Premium Essay

The Lee Virus: A Short Story

Submitted By
Words 771
Pages 4
In 2045 some of mankind will be extinct due to the Lee Virus that will change mankind into zombies. Doctor Lee Phillips has been trying to create a virus for years to have control and power over people. After all these years of testing his experiment, he finally succeeded. Now it is up to me to put an end to him and his virus and save humanity.
Around 10:45 a.m. I was in military training as a secret assassin. As we were going through drills, all the sirens in the city of New York were going off. My military sergeant had received a call saying there has been an outbreak and people are turning into cannibals. As we were going to get our weapons, ten out of 50 people fell out at once. Some of our trainers went to check on them; they began …show more content…
However, we were walking and ran up on more zombies, but we quietly ducked behind the cars; it was noticed the zombies were under some type of mind control. Although we ducked behind the cars; it was noticed the zombies sniffed us out and I opened fire. My sergeant and I started running to the alley. When I looked back, we were cornered and the zombies pointed to the door. It was like they were trying to show us or lead us to something. When I opened the door, the tracker started going off; I knew then we were in the right …show more content…
Lee, the one and only doctor that will take over the world; and have mind control over the zombies. The only way my virus will be stopped is if you kill me!” Then we heard a man scream as he was eaten alive by Dr. Lee. I ran as fast as I could up the stairs to destroy him. I ran into his trap. Dr. Lee came out of nowhere and said, “John, I have been waiting on you.” I was confused because I was trying to figure out how did he know me. Then I asked, “How do you know me?” He replied, “Remember when you were five years old and you fell into the pond and drowned?” “It was me and my virus that saved you!” Doctor Lee then told me “You’re my masterpiece, just with one drop of your blood, my virus will be

Similar Documents

Free Essay

Recent Cyber-Attack and Mitigation Techniques

...Recent cyber-attack and mitigation techniques ISSC 361 American Public University System April 9, 2016 Computer-based attacks have been going on the around the world. Individuals or governments hacking into individuals or rival governments systems. Private corporations are hacking each other in the quest of power. They have been several recent computer-based attacks that every information security expert should be aware of. This short paper will discuss one of these recent attacks, which provoked a collective blackout, the Cyber-Attack Against Ukrainian Critical Infrastructure and present an overview of some mitigation techniques. The Cyber-Attack Against Ukrainian Critical Infrastructure was conducted using a malware called BlackEnergy. This attack targeted six Ukrainian energy organizations was perpetrated by attacker from outside the organizations. This attack has had effect on about 225000 customers of Ukrainian regional electric power distribution companies (Lee 2016). The intruders organized the attack by conducting a recognition of the network of the victim. The attacks took place with an interval of 30 minutes from each other affecting many central and regional installations (Vicinanzo 2016). The attackers, controlled the breakers from distance by using distance control administration tools already in place on the operating system or “distance industrial control system (ICS) client software through virtual private network (VPN)” after gaining rightful access to...

Words: 893 - Pages: 4

Premium Essay

Pearls Before H1N1

...• ^ International Committee on onomy of Viruses. "The Universal Virus Database, version 4: Influenza A". http://www.ncbi.nlm.nih.gov/ICTVdb/ICTVdB/00.046.0.01.htm. [dead link] 1. ^ a b c d e f "Swine influenza". The Merck Veterinary Manual. 2008. ISBN 1442167424. http://www.merckvetmanual.com/mvm/index.jsp?cfile=htm/bc/121407.htm. Retrieved April 30, 2009. 2. ^ [1][dead link] 3. ^ Heinen PP (15 September 2003). "Swine influenza: a zoonosis". Veterinary Sciences Tomorrow. ISSN 1569-0830. http://www.vetscite.org/publish/articles/000041/print.html. "Influenza B and C viruses are almost exclusively isolated from man, although influenza C virus has also been isolated from pigs and influenza B has recently been isolated from seals." 4. ^ Bouvier NM, Palese P (September 2008). "THE BIOLOGY OF INFLUENZA VIRUSES". Vaccine 26 Suppl 4 (Suppl 4): D49–53. doi:10.1016/j.vaccine.2008.07.039. PMC 3074182. PMID 19230160. http://www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pmcentrez&artid=3074182. 5. ^ Kimura H, Abiko C, Peng G et al. (April 1997). "Interspecies transmission of influenza C virus between humans and pigs". Virus Research 48 (1): 71–9. doi:10.1016/S0168-1702(96)01427-X. PMID 9140195. 6. ^ a b Matsuzaki Y, Sugawara K, Mizuta K et al. (February 2002). "Antigenic and Genetic Characterization of Influenza C Viruses Which Caused Two Outbreaks in Yamagata City, Japan, in 1996 and 1998". Journal of Clinical Microbiology 40 (2): 422–9. doi:10.1128/JCM.40.2.422-429...

Words: 8637 - Pages: 35

Free Essay

Coconutoil

...Organic Virgin Coconut Oil - A Healthy Oil The Coconut Oil Story Virgin Coconut Oil: An introduction For about 3960 years of the of the past 4000 years of the documented historical use of the fruits of the coconut palm as a food and a pharmaceutical, the news has all been good. It was seen as a sustainable resource from which the harvested materials influenced every aspect of the lives of tropical communities, but most importantly its fruit, the coconut flesh, water, milk and oil. The use of coconut oil around the world in tropical regions is prolific: South and Central America, Africa, the Indian subcontinent, Micro-, Mele- and Poly-nesia and most of Asia. The uses are so respected that they were documented by Ayurvedic medicine in Sanskrit from 1500BC in all areas relating to the mind, body and spirit. Early European explorers including Captain Cook wrote affectionately about the beauty of communities across the Pacific using coconut oil as an integral part of their daily lives. During WWII the water of the young green coconut was successfully used as a substitute for a saline drip saving the lives of many allied soldiers. After the war, in England coconut oil was sold as "margarine" and in the USA as "coconut butter". However, this all changed in 1954. In the social environment of the USA in which coronary heart disease (CHD) was becoming the primary cause of mortality in the adult population, the young researcher David Kritchevsky published two academic papers. The initial...

Words: 3568 - Pages: 15

Premium Essay

Cyber Crime

...Case Studies of Cybercrime and Its Impact on Marketing Activity and Shareholder Value Katherine T. Smith Department of Marketing Texas A&M University 4112 TAMU College Station, TX 77843-4112 Tel: 979-845-1062 Fax: 979-862-2811 Email: Ksmith@mays.tamu.edu L. Murphy Smith, CPA* Mays Business School Texas A&M University 4353 TAMU College Station, TX 77843-4353 Phone: 979-845-3108 Fax: 979-845-0028 Email: Lmsmith@tamu.edu Jacob L. Smith Grace Bible Church College Station, TX 77845 JacobSmith@grace-bible.org *Corresponding author Forthcoming in Academy of Marketing Studies Journal Electronic copy available at: http://ssrn.com/abstract=1724815 CASE STUDIES OF CYBERCRIME AND ITS IMPACT ON MARKETING ACTIVITY AND SHAREHOLDER VALUE Katherine T. Smith, Texas A&M University L. Murphy Smith, Texas A&M University Jacob L. Smith, Grace Bible Church ABSTRACT Cybercrime, also called e-crime, costs publicly traded companies billions of dollars annually in stolen assets and lost business. Cybercrime can totally disrupt a company’s marketing activities. Further, when a company falls prey to cyber criminals, this may cause customers to worry about the security of their business transactions with the company. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability can lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors. This study examines...

Words: 6032 - Pages: 25

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means...

Words: 2041 - Pages: 9

Premium Essay

Male Nurses

...Program in Writing and Rhetoric Autumn 2005 Honorable Mention Matthew Gribble Instructor’s Foreword Movies tell us that in the wake of a murder, detectives would stretch what appear to be pipe cleaners, or a very taut yarn, through the bullet holes left in walls, in lamps, in the hollow doors of haunted rooms. The yarn was there to demonstrate the location of the shooter – or indeed, shooters – relative to the victim. But the fact is that other forces might have conspired in the murder. (Poison may have been used; bullets may have been fired only as an afterthought; perhaps they were fired by the victim himself, before he died . . .) Yarn can tell us the story only in certain circumstances. As a researcher and a writer, Matthew Gribble analyzes his crime scene with diligence and care. The crisis: The shortage of nurses in America. The question: How and why did this shortage become a persistent problem? Matthew affixes strings of yarn to a number of gunshots: the increasing average age of the workforce, long hours, work that is often menial or clerical, and finally, relatively low salaries. But these strands lead to new questions, wider causes which have nothing to do with social yarn. These new questions have to do with rhetoric and the enduring association of nursing with “women’s work” and “femininity.” Matthew has the audacity to ask how the rhetoric of femininity actually functions. How and why are we compelled to accept images and tropes as ‘normal’ or ‘natural’ when...

Words: 6796 - Pages: 28

Free Essay

Ideavirus

...Unleashing the Ideavirus 1 www.ideavirus.com Unleashing the Ideavirus By Seth Godin Foreword by Malcolm Gladwell ©2000 by Do You Zoom, Inc. You have permission to post this, email this, print this and pass it along for free to anyone you like, as long as you make no changes or edits to its contents or digital format. In fact, I’d love it if you’d make lots and lots of copies. The right to bind this and sell it as a book, however, is strictly reserved. While we’re at it, I’d like to keep the movie rights too. Unless you can get Paul Newman to play me. Ideavirus™ is a trademark of Do You Zoom, Inc. So is ideavirus.com™. Designed by Red Maxwell You can find this entire manifesto, along with slides and notes and other good stuff, at www.ideavirus.com. This version of the manifesto is current until August 17, 2000. After that date, please go to www.ideavirus.com and get an updated version. You can buy this in book form on September 1, 2000. This book is dedicated to Alan Webber and Jerry Colonna. Of course. Unleashing the Ideavirus 2 www.ideavirus.com STEAL THIS IDEA! Here’s what you can do to spread the word about Unleashing the Ideavirus: 1. Send this file to a friend (it’s sort of big, so ask first). 2. Send them a link to www.ideavirus.com so they can download it themselves. 3. Visit www.fastcompany.com/ideavirus to read the Fast Company article. 4. Buy a copy of the hardcover book at www.amazon.com/exec/obidos/ASIN/0970309902/permissionmarket. 5...

Words: 52238 - Pages: 209

Free Essay

Blah

...Fun Facts: Little brother is MBLAQ’s Thunder Debuted as an actress in the Philippines before joining 2NE1 Can speak Tagalog and English Used to live in the Philippines She’s really good in math and physics She trained for three years before debuting with 2NE1 The other members believe she is the best in variety shows She likes to wear jeans and t-shirts She always text people because she thinks it awkward if she calls them She likes to steal others phones and put her photo as their background CL (씨엘) Real Name: Lee Chae Rin (이채린) Born: February 26, 1991 162CM (5 Feet 3 Inches) 45KG (99 Pounds) Blood Type: A Position: Leader, Main Rapper, Lead Vocalist Me2Day Instagram Fun Facts: Can speak French, Japanese and English Used to live in France Revealed in an interview that she used to wear a boy school uniform to school sense they didn’t have pants for girls Her father is a professor of Physics and an author of a children’s book story...

Words: 5998 - Pages: 24

Free Essay

An Overview of Computer Viruses in a Research Environment

...various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example believing that conventional security mechanisms can prevent virus infections, or are flawed because they cannot. But computer viruses use a number of well-known techniques in an unusual order; they do not employ previously-unknown methods. So, although existing computer security mechanisms were not designed specifically to counter computer viruses, many of those mechanisms were designed to deal...

Words: 12539 - Pages: 51

Free Essay

Will Smith

...United States. Not since the discovery of fire has the world been so captivated, not since the invention of the wheel has the world seen such success, and not since the days of the bible has the world experienced such perfection. “…Jesus has gone away to heaven, and some day, just as He went, He will return!” (Acts 1:10-11, TLB). These words insight hope, hope that maybe after 2000 years the savior has finally returned in the form of a fine piece of chocolate, better known as Will Smith. If not the messiah, it is safe to conclude that God had created Will for a much more important reason than is even possible to conceive by any living being. His rise to fame, compelling, his music, timeless, his movies, groundbreaking, and his life, nothing short of amazing. Follow as you are taken from West Philadelphia all the way to the very pinnacle of stardom. In West Philadelphia born and raised, on the playground is where he spent most of his days, just chillin’ out, maxin’, relaxin’ all cool, and all shootin’ some b-ball outside of the school, the legend starts with the planet earth receiving the gift of Willard Christopher “Will” Smith Jr. on September 25th, 1968. Born to the modest Caroline, a simple Philadelphia School Board Worker, and to a refrigeration engineer, Willard Christopher Smith Sr. By the age of thirteen, his parents,...

Words: 2108 - Pages: 9

Premium Essay

Disciplining the Body

...ARTICLES Sociology o Sport Journal, 1998, 15, 1-20 f O 1998 Human Kinetics Publishers, Inc. "Disciplining the Body": HIV-Positive Male Athletes, Media Surveillance,and the Policing of Sexuality Shari Lee Dworkin and Faye Linda Wachs University of Southern California This paper analyzes how mainstream print media polices sexuality through framings of HIV-positive male athletes. We analyze the HN-positive announcements of Magic Johnson, Greg Louganis, and Tommy Morrison. Specifically, we discuss differences between the framing of gay men (Louganis) and self-identifiedheterosexual men (Johnson and Morrison). First, there is an extensive search for the ways Magic Johnson and Tommy Morrison contracted HIVIAIDS. Media coverage emphasizes that "straights can get it too" through promiscuity and a "fast lane" lifestyle. Consistent with the historically automatic conflation of HIVIAIDS with gay identity, the media pose no inquiries into the cause of Louganis' HIV transmission. We close our discussion by focusing on the meaning of extending the signifier of HIVIAIDS beyond gay bodies to include working class and black male bodies. Media surveillance of sexual identity and the body reinforces hegemonic masculinity in sport while feeding into the current sexual hierarchy in U.S. culture. Cette Ctude porte sur la f a ~ o n les mCdias Ccrits surveillent et contr6lent la sexualit6 par dont le biais de leur traitement des athlktes masculins skro-positifs.Nous analysons les annonces de skro-positivitk...

Words: 10069 - Pages: 41

Premium Essay

Consumption and the Beat Generation

...[pic][pic] [pic]Copyright © 2005 West Chester University. All rights reserved. College Literature 32.2 (2005) 103-126 [pic] |  |[pic][pic][pic] |  | | |[pic] | | | |[pic] | | | |[pic] | | | |[pic] | | | |[pic] | | | | | | | | | | | | | | | | | | | |Access provided by Northwestern University Library ...

Words: 36700 - Pages: 147

Premium Essay

Horror Themes

...gore, torture, vicious animals, monsters, zombies, cannibals, and serial killers. Conversely, movies about the supernatural are not necessarily always horrific.[2] Contents [hide] 1 History 1.1 1890s–1920s 1.2 1930s–1940s 1.3 1950s–1960s 1.4 1970s–1980s 1.5 1990s 1.6 2000s 2 Sub-genres 3 Influences 3.1 Influences on society 3.2 Influences internationally 4 See also 5 References 6 Further reading 7 External links [edit]History [edit]1890s–1920s See also: List of horror films of the 1890s, List of horror films of the 1900s, List of horror films of the 1910s, and List of horror films of the 1920s Lon Chaney, Sr. in The Phantom of the Opera The first depictions of supernatural events appear in several of the silent shorts created by the film pioneer Georges Méliès in the late 1890s, the best known being Le Manoir du diable, which is sometimes credited as being the first horror film.[3] Another of his horror projects was 1898's La Caverne maudite (aka, The Cave of the Unholy One, literally "the accursed cave").[3] Japan made early forays into the horror genre with Bake Jizo and Shinin no Sosei, both made in...

Words: 4774 - Pages: 20

Free Essay

Swamsung

...An Analysis of Sources of Risk in the Consumer Electronics Industry ManMohan S. Sodhi Cass Business School Seongha Lee Samsung Forthcoming, JORS (2007) ABSTRACT: The consumer electronics industry is a $ 240 billion global industry with a small number of highly competitive global players. We describe many of the risks associated with any global supply chain in this industry. As illustration, we also list steps that Samsung Electronics and its subsidiary, Samsung Electronics UK, have taken to mitigate these risks. Our description of the risks and illustration of mitigation efforts provides the backdrop to identify areas of future research. INTRODUCTION In supply chain management, there is much discussion on risks related to such aspects of supply chains as short product lifecycles, keen competition combined with cooperation, and globalization. The consumer electronics industry is the very embodiment of these aspects of supply chain management and related risks. While some of the supply- and demand-related risks are similar to such industries as the toy industry (Johnson 2001), the consumer electronics industry faces additional risks due to its vertically integrated supply chains. This article seeks to provide a starting point for understanding supply chain risk in this industry through examples from this industry as well as related ones like computers and mobile phones. To illustrate the mitigation of these risks, we list steps that Samsung Electronics and its subsidiary...

Words: 7689 - Pages: 31

Premium Essay

Internet Ages

...CHAPTER – 1 INTRODUCTION TO INTERNET WHAT IS A NETWORK? [pic] A network is a group of computers that are able to communicate with one another and share data, files, programs, and operations. The computers in a network are connected via hardware and software. The hardware is what physically connects the computers in the network together. For example: telephone lines, fibre-optic cables, routers and gateways, and the computers themselves. The software is what enables us to use the hardware for communication and exchanging information. Just as your brain tells your body parts how to function and work together, the software governs the way computers in the network communicate with each other and perform functions. Software that enables networking follows a set of rules that are generally referred to as protocol. Networks can be interoperable. This means that different types of computers, using different operating systems, can be connected, communicate with each other, and share information - as long as they follow the network protocols. [pic] In Summary: A network is a group of two or more computers, connected together through a physical infrastructure, that are able to communicate and exchange information because they agree to use software that observes the same set of rules, or protocol. WHAT IS THE INTERNET? • A network of networks • Based on TCP/IP (Transmission Control Protocol/Internet Protocol) • Global • A variety of services and...

Words: 48401 - Pages: 194