Preview

A Rhetorical Analysis Of Cyanogen Mod

Satisfactory Essays
Open Document
Open Document
143 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Rhetorical Analysis Of Cyanogen Mod
Rhetorical Strategies

Narration
The narration is the act of explaining or telling something.

In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers

You May Also Find These Documents Helpful

  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Case study 1

    • 466 Words
    • 2 Pages

    The blackberry controversy is prominent in Asia, particularly in the Middle East, and not anywhere else in the world because of the instability of the region, government corruption, and restricted freedoms. The governments in the Middle East are under threat and need all of the information on potential terrorist plots so they can get to protect their sovereignty. In order to protect the people, or to maintain a dictatorial grip on the power they wield, they suppressed freedoms for the populace. Also because of the different laws and attitudes towards privacy and human rights along with the differing degrees in the capabilities of governments to crack encryption; finally because of the domestic and regional political instability along with the occurrence of certain incidents that highlighted the security threats posed and the RIM’s secrecy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    and should not be labeled. Throughout the article Hemphill and Syagnik explain that the FDA is…

    • 1448 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Given the definition and description of rhetoric in Chapter 1, George Kennedy’s idea that the yellow pages of a phone book are more rhetorical than the white pages could be supported in a number of ways. As the yellow pages contain ads, one may argue that they are planned, adapted to audience, build community, etc.…

    • 1730 Words
    • 7 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Good Essays

    In America, the number one cause of death is heart disease, coming shortly after is diabetes and obesity (World Health Organization, 2014). Most of the population of America knows that there are health concerns that continue to increase as generations progress. The current average body weight and sizes for males and females in the U.S. have drastically increased compared to what they were 50 years ago. Currently, the average size for women’s clothing in the U.S. is between a size 12 and 16. For men it is a size 44 (Striegel-Moore, 2002).…

    • 1597 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <http://www.infoworld.com/d/mobile-technology/clear-eyed-guide-androids-actual-security-risks-232034>.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Prosecution Vs. Defense

    • 316 Words
    • 2 Pages

    Within the walls of any courtroom exemplified is the adversarial system of the United States of America between prosecutors and attorneys. In a logical sense, both roles and responsibilities are somewhat similar but contrasting.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Byod Pro's and Con's

    • 2327 Words
    • 10 Pages

    Messmer, Ellen. "BYOD-resistance Loosening but Security Practices Lacking."Consumerization of IT, BYOD. N.p., 25 Oct. 2012. Web. 09 Dec. 2012.…

    • 2327 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    There are many roles in the courtroom that each person plays and each role has its benefit for the criminal justice system as a whole. It is understandable that each role plays a part in the sentencing with the hope that justice is being served but with much intentions and seen all too well that everyone is not satisfied with the sentencing phase and may feel that justice has not been served and some may feel that it has. In the courtroom the roles of each person happens to be a part of case and the prosecutor, defense attorney, criminal, and victim all play a role. There are others that are a part of the role…

    • 1100 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Over the last decade, electronic-based companies such as Samsung and Apple have collaborated with cellular-phone carriers, and have studied the average consumer to find endless ways to improve the cellular phone. As a result, the smart phone was born. With their ability to provide users with instant access to communication, entertainment, Internet access, calendar, news, social media, and much more, the smart phone revolutionized and shifted the path of modern technology. In 2006, Apple began this revolution with their release of the iPhone. Being the first proper smart phone, many other companies attempted to mimic the unbeatable features and technology that Apple had included with the iPhone. Though many had failed in doing so, Google managed to keep up with the iPhone with their Android software. Soon enough, Google’s Android software became the dominant smart phone based software for smart phones not manufactured by Apple. Because of this, Android phones had become just as popular as iPhones. This paper will explore the similarities and differences between both Apple’s iPhone and Google’s Android.…

    • 775 Words
    • 4 Pages
    Good Essays