30/7/19 PFW601-Manual Reflections.

During this lesson we covered planning of the manual and task analysis.

Before writing a manual, we need to think about things like who it’s for and why we are writing it, as this will inform how the manual is written, what language is used and what tone is conveyed by the writing. On top of this, it is important to know the topic well before we start writing, as we need to be able to effectively write about a topic to be able to continue the process of drafting the manual.

I have also completed a task analysis:

Who? People who play video games, generally 18 to 30 year old males. I also believe that younger players may require parental figures to explain the manual to them. As there is a large increase in the popularity of Dungeons and Dragons, the game which inspired my game, I may need to think about players new to this type of game.

Why? Text-based games are complex and have rules that are difficult to understand, therefore it would be handy to have a guide that players could refer to, in order to find out information about the game, without having to display this information in the game.

What? The manual should include steps on how the game should function. The manual should provide a reference for players, so they can easily find out how to perform their desired action. The manual should provide extended information about the game, to allow the user to find information without it having to be displayed in the game.

Where? It will be used within people’s homes.

When? The manual will be used before game-play to help the user understand how to play the game. It will also be used during game-play as a reference for the user.

How? The user will refer to the manual as a reference during game-play.

I believe that the task analysis was a good use of my time, as it allowed me to better visualize both the purpose and the stakeholders of my manual. I used the information gained from this process to alter my draft manual appropriately.

SEC602-Social Engineering

To day in class we experiences some social engineering in the form of reconnaissance. By using a fake website call MyBook to explore the profile of a user called Phillip Nomad we gathered information which could possibly used in a Social Engineering attack.

One of the first pieces of information we found was that Phillip is a ‘Front End Software Engineer’ this information allows us understand what sort of information we can get from exploring Phillips MyBook page.

Some of the major pieces of information that we found on this his page real to his relation ships, for example we can see which of his friends comment on his photos this allows us to workout who Phillip is currently closes with. By knowing who he is close with we can investigate them or use knowledge of them as part of the attack.

We also find out information which could be used as starting points for additional research. I have already mention how looking into Phillips friends could provide more information by things like how his card is broken down or where he went too school could allow us to gain more information on Phillip.

Some information we find out could be used to impersonate Phillip such as his date of birth and phone number, this information could be used to provide away to trick some security checks that companies might use. Later on we find out about Phillips interest which could be used to help us bypass his security questions or password.

In summery we found a large amount of information which would allow us to impersonate Phillip and possibly gain access to restricted parts of his work space.

Using any social media site creates a centralized place in which someone can find information about you, kind of like a Wikipedia page for non-famous people. By having people be able to view all of your personal information in one place it becomes easy for someone to find out a lot of information about you. To most people information that can be found on social media by it only take three pieces of information to track someone down and with enough information someone could pretend to be you.

There was enough information to attack the business in several ways. One of the ways which would be the most effective would be to try and gain access to the companies system by gain access to Phillips log in information. This could be done by calling the technique support of the company and trying using the information found to pretend to be Philip or to try a hack into his account. This information could also be used to either send an email to Phillip or to send an email posing as Phillip and having the email send contain malware.

SDV602-Class 2

This blog is made based on the 25/7/2019 SDV602 class.

To day we learn about basic functions of unity such as cameras, seances, materials and plains. These term aren’t similar to other that I have used with other programing ‘systems’ so they are important to know to properly use unity. With these features I could create a basic 3D environment.

Scenes are any specific scene in a game in which objects are placed, multiple cameras may be placed to make a scene to look like multiple scenes. This could be useful as it would allow us to reuses the same area with the same objects, this could come in handy if I chooses to make a 3D game which has multiple events taken place in the same area.

A plain is a solid object which other objects can’t move though. I believe that these would be useful for creating floors and platforms.

A martial is an object which can be painted on top an object to apply physics to that object. Once painting on to an object that object games the properties of that object such as the ridged martial making object react to other objects such as plains or to bounce with materials like physics.

By default the unity development tool lets the user use C# there are other option but they are becoming less common. This is good because I already have experiences in C# . I will need to take this into account as I will have to plane around the use of C#.

When the user creates a mono element unity automatically generates an area to enter information.

25/7/19 PFW601

During this Professional Writing Class, I picked a topic to write a manual on.

This is the first project that I struggled to pick a topic for. Finding a topic was difficult, as I was not allowed to create a manual which was similar to an existing one. I believe that this difficulty came from the fact that I interpreted manual as meaning any sort of guide, but I do not think this is what the tutor meant. I normally use online guides to help learn new topics, which is why the distinction between manual and guide hindered my decision making.

I also struggled finding something that was relevant to the topic restriction. The PFW601 course requires the manual to be written on a topic that is relevant to the IT sector and is an IT solution, for example, software related. I was concerned that any topic I chose would be a poor decision.

It was suggested that I create a manual for something that I have created previously during this course, which doesn’t work as I haven’t completed anything complex enough to require a manual.

As I was struggling to find a solution, I decided to create a manual for something which I am currently creating in another class.

I feel choosing a game that doesn’t exist could create some issues, as I don’t have a completed project to look over. I need to choose a topic for my project as soon as possible. I feel that the previously mentioned problems will be easy to solve, as I will be planning my project ahead of time.

Class 25

Based on the 17/6/19 Dat 602 class.

Even though it’s possible to connect a database directly with the program. This is not recommended because I can create additional connect and compleicate the code. Other programer might find it hard to understand our coded if we use this method.

For our project we will use data bindings. Any object using Ilists in .net will be able to use databinding. Only one datasource for binding object.

We will create our own connections as .Net is not completely compatible with mySQL.

We need to create our own list from our datasource as they wont bind properly, as the datasource doesn’t return the correct information.

We must clear a datasousre before we call it.

Class 17

Basie on the dat602 5/06/19 class.

Read umcommited means that if a query is reading data while another querry is changing the data, this allows us to avoid blocking.

Read commited allows the proceess to be blocked if another funtion is editing it.

Repeated read reads a funtion from when the select statement is run regardless of what the program is doing.

Selrialable means that the everything including select statement will corse the data they are working with to become locked.

In an uncommit means that we are seeing the data even though they are not commited yet so if they user doesn;t commit it the data we have read will be wrong.

Seliablizable will effect performances.

Recommended to talk about Issolation levels when we talk about ACID in our report.

Class 16?

Based on the 4/6/19 dat602 class.

Transnational sql is where any changes we make to our database will not be save until we commit the change. We started by turning auto commit of in sql.

We can use start translation to declare a part of code in which we can roll back if we wish.

Rollback can be used to undo any changes we make.

Transnational handlers can handle mistakes within sql. If the query finds an error then the program can use roll back to return to the position before changes began.

Roll back will return the database to the position before the translation happened this. THis include everything in the translation which is relevant if an error is the coarse of the rollback. If part of a translation is run and the next part coarse an error the first part is also returned to it’s original state.

Operational information is keeped out side of the database in it’s own scheme.

Atomicity is where the database will only do one thing at a tie where isolation is where the database tries to switch who is doing anyone thing at any time.

Class 14

Delete has several way it can be implemented. Such as cascade which was mentioned in a previous blog. We may set the value to null with set null. We can also validate the deletion with restrict, which prevent a row form being deleted if another thing reefers to it.

These create table statement are added to the end of the delete statement. They also must be place near the end of the table with rows we want to delete.

We may also set up similar behavior for update statements.

To be able to pass things into SQL we need a list of parameters.

A connection string is a string which tells a program to connect to a specific database.

Class 13

Based on the 28/5/19 dat602 class.

Functions can’t return values for a set. For our project we will need to find a way of working around this and tricking the program into be leaving that the the function is returning a single function.

Procedure can pretty much do anything so we don’t have to worry about this with them.

Procedure let us re use code and automate things. This will be useful in our project by allowing us to reuse parts of the program such as change a user statics or updating a pieces persecution.

Transitional squeal allows as to make a change to a database with out committing it, so we don’t have to worry about breaking the database. We must use commit to commit it and we can use rollback to go back to the prior state.

The default perameter in mySQL is IN so we must tell it that we want stuff to be passed out.

Class 12

Made based on the 27/5/19 Dat602 class.

For milestone two we need to create SQL procedures and transaction for our game.

We must research ACID which is something I have never heard of so I must study this out of class.

We must create a test base base as well as a basic test class in visual studio to test all of the database.

Part of this assessment is to create a command line method to test every part of the database.

We may change parts of our plan if we find an area of our plane doesn’t work out.

A definer gives the function the administration rights of who ever creates the function not the person running.

Invoker has the program take the priority of the person running the function.

Invoker is safer than a definer because a definer can allow anyone to alter the database even if they don’t normally have those permissions, this could be bad with something like an SQL injection attack which could coarse irreversible damage to the database.

Out allows a procedure to pass a variable similar to how you would pass a variable by Ref in visual basic.Out parameters passes things out In has thing passed to it.

A cursor will allow us to move for a set based system to a row based system.