blog




  • Essay / Media Bias Project - 536

    In the article, the author describes how, nowadays, a hacker can simply download a free program from the Internet and use it to hack your "secure" accounts with relative ease. . The world's most common password isn't exactly the most cryptic combination of alphanumeric characters that can be used to protect your information. The article delves deeper into the history and psychology of password usage, including tips on how to make your virtual lock a little more complicated than the simple 123456. Written by William Poundstone, the article is a from the book Rock Breaks Scissors: A Practical Guide to Outwitting and Outsmarting Almost Anyone, published by Little, Brown and Company. The nature of the work certainly makes it a “constructed” media work. In fact, the author deliberately constructs a controversial and empathetic title into the structure of the article in order to really grab the reader's attention. “How to Outsmart Passwords” is not what one would consider an article about password protection; it's actually the complete ...