Friday, December 27, 2019
Internet Service Provider - Free Essay Example
Sample details Pages: 23 Words: 6793 Downloads: 4 Date added: 2017/09/16 Category Technology Essay Type Argumentative essay Did you like this example? Internship report Arnaud Desmons Epitech 2006 March to August 2006 Internet Service Provider This report is also available at : https://arnaud. desmons. free. fr/desmon_a-roguelink. pdf Grants Pass, Oregon Introduction This report is about my internship at RogueLink LLC covering the period of 6 months from May to August 2006. RogueLink LLC is a US nationwide Internet Service Provider based in Grants Pass Oregon wich mainly provides dialup connections. Oregon is on the west coast of united states. Although broadband technologies (DSL and Cable) are all the rage right now, in reality, a lot of people still only have access to analog phone lines. Dial-up modems will remain a good way to get on the Internet for several years, especially in retired area in United States. When looking for an internship I had three criterias : 1. Language and culture : I wanted to do my internship in a foreign country to improve my english and to discover a different way of life and business cult ure. 2. Technical diversity : a main point was to learn new things and especially not in software enginering, like I did in my formers internship. . Responsabilities : I looked for an experience that will proof I am able to manage things by myself. My job was to make the whole infrastructure stable, up and running. As described in this report I was focused on three main projects : 2 â⬠¢ The mail server migration from Windows to Linux. â⬠¢ The web server migration because of an hardware failure â⬠¢ The billing system migration In parallel, I had to maintain, monitor and improve the infrastructure. Eeach project was a huge challenge regarding both the ? nancial and technical situation of the company and the important number of end-users. As you will ee each project was managed with three main things in mind : â⬠¢ Simplicity : I was the single administrator and a too complex infrastructure would be both dif? cult to explain and dif? cult to use for non technicians (acco unt creation, passwords, dependencies between services). I keep it simple as much as possible. â⬠¢ Stability : because nobody would be there after me for administration I had to make it automatized as much as possible (scheduled monitoring emails, self-learning anti-spam). Keeping simple the system also contributed to keep it stable. â⬠¢ Security : the stability of the system also depends of its security. As I worked in this domain before I tried to keep everything secure (unfortunately in the limit of the ? rst point). 3 CONTENTS Contents 1 Organizational aspects 1. 1 1. 2 1. 3 1. 4 RogueLink LLC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet Access in southern Oregon . . . . . . . . . . . . . . . . . . . . . . . . . . The internship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Timeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 6 7 7 8 9 2 Technical aspects 2. 1 2. 1. 1 2. 1. 2 2. 1. 3 2. 1. 4 2. 1. 5 2. 1. 6 2. 1. 7 2. 1. 8 2. 1. 2. 2 Mail server migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 The old system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Accounts and password recovery from the old system . . . . . . . . . . . . 12 Mailboxes synchronisation . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Address books . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Mailing lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Mail aliases (forwarding) . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Firewall and DNS preparation . . . . . . . . . . . . . . . . . . . . . . . 14 The new system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Database and backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2. 1. 10 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Web server migratio n (IIS, Frontpage, Webtrends and FTP) . . . . . . . . . . . . . 20 2. 2. 1 2. 2. 2 2. 2. 3 2. 2. 4 2. 3 2. 3. 1 2. 3. 2 2. 3. 3 2. 3. 4 Why . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 What . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Freeside . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Data extractions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 PayPal extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Billing system migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4 CONTENTS 3 Conclusion 3. 1 3. 2 25 Technical conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 General conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 5 1 ORGANIZATIONAL ASPECTS 1 Organizational aspects 1. 1 RogueLink LLC RogueLink LLC, formerly EchoWeb, was created about 10 years ago. It was a very successfull company until the year 2000. The main activities of the company are : â⬠¢ Internet connections : they provide dial up and adsl connections to the internet, with associated services such as email, personnals web pages, hotline support. â⬠¢ Web hosting and domain registration. Website design is subcontracted. Shopping carts to sell products online are also provided. Computer repair for customers who have problems connecting to the internet. The dial-up technical infrastructure used to be owned by RogueLink but is actually now subcontracted by a nation wide operator named GlobalPOP. RogueLink manage their customer using a web interface from them but still have to bill customers. While the main product sold by RogueLink is still Dial Up connections, some people request faster connections, and RogueLink has to provide ADSL connections. The company started to provide ADSL connections last year, but it was stopped as it was found to be pro? table only for very important numbers of customers. Instead, ADSL connections are subcontracted to an other company in Grants Pass, whose name is VISP. They already suffered a ? re in the server room which destroyed many computers and caused the loss of many customers. At the moment, the company has about 800 customers using Dial Up connection, about 200 using DSL, and about 200 websites hosted. 6 1 ORGANIZATIONAL ASPECTS 1. 2 Internet Access in southern Oregon Most of the people in Grants Pass and around are connecting to the internet using 56k DialUp. Three reasons for that : â⬠¢ Local phone calls are free, which makes it quite cheap to connect any amount of time. DSL or Cable connections are a lot more expensive, and are not worth the price for what most people want to do: sending/receiving emails, visiting a few web pages â⬠¢ A lot of people are living outside of the city, in the forest, therefore they donââ¬â¢t have access to DSL or cable : Even if the number of people moving to DSL and cable is important, there remain an important number of dial up users, which is probably the reason why RogueLink is still pro? table. There are not that many big companies providing dial up internet access at low prices everywhere in the United States. However, there are still a lot of users connected to local ISP, even if it is a little more expensive. The main reason is not technical, it is the support. For experienced users it does not always make a big difference to connect to a local ISP, however for other users, they know that if they have problems connecting they can have free hotline support, or they can bring their computer and have it repaired, they can come and have their questions answered. This is what makes the difference with big ISPs, and probably why there still is a lot of small ISPs in the united states. The wireless market tend to show up more now with company like Clearwire. RogueLink is starting to get partenarship with this company to counter the dial-up death. 1. 3 The internship RogueLink is used to hire trainee from both Epita and Epitech and others french school and university. I found this internship thanks to a student from Epita who made an announce on school newsgroups. It was not easy to obtain on time the J-1 visa required for this kind of internship. Indeed, it was properly the time France was not able to provide biometric passports. So the United States immigration administration was ? oded of visa request for simple tourists (instead of passport). 7 1 ORGANIZATIONAL ASPECTS I was hosted by and near the house of my managers, Kate and Jacques LeCompte, owners of the business. The company is split in two different places located at about 20 minutes by car from each other : â⬠¢ The server room, where all the servers are is a few miles away from the downtown where the of? ce is located. â⬠¢ The of? ce is where customers can come and pay their bill, bring their computer to have it repaired, ask questions about their dialup connection or web hosting, etc This is also where the hotline support is located. I was working most of the time at the of? ce. This allowed me to be in contact with customers and to be aware of issues as soon as possible in order to give advice to hotliners. The hotline support was really knowledgable and Linux enthousiasts so I had no dif? culties to explain things. I was working on the servers remotely, using terminal services1 and ssh from my linux laptop. Sometime, I had to take my car and go to the server room. 1. 4 Timeline The ? rst month was more to acknowledge the system and what would be my projects. I had also to start organising thoses projects to see how long it will take for each one. The mail server migration took about two month (including the canceled outsourcing project). The web server migration took one month. The billing system set up took also one month. Services or Terminal Server Edition (TSE) is a component of Microsoft Windows NT operating systems (both client and server versions) that allows a user to access applications or data stored on a remote computer over a network connection. Terminal Services is Microsoftââ¬â¢s take on server centric computing, which allows individual users to access network resources easily. Terminal 8 2 TECHNICAL ASPECTS 2 Technical aspects This section is split into three parts. It is related to main projects I worked on, but as a reccurent background task I had to monitor services and to ? x some little issues, like buying new SSL2 certi? cats for online carts, adding new domain names in our DNS, setting up new web sites, ? xing front page extensions3 . For instance, I also had to delete a shopping cart customerââ¬â¢s account directly into t he SQL database. The ? rst week I was here, it was mainly to take notes on how the infrastructure is running. Thanks to a wiki4 ? led by formers trainees I was able to learn more faster but some of thoses informations was also obsoletes. I also set up some scripts for graphing the network activity on the DMZ5 : are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, internet faxing, and other data transfers. 3 Software technology that allows Frontpage clients editor to communicate with web servers, and provide additional functionality intended for websites. Frequent security problems have marked the history of this Microsoft proprietary technology. A wiki is a type of website that allows users to easily add, remove, or otherwise edit and change some available content, sometimes without the need for registration. This ease of interaction and operation makes a wiki an effective tool for collaborative authoring. 5 DMZ stands for DeMili tarized Zone. In computer security terminology, a DMZ is a network area that sits between an organizationââ¬â¢s internal network and an external network, usually the Internet. 2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, 9 2 TECHNICAL ASPECTS We have a 5Mb bandwith on both way thru ? er optic provided by Charter. We have 30 IP addresses (/27 block) with this connection. 10 2 TECHNICAL ASPECTS 2. 1 Mail server migration The mail migration was for sure the most usefull, dif? cult, sensitive task I had to do during this internship. I will explain here : â⬠¢ Why this server migration was necessary and urgent. â⬠¢ What was part of the migration (password recoveries, mailbox synchronisations, address books, webmail, mailing lists, aliases, administrators and administration interface) â⬠¢ How I did the migration (DNS, ? rewall, choose of components, scripts). 2. . 1 The old system When I arrived, the mail server that was used was IMail v8. 05 from Ipswitch on a Windows 2000 server, which is probably one of the worst email server program available. The main problems with this server were : 1. Ipswitch Imail is RFC ignorant (RFC 1893 or 3463). For instance, when a server answer with an Error code beginning with the number 4, it means that it is a Persistent Transient Failure, not a Permanent Failure, and sending again in the the future the same message may be successful. Imail doesnââ¬â¢t and bounce the message with a à « user unknow à ». Knowing the fact that most spammers wonââ¬â¢t take the time to send again their message when they receive a temporary some people had the idea to use a method called Greylisting6 to block a signi? cant amounts of spam by ? rst rejecting an email from an unknown server with a temporary error (with an error message begining with a 4), then accepting and adding the sending server to a whitelist when it try to send again the same email after a certain amount of time. The spams a re then rejected while the emails sent using a regular email server are received. The problem is that the IMail server doesnââ¬â¢t handle this correctly, and it was not possible for our customers to send emails to servers implementing GreyListing because of the à « unknown user à » problem. is a simple method of defending electronic mail users against e-mail spam. In short, a mail transfer agent which uses greylisting will temporarily reject any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again to send it later, at which time the destination will accept it. If the mail is from a spammer, it will probably not be retried 6 Greylisting 1 2 TECHNICAL ASPECTS 2. The server used to crash for no reasons and needed to be reboot very often to à « solve à » problems. 3. We had hackers, directly logged on windows (moving the mouse and everything. . . very impressive to see ! ) using our system to send spam. 4. The con? guratio n is saved in the Windows Registry which is horrible. 5. All the con? guration and management of accounts is done using a Graphical User Interface (which is not convenient for scripting tasks). The GUI is program that allow you to crash the whole mail server in a few clicks. It happened to me once but fortunately I had a backup of the Windows Registry. 6. The program lacks many options, and is not modular. For example it is not possible to add external spam ? ters, add special routing instructions, add greylisting. For all thoses reasons it was more than urgent to switch this server to a quality open-sourced one. 2. 1. 2 Accounts and password recovery from the old system As explained the IMail windows server stored accounts into the windows registry. I installed ActivePerl, wich is a bring of the Unix Perl to the Windows plateform and the Win32::TieRegistry Perl module. Then, I wrote a scripts to extract user attributs, including the encrypted password. The password algorithm used on the old system was not a common one (like crypt, md5 or sha1) which made impossible to copy encrypted passwords directly because the new system would not be able to use them. However, thanks to a very weak and sadly amusing encryption algorithm on the old system it was possible to extract, decrypt and re-encrypt them with a usable algorithm (crypt) for the new system. 12 2 TECHNICAL ASPECTS The encrypted password in hexadecimal was in fact the addition of the email address and the clear password. This was done with a few ef? cients lines of Perl : # my $mail = test; # my $password = BDD4EAE2EDD4E8; my @hex_mail = unpack(C*, $mail); my ($i, @decrypted_password, @hex_password); while ($password) { push @hex_password, hex(substr($password, 0, 2, â⬠)); } foreach (@hex_password) { push @decrypted_password, ($_ $hex_mail[$i++ % length($mail)]); } print pack(C*, @decrypted_password). ; 2. 1. 3 Mailboxes synchronisation Another dif? culty was that the migration had to be transparent for end-users. I had to plan synchronization of their mailboxes so it will take a minimum amount of time during the migration. I used a recurrent approach for that. The ? rst time it was really long to syncronize mailboxes using the IMAP protocol and during this long time new messages came. So I did it again and it take a little less time. So, during this inferior amout of time a little less messages came, etc At the end it took only about 6 hours so it was enough for doing that the night of the migration. I also prevent a problem that would be catastrophic if not noticed. Indeed, POP3 uses special IDs, wich are named UID, to know which messages were already downloaded by the end-users. If thoses UID are not synchronized between the old and the new system, then all users would have to download all their emails again. Those would be very unconvenient for end-users that use slow dial-up connections for instance and would result in a lot of phone calls. Besides that, everybody downloading all their mails would made a huge load on our server. Thanks to the fact that the old mail server kept those id directly in messages I was able to con? gure the new system to use them. 13 2 TECHNICAL ASPECTS 2. 1. 4 Address books In the old webmail their was address books. I had to extract thoses, using Perl scripts, to put them in the new webmail database which use a different format. Old address books were stored in a different ? les and directory for each domain and we host about 200 domains The new database of address books was really usefull for the new anti-spam system as I will explain there after. 2. 1. 5 Mailing lists7 They were also important mailing lists on the old mail server, used by hundreds of people. Because they were not so many and because it was pretty easy to set them up on the new linux server. I did that manually and just cut and past membersââ¬â¢ email of each mailing lists. The main part for this job was to explain to each admi nistrator of each list how the new system works. It was pretty successful. 2. 1. 6 Mail aliases (forwarding) I had to extract, using Perl scripts, each redirection rule in the 200 domains we host. That was not easy because the old system had different ways to store aliases. Most of them were stocked into the Windows registry and it was scriptable so. But for the other ones I had to extract them manualy using the GUI. 2. 1. 7 Firewall and DNS8 preparation Because updating DNS for the new server can be pretty random, I prefered to use TCP redirections. So if their was a problem, it would be for everybody and a lot more easy to ? x. Also it would be possible to switch back to the old system really quick. The rollback possibility was really important and I take care of that in every step of the migration. mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. 8 The domain name system (DNS) stores and assoc iates many types of information with domain names, but most importantly, it translates domain names (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. 7A 14 2 TECHNICAL ASPECTS I ? rst updated DNS for all domains we host to point to a ? rewall that will do the redirection. I had to use bash and perl scripting to update all domains. Then, I did the switch on the router a few days after the DNS so I was sure that everybody was using the router. 2. 1. 8 The new system The new system improved a lot of things and I had a lot better control on what is going on with the system. It allows access to more detailed log ? les. I was also able to set up some cron 9 tasks to email the hotline support about biggest mailboxes every week for instance or to email me the mailing lists activity or the backup results. Anti- spam Before, there was only greylisting thanks to a linux mail relay in front of the IMail windows server. Because the new system is a linux system we were able to do the greylisting directly on the server. There was also blacklist like relays. ordb. org, an Open Relay DataBase or bl. spamcop. net, A fast and automatic list of servers reported to send spam. But there was still spam so I setted up a statistical spam ? lter. Statistical ? ltering, once set up, requires no maintenance per se: instead, users mark messages as spam or nonspam and the ? ltering software learns from these judgements. Thus, a statistical ? lter does not re? ect the software authorââ¬â¢s or administratorââ¬â¢s biases as to content, but it does re? ect the userââ¬â¢s biases as to content; a biochemist who is researching Viagra wonââ¬â¢t have messages containing the word Viagra ? agged as spam, because Viagra will show up often in his or her legitimate messages. A statistical ? ter can also respo nd quickly to changes in spam content, without administrative intervention. The task here was to provide a convenient way for customers to feed Bogo? lter with spam and non-spam. It is really important to provide both spam and non-spam or the ? ltering would be catastrophic. The webmail provides a convenient way for end users to report messages as spam via an HTTP link. They do it well after we explained to them that doing so will reduce their amount of spam. cron server, found in Unix and Unix-like operating systems, is used to schedule commands to be executed periodically. A 15 2 TECHNICAL ASPECTS The amount of spam reported decrease of 90% ! I assume that users receive 90% less spam than at the begining of the ? lter learning proccess. I had some congratulations from customers about that. For non-spam, I ? nd out that all the address books that customers have in the webmail would be a good way to mark as non-spam messages coming from people in thoses address books. I did a script on the mail server that look into the address books database for every message comming in. If the expeditor is into an address book then the message will be marked as non-spam. I used also what we call à «spam trapsà ». This is non-used mailboxes, with names choosen to be easily spammed like ? rstnames or à «infoà », or à «contactà », etc. . . All messages received from thoses mailboxes are then automatically reported as spam to the statistical ? lter. 16 2 TECHNICAL ASPECTS Webmail The new webmail is Horde IMP which is a famous open source webmail. It is based on IMAP and allows customers to report problems easily, to manage their address book and folders and to report messages as spam. They can also set up ? ltering using both withlist and blacklist but as far as the anti-spam is ef? ient enough they donââ¬â¢t use it so much. There is also online help but the system is pretty intuitive. I customized a little bit default options after getting some customers feedback. I had to write scripts to update the con? guration database for each customers. 17 2 TECHNICAL ASPECTS Administration interface The new administration interface is simple which is certainly the main quality of it. The old one was really slow. Now, this is more like a frontend on the backend database used by the mail system. Here you can create, delete, and change password of those more than 2,000 accounts split on 200 domains we host. This interface is accessible also for each domain administrators with a different level of permissions. Indeed, I had to write scripts to extract kind of à «? agsà » into the windows registry of the old system to distinguish normal user and administrators. On the new system, endusers can also change their password using a dedicated part of the administration interface. This is a security improvement (negligeable regarding the improvement from Windows to Linux) because it was not possible on the old system. 18 2 TECHNICAL ASPECTS 2. 1. 9 Database an d backups The new system use an SQL database to store encrypted passwords. The Post? SMTP server and Dovecot POP3 server both use this database to check passwords. Thanks to this database, a backup of the accounts is made every day on another server. Because people donââ¬â¢t leave their messages in their mailboxes too long a bacup of them would be both dif? cult and not so usefull. 2. 1. 10 Conclusion The migration was a great success. Although I took all precautions there was still risks but I didnââ¬â¢t have to switch back to the old system. The system is actually really stable and end-users are already used to it. Every day, domainââ¬â¢s administrators use the administration interface and end-users report spam via the webmail. There was a project to outsource the mail server to a dedicated hosting service but the project was canceled by my managers. Also, the greylisting was at ? rst on a separate outsourced server but the company that was hosting this server disconne ct it after a delay in their payment. I had to install the greylisting service on the new server and everything was ? ne but it was a huge change. 19 2 TECHNICAL ASPECTS 2. 2 Web server migration (IIS, Frontpage, Webtrends and FTP) This task was less complex than the mail migration but the dif? culy here was to ? d out a way to automatize the procedure to avoid errors and to get it done as soon as possible. For most of the tasks I found how to automatize the migration but for some others I had to do it manually. This project was also a good opportunity because I was not used to Windows servers. 2. 2. 1 Why When I arrived, the IIS web server (Microsoft Internet Information Services) had only one hard drive left out of the six slots available. It was more than urgent to ? x that because the single hard drive could die at any time, bringing in his death the hundreds of web sites we host. We host companyââ¬â¢s website and shopping cart. Some of them process thousands of dollars a day. No need to say that any interruption of service would not be appreciated. Because it was too risky to put new hard drives and try a syncronisation with the one left, we set up a new server. I had to automatise as much as possible web domains creation. On top of domains thereselves there was a lot of related services like FTP10 , Webtrends11 and frontpage extensions to set up. The migration was also a good way to clean up the GUI from a bunch of old websites. The security was also improved because there was kind of à « leeping à » viruses on the old IIS server. 2. 2. 2 What I had to move 200 web domains. Which means also more than 200 ftp accounts and about 100 frontpage extension enabled domains. The database used for online shops was on a separate server and was not part of the migration. Most of the websites use ASP12 scripts but also PHP13 scripts. I spent a lot of time studying the possibility to switch to a Linux server. However, because of ASP and because a lot of custo mers use frontpage extensions which are both not available on Linux, it or ? le transfer protocol is a commonly used protocol for exchanging ? es over any network that supports the TCP/IP protocol (such as the Internet or an intranet). 11 Webtrends is a software that analyses IIS log ? les to generate statistical reports on web sites 12 Active Server Pages (ASP) is Microsoftââ¬â¢s server-side technology for dynamically-generated web pages that is marketed as an add-on to Internet Information Services (IIS). 13 Php Hypertext Preprocessor (recursive acronyme) is an open-source, re? ective programming language. Originally designed as a high level scripting language for producing dynamic Web pages, PHP is used mainly in server-side application software 10 FTP 0 2 TECHNICAL ASPECTS was decided to stay on Windows. We tried also Windows 2003 but it was too expensive for the company regarding its low improvement. The migration was ? naly from a Windows 2000 to a Windows 2000. 2. 2. 3 How I ? rst copied all web directories on the new server. Then, thanks to the à « Automating Administration for IIS 5. 0 à » documentation on Microsoft TechNet I found a way to create a new web domain from the command line using mkw3site and adsutil. I did a perl script that generated a little script for each domain based on its directory name. For FTP accounts, I didnââ¬â¢t ? nd a way to automatize the process but I was able to create an account using less than 10 keyboard shortcuts (including copy-past of the password from the wiki). So I did it manually. . . I tried also to protect the web server via a reverse proxy 14 . It was ? ne for web browsing but because frontpage extensions use NTLM15 it was not possible to break the ? ow with a reverse proxy for this part and I had to remove the reverse proxy. 2. 2. 4 Conclusion When everything was ready on the new server I just changed the DNS. It was successful, we just ? d out after the migration that some ASP scripts were broken because they needed some DLL16 library not yet installed on the new server but it was a quick ? x. I didnââ¬â¢t put back web statistics just after the migration and I did right because a really few people claimed them. So I put them back one by one and it was ? ne. reverse proxy is a proxy server that is installed typically in front of a webserver. All connections coming from the Internet addressed to one of the webservers are routed through the proxy server, which may either deal with the request itself or pass the request wholly or partially to the main webserver. This is done mainly for security reasons. 15 NTLM is a computer networking security protocol which operates in a variety of Microsoft Windows network protocols for authentication purposes. 16 DLL stands for Dynamic-Link Library. It is Microsoftââ¬â¢s implementation of the shared library concept in the Microsoft Windows operating systems. These libraries usually have the ? le extension DLL, OCX (for libraries co ntaining ActiveX controls), or DRV (for legacy system drivers). 14 A 21 2 TECHNICAL ASPECTS 2. 3 Billing system migration The actual system is running for a while and start to be wasted by a irrelevent data. Setting a new system would help ? rst to clean the database. On top of that, the actual billing system is completely disconnected from the technical infrastructure. Freeside was advised by the former student and looks to be an interesting solution. It would be possible, for instance, to create accounts automaticaly on the new mail system, or to disconnect someone that does not pay anymore. The ambicious idea is to run a completly standalone infrastructure where people can subscribe and pay online. Right now, RogueLink need an of? e and an employee to receive payments and also need someone to collect the postal payments, send invoices, going to the bank, etc. . . 2. 3. 1 Freeside Freeside is an open-source billing, ticketing and automation system for ISPs and online businesses . It has a web based interface. It is written in Perl and it is easily customizable because full source code is available under the GNU GPL. Freeside also provide a customer interface so they can pay, signup online and change their password. Bills sent by Freeside are also very neat and professional thanks to LaTex17 (this is also what is used for this report). One disadvantage of Freeside is that its doesnââ¬â¢t look professional but because it is open source we should ask a web designer to make it more fancy. Also, I didnââ¬â¢t like the way it is packaged. It put ? les everywhere and it is even hard to remove it cleanly. . . 2. 3. 2 Data extractions The old billing system use a SQL Server database to store all its data so I was able to extract customers data to put them into the PostgreSQL database of Freeside using a Perl script. There is three kinds of data : â⬠¢ Customers data : contains name, address, phone number, etc. . . s a document preparation system for the TEX typesetting program. It is used mainly by mathematicians, scientists, and engineers in academia. It is also widely used by people outside of these ? elds as a primary or intermediate format (e. g. translating DocBook and other XML-based formats to PDF) due to the quality of typesetting achieved by TEX 17 LaTex 22 2 TECHNICAL ASPECTS â⬠¢ Packages : contains the price and a billing frequency of a service provided by the company. â⬠¢ Provisioning data : contains data to synchronize accounts with the technical infrastructure (mail, DNS, web sites). I extracted only customers data as it was planned we will associate them to packages progressively. I also set up a provisioning source for the mail system and a test package to test the PayPal payments. 2. 3. 3 PayPal extension The most popular way to get paid on internet today is certainely PayPal. PayPal, was used to allow PayPal members to transfert PayPal money to others PayPal members (merchants) thanks to their email add ress. But PayPal diversi? ed then and now allow to use direct payments (with credit card). They provide API18 for credit card payment in a way that is possible to make it transparent for end users. The API is working with several languages as it uses an abstraction layer called SOAP19 for sending and receiving data or for triggering RPC (Remote Procedure Call). There was no PayPal extension provided with Freeside. But as far as the former provide a good and simple API for adding new extensions I wrote one for PayPal support into Freeside and put it under GPL on my website. This is a Perl module of about hundred lines that actually makes the interface between Freeside and PayPal using the SOAP protocol. PayPal provide a really good way to test their API. The concept of sandbox paypal account is that you can send and receive money but itââ¬â¢s virtual money. application programming interface (API) is the interface that a computer system, library or application provides in ord er to allow requests for services to be made of it by other computer programs, and/or to allow data to be exchanged between them. 19 SOAP is a protocol for exchanging XML-based messages over a computer network, normally using HTTP. SOAP forms the foundation layer of the Web services stack, providing a basic messaging framework that more abstract layers can build on. 8 An 23 2 TECHNICAL ASPECTS 2. 3. 4 Conclusion The system was ready, but it was not really intuitive and stable and would require a lot of time to ? x and learn it. As it was my last month and because there was many other projects it is not used right now. Anyway, this project was a good way to see how a billing system works and especially for ISP 20 . However, I had to move the actual billing server from the of? ce to the server room because the server was not in the best environement for a so important service. In term of air-conditioning, power supply, monitoring, security, etc. . 20 Internet Service Provider 24 3 CON CLUSION 3 Conclusion 3. 1 Technical conclusion My main motivation since I arrived, after understanding the situation, was to be able to leave 6 months later whith a stable, secure, up and running system that I would not have to worry about anymore. I had no problems to achieve my goal with the good practical oriented training we got at Epitech. I was able to work on things I never used before because I already learned to learn. For making it short, this internship was a struggle against three things : spam, hardware failures, and. . frontpage. Technically, it was really diversi? ed and mixed Windows and Unix administration, networking, scripts coding and developpements for the new billing system. System administration was also a new domain for me. Although I was used to the technical components, I had to think more with an end-user point of view in mind. That will help for any of my futur jobs because there is always a question of end-users. To sum up, the security and stability wer e improved thanks to linux and, on windows servers, thanks to anti-virus checks and updates. Backups were also made. The monitoring was ef? cient and it never takes long to aknowledge problems. I had a taste of system administration and I measured how oppressing it is. I was never totaly. I was monitoring and even ? xed things on the week-end. We had hard drive issues, serveral power outages (for the whole city) and our connexion provider had sometimes hours of blackout. This internship was a good opportunity to take responsabilites. Indeed, one single error on the mail or web migration would be fatal for the company. So, I had to elaborate procedures and often had to be very prompt ? ding solutions in case of problems because hundreds of people (and sometimes whole business) would be blocked otherwise. I had to manage priorities because problems were often related between them. I took initiatives and it was a good learning to measure each risk and to justify them. I establish ho w to do technically each mission, like choosing the components for new infrastructure (post? x, post? xadmin, dovecot, postgresql) or migrating tools (adsutils, imapsync). It was interesting to 25 3 CONCLUSION plan each step and prevent possible problems. It was like designing a software as I did in my formers internships. 3. 2 General conclusion It was interesting to see how a small business works, how it is vital to spare money and to make strategic choices. I used to speak with the manager, Jacques, and he advices me a lot on management and strategy. I was sometime alone at the of? ce and had to welcome customers, take care of their requests if possible or take messages. I had also to communicate with the hotline support to notice incoming problems or to advice on what to say or what to ask to customers. A good thing was to ear the hotline support. This contribute to improve my english and I learned a lot on how to speak to customers. However, one disadvantage of this inter nship was maybe not being able to work in team but just trying to explain what I was doing. Humanly, it was really enriching to meet American folks of any ages and with diversi? ed personalities. Globally, it was surprising how nice they are and particularly in Grants Pass where is located RogueLink. I had for instance the opportunity to assist, as a French guest, to french classes and it was fun trying to explain my à « french à » point of view on the middle east or on the American gas consuming and so forth. . Besides the valuable apport on my resume, the experience of the United States was a main point. It allows me to improve my English, to meet American people and visit San Francisco, the Silicon Valley, the Napa Valley, Seattle, Crater Lake, Las Vegas, Monument Valley, the Grand Canyon. Small cities all around Grants Pass were also beautifull. Great memories so ! 26 3 CONCLUSION Thanks I want to thanks Jacques and Kate for their welcoming. Dwayne and Gail for their collabora tion. The Epitech school staff. The french classââ¬â¢ students for having so much fun with them. The Bay Bridge which connects San Francisco with Oakland and the East Bay. 27 3 CONCLUSION Glossary ASP ASP stands Active Server Pages. It is Microsoftââ¬â¢s server-side technology for dynamicallygenerated web pages that is marketed as an add-on to Internet Information Services (IIS). DMZ stands for DeMilitarized Zone. In computer security terminology, a DMZ is a network area that sits between an organizationââ¬â¢s internal network and an external network, usually the Internet. The domain name system (DNS) stores and associates many types of information with domain names, but most importantly, it translates domain names (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. FTP or ? le transfer protocol is a commonly used protocol for exchanging ? les over any network that supports the TCP/IP protocol (such as the Internet or an intranet). Greylisting is a simple method of defending electronic mail users against e-mail spam. In short, a mail transfer agent which uses greylisting will temporarily reject any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again to send it later, at which time the destination will accept it. If the mail is from a spammer, it will probably not be retried IMAP IMAP allows users to access new messages instantly on their computers, since the mail is stored on the network. With POP3, users either download the e-mail to their computer or access it via the web. Both methods take longer than IMAP, and the user must either download any new mail or refresh the page to see the new messages. Php Hypertext Preprocessor (recursive acronyme) is an open-source, re? ective programming language. Originally de signed as a high level scripting language for producing dynamic Web pages, PHP is used mainly in server-side application software. Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, internet faxing, and other data transfers. DMZ DNS FTP Greylist PHP SSL 28 3 CONCLUSION TCP TCP stands for Transmission Control Protocol. This is one of the core protocols of the Internet protocol suite. Using TCP, applications on networked hosts can create connections to one another, over which they can exchange data in packets. TSE Terminal Services or Terminal Server Edition (TSE) is a component of Microsoft Windows NT operating systems (both client and server versions) that allows a user to access applications or data stored on a remote computer over a network connection. Terminal Services is Microsoftââ¬â¢s take on server centric computing, which allows indiv idual users to access network resources easily. Wiki a Wiki is a type of website that allows users to easily add, remove, or otherwise edit and change some available content, sometimes without the need for registration. This ease of interaction and operation makes a wiki an effective tool for collaborative authoring. 29 Donââ¬â¢t waste time! Our writers will create an original "Internet Service Provider" essay for you Create order
Thursday, December 19, 2019
Thanks for the Memories. Love, Sex and World War II by...
Thinking about the hard times of World War II, famine and poverty stricken, broken lives, husbands and fathers being sent overseas with the mere possibility of never seeing their families again. Taking on another twist, during World War II, it was a time of sexual experimentation and loosing of the overall morale of people. It was a time of conflict and emotions, sacrifice, and a time of discovery. Men and women alike, the Great Depression and the war disrupted lives. Times were hard and money was even harder to come by. Great lengths were taken to preserve their lives. In the book ââ¬Å"Thanks for the Memories: Love, Sex, and World War II,â⬠the author Jane Leder explains the social and sexual experiences of groups of people, and what it was like to be young in the 1940ââ¬â¢s, with a world at war and lives uprooted. Jane Leder began her journey as a writer after she was an English teacher for many years. She started her career as a newspaper reporter then as a writer/producer of educational materials. Her curiosity about how ordinary people reacting to extraordinary times and conditions drove her to writing from the start. In the book, there are stories from people who lived through this time and how they dealt with it. Leder tells a story of a young couple courtship between Betty Lou and George Rarey who had a brief but truly passionate marriage, which was separated by the war and his time in the service. George was a fighter pilot in Nazi Germany, eventually leading to his plane
Tuesday, December 10, 2019
Greek Myths Essay Example For Students
Greek Myths Essay Section I:Odysseus the most cunning man in the world.Odysseus, son of Procris and Cephalus of the Royal House of Athens,played a major role in the Trojan War. However, the legends of Odysseus donot begin until after the great war. At the end of the war he wasseparated from the rest of the Greek armies and was forced to wander forten years until he was reunited with his family. His journeys in those tenyears were very similar to Jasons journey in his search for the GoldenFleece. Also, in the course of Odysseus adventures, he proved himself tobe not only a great hero but also a cunning and resourceful man, worthy ofthe title the most cunning man in the world. There are many similarities between the adventures of Jason and thoseof Odysseus. Both heroes proved themselves to be mighty warriors; Jason,when forced to battle against the soldiers of the dragon teeth and Odysseusduring the long battles of Troy. Both heroes showed extreme courage in theface of danger and neither shied from doing what was necessary to completetheir quest. Both men were also very modest and were able to except helpwhen needed, either form gods or from other mortals. Jason did nothesitate to ask for help from the princess Medea. Odysseus accepted helpfrom a simple sheep herder in order to reclaim his home. Although thesetwo heroes had similar adventures and shared similar qualities, they werevery different. The first difference we notice between these two heroes is theirlineage. Like most Greek heroes, Jason was a direct descendant of the gods. Odysseus on the other hand was not. He was a member of the Royal House ofAthens and not divine as were many of his peers and relatives. Odysseuswas also more compassionate than Jason. Jason used people to his own endand then disregarded them. An example of this would be his relationshipwith Medea. She made him into the hero he was, saved his life many times,and left her homeland to follow her love Jason. Jason, however, uponreaching home with the Golden Fleece, decided to marry a princess to gainmore political power. He made this decision with no thought towardsMedeas feelings and her love for him. Odysseus, in contrast, was far moreloyal to his family and followers. He placed their happiness and safety onan equal or greater level then his own. For instance, when he was on theisland with Calypso, the nymph, it would have been very easy for him toabandon his desire to return home and live in perfect comfort forever. Wesee his concern again on the Island with the witch Circe. After the witchhad turned all of Odysseuss companions into swine, Odysseus with little orno thought for his own safety, went to confront the witch to save his crew. However, the most notable difference between these heroes lies not intheyre adventures but rather in how they approached and dealt with theirproblems. Jason, like most Greek heroes, felt that the easiest way to deal witha problem was to kill it. Odysseus, on the other hand thought of otherpossible solutions to his problems. He would try to use his intellect aswell as his brawn to accomplish his goals. Throughout his adventures andas early as the Trojan War, we see Odysseuss cunning. It is he who isattributed with the idea for the Trojan horse (a large hollow horse filledwith Greek soldiers). A second example was when he landed on the islandof the Cyclops during his adventures. The Cyclops demanded to know who hewas to which he answered I am Noman With those words he shot an arrow andblinded the Cyclopss one eye. During Odysseus retreat, another cyclopsapproached the first and asked what happened to his eye. The first cyclopsresponded that no man had shot his eye. This ensured Odysseuss escape fromthe island because the second cyclops didnt realize there were intruders. .u64a5e08bccf8ba84bbe84d11e3a7871c , .u64a5e08bccf8ba84bbe84d11e3a7871c .postImageUrl , .u64a5e08bccf8ba84bbe84d11e3a7871c .centered-text-area { min-height: 80px; position: relative; } .u64a5e08bccf8ba84bbe84d11e3a7871c , .u64a5e08bccf8ba84bbe84d11e3a7871c:hover , .u64a5e08bccf8ba84bbe84d11e3a7871c:visited , .u64a5e08bccf8ba84bbe84d11e3a7871c:active { border:0!important; } .u64a5e08bccf8ba84bbe84d11e3a7871c .clearfix:after { content: ""; display: table; clear: both; } .u64a5e08bccf8ba84bbe84d11e3a7871c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u64a5e08bccf8ba84bbe84d11e3a7871c:active , .u64a5e08bccf8ba84bbe84d11e3a7871c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u64a5e08bccf8ba84bbe84d11e3a7871c .centered-text-area { width: 100%; position: relative ; } .u64a5e08bccf8ba84bbe84d11e3a7871c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u64a5e08bccf8ba84bbe84d11e3a7871c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u64a5e08bccf8ba84bbe84d11e3a7871c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u64a5e08bccf8ba84bbe84d11e3a7871c:hover .ctaButton { background-color: #34495E!important; } .u64a5e08bccf8ba84bbe84d11e3a7871c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u64a5e08bccf8ba84bbe84d11e3a7871c .u64a5e08bccf8ba84bbe84d11e3a7871c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u64a5e08bccf8ba84bbe84d11e3a7871c:after { content: ""; display: block; clear: both; } READ: Much Ado About Nothing - Do Men In The Play Hate Or Love The Women? EssayA last example of his cunning is at the end of his adventures. Odysseusreturned home and found all the suitors there. Dressed as a beggar, he hadno trouble retaking his bow and then killing all of the suitors. So we seethat Odysseus could rely on both his wit and his strength to save him fromdangerous situations. This is why he was given the title the mostcunning man in the world.Section II: Adonis Sonnet, XVII. Cherry-lipt Adonis in his snowie shape, Might not compare with his pure Iuorie white, On whose faire front a Poets pen may write,Whose rosiate red excels the crimson grape,His loue-enticing delicate soft limbs,Are rarely framd tintrap poore gazing eies:His cheekes, the Lillie and carnation dies,With louely tincture which Apolloes dims,His lips ripe strawberries in Nectar wet,His mouth a Hiue, his tongue a hony-combe,Where Muses (like Bees) make their mansion. His teeth pure Pearle in blushing Correl set. Oh how can such a body sinne-procuring,Be slow to loue, and quike to hate enduring?R. BarnfieldA classical allusion can be defined as an indirect although notaccidental reference to a Greek or Roman legend. In this poem there arethree classical allusions all referring to Greek mythology Adonis, PhoebusApollo and the Muses. These references are intrinsic to the poem aswithout them the poem would be meaningless and hollow. The first allusion refers to Adonis, son of Phoenix and Alphesiboea, aGreek hero. This allusion was used because this poem is an ode to Adonis(the poem was written for Adonis). The second classical allusion we see inthis poem is to Apollo. Apollo is god of prophecy, music, and archery. Heis also known as the sun god. His name was invoked in this poem in orderto show Adoniss beauty. It shows us that Adonis was so beautiful that themighty Apollo had to dim the tint of Adoniss cheeks. The final allusionis to the Muses. The Muses were the goddesses who inspired artists. Fromthis we can learn that they loved beauty. This is why they are used in thispoem. They, like Apollo, are here to show us Adoniss great beauty. Dueto the fact that Adonis is so beautiful, the Muses, patron of the artists,yearn to make their home on Adoniss tongue in order to surround themselveswith his radiance. These allusions add a sense of nostalgia to the poem a throw back tothe days of gods and goddesses. The poet could have used less connotativewords to tell us how beautiful he was. But Barnfields use of theallusions gives us a better understanding of how magnificent Adonis musthave been. By using the name of Apollo and the Muses, we see that he musthave been divine because no mere mortal could look that way, only a Greekhero. Section III: Thor Then and NowThere are very few differences between the Thor of the Norse mythologyand Thor of todays comic book hero. Todays Thor is a muscular man whoappears to be in his late 20s. He has blonde hair and wears a red cape. The old Thor had red hair and was a middle aged man. Although this Thordid not look very heroic, he had all the other trappings of Thor, Mjolnir(Thors hammer), the iron gloves needed to hold Mjolnir and Thors beltwhich doubled his strength. All of these accessories are present in thecomics as well. In the comics, Thor has the ability to change into aregular man, with a walking stick, by tapping Mjolnir on the ground. Whenthis normal man then taps his walking stick on the ground, he once againbecomes the mighty Thor. The final difference between the comics and thelegend is Thors brother Balder. According to legend, this god was killedby a blind god (with the help of Loki god of mischief) and the gods beggedHela, goddess, of death to spare Balder the beloved. Hela refused andBalder entered the land of the dead. In the comics Odin, the all father(Zeus), was able to save his son by sacrificing a part of his power,creating the Odinshield to preserve his son. Other than these fewdifference s the Thor you read in Marvel comic books is the same one as inthe legends. He still protects the people of midguard (earth) and waitsfor the day of Rangorak (Dooms day) where Thor will battle Jormungandr(the snake circling midguard) and the two will kill each other and destroythe world in the process. While todays version of Thor barely resembleshis Greek counterparts, he very much resembles his roots in the Norsemythology.
Tuesday, December 3, 2019
REVISION OF PROBLEM GAMBLING
Introduction Gambling involves three things the stakes, the prizes and the result. The stakes include things of value that are placed by the parties involved. The prize is the valuable thing that participants opt to win after betting. The result is the outcome of the event that determines who wins and who loses (Fabiansson, 2010).Advertising We will write a custom case study sample on Revision of Problem Gambling specifically for you for only $16.05 $11/page Learn More Any activity involving the three aspects is gambling. Some examples of gambling events betting such as horse races or sporting events; playing casino games for money; buying lottery tickets; participation in prize-draws and newspaper competitions (Collins, 2003, p. 15). How gambling has evolved Over the past century and a half, gambling has evolved from being a furtive back-street activity to a multimillion-pound gambling industry (Parsons Webster, 2000). Governments of many nations are u sing legalized gambling as a source of revenue, and the citizens have accepted it as a source of entertainment (Stitt, 2001). Unlike in the olden days where a gambling event was organized once in a while, and people had to wait for the next events, today, the activity has been on for 24 hours with instant results and people do not have to wait for too long (Bourie Curtis, 2006). Gambling is prominent in todayââ¬â¢s society. It entertains, but can also have a disastrous effect on a personââ¬â¢s life (Thompson, 2001, p. 437). Relevance of the topic According to the BBC (2011, para 1), ââ¬Å"the amount of betting has increased to levels last seen in the late 1990sâ⬠. Nowadays, there are many problem gamblers, and the British society is ââ¬Å"in danger of being de-sensitised to the problems that gambling can bringâ⬠(BBC, 2011, para 16). Experts at the National Centre drew a research by the British Gambling Prevalence Survey in 2007 for Social Research (NCSR). It was found that there was an increment in the number of people gambling within the UK. The number of people betting for the last report increased from 63% to 73% between 2006 and 2007 respectively. In their comments to the survey authors, the majority claimed that they were gambling for fun. Others said that they were doing it to try out their chances of winning big money (Spapens, Littler Fijnaut, 2008, p. 37).Advertising Looking for case study on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More It was noted that people in the UK were gambling in different ways. However, few of them engaged in online gaming. The majority, almost 60% of adults within the UK participated in the National lottery. Nevertheless, it was noted that football gambling reduced considerably. It reduced from 9 to 4 percent in the first decade of the second millennium (Fabiansson, 2010). The reasoning behind the researchersââ¬â¢ decision to focus on the social and financial factors of gambling within the UK is because of the significant increase in gambling-related problems within Britain. In order to know whether gamblers had a problem, the statisticians used two different and complex measures to measure them. They surveyed for several behaviours of gamblers wanting to recover their stakes back (chasing losses). In many cases, the gamblers found themselves being exploited (Berleur, 2010, p. 19). The casinos fall into the leisure activities and most casino venues are business oriented. The venues tend to provide restaurant services, great music, and classy bars. In contrast to being an entertaining game for many people, gambling has negative impacts to people especially on their finances. Some individuals suffer from a gambling addiction, which can ruin their financial and personal lives (Wardle, 2007, p. 17). Negative impacts on todayââ¬â¢s society (both psychological and financial) Gambling is conducted in various places such as casi nos, Internet and electronic machines among many other places. Since the time of its innovation, gambling has never had chances of being easily accessed and ever available (Rule Sibanyoni, 2000, p. 21). As has been noted, gambling can lead to a serious addiction problem. It can lead to financial instability of an individual. Once the problem gambling strikes into a personââ¬â¢s life, it takes control over his or her life. It affects their home life, work environment, performance and their parenthood (in this case, being good parents). People affected with problem gambling find themselves under pressure that may force them into sourcing money through illegal means (Volberg, 2001, p. 121). Aims of the dissertation The aim of the dissertation is to examine the premise of this theory on the youth generation using Leeds and its gambling market (casinos) as its focus. ObjectivesAdvertising We will write a custom case study sample on Revision of Problem Gambling specifically for y ou for only $16.05 $11/page Learn More To describe and analyse the negative effects gambling has on individuals in Leeds. To evaluate the importance of problem gambling and its different forms. To analyse its impact on a suffererââ¬â¢s social and personal life. To establish the relationship between a gambler and his preferred casino, to determine what motivates them to go, what drives them to stay and gamble continuously? Literature review Notably, gambling may be described as ââ¬Å"a conscious, deliberate effort to stake valuables, usually but not always currency, on how some event happens to turn outâ⬠(Jazaeri and Bin-Habil, 2012, para 4). Many people view gambling as a way of risking money in order to make money. However, people who have won the valuable stakes do not stop playing, and those who have lost do not stop gambling. The youths in the society are also victims of gambling as they engage in gambling activities more than any other addic tive activity such as smoking or alcohol drinking. This is a cause for concern keeping in mind that the youths are the future of the society (Allen, 2011and Wildman, 1997). According to the research done by Derevensky in 2012, it was noted that there are various reasons as to why the youths engage themselves in gambling. The majority of them did it for enjoyment and others engaged in gambling to make money. Others indulged in gambling for excitement, relations and to hide from daily problems. Still, others engaged in gambling as a social activity and to have a feeling of being mature (Derevensky, 2012, p. 76). Notably, many people do not want to be associated with gambling because they feel that it is associated with the loss of the trust, lying, and loss of money among other bad behaviours (Thompson, 2001). However, there are circumstances that force them into gambling. For example, gambling can occur on a continuum with many individuals not engaging in the act at all. In additions , there are those individuals, who gamble once in a while, or those engaging in the activity many times and experiencing minimum negative financial or social consequences (Meyer, 2008). Impact of problem gambling on social personal life Gamblers who gamble frequently with valuable stakes and cannot even stick to their pre-set limits of time and the stakes may find themselves with severe problems (Derevensky, 2012 p. 31-32).Advertising Looking for case study on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More The gambling related problems impact on individuals in different ways. Some of them may lose control once. This may spell their fate because of their episodic and short-lived control loss. To others, losing control may be a progressive disorder. In this case, it becomes habitual or addictive in a way that no matter how hard the victims try to get themselves out of gambling activities. This becomes problematic, and the victims always go back to gamble. The gambling disorder has been given many names such as pathological gambling, problem gambling, compulsive gambling, or disordered gambling (Doweiko, 2009). When individuals get addicted to gambling, they cause many problems to themselves including emotional, familial, psychological, interpersonal, financial and legal problems (Grant Potenza, 2004, p. 4). Since many people are exposed to gambling, knowing that it is about taking risks and controls, they get attracted into trying their luck. The losers tend to keep on trying while app reciating that the activity is a game (Cunningham, 2011). In the process, both winners and losers blindly find themselves so much into the game that it gets hard for them to quit. They become addicts of gambling (Bledsoe, 2004, p. 86). In most cases, the youths are the most affected by the gambling activity (Fabiansson, 2010). According to research by Derevensky in 2012, it is evident that the adolescents get exposure to gambling early before they start experimenting with cigarette smoking, alcohol drinking, drug use, or engaging in sexual activities. A research by Griffiths and Sutherland in 1998 discovered that many youths between the age of 11 years and 16 years engaged themselves in gambling at least once a week; they often smoked cigarettes; got drunk with alcohol regularly and took illegal drugs. Through the psychological perspective, one can handle matters that are related to emotions (Orford, Sproston, Erens, White and Michtell, 2003). For example, in that situation, emotion al control could be more important than financial gains in understanding gamblers (Beilstein, 1979, p. 305). Gambling can be correlated with other addictive activities such as the use of tobacco, drug abuse, and taking alcohol (Sirgy, 2012, p. 38). People often assume the addictive behaviours and take them as prototypical moments of behaviours that are not truly self controlled and lacking self governance (Wengler, 2006, p. 127). Pathological gamblers invest a lot into the gambling activity. In this case, they put their personal relationships, occupational status and financial stability at risk. Such people are difficult to handle. Regardless of the increase of family and financial distress, they continue to gamble. Here, gambling controls them since it is difficult for them to control their urges to gamble (Fortune Goodie, 2009). The pathological gamblers tend to gamble with valuable stakes or high amounts of money in order to satisfy their urges for entertainment and pleasure. Th eir tendency or behaviour of putting gambling in the forefront other than thinking of their personal, occupational, and financial well-being is what makes them great risk takers (Galski, 1987, p. 39). Problem gambling affects or rather impacts the social life of people in a negative manner. The social impacts of problem gambling include the mental health problems, suicide, family or relationship problems, cases of divorce, and vulnerability of generations to come into excessive gambling (Ciarrocchi, 2001). Research studies indicate that problem gambling is on the increase. This is due to the increasing number of people presenting themselves for treatment for problem gambling. It can also be attributed to many divorces that are associated with problem gambling. In addition, the youths are getting involved in gambling at an early age more than they get involved in other addictive activities (Galski, 1987). There have numerous incidences where the youths have been reported to have comm itted suicide due to gambling. The suicidal cases occur as a result of losing huge amounts that are beyond the loose tolerance. When the loss is too much to bear, some problem gamblers who are most probably the youths, commit suicide since the world becomes useless to them after a great loss. That is why some of the youth problem gamblers developmental problems due to confusions that are instrumented by gambling (Nicholas, 1986). Problem gambling makes people suffer because of the need to gamble and the obsessive behaviour. Firstly, such victims of gambling have difficulties in maintaining their personal health (Gerstein et al 1999). Another problem is related to career responsibility. According to the research, many individuals may become jobless, and those who are fortunate to remain in the workplace perform poorly in production due to reporting to the workplace late than required. In this case, they fail to attend to jobs (absenteeism) and get preoccupied with gambling (Dickerson , 1984, p. 38; Ladouceur et al 1994). Problem gambling is of importance when it comes to gauging reliability of things such as in predicting behaviours or population discrimination behaviours. However, it is in most cases associated with negative impacts. In gambling the terms problem gamblers, pathological, or compulsive gamblers are used interchangeably. They are used to define a condition whose characteristics includes a loss of control over gambling, serious disruptions of families and jobs, theft cases and losses or attempts to win back stakes (money) that have been lost while in the gamble (Oei Gordon 2008). Prof Orford (BBC, 2012) noted that those addicted no longer regarded gambling in its sense of winning. He asserted ââ¬Å"By the time people get compulsive about their gambling, theyââ¬â¢re not enjoying it. Theyââ¬â¢re torn in two. Theyââ¬â¢re dependent on it and getting something psychological from it, but they know itââ¬â¢s ruining their life in certain ways â⬠(BBC, 2012, para 17). Psychological factors of gambling The examples of the psychological factors of gambling include personality features such as dysfunctional and functional impulsivity; poor mechanisms to cope with stress; impaired processing of rewards and the mechanisms of defence such asà feeling guilty and shameful, which drive the ongoing addiction. Dysfunctional impulsivity is associated with a poor response to treatment and not treatment completion. It is most likely that individuals with dysfunctional impulsive will drop out of treatment and report back to problem gambling more than those individuals with functional impulsive. The factor of poor mechanism to deal with stress also affects or rather leads to gambling (Dickerson, 1984, p. 38). Addiction to gambling is not necessarily caused by addiction of money. Most of them do it to escape from stress, painful pasts, seek arousal among other reasons. They gamble to avoid painful emotions, for example; sadness, de pression, guilt, shame, and humiliation among others (Ladouceur et al 1994). Therefore, in such a case, the problem gambler will be stressed. Thus, it is most likely that he or she will end up in gambling activities thinking that it is the best way to deal with the stress. This is due to a poor mechanism of dealing with the stress. The factor of impaired processing of rewards and mechanisms of defence such as the guilt and shame that one feels makes a problem gambler to continue with their addiction (Ciarrocchi, 2001). This factor tries to explain that the problem gambler continues with the addictive thinking that it is the best solution. However, in the real sense, this is like burying himself deep to the extent that turning to normal life becomes impossible (Oei Gordon 2008). The theories of peopleââ¬â¢s emotions or feeling while gambling includes the sensational or arousal theory, the opponent-process theory, and the reversal theory. The sensational theory explains that the n eed for excitement is a trait that is biological, and this is different from one individual to another. Since gambling is known to be an addictive behaviour, the gamblers will do their best in order to meet their needs (Chapman, 2007). This will be achieved after the reinforcement of their emotional relief. The theory of opponent process explains that arousal from opponent A is automatically counteracted by that of B or C. The theory further explains that, with repetition, the response of A will grow weaker in the process while that of B will be stronger and long-lasting. This shows that high-stake gamblers are motivated by opponents, and that is why the pathological gamblers enjoy this theory. The reversal theory shows that different individuals need either to be stimulated or tranquillised, and these guys behave in ways that direct them to that state (Oei Gordon 2008). Casino gambling can be more fun and profitable as well to people or playersââ¬â¢ mental and physical health. They are associated with dangers such as cheating among gamblers, machine malfunctions, and criminality among many others (Crowder, 2006). Cases of arrests due to cheating and other criminality are common in casinos. For example, people get arrested because of manipulating EGMs. The cheating gamblers and the gambling operators take advantage of each other. In this case, as the gamblers try to cheat the operators, they in return can also try to scam the gamblers. These people may end up shooting each other. This is exactly what happens in most cases when they conflict with each other. The casino environment is well planned to take peopleââ¬â¢s money. In this case, the casinos have no windows or clocks to distract the patrons from gambling. This makes the gamblers forget their schedules and continue playing till their pockets are empty. In addition, there are only pictures of winners and not losers, which adorn the atrium walls, there are scantily dressed cocktail waitresses, free alcoholic beverages among other attractions. They operate on a 24-hour basis, which adds to the ownersââ¬â¢ advantages.The environment is very attractive, and that is why people develop problem gambling at the shortest time possible (Crowder, 2006). There are flashing lights, whistles and bells. Their advertisements and slogans are set in a way that the gambler will not be much concerned about the amount they lose. In this case, they gamblers do not notice when their pockets are running out. The Cognitive model of gambling asserts the activity emanates from illogical beliefs. Those addicted to gambling have illogical beliefs that they stand a high chance of winning. They do not value the amount they spend but instead overestimate the amount they will gain in the gamble (Georgakopoulos, 2005). Reference List Allen, WD 2011, Criminals and victims], Stanford, California, Stanford Economics and Finance, an imprint of Stanford University Press. Andrews, R Haythornthwaite, CA 2007, Th e Sage handbook of e-learning research. SAGE, London. BBC 2011, Gambling problems on the increase in Britain. https://www.bbc.com/news/uk-12465204 BBC 2012, Gambling addict tells of fight to save family life. https://www.bbc.com/news/uk-20181353 Beilstein, FK 1979, Beilsteins Handbuch der organischen Chemie. 5. Bd. 3. Tl. 4. ErgaÃËnzungswerk, Springer-Verlag, Berlin. Berleur, J 2010, What kind of information society governance, virtuality, surveillance, sustainability, resilience; proceedings, Springer, Berlin. Bledsoe, B 2004, the battle of the binge: book and workbook, Bledsoe and Bledsoe Pub. Spartanburg, SC. Bourie, S Curtis, A 2006, American casino guide, Dania, Casino Vacations, Fla. Ciarrocchi, JW 2001, Counseling Problem Gamblers: A Self-Regulation Manual for Individual and Family Therapy, Elsevier, Burlington. Collins, P 2003, Gambling and the public interest, Praeger, Westport, Conn. [u.a.] Crowder, J, E,2006, Casino gambling: For fun and profitOutskirts Press, Inc, Den ver, Colo. Crowder, JE 2006, Casino gambling: For fun and profit, Outskirts Press, Inc. Denver, Colo. Cunningham, D 2011, Psychiatric tales: Eleven graphic stories about mental illness. Bloomsbury, New York. Cushman, G 2005, free time and leisure participation. International perspectives, CABI, Wallingford. Derevensky, JL 2012, teen gambling: understanding a growing epidemic, Rowman Littlefield Publishers, Lanham, Md. Dickerson, MG 1984, Compulsive gamblers, Longman, London. Doweiko, HE 2009, Concepts of chemical dependency. Brooks/Cole, Belmont, CA. Fabiansson, C 2010, Pathways to excessive gambling: A societal perspective on youth and adult gambling pursuits, Farnham, Surrey, Ashgate, England. Galski, T 1987, The Handbook of pathological gambling, C.C. Thomas, Springfield, Ill., USA. Georgakopoulos, N, L, 2005, Principles and methods of law and economics: Basic tools for normative reasoning Cambridge University Press, Cambridge. Grant, JE Potenza, MN 2004, and Pathological gambl ing: a clinical guide to treatment. American Psychiatric Pub. Washington, D.C. Great Britain 2012, The Gambling Act 2005; a bet worth taking? : First report of session 2012-13. Vol. 1, Report, together with formal minutes, oral and written evidence, Stationery Office, London. Great Britain Great Britain, 2012, The Gambling Act 2005: A bet worth taking? : First report of session 2012-13, Stationery Office, London. Jazaeri, SA and Bin-Habil, MH 2012, Reviewing Two Types of Addiction ââ¬â Pathological Gambling and Substance Use, Indian J Psychol Med., vol. 34, no. 1, pp. 5-11. Lee, RM 1993, Doing research on sensitive topics. Sage Publications, London. Meyer, G 2008, Problem gambling in Europe, Springer, Berlin. Nicholas, K, 1986, The social effects of unemployment in Teesside. Manchester: Manchester University Press. Reilly, RF Schweihs, RP 1999, valuing intangible assets, McGraw-Hill, New York, NY [u.a.]. Rule, SP Sibanyoni, C 2000, the social impact of gambling in South Afric a: an initial assessment for the National Gambling Board, HSRC, [Pretoria]. Saroyan, W 1975, the human comedy, Faber and Faber, London. Sirgy, MJ 2012, the psychology of quality of life hedonic well-being, life satisfaction, and eudaimonia, Springer, Dordrecht. Spapens, AC, Littler, A Fijnaut, C 2008, Crime, addiction and the regulation of gambling, Martinus Nijhoff Publishers, Leiden. Thompson, WN 2001, Gambling in America: An encyclopedia of history, issues, and society, ABC-CLIO, Santa Barbara Calif, u.a. Volberg, RA 2001, when the chips are down: problem gambling in America, Century Foundation Press, New York. Wardle, H 2007, British gambling prevalence survey 2007, TSO, Norwich. Wengler, S 2006, Key account management in business-to-business markets an assessment of its economic value, Deutscher Universitats-Verlag, Wiesbaden. Wildman, RW 1997, Gambling: An attempt at Integration, Wynne Resources, Inc. Publisher; National Academies Press, Edmonton. This case study on Revision of Problem Gambling was written and submitted by user Cayson Nolan to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Subscribe to:
Posts (Atom)