Rc0 C02 Preparation Material}

In CategoryGates
ByE4q8Xk

RC0-C02 Preparation Material

by

Adila Masih

Question: 1

An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?

A. Access control lists

B. SELinux

C. IPtables firewall

D. HIPS

Answer: B

Explanation:

The most common open source operating system is LINUX.

Security-Enhanced Linux (SELinux) was created by the United States National Security Agency (NSA) and is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defensestyle mandatory access controls (MAC).

NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible mandatory access control (MAC) architecture into the major subsystems of the kernel. It provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of damage that can be caused by malicious or flawed applications.

Incorrect Answers:

A: An access control list (ACL) is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. ACLs do not enable policy based flexible mandatory access controls to prevent abnormal application modifications or executions.

C: A firewall is used to control data leaving a network or entering a network based on source and destination IP address and port numbers. IPTables is a Linux firewall. However, it does not enable policy based flexible mandatory access controls to prevent abnormal application modifications or executions.

D: Host-based intrusion prevention system (HIPS) is an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host. It does not enable policy based flexible mandatory access controls to prevent abnormal application modifications or executions.

References:

https://en.wikipedia.org/wiki/Security-Enhanced_Linux

Question: 2

Company ABCs SAN is nearing capacity, and will cause costly downtimes if servers run out disk space. Which of the following is a more cost effective alternative to buying a new SAN?

A. Enable multipath to increase availability

B. Enable deduplication on the storage pools

C. Implement snapshots to reduce virtual disk size

D. Implement replication to offsite datacenter

Answer: B

Explanation:

Storage-based data deduplication reduces the amount of storage needed for a given set of files. It is most effective in applications where many copies of very similar or even identical data are stored on a single disk.

It is common for multiple copies of files to exist on a SAN. By eliminating (deduplicating) repeated copies of the files, we can reduce the disk space used on the existing SAN. This solution is a cost effective alternative to buying a new SAN.

Incorrect Answers:

A: Multipathing enables multiple links to transfer the data to and from the SAN. This improves performance and link redundancy. However, it has no effect on the amount of data on the SAN.

C: Snapshots would not reduce the amount of data stored on the SAN.

D: Replicating the data on the SAN to an offsite datacenter will not reduce the amount of data stored on the SAN. It would just create another copy of the data on the SAN in the offsite datacenter.

References:

https://en.wikipedia.org/wiki/Data_deduplication

Question: 3

A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?

A. Refuse LM and only accept NTLMv2

B. Accept only LM

C. Refuse NTLMv2 and accept LM

D. Accept only NTLM

YouTube Preview Image

Answer: A

Explanation:

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager (LANMAN or LM), an older Microsoft product, and attempts to provide backwards compatibility with LANMAN. NTLM version 2 (NTLMv2), which was introduced in Windows NT 4.0 SP4 (and natively supported in Windows 2000), enhances NTLM security by hardening the protocol against many spoofing attacks, and adding the ability for a server to authenticate to the client.

This question states that the security authentication on the Windows domain is set to the highest level. This will be NTLMv2. Therefore, the answer to the question is to allow NTLMv2 which will enable the Windows users to connect to the UNIX server. To improve security, we should disable the old and insecure LM protocol as it is not used by the Windows computers.

Incorrect Answers:

B: The question states that the security authentication on the Windows domain is set to the highest level. This will be NTLMv2, not LM.

C: The question states that the security authentication on the Windows domain is set to the highest level. This will be NTLMv2, not LM so we need to allow NTLMv2.

D: The question states that the security authentication on the Windows domain is set to the highest level. This will be NTLMv2, not NTLM (version1).

References:

https://en.wikipedia.org/wiki/NT_LAN_Manager

Question: 4

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?

A. vTPM

B. HSM

C. TPM

D. INE

Answer: A

Explanation:

A Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions, primarily involving encryption keys. The TPM is usually installed on the motherboard of a computer, and it communicates with the remainder of the system by using a hardware bus.

A vTPM is a virtual Trusted Platform Module.

IBM extended the current TPM V1.2 command set with virtual TPM management commands that allow us to create and delete instances of TPMs. Each created instance of a TPM holds an association with a virtual machine (VM) throughout its lifetime on the platform.

Incorrect Answers:

B: A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. This solution would require hardware pass-through.

C: A Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions, primarily involving encryption keys. The TPM is usually installed on the motherboard of a computer, and it communicates with the remainder of the system by using a hardware bus. Virtual machines cannot access a hardware TPM.

D: INE (intelligent network element) is not used for storing cryptographic keys.

References:

https://en.wikipedia.org/wiki/Hardware_security_module

http://researcher.watson.ibm.com/researcher/view_group.php?id=2850

Question: 5

A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition and logical volume. Which of the following is the BEST way to ensure confidentiality of individual operating system data?

A. Encryption of each individual partition

B. Encryption of the SSD at the file level

C. FDE of each logical volume on the SSD

D. FDE of the entire SSD as a single disk

Answer: A

Explanation:

In this question, we have multiple operating system installations on a single disk. Some operating systems store their boot loader in the MBR of the disk. However, some operating systems install their boot loader outside the MBR especially when multiple operating systems are installed. We need to encrypt as much data as possible but we cannot encrypt the boot loaders. This would prevent the operating systems from loading.

Therefore, the solution is to encrypt each individual partition separately.

Incorrect Answers:

B: The question is asking for the BEST way to ensure confidentiality of individual operating system data. Individual file encryption could work but if files are ever added to the operating systems (for updates etc.), you would have to manually encrypt the new files as well. A better solution would be to encrypt the entire partition. That way any new files added to the operating system would be automatically encrypted.

C: You cannot perform full disk encryption on an individual volume. Full disk encryption encrypts the entire disk.

D: FDE of the entire SSD as a single disk would encrypt the boot loaders which would prevent the operating systems from booting.

Question: 6

After being notified of an issue with the online shopping cart, where customers are able to arbitrarily change the price of listed items, a programmer analyzes the following piece of code used by a web based shopping cart.

SELECT ITEM FROM CART WHERE ITEM=ADDSLASHES($USERINPUT);

The programmer found that every time a user adds an item to the cart, a temporary file is created on the web server /tmp directory. The temporary file has a name which is generated by concatenating the content of the $USERINPUT variable and a timestamp in the form of MM-DD-YYYY, (e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased. Which of the following is MOST likely being exploited to manipulate the price of a shopping carts items?

A. Input validation

B. SQL injection

C. TOCTOU

D. Session hijacking

Answer: C

Explanation:

In this question, TOCTOU is being exploited to allow the user to modify the temp file that contains the price of the item.

In software development, time of check to time of use (TOCTOU) is a class of software bug caused by changes in a system between the checking of a condition (such as a security credential) and the use of the results of that check. This is one example of a race condition.

A simple example is as follows: Consider a Web application that allows a user to edit pages, and also allows administrators to lock pages to prevent editing. A user requests to edit a page, getting a form which can be used to alter its content. Before the user submits the form, an administrator locks the page, which should prevent editing. However, since editing has already begun, when the user submits the form, those edits (which have already been made) are accepted. When the user began editing, the appropriate authorization was checked, and the user was indeed allowed to edit. However, the authorization was used later, at a time when edits should no longer have been allowed.

TOCTOU race conditions are most common in Unix between operations on the file system, but can occur in other contexts, including local sockets and improper use of database transactions.

Incorrect Answers:

A: Input validation is used to ensure that the correct data is entered into a field. For example, input validation would prevent letters typed into a field that expects number from being accepted. The exploit in this question is not an example of input validation.

B: SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. The exploit in this question is not an example of a SQL injection attack.

D: Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by obtaining the session ID and masquerading as the authorized user. The exploit in this question is not an example of session hijacking.

References:

https://en.wikipedia.org/wiki/Time_of_check_to_time_of_use

Question: 7

The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the dat

a. Which of the following issues may potentially occur?

A. The data may not be in a usable format.

B. The new storage array is not FCoE based.

C. The data may need a file system check.

D. The new storage array also only has a single controller.

Answer: B

Explanation:

Fibre Channel over Ethernet (FCoE) is a computer network technology that encapsulates Fibre Channel frames over Ethernet networks. This allows Fibre Channel to use 10 Gigabit Ethernet networks (or higher speeds) while preserving the Fibre Channel protocol.

When moving the disks to another storage array, you need to ensure that the array supports FCoE, not just regular Fiber Channel. Fiber Channel arrays and Fiber Channel over Ethernet arrays use different network connections, hardware and protocols. Fiber Channel arrays use the Fiber Channel protocol over a dedicated Fiber Channel network whereas FCoE arrays use the Fiber Channel protocol over an Ethernet network.

Incorrect Answers:

A: It is unlikely that the data will not be in a usable format. Fiber Channel LUNs appear as local disks on a Windows computer. The computer then creates an NTFS volume on the fiber channel LUN. The storage array does not see the NTFS file system or the data stored on it. FCoE arrays only see the underlying block level storage.

C: The data would not need a file system check. FCoE arrays use block level storage and do not check the file system. Any file system checks would be performed by a Windows computer. Even if this happened, the data would be accessible after the check.

D: The new storage array also having a single controller would not be a problem. Only one controller is required.

References:

https://en.wikipedia.org/wiki/Fibre_Channel_over_Ethernet

Question: 8

Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victims privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue?

A. Integer overflow

B. Click-jacking

C. Race condition

D. SQL injection

E. Use after free

F. Input validation

Answer: E

Explanation:

Use-After-Free vulnerabilities are a type of memory corruption flaw that can be leveraged by hackers to execute arbitrary code.

Use After Free specifically refers to the attempt to access memory after it has been freed, which can cause a program to crash or, in the case of a Use-After-Free flaw, can potentially result in the execution of arbitrary code or even enable full remote code execution capabilities.

According to the Use After Free definition on the Common Weakness Enumeration (CWE) website, a Use After Free scenario can occur when “the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.”

Incorrect Answers:

A: Integer overflow is the result of an attempt by a CPU to arithmetically generate a number larger than what can fit in the devoted memory storage space. Arithmetic operations always have the potential of returning unexpected values, which may cause an error that forces the whole program to shut down. This is not what is described in this question.

B: Clickjacking is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. This is not what is described in this question.

C: A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly. This is not what is described in this question.

D: SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. This is not what is described in this question.

F: Input validation is used to ensure that the correct data is entered into a field. For example, input validation would prevent letters typed into a field that expects number from being accepted. This is not what is described in this question.

References:

http://www.webopedia.com/TERM/U/use-after-free.html

https://en.wikipedia.org/wiki/Clickjacking

http://searchstorage.techtarget.com/definition/race-condition

Question: 9

A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

A. Client side input validation

B. Stored procedure

C. Encrypting credit card details

D. Regular expression matching

Answer: D

Explanation:

Regular expression matching is a technique for reading and validating input, particularly in web software. This question is asking about securing input fields where customers enter their credit card details. In this case, the expected input into the credit card number field would be a sequence of numbers of a certain length. We can use regular expression matching to verify that the input is indeed a sequence of numbers. Anything that is not a sequence of numbers could be malicious code.

Incorrect Answers:

A: Client side input validation could be used to validate the input into input fields. Client side input validation is where the validation is performed by the web browser. However this question is asking for the BEST answer. A user with malicious intent could bypass the client side input validation whereas it would be much more difficult to bypass regular expression matching implemented in the application code.

B: A stored procedure is SQL code saved as a script. A SQL user can run the stored procedure rather than typing all the SQL code contained in the stored procedure. A stored procedure is not used for validating input.

C: Any stored credit card details should be encrypted for security purposes. Also a secure method of transmission such as SSL or TLS should be used to encrypt the data when transmitting the credit card number over a network such as the Internet. However, encrypting credit card details is not a way of securing the input fields in an application.

Question: 10

A security administrator was doing a packet capture and notice

Test Information:Total Questions: 308Test Number: RC0-C02Vendor Name: COMPTIACert Name: COMPTIA ADVANCED SECURITY PRACTITIONER CERTIFICATIONTest Name: CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing EducationOfficial Site:http://www.directcertify.co.ukFor More Details: http://www.directcertify.co.uk/RC0-C02.htmlGet20% Immediate Discount on Full Training MaterialDiscount Coupon Code:411611IUH5

Article Source:

eArticlesOnline.com }

Demonstrators protest Condoleezza Rice’s trip to Australia

In CategoryUncategorized
ByE4q8Xk

Thursday, March 16, 2006

Anti-war demonstrators in Sydney, Australia on Thursday dubbed U.S. Secretary of State Dr Condoleezza Rice a “war criminal” and “murderer.” Two protesters were evicted and five people were arrested during protests against the U.S.-led invasion of Iraq.

Dr Rice, on a three-day trip to Australia, said she understood why people found it hard to be positive about Iraq when all they saw on their television screens was violence.

Soon after Rice began her speech at the University of Sydney’s Conservatorium of Music, two protesters shouted from the rear of the auditorium, “Condoleezza Rice, you are a war criminal,” and “Iraqi blood is on your hands and you cannot wash that blood away.” Standing with their palms towards her, the young man and woman repeated their accusation until security intervened to remove them from the hall.

About 15 minutes into Rice’s address, a third protester appeared at a balcony door, interrupting her speech as she referred to freedom. “What kind of freedom are you talking about? You are a murderer,” said the demonstrator before he was quietly escorted from the hall. “I’m very glad to see that democracy is well and alive here at the university,” she said.

In her speech, Rice sought to justify the U.S. occupation of Iraq, describing Iraqis as now more free. One student asked about abuses committed by U.S. forces at the Abu Ghraib prison in Iraq. She said the abuses had made her “sick to her stomach.” However, she defended Guantanamo Bay, Cuba, where human rights groups say detainees are held in inhumane conditions and in detention flouting international laws.

Before Rice began her speech, about 50 protesters were gathered at the front gates of the Conservatorium. The group were confronted by police on horseback and by police dogs. Police used the horses to charge into the group of activists and push them back, as a police helicopter hovered.

A police spokeswoman said the group was blocking pedestrian access to the building and that police had spent more than 20 minutes warning them to move. The police then moved in and pushed the crowd back 20 metres. Police say five people have been charged with “hindering police in the execution of their duties.”

The “Stop the War Coalition” says Rice is a “war criminal” and is not welcome in Australia. The group’s spokeswoman, Anna Samson, says the protest is one of many planned in the lead-up to the third anniversary of the invasion and occupation of Iraq on March 20.

Paddy Gibson, from the University of Sydney’s Student’s Council, says the protest is in opposition to the Iraq war, and to the use of the University of Sydney’s campus to host Rice, “the most powerful woman in the world,” who they say is a war criminal. “They’re saying, ‘… you’ve got Sydney Uni’s support to stand up and peddle your murderous hate speeches,’ which is what we see it,” he said.

“You’ve got 180,000 people killed, as we said, for no other reason than strategic control of the region’s oil resources. And the anti-Muslim racism that’s been whipped up to justify this war is being felt by Sydney University students,” said Mr Gibson.

Dining Tables From The Finest Teak Wood Furniture

In CategoryBedroom Accessories
ByE4q8Xk

By John Stidolph

For social entertaining, the first thing you think about is your home. After all, it is your stage. Your furniture pieces are your props and everything comes together. There is no more vital piece of teak wood furniture in social entertaining than the dining table. For centuries, the dining table has been the center of good food, fine wine and excellent conversations. A dining table is used for everything, not just foods. Having a teak wood furniture piece that brings elegance and functionality to your home is a must. Some might be thinking, “well, that kind of dining table is out of my league, price-wise”. It doesn’t have to be elegant, functional teak wood dining tables can be had for less than you think.

Feeling a bit overwhelmed? Not surprising. Shopping for teak wood furniture is not normally on a person’s high list of things to shop for and dining tables are usually not even really thought about, even though they should be. Teak wood furniture pieces need to fit in the room, not only in size but also in the style, and you have to be sure that you are getting a teak dining table big enough for all your needs.

The first thing to think about when selecting your teak wood furniture is – does it make you feel comfortable? Not something you normally think about when looking for a teak wood dining table. You want to be able to enjoy sitting and having coffee or conversations over dinner and after without having to get up from your dining table. The way to do that is to make sure your teak wood furniture is comfortable. No matter what type you decide on – an informal dining table or a formal dining table – no matter what styles you choose – modern dining table or traditional dining table – make sure you’ve taken into consideration the needs that your teak wood furniture will have to fill.

YouTube Preview Image

Do you need an extendable dining table? This design of teak wood furniture is best for when you entertain occasionally but normally don’t need that much dining space at your dinning table. Want to know for sure? Measure the room, and take those measurements with you. Anyone who is versed in selling teak wood furniture will be able to help you determine the right size dining table for your patio.

There are standard teak wood furniture measurements that will help. Each place setting should have two feet of space. Knowing this and the usual number of people you entertain, will go a long way in helping determine the size of table that will be right for you. Another thing to consider is if you wish to decorate with teak wood furniture, is, what is the average size of your centerpieces? This will help determine the width of your table. These measurements are a surefire way for you to find the perfect teak wood furniture piece for your application.

About the Author: People recognize

teak wood furniture

, as quality furniture. Our

teakwood furniture

is the top choice for

teak furniture

of fashion

Source:

isnare.com

Permanent Link:

isnare.com/?aid=158517&ca=Home+Management

US Representative Anthony Weiner resigns over sexual conduct

In CategoryUncategorized
ByE4q8Xk

Friday, June 17, 2011

Anthony Weiner announced his resignation yesterday afternoon as a Democratic representative from New York to the U.S. House of Representatives, a position he has filled for twelve years. He has been under pressure from politicians within his own party after a sex scandal engulfed his life and that of the Democratic party.

Weiner told reporters it was “impossible” to continue in his role after the events of the last few weeks, including revelations that he was involved in sexual relationships with a number of young women over the internet, including sending lewd photos of himself, and then lying about his actions to reporters.

He announced his resignation at a press conference in a Brooklyn senior center where 20 years ago he began his political career and apologized for his “personal mistakes”. His wife, Huma Abedin, did not accompany him, but Weiner apologized to her in his speech, saying that he hopes “most importantly, that my wife and I can continue to heal from the damage that I’ve caused.” He took no questions from reporters.

On June 6, Weiner had admitted to corresponding with women he met on the internet, including exchanging lewd photos. But on June 11 he declared in an emotional interview he would not resign. Under pressure from Democrats, Weiner requested a two-week leave of absence from his position in order to obtain treatment to become “a better husband and healthier person.”

However, Democratic politicians became increasingly anxious to put the growing scandal behind them, as it distracted members from more important issues such as problems with Medicare and the need for more jobs. As the scandal gained momentum, a variety of politicians, including Nancy Pelosi, the House Minority Leader, called on him to resign. President Barack Obama said he would resign if he were in Weiner’s place in an interview with ABC News.

“Weiner exercised poor judgment in his actions and poor judgment in his reaction to the revelations,” Pelosi said in a statement after Weiner announced his resignation. “Today, he made the right judgment in resigning.”

The scandal came to light May 27 after Weiner accidentally sent a photograph of his crotch on his public stream on the social networking website Twitter, and then tried to cover it up by blaming hackers for posting the picture, denying all responsibility.

Weiner later admitted sending online messages to other women, including to a 17-year-old high school student in Delaware, though a police investigation uncovered nothing illegal. On Wednesday, a former porn actress revealed that she had engaged in an online relationship with Weiner and that Weiner had asked her to lie about the nature of their contact.

More photos have continued to emerge, including one showing his nude genitals, and others showing him half naked. On Wednesday, the National Enquirer published images of Weiner cross-dressing while he was a college student at the State University of New York at Plattsburgh. In one photo, he is seen wearing a bra and pantyhose, while in another he is oiled and wearing swimming trunks.

Congressman Weiner exercised poor judgment in his actions and poor judgment in his reaction to the revelations. Today, he made the right judgment in resigning.

Colleagues said Weiner wanted to wait for the return home of his wife, Abedin, before making a final career decision. He has been married for almost a year to Abedin, who is pregnant with the couple’s first child. She is a top aide to Hillary Clinton, the Secretary of State, and the couple’s wedding was presided over by former President Bill Clinton. She returned home to Washington, D.C. on Wednesday morning after having traveled with Clinton in the Middle East and Africa since June 8.

Weiner’s district covers parts of Brooklyn and Queens, boroughs of New York City. He ran an unsuccessful campaign for mayor of New York City in 2005, and he was considered a potential candidate for future races. Known to be an outspoken supporter of liberal causes, he has irked conservatives and Democratic leaders. In 2009, he pushed for government-run health care, even though Obama had opposed the idea.

UK woman convicted of ‘mercy’ murder of son

In CategoryUncategorized
ByE4q8Xk

Thursday, January 21, 2010

A woman has been convicted of murder after killing her son in an “act of mercy”. The Old Bailey, a London court, heard that Frances Inglis, 57, injected Tom, 22, with heroin and gave her a life sentence.

Tom had been injured in a street fight in July 2007 and was put in an ambulance depite his desire not to be hospitalised. The ambulance door was opened three times; the third time Tom jumped out and sustained injuries that left him in a coma. He became mute and dependant on 24-hour care. His only method of communication was to squeeze a hand.

Frances was told that if she wanted Tom to die legally then she could ask the High Court to allow his food and water to be withdrawn, so that he would starve to death. Frances told the court “I know Tom – no way would he have wanted to live totally dependent. I can remember saying I felt I would rather he go to heaven than to hell on earth. I know Tom would not want to live. He had lost his life.”

“I couldn’t bear the thought of Tom dying of thirst or hunger,” she said of the idea of food and water withdrawal. “To me that would be so cruel, so cruel. To die slowly like that would be horrible.” Instead she used the Internet to research Tom’s condition and concluded that a heroin overdose would be the most painless method available. A learning disabilities worker with no convictions, she concluded two grams was sufficient to kill and began spending time in areas she believed drugs were on sale – outside the local station, job centre and needle exchanges.

Frances was determined to release Tom from his “living hell” and said she had “no choice” in the matter. “I asked myself what I would want,” she said. “I would want someone to love me enough to help me die. That’s why I thought heroin – a painless, peaceful death.” She obtained her two grams and stole syringes from Tom’s hospital before injecting him, but he was revived by nurses and she was charged with attempted murder. She was bailed but barred from contacting her son.

Fourteen months later she obtained access to Tom by posing as his aunt and placed superglue in the lock of his door, further barricading it with an oxygen cylinder and a wheelchair. It took staff thirty minutes to break in, by which time Frances had injected one of Tom’s arms and both his thighs with heroin. This time he died.

Frances had left a letter to her family in which she talked of her concerns for her other two sons and dog, as well as the running of the house, expecting a murder arrest. On one bed she left a photograph of Tom as well as a prayer written by his girlfriend. Police also found older letter by Frances, one of which read “People keep saying Tom is not suffering. How can they know how he feels?”

She was asked if guilty of murder and attempted murder, to which she responded “I don’t see it as killing or murder. The definition of murder is to take someone’s life with malice in your heart. I did it with love in my heart, for Tom, so I don’t see it as murder. I knew what I was doing was against the law. I don’t know what name they would call it but I knew that the law would say it was wrong. I believed it would have been Tom’s choice to have been allowed to die rather than have the intervention to keep him alive.”

The jury “could not have had a more difficult case,” according to Judge Brian Barker, but he told them nobody was allowed to override the law. Ten members of the jury agreed, but two sided with Frances, leaving a conviction by majority verdict. The jury foreman was greeted by cries of “shame on you” from France’s relatives, for which they were ejected from the building. “We can all understand the emotion and the unhappiness that you were experiencing,” Barker told Frances, later adding “You knew you were breaking society’s conventions, you knew you were breaking the law, and you knew the consequences.” He ordered her to serve a minimum of nine years.

HAVE YOUR SAY
Should the law be changed?
Add or view comments

“What this case and a number of others have exposed,” said France’s eldest son, Alex, “is a need for a complete rethink of existing laws in regard to people that have been, and will be, in the same position as Tom. How can it be legal to withhold food and water, which means a slow and painful death, yet illegal to end all suffering in a quick, calm and loving way? It’s cruel, inhumane and illogical… We have a duty of care to them and we should not allow this situation to continue. It should not be left to a wife, husband, mother, father, sister or brother to have to end their suffering, and be convicted for murder.” Detective Chief Inspector Steve Collin, who was in charge of the case, flatly disagreed. “There’s no such thing as a mercy killing in law.”

“I want to say that all of the family and Tom’s girlfriend support my mum 100%. All those who loved and were close to Tom have never seen this as murder, but as a loving and courageous act,” said Alex.

Wikinews interviews three figures from Donald Trump’s political past

In CategoryUncategorized
ByE4q8Xk

Sunday, March 13, 2016

Wikinews spoke with three people associated with the early political career of U.S. businessman Donald Trump, the front-runner for the Republican Party’s 2016 presidential nomination. Those interviewed include longtime political operative Roger Stone, a close associate of Trump and director of Trump’s 2000 presidential exploratory committee; journalist Dave Shiflett, co-writer of Trump’s 2000 campaign book The America We Deserve; and political consultant Russ Verney, who served as chairman of the Reform Party of the United States of America which Trump briefly joined.

In Trump’s highly publicized 2016 campaign, he has run under the banner of Make America Great Again, advocating a Mexican-funded wall along the U.S.–Mexico border, renegotiation of trade terms with other nations, and a temporary halt on the immigration of Muslims to the United States. He holds a considerable lead in Republican National Convention delegates over his opponents, winning 15 of the first 24 primary and caucus contests. Though this is Trump’s most visible campaign, it is not his first foray into electoral politics. He flirted with Republican presidential runs: first in 1987, when he purchased newspaper advertisements on foreign policy and delivered a campaign-like speech in the first-in-the-nation primary state of New Hampshire; and then in 2011, when he briefly led nationwide opinion polls for the presidential nomination after questioning the citizenship of President Barack Obama. Trump’s most extensive campaign before now came during the 2000 presidential election when he opened an exploratory committee to consider seeking the presidential nomination of the Reform Party.

For 2000, Trump conducted various speeches and media appearances in support of his potential presidential campaign. He placed Stone in charge of his exploratory committee and hired Shiflett to work on what would become The America We Deserve. His chief opponent for the nomination was paleoconservative icon and eventual nominee Pat Buchanan who entered the race after ending his third unsuccessful campaign for the Republican presidential nomination. Based on Buchanan’s comments against American involvement in World War II, Trump attacked Buchanan as a “Hitler lover” and anti-Semite. Trump’s campaign received support from then-Minnesota governor Jesse Ventura, the highest ranking elected official in the Reform Party. This placed Trump at odds with the faction of industrialist Ross Perot, the party’s founder and two time presidential candidate. Verney, a Perot confidante, was chairman of the party during Trump’s exploration. Though initially dismissive of the campaign, Verney eventually welcomed Trump into the race. However, the deep divisions within the party precipitated the exit of Ventura, and Trump did not seek the nomination. Despite leaving the race, Trump still appeared on Reform Party presidential primary ballots in California and Michigan, winning both states.

Over a five month period, Wikinews reporter William S. Saturn contacted the three previously involved in Trump’s politics to get their thoughts on his current presidential campaign, learn more about Trump’s political past including the true nature of his 2000 effort, and obtain details on his personality.

Contents

  • 1 Roger Stone
  • 2 Dave Shiflett
  • 3 Russ Verney
  • 4 Related news
  • 5 Sister links
  • 6 Sources
  • 7 External links

Do You Want A Ringing Ears Cure?}

In CategoryMachinery Auctions
ByE4q8Xk

Submitted by: John Currie

Before you can even think about finding a ringing ears cure you must be sure as to why your tinnitus started in the first place. Exposure to noise accounts for more than 80% of all ringing in the ear cases worldwide. Ringing ears can be caused by fireworks, gun shots, industrial equipment or even very noisy factories and if you are surrounded by any of these noises on a daily basis you must use ear protection.Some common ear ringing mistakes:

Care must be taken when using stereo headphones, if the volume is too high, you may generate ear damage and you will hear sounds and noises for days including a ringing in the ear. Sometimes you can stop ringing in the ears when you eliminate or cut down on alcohol and caffeine. Smoking and using smokeless tobacco products may also cause tinnitus by reducing blood flow to the parts of the ear. Regular exercise may prompt a ringing ears cure because it improves blood flow to the structures of the ear. Your excess weight may cause ringing in the ear, because too much weight hampers blood flow.

Studies has shown that tinnitus occurs more frequently in over-weight adults. Vitamin B12 is a vitamin that you should include in your diet to enhance a ringing ears cure. Some studies points to the fact that this vitamin helps to protect the nerves in the inner ear. Milk and dairy products, meat and eggs are good sources of vitamin B12. According to the latest studies there are many remedies for helping tinnitus, but there is no one cure.

YouTube Preview Image

Did you know that:

Earphones that are played too loud can damage the cochlea & cause ringing in the ear

Researchers are making some progress towards developing a cure for ear ringing. Some researchers claim to be able to reduce the ringing by combining an inner-ear injection of lidocaine. Dr. John J. Shea Jr., MD from the Shea Ear Clinic in Memphis believes that this treatment generally brings a ringing ears cure with some lasting results. Many patients have had a complete elimination of their tinnitus. It is definitely possible to cure ear ringing, but it is unexplainable. Studies indicate that 85% of most patients are able to mask the sounds associated with tinnitus.

When the ear ringing gets overwhelming it helps when you can mask the noise using white noise CD’s, fans, running water or even a running washing machine can help. Great results have been achieved by masking the tinnitus noises and using homeopathic treatment remedies together. Let me explain, what you focus on will expand so if you can mask the noise it can allow you to focus on something else besides the ringing this giving your body a chance to allow the homeopathic treatment to work as a ringing ears cure.

About the Author: Ellen and John Currie have been helping tinnitus sufferers overcome their battle with

ear ringing

. Visit http://www.t-gone.com now to learn more…

Source:

isnare.com

Permanent Link:

isnare.com/?aid=146309&ca=Self+Help }

Category:October 21, 2007

In CategoryUncategorized
ByE4q8Xk
? October 20, 2007
October 22, 2007 ?
October 21

SAHTECH, SEMI, and Semiconductor Industry to promote “SEMI Safety Guideline” in Taiwan

In CategoryUncategorized
ByE4q8Xk

Wednesday, April 2, 2008

“Localization of ‘SEMI Safety Guideline'”, executed by Safety and Health Technology Center of Taiwan (SAHTECH) and supervised by Semiconductor Equipment and Materials International (SEMI), was announced today in Hsinchu, Taiwan.

This localization included several fields on health and safety of semiconductor manufacturing, certification testing on electrical devices, evaluations on fire or natural diseases, and environmental issues on semiconductor manufacturing devices, etc.. Companies and manufacturers from the semiconductor industry also paid more attentions on this guideline because issues on carbon-savings, earthquakes, fire diseases, and environment-efficiencies were included into this guideline.

This [safety] guideline was originally promoted by SEMI since 1975 and was set up according to industry infrastructures in Europe, America, Korea, Japan, and Taiwan. Currently, its standards from the S1 to S25 was completely ruled by several world-class executives in semiconductor industry, and the S26 standard for FPD industry, proposed in Taiwan, was also in several arrangements with the other countries.
The semiconductor industry is a high-value industry in every country. If a fabrication plant (fab) was vandalized with fire or earthquake, how will a company decrease its lossless after a disease? As of some examples from the other countries, several companies didn’t pay more attentions on devices’ safety and finally got a damn trouble on counting lossless after a disease. By the way, voltages on electric using will take effect on energy especially the wasting of CO2. We [the semiconductor industry in Taiwan] hope this announcement will drive on global safety standards.
Generally, the designs of a fab will take effect on possibilities when a disease take place in, and its scale will chain much wasting on manufacturing devices and materials. For example, when using fluorine in a fab, a company would consider using a gas tank car rather than a steel bottle. But due to environment and carbon-saving issues, some evaluations should be tested in a fab.

On the other side of the incoming trade show of 2008 SecuTech Expo, scheduled after 2 weeks at Taipei World Trade Center, not only main fields on security devices, information security, and fire & disease preventions, the digital monitoring will be a hot topic in security industry. For applications on fire & disease preventions, because its issues contained industrial applications and ESH (Environmental, Safety & Health) managements, if a company want to decrease the ratio of fire disease or earthquake, companies from safety and related industries should pay more attentions on disease preventions.

Online Desk Research The New Tool In Market Research}

In CategoryMarketing
ByE4q8Xk

Online Desk Research The New Tool in Market Research

by

Marvist

Desk research is also known as secondary research. Desk research is analyzing already existing information from various sources and creating research reports according to the business requirements. Online desk research leverages the Internet as the major information source. Various advantages of online desk research are as follows

Preliminary Assessment of Market

Desk research is a good option for a preliminary study of the markets. It can be used highly effectively to provide leads that help the decision makers to get more detailed analysis about the market situation.

Competitive Intelligence

YouTube Preview Image

Competitive Intelligence is more than analyzing competitors. Having a clear picture of both existing and potential competitors is always crucial. Online desk research is a better option to evaluate some areas of the competitive intelligence. Internet has various sources like business websites, trade associations websites, research websites, government portals etc. These sources will help to get good information about the competitors.

Market Trends

Identifying market trends is the basic requirement to run a business. Many databases of articles and reports can be accessed through the Internet. By using these databases online desk research produces both contemporary and historical framework of the market trends. These frameworks allow identifying new market trends and drawing parallels.

Quick Reference

Desk research provides a quick reference to the already existing information without much effort. In examining information like social, economic or demographic trends it is a better option than the primary research.

Leverage Published Data

Internet contains information from many sources like businesses, academic institutions, trade associations, government agencies etc. These resources are put into good use to get the desired results in online desk research. As a result online desk research becomes economical and takes less time to yield results.

Aids Primary Research

Carrying out an initial desk research is strongly recommended to gain background knowledge to a subject. Though the desk research has a disadvntage of processing outdated data, this data can give cruicial leads for primary research. This approach has a potential that can add a new dimension to primary research.

Typically, secondary data accessed through desk research is initially generated through primary research. Online desk research can be very fruitful when it is viewed as preliminary guide to the market. It is a better option to carry out online desk research first and then filling the gaps through the primary techniques.

Marvist Consulting is an

internet advertising agency

providing professional seo, pay per click management and web analytic services to help companies to increase online sales and improve their profitability. Marvist Consulting also provides custom

Internet Marketing Research

Services (Professional and affordable) to find, analyze and summarize published information by our exp

Article Source:

eArticlesOnline.com }