Today’s
Endless Running Games: Temple Run 2 – Fall Jungle Update!
Run or Die! So hurry!!
Continue the endless-running journey with Professor Jones in Temple Run 2.
The temple was at one time on the ground; an ancient civilization built the temple but they were killed by a disease.
The leader of the civilization was spared by a remedy, but because he didn’t die, the potion turned him into the large demon monkey that chases you from the temple.
As time passed, the temple remained unfound until the gems that were placed all over the huge temple were suddenly charged by an unknown source of power.
Your mission this time is to escape from the demonic forest along with the spoils is “the cursed god statue” – which you stole from a mysterious temple.
Remember, the Devils are still hunting for you!
Download Temple Run 2 new version.
Use arrow keys to control in this game.
Tips and Tricks: You can turn the sound on/off on the game screen and play this game in fullscreen mode.
Web Programming Assignment
This is a computer assignment and requires knowledge in programming
2-1 Discussion: Intellectual Property and Copyright
After reading about intellectual property this week, create an original post in which you discuss the following: Why do we care about intellectual property? How successful have our attempts to protect intellectual property been? Have all countries defined and protected intellectual property the same way?
Finally, in responding to your peers’ posts, reflect on the impact that copyright infringement has had on information technology by referencing a recent story in the news that is an example of this impact.
Write C program to encrypt and decrypt a file
Encryption:
1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)
Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.
Physical Security: Door and Window Lock Assessment
Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.
Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.
PHP,HTML,CSS,SQL
Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages or however you want to handle it that will allow you to do various queries of your database. You should be able to retrieve and insert data. For extra credit, include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project.
Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database.
The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.
If you have not yet created a home page, create a home page that contains links to each of the web pages you create to access your database. On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database. Some appropriate picture or image should be on the home page that relates to you project. Make your project look as professional as possible. You may want to show it during a interview.
Assignment
Discussion #1: What is Big Data? Why is it important? Where does Big Data come from?
Discussion #3: What is Big Data analytics? How does it differ from regular analytics?
Buffer overflow assignment
Exploit the vulnerable program (vulnerable.c) to obtain a shell. The vulnerable program and sample exploit (you need to edit the exploit to make it work) are in the Assignments folder which in turn is in the Documents folder in the TritonApps lab environment. Provide commands and the screenshots of the outputs to illustrate your exploit. [10 pts]
Answer the following questions related to the exploit:
a. Which function and statement in the program is the major cause of the vulnerability? Why? [10 pts]
b. What address are you using to overwrite the return address? How did you obtain this address? [10 pts]
c. Draw a figure of the overflow string that leads to a successful buffer overflow attack and a shell. The figure should highlight the important addresses and contents. [10 pts]
d. What offset worked for your exploit? How did you find the offset? [10 pts]
Implement Communication VIA HTTP
Subject: Distributed Computing
Deadline: 12 hours
Language: PYTHON