Preview

A Rhetorical Analysis Of Cyanogen Mod

Satisfactory Essays
Open Document
Open Document
143 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Rhetorical Analysis Of Cyanogen Mod
Rhetorical Strategies

Narration
The narration is the act of explaining or telling something.

In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers

You May Also Find These Documents Helpful

  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    and should not be labeled. Throughout the article Hemphill and Syagnik explain that the FDA is…

    • 1448 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Case study 1

    • 466 Words
    • 2 Pages

    The blackberry controversy is prominent in Asia, particularly in the Middle East, and not anywhere else in the world because of the instability of the region, government corruption, and restricted freedoms. The governments in the Middle East are under threat and need all of the information on potential terrorist plots so they can get to protect their sovereignty. In order to protect the people, or to maintain a dictatorial grip on the power they wield, they suppressed freedoms for the populace. Also because of the different laws and attitudes towards privacy and human rights along with the differing degrees in the capabilities of governments to crack encryption; finally because of the domestic and regional political instability along with the occurrence of certain incidents that highlighted the security threats posed and the RIM’s secrecy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Given the definition and description of rhetoric in Chapter 1, George Kennedy’s idea that the yellow pages of a phone book are more rhetorical than the white pages could be supported in a number of ways. As the yellow pages contain ads, one may argue that they are planned, adapted to audience, build community, etc.…

    • 1730 Words
    • 7 Pages
    Better Essays
  • Good Essays

    In America, the number one cause of death is heart disease, coming shortly after is diabetes and obesity (World Health Organization, 2014). Most of the population of America knows that there are health concerns that continue to increase as generations progress. The current average body weight and sizes for males and females in the U.S. have drastically increased compared to what they were 50 years ago. Currently, the average size for women’s clothing in the U.S. is between a size 12 and 16. For men it is a size 44 (Striegel-Moore, 2002).…

    • 1597 Words
    • 7 Pages
    Good Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Over the last decade, electronic-based companies such as Samsung and Apple have collaborated with cellular-phone carriers, and have studied the average consumer to find endless ways to improve the cellular phone. As a result, the smart phone was born. With their ability to provide users with instant access to communication, entertainment, Internet access, calendar, news, social media, and much more, the smart phone revolutionized and shifted the path of modern technology. In 2006, Apple began this revolution with their release of the iPhone. Being the first proper smart phone, many other companies attempted to mimic the unbeatable features and technology that Apple had included with the iPhone. Though many had failed in doing so, Google managed to keep up with the iPhone with their Android software. Soon enough, Google’s Android software became the dominant smart phone based software for smart phones not manufactured by Apple. Because of this, Android phones had become just as popular as iPhones. This paper will explore the similarities and differences between both Apple’s iPhone and Google’s Android.…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <http://www.infoworld.com/d/mobile-technology/clear-eyed-guide-androids-actual-security-risks-232034>.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Jailbreaking

    • 1713 Words
    • 5 Pages

    Jail breaking, a concept that can offer you complete freedom, but not in the way most would think, instead of freeing you from a 12x12 confined space, jailbreaking frees a technological device’s firmware from its locks and limitations letting the device reach its full potential. Although the process of jailbreaking could be used on a vast variety of devices, throughout this essay we will be examining the jailbreaking of iTouch’s, iPhone’s, and iPad’s. When Apple designs these products, they come with a predesigned firmware that restricts certain capabilities that otherwise the device would be able to do, such as wifi mobile hotspots, direct downloading capabilities, and more insignificant features, like moving screen savers. Along with the understandable, “disserved” capabilities jailbreaking offers, it also enables the ability for the user to access and download apps, and settings that Apple’s firmware protected against due to their illegal content. Thus the question on the topic is if jailbreaking is the “right” thing for a user to do with his/her device. Due to the fact that the user purchases the device outright, they should have the right to do whatever they please with the firmware and device itself even if it enables illegal activities, the user should be able to decide whether or not to obey the law, and the user should have full control of their apple device. When someone purchases any material object, it is the assumption that the buyer has the right to do as he/she pleases with the purchased object, and the situation should not be any different for the iTouch, Phone, or Pad, Thus making the process of jailbreaking morally acceptable, as well as legally just.…

    • 1713 Words
    • 5 Pages
    Better Essays
  • Better Essays

    As company’s dependence on computers and the internet increase, there are more and more threats that they face from hackers and anarchist alike. For ever solution that companies come up with to defend themselves against cyber attacks, those who wish to do harm find other means to attack, it is a constant cat and mouse struggle. If 2011 has been any indication, it is clear that everyone is vulnerable to cyber attacks. There was wave after wave of hacking, malware, and spear-phishing attacks that succeeded in exploiting many well-known businesses, such as RSA and Sony, which lead to the exposure of millions of records. (Schwartz, 2012) The purpose of this paper is to discuss three of the top information security threats that any business and organization face today: breaches, cyber espionage, and mobile malware.…

    • 1179 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Byod Pro's and Con's

    • 2327 Words
    • 10 Pages

    Messmer, Ellen. "BYOD-resistance Loosening but Security Practices Lacking."Consumerization of IT, BYOD. N.p., 25 Oct. 2012. Web. 09 Dec. 2012.…

    • 2327 Words
    • 10 Pages
    Powerful Essays