Wednesday, January 29, 2020

Bloody civil war Essay Example for Free

Bloody civil war Essay The final two chapters of the novel, Ike tries to discover and understand the history of his own family and the way in which they had treated the blacks. He even attempts to make amendments to one of them, by sending some money. The brief chronicle that he finds of his family helps him reconstruct some parts of the history. He remembers for example, the little hut in which all the black people were herded together, and the way in which the whites manufactures bleaching substances for the blacks to use so as to change their color: â€Å"[†¦]the square, galleried, wooden building squatting like a portent above the fields whose laborers it still held in thrall 65 or no and placarded over with advertisements for snuff and cures for chills and salves and potions manufactured and sold by white men to bleach the pigment and straighten the hair of Negroes that they might resemble the very race which for two hundred years had held them in bondage and from which for another hundred years not even a bloody civil war would have set them completely free[†¦. ]†(Faulkner, 245) This forced change of hair color is very significant: the author emphasizes the fact that the whites wanted to transform the black and make them as themselves, a race however quite imperfect since it is the one that invented slavery. Neither the land nor the people can be bought, since they have been left to live free by the creator of the world. Man’s possession of land or of slaves only imaginary, since these primary things cannot be bought: â€Å"Bought nothing. Because He told in the Book how He created the earth, made it and looked at it and said it was all right, and then He made man. He made the earth first and peopled it with dumb creatures, and then He created man to be His overseer on earth[†¦]Because it was never Ikkemotubbes fathers fathers to bequeath Ikkemotubbe to sell to Grandfather or any man because on the instant when Ikkemotubbe discovered, realised, that he could sell it for money, on that instant it ceased ever to have been his forever, father to father to father, and the man who bought it bought nothing. † (247) In the family’s brief chronicle, Ike discovers many of the iniquities that were common at the time, in what regarded the black people. His grandfather had had sons and daughters of the black slaves, and never acknowledged them. Also, the contracts done between the blacks and the whites were invalid, since the black man had no way to claim his rights or to prove them, since he was usually even unable to read: â€Å"and it would seem to the boy that he could actually see the black man, the slave whom his white owner had forever manumitted by the very act from which the black man could never be free so long as memory lasted, entering the commissary, asking permission perhaps of the white mans son to see the ledger-page which he could not even read, not even asking for the white mans word, which he would have had to accept for the reason that there was absolutely no way under the sun for him to test it[†¦]†(256) Ike ironically observes the extent of the injustice done to the children that were not acknowledged because they were black, and the way in which they were usually simply given a sum of money to make amends: â€Å"So I reckon that was cheaper than saying My son to a nigger he thought. Even if My son wasnt but just two words. † (259) Thus, Faulkner’s novel is centered around the idea of the essential freedom given by nature to any creature. The bear is a symbol for this freedom, and his spirit is akin to that of the blacks and Indians: â€Å"[†¦]an old bear, fierce and ruthless not just to stay alive but ruthless with the fierce pride of liberty and freedom, jealous and proud enough of liberty and freedom to see it threatened not with fear nor even alarm but almost with joy, seeming deliberately to put it into jeopardy in order to savor it and keep his old strong bones and flesh supple and quick to defend and preserve it; an old man, son of a Negro slave and an Indian king, inheritor on the one hand of the long chronicle of a people who had learned humility through suffering and learned pride through the endurance which survived the suffering, and on the other side the chronicle of a people even longer in the land than the first. † (Faulkner, 267) The same ideas appear in the short story called That Evening Sun, but the author here emphasizes the barrier that existed between the blacks and the whites. The story, which has the same characters of the Compson family as The Sound and the Fury, is centered on a black servant called Nancy and on her agony at having been left by her husband and the terror that he might return and kill her. Nancy is terribly beaten by the police when she tries to claim her pay from a white man, and then locked up: â€Å"When you going to pay me, white man? When you going to pay me, white man? Its been three times now since you paid me a cent-‘ Mr. Stovall knocked her down, but she kept on saying, When you going to pay me, white man? Its been three times now since—‘ until Mr. Stovall kicked her in the mouth with his heel and the marshal caught Mr. Stovall back, and Nancy lying in the street, laughing. She turned her head and spat out some blood and teeth and said, ‘Its been three times now since he paid me a cent. ’†(Faulkner, 289) The story focuses on the impressive agony of the woman and her loneliness, as the whites refuse to comfort her in any way. The prejudices against the blacks are again obvious: as in The Bear, the villagers remark that a black person would never commit suicide, unless under the power of a drug: â€Å"He said that it was cocaine and not whiskey, because no nigger would try to commit suicide unless he was full of cocaine, because a nigger full of cocaine was not a nigger any longer. †(Faulkner, 291) The idea of the white people is that the black have no feelings and no inner life of their own, and that they live mostly like beasts, therefore could never have the impulse to suicide. The woman tries to cling to the children’s company in her distress and her fear of the husband that she thinks will come after her. The recurrent remark that she makes, saying that she is no more than a nigger is very significant. She underlies the fact that she is actually perceived as only a nigger, and that even she feels like that: â€Å"I aint nothing but a nigger, Nancy said. ‘It aint none of my fault. ’† (Faulkner, 296) She cannot escape her race, and, although she feels she has an inner life she does not have an identity to associate it with. The last fragment of the story is of utter importance: Quentin, the storyteller remains listening to the sounds made by Nancy after they live her house, and hints at the barrier between the white and the black. The whites merely live her and her problems, as she is not considered to be important enough for further consideration: â€Å"But we could still hear her. She began as soon as we were out of the house, sitting there above the fire, her long brown hands between her knees. We could still hear her when we had crossed the ditch, Jason high and close and little about fathers head. Then we had crossed the ditch, walking out of Nancys life. Then her life was sitting there with the door open and the lamp lit, waiting, and the ditch between us and us going on, dividing the impinged lives of us and Nancy. â€Å"(Faulkner, 300) Thus, Faulkner describes the lives of the black and white people in the Southern world with great insight, emphasizing the essential freedom of man as of nature, and the impossibility to possess or reduce them and limit their importance. Works Cited: Abadie, Ann J. Faulkner in Cultural Context. Jackson: University Press of Mississippi, 1997. Clark, Jim. â€Å"On Faulkner. † The Mississippi Quarterly. http://www. questia. com/app/direct/SM. qst Faulkner, William. Collected Stories of William Faulkner. New York: Random House, 1950. Three Famous Short Novels. New York, Vintage Books, 1958. Singal, Daniel J. William Faulkner: The Making of the Modernist. Chapel Hill: University of North Carolina Press, 1997. â€Å"William Faulkner†. http://www. kirjasto. sci. fi/faulkner. htm

Tuesday, January 21, 2020

The Philosophy Of Truth Making You Free :: essays research papers

The Philosophy of Truth Making You Free There exists a philosophy that, the truth will make you free. For example, exposing a conspiracy that does yourself and others harm can only set you free from further harm and related mischief. Whether or not the conspirators are the criminals of society or the highest branches of our own government. Injustice spreads like a virus and it needs to be stopped while there is still a way. The effects of such an act can only free us and make us more aware of such corruptness.   Ã‚  Ã‚  Ã‚  Ã‚  Moreover, a conspiracy spawned by criminals in society, to cause harm, will no doubt enslave the public both mentally and physically. The society will see the injustice happening but will not know from where it is being caused. This effect will be expressed in the sort of decisions they make and company they keep. A more defensive society cannot feel free until the conspiracy is brought to light, that is until the truth is told and the harm is stopped, society cannot be free.   Ã‚  Ã‚  Ã‚  Ã‚  Furthermore, a harmful conspiracy in the highest levels of our governments prevents freedom on a greater scale. If the truth cannot be found in the government that we elect, then what hope have we for progress. Mistrust and suspicion will be the tools of this brand of enslavement. If the truth is revealed then the uncovered conspiracy will free the public from the secrets and lies and in essence keep the government honest. First, the truth will make you free, is an irresponsible statement. To reveal the truth is not necessarily the best solution to a conspiracy. When you make the public aware of all that goes on whether it be what the criminals are up to or the high officials of governments, then a little knowledge causes a lot of unnecessary panic. A public with a truthful knowledge of what criminals have been doing will become paranoid beyond belief. They become defensive and suspicious of every person. That is how the truth can make you a prisoner of your own devising.   Ã‚  Ã‚  Ã‚  Ã‚  Also, when this harmful conspiracy in the higher levels of society becomes known, then a little truth can cause a lot of harm. The issues that the government deals with are of such great consequence that, they will have to make unpopular decisions and even make unscrupulous deals and from the products of this practice, the public in turn will cause an unparalleled uproar that would tear the fabric that holds a society together, if they knew the truth. Therefore the truth cannot make you free, because the truth can do more harm than good.

Monday, January 13, 2020

Use of Wireless local area network

AbstractionIn many sectors wireless local country web ( wireless local area network ) has been widely used.mobility, scalability, easiness of installing, reduced cost-of-ownership, installing flexibleness are the grounds were wireless local area network gained popularity.WLAN have some security menaces apart from the benefits mentioned above.the scenario begins by presenting the construct of WLAN, and how wired tantamount privateness ( WEP ) works, which is the IEEE 802.11b/WIFI standard encoding for radio networking.Examining WEP failing, it is being much less secured than what was orginally intended.further research sing practical solutions in implementing a more secured radio lan.new criterions excessively better the security of wireless local area network such as IEEE 802.1X criterion, comprises of point to indicate protocol ( palatopharyngoplasty ) , Extensile Authentication protocol ( EAP ) and 802.1x itself.802.1x is included in 802.11i, a new criterion for cardinal distributi on and encoding that will play of import function in bettering security capablenesss of future and current radio local area network networks.802.11i criterion provides WEP To be replaced by two encoding algorithms, which are ( TKIP ) Temporal cardinal unity protocol, ( CCMP ) cbc-mac protocol.1.Introduction to WLANTo utilize either infrared or radio frequence engineering to convey and have information over the air, flexible informations communicating system called wireless local country web ( wireless local area network ) is used.802.11 was implemented as the first WLAN criterion in 1997.it has a maximal througput of 1 to 2 mbps and operated in 2.4 gigahertz frequency.IEEE 802.11B is the most dispersed and deployed criterion, was introduced in 1999.the maximal velocity is 11mbps and frequence scope is the same.sectors from instruction, corporate, warehousing, retail, health care, finance WLANS has been used widely.the demand for installing flexibleness, scalability, cost-of-ownershi p, mobility wireless local area network has been an of import engineering to fulfill.2.0 Security Threats of WLANDespite the productiveness, convenience and cost advantage that WLAN offers, the wireless moving ridges used in wireless webs create a hazard where the web can be hacked. This subdivision explains three illustrations of of import menaces: Denial of Service, Spoofing, and Eavesdropping.2.1 Denial of ServiceIn this sort of onslaught, the interloper floods the web with either valid or invalid messages impacting the handiness of the web resources. Due to the nature of the wireless transmittal, the WLAN are really vulnerable against denial of service onslaughts. The comparatively low spot rates of WLAN can easy be overwhelmed and leave them unfastened to denial of service onslaughts [ 9 ] . By utilizing a powerful plenty transceiver, wireless intervention can easy be generated that would unable WLAN to pass on utilizing radio way.2.2 Spoofing and Session HijackingThis is where the aggressor could derive entree to favor informations and resources in the web by presuming the individuality of a valid user. This happens because 802.11 webs do non authenticate the beginning reference, which is Medium Access Control ( MAC ) reference of the frames. Attackers may therefore spoof MAC references and highjack Sessionss. Furthermore, 802.11 does non necessitate an Access Point to turn out it is really an AP. This facilitates aggressors who may masquerade as AP? s [ 9 ] . In extinguishing spoofing, proper hallmark and entree control mechanisms need to be placed in the WLAN.EavesdroppingThis involves attack against the confidentiality of the information that is being transmitted across the web. By their nature, radio LANs deliberately radiates web traffic into infinite. This makes it impossible to command who can have the signals in any radio LAN installing. In the radio web, eavesdropping by the 3rd parties is the most important menace because the aggressor can stop the transmittal over the air from a distance, off from the premiss of the company.3.0 Wired Equivalent PrivacyWired Equivalent Privacy ( WEP ) is a standard encoding for radio networking. It is a user hallmark and informations encoding system from IEEE 802.11 used to get the better of the security menaces. Basically, WEP provides security to WLAN by coding the information transmitted over the air, so that merely the receiving systems who have the right encoding key can decode the information. The undermentioned subdivision explains the proficient functionality of WEP as the chief security protocol for WLAN.3.1 How WEP Works?When deploying WLAN, it is of import to understand the ability of WEP to better security. This subdivision describes how WEP maps accomplish the degree of privateness as in a wired LAN [ 16 ] . WEP uses a pre-established shared secret key called the base key, the RC4 encoding algorithm and the CRC-32 ( Cyclic Redundancy Code ) checksum algorithm as its basic edifice blocks. WEP supports up to four different base keys, identified by KeyIDs 0 thorough 3. Each of these basal keys is a group key called a default key, intending that the base keys are shared among all the members of a peculiar radio web. Some executions besides support a set of unidentified per-link keys called key-mapping keys. However, this is less common in first coevals merchandises, because it implies the being of a key.3.2 Failings of WEPWEP has undergone much examination and unfavorable judgment that it may be compromised. What makes WEP vulnerable? The major WEP defects can be summarized into three classs [ 17 ] :3.2.1 No counterfeit protectionThere is no counterfeit protection provided by WEP. Even without cognizing the encoding key, an antagonist can alter 802.11 packages in arbitrary, undetectable ways , deliver informations to unauthorised parties, and masquerade as an authorised user. Even worse, an antagonist can besides larn more about the encoding key with counterfeit onslaughts than with strictly inactive onslaughts.3.2.2 No protection against rematchsWEP does non offer any protection once more rematchs. An adversary can make counterfeits without altering any informations in an bing package, merely by entering WEP packages and so retransmitting later. Replay, a particular type of counterfeit onslaught, can be used to deduce information about the encoding key and the informations it protects.3.2.3 Recycling low-level formatting vectorsBy recycling low-level formatting vectors, WEP enables an aggressor to decode the encrypted information without the demand to larn the encoding key or even fall backing to hi-tech techniques. While frequently dismissed as excessively slow, a patient aggressor can compromise the encoding of an full web after merely a few hours of informations agg regation.4.0 Practical Solutions for Procuring WLANDespite the hazards and exposures associated with radio networking, there are surely fortunes that demand their use. Even with the WEP defects, it is still possible for users to procure their WLAN to an acceptable degree. This could be done by implementing the undermentioned actions to minimise onslaughts into the chief webs [ 5 ] :4.1 Changing Default SSIDService Set Identifier ( SSID ) is a alone identifier attached to the heading of packages sent over a WLAN that acts as a watchword when a nomadic device attempts to link to a peculiar WLAN. The SSID differentiates one Wireless local area network from another, so all entree points and all devices trying to link to a specific WLAN must utilize the same SSID. In fact, it is the lone security mechanism that the entree point requires to enable association in the absence of triping optional security characteristics. Not altering the default SSID is one of the most common security error s made by WLAN decision makers. This is tantamount to go forthing a default watchword in topographic point.EAPThe Extensile Authentication Protocol ( EAP ) is a general hallmark protocol defined in IETF ( Internet Engineering Task Force ) criterions. It was originally developed for usage with PPP. It is an hallmark protocol that provides a generalised model for several hallmark mechanisms [ 15 ] . These include Kerberos, public key, smart cards and erstwhile watchwords. With a standardised EAP, interoperability and compatibility across hallmark methods become simpler. For illustration, when user dials a distant entree waiter ( RAS ) and utilize EAP as portion of the PPP connexion, the RAS does non necessitate to cognize any of the inside informations about the hallmark system. Merely the user and the hallmark server have to be coordinated. By back uping EAP hallmark, RAS waiter does non actively take part in the hallmark duologue. Alternatively, RAS merely re-packages EAP packages t o manus off to a RADIUS waiter to do the existent hallmark determinationWI-FI PROTECTED ACCESS ( WPA )The WPA can be expressed as: 802.1x Authentication + TKIP + ( optional ) AES. 802.1x Authentication WPA relies on the 802.1x hallmark described in the old subdivision for authenticating wireless clients via a RADIUS waiter and bring forthing the secret keys which are so used to make encoding keys. This implies that 802.1x must utilize an hallmark method ensuing in the secret key coevals ( such as EAP-TLS or EAPTTLS ) . Because shared secret keys, generated as the consequence of 802.1x hallmark are alone for each client, WPA-enabled APs will manage multiple keys. To do WPA useable by little concerns and place offices, which do non hold RADIUS-based hallmark environment, 802.1x hallmark may be replaced with the shared key hallmark which resembles WEP hallmark. This manner of WPA hallmark is known as Pre-Shared Key ( PSK ) manner ( vs. Enterprise Mode used with the 802.1x hallmark ) [ 22 ] .TKIPTKIP ( Temporal Key Integrity Protocol ) is responsible for bring forthing the encoding key, coding the message and verifying its unity. Although the existent encoding is performed utilizing the same RC4 Cipher algorithm as WEP, specific sweetenings are added to make stronger encoding key and guarantee that italterations with everypacketis alone for every clientA cryptanalytic message unity codification, or MIC, called Michael, to get the better of counterfeits.A new IV sequencing subject, to take rematch onslaughts from the aggressor? s armory.A per-packet key blending map, to de-correlate the public IVs from weak keys.A re-keying mechanism, to supply f resh encoding and unity keys, undoing the menace of onslaughts stemming from cardinal reuse.Encrypted Tunnel or VirtualPrivate Network ( VPN )Packages are unbroken private by the usage of encryption.Encryption systems are designed to supply avirtual tunnel that the information base on ballss through as it traverses the protected portion of the network.If the system is decently designed and correctlyimplemented, the contents of the warhead will be indecipherable to those without the proper decoding key. The contents that the receiving system decrypts must non merely be private, but precisely as the senderintended. In other words correct tunnel will notonly maintain the contesnts private, but besides free from alteration. This requires the usage of acryptographic unity checker or checksum.Tunneled Transport Layer Security( TTLS )It is non clear whether or non EAP-TLS can be implemented without a public key substructure for certificate exchange. We believe that it ispossible to put in the certifications on the client andserver without utilizing a PKI but we are non perfectly certain that this is the instance. But there isno uncertainty that TTLS does non necessitate a PKI.TTLS differs from EAP-TLS in that it is a two phase protocol. In the first phase an encrypted tunnel is established between the client and waiter. In making so, the waiter presents itscertificate to the client and therefore the client is confident of the waiter? s individuality. In the 2nd stage the client? s certificates are given to thefor proof. These certificates are in theform of attribute-value braces and non digital certifications. [ Gas02 ] All EAP hallmark protocols run into this standard. Because the certificates are passed in an encrypted tunnel a digital certification is non necessary.Protected ExtensileAuthentication Protocol ( PEAP )PEAP is really similar to TTLS. It is truly merely a different spirit of TTLS. It is besides a two stage protocol. The first stage is used to authentic atethe waiter and set up an encrypted tunnel between the client and the waiter. Then alternatively ofusing the older attribute-value brace to authenticate the client, hallmark is limited to any EAP method. Since EAP includes a broad array of hallmark protocols this is non a terrible limitation, but it does let less flexibleness than TTLS. [ Gas02 ]

Sunday, January 5, 2020

Analysis Of The Book The Lottery Essay - 1893 Words

When I think of the lottery, I think of a game basically where they choose one number and something or something gets chosen. * Setting can best be defined as: B. Thy physical location, time, and social environment in which a story takes place. In the first paragraph, the setting is described as a beautiful sunny day that is during the summer. Everything is in bloom and the grass is green. Basically, during this first paragraph, the author describes it as a â€Å"perfect† day which shows how nice it is and making the reader not realize what the townspeople are actually going to do, which is the opposite of how this day really is. This sets a peaceful and happy tone and atmosphere throughout the beginning of the story. Mood can best be defined as: A. The emotional effect or feeling that a text creates in a reader. The mood that the villagers seem to be in is a happy and normal mood because they feel that the lottery is just another normal day. They are neither sad nor angry, just content and used to the tradition of doing the lottery. They act like nothing is wrong and do not care who dies. I can tell that they are in a content mood because they don t care about doing the lottery and feel that it is an important part of their lives. The type of event that the lottery seems to be is a gathering where they chose to kill one person by stoning them to death. The possible reason why the people hesitated to help Mr. summers with the box is that they don t want toShow MoreRelatedAnalysis Of The Book The Lottery 1123 Words   |  5 Pagesquestion why. Suzanne Collin’s novel The Hunger Games and Shirley Jackson’s short story â€Å"The Lottery† best illustrate this point by showing how a violent annual tradition affects a society and its innocent people. The Hunger Games has such uncanny similarities to â€Å"The Lottery† that it almost seems as if Collins used Jackson’s story as a source of inspiration for her novel. Both The Hunger Games and â€Å"The Lottery† are extremely similar thematically in the sense that sheepishly following tradition can oftenRead MoreAnalysis Of The Book The Lottery 916 Words   |  4 Pages The Foreshadowing in â€Å"The Lottery† On a warm day in late June, villagers gather in the square to participate in a lottery run by Mr. Summers. The children arrive first and begin collecting stones until their parents call them to order. Mr. Summers calls each head of the household forward to a black wooden box, where each selects a slip of paper. Once the men have chosen, Mr. Summers allows everyone to open the paper and see who wins. Bill Hutchinson wins and his wife immediately starts protestingRead MoreAnalysis Of The Book The Lottery Essay1370 Words   |  6 PagesThe Lottery is a fictional account of a group of villagers who conduct a yearly ceremony to determine at random who among their community will be ritually sacrificed. The villagers have come to believe annual participation in this ceremony will result in good fortune. Specifically, it is believed the success of the corn harvest and continued provision of sustenance in the community can only be assured through human sacrifice. Though only a fiction, Th e Lottery conveys to the reader a messageRead MoreAnalysis Of The Book The Lottery 961 Words   |  4 Pagesname. Why has Jackson left out these seemingly significant details? The time and place in The Lottery are purposely dubious as a result of the focuses Jackson wished to make. Anyplace, at whatever time, individuals can be convinced to be supporters, to indiscriminately hold fast to custom, and to make substitutes. Notice that in the story, is the setting ambiguous, as well as the purpose behind the lottery is misty. Individuals in the town don t know why they are doing what they are doing, thus theyRead MoreAnalysis Of The Book The Lottery Jackson 919 Words   |  4 Pagesuses specific details to draw attention in certain points of the story. In the beginning of The Lottery Jackson provides us with specific details about the day on which the lottery takes place. She tells us the date â€Å"The morning of June 27th was clear and sunny, with the fresh warmth of a full-summer day† (Jackson 242), the time, â€Å"around ten o clock; in some towns there were so many people that the lottery took two days.† (Jackson 242) and the temperature, warm. Jackson applies the same attentionRead MoreAnalysis Of The Book The Lottery By Edgar Allan Poe970 Words   |  4 Pagesnot want their children to be reading. Shirley just wrote books that explained life, she made people see the truth in others. She wanted to see the capacity that humans had for evil. Her stories were mainly about the reality of life and its horrific truths. Throughout her times she had received numerous awards, Edgar Allan Poe Award had been just one out of many. During this time she had also received criticism about her writing. The Lottery, The Haunting of the Hill House, and We Have Always livedRead More Shirley Jacksons The Lottery 946 Words   |  4 PagesJackson wrote many short stories and even some books. They are more on the dark, witchlike side, however. Kelleher explains that Jackson stated in some interviews that she practiced magic. No one really knows if she was serious while practicing witchcraft or not, but it ended up helping her write h er stories http://www.literarytraveler.com/literary_articles/shirley_jackson_bennington.aspx). A major story that throws people for a loop is â€Å"The Lottery†. This was Jackson’s first short story and manyRead MoreState Lotteries1076 Words   |  5 PagesState Lotteries: Take a Second Look From the time the Europeans first landed on the Atlantic shore, lotteries have been a part of the American society. According to Will Spink, most states are currently operating a state lottery despite its bleak history in the U.S. (Spink 1). Since 1983, North Carolina has introduced lottery bills in the legislature every year (NC Christian 15). North Carolina Governor, Mike Easley, favors a lottery for increasing revenues for education (Analysis 2). HoweverRead MoreSymbolism in The Lottery, by Shirley Jackson Essay example1173 Words   |  5 PagesWhen most people play the lottery today, they think about having wealth. Generally, people who win are happy about it whether they win one dollar or a million. The lottery in our society has grown to support education and it is often worth several million dollars. Usually, the winner of the lottery gains a lot of recognition for the money they win. But what would happen if there was a small town where people held a yearly lottery in which the â€Å"winner† was the member of the town who was not sacrificedRead MoreAn Unkindness of Tradition: Shirley Jackson ´s Biography1624 Words   |  7 Pagespurely based on her life as a mother and wife. Before these were published, Jackson and her family found that she had periodic depression issues. This has been largely known to be the reasoning for her controversial writing of things such as â€Å"The Lottery†, which was published in The New Yorker in 1948. During this time Jackson jokingly described herself as a practicing witch (Grade Saver, 1999). This housewife-turned-witch persona caught a lot of attention and gave her a suitable career path to