{"id":328,"date":"2023-11-02T19:59:13","date_gmt":"2023-11-02T19:59:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/?p=328"},"modified":"2023-11-02T19:59:13","modified_gmt":"2023-11-02T19:59:13","slug":"journal-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/2023\/11\/02\/journal-8\/","title":{"rendered":"Journal 8"},"content":{"rendered":"\n<p>The media most certainly influences a layperson\u2019s mindset about how hacking attempts are operated. It\u2019s much in the same way that it influences our mindset about how law enforcement or military operations are performed. There is generally some kernel of truth or fact that the story starts off with. Usually though because of time or to add a dramatic flare that piques the viewers interest the abilities, tools, timeframe, and scale are enhanced or blown way out of proportion. If it was all a factual documentary, the movies we watch probably wouldn\u2019t be very interesting and we\u2019d change to another show. These inaccuracies or dramatizations are either by choice or out of what is probably a lack of knowledge. For example, when the ip address goes beyond 255 it might be because the writers don\u2019t know that ip addresses do that. It could also be like when phone numbers used to be written down, they all started with 555. In this case it was to prevent real numbers from being displayed and the following harassment of viewers. All in all the media is most certainly a dramatized fictional influence on how hacking operations are performed either for entertainment value or possibly safety.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The media most certainly influences a layperson\u2019s mindset about how hacking attempts are operated. It\u2019s much in the same way that it influences our mindset about how law enforcement or military operations are performed. There is generally some kernel of truth or fact that the story starts off with. Usually though because of time or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/2023\/11\/02\/journal-8\/\">Read More<\/a><\/div>\n","protected":false},"author":25223,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/posts\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/users\/25223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/posts\/328\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}