Friday, December 27, 2019

Moral And Ethical Issues In Frankenstein Essay - 1492 Words

The guiding question of all science fiction can be summed up by this sentence: â€Å"‘If this goes on, where will it lead?’†(Sawyer) By asking this basic, yet perplexing question, writers extrapolate on a known scientific principle to its most extreme case, and thereby create a catalyst for the events of the stories they write. Inside this story, the innate natures and behaviors of human beings are revealed through the characters’ reaction to the new threat that an advance in technology or scientific knowledge presents. The moral and ethical dilemmas created in these hypothetical futures allows the reader to better understand and examine the enigmatic state of the human condition. An example of this type of literature is the novel Frankenstein.†¦show more content†¦A company willingly uses time travel as a business venture, wholly knowing that the most minute change in the past could irreparably alter the present, and goes back to the cretaceous pe riod to hunt a tyrannosaurus rex. While there, a traveler accidentally takes a misstep and crushes a butterfly. When the travelers return to the future, the language being used in the country has changed and the outcome of an election has been altered by the traveller’s misstep. Science Fiction has the capability to serve as a cautionary tale about future technological advancements by exploring the ethical responsibilities of scientific advancement, and demonstrating the negative capacity of the pursuit of knowledge, revealing human societies’ arrogance towards the limits of their capabilities. With greater knowledge about the properties and functions of the world, the ethical responsibilities of scientists in their application of this knowledge are paramount to preserving the well-being of human civilization as well as the sanity of their scientists. When disregarded, the repercussions can be numerous and grim. Victor’s monster’s destructive and murderous actions are an example of the consequences of unethical scientific advancement. Victor uses his knowledge of animation to hastily create a being who craved sympathy and love, similar to a human being, but formed him as to create abhorrence in any who looked upon him. This deprived the monster of aShow MoreRelatedAnalysis Of Mary Shelley s Frankenstein 1527 Words   |  7 Pageshowever, for in contrast to the power of beauty which works to contain and maintain social distinctions, the sublime in Frankenstein opens the way for the excluded to challenge the dominant discourse and this appears to be one of man y things the creature substantially appears to represent.1 There is a critique of beauty in Frankenstein on anaesthetic grounds as well as what is ethical. The theoretical foundation for which can be found in Mary Shelley s mother, Mary Wollstonecraft s book on the VindicationRead MoreMorality In Mary Shelleys Frankenstein958 Words   |  4 Pagesmost commented issues about Frankenstein. This novel has been used as an approach to reflect on the ethics involved in most controversial scientific domains, such as genetic engineering or DNA research. This essay will analyse the controversy of moral standards in Mary Shelley’s novel, focusing on the moment in which Frankenstein contemplates the idea of the creation of a whole new species. I will confront the protagonist’s apparent lack of morality and analyse whether said morals do not appear atRead MoreValues Of The Literary Canon1762 Words   |  8 Pagestext that gives a deeper meaning than just words on a page, it gives different views and perspectives on issues, it can give u s insight into history and challenges us with moral or ethical dilemmas. It teaches us repercussions of love and secrecy like in William Shakespeare’s Romeo and Juliet, the dangers of messing with nature and pursuit of human knowledge as in Mary Shelly’s Frankenstein, and gives us an insight into the use of Revenge such as in Emily Bronte’s Wuthering Heights. These textsRead MorePolitics and The English Language: George Orwell ´s Literature3705 Words   |  15 Pagessociety and to reinstate the integrity of the writer. Orwell’s essays have sparked a plethora of adverse and auxiliary opinions regarding the imperishability of his work, from those whom believe that his efforts are archaic, to those who believe that his craftsmanship of language addresses issues which had once been hidden. No matter what side of the social spectrum one categorises themselves in, it is undeniable that Orwell’s essays resonate a certain quality of genuine concern for society whichRead MoreAnalysis Of Mary Shelley s Frankenstein 1863 Words   |  8 Pagesboth mankind and his creation [p. 20 – Frankenstein, Modern Interpretation]. An innovator works on their creation haphazardly in order to discover an identifiable outcome. To look for this outcome, there are no efforts in debating with an ethical approach. As Shelley presents Victor as a conventional romantic who conveys powerful emotion when he is mostly alone, Russian author Turgenev also presents a similar character reminiscent to Shelley’s Frankenstein. [Add Transition] Bestolarides 7 Bazarov’sRead MoreMetamorphoses Within Frankenstein14861 Words   |  60 PagesThe Critical Metamorphoses of Mary Shelley’s Frankenstein You must excuse a trif ling d eviation, From Mrs. Shelley’s marvellous narration — from th e musical Frankenstein; or, The Vamp ire’s Victim (1849) Like Coleridge’ s Ancient Mariner , who erupts into Mary Sh elley’s text as o ccasionally and inev itably as th e Monster into Victor Frankenstein’s lif e, Frankenstein; or, The Modern Prometh eus passes, like night, from land to land and w ith stang ely ad aptable powers of speech Read MoreFrankenstein Study Guide14107 Words   |  57 PagesTHE GLENCOE LITERATURE LIBRARY Study Guide for Frankenstein by Mary Shelley i To the Teachern The Glencoe Literature Library presents full-length novels and plays bound together with shorter selections of various genres that relate by theme or topic to the main reading. Each work in the Library has a two-part Study Guide that contains a variety of resources for both you and your students. Use the Guide to plan your instruction of the work and enrich your classroom presentations. InRead MoreEthical And Philosophical Nature Of Human Rights2452 Words   |  10 Pagessecondly Origins and Politics of human rights. However, recent progression in genetics and genetic engineering have made it possible to change the very nature of the mankind, thus uprising many questions of ethical and philosophical nature. Personally speaking, in choosing the topic for the essay I were mainly interested in the human rights and its nature, how far it could go beyond its origins and control, therefore, addressing age-old questions and concerns. Does the person have the right to changeRead MoreHow To Write Literary Analysis4174 Words   |  17 PagesHow To Write Literary Analysis The Literary Essay: A Step-by-Step Guide When you read for pleasure, your only goal is enjoyment. You might find yourself reading to get caught up in an exciting story, to learn about an interesting time or place, or just to pass time. Maybe you’re looking for inspiration, guidance, or a reflection of your own life. There are as many different, valid ways of reading a book as there are books in the world. When you read a work of literature in an English classRead MoreEssay on Our Posthuman Future: The Philosophical Implications2960 Words   |  12 PagesIntroduction This essay is about the philosophy of Artificial Intelligence (AI) and it will delve deep into the question of the many philosophical implications of AI. In this paper, I will argue that a machine being able to think and the possibility of an emerging post human future due to the hypothetical invention of AI has philosophical implications for the future of humanity. The intersection of strong and weak AI with human consciousness is also explored through the examples of IBM’s AI systems

Thursday, December 19, 2019

The Effects Of Food Security On Children Essay - 2119 Words

Through a tube formed at the belly button, a fetus receives all the nutrients and supplements it needs from its mother. In a perfect world, it would make sense that pregnant mothers have easy access to the nutrient rich foods and prenatal vitamins they need to make sure the development of their baby would be near perfect. For some women, that is not the case. There is an outstanding number of women who do not have the tools they need to be able to have a healthy diet while pregnant with their children and this status carries over to after the child is born. Food security has different meanings in different situations and contexts, based on location in the world. The definition being used for this paper is the running definition being used is â€Å"continual, reliable access to safe nutritious and culturally appropriate food that provides a foundation for the pursuit of one’s full human potential† (Hinrichsen, 2016). A lack of these vital nutrients and low food security has some negative effects on the cognitive development of children all over the world. These children are the future of the world, if this problem isn’t fixed there will still be an increasing number of malnourished, pregnant women. The cognitive development in the first 1000 days of their life will be hindered greatly and the effects it could have on their lives later are just as detrimental. Food insecurity is an issue that needs to be fixed immediately across the globe, otherwise we could lose out on some ofShow MoreRelatedThe Effects Of Food Security On A Global Level1132 Words   |  5 Pagesthe perspective of food security on a global level. ARS Food Security Research: USDA ARS. (2016) states that food security is defined as when all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life. Food security includes the physical and economic access to food that meets their dietary needs. It has been established that food security is built on three factors, which include; food availability, food access, and food use. Food availability establishesRead MoreEssay Food Secuirty and Malnutition in the World829 Words   |  4 Pagesover seven billion has caused many people to worry about food security and malnutrition. Currently, there is enough food to feed everyone in the world but equal distribution is a major problem. However, with the growing population food security will become an increasingly significant problem because there will not be enough food for everyone. Likewise, as more countries are starting to develop, their dietary need and demand for better food increases. Developing countries such as China and India haveRead MoreAir And Water Pollution Essay1282 Words   |  6 Pagesbeen affecting the environment for many years causing many diseases among people especially children. I will study and examine the early childhood growth between two countries which are Australia and Tanzania. I will discuss how clean and polluted their air and water is for each country. Their access to clean water. I will also explain the effects that can occur when water is contaminated. How children are affected when they don t have access to primary essentials and how each country and theirRead MoreFood Insecurity And Hunger Among Children795 Words   |  4 PagesTyler Evans Kathy Kvinge ENGL 1101 Oct 31, 2017 Food Insecurity Many people don’t realize the sever issue that hunger can bring to their community, only because of the lack of knowledge on the situation. Food insecurity is the state of being without reliable access to a sufficient quantity of affordable, nutritious food. Hunger is a feeling of discomfort or weakness caused by lack of food, coupled with the desire to eat. Food and hunger are some of biggest social and public health issues peopleRead MoreThe Food, Conservation, And Energy Act Essay1369 Words   |  6 PagesThe Food, Conservation, and Energy Act The Food, Conservation, and Energy Act was passed on May 14, 2008 after a historical veto by the President led to an override by Congress to enact the new farm bill into law. The new bill contained numerous provisions in order to truly reform efforts to establish farm and food safety throughout the United States. This paper will focus on the provision that led to the renaming of the Food Stamp Act and Program as well as the act’s plans to allocate more thanRead MoreGender Inequality And The Workplace1630 Words   |  7 Pagesand well-being by gender have potential to effect inequity in material hardship. Food security, a component of material hardship, which is associated with poverty and labor participation, also shows gender differences in impact and prevalence (LeBlanc, Betsey, Blaylock, 2005). Women have higher rates of food insecurity than men. Additionally, research has shown among the food insecure, women are more likely to have more adversarial health effects than f ood insecure men (Martin Lippert, 2012; PanRead MoreThe Effects of Poverty on Children Essay1217 Words   |  5 Pages When analyzing children growing up in poverty a lot of factors come into play such as their physical, psychological and emotional development. To grow up in poverty can have long term effect on a child. What should be emphasized in analyzing the effects of poverty on children is how it has caused many children around the world to suffer from physical disorders, malnutrition, and even diminishes their capacities to function in society. Poverty has played a major role in the functioning of familiesRead MoreKeny Food Secure Or Insecure?1737 Words   |  7 PagesKenya: Food Secure or Insecure? Kenya has an extremely diverse nature to it. On one hand, Kenya has an unemployment rate of 40 percent and 43 percent of the people living in Kenya are impoverished, and on the other hand Kenya has a plateau region that is very fertile and the people in Kenya grow a variety of agriculture products, such as beef, eggs, poultry, coffee, tea, corn, wheat, and sugarcane. Even though Kenya has some fertile land, they have been experiencing a severe drought that continuesRead MorePoverty And Health : Low Income Limits Choices Essay1732 Words   |  7 Pageshealth: Low income limits choices to cheap and unhealthy foods Poverty tends to impact society on several different levels, whether it may be through the impact of the economy, social effects, education, health, but most importantly malnutrition; which is said to be the most common effect of poverty. Poverty affects millions of Americans by limiting their choices to cheap and unhealthy foods. It also limits the physical access to healthy food choices as it relates to diet costs and reliable accessRead MoreThe Great Depression : Economic Growth And Prosperity1438 Words   |  6 Pagescycle of business, misguided government policies, panics within the financial markets and environmental disasters among others. Everyone felt the effects of the Great Depression on every part of the country, rural or urban. From the rich to the poor, the young to the old, white Americans to African Americans, no one was spared from the devastating effects of the depression. The experience of millions Americans suffering as a result of the Great Depression paint a c lear picture on how serious the crisis

Tuesday, December 10, 2019

Project Management Concepts Customer Relationship Management

Question: Describe about the Project Management Concepts for Customer Relationship Management. Answer: Introduction The report has been made for focusing on the topic of project management. The project management is important for focusing on the development of project plan and completing the project within provided time. The case study of a major theme park company has been selected for understanding the role of project management in a particular project and the components of project processing. The business parks situated in Australia is the centre of attraction for almost 150,000 families from both national and international sectors. According to Bradley (2016), the information system proposed should be with latest technological features and it should be integrated on a single platform. Hence it would be easily accessible from any place. The report would show profound and extensive methods for implementation of the project. The report would evaluate the strategies that can be used for making sure that the project is successfully implemented. Plan for the Project Implementation Comprehensive plans for pre-implementation and post-implementation The project management would deal with the process of making plans for pre-implementation and post-implementation of the information system required at the park company. It would require considering a complete life cycle of the project plan for information system implementation (Dozier, Grunig and Grunig 2013). The steps required for making the implementation plans are: Plan for Pre Implementation The pre implementation plan consists of steps like planning, analysis of requirements, system design, system development, and system implementation. Explanation of the steps is being done in the following paragraphs. Planning: The proper planning is very crucial for any project execution and completion. It is essential for determining the success or failure of the project (Hill 2013). The planning of the project could be done by the analysis of various facts and estimation of the benefits of the project plan for the customers. Analysis of Requirements: The requirements of the project planning consist of forming information analysis about the customers. It is important for analyzing the requirements prior to the implementation process (Turner 2016). The requirement analysis would help in understanding the requirements of the customers, organization and other stakeholders of the project and it is done before the project is implemented. System Design: The design of the system proposed for the park company would have to be sufficient for meeting all the requirements of the organization (Crawford 2014). The customers and other stakeholders have some requirements from the information system such as being able to provide the necessary information, ease of decision making, and efficiency. The design new information system must supplement and incorporate all these expectations of the organization (Alhawari et al. 2012). The design should compile with the feature of mobile application for the organization. System Development: The system development incorporates the development option for making any amendments in future when required (Morris 2013). It would also take in consideration for any necessary changes demanded by the client. Hence the system design must be made compatible for being update with the demands of the clients or customers. The system must provide the feature of using online booking options with the mobile application of the organization. System implementation: The system for the information processing must be used for enhancing the functionality and operations of the park company. According to Garton and McCulloch (2012), it would integrate the customer system on a single centralized platform for easing the flow of operations in the company and improving the business processes. Plan for Post Implementation The plan for post implementation consists of system design, system development and system implementation. Explanation of these steps is given in the following paragraph. System Design: The system design for the new information system of the customers would be helpful for fulfilling the requirements of the organization, customers and other stakeholders (Morris, Pinto and Jonas 2012). The design can be evaluated for checking the consistency and accuracy by using the functioning and testing of customer acceptance. System Development: The system developed for the park company would be able for providing the organization with ease of acquisitioning the further development and changes. The system developed can be used for executing the best possible solution for the development model. System Implementation: It is important for management of the customers of the park company and monitoring them on a daily basis (Lientz and Rea 2012). The implemented system would be helpful for consideration of security account for the privacy of the user system. Implementation plan The project made has helped in forming improved management system for the information system of the park company. The budget of the company has been estimated to be around $718,495.00. It would take almost 78 days for completion of the project. Variety of resources would be used for completion of the project within the allocated time and fixed budget. Activity of the project Name of the party (or commodities) involved Proposed Customer Management Information System Planning of the Project Manager of the Project and Accountant Schedule of the Project Project Manager and Project Co-ordinator Fixing the Budget of the Project Accountant of the Project, Computer Hardware and Software resources, Land, Furniture, and Infrastructure Gathering required resources for the Project Project Manager and the Software Developer of the information system Commencing the project Leader of the team and the Project Manager Development process of Digital conversion Software developer, Hardware Engineer and Design Developer of the project Software Correction Software tester, Software Developer and Network Engineer Development of the Mobile Application Software Developer and Hardware Engineer Modification of the App Software tester, Software Developer and Design Developer Closure of the Project Manager of the Project and Accountant Assumptions of the Plan The following assumptions were made for considering the new information management system of the park company: The computer software and hardware resources were bought before the implementation of the project along with the basic infrastructural things like furniture and land. The proposed information system for the customer and the mobile application would be developed internally with the company of major theme park. The internal staffs of the company would be responsible for designing and developing the information system and the mobile application. Fundamentals of the Plan The fundamentals of the plan implementation consist of various factors like stakeholders, budget estimation and allocation, and resources. These factors have been explained below: Project Stakeholders Name of the Stakeholders Company Board of Major Theme Park Sponsors of Major Theme Park Customers and Clients of Major Theme Park Intensity of the Impact Intense Intense Intense Degree of Influence High Medium High Formed Strategy for engagement of the stakeholder On a monthly basis for the board meetings Monthly growth report of the companys budget Analysis of the requirements before the initialization of the project Budget Estimation and Allocation for the project Name of the Financial Activity Expected Cost expense Proposed Customer Management Information System $718,495.00 Planning of the Project $697.00 Schedule of the Project $520.00 Fixing the Budget of the Project $690,617.00 Gathering required resources for the Project $395.00 Commencing the project $3,980.00 Development process of Digital conversion $16903.00 Software Correction $2,793.00 Development of the Mobile Application $1,397.00 Modification of the App $793.00 Closure of the Project $400.00 Project resources The resources of the project are being shown in the list below: Serial No. Resource 1 Team Leader 2 Project Manager 3 Accountant 4 Hardware engineer 5 Software developer 6 Network engineer 7 Tester 8 Designer Monitoring and Controlling Some strategies can be used for keeping an eye on the progress of the project and making sure it has not sidetracked from the main goal. They have been pointed out below: 1) Preparation of the review meeting at regular interval 2) Evaluating the expenses of the project with the estimated cost 3) Developing a practical tracking method for project progression and its costing factors 4) Summarization of the major events of the project with the estimated project sequence and its timeline Budget Plan for the Project The estimated sum of the project budget is $718,495.00 and the duration of the project is 78 days. The list is shown below: Name of the Financial Activity Duration of the activity Expected Cost expense Proposed Customer Management Information System 78 days $718,495.00 Planning of the Project 3 days $697.00 Schedule of the Project 1 day $520.00 Fixing the Budget of the Project 2 days $690,617.00 Gathering required resources for the Project 13 days $395.00 Commencing the project 1 day $3,980.00 Development process of Digital conversion 39 days $16903.00 Software Correction 7 days $2,793.00 Development of the Mobile Application 8 days $1,397.00 Modification of the App 3 days $793.00 Closure of the Project 1 day $400.00 Identification of risk factors The risk factors for the project of customer information system are : Unscheduled requirements in the project Unavailability of the staff Unattended work package updates Risk Management Planning Risk Identification Requirements update in the project Staff Unavailability during the execution of the project Work package updates in the project Degree of Impact High High Medium Strategy for Mitigation Requirement analysis should be executed prior to the project in accordance with the respective stakeholders Allocation of the additional resources for completion of the project within allocated time and stipulated budget Analysis of the work packages regularly or at regular interval for ensuring the assurance of the successful completion Project Schedule Recommendations for the information system Management Improvement: According to Heagney (2012), the management improvement comprises of methodology or procedures that are planned for figuring the change in the improvement of the framework. The proposed framework would be secondary to the Customer relationship administration framework and it would help in dealing with the clients' connection with the Theme Park. The administration is the examination of the degree, usefulness, and deliverable of the Customer connection administration. The proposed framework would be very successful and the administration of the framework would be facilitated (Mir and Pinnington 2014). The extent of the framework like administration of the CRM information and practical operations of the Theme Park would be exceedingly expanded and it would help in conveying the required yield from the framework proposed. Quality Assurance: The quality management plays a significant role in project management of the Theme Park. It consists of various ways or processes such as proficiency testing, rechecking or retesting, and on site evaluation (Kerzner 2013). The proficiency testing requires external provider for sending the testing of the system being made for Theme Park. It would help in analyzing and comparing reports for the system proposed. Rechecking is the process of analyzing the proposed system again for errors or bugs. The system proposed for the Theme Park would have to be made consistent and error free. On site evaluation, refers to the process of monitoring the system while deployed in the Theme Park. According to Burke (2013), the processes or activities of the system would that is to be implemented in the Theme Park must be constantly monitored. The use of External Quality Assessment would help in comparing the performance and outcomes of the system that would be implied in the Theme Pa rk. Communication Management: It is the orderly administration of the communication procedure inside an association. The procedure of correspondence administration incorporates the arranging, checking, executing, and updating the techniques or procedures of correspondence (Bloch, Blumberg and Laartz 2012). The correspondence is a two way handle and the channel must be commotion (unsettling influence) free with a specific end goal to pass on one's message plainly to the others. The correspondence administration would help in ensuring that the imparted message has been gotten instantly and without being altered by any outer media. According to Goetsch and Davis (2014), the correspondence administration would help in ensuring that the stream of the data in the Customer Relation framework would be viable and consistent. Conclusion It can be concluded from the report that the project for advancement and usage of new client management system will be effectively accomplished by implying the recommended techniques. The accomplishment of the project is conditioned by different components. Subsequently, the key administration techniques are fundamental for satisfaction of the client prerequisites and also business targets of the association. However, it can be reasoned that the process of planning of any project is a key component for guaranteeing accomplishment of the project. The planning of a project should be possibly improved by plotting a Gantt graph with the assistance of Microsoft Project application. References Alhawari, S., Karadsheh, L., Talet, A.N. and Mansour, E., 2012. Knowledge-based risk management framework for information technology project. International Journal of Information Management, 32(1), pp.50-65. Bloch, M., Blumberg, S. and Laartz, J., 2012. Delivering large-scale IT projects on time, on budget, and on value. Harvard Business Review. Bradley, G., 2016. Benefit Realisation Management: A practical guide to achieving benefits through change. CRC Press. Burke, R., 2013. Project management: planning and control techniques. New Jersey, USA. Crawford, J.K., 2014. Project management maturity model. CRC Press. Dozier, D.M., Grunig, L.A. and Grunig, J.E., 2013. Manager's guide to excellence in public relations and communication management. Routledge. Garton, C. and McCulloch, E., 2012. Fundamentals of Technology Project Management. MC Press, LLC. Goetsch, D.L. and Davis, S.B., 2014. Quality management for organizational excellence. pearson. Heagney, J., 2012. Fundamentals of project management. AMACOM Div American Mgmt Assn. Hill, G.M., 2013. The complete project management office handbook. CRC Press. Kerzner, H.R., 2013. Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Lientz, B. and Rea, K., 2012. International project management. Routledge. Mir, F.A. and Pinnington, A.H., 2014. Exploring the value of project management: linking project management performance and project success. International Journal of Project Management, 32(2), pp.202-217. Morris, P.W., 2013. Reconstructing project management. John Wiley Sons. Morris, P.W., Pinto, J.K. and Jonas, S. eds., 2012. The Oxford handbook of project management. OUP Oxford. Turner, R., 2016. Gower handbook of project management. Routledge.

Tuesday, December 3, 2019

Nmap scan free essay sample

Completed SYN Stealth Scan at 18:08, 0.23s elapsed (1000 total ports) Initiating Service scan at 18:08 Scanning 3 services on 172.30.0.1 Completed Service scan at 18:08, 6.02s elapsed (3 services on 1 host) Initiating RPCGrind Scan against 172.30.0.1 at 18:08 Completed RPCGrind Scan against 172.30.0.1 at 18:08, 0.00s elapsed (1 port) Initiating OS detection (try #1) against 172.30.0.1 Retrying OS detection (try #2) against 172.30.0.1 Retrying OS detection (try #3) against 172.30.0.1 Retrying OS detection (try #4) against 172.30.0.1 Retrying OS detection (try #5) against 172.30.0.1 NSE: Script scanning 172.30.0.1. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 18:08 Completed NSE at 18:08, 0.09s elapsed NSE: Script Scanning completed. Nmap scan report for 172.30.0.1 Host is up (0.00s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.5p1 Debian 6 (protocol 2.0) | ssh-hostkey: 1024 59:1d:a5:df:cd:1f:af:5c:85:c4:93:55:de:da:4f:c3 (DSA) |_2048 8d:be:1c:cd:be:bd:ac:14:77:0f:c1:91:f1:2f:1b:bd (RSA) 23/tcp open telnet Linux telnetd 111/tcp open rpcbind 2 (rpc #100000) | rpcinfo: | 100000 2 111/udp rpcbind | 100024 1 53389/udp status | 100000 2 111/tcp rpcbind |_100024 1 44778/tcp status MAC Address: 4A:90:54:50:83:22 (Unknown) No exact OS matches for host (If you know what OS is running on it, see http://nmap. We will write a custom essay sample on Nmap scan or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=5.21%D=2/23%OT=22%CT=1%CU=33995%PV=Y%DS=1%DC=D%G=Y%M=4A9054%TM=53 OS:0AA9A6%P=i686-pc-windows-windows)SEQ(SP=C5%GCD=1%ISR=D2%TI=Z%CI=Z%II=I%T OS:S=8)SEQ(SP=C5%GCD=1%ISR=D1%TI=Z%CI=Z%II=I%TS=8)OPS(O1=M5B4ST11NW4%O2=M5B OS:4ST11NW4%O3=M5B4NNT11NW4%O4=M5B4ST11NW4%O5=M5B4ST11NW4%O6=M5B4ST11)WIN(W OS:1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W6=16A0)ECN(R=Y%DF=Y%T=40%W=16D0% OS:O=M5B4NNSNW4%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R= OS:Y%DF=Y%T=40%W=16A0%S=O%A=S+%F=AS%O=M5B4ST11NW4%RD=0%Q=)T4(R=Y%DF=Y%T=40% OS:W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q= OS:)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A= OS:S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RU OS:CK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S) Uptime guess: 0.027 days (since Sun Feb 23 17:29:30 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=197 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux HOP RTT ADDRESS 1 0.00 ms 172.30.0.1 Initiating ARP Ping Scan at 18:08 Scanning 253 hosts [1 port/host] Completed ARP Ping Scan at 18:08, 1.97s elapsed (253 total hosts) Nmap scan report for 172.30.0.3 [host down] Skipping SYN Stealth Scan against 172.30.0.2 because Windows does not support scanning your own machine (localhost) this way. Initiating Service scan at 18:08 Skipping OS Scan against 172.30.0.2 because it doesnt work against your own machine (localhost) NSE: Script scanning 172.30.0.2. NSE: Script Scanning completed. Nmap scan report for 172.30.0.2 Host is up. PORT STATE SERVICE VERSION 1/tcp unknown tcpmux 3/tcp unknown compressnet 4/tcp unknown unknown 6/tcp unknown unknown 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 17/tcp unknown qotd 19/tcp unknown chargen 20/tcp unknown ftp-data 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 24/tcp unknown priv-mail 25/tcp unknown smtp 26/tcp unknown rsftp 30/tcp unknown unknown 32/tcp unknown unknown 33/tcp unknown dsp 37/tcp unknown time 42/tcp unknown nameserver 43/tcp unknown whois 49/tcp unknown tacacs 53/tcp unknown domain 70/tcp unknown gopher 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 82/tcp unknown xfer 83/tcp unknown mit-ml-dev 84/tcp unknown ctf 85/tcp unknown mit-ml-dev 88/tcp unknown kerberos-sec 89/tcp unknown su-mit-tg 90/tcp unknown dnsix 99/tcp unknown metagram 100/tcp unknown newacct 106/tcp unknown pop3pw 109/tcp unknown pop2 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 125/tcp unknown locus-map 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 146/tcp unknown iso-tp0 161/tcp unknown snmp 163/tcp unknown cmip-man 179/tcp unknown bgp 199/tcp unknown smux 211/tcp unknown 914c-g 212/tcp unknown anet 222/tcp unknown rsh-spx 254/tcp unknown unknown 255/tcp unknown unknown 256/tcp unknown fw1-secureremote 259/tcp unknown esro-gen 264/tcp unknown bgmp 280/tcp unknown http-mgmt 301/tcp unknown unknown 306/tcp unknown unknown 311/tcp unknown asip-webadmin 340/tcp unknown unknown 366/tcp unknown odmr 389/tcp unknown ldap 406/tcp unknown imsp 407/tcp unknown timbuktu 416/tcp unknown silverplatter 417/tcp unknown onmux 425/tcp unknown icad-el 427/tcp unknown svrloc 443/tcp unknown https 444/tcp unknown snpp 445/tcp unknown microsoft-ds 458/tcp unknown appleqtc 464/tcp unknown kpasswd5 465/tcp unknown smtps 481/tcp unknown dvs 497/tcp unknown retrospect 500/tcp unknown isakmp 512/tcp unknown exec 513/tcp unknown login 514/tcp unknown shell 515/tcp unknown printer 524/tcp unknown ncp 541/tcp unknown uucp-rlogin 543/tcp unknown klogin 544/tcp unknown kshell 545/tcp unknown ekshell 548/tcp unknown afp 554/tcp unknown rtsp 555/tcp unknown dsf 563/tcp unknown snews 587/tcp unknown submission 593/tcp unknown http-rpc-epmap 616/tcp unknown unknown 617/tcp unknown sco-dtmgr 625/tcp unknown apple-xsrvr-admin 631/tcp unknown ipp 636/tcp unknown ldapssl 646/tcp unknown ldp 648/tcp unknown unknown 666/tcp unknown doom 667/tcp unknown unknown 668/tcp unknown unknown 683/tcp unknown corba-iiop 687/tcp unknown unknown 691/tcp unknown resvc 700/tcp unknown unknown 705/tcp unknown unknown 711/tcp unknown unknown 714/tcp unknown unknown 720/tcp unknown unknown 722/tcp unknown unknown 726/tcp unknown unknown 749/tcp unknown kerberos-adm 765/tcp unknown webster 777/tcp unknown unknown 783/tcp unknown spamassassin 787/tcp unknown qsc 800/tcp unknown mdbs_daemon 801/tcp unknown device 808/tcp unknown ccproxy-http 843/tcp unknown unknown 873/tcp unknown rsync 880/tcp unknown unknown 888/tcp unknown accessbuilder 898/tcp unknown sun-manageconsole 900/tcp unknown unknown 901/tcp unknown samba-swat 902/tcp unknown iss-realsecure 903/tcp unknown iss-console-mgr 911/tcp unknown unknown 912/tcp unknown unknown 981/tcp unknown unknown 987/tcp unknown unknown 990/tcp unknown ftps 992/tcp unknown telnets 993/tcp unknown imaps 995/tcp unknown pop3s 999/tcp unknown garcon 1000/tcp unknown cadlock 1001/tcp unknown unknown 1002/tcp unknown windows-icfw 1007/tcp unknown unknown 1009/tcp unknown unknown 1010/tcp unknown unknown 1011/tcp unknown unknown 1021/tcp unknown unknown 1022/tcp unknown unknown 1023/tcp unknown netvenuechat 1024/tcp unknown kdm 1025/tcp unknown NFS-or-IIS 1026/tcp unknown LSA-or-nterm 1027/tcp unknown IIS 1028/tcp unknown unknown 1029/tcp unknown ms-lsa 1030/tcp unknown iad1 1031/tcp unknown iad2 1032/tcp unknown iad3 1033/tcp unknown netinfo 1034/tcp unknown zincite-a 1035/tcp unknown multidropper 1036/tcp unknown unknown 1037/tcp unknown unknown 1038/tcp unknown unknown 1039/tcp unknown unknown 1040/tcp unknown netsaint 1041/tcp unknown unknown 1042/tcp unknown unknown 1043/tcp unknown boinc 1044/tcp unknown unknown 1045/tcp unknown unknown 1046/tcp unknown unknown 1047/tcp unknown unknown 1048/tcp unknown unknown 1049/tcp unknown unknown 1050/tcp unknown java-or-OTGfileshare 1051/tcp unknown optima-vnet 1052/tcp unknown ddt 1053/tcp unknown unknown 1054/tcp unknown unknown 1055/tcp unknown ansyslmd 1056/tcp unknown unknown 1057/tcp unknown unknown 1058/tcp unknown nim 1059/tcp unknown nimreg 1060/tcp unknown polestar 1061/tcp unknown unknown 1062/tcp unknown veracity 1063/tcp unknown unknown 1064/tcp unknown unknown 1065/tcp unknown unknown 1066/tcp unknown fpo-fns 1067/tcp unknown instl_boots 1068/tcp unknown instl_bootc 1069/tcp unknown cognex-insight 1070/tcp unknown unknown 1071/tcp unknown unknown 1072/tcp unknown unknown 1073/tcp unknown unknown 1074/tcp unknown unknown 1075/tcp unknown unknown 1076/tcp unknown sns_credit 1077/tcp unknown unknown 1078/tcp unknown unknown 1079/tcp unknown unknown 1080/tcp unknown socks 1081/tcp unknown unknown 1082/tcp unknown unknown 1083/tcp unknown ansoft-lm-1 1084/tcp unknown ansoft-lm-2 1085/tcp unknown unknown 1086/tcp unknown unknown 1087/tcp unknown unknown 1088/tcp unknown unknown 1089/tcp unknown unknown 1090/tcp unknown unknown 1091/tcp unknown unknown 1092/tcp unknown unknown 1093/tcp unknown unknown 1094/tcp unknown unknown 1095/tcp unknown unknown 1096/tcp unknown unknown 1097/tcp unknown unknown 1098/tcp unknown unknown 1099/tcp unknown unknown 1100/tcp unknown unknown 1102/tcp unknown unknown 1104/tcp unknown unknown 1105/tcp unknown unknown 1106/tcp unknown unknown 1107/tcp unknown unknown 1108/tcp unknown unknown 1110/tcp unknown nfsd-status 1111/tcp unknown unknown 1112/tcp unknown msql 1113/tcp unknown unknown 1114/tcp unknown unknown 1117/tcp unknown unknown 1119/tcp unknown unknown 1121/tcp unknown unknown 1122/tcp unknown unknown 1123/tcp unknown unknown 1124/tcp unknown unknown 1126/tcp unknown unknown 1130/tcp unknown unknown 1131/tcp unknown unknown 1132/tcp unknown unknown 1137/tcp unknown unknown 1138/tcp unknown unknown 1141/tcp unknown unknown 1145/tcp unknown unknown 1147/tcp unknown unknown 1148/tcp unknown unknown 1149/tcp unknown unknown 1151/tcp unknown unknown 1152/tcp unknown unknown 1154/tcp unknown unknown 1163/tcp unknown unknown 1164/tcp unknown unknown 1165/tcp unknown unknown 1166/tcp unknown unknown 1169/tcp unknown unknown 1174/tcp unknown unknown 1175/tcp unknown unknown 1183/tcp unknown unknown 1185/tcp unknown unknown 1186/tcp unknown unknown 1187/tcp unknown unknown 1192/tcp unknown unknown 1198/tcp unknown unknown 1199/tcp unknown unknown 1201/tcp unknown unknown 1213/tcp unknown unknown 1216/tcp unknown unknown 1217/tcp unknown unknown 1218/tcp unknown aeroflight-ads 1233/tcp unknown unknown 1234/tcp unknown hotline 1236/tcp unknown unknown 1244/tcp unknown unknown 1247/tcp unknown unknown 1248/tcp unknown hermes 1259/tcp unknown unknown 1271/tcp unknown unknown 1272/tcp unknown unknown 1277/tcp unknown unknown 1287/tcp unknown unknown 1296/tcp unknown unknown 1300/tcp unknown unknown 1301/tcp unknown unknown 1309/tcp unknown unknown 1310/tcp unknown unknown 1311/tcp unknown rxmon 1322/tcp unknown unknown 1328/tcp unknown unknown 1334/tcp unknown unknown 1352/tcp unknown lotusnotes 1417/tcp unknown timbuktu-srv1 1433/tcp unknown ms-sql-s 1434/tcp unknown ms-sql-m 1443/tcp unknown ies-lm 1455/tcp unknown esl-lm 1461/tcp unknown ibm_wrless_lan 1494/tcp unknown citrix-ica 1500/tcp unknown vlsi-lm 1501/tcp unknown sas-3 1503/tcp unknown imtc-mcs 1521/tcp unknown oracle 1524/tcp unknown ingreslock 1533/tcp unknown virtual-places 1556/tcp unknown unknown 1580/tcp unknown unknown 1583/tcp unknown unknown 1594/tcp unknown unknown 1600/tcp unknown issd 1641/tcp unknown unknown 1658/tcp unknown unknown 1666/tcp unknown netview-aix-6 1687/tcp unknown unknown 1688/tcp unknown unknown 1700/tcp unknown mps-raft 1717/tcp unknown fj-hdnet 1718/tcp unknown unknown 1719/tcp unknown unknown 1720/tcp unknown H.323/Q.931 1721/tcp unknown unknown 1723/tcp unknown pptp 1755/tcp unknown wms 1761/tcp unknown landesk-rc 1782/tcp unknown hp-hcip 1783/tcp unknown unknown 1801/tcp unknown unknown 1805/tcp unknown unknown 1812/tcp unknown unknown 1839/tcp unknown unknown 1840/tcp unknown unknown 1862/tcp unknown unknown 1863/tcp unknown msnp 1864/tcp unknown paradym-31 1875/tcp unknown unknown 1900/tcp unknown upnp 1914/tcp unknown unknown 1935/tcp unknown rtmp 1947/tcp unknown unknown 1971/tcp unknown unknown 1972/tcp unknown unknown 1974/tcp unknown unknown 1984/tcp unknown bigbrother 1998/tcp unknown x25-svc-port 1999/tcp unknown tcp-id-port 2000/tcp unknown cisco-sccp 2001/tcp unknown dc 2002/tcp unknown globe 2003/tcp unknown finger 2004/tcp unknown mailbox 2005/tcp unknown deslogin 2006/tcp unknown invokator 2007/tcp unknown dectalk 2008/tcp unknown conf 2009/tcp unknown news 2010/tcp unknown search 2013/tcp unknown raid-am 2020/tcp unknown xinupageserver 2021/tcp unknown servexec 2022/tcp unknown down 2030/tcp unknown device2 2033/tcp unknown glogger 2034/tcp unknown scoremgr 2035/tcp unknown imsldoc 2038/tcp unknown objectmanager 2040/tcp unknown lam 2041/tcp unknown interbase 2042/tcp unknown isis 2043/tcp unknown isis-bcast 2045/tcp unknown cdfunc 2046/tcp unknown sdfunc 2047/tcp unknown dls 2048/tcp unknown dls-monitor 2049/tcp unknown nfs 2065/tcp unknown dlsrpn 2068/tcp unknown advocentkvm 2099/tcp unknown unknown 2100/tcp unknown unknown 2103/tcp unknown zephyr-clt 2105/tcp unknown eklogin 2106/tcp unknown ekshell 2107/tcp unknown unknown 2111/tcp unknown kx 2119/tcp unknown unknown 2121/tcp unknown ccproxy-ftp 2126/tcp unknown unknown 2135/tcp unknown unknown 2144/tcp unknown unknown 2160/tcp unknown unknown 2161/tcp unknown apc-agent 2170/tcp unknown unknown 2179/tcp unknown unknown 2190/tcp unknown unknown 2191/tcp unknown unknown 2196/tcp unknown unknown 2200/tcp unknown unknown 2222/tcp unknown unknown 2251/tcp unknown unknown 2260/tcp unknown unknown 2288/tcp unknown unknown 2301/tcp unknown compaqdiag 2323/tcp unknown unknown 2366/tcp unknown unknown 2381/tcp unknown unknown 2382/tcp unknown unknown 2383/tcp unknown ms-olap4 2393/tcp unknown unknown 2394/tcp unknown unknown 2399/tcp unknown unknown 2401/tcp unknown cvspserver 2492/tcp unknown unknown 2500/tcp unknown rtsserv 2522/tcp unknown unknown 2525/tcp unknown unknown 2557/tcp unknown unknown 2601/tcp unknown zebra 2602/tcp unknown ripd 2604/tcp unknown ospfd 2605/tcp unknown bgpd 2607/tcp unknown unknown 2608/tcp unknown unknown 2638/tcp unknown sybase 2701/tcp unknown sms-rcinfo 2702/tcp unknown sms-xfer 2710/tcp unknown unknown 2717/tcp unknown unknown 2718/tcp unknown unknown 2725/tcp unknown unknown 2800/tcp unknown unknown 2809/tcp unknown corbaloc 2811/tcp unknown unknown 2869/tcp unknown unknown 2875/tcp unknown unknown 2909/tcp unknown unknown 2910/tcp unknown unknown 2920/tcp unknown unknown 2967/tcp unknown symantec-av 2968/tcp unknown unknown 2998/tcp unknown iss-realsec 3000/tcp unknown ppp 3001/tcp unknown nessus 3003/tcp unknown unknown 3005/tcp unknown deslogin 3006/tcp unknown deslogind 3007/tcp unknown unknown 3011/tcp unknown unknown 3013/tcp unknown unknown 3017/tcp unknown unknown 3030/tcp unknown unknown 3031/tcp unknown unknown 3050/tcp unknown unknown 3052/tcp unknown powerchute 3071/tcp unknown unknown 3077/tcp unknown unknown 3128/tcp unknown squid-http 3168/tcp unknown unknown 3211/tcp unknown unknown 3221/tcp unknown unknown 3260/tcp unknown iscsi 3261/tcp unknown unknown 3268/tcp unknown globalcatLDAP 3269/tcp unknown globalcatLDAPssl 3283/tcp unknown netassistant 3300/tcp unknown unknown 3301/tcp unknown unknown 3306/tcp unknown mysql 3322/tcp unknown unknown 3323/tcp unknown unknown 3324/tcp unknown unknown 3325/tcp unknown unknown 3333/tcp unknown dec-notes 3351/tcp unknown unknown 3367/tcp unknown unknown 3369/tcp unknown unknown 3370/tcp unknown unknown 3371/tcp unknown unknown 3372/tcp unknown msdtc 3389/tcp unknown ms-term-serv 3390/tcp unknown unknown 3404/tcp unknown unknown 3476/tcp unknown unknown 3493/tcp unknown unknown 3517/tcp unknown unknown 3527/tcp unknown unknown 3546/tcp unknown unknown 3551/tcp unknown unknown 3580/tcp unknown unknown 3659/tcp unknown unknown 3689/tcp unknown rendezvous 3690/tcp unknown svn 3703/tcp unknown unknown 3737/tcp unknown unknown 3766/tcp unknown unknown 3784/tcp unknown unknown 3800/tcp unknown unknown 3801/tcp unknown unknown 3809/tcp unknown unknown 3814/tcp unknown unknown 3826/tcp unknown unknown 3827/tcp unknown unknown 3828/tcp unknown unknown 3851/tcp unknown unknown 3869/tcp unknown unknown 3871/tcp unknown unknown 3878/tcp unknown unknown 3880/tcp unknown unknown 3889/tcp unknown unknown 3905/tcp unknown mupdate 3914/tcp unknown unknown 3918/tcp unknown unknown 3920/tcp unknown unknown 3945/tcp unknown unknown 3971/tcp unknown unknown 3986/tcp unknown mapper-ws_ethd 3995/tcp unknown unknown 3998/tcp unknown unknown 4000/tcp unknown remoteanything 4001/tcp unknown unknown 4002/tcp unknown mlchat-proxy 4003/tcp unknown unknown 4004/tcp unknown unknown 4005/tcp unknown unknown 4006/tcp unknown unknown 4045/tcp unknown lockd 4111/tcp unknown unknown 4125/tcp unknown rww 4126/tcp unknown unknown 4129/tcp unknown unknown 4224/tcp unknown xtell 4242/tcp unknown unknown 4279/tcp unknown unknown 4321/tcp unknown rwhois 4343/tcp unknown unicall 4443/tcp unknown pharos 4444/tcp unknown krb524 4445/tcp unknown unknown 4446/tcp unknown unknown 4449/tcp unknown unknown 4550/tcp unknown unknown 4567/tcp unknown unknown 4662/tcp unknown edonkey 4848/tcp unknown unknown 4899/tcp unknown radmin 4900/tcp unknown unknown 4998/tcp unknown maybe-veritas 5000/tcp unknown upnp 5001/tcp unknown commplex-link 5002/tcp unknown rfe 5003/tcp unknown filemaker 5004/tcp unknown unknown 5009/tcp unknown airport-admin 5030/tcp unknown unknown 5033/tcp unknown unknown 5050/tcp unknown mmcc 5051/tcp unknown ida-agent 5054/tcp unknown unknown 5060/tcp unknown sip 5061/tcp unknown sip-tls 5080/tcp unknown unknown 5087/tcp unknown unknown 5100/tcp unknown admd 5101/tcp unknown admdog 5102/tcp unknown admeng 5120/tcp unknown unknown 5190/tcp unknown aol 5200/tcp unknown unknown 5214/tcp unknown unknown 5221/tcp unknown unknown 5222/tcp unknown unknown 5225/tcp unknown unknown 5226/tcp unknown unknown 5269/tcp unknown unknown 5280/tcp unknown unknown 5298/tcp unknown unknown 5357/tcp unknown unknown 5405/tcp unknown pcduo 5414/tcp unknown unknown 5431/tcp unknown park-agent 5432/tcp unknown postgresql 5440/tcp unknown unknown 5500/tcp unknown hotline 5510/tcp unknown secureidprop 5544/tcp unknown unknown 5550/tcp unknown sdadmind 5555/tcp unknown freeciv 5560/tcp unknown isqlplus 5566/tcp unknown unknown 5631/tcp unknown pcanywheredata 5633/tcp unknown unknown 5666/tcp unknown nrpe 5678/tcp unknown unknown 5679/tcp unknown activesync 5718/tcp unknown unknown 5730/tcp unknown unknown 5800/tcp unknown vnc-http 5801/tcp unknown vnc-http-1 5802/tcp unknown vnc-http-2 5810/tcp unknown unknown 5811/tcp unknown unknown 5815/tcp unknown unknown 5822/tcp unknown unknown 5825/tcp unknown unknown 5850/tcp unknown unknown 5859/tcp unknown unknown 5862/tcp unknown unknown 5877/tcp unknown unknown 5900/tcp unknown vnc 5901/tcp unknown vnc-1 5902/tcp unknown vnc-2 5903/tcp unknown vnc-3 5904/tcp unknown unknown 5906/tcp unknown unknown 5907/tcp unknown unknown 5910/tcp unknown unknown 5911/tcp unknown unknown 5915/tcp unknown unknown 5922/tcp unknown unknown 5925/tcp unknown unknown 5950/tcp unknown unknown 5952/tcp unknown unknown 5959/tcp unknown unknown 5960/tcp unknown unknown 5961/tcp unknown unknown 5962/tcp unknown unknown 5963/tcp unknown unknown 5987/tcp unknown unknown 5988/tcp unknown unknown 5989/tcp unknown unknown 5998/tcp unknown ncd-diag 5999/tcp unknown ncd-conf 6000/tcp unknown X11 6001/tcp unknown X11:1 6002/tcp unknown X11:2 6003/tcp unknown X11:3 6004/tcp unknown X11:4 6005/tcp unknown X11:5 6006/tcp unknown X11:6 6007/tcp unknown X11:7 6009/tcp unknown X11:9 6025/tcp unknown unknown 6059/tcp unknown X11:59 6100/tcp unknown unknown 6101/tcp unknown backupexec 6106/tcp unknown isdninfo 6112/tcp unknown dtspc 6123/tcp unknown unknown 6129/tcp unknown unknown 6156/tcp unknown unknown 6346/tcp unknown gnutella 6389/tcp unknown unknown 6502/tcp unknown netop-rc 6510/tcp unknown unknown 6543/tcp unknown mythtv 6547/tcp unknown powerchuteplus 6565/tcp unknown unknown 6566/tcp unknown unknown 6567/tcp unknown unknown 6580/tcp unknown unknown 6646/tcp unknown unknown 6666/tcp unknown irc 6667/tcp unknown irc 6668/tcp unknown irc 6669/tcp unknown irc 6689/tcp unknown unknown 6692/tcp unknown unknown 6699/tcp unknown napster 6779/tcp unknown unknown 6788/tcp unknown unknown 6789/tcp unknown ibm-db2-admin 6792/tcp unknown unknown 6839/tcp unknown unknown 6881/tcp unknown bittorrent-tracker 6901/tcp unknown unknown 6969/tcp unknown acmsoda 7000/tcp unknown afs3-fileserver 7001/tcp unknown afs3-callback 7002/tcp unknown afs3-prserver 7004/tcp unknown afs3-kaserver 7007/tcp unknown afs3-bos 7019/tcp unknown unknown 7025/tcp unknown unknown 7070/tcp unknown realserver 7100/tcp unknown font-service 7103/tcp unknown unknown 7106/tcp unknown unknown 7200/tcp unknown fodms 7201/tcp unknown dlip 7402/tcp unknown unknown 7435/tcp unknown unknown 7443/tcp unknown unknown 7496/tcp unknown unknown 7512/tcp unknown unknown 7625/tcp unknown unknown 7627/tcp unknown unknown 7676/tcp unknown unknown 7741/tcp unknown unknown 7777/tcp unknown unknown 7778/tcp unknown unknown 7800/tcp unknown unknown 7911/tcp unknown unknown 7920/tcp unknown unknown 7921/tcp unknown unknown 7937/tcp unknown nsrexecd 7938/tcp unknown lgtomapper 7999/tcp unknown unknown 8000/tcp unknown http-alt 8001/tcp unknown unknown 8002/tcp unknown teradataordbms 8007/tcp unknown ajp12 8008/tcp unknown http 8009/tcp unknown ajp13 8010/tcp unknown xmpp 8011/tcp unknown unknown 8021/tcp unknown ftp-proxy 8022/tcp unknown unknown 8031/tcp unknown unknown 8042/tcp unknown unknown 8045/tcp unknown unknown 8080/tcp unknown http-proxy 8081/tcp unknown blackice-icecap 8082/tcp unknown blackice-alerts 8083/tcp unknown unknown 8084/tcp unknown unknown 8085/tcp unknown unknown 8086/tcp unknown unknown 8087/tcp unknown unknown 8088/tcp unknown unknown 8089/tcp unknown unknown 8090/tcp unknown unknown 8093/tcp unknown unknown 8099/tcp unknown unknown 8100/tcp unknown unknown 8180/tcp unknown unknown 8181/tcp unknown unknown 8192/tcp unknown sophos 8193/tcp unknown sophos 8194/tcp unknown sophos 8200/tcp unknown unknown 8222/tcp unknown unknown 8254/tcp unknown unknown 8290/tcp unknown unknown 8291/tcp unknown unknown 8292/tcp unknown unknown 8300/tcp unknown unknown 8333/tcp unknown unknown 8383/tcp unknown unknown 8400/tcp unknown unknown 8402/tcp unknown unknown 8443/tcp unknown https-alt 8500/tcp unknown unknown 8600/tcp unknown unknown 8649/tcp unknown unknown 8651/tcp unknown unknown 8652/tcp unknown unknown 8654/tcp unknown unknown 8701/tcp unknown unknown 8800/tcp unknown unknown 8873/tcp unknown unknown 8888/tcp unknown sun-answerbook 8899/tcp unknown unknown 8994/tcp unknown unknown 9000/tcp unknown cslistener 9001/tcp unknown tor-orport 9002/tcp unknown unknown 9003/tcp unknown unknown 9009/tcp unknown unknown 9010/tcp unknown unknown 9011/tcp unknown unknown 9040/tcp unknown tor-trans 9050/tcp unknown tor-socks 9071/tcp unknown unknown 9080/tcp unknown unknown 9081/tcp unknown unknown 9090/tcp unknown zeus-admin 9091/tcp unknown unknown 9099/tcp unknown unknown 9100/tcp unknown jetdirect 9101/tcp unknown jetdirect 9102/tcp unknown jetdirect 9103/tcp unknown jetdirect 9110/tcp unknown unknown 9111/tcp unknown DragonIDSConsole 9200/tcp unknown wap-wsp 9207/tcp unknown unknown 9220/tcp unknown unknown 9290/tcp unknown unknown 9415/tcp unknown unknown 9418/tcp unknown git 9485/tcp unknown unknown 9500/tcp unknown unknown 9502/tcp unknown unknown 9503/tcp unknown unknown 9535/tcp unknown man 9575/tcp unknown unknown 9593/tcp unknown unknown 9594/tcp unknown msgsys 9595/tcp unknown pds 9618/tcp unknown unknown 9666/tcp unknown unknown 9876/tcp unknown sd 9877/tcp unknown unknown 9878/tcp unknown unknown 9898/tcp unknown unknown 9900/tcp unknown iua 9917/tcp unknown unknown 9943/tcp unknown unknown 9944/tcp unknown unknown 9968/tcp unknown unknown 9998/tcp unknown unknown 9999/tcp unknown abyss 10000/tcp unknown snet-sensor-mgmt 10001/tcp unknown unknown 10002/tcp unknown unknown 10003/tcp unknown unknown 10004/tcp unknown unknown 10009/tcp unknown unknown 10010/tcp unknown unknown 10012/tcp unknown unknown 10024/tcp unknown unknown 10025/tcp unknown unknown 10082/tcp unknown amandaidx 10180/tcp unknown unknown 10215/tcp unknown unknown 10243/tcp unknown unknown 10566/tcp unknown unknown 10616/tcp unknown unknown 10617/tcp unknown unknown 10621/tcp unknown unknown 10626/tcp unknown unknown 10628/tcp unknown unknown 10629/tcp unknown unknown 10778/tcp unknown unknown 11110/tcp unknown unknown 11111/tcp unknown unknown 11967/tcp unknown unknown 12000/tcp unknown cce4x 12174/tcp unknown unknown 12265/tcp unknown unknown 12345/tcp unknown netbus 13456/tcp unknown unknown 13722/tcp unknown netbackup 13782/tcp unknown netbackup 13783/tcp unknown netbackup 14000/tcp unknown unknown 14238/tcp unknown unknown 14441/tcp unknown unknown 14442/tcp unknown unknown 15000/tcp unknown hydap 15002/tcp unknown unknown 15003/tcp unknown unknown 15004/tcp unknown unknown 15660/tcp unknown unknown 15742/tcp unknown unknown 16000/tcp unknown unknown 16001/tcp unknown unknown 16012/tcp unknown unknown 16016/tcp unknown unknown 16018/tcp unknown unknown 16080/tcp unknown osxwebadmin 16113/tcp unknown unknown 16992/tcp unknown unknown 16993/tcp unknown unknown 17877/tcp unknown unknown 17988/tcp unknown unknown 18040/tcp unknown unknown 18101/tcp unknown unknown 18988/tcp unknown unknown 19101/tcp unknown unknown 19283/tcp unknown unknown 19315/tcp unknown unknown 19350/tcp unknown unknown 19780/tcp unknown unknown 19801/tcp unknown unknown 19842/tcp unknown unknown 20000/tcp unknown unknown 20005/tcp unknown btx 20031/tcp unknown unknown 20221/tcp unknown unknown 20222/tcp unknown unknown 20828/tcp unknown unknown 21571/tcp unknown unknown 22939/tcp unknown unknown 23502/tcp unknown unknown 24444/tcp unknown unknown 24800/tcp unknown unknown 25734/tcp unknown unknown 25735/tcp unknown unknown 26214/tcp unknown unknown 27000/tcp unknown flexlm0 27352/tcp unknown unknown 27353/tcp unknown unknown 27355/tcp unknown unknown 27356/tcp unknown unknown 27715/tcp unknown unknown 28201/tcp unknown unknown 30000/tcp unknown unknown 30718/tcp unknown unknown 30951/tcp unknown unknown 31038/tcp unknown unknown 31337/tcp unknown Elite 32768/tcp unknown unknown 32769/tcp unknown unknown 32770/tcp unknown sometimes-rpc3 32771/tcp unknown sometimes-rpc5 32772/tcp unknown sometimes-rpc7 32773/tcp unknown sometimes-rpc9 32774/tcp unknown sometimes-rpc11 32775/tcp unknown sometimes-rpc13 32776/tcp unknown sometimes-rpc15 32777/tcp unknown sometimes-rpc17 32778/tcp unknown sometimes-rpc19 32779/tcp unknown sometimes-rpc21 32780/tcp unknown sometimes-rpc23 32781/tcp unknown unknown 32782/tcp unknown unknown 32783/tcp unknown unknown 32784/tcp unknown unknown 32785/tcp unknown unknown 33354/tcp unknown unknown 33899/tcp unknown unknown 34571/tcp unknown unknown 34572/tcp unknown unknown 34573/tcp unknown unknown 35500/tcp unknown unknown 38292/tcp unknown landesk-cba 40193/tcp unknown unknown 40911/tcp unknown unknown 41511/tcp unknown unknown 42510/tcp unknown unknown 44176/tcp unknown unknown 44442/tcp unknown coldfusion-auth 44443/tcp unknown coldfusion-auth 44501/tcp unknown unknown 45100/tcp unknown unknown 48080/tcp unknown unknown 49152/tcp unknown unknown 49153/tcp unknown unknown 49154/tcp unknown unknown 49155/tcp unknown unknown 49156/tcp unknown unknown 49157/tcp unknown unknown 49158/tcp unknown unknown 49159/tcp unknown unknown 49160/tcp unknown unknown 49161/tcp unknown unknown 49163/tcp unknown unknown 49165/tcp unknown unknown 49167/tcp unknown unknown 49175/tcp unknown unknown 49176/tcp unknown unknown 49400/tcp unknown compaqdiag 49999/tcp unknown unknown 50000/tcp unknown iiimsf 50001/tcp unknown unknown 50002/tcp unknown iiimsf 50003/tcp unknown unknown 50006/tcp unknown unknown 50300/tcp unknown unknown 50389/tcp unknown unknown 50500/tcp unknown unknown 50636/tcp unknown unknown 50800/tcp unknown unknown 51103/tcp unknown unknown 51493/tcp unknown unknown 52673/tcp unknown unknown 52822/tcp unknown unknown 52848/tcp unknown unknown 52869/tcp unknown unknown 54045/tcp unknown unknown 54328/tcp unknown unknown 55055/tcp unknown unknown 55056/tcp unknown unknown 55555/tcp unknown unknown 55600/tcp unknown unknown 56737/tcp unknown unknown 56738/tcp unknown unknown 57294/tcp unknown unknown 57797/tcp unknown unknown 58080/tcp unknown unknown 60020/tcp unknown unknown 60443/tcp unknown unknown 61532/tcp unknown unknown 61900/tcp unknown unknown 62078/tcp unknown iphone-sync 63331/tcp unknown unknown 64623/tcp unknown unknown 64680/tcp unknown unknown 65000/tcp unknown unknown 65129/tcp unknown unknown 65389/tcp unknown unknown Nmap scan report for 172.30.0.5 [host down] Nmap scan report for 172.30.0.6 [host down] Nmap scan report for 172.30.0.7 [host down] Nmap scan report for 172.30.0.10 [host down] Nmap scan report for 172.30.0.11 [host down] Nmap scan report for 172.30.0.12 [host down] Nmap scan report for 172.30.0.13 [host down] Nmap scan report for 172.30.0.14 [host down] Nmap scan report for 172.30.0.15 [host down] Nmap scan report for 172.30.0.16 [host down] Nmap scan report for 172.30.0.17 [host down] Nmap scan report for 172.30.0.18 [host down] Nmap scan report for 172.30.0.19 [host down] Nmap scan report for 172.30.0.20 [host down] Nmap scan report for 172.30.0.21 [host down] Nmap scan report for 172.30.0.22 [host down] Nmap scan report for 172.30.0.23 [host down] Nmap scan report for 172.30.0.24 [host down] Nmap scan report for 172.30.0.25 [host down] Nmap scan report for 172.30.0.26 [host down] Nmap scan report for 172.30.0.27 [host down] Nmap scan report for 172.30.0.28 [host down] Nmap scan report for 172.30.0.29 [host down] Nmap scan report for 172.30.0.30 [host down] Nmap scan report for 172.30.0.31 [host down] Nmap scan report for 172.30.0.32 [host down] Nmap scan report for 172.30.0.33 [host down] Nmap scan report for 172.30.0.34 [host down] Nmap scan report for 172.30.0.35 [host down] Nmap scan report for 172.30.0.36 [host down] Nmap scan report for 172.30.0.37 [host down] Nmap scan report for 172.30.0.38 [host down] Nmap scan report for 172.30.0.39 [host down] Nmap scan report for 172.30.0.40 [host down] Nmap scan report for 172.30.0.41 [host down] Nmap scan report for 172.30.0.42 [host down] Nmap scan report for 172.30.0.43 [host down] Nmap scan report for 172.30.0.44 [host down] Nmap scan report for 172.30.0.45 [host down] Nmap scan report for 172.30.0.46 [host down] Nmap scan report for 172.30.0.47 [host down] Nmap scan report for 172.30.0.48 [host down] Nmap scan report for 172.30.0.49 [host down] Nmap scan report for 172.30.0.50 [host down] Nmap scan report for 172.30.0.51 [host down] Nmap scan report for 172.30.0.52 [host down] Nmap scan report for 172.30.0.53 [host down] Nmap scan report for 172.30.0.54 [host down] Nmap scan report for 172.30.0.55 [host down] Nmap scan report for 172.30.0.56 [host down] Nmap scan report for 172.30.0.57 [host down] Nmap scan report for 172.30.0.58 [host down] Nmap scan report for 172.30.0.59 [host down] Nmap scan report for 172.30.0.60 [host down] Nmap scan report for 172.30.0.61 [host down] Nmap scan report for 172.30.0.62 [host down] Nmap scan report for 172.30.0.63 [host down] Nmap scan report for 172.30.0.64 [host down] Nmap scan report for 172.30.0.65 [host down] Nmap scan report for 172.30.0.66 [host down] Nmap scan report for 172.30.0.67 [host down] Nmap scan report for 172.30.0.68 [host down] Nmap scan report for 172.30.0.69 [host down] Nmap scan report for 172.30.0.70 [host down] Nmap scan report for 172.30.0.71 [host down] Nmap scan report for 172.30.0.72 [host down] Nmap scan report for 172.30.0.73 [host down] Nmap scan report for 172.30.0.74 [host down] Nmap scan report for 172.30.0.75 [host down] Nmap scan report for 172.30.0.76 [host down] Nmap scan report for 172.30.0.77 [host down] Nmap scan report for 172.30.0.78 [host down] Nmap scan report for 172.30.0.79 [host down] Nmap scan report for 172.30.0.80 [host down] Nmap scan report for 172.30.0.81 [host down] Nmap scan report for 172.30.0.82 [host down] Nmap scan report for 172.30.0.83 [host down] Nmap scan report for 172.30.0.84 [host down] Nmap scan report for 172.30.0.85 [host down] Nmap scan report for 172.30.0.86 [host down] Nmap scan report for 172.30.0.87 [host down] Nmap scan report for 172.30.0.88 [host down] Nmap scan report for 172.30.0.89 [host down] Nmap scan report for 172.30.0.90 [host down] Nmap scan report for 172.30.0.91 [host down] Nmap scan report for 172.30.0.92 [host down] Nmap scan report for 172.30.0.93 [host down] Nmap scan report for 172.30.0.94 [host down] Nmap scan report for 172.30.0.95 [host down] Nmap scan report for 172.30.0.96 [host down] Nmap scan report for 172.30.0.97 [host down] Nmap scan report for 172.30.0.98 [host down] Nmap scan report for 172.30.0.99 [host down] Nmap scan report for 172.30.0.100 [host down] Nmap scan report for 172.30.0.101 [host down] Nmap scan report for 172.30.0.102 [host down] Nmap scan report for 172.30.0.103 [host down] Nmap scan report for 172.30.0.104 [host down] Nmap scan report for 172.30.0.105 [host down] Nmap scan report for 172.30.0.106 [host down] Nmap scan report for 172.30.0.107 [host down] Nmap scan report for 172.30.0.108 [host down] Nmap scan report for 172.30.0.109 [host down] Nmap scan report for 172.30.0.110 [host down] Nmap scan report for 172.30.0.111 [host down] Nmap scan report for 172.30.0.112 [host down] Nmap scan report for 172.30.0.113 [host down] Nmap scan report for 172.30.0.114 [host down] Nmap scan report for 172.30.0.115 [host down] Nmap scan report for 172.30.0.116 [host down] Nmap scan report for 172.30.0.117 [host down] Nmap scan report for 172.30.0.118 [host down] Nmap scan report for 172.30.0.119 [host down] Nmap scan report for 172.30.0.120 [host down] Nmap scan report for 172.30.0.121 [host down] Nmap scan report for 172.30.0.122 [host down] Nmap scan report for 172.30.0.123 [host down] Nmap scan report for 172.30.0.124 [host down] Nmap scan report for 172.30.0.125 [host down] Nmap scan report for 172.30.0.126 [host down] Nmap scan report for 172.30.0.127 [host down] Nmap scan report for 172.30.0.128 [host down] Nmap scan report for 172.30.0.129 [host down] Nmap scan report for 172.30.0.130 [host down] Nmap scan report for 172.30.0.131 [host down] Nmap scan report for 172.30.0.132 [host down] Nmap scan report for 172.30.0.133 [host down] Nmap scan report for 172.30.0.134 [host down] Nmap scan report for 172.30.0.135 [host down] Nmap scan report for 172.30.0.136 [host down] Nmap scan report for 172.30.0.137 [host down] Nmap scan report for 172.30.0.138 [host down] Nmap scan report for 172.30.0.139 [host down] Nmap scan report for 172.30.0.140 [host down] Nmap scan report for 172.30.0.141 [host down] Nmap scan report for 172.30.0.142 [host down] Nmap scan report for 172.30.0.143 [host down] Nmap scan report for 172.30.0.144 [host down] Nmap scan report for 172.30.0.145 [host down] Nmap scan report for 172.30.0.146 [host down] Nmap scan report for 172.30.0.147 [host down] Nmap scan report for 172.30.0.148 [host down] Nmap scan report for 172.30.0.149 [host down] Nmap scan report for 172.30.0.150 [host down] Nmap scan report for 172.30.0.151 [host down] Nmap scan report for 172.30.0.152 [host down] Nmap scan report for 172.30.0.153 [host down] Nmap scan report for 172.30.0.154 [host down] Nmap scan report for 172.30.0.155 [host down] Nmap scan report for 172.30.0.156 [host down] Nmap scan report for 172.30.0.157 [host down] Nmap scan report for 172.30.0.158 [host down] Nmap scan report for 172.30.0.159 [host down] Nmap scan report for 172.30.0.160 [host down] Nmap scan report for 172.30.0.161 [host down] Nmap scan report for 172.30.0.162 [host down] Nmap scan report for 172.30.0.163 [host down] Nmap scan report for 172.30.0.164 [host down] Nmap scan report for 172.30.0.165 [host down] Nmap scan report for 172.30.0.166 [host down] Nmap scan report for 172.30.0.167 [host down] Nmap scan report for 172.30.0.168 [host down] Nmap scan report for 172.30.0.169 [host down] Nmap scan report for 172.30.0.170 [host down] Nmap scan report for 172.30.0.171 [host down] Nmap scan report for 172.30.0.172 [host down] Nmap scan report for 172.30.0.173 [host down] Nmap scan report for 172.30.0.174 [host down] Nmap scan report for 172.30.0.175 [host down] Nmap scan report for 172.30.0.176 [host down] Nmap scan report for 172.30.0.177 [host down] Nmap scan report for 172.30.0.178 [host down] Nmap scan report for 172.30.0.179 [host down] Nmap scan report for 172.30.0.180 [host down] Nmap scan report for 172.30.0.181 [host down] Nmap scan report for 172.30.0.182 [host down] Nmap scan report for 172.30.0.183 [host down] Nmap scan report for 172.30.0.184 [host down] Nmap scan report for 172.30.0.185 [host down] Nmap scan report for 172.30.0.186 [host down] Nmap scan report for 172.30.0.187 [host down] Nmap scan report for 172.30.0.188 [host down] Nmap scan report for 172.30.0.189 [host down] Nmap scan report for 172.30.0.190 [host down] Nmap scan report for 172.30.0.191 [host down] Nmap scan report for 172.30.0.192 [host down] Nmap scan report for 172.30.0.193 [host down] Nmap scan report for 172.30.0.194 [host down] Nmap scan report for 172.30.0.195 [host down] Nmap scan report for 172.30.0.196 [host down] Nmap scan report for 172.30.0.197 [host down] Nmap scan report for 172.30.0.198 [host down] Nmap scan report for 172.30.0.199 [host down] Nmap scan report for 172.30.0.201 [host down] Nmap scan report for 172.30.0.202 [host down] Nmap scan report for 172.30.0.203 [host down] Nmap scan report for 172.30.0.204 [host down] Nmap scan report for 172.30.0.205 [host down] Nmap scan report for 172.30.0.206 [host down] Nmap scan report for 172.30.0.207 [host down] Nmap scan report for 172.30.0.208 [host down] Nmap scan report for 172.30.0.209 [host down] Nmap scan report for 172.30.0.210 [host down] Nmap scan report for 172.30.0.211 [host down] Nmap scan report for 172.30.0.212 [host down] Nmap scan report for 172.30.0.213 [host down] Nmap scan report for 172.30.0.214 [host down] Nmap scan report for 172.30.0.215 [host down] Nmap scan report for 172.30.0.216 [host down] Nmap scan report for 172.30.0.217 [host down] Nmap scan report for 172.30.0.218 [host down] Nmap scan report for 172.30.0.219 [host down] Nmap scan report for 172.30.0.220 [host down] Nmap scan report for 172.30.0.221 [host down] Nmap scan report for 172.30.0.222 [host down] Nmap scan report for 172.30.0.223 [host down] Nmap scan report for 172.30.0.224 [host down] Nmap scan report for 172.30.0.225 [host down] Nmap scan report for 172.30.0.226 [host down] Nmap scan report for 172.30.0.227 [host down] Nmap scan report for 172.30.0.228 [host down] Nmap scan report for 172.30.0.229 [host down] Nmap scan report for 172.30.0.230 [host down] Nmap scan report for 172.30.0.231 [host down] Nmap scan report for 172.30.0.232 [host down] Nmap scan report for 172.30.0.233 [host down] Nmap scan report for 172.30.0.234 [host down] Nmap scan report for 172.30.0.235 [host down] Nmap scan report for 172.30.0.236 [host down] Nmap scan report for 172.30.0.237 [host down] Nmap scan report for 172.30.0.238 [host down] Nmap scan report for 172.30.0.239 [host down] Nmap scan report for 172.30.0.240 [host down] Nmap scan report for 172.30.0.241 [host down] Nmap scan report for 172.30.0.242 [host down] Nmap scan report for 172.30.0.243 [host down] Nmap scan report for 172.30.0.244 [host down] Nmap scan report for 172.30.0.245 [host down] Nmap scan report for 172.30.0.246 [host down] Nmap scan report for 172.30.0.247 [host down] Nmap scan report for 172.30.0.248 [host down] Nmap scan report for 172.30.0.249 [host down] Nmap scan report for 172.30.0.250 [host down] Nmap scan report for 172.30.0.251 [host down] Nmap scan report for 172.30.0.252 [host down] Nmap scan report for 172.30.0.253 [host down] Nmap scan report for 172.30.0.254 [host down] Nmap scan report for 172.30.0.255 [host down] Initiating SYN Stealth Scan at 18:08 Scanning 4 hosts [1000 ports/host] Discovered open port 3306/tcp on 172.30.0.4 Discovered open port 445/tcp on 172.30.0.8 Discovered open port 443/tcp on 172.30.0.4 Discovered open port 21/tcp on 172.30.0.8 Discovered open port 21/tcp on 172.30.0.4 Discovered open port 111/tcp on 172.30.0.200 Discovered open port 1025/tcp on 172.30.0.8 Discovered open port 3389/tcp on 172.30.0.8 Discovered open port 80/tcp on 172.30.0.4 Discovered open port 23/tcp on 172.30.0.200 Discovered open port 135/tcp on 172.30.0.8 Discovered open port 22/tcp on 172.30.0.9 Discovered open port 22/tcp on 172.30.0.200 Discovered open port 22/tcp on 172.30.0.4 Discovered open port 8000/tcp on 172.30.0.8 Discovered open port 8089/tcp on 172.30.0.8 Completed SYN Stealth Scan against 172.30.0.8 in 0.97s (3 hosts left) Completed SYN Stealth Scan against 172.30.0.9 in 0.97s (2 hosts left) Completed SYN Stealth Scan against 172.30.0.4 in 1.00s (1 host left) Completed SYN Stealth Scan at 18:08, 1.00s elapsed (4000 total ports) Initiating Service scan at 18:08 Scanning 16 services on 4 hosts Completed Service scan at 18:09, 24.70s elapsed (16 services on 4 hosts) Initiating RPCGrind Scan against 172.30.0.200 at 18:09 Completed RPCGrind Scan against 172.30.0.200 at 18:09, 0.00s elapsed (1 port) Initiating OS detection (try #1) against 4 hosts Retrying OS detection (try #2) against 2 hosts NSE: Script scanning 4 hosts. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 18:09 Completed NSE at 18:09, 22.22s elapsed NSE: Script Scanning completed. Nmap scan report for 172.30.0.4 Host is up (0.00028s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.3d 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu7 (protocol 2.0) | ssh-hostkey: 1024 3a:ae:68:d5:9c:2d:85:13:e0:91:68:19:fc:1c:0b:24 (DSA) |_2048 b7:c1:b8:89:20:ed:f5:24:4a:db:c9:c1:bb:b8:4d:f0 (RSA) 80/tcp open http Apache httpd 2.2.17 ((Unix) DAV/2 mod_ssl/2.2.17 OpenSSL/1.0.0c PHP/5.3.5 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1) |_http-favicon: Unknown favicon MD5: 6EB4A43CB64C97F76562AF703893C8FD | html-title: Object not found! |_Requested resource was http://172.30.0.4/xampp/ 443/tcp open ssl/http Apache httpd 2.2.17 ((Unix) DAV/2 mod_ssl/2.2.17 OpenSSL/1.0.0c PHP/5.3.5 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1) |_sslv2: server still supports SSLv2 | html-title: Object not found! |_Requested resource was https://172.30.0.4:443/xampp/ |_http-favicon: Unknown favicon MD5: 6EB4A43CB64C97F76562AF703893C8FD 3306/tcp open mysql MySQL (unauthorized) MAC Address: B6:E7:FE:D6:AD:17 (Unknown) Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.17 2.6.31 Uptime guess: 0.029 days (since Sun Feb 23 17:28:36 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=195 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OSs: Unix, Linux HOP RTT ADDRESS 1 0.28 ms 172.30.0.4 Nmap scan report for 172.30.0.8 Host is up (0.72s latency). Not shown: 993 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp FileZilla ftpd 0.9.39 beta 135/tcp open msrpc Microsoft Windows RPC 445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds 1025/tcp open msrpc Microsoft Windows RPC 3389/tcp open microsoft-rdp Microsoft Terminal Service 8000/tcp open http CherryPy httpd 3.1.2 | html-title: Site doesnt have a title (text/html;charset=utf-8). |_Requested resource was http://172.30.0.8:8000/en-US/ 8089/tcp open ssl/http Splunkd httpd |_sslv2: server still supports SSLv2 |_html-title: Site doesnt have a title (text/html; charset=utf-8). MAC Address: 72:88:A0:27:02:40 (Unknown) Device type: general purpose|media device|PDA Running (JUST GUESSING) : Microsoft Windows 2003|2000|XP|PocketPC/CE (98%), ATT Windows PocketPC/CE (91%), Motorola Windows PocketPC/CE (91%), Swisscom embedded (91%), T-Home embedded (91%), Microsoft embedded (90%), Fujitsu Siemens Windows PocketPC/CE (89%) Aggressive OS guesses: Microsoft Windows Server 2003 SP2 (98%), Microsoft Windows Server 2003 SP1 or SP2 (96%), Microsoft Windows Server 2003 SP1 (96%), Microsoft Windows 2000 or Server 2003 SP1 (95%), Microsoft Windows Server 2003 R2 SP1 (94%), Microsoft Windows XP SP3 (92%), Microsoft Windows Server 2003 SP0 (92%), ATT U-Verse or Motorola VIP1200-series digital set top box (Windows CE 5.0) (91%), Swisscom BlueWin TV set top box (91%), T-Home X 300T or X301T Media Receiver set top box (91%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop TCP Sequence Prediction: Difficulty=239 (Good luck!) IP ID Sequence Generation: Incremental Service Info: OS: Windows Host script results: |_smbv2-enabled: Server doesnt support SMBv2 protocol | smb-os-discovery: | OS: Windows Server 2003 3790 Service Pack 2 (Windows Server 2003 5.2) | Name: WORKGROUP\BASE-LAB-TG01 |_ System time: 2014-02-23 18:09:27 UTC-8 HOP RTT ADDRESS 1 722.00 ms 172.30.0.8 Nmap scan report for 172.30.0.9 Host is up (0.00040s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu7 (protocol 2.0) | ssh-hostkey: 1024 3a:ae:68:d5:9c:2d:85:13:e0:91:68:19:fc:1c:0b:24 (DSA) |_2048 b7:c1:b8:89:20:ed:f5:24:4a:db:c9:c1:bb:b8:4d:f0 (RSA) MAC Address: 8A:FB:B6:B9:25:47 (Unknown) Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.17 2.6.31 Uptime guess: 0.027 days (since Sun Feb 23 17:30:49 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=199 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux HOP RTT ADDRESS 1 0.40 ms 172.30.0.9 Nmap scan report for 172.30.0.200 Host is up (0.67s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.5p1 Debian 6 (protocol 2.0) | ssh-hostkey: 1024 59:1d:a5:df:cd:1f:af:5c:85:c4:93:55:de:da:4f:c3 (DSA) |_2048 8d:be:1c:cd:be:bd:ac:14:77:0f:c1:91:f1:2f:1b:bd (RSA) 23/tcp open telnet Linux telnetd 111/tcp open rpcbind 2 (rpc #100000) | rpcinfo: | 100000 2 111/udp rpcbind | 100024 1 53389/udp status | 100000 2 111/tcp rpcbind |_100024 1 44778/tcp status MAC Address: 4A:90:54:50:83:22 (Unknown) Device type: general purpose|WAP|webcam|broadband router|media device Running (JUST GUESSING) : Linux 2.6.X|2.4.X (97%), Gemtek embedded (93%), Siemens embedded (93%), AXIS embedded (93%), AXIS Linux 2.6.X (92%), Aastra embedded (92%), Chumby embedded (92%) Aggressive OS guesses: Linux 2.6.13 2.6.28 (97%), Linux 2.6.17 2.6.31 (96%), Linux 2.4.20 (Red Hat 7.2) (96%), Linux 2.6.22 2.6.23 (96%), Linux 2.6.23 (94%), Linux 2.6.9 2.6.28 (94%), Linux 2.6.19 2.6.31 (93%), Linux 2.6.24 2.6.31 (93%), DD-WRT v23 v24 (Linux 2.4.20 2.4.37) (93%), Linux 2.6.15 2.6.16 (93%) No exact OS matches for host (test conditions non-ideal). Uptime guess: 0.028 days (since Sun Feb 23 17:29:21 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=196 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux HOP RTT ADDRESS 1 671.35 ms 172.30.0.200 Read data files from: C:\Program Files\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 256 IP addresses (6 hosts up) scanned in 88.47 seconds Raw packets sent: 5709 (258.470KB) | Rcvd: 5173 (214.506KB)

Wednesday, November 27, 2019

The Best Last-Minute SAT Study Tips

After weeks and weeks of studying, the SAT is finally here. The long nights and weekends you spent working with tutors, studying on your own, and convincing your parents that you’ve done your SAT prep homework are coming to an end (hopefully). And while the New SAThas made waves throughout the college admissions world, the foundation is still the same: a long exam. With the test creeping up quickly, what can you do to prepare during the few days leading up to the test? Sleep. Yes, seriously. You might think that studying a ton and staying up late will help you learn more, but that’s not always the case. By sleeping and getting more rest, you’re allowing your body to recover from the mental stimulation you go through on a daily basis. Surprisingly, you’ll learn better and retain more information by resting. While cramming the night before might help some students, it’s not the best strategy. Eat healthy meals. And I’m not talking about a Chewy bar for breakfast on the morning of the test. Waking up 30 minutes earlier so you can get a solid breakfast in can help give you the energy to last the full length of the exam. The SAT isn’t short, especially considering you’re sitting at a desk, straining your brain for a few hours at a time. Move it (and a bonus tip). Studies show a bunch of helpful information. And in this case, getting up and moving around while studying can actually help you digest the information more. Studying for math today at your desk? Study math tomorrow at the kitchen table. And the next day at Starbucks. Even if you’re sitting on the toilet, a new environment will force your body to focus on the information and not rely on your surroundings for clues. *Bonus: Sitting in the same seat everyday in class can actually help you retain information. If you sit in the back row during Econ every single time, make sure to sit in that same seat while you take exams. Studies actually have shown that you’ll remember more if you’re accustomed to what’s around you. See that crack on the wall? You might have been looking at it when the teacher was explaining supply and demand. Even a small glance during your exam might help you remember. *Extra Bonus: Don’t study in bed. Your brain naturally associates bed with sleep, so you’ll probably wind up tired, not focused, or possibly passed out, drooling on your notebook. Yes, I know I said you should sleep - but probably not best in the middle of a study session. Study Confidently. It’s normal to focus on the things you’re not so great at. But don’t neglect your strengths. Sometimes, studying what you’re good at can build positive momentum and can help you feel good about the material you’re not so great at. And while you still might get questions wrong, you’ll simply feel better about yourself, and will be more willing to put in the effort to get the questions right. So what’s next? Focus on the SAT now. Next, you can come up with your list of colleges and focus on where you want to go. If you haven’t yet, you can use ’s search to find students with similar grades and test scores as you to find out where they applied and were accepted.

Saturday, November 23, 2019

The American Colonies and the Fight for Freedom essays

The American Colonies and the Fight for Freedom essays The American Revolution was a fight between the American colonies and the British Empire that had been brewing for years. Before I begin to discuss certain key elements that jump-started this war, I must discuss what took place beforehand in the New World that set the stage for the Revolution. A war had already been fault on the North American Continent, in which British blood was already spilled. The French and Indian War, which lasted from 1650 to 1763. During this time the British crown was occupied to say the least and the newly formed colonies were neglected and free to rule over themselves, relatively speaking. The colonies began to practice their own forms of law, and government for that matter, in which gave them their own unique sense of identity. The early Americans established representative legislatures and democratic town hall meetings. They also utilized local judiciaries and trials where defendants were presumed innocent until proven guilty. They began independently shipping their goods apart from the British Empire, also giving them a sense of worth and uniqueness. The promise of expansion to settlers and land ownership gave them a true sense of freedom. This would all come to an abrupt halt after the French and Indian war, in which the British Empire's influence would directly affect the colonies in more ways than one. The French and Indian War drained a significant amount of finances from the British Empire, so in turn, the Crown began creating new ways to generate revenue. They burdened the American colonies with hefty taxes and imposed strict regulations. The British Empire imposed that their currency would be used, and forbade the use of any local printed currency known as the Currency Act. The Currency Act was introduced in the French and Indian War, mainly to dry up French currency, and Indian trade. The Stamp Act was also imposed to enforce a tax on all printed material, to include currency. This way the...

Thursday, November 21, 2019

Recession Essay Example | Topics and Well Written Essays - 500 words

Recession - Essay Example Inflation is the general rise in the prices of goods and services over a certain period of time. Higher rates of inflation lead to smaller percentages of goods and services that can be purchased with same amount of money. Inflation occurs due to reasons like varied increment in cost production, national debts, and high energy costs (Knoop 69). During inflation periods, people cut out leisure spending, the overall spending and begin saving more than before. As individuals and businesses curtail expenditures, the GDP declines. Unemployment rates, on the other hand, rise as companies lay off employees to cut costs (Knoop 99). These combinations of factors cause the economy to fall into recession. In the last few years, the US have been in a recession. The issue was experienced in 2008 after the irrational exuberance in the housing market had directed most people to purchase houses they could not afford. This happened because everyone thought the prices of housing were likely to increase. Unfortunately, the bubble busted in 2006 as the housing prices started coming down (Knoop 104). The shock caught many homeowners who had taken loans with little money to purchase houses unaware. After realizing they were likely to experience losses by selling houses for less than their mortgage, they foreclosed. The shoot up foreclosure rate made most banks and hedge funds to panic. Consequently, those who had bought mortgage-backed securities on the secondary market began realizing they were facing massive losses. Banks began fearing to lend each other by 2007 due to the urge to evade the toxic loans as collateral. What followed was the $700 billion bail out and high unemployment rate in 20 08. The economic stimulus plan was launched in 2009 by the US government to spend $185 billion (Knoop 213). It led to alteration of four quarter decline in GDP by Q3 in the same year hence ending the recession. However, high unemployment rates persisted up to 2011