Wednesday, April 21, 2010

MY PROGRAMS


JAVA 2ND PROGRAM


#include

#include

main()

{

int a,b,c;

int result;

a=1;

b=1;

result=c;

clrscr();

gotoxy(15,5);cout<<"Operations Perform:";

gotoxy(10,8);cout<<"addition:";

gotoxy(10,9);cout<<"a+b=c";

c=a+b;

gotoxy(10,10);cout<<<"+"<<<"="<

gotoxy(10,11);cout<<"multiplication:";

gotoxy(10,12);cout<<"a*b=c";

c=a*b;

gotoxy(10,13);cout<<<"*"<<<"="<

gotoxy(35,8);cout<<"subtraction";

gotoxy(35,9);cout<<"a-b=c";

c=a-b;

gotoxy(35,10);cout<<<"-"<<<"="<

gotoxy(35,11);cout<<"division";

gotoxy(35,12);cout<<"a/b=c";

c=a/b;

gotoxy(35,13);cout<<<"/"<<<"="<

getch();

}



C++ PROGRAM

# include

# include

main()

{

cout<<"ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»\n";

cout<< º\n";

cout<< MY FIRST PROGRAM º\n";

cout<<"ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹\n";

cout<< º\n";

cout<< º\n";

cout<< º\n";

cout<< Û Û ÛÛÛÛÛÛÛÛ Û ÛÛÛÛÛ ÛÛÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛÛ º\n";

cout<< Û Û Û Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û ÛÛÛÛÛÛ Û Û Û Û Û Û ÛÛÛÛÛÛ º\n";

cout<< Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û Û Û º\n";

cout<< Û Û Û Û Û Û Û Û Û Û Û Û Û º\n";

cout<< ÛÛÛÛ ÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛ ÛÛÛÛÛ ÛÛÛÛ Û Û ÛÛÛÛÛÛÛ º\n";

cout<< º\n";

cout<<"ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍËÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͺ\n";

cout<<"º PROGRAMMED BY:ALONA F.JARAVATA ºFILE NAME:ALONAE º\n";

cout<< º º\n";

cout<<"ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÊÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ\n";

cin.get ();

}


















































































}

Wednesday, February 24, 2010

FINAL ASSIGNMENT

USA Patriot Act:
The Good, the Bad, and the Sunset

By John Podesta

Recent tragic events have brought about a rapid reconsideration of the legal restrictions placed on law enforcement and the intelligence communities. On October 26, President Bush signed into law the USA Patriot Act (Patriot Act), which makes significant changes in the legal structure within which the law enforcement and intelligence communities operate. This article focuses on the key provisions of the Patriot Act that pertain to electronic surveillance and intelligence gathering. Notwithstanding the haste with which Congress acted, the provisions of the new law relating to electronic surveillance, for the most part, are a sound effort to provide new tools for law enforcement and intelligence agencies to combat terrorism while preserving the civil liberties of individual Americans. Some changes simply update our surveillance laws to reflect the fact that we live in a digital age. Other sections expand the surveillance powers of our law enforcement and intelligence communities in ways that make sense in light of the new threats facing our country.

When we decide, however, to expand surveillance powers to track terrorists, all residents, not just the terrorists, are affected. A common problem running through many of the new authorities contained in the Patriot Act is the reliance on executive branch supervision rather than meaningful review by a neutral magistrate of the potentially highly intrusive surveillance techniques that are authorized. That sunset will allow Congress to make some needed adjustments, hopefully in a calmer climate, and strengthen the protections for civil liberties without sacrificing security.

Section 216

The Patriot Act substantially changes the law with respect to law enforcement access to information about computer use including Web surfing. Reaching for an analogy from the old rotary dialed telephone system, the Act extends provisions written to authorize installation of pen registers and trap and trace devices, which record outgoing and incoming phone numbers, to authorize the installation of devices to record all computer routing, addressing, and signaling information. The government can get this information with a mere certification that the information likely to be obtained is relevant to an ongoing criminal investigation.

The potential for abuse, for invasion of privacy, and for profiling citizens is high. That’s why it is disappointing that the authors of this provision settled for an incredibly weak standard of judicial oversight. A better analogy might have been to the provision of the Electronic Communications Privacy Act governing access to the stored records of Internet service providers, which permits a judge to satisfy herself that there are specific and articulable facts that the information sought is relevant and material to the ongoing investigation. This is a provision that Congress should review as part of its sunset process and amend.

Section 203

Previously, domestic law enforcement and foreign intelligence collection operated on separate tracks. This separation was seen as necessary because of the very different legal regimes that are associated with domestic law enforcement and foreign intelligence collection. The events of September 11, which involved several individuals who had lived in our country for some time, made it clear that more cooperation between domestic law enforcement and foreign intelligence collection was necessary. Section 203 facilitates this cooperation by allowing "foreign intelligence information" gathered in criminal investigations by domestic law enforcement to be shared with the intelligence community. In this manner, section 203 enables the intelligence community access to critical information that might otherwise be unavailable.

The definition of "foreign intelligence information" contained in the Patriot Act is quite broad. Foreign intelligence is defined to mean "information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, or foreign persons or international terrorist activities." " The sharing of such a broad range of information raises the specter of intelligence agencies, once again, collecting, profiling, and potentially harassing U.S. persons engaged in lawful, First Amendment-protected activities.

Section 203 provides some protection against abuse by requiring that when information originates from grand juries or wiretaps, that identifies a U.S. person. These safeguards need to be strengthened in two regards. First, to prevent unnecessary dissemination of information about a U.S. person to the intelligence community, such procedures should also be required for information obtained in domestic criminal investigations generally. Second, information subject to grand jury secrecy rules should only be disseminated with authorization from a court.

Section 206

The Foreign Intelligence Surveillance Act (FISA) facilitates domestic intelligence gathering related to foreign powers by allowing the collection of such information without the legal restrictions associated with domestic law enforcement. Section 206 of the Patriot Act modernizes FISA wiretap authority. Previously, FISA required a separate court order be obtained for each communication carrier used by the target of an investigation. In the era of cell phones, pay phones, e-mail, instant messaging, and BlackBerry wireless e-mail devices such a requirement is a significant barrier in monitoring an individual’s communications. Section 206 allows a single wiretap to legally "roam" from device to device, to tap the person rather than the phone. In 1986, Congress authorized the use of roaming wiretaps in criminal investigations that are generally subject to stricter standards than FISA intelligence gathering, so extending this authority to FISA was a natural step.

The main difference between roaming wiretaps under current criminal law and the new FISA authority is that current criminal law requires that law enforcement "ascertain" that the target of a wiretap is actually using a device to be tapped. Section 206 contains no such provision. Ensuring that FISA wiretaps only roam when intelligence officials "ascertain" that the subject of an investigation is using a device, before it is tapped, would prevent abuse of this provision. For example, without the ascertainment requirement,

Section 213

The 1986 Electronic Communications Privacy Act granted the government the authority to delay notification for search of some forms of electronic communications that are in the custody of a third party. Section 213 statutorily extends the ability of law enforcement to delay the notice to any physical or electronic search with a showing that notice would create an "adverse result." This provision is an effort to improve the government’s ability to investigate suspected terrorists by granting law enforcement greater leeway to operate clandestinely. To a large extent, section 213 simply codifies existing law enforcement practice in a manner consistent with recent court decisions. Nevertheless, the "adverse result" standard (defined in 18 U.S.C. § 2705), by virtue of its ambiguity, creates the potential for abuse. As a result, section 213, which is not currently subject to the four-year sunset contained in the Act, should, nevertheless, be carefully reviewed at that time.

Section 217

If someone unlawfully enters your home, you can ask the police to enter your premise without a warrant to investigate. Section 217 clarifies that similar authority applies to "computer trespassers." This allows law enforcement, with the permission of the owner of a computer, to monitor a trespasser’s action without obtaining an order for a wiretap. This provision constrains the ability of hackers to use computers without being detected.

Although most law-abiding computer users’ online activities will not be monitored by the government as a result of section 217, the new authority may be overbroad. A "computer trespasser" is defined as anyone who accesses a protected computer (which includes any computer connected to the Internet) without authorization. Individuals who exceed their terms of service agreements with their Internet service provider or individuals who use their computer at work to download an MP3 file could be subject to intrusive government monitoring. While the need to respond quickly to malicious hacking, such as denial of service attacks, provides a basis for this provision, section 217 should be amended to require court authorization for monitoring of individual users that exceeds forty-eight hours in duration.

Section 218

Prior to the enactment of FISA in 1978, the intelligence community had virtually unchecked authority to conduct domestic surveillance of U.S. citizens and organizations. FISA created a special court to ensure that "the purpose" of domestic intelligence gathering was to obtain foreign intelligence information. The FISA court structure and sole purpose standard attempted to balance the need to collect foreign intelligence information without the constraints of the Fourth Amendment with increased protections for Americans exercising their First Amendment rights. Section 218 loosens the standard of a FISA investigation by requiring a showing that the collection of foreign intelligence information is "a significant purpose" rather than "the purpose" of an investigation. Section 218 is an important tool for counterterrorism but, since probable cause is not required under FISA, it also raises the possibility that U.S. citizens who are not terrorists could have their homes searched and communications monitored without probable cause. Therefore, section 218 deserves special attention when it expires in four years.

Conclusion

Many of the electronic surveillance provisions in the Patriot Act faced serious opposition prior to September 11 from a coalition of privacy advocates, computer users, and elements of high-tech industry. The events of September 11 convinced many in that coalition and overwhelming majorities in Congress that law enforcement and national security officials need new legal tools to fight terrorism. But we should not forget what gave rise to the original opposition—many aspects of the bill increase the opportunity for law enforcement and the intelligence community to return to an era where they monitored and sometimes harassed individuals who were merely exercising their First Amendment rights. Nothing that occurred on September 11 mandates that we return to such an era. If anything, the events of September 11 should redouble our resolve to protect the rights we as Americans cherish. Therefore, as the new powers granted under the Patriot Act begin to be exercised, we should not only feel more confident that our country has the tools to be safe but we should be ever vigilant that these new tools are not abused.

John Podesta is a visiting professor of law at the Georgetown University Law Center. He served as President Clinton’s chief of staff from 1998-2001.

Privacy Guidelines
Organization of Economic Cooperation and Development, 1980

[From "Guidelines on the Protection of Privacy and Transborder Flows of Personal Data," OECD, 1980.]

  1. Collection Limitation.There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
  2. Data quality principle. Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.
  3. Purpose specification. The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.
  4. Use limitation principle. Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Paragraph 9 except:

    (a) with the consent of the data subject; or

    (b) by the authority of law.

  5. Security safeguards principle. Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.
  6. Openness principle. There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity about usual residence of the data controller.
  7. Individual participation principle. An individual should have the right:

    (a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;

    (b) to have communicated to him, data relating to him

    1. within a reasonable time;
    2. at a charge, if any, that is not excessive;
    3. in a reasonable manner; and
    4. in a form that is readily intelligible to him;

    ( c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and

    (d) to challenge data relating to him and, if the challenge is successful, to

Wednesday, January 27, 2010

LAST MIDTERM ACTIVITY

"PRIVACY"

Privacy :from Latin privatus 'separated from the rest, deprive.
Is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common theme.
The right against unsanctioned invasion of privacy by the government, corporations or individuals is part of many countries' privacy laws, and in some cases, constitution.

The Privacy Act incorporates the Code of Fair Information Practices recommended by HEW and empowers individuals to control the federal government's collection, use, and dissemination of sensitive personal information. The Act prohibits agencies from disclosing records to third parties or other agencies without the consent of the individual to whom the record pertains. The prohibition is weakened by several exceptions. As early as 1977, the Privacy Protection Study Commission found that the Privacy Act was vague and would likely not meet its stated purposes.

" PRIVACY PROTECTION AND LAW "

PRIVACY PROTECTION AND LAW:Successfully helping organizations to integrate data protection and privacy law into good business practice since 1987.
Privacy Laws & Business provides an independent privacy laws information service to many of the world’s largest companies, specialist lawyers and has clients in over 45 countries. In the United Kingdom, the company provides services to help its private and public sector clients comply with both the Data Protection Act and the Freedom of Information Act.

"The consumer protection law"
The consumer protection Act, 1986, provides for the better protection of consumers. Unlike existing laws which are punitive or preventive in nature, the provisions of this Act are compensatory in nature. The act is intended to provide simple, speedy and inexpensive redressal to the consumers' grievances, award relief and compensation wherever appropriate to the consumer. The act has been amended in 1993 both to extend its coverage and scope and to enhance the powers of the redressal machinery.






LAST MIDTERM ACTIVITY

Privacy Act of 1974 was designed to protect individuals from an increasingly powerful and potentially intrusive federal government. The statute was triggered by the report published by the Department of Health, Education and Welfare (HEW), which recommended a "Code of Fair Information Practices" to be followed by all federal agencies.
The Privacy Act incorporates the Code of Fair Information Practices recommended by HEW and empowers individuals to control the federal government's collection, use, and dissemination of sensitive personal information. The Act prohibits agencies from disclosing records to third parties or other agencies without the consent of the individual to whom the record pertains. The prohibition is weakened by several exceptions. As early as 1977, the Privacy Protection Study Commission found that the Privacy Act was vague and would likely not meet its stated purposes.

Wednesday, January 6, 2010

Mid term quiz

Your friend just told you that he is developing a worm to attack the administrative systems at your college. The worm is "harmless" and will simply cause a message - "Let's party!" - to be dispalyed on all workstations on Friday afternoon at 3 p.m. By 4 p. m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?

Answer:
I would tell to my friend that don't continue your plan because small problem will cause big damage to your life,if the school will know that you made that worm attack and some computer will be destroyed ,so you will pay for the damage and if you don't many to pay or change the computers ,the worst thing is you will be prison.Small harm will to our to our school will cause big problem to our school,to our professor,and also to the students.
So if i were you don't continue you plan,cause i am just thinking for your own good.


3. You are the CFO of a midsized manufacturing firm. You have heard nothing but positive comments about the new CIO you hired three months ago. As you observe her outline what needs to be done to improve the firm's computer security, you are impressed with her energy, enthusiasm, and presentation skills. However, your jaw drops when she states that the total cost of computer security improvements will be 300, 000 dollars. This seems like a lot of money for security, given that your firm has no major incident. Several other items in the budget will either have to be dropped or trimmed back to accommodate this project. In addition, the 300, 000 dollars is above your spending authorization and will require approval by the CEO . How can you sort out what really needs to be done with out appearing to be micromanaging or discouraging the new CIO?

answer:

Being aCFO is a bigwork it needs hardwork, knowledge and perceverance to get that position.So
as i were the CFO of that midsized manufacturing firm will gather all facts and meeting them,will explaine thorouly that the money that needed for the security improvement is very big,i will tell to the CIO that it is my job tomanage the expenses of the company so i will tell to him that dont be angy with me sir.It is for our own good.