Premium Essay

Trojan War Research Paper

Submitted By
Words 1353
Pages 6
Is the Trojan war history or a myth?
The Trojan war was a war between the Greeks (Mycenaean) and the people of Troy. The whole incident started after the Trojan Prince named Paris abducted a woman called Helen witch was the wife of Menelaus king of Sparta. When Menelaus asked to have her back the Trojans completely refused. This event led to Menelaus asking one of his brothers Agamemnon (king of Mycenae) to lead an army against the people of Troy. The war against Troy went on for nine straight years and the Greeks ravaged Troy’s surrounding cities and countryside’s. The only thing they couldn’t get in or ravage was the well fortified city or Troy which was commanded by Hector. The Greeks decided to take a different approach to infiltrate Troy’s …show more content…
The location where he was headed was the Northern Anatolia to the hill Hissarlik where homer had to be the location of Troy. Once Schliemann had started digging and excavating he realized that he was not really at the Troy’s site yet. He realized that there are “nine major occupation levels on the mound, each of which is divided into a number of sub-levels” (Bryce 184). Considering how old the site was it would be totally plausible that Troy would have been around at that time and that and battle between the Greeks and the Trojans could have happened. Another archeologist named Wilhelm Dorpfeld witch was a colleague of Schliemann discovered The Homeric Troy which is believed to be the real site of where the city of troy had once stood. In Michael Woods documentary in Search of the Trojan War he mentions that “The Homeric Troy was famous for its greats walls and towers witch had an angle to them just like Homer had described in the Iliad.” (Wood,1985) Also another archeologist called Carl Blegen had found another version/layer of troy. In Michael Woods documentary in Search of the Trojan War also says that “the layer that he had found was a rather very basic city instead of a royal one which troy is known to be.” This mainly tells us that this city that he found was post to the Trojan war. While excavating he had …show more content…
In the 13th century Troy was a very fine a gorgeous city which was rich in gold just like there trading partners which were the Mycenae (Greeks). To prove that they were actually trading partners at the time an archeologist by the name of Carl Blegan as I have mentioned above had found some very old pottery from the digging site of Troy. In Michael Woods documentary in Search of the Trojan War he mentions that “He was then able to compare the potteries between the Mycenae and the Trojans which led him to be able to prove that they really did have trade relations considering that both populations had the same types of potteries” (qtd: Wood,1985 6:23-6:37) The date of the pottery that was found dates back to hundreds of years before the Trojan war had ever happened. This proves that the Greeks did know about Troy and had contact with them. It was proved that there trading relations got suddenly stopped towards the beginning of 1250 B.C. Therefore, you could conclude that the sudden stop in trading between them would be the result of the Trojan

Similar Documents

Free Essay

Mysteries of the Trojans

...Week 4 Assignment 1: Mysteries of the Trojans Alicia Robinson HUM 110 – World Cultures I Strayer University Dr. Bull October 31, 2013 Mysteries of the Trojans In the following paper, I will attempt to explain the mysteries surrounding the lost city of Troy, the Trojan soldiers, the Trojan War and the famous story about the Trojan horse. This paper will show why I believe that sometimes myths may not be merely myths at all, but may actually have more validity to them than one may think. These so called myths should not be so easily dismissed and I will try to explain why I truly believe this. The mysteries concerning these stories are the basis of the Homeric tales, the Odysseus, and the Iliad, written by a man whom history calls Homer, but no one is even sure if this was his name or maybe even his profession. There are many theories surrounding this alone. Many claim that he was a blind man and may be a descendent of singer, story tellers. Before Homer, epic stories were memorized and then sung. These were in fact true accounts of history, not like songs that are sung today. The Homeric stories are some of the oldest written stories of all time, (dating back to around 800 B.C.E.). The Trojan War is believed, (by scholars), to have taken place between 1800 and 1300 B.C.E., but the first written accounts were not written until, some five centuries later, after the Greeks adopted the Phoenician writing system. Stories, until then, had been handed down...

Words: 1390 - Pages: 6

Premium Essay

Introduction to Cyber Crime

...CYBER CRIME IN ITS VARIOUS FORMS Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly, this advancement and globalization offers many benefits to consumers and businesses but, unfortunately it also offers plenty of opportunities to organized crime. Globalization has promoted and strengthened the economics of illegal activities; offenders have become international entrepreneurs. The Internet provides money and information to all sorts of customers and businesses. It is notably the home of virtual worlds and their economies, which have attracted many people, including criminals. The unholy...

Words: 1930 - Pages: 8

Premium Essay

Introduction to Cyber Crime

...------------------------------------------------- Amneet Bedi ------------------------------------------------- CSE-Dept, RBCENTW Hoshiarpur ------------------------------------------------- e-mail.: amneetb2@gmail.com ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. ------------------------------------------------- Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. ------------------------------------------------- Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly, this advancement and globalization offers many benefits to consumers and businesses...

Words: 1944 - Pages: 8

Free Essay

An Overview of Computer Viruses in a Research Environment

...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...

Words: 12539 - Pages: 51

Premium Essay

Greek Mythology Research Paper

...In this research paper, I will examine how Greek education, Greek lifestyles, and Roman ideologies apply to understanding the founders of our nation. To create the foundation for American democracy today, our founders utilized their knowledge of the classics to formulate ideas create and create effective communication. Starting from the as young as the age of eight, our founders began Greek classical condition in order to be able to recite pieces of work for college admission (F.1, 2). These pieces of literature included Greek works such from Isocrates, Homer, Xenophon and the Greek New Testament (F. 2). Because grammar masters focused little else besides literature, teachers “required young scholars to display their knowledge of Latin and...

Words: 866 - Pages: 4

Premium Essay

An Introduction to the Computer Security Problem

...demonstrates that misplaced confidence in the security of a system is worse than having no confidence at all in its security. Next, the essay describes four broad areas of computer misuse: (1) theft of computational resources, (2) disruption of computational services, (3) unauthorized disclosure of information in a computer, and (4) unauthorized modification of information in a computer. Classes of techniques whereby computer misuse results in the unauthorized disclosure and modification of information are then described and examples are provided. These classes are (1) human error, (2) user abuse of authority, (3) direct probing, (4) probing with malicious software, (5) direct penetration, and (6) subversion of security mechanism. The roles of Trojan horses, viruses, worms, bombs, and other kinds of malicious software are described and examples provided. In the past few decades, we have seen the implementation of myriads of computer systems of all sizes and their interconnection over computer networks. These systems handle and are required to protect credit data, justice information, computer vote tabulation, consumer billing, health data, insurance data, military and intelligence data, and computer and human communications, as well as countless other types of information. It is likely that readers of this essay have heard about some computer or network break-in at some time in the past few years. What Is There to Worry About?...

Words: 13185 - Pages: 53

Free Essay

Frrfrf

...No. 2106 February 8, 2008 Trojan Dragon: China’s Cyber Threat John J. Tkacik, Jr. America’s counterintelligence czar, Dr. Joel F. Brenner, painted an alarming picture of economic espionage in 2006, albeit in the objective tones and neutral parlance of the intelligence community. He reported to Congress that “foreign collection efforts have hurt the United States in several ways”: • Foreign technology collection efforts have “eroded the US military advantage by enabling foreign militaries to acquire sophisticated capabilities that might otherwise have taken years to develop.” • “[M]assive” industrial espionage has “undercut the US economy by making it possible for foreign firms to gain a competitive economic edge over US companies.” Dr. Brenner characterizes China as “very aggressive” in acquiring U.S. advanced technology. “The technology bleed to China, among others, is a very serious problem,” he said in March 2007, noting that “you can now, from the comfort of your own home or office, exfiltrate information electronically from somebody else’s computer around the world without the expense and risk of trying to grow a spy.” On November 15, 2007, the bipartisan, congressionally chartered U.S.–China Economic and Security Review Commission (USCC) put a finer point on it: “Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technolo- gies.” Cyberpenetration is by far China’s most effective...

Words: 8993 - Pages: 36

Premium Essay

What Are Gender Roles In The Odyssey

...any men. She makes it clear that throughout Odysseus’ journey to the underworld, he spots and gets a glimpse of different variety of women. She says that throughout the Odyssey, they do not state anything about the women’s accomplishments in their lifetime, but only about their important son's, good looks and pleasingness, and their affairs with gods. She also talks about how women are known for their action and activity towards their sons and husbands, but never for the action and deeds of their own, or how they are, nor what accomplishments they did for themselves. Helene states that it seems in the book Odyssey, the only achievements women could achieve was being pretty and attractive to they eyes of the men. She proves throughout her paper that even Homer made it sound as...

Words: 1092 - Pages: 5

Free Essay

Virus Technology

...VIRUS TECHNOLOGY   view Presentation   The term virus is as old as hills are now in the world of computer technologies. A virus basically is software that is made to run automatically usually used for destructive purpose by the computer experts. Though virus is a well known but not known well. Definition : A computer virus is a coded program that is written in Assembly or a system programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent.     In this paper we would like to throw light on some of the unturned stones of the world of virus. We would start from history of the virus i.e. who created the first virus, for what purpose and hoe it affect to the computer. Then classification of viruses by to different methods: Ø General classification of the virus. Ø Behavioral classification of the virus. We covered the topic how nowadays viruses affects to the Mobiles, how they come to the mobile. The small and most important topic that we covered is the ‘Positive Virus’. We covered how the virus actually works in the host computer along with one example as they would enlighten our knowledge about viruses, this is because we want to secure of viruses and actually need to known how are they programmed and executed automatically. We also covered some information about the most popular viruses with  some vital information i.e. how they work, how much harmful to...

Words: 5536 - Pages: 23

Premium Essay

Cybercrime

...Cybercrime: The Real Deal Reginald McInnis SEC 402 Information Warfare and Homeland Security Strayer University Spring 2012 Instructor: Professor Scott McCrea In our society there are many different way of communication around the world. With the rapid usage of the Internet and the access of personal computers, we must be aware of the global threats that await the consumer and business it we are not prepared and educated. One of the fastest crime in the United States and all over the world is cybercrime. What is exactly cybercrime? According to the book Scene of the Cybercrime author Michael Cross defines it as a broad and generic term that refers to crimes committed using computers and the Internet, and can generally be defined as a subcategory of computer crime. It can be also said that cybercrime can lead to criminal offenses committed using the internet or another computer network as a tool of the crime (Cross, 2008). According to the Computer Security Institute's Computer Crime and Security Survey for 2007, 494 computer security professionals in the United States corporations, government agencies, universities, and financial medical institutions reported that computer fraud was the greatest source of financial losses, with losses resulting from virus attacks falling into second place for the first time in seven years. In addition to this, 29 percent of the organizations suffered a computer intrusion that they reported to law enforcement (www.gocsi...

Words: 2360 - Pages: 10

Premium Essay

Cyberwarfare

..."War is no longer a lively adventure or expedition into romance,matching man to man in a test of the stout-hearted. Instead, it is aimed against the cities mankind has built. Its goal is their total destruction and devastation." - General Dwight D. Eisenhower, Edinburgh, Scotland, October 3, 1946 Discuss the key concepts and ideas of cyberwarfare INTRODUCTION Significant of Paper Methodology of Paper Cyberwar is warfare, hostile influence which is fought in cyberspace. Cyberwar is netwar by the military. It includes hackers, listeners of communications systems, van Elckradiation115 listeners and so on. Cyberwar consists of information terrorism, semantic attack, simulation warfare and Gibson warfare. Typically Cyberwar is warfare, or hostile influence between attack- and defence programs in computers, computer networks and communication systems. For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological prowess for a bloodless conquest. This picture, in which cyber war is isolated from broader conflict, operates in an altogether different realm from traditional warfare and offers a bloodless alternative to the dangers and costs of modern warfare, is attractive but unrealistic. Such a scenario is not beyond the realm of possibility, but it is unlikely. Cyber warfare will almost certainly have very real physical consequences. Computer technology differs from other...

Words: 5055 - Pages: 21

Premium Essay

Microsoft

...units of consoles and videogames to consumers to make its videogames division profitable. Second, as with most its other businesses, Microsoft hopes to attain leadership position in videogames industry. Despite the fact that videogames are a primary form of modern entertainment, hence, presents significant business opportunities, only very few vendors have had the chances of achieving dominance in the industry. Third, through Xbox, Microsoft wishes to evolve from a PC software company into a home entertainment company. The Xbox is an intermediary for Microsoft to sell its thousands of entertainment products and services through both direct and indirect methods. For Microsoft, the battle for the living room is not just a war over a console; it is a war of Microsoft’s future prosperity. The release of the Xbox involved several crucial business decisions. By analyzing this case, students have the chance to deal with issues relating to strategy development, product positioning, core competencies, and competition advantages in a realistic situation. Intended Courses and Audiences This case can with CHAPTERS 2 and 3. When analyzing this...

Words: 4155 - Pages: 17

Premium Essay

Ethical Hacking

...within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically important. One area that is very promising is penetration testing or Ethical Hacking. The purpose of this paper is to examine effective offerings within public and private sectors to prepare security professionals. These individuals must be equipped with necessary tools, knowledge, and expertise in this fast growing proactive approach to information security. Following this examination a...

Words: 6103 - Pages: 25

Free Essay

The Bloodless Battle Field

...The Bloodless Battlefield: Cyber-War Vernon Pratt HSM 438 18 July, 2014 Professor Stephanie Lemmon Digital battle is not only what is found on computer games, it is an all to real and costly form of combat in which the combatants and defenders alike do not suffer physical wounds but the effects of these cyber-battles can be just as deadly as any bullet fired from a gun or bomb dropped from an aircraft. Within this paper three separate cyber-warfare events are reviewed, each event is different from the other only in terms of the consequences, only the consequences were different. What is “Cyber-Warfare”? One definition of cyber-warfare is, “cyberattacks are so inexpensive and easy to mount, with few fingerprints, they will almost certainly remain a feature of modern warfare.” (Markoff, 2008). Digital battles waged within the digital world of computer systems and the world-wide-web (internet). Cheap, “It costs about 4 cents per machine,” (Markoff, 2008), so cheap that the cost of one armored tank tread (one piece of the entire treack) could finance an entire cyber-war (Markoff, 2008). The first cyber-warfare event, Estonia 2007: Following the fall/collapse of the Soviet Empire in 1990 formerly USSR controlled nation states returned to autonomous control; Estonia was one of these countries. Being released from Soviet control did not mean that the civilian population wanted to be free from the Russian government and tensions existed between pro-Estonian and pro-Russian...

Words: 1633 - Pages: 7

Premium Essay

8 Questions to Ask About Your Intrusion Protection Solution

...8 questions to ask about your intrusion protection solutionEight questions to ask about your intrusion security solution Why intrusion prevention— not detection—is essential Business white paper Table of contents Introduction ..................................................................................... 3 The fundamental difference................................................................ 3 Eight basic questions ......................................................................... 3 1. Is your intrusion security solution in-band? ...................................... 3 2. Does your intrusion security solution support maximum network and application availability? ........................................................ 4 3. Does your intrusion security solution offer the performance needed to deeply inspect traffic without slowing down your network or business applications? ............................................................... 4 4. Does your intrusion security solution protect not just your network perimeter but also key points in the core of your network? ............... 4 5. Does your intrusion security solution provide attack coverage that is broad and deep? ............................................................. 5 6. How accurate is your attack coverage? Does it block bad traffic without blocking good traffic? ...................................................... 6 7. How timely and up to date is the attack coverage...

Words: 2842 - Pages: 12