kill each other. Also, what the Pardoner does is ironic because he makes people happy when they unknowingly fall for his tricks.Another example of irony is in the Franklin’s Tale when the rocks that Dorigen prays for disappear, all the trouble begins. The Miller’s Tale is also ironic because since John is concerned that his wife would cheat on him, he becomes extremely jealous and possessive, which makes his wife cuckold him. The travelers all have different reasons for telling his or her own tales, whether it is to make fun of someone else in the group, to make the rest of the travelers laugh, to show off, to confess, or to give a story of moral exemplum.With each story comes both different or similar moods and outcomes, and some even include moral teachings. Chaucer as the narrator wrote by memory about the profiles and stories told by the travelers. He included whether or not he liked certain travelers and how he felt about them just by how much or how little he wrote. The Canterbury Tales is a novel full of comedy, satire, irony, and reality. It is a cornucopia of tones and moods. The Canterbury Tales is truly a masterpiece of literature.