{"id":329,"date":"2025-03-02T21:24:13","date_gmt":"2025-03-02T21:24:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=329"},"modified":"2025-03-02T21:26:55","modified_gmt":"2025-03-02T21:26:55","slug":"homework-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/02\/homework-3\/","title":{"rendered":"Homework 3"},"content":{"rendered":"\n<p><strong>Listen to \u201cEpisode #53: Shadow Brokers\u201d of the DarkNet Diaries podcast which can be found at\u00a0<a href=\"https:\/\/darknetdiaries.com\/episode\/53\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/darknetdiaries.com\/episode\/53\/<\/a><\/strong><\/p>\n\n\n\n<p><strong>&nbsp;Based on the podcast, answer the following questions.<\/strong><\/p>\n\n\n\n<p><strong>Short Answer Questions\u00a0<\/strong>(short answers should generally be at least three to four sentences in length. However, it is important to be as concise as possible when responding.) or<strong>\u00a0<\/strong>you may choose to<strong>\u00a0Upload a Two-Minute Audio or Video recording\u00a0<\/strong>to<strong>\u00a0<\/strong>answer the following questions.\u00a0<\/p>\n\n\n\n<ol>\n<li> The Shadow Brokers are believed to be affiliated with which country,<br>and what do we know about their origins and allegiances?<br>The Shadow Brokers are affiliated with Russia.<\/li>\n\n\n\n<li> The Shadow Brokers declared their allegiance to which President of the<br>United States, and what implications did this decision have?<br>The Shadow Brokers declared their allegiance to Donald Trump. In my opinion, like<br>what was said in the Podcast with the timing of the info dumps and the news of Russian<br>Hacking the implications are that maybe Shadow Brokers was probably involved with<br>hacking in the 2016 election. The reason why I think those are implications is because<br>since they declared allegiance to Donald Trump, they would hack into the election to help<br>him win.<br>3.  Once the Shadow Brokers group stole NSA hacking tools, what did<br>they attempt to do with stolen tools, and should we have questions about<br>the security of government networks and the safety of confidential data?<br>When the Shadow Brokers stole the NSA hacking tools, they attempted to auction off the<br>hacking tools they had stolen. In my opinion, I believe that we should have questions<br>about the security of government networks and the safety of confidential data. The reason<br>we should have questions is because, since the Shadow Brokers managed to steal NSA<br>hacking tools, what would stop hackers from stealing even more confidential data like military<br>secrets, classified documents, or critical infrastructure. It also raises concerns about<br>whether government networks would be secure enough if something like this happens<br>again, and the steps the government is taking to address issues with the security of<br>government networks<br>4. What are the main differences between a PowerShell variable and<br>a constant?<br>The main differences between a PowerShell variable and a constant are that a<br>Powershell variables can be changed, and the constants can\u2019t be changed<br>5. What Compare the System File Checker tool to the File Signature<br>Verification tool (Sigverif). What are the benefits of having both of<br>these tools available within PowerShell?<br>The system file checker tool makes sure that documents have integrity and replaces<br>damaged files. The file signature verification tool makes sure that the files have a signature.<br>The benefits of having these tools within PowerShell are that it can make sure that there<br>isn\u2019t any issue with the files in your computer.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Listen to \u201cEpisode #53: Shadow Brokers\u201d of the DarkNet Diaries podcast which can be found at\u00a0https:\/\/darknetdiaries.com\/episode\/53\/ &nbsp;Based on the podcast, answer the following questions. Short Answer Questions\u00a0(short answers should generally be at least three to four sentences in length. However, it is important to be as concise as possible when responding.) or\u00a0you may choose to\u00a0Upload &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/02\/homework-3\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":8},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/329"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/329\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/329\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}