Friday, December 27, 2019

Essay on Extreme Sports - 937 Words

Extreme Sports Works Cited Missing â€Å"Extreme sports have boomed since the early 90s† (Petrecca 16). It is hard to believe that such activities as sky diving, snowboarding, bungee jumping, and the up and coming razor scooter have been labeled as so-called â€Å"extreme sports†. What characteristics must a sport have to labeled extreme? Perhaps it is the lack of safety, or the inability to create specific rules for these sports. Maybe it is the fact that these sports are just recently becoming mainstream so there is no other classification other than extreme sports. In any case, these activities are definitely something new and interesting to sprawl out in the mainstream of sports, which will do nothing except become larger and more†¦show more content†¦Ã¢â‚¬Å"White-water rafting, snowboarding and skiing are sports that represent our culture and help us learn how to overcome challenges by working together† (Gurevich 50). It allows you to become closer to people you barely know; spending a day on a mountain with people can be a bonding experience. While answering a question about why he takes his staff skiing and rafting, Dmitry Gurevich told the news reporter that he believed it is an important thing for his staff to spend time outside the workplace. It will help the staff learn to trust each other more, and increase the level of understanding between everyone. Although there are rules in snowboarding, these rules apply only in competition racing. They are basic rules, which apply to most any other sport. When in competition there is really only one rule, to be sober. When establishing rules for people who just go snowboarding to have fun, there aren’t any. If rules would be created, it would nearly be impossible to enforce; it would be like having police officers on ski’s to tell you that you are going to fast, or snowboarding recklessly. The element of risk is also present when snowboarding as Shaun Palmer stated in an interview for people magazine. â€Å"Michael Jordan just had a basketball. I’m on a bike going down a mountainside. Or on a board flying over 60-foot cliffs† (Lambert 67). To fly over a cliff is another experience by which you are cheating death. If youShow MoreRelatedExtreme Sports And Extreme Athletes1877 Words   |  8 PagesExtreme sports are sports like skydiving, where a person jumps out of a plane and fights gravity to have few minutes of the inspiring view of the earth. Extreme sports are popular among the rising generation, as these sports satisfy the mind with the excitement that the mind has thirst for. Extreme sports are sports that require the athletes to have special traits, including thrill-taking and adventuring, which differentiate extreme sports from any other sport. Whiteside argues that unlike regularRead MoreExtreme Sports Motivation3174 Words   |  13 PagesExtreme Sports Motivational Factors Lawrence Cannon December 4, 2011 PE 5880 Abstract In the 1970s, extreme sports had been growing rapidly since its introduction. However, there has been little research done on extreme sport participants. In specific, the reason why consumers participate in extreme sports has not yet been investigated, although the number of participants and spectators of extreme sports is rapidly growing. Since motivation is a significant factor of sport participationRead More Extreme Sports: A Reaction to Extreme Technology Essay1917 Words   |  8 PagesExtreme Sports: A Reaction to Extreme Technology Many people in America work at jobs where they are separated from Nature and other people, sectioned off in cublicles, plugged into a machine, doing work which neither challenges their intellect nor is fulfilling personally. As a result, a separation forms not only between others and from Nature itself, but from themselves, and their purpose in life. A feeling develops that are not living life to the fullest. Much of our interaction these daysRead More The Commercialization of Extreme Sports (X Sports) Essays7065 Words   |  29 PagesThe Commercialization of Extreme Sports (X Sports) ABSTRACT For years, extreme sports had little to nothing in common with each other except for high risk, and an appeal to women and men from the ages of 12 to 34. Entertainment Sports Programming Network (ESPN), realizing this age group was a prime viewing audience, brought together several extreme sports and created yet another commercialized sporting spectacle. Since 1995, this television network has produced the Summer X Games. AfterRead More The Growing Popularity of Extreme Sports Essay1255 Words   |  6 PagesExtreme Sports Over the past ten years I have noticed that my local snowboarding park has become more crowded every season, especially with younger kids. This has not only been the case for snowboarding, but for all extreme sports. I’ve noticed this trend at my local skateboarding park also. More so, there has been a noticeable increase of extreme sports being broadcast on television today than ever before. These changes caused me to ask the question: why have extreme sports become so popularRead MorePersuasive Essay On Extreme Sports730 Words   |  3 PagesWith all of the benefits that come from extreme sports, there should be no debate whether it is okay to participate in them or not. The average person burns as much as 500 calories per hour while riding their board. This is just one of the many benefits that come from extreme sports. We can’t live our whole lives being scared and over cautious, we need to take the risks, and get the benefits because of it. The topic of extreme sp orts if a worldwide debate. Many people argue that kids are too youngRead MorePersuasive Essay About Extreme Sports2060 Words   |  9 PagesExtreme Sports Introduction + Thesis: (C) In Jeb Golinkin’s essay Why Parents Should Let Their Kids Play Dangerous Sports, Golinkin states an incident that happened while playing a dangerous sport. â€Å"25-year-old, Caleb Moore died from an injury when his snowmobile came crashing down on his head after a trick went wrong in the Winter X Games in Aspen, Colo† (pp.616). In this case, Moore thought that the trick would’ve been perfect since he had practiced before the actual competition. Dangerous sportsRead MoreExtreme Sports3358 Words   |  14 PagesIntroduction Extreme sports (also called action sport and adventure sport) are a media term for certain activities perceived as having a high level of inherent danger. These activities often involve speed, height, high level of physical exertion, highly specialized gear or spectacular stunts. At present date, there are no careful studies or statistics of deaths to separate activities with low or normal level of danger from those with high level of danger. While use of the term extreme sport has spreadRead MoreRed Bull Stratos Analysis1382 Words   |  6 Pagesversus who we are†. Patrice Radden, director of corporate communications at Red Bull) The main objective of the company is to communicate their slogan â€Å"Red Bull gives you wings† to a huge audience, in a way never seen before, through a range of extreme sports and events Red Bull organizes and supports. Although Red Bull is a global market leader, they always aim to create extraordinary events, as a part of the attempt to retain their position and not lose market share to their biggest and most aggressiveRead MoreUnder Armour s Vision Statement Essay1374 Words   |  6 Pagesedu). Extreme Sports Under Armour, has been true to its vision statement, to empower athletes everywhere, and also its mission statement, to make all athletes better through passion, design, and the relentless pursuit of innovation (uabiz.com). Under Armour following its vision and mission statement, can incur a great increase in revenue by expanding its market reach to a somewhat over looked sport called extreme sports (also referred to as action sports and adventurous sports). The extreme sports

Thursday, December 19, 2019

Moral Obligation has Taken Over the Civil Rights Movement

A continuation of civil rights movement is no longer important to campus –diversity, simply because of moral obligation or rights. Diversity efforts are important in towards 31st century because they are fundamental to the building blocks to excellence and quality. Diversity is not only black and white it is, race, ethnicity, gender, sexual orientation, ability, nationality, religion and many more combinations that make up a nation. (Williams Wade-Golden, 2008, p. B44). Higher education are attempting to meet the needs of a diverse student population with a variety of services, support groups, educational programs, and co-curricular experiences, institutions. The demographics of this country have changed because of racial/ethnic minorities. Institutions of higher education have also witnessed increasingly diverse student populations which will continue to trend upward. (National Center for Educational Statistics, 2007). The purpose of this paper look at diversity as it rel ates to higher education. Background information In the United States the population of racial/ethnic minorities is growing. 34% of the American Population is persons of color according to the United States Census Bureau. (U.S. Census Bureau, 2007). 32% of students enrolled in institutions of higher education were minority students in 2004 (NCES, 2007). The culture of a majority of campuses is changing because of the increased presence of minority students. Traditionally universities enrolled mainlyShow MoreRelatedBreaking the Law or Civil Desobedience Essay example1642 Words   |  7 PagesHistory has spoken. The words of the weak started it. Their actions proved it. Disobeying a law is a crime that the offender should be willing to take the punishment for and let his sacrifice be used as a point to rally around to create a just, moral change. Whenever a law is deemed unjust, there is good reason for breaking it to achieve justice. Civil Disobedience will never be legal and those who employ it should be w illing to accept the penalty that comes with breaking a law. It has been shownRead MoreThe And Its Effect On Society1343 Words   |  6 Pageswhether it be equality, civil rights, or so on. It goes straight to the fundamental ideas of morality. Is the law just and does it truly provide for the people? In cases of these injustices, who is held responsible? Does this responsibility eventually fall in the hands of the citizens? To what extent are the citizens capable of fighting these injustices for the betterment of society? Over the years, many have stood up to such instances through what is referred to as â€Å"Civil Disobedience.† Now, thisRead MoreUnjust Laws1747 Words   |  7 PagesThis means that laws, regardless of how unfair, unjust, or immoral they may be, must be followed with no better reason that they are the law. To the thesis that we are obliged to obey even unjust laws, I will argue that the standard objections to Civil Disobedience, given by Singer, are incor rect To begin, however, I believe it is necessary to define an unjust law. According to St. Thomas Aquinas, Any law that uplifts human personality is just. Any law that degrades human personality is unjustRead MoreDiscrimination Based On Race And Gender Essay1625 Words   |  7 PagesWoolsworth’s in Greensboro, North Carolina, to forbid people of color from sitting at the store’s lunch counter. In response to the oppressive nature of this policy, four black students ignored the rule which restricted them—an act of civil disobedience which was erupting all over the region—and took seats at the forbidden lunch counter, demanding to be served. Such instances, labeled ‘sit ins,’ were often recognized as illegal behavior and were treated as such by local law enforcement, who arrested thoseRead MoreTranscendentalism in Civil Disobedience3710 Words   |  15 PagesAmerican Democracy 10 April 2012 Transcendentalism in Civil Disobedience Thoreaus Politics of Individuality and Nature Dannheisig 2 Contents Introduction 1. Transcendentalism a. Nature b. Introspective Conscience and Politics 2. Political Individualism a. Ethical and Political (In)justice b. Critique of Democracy Conclusion Bibliography 2 3 4 6 7 8 9 10 11 12 Dannheisig 3 Introduction Henry David Thoreau was part of a movement called American Transcendentalism. To illuminate ThoreausRead MoreNgos And Freedom Of Expression1719 Words   |  7 Pageshuman right to freedom of expression worldwide. The right to freedom of expression is entrenched in international law through the following: Article 19 of the Universal Declaration of Human Rights (UDHR): â€Å"Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers† (UN 1948). Article 19 of the International Covenant for Civil and PoliticalRead MoreFour Theories of the Press1514 Words   |  7 PagesSiebert, Theodore Peterson and Wilbur Schramm, and since 1956, has come a long way. Over time, it has established a typology in the minds of journalism educators and students. The four theories are authoritarian, libertarian, social responsibility and soviet communist (Preserve Articles, 2012). AUTHORITARIAN THEORY Authoritarian is defined as favouring or enforcing strict obedience to the authority at the expense of personal freedom. Siebert has referred to this theory as the original prototype and mostRead MoreAdvocating Intellectual Dualism Of Respect For One s Conviction1687 Words   |  7 Pagesbelieve in what we may. A person has the right as a human to believe in what he or she may desire. Even though there is an international obligation by law for people to respect one’s right to conviction in whatever he or she may desire, different radical and or rebellious individuals defy that obligation and practice proselytism. Everyone in the world, no matter what race, age, gender, etc. should have a certain limit of respect for one’s conviction itself and also right to conviction in whatever heRead MoreEssay about A Free Society Must Expect Civil Disobedience1758 Words   |  8 PagesA Free Society Must Expect Civil Disobedience   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Are we morally obliged to obey even unjust laws? Think about what this means. This means that laws, regardless of how unfair, unjust, or immoral they may be, must be followed with no better reason that they are the law. To the thesis that we are obliged to obey even unjust laws, I will argue that the standard objections to Civil Disobedience, given by Singer, are incorrect      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To begin, however, I believe it is necessaryRead MoreReport On The Streets Of Americ Human Rights Abuses1403 Words   |  6 PagesHigh Commissioner for Human Rights In Conjunction with the Universal Periodic Review 1 Introduction 1.1 Methodology The report is based on the original report, On the Streets of America: Human Rights Abuses in Ferguson, by Amnesty International. Amnesty International sent a team of human rights observers, trainers and researchers to Ferguson and collect various information. Different from the original report, the report would concentrate on the nature of human rights violations in Ferguson and

Wednesday, December 11, 2019

Investigation Plan - Software Development Methodology

Question: As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are Windows based, this plan should detail following: Justify why use of the digital forensic methodology and approach is warranted including procedures for corporate investigation. Describe the resources required to conduct a digital forensic investigation, including team member skill sets and required tools. Outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence. Outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a Microsoft Windows-based computer. Create a table of contents for the investigative plan describing what the primary focus of the report would be. Answer: Every important details of the company are stored in the form of data in the computer. Thus, the security issue becomes one of the major concerns for the management of the company. The type of the security system adopted by the company has to be capable enough to secure the information regardless of different sizes. With the help of the forensic practices it is possible to plan and implement actionable methods through which the information can be secured for a longer period of time. Specific methodology Software development methodology The selected method has to be capable enough to take care of the information and implement effective disciplinary action plans. This will restrict the unauthorised access of the information and other details that are quite confidential for the company. With the help of such a method it is possible to keep a check on the unusual operational activities that could lead to serious problem. Accurate knowledge regarding the forensic principles, procedures, techniques and tools will be helpful in improving the quality of the services that is intended to be provided to the company (Casey, 2000). This report is based on the Global finance company. It is an investment company that has more than 10,000 staffs working from different parts of the world. The company specialise in rendering different types of finance services that includes calculation of the superannuation for individuals and companies, provide investment options, analyse the retirement benefits, and render shares and property investment options related to finances. The services are exclusively availed for individuals and companies in Australia. However, the finance head of the company is aware of the fact that the details from the computer is being hacked and used by someone. This is a serious concern as there different types of important information that has been stored inside the system. The report has been prepared to present an effective auditing plan for digital forensics. This has been done with an intention of reducing the efforts that has been put in for securing the clients and financial information that has been retained by the company (Higgins, 2008). Task 1: Justification of the methods for digital forensic The term of computer digital forensic is referred to the scientific method that is used for investigating the loops that are present within the system. It is quite important to have planned and well drafted methods through which the required information can be easily gathered by the investigators. The process basically involves three major steps which are analysing, reporting, and acquisition. It is quite important to use the best scientific method through which the relevant information regarding the digital evidences can be easily gathered by the experts. The method needs to include the below mentioned steps which are Verification The head of the finance department of the Global finance feels that the technology that has been used by the company is not effective. This is because the infrastructure that has been used for the network application hasnt been updated. The environment for accessing information is unrestricted, which makes it possible for everyone to collect the information. Thus, it is quite important to investigate the incidences that are basically known as the forensic evaluation. In this case, the details are assessed. This is done with an intention of analysing the causes of the incidences that lead to sharing of the information. Based on the information that has been collected by the company it is possible to choose the best approach that will be useful in deciding upon the steps that needs to be taken for making the required changes (Huber, 2011). System description The system followed by the Global finance had unrestricted usage, wherein the information could be easily accessed by different departments. Besides this, the workstations and servers that were used by the company were not properly maintained. This had increased the risk of the intrusion detection that increased the risk for the users. Thus, it was essential for detecting the system that was used by the company. In this process, it was necessary to collect the necessary information that was meant to be used for determining the role of the system. This helped in analysing the data and the helped in evaluating the risks that were attached with the system. It is quite important to analyse the configuration of the disk and other factors that were considered to be important for the collection of the evidences (Inoue, Adelstein, and Joyce, 2011). Evidence collection In the process of information security system, the investigative team and the forensic abilities were analysed as it was located in the head office in Melbourne. The finance head of the department had complained about the ineffectiveness of the system, and this was one of the major concerns that had impacted the users. The audit team work towards collecting the evidences that are considered to be essential for analysing the details that are considered to be necessary for collecting the required information. Auditors in this case have to prioritize the findings as this will help in finding the factors that had impacted the leakage of the information. Also, the data that has been violated due to different network connections has to be analysed. This includes analysing the login sessions, cache, running process times, and others. The information is collected with an intention of analysing the challenges and making the right steps through which the changes can be implemented by the manag ement (Janssen, and Ayers, 2007). Timeline analysis The check on the evidences has to be done on a timely manner. This will help in making the necessary changes and controlling the process of information leakage of access in the best possible manner. In this process, the information and other evidences has to be collected and investigated in the right manner. The evidence collection and evaluation has to be done on the basis of evidence acquisition, and this is one of the prominent steps that need to be followed in the right manner. The tools that are used for analysing the data or forensic data are based on the Linux method and MFT methods. In this process, the evidences that are collected and investigated in the right manner, as this will help in analysing the challenges that are faced by the company in securing the data. This system is quite different from the network foreignism and data recovery system. Network forensic is a part of the digital networking system and it is basically used for monitoring and evaluating the traffic in the computer network system. In this process importance is given to the information gathering methods and legal evidences. This method deals with the network investigations that are known to be dynamic and volatile in nature (Kim et al., 2008). Data recovery method is related to the process of handling the information that might be damaged or corrupted. The whole intention is to provide an access to the information, whenever required. Such a process is quite different from the others that are in use. Methods included for collecting the information There are different types of analysis that are basically used for this purpose and it includes Pre-analysis - It includes defining the case in-depth and analysing the goals through which the task can be achieved. Analysis - in this process, the company concentrates on collecting the best methods through which the structured management system can be introduced. Time based analysis - It is also necessary to allocate the time based process, as this will help in improving the performance (Kruse, Heiser, 2001). Task 2: Sources for evidence collection The process followed by the company for collecting evidences plays a key role in analysing the risk that is associated with the system. Hardware requirements Some of the steps that are included in the volatile process are Register content, CPU, and cache Routing the table, process table, ARP chnage, and kernel statistics Analysing the memory Checking on the temporary file and swap spaces Check on the data that are accommodated on the hard disk Some of the important resources that are considered in this process include Nigilant 32 Live response system Mandiant Intelligent response system KntDD F-response (Masters, Turner, 2007). The evidences are collected in different forms or methods. However it is necessary to collect the information and perceive the data in the best possible manner. It also includes securing the information in the volatile data format. In this case, the information is stored on the hard drive and the details are stored eve when the computer is switched off. The volatile information is stored in the memory of the computer, and it is lost as soon as the computer is turned off. It is necessary to adopt and implement an effective tool through which the necessary steps can be taken for securing the information that is quite important for the company. Some of the tools include creating back-ups decryption, and authentication process that is considered to be useful for storing the information. It also includes the below mentioned steps IT tracking Log file auditing Implementing data recovery system Examine the file (Stallings, 2003). Also it is necessary to have regular back-up files through which the changes can be done without the fear of losing the information. This will also avoid the ambient data that is basically located on the swap file, which is quite similar to the memory. The system that has been chosen to be selected has to compile with the rules that has been drafted by the MIST or the national institute of standards and technology. In this process, it is also necessary to ensure that the members are aware of the rules that are formed by the company for using the system or accessing the information from the computer. Besides this, it has to be regularly checked as this will help in implementing the steps that are considered to be essential for implementing the changes that are considered to be necessary for securing the data that are quite important for the company. It is necessary to have the best decryption tools that will be useful for accessing the password protected files and computers. The procedure that will be followed for the collection of the tools and digital evidences has to be implemented in the right manner. The staffs of the company have to follow the password method for accessing the information that is present within the system. Auditors of the company can use the IP tracking system to access or analyse the information that is considered to be important for tracking the authorised usage of the system. In this method, it is possible to analyse additional information that will be useful for the auditors to collect the details related to unauthorised usage of the system. For companies it is essential to introduce an effective national security system that includes IDS or the intrusion detection method. It also includes introducing proxies and firewalls. In this method, it is necessary to have a detailed investigating report that needs to be provided by the system administrator. This will help in analysing the challenges without losing much time on the same (Turner, 2006). Task 3: Approach for collecting the data The evidences or the data needs to be collected and investigated in the right manner. For this, it is necessary to collect the tools that are available for the implementation of the performance system. This also includes analysing the system configuration method through which the fault can be easily analysed. Such a method will help in analysing the problem and finding the best possible solution to handle the same. For this, it is essential to determine the configuration of the system, as this will help the auditors to find the perfect solution to the problem. The methods that are included in this process include analysing the images that are stored in the line output utility, memory dumps, and digital media. With the help of such a system, it is possible to conduct the network investigation that is necessary to find the case of the problem. The plan also includes using the steps or tools that are conducted in the DEB. This contains the details that are considered to be necessary for the company for handling the information in the right manner. DEB is known to the advanced technology through which the magnetic cloning devices can be used for investigating the loops that are present within the system. The prime objective is to find the methods through which the data can be manipulated (Kim et al., 2008). Task 4: Process that needs to forensic analysis Software requirements The system needs to be adopted for analysing the evidences through which the illegal access of the information can be controlled. In this case, the problem that is associated with the usage of the system. In this case, the MS system has to be configured with certain rules as this will prevent the unauthorized usage of the system. The system needs to be password protected, and the staffs of the company have to be encouraged to not share the passwords with anyone. This will create a problem, and might affect the confidentiality of the information that has been stored within the system. Apart from this, it is also necessary to implement an effective application system through which the usage of the members along with the data access can be checked on a regular basis. This will help in improving the quality of the services that is proposed to be rendered to the clients. The data that are stored within the system are quite important and the access needs to be provided for few members. This will stop the usage of the information by anyone who is not authorised to do so. Apart from this, the management of the company can also implement the DEB software through which the details can be checked and the corrective steps can be introduced by the company. The system has to be implemented in a simple format, as this will help in accomplishing the task in the best possible manner (Janssen, and Ayers, 2007). Task 5: Plan The plan for the investigation has to be simple and effective as this will help in yielding the best results that will cater the needs of the company. in this process, the steps that needs to be followed for the purpose of analysing the challenges has to be determined. This will help in analysing the challlenges and taking the right steps trhough whch the issue can be handled in an effective manner. Conclusion Inroduing an effective computer forensic method is quite important for the business. The process that has been inetnded to be followed by eh company depends upon the strategy that has been adopted by the company. In this case, the data needs to be analysed in the right manner. this will help in analysing the challenges and adopting the best methods through which the data can be evaluated in the right manner. In this case, the data has been evaluted and the corrective steps has to be taken for improvng the quality of infromation that has been retained by the company. References Casey, E. 2000. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. San Diego, CA: Academic Press. Higgins, S 2008. The DCC Curation Lifecycle Model. The International Journal of Digital Curation, 3, 134140. Huber, M, Mulazzani, M, Leithner, M, Schrittwieser, S, Wondracek, G and Weippi, E 2011. Socialsnapshots: digital forensics for online social networks. Annual Computer Security Applications Conference. ACM December 2011. Inoue, H, Adelstein, F and Joyce, R A 2011. Visualization in testing a volatile memory forensic tool.Digital Investigation, 8, S42S51 Janssen, W and Ayers, R 2007. Guidelines on cell phone forensics. Recommendations of the National Institute of Standards and Technology. Gaithersburg, Maryland: National Instituteof Standards and Technology. Kim, K, Park, S, Chang, T, Lee, C and Baek, S 2009. Lessons learned from the construction of aKorean software reference data set for digital forensics. Digital Investigation, 6, S108S113 Kruse, W. G., Heiser, J. G. 2001. Computer Forensics: Incident Response Essentials. Addison Wesley. Masters, G., Turner, P 2007. Forensic Data Recovery aand Examination of Magnetic Swipe Cloning Devices. Digital Investigation , 4 (1), 16-22 Stallings, W 2003. Cryptography and Network Security 3/e. Prentice Hall. Turner, P. 2006. Selective and Intelligent Imaging Using Digital Evidence Bags. Digital Investigation , 3 (1), 59-64.

Tuesday, December 3, 2019

Second Earl Of Rochester Essays - Sexual Reproduction, Behavior

Second Earl Of Rochester The satirists shared a talent for making other individuals feel uncomfortable, particularly by making them aware of their own moral inadequacies. They used irony, derision, and wit to attack human vice or folly. One method the satirist utilized to catch their readers' attention, while also making them feel uncomfortable, was to describe those things that were deemed inappropriate to discuss openly in society. The classical example of a topic that was discussed behind closed doors, yet the satirist used freely, was sex. Mention of such things as sex can always bring a giggle, excite feelings of hidden passion, or make one's cheeks rosy from embarrassment. John Wilmot, Second Earl of Rochester, and Jonathan Swift, were two satirist that were noted for using perverse language and graphic depictions to elicit desired emotions from their readers and to wage their attacks on human folly. To understand Rochester's use of sex in his work, one must understand his distaste for reason. This can be seen in his poem, A Satyr Against Mankind, when he comments: Women and Men of wit, are dang'rous tools, and ever fatal to admiring fools. Rochester viewed reason as a vice rather than an admirable trait in man. When man followed a course of action that was advised by reason he turned into a coward who often betrayed his ideals, his family, and his friends. Rochester believed that to enjoy true happiness one must follow a course dictated by passion. Unlike reason, the passions do not betray one's senses and ideals. According to Rochester, the passions define who an individual is because the passions encompass one's emotions and desires. Reason cannot fully comprehend such a thing. Rochester highlights this belief in his poem's with tales of lust and sexual innuendoes. He uses perverse language and topics not only to mock those that believe reason is the human faculty that can bring about self-satisfaction, but also to describe to his readers that sensual pleasure is the highest pleasure because sensual pleasure is derived from passion, not reason. Rochester's poems rarely discuss love in the traditional sense; rather, he discusses it in a bodily context. Naturally, this would bring about the ire in any moralist. His poems make reference to ancient figures that draw on images of mass orgies and debauchery. He often uses language that elicits images of human genitalia. In his works, he even discusses how an individual's sexual drive cannot be satisfied or how an individual cannot perform sexually. In Rochester's Upon His Drinking a Bowl, Rochester joins the aspect of alcohol with that of sex: Cupid, and Bacchus, my Saints are, May drink, and Love, still reign, With Wine, I wash away my cares, And then to Cunt again. This attitude of sex and drunkenness is often associated with the ancient Greeks and Romans, who Rochester makes reference to through Cupid and Bacchus. The wine serves as a tool to rid oneself of their grasp on reason. It often drives away the feeling of anxiety that often exist between a man and women during times of intimacy. It allows one to satisfy their bodily pleasure. The graphic word Cunt not only serves as a symbol of sex and the female genitalia but is also used to bring about the disgust of any moralist or any rational individual. A reasonable man would like to think that men do not view sex and women in such a derogatory manner. According to Rochester, this is not so. Men are crude creatures that do think of sex and women in such a manner. Rochester's The Imperfect Enjoyment is an amusing tale of man's greatest fear - premature ejaculation: Smiling, she chides in a kind murm'ring Noise, And from her Body wipes the clammy joys; When a Thousand Kisses, wander'ring o're My panting Bosome, - is there then no more Apply'd to my dead Cinder, warms no more, Than Fire to Ashes, cou'd past Flames restore. Trembling, confus'd, despairing, limber, dry, A wishing, weak, unmoving lump The man is this poem is so excited by the exotic allure of his female companion that he climaxes before the sexual moment ever begins. He then gets frustrated that he can not get a repeated erection that instantaneous moment. This poem amuses most readers because most men and women