Friday, February 21, 2020

The Divine Command Theory Essay Example | Topics and Well Written Essays - 500 words

The Divine Command Theory - Essay Example The stronger version holds that moral behavior is good in itself, as such, we should live in a particular manner since God wills it. Similar to the weakest version, this entails the only religious believers need to concern themselves with moral accountability. The strongest version asserts that moral behavior is good because it is willed by God. ("Faithnet") The divine command theory is said to have been disproved by the Euthyphro dilemma, dubbed after Plato's dialogue, which goes: "Are morally good acts willed by God because they are morally good, or are they morally good because they are willed by God" ("Philosophy of Religion") If one accepts the first argument that morally good acts are willed by God because they are morally good, the independence problem arises. This means that the argument itself is inconsistent with the theory since moral value becomes independent of God's will. ("Philosophy of Religion") On the other hand, should one hold the second argument that morally good acts become such because they are willed by God, then problems pertaining to arbitrariness, emptiness, and repugnant commands are contended with? The arbitrariness problem stems from the argument that the divine command theory seems to attribute morality only on God's whims.  Ã‚  

Wednesday, February 5, 2020

Security in Wireless LAN Essay Example | Topics and Well Written Essays - 3000 words

Security in Wireless LAN - Essay Example are some of the well known access points. Antenna: It determines the reach of the WLAN. It is basically a transceiver i.e. receiving as well as transmitting the signals. Antenna takes directions from the wireless network interface card of the computer. Laptop/ Desktop systems: Since WLAN is basically designed for mobility, therefore Laptop happens to be the best companion to work with the help of network. The laptop must be having a wireless network interface PCMCIA card for WLAN compatible. Wireless network interface cards work with a 48-bit MAC address associated with them. This address is completely unique to each card. Security settings: For a low end access point, security is generally limited to using WEP encryption technique and MAC address filters. MAC address filtering is used to limit the number of hardware components that can access the wireless network. For a higher end transmitter, like used for a corporate set-up Temporal Key Integrity Protocol (TKIP) is used. This offers better security than WEP. TKIP offers new encryption algorithms every now and then, and keeps changing the encryption keys making it more difficult for a network hacker to sniff them.