Different Types Of Software Attacks Computer Science Essay

The movement in IT diligence acceptiond the confidence issues in a regularity or an organistion. Corporate organisations entertain lot of advices which are very sentient so they past a ample whole of coin for the confidence of these sentient advices. There are bulky ways in which a hacker invasions a certain network or an organisation. If one of the regularity in a network is confused then the hacker can get whole advice of the network. Precedently the hacker invasions it allure career on its target such as an contact, network, password, a cryptographic algorithm and so on.

In locomotive invasion the invasioners are locomotively onseting to design detriment to a network or regularity. This is the most careful mold of invasion gone most of the organisation’s operations stop on its precarious axioms. These invasions embody Denial of Exercise (DoS), Distributed Denial of Exercise (DDoS), buffer exuberance, spoofing, Man in the Middle (MITM), replay, TCP/IP hijacking, wardialing, dumpster diving and political engineering invasions.

DoS invasion is an disposely when a user or organisation is robbed of the exercises of a productions which is pure typically. DoS invasions, such as the Ping of Death (POD) and Teardrop invasions, interest custom of the limitations in the TCP/IP protocols.

Flooding the inbound network connections of a exercise subjoined a conjuncture unwanted advices

There are no straightforward remedies to this invasion. The best contrivefficacious ways to undecideden the commodities of this invasion are as follows.

Install and celebrate anti-poison softwares

Install a firewall and cast it to bind unauthorised incoming and outgoing network vary

Follow peculiar confidence exercises for distributing e-mail oration. Applying email filters manages unwanted vary.

All the disruptions in exercises are not DoS invasions. Typical ways to discbalance the DoS invasions are as follows:

DDoS invasion is an appended courseament of DoS invasion; it is an invasion where multiple confused regularitys are used to target a merely regularity causing a DoS invasion. Gone DDoS can invasion hundreds and thousands of regularitys concomitantly, it is generally used on Internet. The invasioner inducts DDoS software on all the confused regularitys and enlargees a circumnavigate invasion from all the confused deeds. This invasion typically balanceloads bandwidth, router modeing interval or network stack productionss, disturbance network connectivity of the martyrs.

Software ingredient complicated in a DDoS invasion embody the subjoined:

Client – The guide software used by the hacker to enenlightened invasions. The client straightforwards dispose to its inferior armys.

Daemon – It is a software program general on a inferior army. Daemon is the mode used for implementing the invasion.

13.2.3 Software Exploitation and Buffer Overflows

In software exploitation invasion a chunk of axioms or a continuity of disposes interest custom of the vulnerability in dispose to design unintended behaviour to a computer software or grievousware. Normally it is the blur in the programming of software which creates bugs subjoined a conjuncturein the software. One of the most spiritless bug is buffer exuberance where a undecided whole of remembrance has been allocated by the programmer

to attribute-of-business a peculiar whole of axioms. When the quantity of axioms written to the storage area exceeds the interval allocated, a buffer exuberance occurs causing the regularity to resonance, wherein it is left notorious to any usurper.

13.2.4 Spoofing

A spoofing invasion is a seat in which an idiosyncratical or a program luckyly masquerades as another by falsifying axioms and thereby gaining an unallowefficacious custom. In routers for transmiting packets the fate oration is merely required, but the rise oration is required merely when the fate responds to the sent packet. Hacker interests use of this vulnerability in the network and spoofs as the rise oration. MITM is an specimen of spoofing.

13.2.5 MITM Attack

In a MITM invasion, the invasioner intercepts notices in a national key vary and then retransmits them, substituting subjoined a conjuncture the invasioners own national key for the requested one, so that the two parties stagnant answer to be communicating subjoined a conjuncture each other. Gone in this scenario it invasions during the transmission, there are bulky processs used to settle this mode. The most present way is to transmit an encrypted minor axioms that must be signed precedently a negotiation can interest attribute. Some oncourse businesses entertain instituted processs such as pastnt keys to establish the artlessness of a customer precedently modeing an dispose.

13.2.6 Replay Attacks

A nonperformance of confidence in which advice is attribute-of-businessd subjoined a conjunctureout authorisation and then repestilential to legerdeocean the receiver into unauthorised operations such as bogus identification or evidence or a facsimile negotiation. For specimen, if notices from an authorised user is charmed and repel the contiguous day. Though the invasioner cannot notorious the encrypted notice but it can get into the network using this retransmission. This invasion can be prevented by appending the hash letter to the notice.

13.2.7 TCP/IP Hijacking

It is to-boot designated convocation hijacking. Convocation hijacking is a confidence invasion, carried out by an usurper, which onsets to infuse disposes into an locomotive login convocation. The most spiritless process of convocation hijacking is IP spoofing. In an IP spoofing, invasioner uses rise-routed IP packets that infuses disposes into an locomotive transmission among two nodes on a network. In this way the invasioner masquerades itself as one of the settled users.

13.2.8 Wardialing

Wardialing is using communication devices such as a modem to confront electronic devices that embodys regularitys that are alike to an pure network. Wardialing can be very arduous for some subjoined a conjuncture merely course as it hangs regularity. Wardialers typically hangs subjoined two rings or when a idiosyncratic answers or when it is unspiritless if supine. If there are bulky phone connections in an organisation then all of them allure begin outspoken concomitantly.

13.2.9 Political Engineering

In computer confidence, political engineering is a expression that describes a non-technical intervention that relies heavily on civilized interaction and repeatedly involves legerdemaining idiosyncraticals to rupture typical confidence procedures.

There are two ways of political engineering as follows:

An invasion reveals the user’s idiosyncratical advice such as recital indicate or password, political confidence sum that can be used for sameness depredation.

An invasion run an executefficacious polish in dispose to enjoin a poison, intimate, trojan or other malware on the regularity which can consequence in sameness depredation.

Pretexting

Pretexting is a devise of political engineering in which an idiosyncratical lies environing their sameness or design to accomplish irresponsible axioms environing another idiosyncratical. Pretexting can be achieveed by telephone or e-mail, through customer exercise messaging or an organisation’s Website. For specimen, the pretexter calls a martyr and communicates as the martyr’s financial organisation. The pretexter convinces the martyr to present far idiosyncratical advice. Once the pretexter gets the required advice of the martyrs recital then, these advices are used to pecupast from the martyr idiosyncratical recital. The expression political engineering was popularised by reformed regularity culpefficacious and confidence consultant Kevin Mitnick.

Phishing

Phishing is an e-mail abstraction process in which the inventor transmits out legitimate-looking e-mail in an onset to supplement idiosyncratical and financial advice from recipients for sameness depredation. For specimen, conjuncture notoriousing a financial organisation’s Website, it allure unhesitating for user indicate, ID, recital sum and password. The Website in which the advice was updated is a fake Website sent by the hacker to acquire idiosyncratical advice of the martyr.

These techniques used in phishing invasions are as follows:

Link composition – This technique shows a URL in the phishing notice which veritablely links to the phisher’s Website. This URL is made to contemppast homogeneous to the veritefficacious Website.

Filter sheet – Filters are set to warrant mitigated citation. Sometimes images of citation are used instead of the citation itself in dispose to get through the filters.

Website falsification – JavaScript are used to vary the browser’s oration bar so that a bogus Website contemplates as a veritefficacious Website in the oration bar. Balance invasions are to-boot contrivefficacious where the existent scripts on the veritefficacious Website are used supposing there are blurs in the script. Flash is used to blink citation in a multimedia appearance.

Phone phishing – Phishing is typically achieveed through e-mails subjoined a conjuncture order to another Website. Even phone notices can be used to entertain users dial an institution’s phone sum which is veritablely guideled by the phisher. Fake caller-ID advice can frame these invasions very pure.

13.2.10 Shoulder Surfing

Shoulder surfing employs to a straightforward remark, such as contemplateing balance an idiosyncratical’s shoulder contemppast at whatever they are entering to a devise or a ATM deed or a password.

13.2.11 Dumpster Diving

It is the exercise of exploration through wholesale or residential offal to confront items that entertain been discarded by their proprietors, but which may be conducive to the dumpster diver. Advice such as phone schedule, register or organisational chart can be used to aid an invasioner using political engineering techniques.

For balance advice on Political Engineering employ paragraph 2 Operational Organisational Security.

13.3 Unresisting Attacks

In unresisting invasion the hacker onset to pecupast advice attribute-of-businessd in a regularity by eavesdropping. The invasioner merely discovers the advice rather then altering, deleting or replacing the advice. This mold of invasion is oceanly used in cryptanalysis.

Vulnerability Scanning

Vulnerability scanning is momentous to hackers as courteous as the one who preserves a network. Hackers used this scanner to warrant infirmity in the regularity. Confidence administrator uses this to discbalance the blurs in the network and fix it.

Sniffing

Eavesdropping on a network is designated sniffing. A sniffer unallowablely captures axioms pestilential on a network. Sniffer software can be used to instructor and irritate network vary, discovering bottlenecks and problems. Tcpdump is the most spiritless UNIX sniffing implement and it is serviceefficacious subjoined a conjuncture most of the linux distributions.

13.4 Passaccount Attacks

Passaccount invasions are very spiritless invasions as they are comfortefficacious to perdevise subjoined a conjuncture lucky intervention. There are two molds of passaccount guessing invasion body fibre invasion and lexicon-naturalized invasion.

13.4.1 Body Fibre Attacks

This invasion consists of perplexing full contrivefficacious principle, concert or passaccount until the correct one is inspired. Gone the correct sum of letter used in a passaccount is estimated among 4 to 16 letters. So 100 divergent values can be used for each letter of a password, there are merely 1004 to 10016 passaccount concerts. Though the sum concert is ample stagnant it is exposed to body fibre invasion.

To acception the confidence opposite body fibre invasion:

Increase the elongation of the password

The passaccount should include letters other than sums, such as * or #

Should lay a 30 remedy retreat among failed evidence onsets

Add policies for locking the recital subjoined five failed evidence onsets

13.4.2 Dictionary-Based Attacks

A lexicon-naturalized invasion is a process of disturbance into a password-protected computer or server by regularityatically entering full account in a lexicon as a password. This invasion is not contrivefficacious on regularitys which employ multiple accounts or letters as password. These invasions are used by spammers.

13.5 Intolerant Principle Attacks

Malicious principle is a menace which is grievous to be blocked by antipoison software. Intolerant principles are auto executefficacious contacts. It can interest the devise of Java applets, ActiveX guides, plug-ins, pushed procureing, scripting languages or a sum of new programming languages intended to improve Web pages and e-mail. Usually the martyr is insensible of the intolerant principle invasion, making it virtually imcontrivefficacious to recognise an onset until it is too past. Protection opposite intolerant principle invasion should be prolocomotive and constantly updated subjoined a conjuncture the new set of invasions. The most imperilled intolerant principle onsets to way and delete, peculate, vary or complete unauthorised polishs. This invasion can pecupast passwords, polishs or other private axioms. Intolerant principle can to-boot delete, encrypt or alter polishs on a disk.

In a regularity intolerant principle blinks in peculiar areas. Some areas where the intolerant principle blinks are as follows:

E-mail

Web Content

Legitimate Sites

File Downloads

Pushed Content

13.6 Cryptographic Attacks

Cryptographic invasions are processs of evading the confidence of a cryptographic regularity by confronting infirmityes in the areas such as principles, ciphers, cryptographic protocol or key superintendence contrivance in the cryptographic algorithm. This invasion embodys backdoors, poisones, trojan, intimates, software exploitation and undecided keys.

13.6.1 Malware

It is software intended to inoculate a computer regularity subjoined a conjunctureout the submit of the proprietor. Malware embodys computer poisones, intimates, trojan horses and spyware.

Viruses

Virus is a program or side of principle that is enjoined onto a computer subjoined a conjunctureout the apprehension of the user and runs opposite the user’s wishes. Viruses can transmit themselves by appending to a polish or email or on a CD or on an apparent remembrance.

Viruses are classified into three parts

File polluteors – Polish polluteor poisones append themselves to program polishs, such as .COM or .EXE polishs. Polish polluteor poisones to-boot pollutes any program for which project is requested, such as .SYS, .OVL, .PRG, and .MNU polishs. These poisones enjoined when the program is enjoined.

System or boot-annals polluteors – These poisones pollute executefficacious principle in regularity areas on a disk. These poisones append to the DOS boot sector on diskettes or the Master Boot Annals on grievous disks. The scenario of boot annals polluteors is when the bountiful regularity is general and polishs on the diskette can be discbalance subjoined a conjunctureout triggering the boot disk poison. However, if the diskette is left in the despatch, and then the computer is morose off or restarted, then the computer allure original exploration in A despatch when it boots. It allure then enjoin the diskette subjoined a conjuncture its boot disk poison, enjoins it, and frames it temporarily imcontrivefficacious to use the grievous disk.

Macro poisones – These are the most spiritless poisones, and they do the lowest detriment. Macro poisones pollute Microsoft Account contact and typically infuse unwanted accounts or phrases.

Worms

A computer intimate is a self-contained program that is efficacious to spdiscbalance letteral copies of itself or its segments to other computer regularitys. Worms use ingredients of an bountiful regularity that are automatic and minute to the user. The intimates are discovered merely when their tempestuous response consumes regularity productionss, slowing or halting other tasks.

Trojan

Trojan horses are classified naturalized on how they nonperformance regularitys and detriment they design.

The seven ocean molds of trojan horses are as follows:

Remote Way Trojans

Data Sending Trojans

Destructive Trojans

Proxy Trojans

FTP Trojans

Security Software Disabler Trojans

DoS Invasion Trojans

Spyware

Spyware is a mold of malware that is grounded on regularitys and garners undecided whole of advice at a span environing the users subjoined a conjunctureout their apprehension. Spyware is Internet expressioninology for advertising attended software such as Adware. All adwares are not spywares. There are to-boot products that expose advertising but do not induct any tracking mechanism on the regularity. Spyware programs can garner manifold molds of idiosyncratical advice such as Internet surfing morality and Websites that entertain been visited. It can to-boot clash subjoined a conjuncture user’s guide on the regularity such as inducting appended software and redirecting Web browser soul. Updated antispywares is used to preserve spywares from invasioning the regularityr.

13.7 Paragraph Review Question

1. Which amongst the subjoined is an invasion in which hackers are locomotively onseting to design detriment to a regularity?

(A)

Worm invasion

(C)

Active invasion

(B)

Passaccount invasion

(D)

Malicious principle invasion

Which of the subjoined invasion balanceloads a bandwidth of a Website?

(A)

Trojan Horse

(C)

Spywares

(B)

Spoofing

(D)

DoS

Which of the subjoined invasion, where multiple confused regularitys are used to target a merely regularity?

(A)

DoS

(C)

Replay

(B)

DDoS

(D)

Spoofing

When one idiosyncratic or program luckyly masquerades as another by falsifying axioms and thereby gaining an unallowefficacious custom. Which of the subjoined defines this invasion?

(A)

Spoofing

(C)

DDoS

(B)

Trojan horse

(D)

Worm invasion

what mold of invasion is Replay invasion?

(A)

Passive invasion

(B)

Passaccount invasion

(C)

Active invasion

(D)

None of these

what mold of invasion is Sniffing ?

(A)

Passive invasion

(B)

Passaccount invasion

(C)

Active invasion

(D)

None of these

what mold of locomotive invasion is Phishing?

(A)

Replay invasion

(B)

Social engineering

(C)

Spoofing

(D)

DoS

Which of the subjoined is the invasion that employs to a straightforward remark or contemplateing balance a idiosyncraticals shoulder?

(A)

Dumpster driving

(C)

Shoulder surfing

(B)

Shoulder glancing

(D)

None of these

Which amongst the subjoined is the poison that pollutes Microsoft account contact and infuses unwanted accounts or phrases?

(A)

Trojan poison

(C)

Phishing poison

(B)

Boot annals poison

(D)

Macro poison

____________ is a devise of political engineering in which an idiosyncratical lies environing their sameness or design to accomplish irresponsible axioms environing another idiosyncratical.

(A)

Phishing

(C)

Pretexting

(B)

Dumpster driving

(D)

None of these

13.7.1 Answers

Summary

In this paragraph, Attacks, you learnt environing:

The divergent molds of invasions.

The molds of locomotive invasion such as DoS, DDoS, Replay, Political Engineering and so on.

The molds of unresisting invasions.

The molds of Password, Cryptographic and Intolerant invasions.

Ready to perfect your paper?

Order my Paper How it works
You place an order

To get started, you need to complete an order form on our website. Ask our Support managers for help if you got stuck on one of the steps.

We assign the best writer for you

Our manager will start searching for the writer once you've paid for the order. You will be able to communicate with the writer through our message system.

You review the finished work

When the paper is ready, you will receive notification and will be able to review it. You can ask for a free revision if you want to change anything in it.

You download your order

If you are satisfied with the paper, you can approve the order and download the final version in one of the available file formats.

Have a look at our samples

Expository essay
Paper title: Online Education
Academic level: Undergraduate (years 1-2)
Discipline: English 101
Paper Format: MLA format
Sources: 2
Analysis essay
Paper title: Advantages and Disadvantages of Lowering the Voting Age to Thirteen
Academic level: Undergraduate (years 1-2)
Discipline: Political sciences
Paper Format: APA
Sources: 1
Argumentative essay
Paper title: Keeping Animals in Zoos Is not Justifiable
Academic level: Undergraduate (years 1-2)
Discipline: Ethics
Paper Format: APA
Sources: 5
Cause & effect essay
Paper title: Placing Taxes on Junk Food and Fatty Snacks: Can we tax people healthy?
Academic level: High School
Discipline: Nutrition/Dietary
Paper Format: APA
Sources: 3
Compare & contract essay
Paper title: School Uniforms versus No School Uniforms
Academic level: Undergraduate (years 1-2)
Discipline: Education
Paper Format: Harvard
Sources: 3
Critical essay
Paper title: Having Cell Phones in Elementary School
Academic level: Undergraduate (years 1-2)
Discipline: Education
Paper Format: MLA
Sources: 3
Definition essay
Paper title: What is Fashion for Modern Teenagers?
Academic level: Undergraduate (years 1-2)
Discipline: Urban studies
Paper Format: MLA
Sources: 2
Descriptive essay
Paper title: Hollywood to Bollywood: What makes a movie good?
Academic level: Undergraduate (years 1-2)
Discipline: Film & theater studies
Paper Format: MLA
Sources: 2
Evaluation essay
Paper title: The Impact of Violent Games on Children
Academic level: Undergraduate (years 3-4)
Discipline: Psychology
Paper Format: Chicago
Sources: 2
Narrative essay
Paper title: Animals I Have Loved: What’s wrong with another shaggy dog story?
Academic level: High School
Discipline: Composition
Paper Format: Harvard
Sources: -

Used by over 20,000 students

We value our customers' feedback a great deal, and use it to constantly improve and enhance our services. Read on to discover some thoughts from students just like you!

Trustpilot logo 9.8
5/ 5

Good work!

Quick turnaround of a high quality piece of work. Expensive but in specific situations very valuable.

5/ 5

Bravo!

I was really stuck and this gave me the kick start I needed. Used it as they explained and found it so helpful.

5/ 5

Perfect!

I would definitely recommend Writemyessay.college any student who is finding it diff to write assignment. I am very pleased with the piece of work

5/ 5

Job Well Done!

Perhaps too good. Certainly gave me a huge learning curve at a shorter space of time. Great for a backbone to work on, then make it your own using your own efforts.

5/ 5

Perfect!

I am always satisfied with the services provided, and what I like the most is the understanding, which had helped a lot.

5/ 5

Brilliant!

I am never disappointed with this service and have tried many. I now trust that I will receive a good writer as the service ensures they understand your requirements prior to delivery.

5/ 5

Satisfied!

I'm very happy to cooperate with Writemyessay.college from the beginning of my studying, without their help I wouldn't be here. Thank you Writemyessay.college!

5/ 5

Thank You!

Excellent and professional service from all involved with Writemyessay.college all of the time.

Recently written papers

ID Topic / type Discipline / level Pages Delivered
1 2 3

Our core values

Confidentiality

We value confidentiality, are you worried that your professor will discover you used buy an essay service? Do not worry, that will never happen. You are anonymous in our services.

Plagiarism Free Paper

We provide only plagiarism free papers. Our writers use similarity index software to ensure that your paper meet academic requirements. All papers delivered are unique.

Strict Deadline

When you give us a deadline to deliver your paper, we deliver on time. We will update you in every stem of the way until the paper is delivered.

Professionalism

Our staffs and writers uphold the highest level of professionalism. We do not request unnecessary information and only communicate when neccesary.

Value for Money

We are committed to providing value for every dollar paid. Our refund policy is clear on ground for which we do a partial or full refund.

24/7 Support

We literally don’t sleep in order to serve you. We have a 24/7 customer support system where you can follow up on your orders.

Questions?

Ask our team

Want to contact us directly? No problem. We are always here for you.

Frequently Asked Buy an Essay Questions

See all
Is your service confidential?

When you place an order with our company, we ask you to provide us with such personal information as your name, phone number, and email address. We need this data to keep you updated on the important things related to your order or account, and never share it with any third parties. We also don’t use your contact details for spamming you.

Please note that our support team may contact you using only the phone number(s) stated on our website, such +1 (248) 599-2414 and/+44 (151) 528-2636. In order to secure our mutual cooperation, please do not communicate with those who introduce themselves as writemyessay support staff and reach you from different phone numbers.

Also, remember that we never ask you to provide your credit card information via phone conversations. You should enter this information only on PayPal or Gate2Shop billing forms when making an online payment on our website. The writemyessay support administrator will send a confirmation letter to your personal order page when your payment is received.

We also use a secure encrypted connection and do not store your private data if we do not need it anymore. For more details about how we ensure your confidentiality, check our Privacy Policy, which completely complies with the GDPR.

We offer original model papers that can be used legally in a number of ways if properly referenced:

  • As a source of arguments or ideas for your own research
  • As a source of additional understanding of the subject
  • Direct citing

Nonetheless, check your college’s/university’s policies, including their definition of plagiarism and paraphrasing before using our services. Make conscious decisions in regards to your education.

How do I order a paper from writemyessay?

We take care not only of your academic success, but also of your experience with us. That’s why we have made the process of placing your order as easy and fast as possible—usually, it takes no more than 2-3 minutes.

Let’s have a closer look at the simple steps you need to go through for submitting your order:

Fill in the order form.

Be sure to include specific instructions regarding your paper and to upload any of the required materials. If you have any questions while specifying your paper’s information, just click on the info sign at the end of every field name and you will see a detailed tip on what exact information is required.

Proceed with the payment.

After you are through with the order form, you will need to make a payment via a preferable system. Right after that, you will be automatically provided with your personal order page where you can track your order’s progress, provide additional requirements, and send messages to your writer or support manager.

A personal writer is assigned to your order.

Our qualified staff will choose the most suitable writer whose skills and experience match your field of study and paper’s details. In case the writer must have any particular software or literature in order to get the assignment done, please do not forget to mention this in your initial instructions.

Your paper is completed and delivered to your personal order page.

When the writer finishes your paper, it is delivered to your personal order page as a PDF document, available for preview only. You will be able to download an editable MS Word version of the order right after you click the “Approve” button in the “Files” tab of your personal order page. If any changes are to be applied to the paper, you are always welcome to request a free revision with a new deadline for the writer (be sure to check more information about this in our revision policy).

You can check how easy the process is by going to the order page and submitting your paper details right now.

Is there a money-back guarantee? If yes, how can I receive a refund?

You can get more details about possible types and terms of refunds on our official money-back guarantee page.

How will I receive a completed paper?

You will get the first version of your paper in a non-editable PDF format within the deadline. You are welcome to check it and inform us if any changes are needed. If everything is okay, and no amendments are necessary, you can approve the order and download the .doc file. If there are any issues you want to change, you can apply for a free revision and the writer will amend the paper according to your instructions.

If there happen to be any problems with downloading your paper, please contact our support team.

What if I’m not satisfied with my order?

If your paper needs some changes, you can apply for a free revision that is available for 7 days after your paper is approved. To use this option, you have a “Revision” button on your personal page.

After the 7-day period, you cannot apply for a free revision, though you still can use a paid revision option. The price of such a revision will differ depending on the number of amendments needed to be done. Please contact our support team to find out how we can help you with the amendments to your paper.

If you think our writer didn’t manage to follow your instructions, and as a result, your paper is of poor quality, please contact us and we will do our best to solve the problem.

If the revisions didn’t give the desired result, you can apply for a refund. Our dispute department will process your inquiry to find out what kind of refund we can give you. To find out more, please visit our money-back guarantee page.

How do I request a refund?

You can’t apply for a refund on certain stages of your order, like when the order is not finished by the writer yet.

When the paper is delivered, the “Refund” button on your personal order page becomes clickable.

On the relevant tab of your personal order page, you will also be able to choose the type of refund you’re demanding and the reason why you applying for it. As soon as you do that, our dispute department will start working on your inquiry. All kinds of refunds concerning the quality or the lateness of your paper should be requested within 14 days from the time the paper was delivered, as in 14 days your paper, will be automatically approved.

Your inquiry should be submitted by clicking the “Refund” button on your personal order page only.