Advanced Advanced EnglishEnglish
Unit One: Section Unit One: Section AA
Tasks for This ClassTasks for This Class
Get the background information
Have a analysis of the organization
“Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts...A graphical representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the non-space of the mind, clusters and constellations of data. Like city lights, receding…”
--William Gibson, Neuromancer
HackerHacker
Old School Hackers Old School Hackers
Script Kiddies, or Cyber-Punks Script Kiddies, or Cyber-Punks
Professional Criminals, or Crackers Professional Criminals, or Crackers
Coders and Virus WritersCoders and Virus Writers
IP Spoofing IP Spoofing
occurs when an attacker disguises his/her occurs when an attacker disguises his/her originating host server or router as that of another originating host server or router as that of another host or routerhost or router.
Understanding the Understanding the
Organization Organization
an account or a recital of an event or a an account or a recital of an event or a series of events, either true or fictitious.series of events, either true or fictitious.
consciously madeconsciously made definite formal developmentdefinite formal development a firmness in constructiona firmness in construction unity in plot, theme, character, tone, unity in plot, theme, character, tone,
mood, even, occasionally, in stylemood, even, occasionally, in style
StorStoryy
get closer to storyget closer to story
point of viewpoint of view charactercharacter plotplot structurestructure
Point of viewPoint of view
the voice and vision through which the voice and vision through which the events of a story reach the the events of a story reach the readerreader
Two main kindsTwo main kinds
narrator as a participant (writing in narrator as a participant (writing in the first person)the first person)
narrator as a nonparticipant (writing narrator as a nonparticipant (writing in the third person)in the third person)
CharactersCharacters
Protagonist Protagonist
the chief character who strives in a the chief character who strives in a storystory
Antagonist Antagonist
the character who is directly the character who is directly opposed to the protagonistopposed to the protagonist
vs.
Tsutomu Shimomura Kevin Mitnick
CharactersCharacters
Plot Plot
an order of events in a story, the an order of events in a story, the emphasis falling on causalityemphasis falling on causality
TimeTime
PlacePlace
CharacterCharacter
BackgroundBackground
ConflictConflict
CrisisCrisis
ResolutionResolution
ConflictConflict
The struggle which grows out of The struggle which grows out of the interplay of the two opposing the interplay of the two opposing forces in a plot.forces in a plot.
Essential patterns of conflictEssential patterns of conflict
character against charactercharacter against character
character against societycharacter against society
character vs. some material forcecharacter vs. some material force
character vs. some supernatural entitycharacter vs. some supernatural entity
Crisis and DenouementCrisis and Denouement
Crisis is the point at which the Crisis is the point at which the opposing forces that create the opposing forces that create the conflict interlock in the decisive conflict interlock in the decisive action on which the plot will turn.action on which the plot will turn.
Denouement is the final unraveling Denouement is the final unraveling of the plot.of the plot.
Structure Structure
While plot tends to move the While plot tends to move the reader along, structure tends to reader along, structure tends to delay the movement so as to make delay the movement so as to make him pause to reflect.him pause to reflect.
Understanding the storyUnderstanding the story
How do you deal with the text?
The first section
conflict
main characters
background information
man versus man
the narrator and the hacker
a. someone broke into the narrator’s computers.
c someone was challenging the narrator.
d. the narrator was going to take action.
b. The log file summaries were stolen
The second sectionMeasures I took
--- put digitized phone messages on the Internet as a bait
--- keep in touch with FBI
--- set up monitoring system
Compare and Contrast
---- in common a fascination with computers
---- in discrepancy write technical programs
for company
sentenced to prison
The third sectionHow did the man get caught
---- monitor from NETCOM
---- found he was logging on
---- reported to FBI
The fourth section
The result of the duel.
---- My first face-to-face meeting with my opponent
Review the Internet Security IssueReview the Internet Security Issue
Read the articles “the Online World” and “the Hacking”.
Online ReadingOnline Reading