2 resultados para William Richard Penhall

em Repository Napier


Relevância:

20.00% 20.00%

Publicador:

Resumo:

William Hope Hodgson has generally been understood as the author of several atmospheric sea-horror stories and two powerful but flawed horror science fiction novels. There has been no substantial study analysing the historical and cultural context of his fiction or its place in the Gothic, horror, and science fiction literary traditions. Through analysing the theme of borderlands, this thesis contextualises Hodgson’s novels and short stories within these traditions and within late Victorian cultural discourse. Liminal other world realms, boundaries of corporeal monstrosity, and the imagined future of the world form key elements of Hodgson’s fiction, reflecting the currents of anxiety and optimism characterising fin-de-siècle British society. Hodgson’s early career as a sailor and his interest in body-building and physical culture colour his fiction. Fin-de-siècle discourses of evolution, entropy, spiritualism, psychical research, and the occult also influence his ideas. In The House on the Borderland (1908) and The Night Land (1912), the known world brushes against other forms of reality, exposing humanity to incomprehensible horrors. In The Ghost Pirates (1909), the sea forms a liminal region on the borderland of materiality and immateriality in which other world encounters can take place. In The Night Land and The Boats of the ‘Glen Carrig’ (1907), evolution gives rise to strange monstrous forms existing on the borderlines of species and identity. In Hodgson’s science fiction—The House on the Borderland and The Night Land—the future of the earth forms a temporal borderland of human existence shaped by fin-de-siècle fears of entropy and the heat-death of the sun. Alongside the work of other writers such as H. G. Wells and Arthur Machen, Hodgson’s four novels respond to the borderland discourses of the fin de siècle, better enabling us to understand the Gothic literature of the period as well as Hodgson’s position as a writer who offers a unique imaginative perspective on his contemporary culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.