Poetic Verses
Access
There is always that aged old saying that knowledge is power
This is well demonstrated by those in that intellectual tower
That ability to access and dispense any form of information
Can tend to give that feeling of confidence and self actulisation.
Who could remember, those days when the main recourse was the library
It was always a wonder to see how all those books arranged so systematically.
Now today the library stll has it volumes, but have also in its knowledge armour
That now seemingly well in demand, multidimentional tool called the computer.
It is remarkable that wherever you go realaxing in some little spot
There you wil find someone, very focused as they used that laptop
Even if you are travelling, by bus, car, train or even on the plane
There will be someone happily on board using one of them again.
Somehow equipment are supposed to assist, but sometimes they become the master
And we seem to be so adicted, that we employ them in almost every matter
Look how computers have intergrated, and interphased all our systems
It seems that all vital areas are now placed in their hands.
Having the capacity for storing, large amount of information
It has also been incoporated into banking, and used by corporation
Who has not used them as a medium, and that's their steady course
Through which lots of their work, could be easily outsourced.
Now it has been proven, because of the ability to have that download process
Some information can be readily access using external storage devices
This can be used for extortion, blackmail or just plain embarassment
So it is best to monitor and restrict users to a certain segment.
There are persons who seem to have the knack for programs
They seem to be able to access them no matter the circumstance
No matter what security code in employed, no matter what they do
These people called hackers, seem to know how to break through.
Even though we may love technology and the relief it may bring
Take caution and be careful of the type of information we may feed them
As can be seen nothing is foolproof,impregnable or inaccessible
Therefore use certain codes, which may make it unidentifiable.
This is well demonstrated by those in that intellectual tower
That ability to access and dispense any form of information
Can tend to give that feeling of confidence and self actulisation.
Who could remember, those days when the main recourse was the library
It was always a wonder to see how all those books arranged so systematically.
Now today the library stll has it volumes, but have also in its knowledge armour
That now seemingly well in demand, multidimentional tool called the computer.
It is remarkable that wherever you go realaxing in some little spot
There you wil find someone, very focused as they used that laptop
Even if you are travelling, by bus, car, train or even on the plane
There will be someone happily on board using one of them again.
Somehow equipment are supposed to assist, but sometimes they become the master
And we seem to be so adicted, that we employ them in almost every matter
Look how computers have intergrated, and interphased all our systems
It seems that all vital areas are now placed in their hands.
Having the capacity for storing, large amount of information
It has also been incoporated into banking, and used by corporation
Who has not used them as a medium, and that's their steady course
Through which lots of their work, could be easily outsourced.
Now it has been proven, because of the ability to have that download process
Some information can be readily access using external storage devices
This can be used for extortion, blackmail or just plain embarassment
So it is best to monitor and restrict users to a certain segment.
There are persons who seem to have the knack for programs
They seem to be able to access them no matter the circumstance
No matter what security code in employed, no matter what they do
These people called hackers, seem to know how to break through.
Even though we may love technology and the relief it may bring
Take caution and be careful of the type of information we may feed them
As can be seen nothing is foolproof,impregnable or inaccessible
Therefore use certain codes, which may make it unidentifiable.