Friday, December 27, 2019

Online Bullying Is Still Bullying - 1687 Words

Tyler Anzalone Professor Williams Research Paper 29 October 2015 Online Bullying is still Bullying For those who have been affected by the powerful outcomes of bullying, or have family, friends or peers who have been bullied, then it is known that it is a outrageous type of harassment. Bullying comes in all different shapes and sizes. It doesn t matter the type of situation it is still wrong. The issue of bullying has been discussed throughout schools across the nation and most of the time it is only addresses physical, verbal and relational bullying. Cyberbullying is often forgotten, especially if a school is not up to date on all the different types of social media that it can occur on. We learn a lot of about cyberbullying and how all the posts you share are viewed by hundreds of people from Orenstein’s essay in Rereading America. Many schools in the United States have attempted to stop cyberbullying but are having trouble because most parents do not know how much harm their children make on social media. Bullying happens everywhere: wor k places, schools, stores and anywhere that has a immature presence. I believe parents need to be more on top of their children’s social media accounts, and this could prevent most cyberbullying from occurring. In Orenstein’s essay, â€Å"Just Between You, Me and My 622 BFFS† we are pulled in to learn how everything you say on social media can be shared with hundreds of people, and this is one of the main reasons bullying occursShow MoreRelatedIs Bullying A Serious Problem?1176 Words   |  5 PagesHundreds of years bullying has been going on, how long will it finally stop? In the United States Suicide is the third leading cause of death among young people, resulting in about 4,400 deaths per year, according to the CDC. For every suicide among young people, there are at least 100 suicide attempts. Over 14 percent of high school students have considered suicide, and almost 7 percent have attempted it. Bullying is a Very serious social matter that needs to stop, Bullying related suicideRead MoreBullying Is The Act Of Aggressive And Unwanted Behavior1351 Words   |  6 PagesWhat is bullying? Bullying is the act of aggressive and unwanted behavior that involves intimidating and/or physically harming another person. Among school age children, bullying involves a power imbalance of the stronger attacking the weaker. Children who are victims of bullying often feel alone and powerless to change their situation. When a child is bullied he can feel isolated, and clinical depression and low self-confidence may develop. As a parent, you may not r ealize that your child is beingRead MoreCyber Bullying1455 Words   |  6 PagesRunning head: Bullying Issues 1 Bullying Issues: Cyber bullying vs. Traditional Bulllying Horache Allen Compostion1 Jan 29, 2013 Bullying Issues 2 Bullying Issues: Cyber Bullying vs. Traditional Bullying Are you a victim of cyber bullying? Or were you theRead MoreProtecting Youself and Others from Cyberbullying1835 Words   |  7 Pagesaround the world, come those who seem to make it their lifes mission to bring harm to others through a technological platform. The current state of cyber bullying is the worst it had ever been, because of not only the growth in what people are harassed for online, but because it often extends outside of the electronic world. Inasmuch, cyber bullying has grown so much larger than its ever been, and will probably continue to do so. In the same manner, what the victims are subjected to has been changingRead MoreCyber-bullying Bullying has been happening for generation after generation. Today’s society700 Words   |  3 PagesCyber-bullying Bullying has been happening for generation after generation. Today’s society made possible to bully people without being face to face. This type of bullying is called cyber-bullying. Teenagers uses theirs electronics advices as weapons to attack other people with hurtful things though the use of text messaging or social networking websites. Cyber-bullying can â€Å"damage a person emotionally† (Media). It can also make them have low self-esteem. In our society today, cyber-bullyingRead MoreIs Bullying A Serious Problem?1683 Words   |  7 PagesHistory of the Problem Bullying has been an ongoing problem all over the world for as long as people can remember. Bullying by definition is, to use superior strength or influence to intimidate (someone), typically to force him or her to do what one wants. Bullying is a very serious problem, victims of bullying are more prone to depression. Bullying does not affect just one group, it can happen to anyone making it a prevalent threat to all of society. Approximately 160,000 teens skip school everyRead MoreCyber Bullying Is More Common Than People1393 Words   |  6 Pagesme.† As we have moved into an era that revolves around technology, younger generations become more involved online. People are now connected and exposed in more ways than ever as social media platforms make personal information more accessible. This mantra of sticks and stones hardly applies to the virtual world as cyber bullying rates increase. Due to the increasing rates of cyber bullying related suicides and mass shootings, paren ts are naturally becoming more concerned for their children’s safetyRead MoreThe Necessity of Anti Bullying Laws1381 Words   |  6 PagesBullying can lead to many unwanted, harmful consequences for both the t victim and tbe perpetrator. There are many actions that are considered bullying as well as many different types of bullying, yet bullying laws already in place seem to be only consider specific types of bullying. If more thorough laws were put into place, instances of bullying would decrease to some degree. Therefore, the state or federal government should put bullying prevention laws into place. Bullying can take place inRead MoreBullying and the Internet Technology is and will be constantly changing, because of this cyber1500 Words   |  6 PagesBullying and the Internet Technology is and will be constantly changing, because of this cyber bullying is becoming more of a problem. Some advances in technology like being able to have x-rays, MRI’s have had a positive affect, while others like the cell phone, and social media have not. In about the last 25 years bullying has evolved from being picked on at school to being harassed through things like text messaging, social media, and email. In the past, bullying could happen anywhere like onRead MoreCyberbullying Is A Problem That Affects More Than One Third Of Adolescents1692 Words   |  7 Pagestechnology such as cellphones, and online chatrooms to communicate with friends and social circles. Many adolescents use this growing technology as a bridge between their everyday reality, and virtual reality, and sometimes, use this technology to intimidate and harass other students which is a form of cyberbullying. Jemica Carter and Wilson Feleta, authors of â€Å"Cyberbullying a 21st century health care phenomenon,† define cyberbullying as,â€Å"covert, psychological bullying [conveyed] through electronic mediums’†

Wednesday, December 18, 2019

Bipolar Disorder And Mental Health - 910 Words

One percent of American’s suffer with bipolar disorder but, unless you know someone who has the disorder or have it yourself you probably cannot define the disorder. Bipolar disorder is defined as a brain disorder that causes unusual shifts in mood, energy, activity levels, and the ability to carry out daily tasks by the National Institute of Mental Health. Or that is what the current definition for bipolar disorder is. Alan C. Swann in his article What is Bipolar Disorder says that we are far from a rigorous definition of bipolar disorder. Bipolar disorder is currently still being figured out, so therefore no concrete definition can be made. He also specifically states that bipolar is not to be confused with depression or mania, it is an illness just like the flu or diabetes. Many people think that just because you are bipolar that you are constantly having an episode. Being bipolar does not mean you are constantly moody or having â€Å"highs† or â€Å"lows†; bi polar people have normal days as well. There are different types of bipolar disorder; Bipolar I, Bipolar II, Bipolar Disorder Not Otherwise Specified (BP-NOS), and Cyclothmic Disorder or Clyclothmia. Symptoms of Bipolar I include: Manic episodes that can last up to seven days, and if the symptoms persist longer than seven days you can end up hospitalized. Symptoms of Bipolar II include: depressive episodes but no full blown manic episodes. Symptoms of BP-NOS include: you have symptoms of bipolar disorder, but none of themShow MoreRelatedBipolar Disorder And Mental Health934 Words   |  4 Pages Bipolar Disorder is otherwise known as manic-depressive illness. It is a brain disorder that causes shifts in moods, energy, activity levels, and the ability to carry out daily tasks. (Cite) These changes in behavior are outside of the norm as most people have ups and downs throughout their daily routines. But those with Bipolar Disorder experience shifts in mood that can be damaging to relationships, as well as their overall school and work performances. (Cite) I chose this disorder as the topicRead MoreBipolar Disorder And Mental Health1691 Words   |  7 PagesAccording to the National Institute of Mental Health, over 5 million individuals over the age of 18 are affected by bipolar disorder. Bipolar disorder is an illness that occurs with the brain and causes abnormal shifts in mood and energy. An individual with bipolar disorder will experience many ups and downs. These ups and downs are way different from the ups and downs an individual without the disorder will experience. B ipolar disorder is a lifelong condition and if not noticed, or treated properlyRead MoreBipolar Disorder And Mental Health Essay851 Words   |  4 Pagesexperience a mood disorder known as Bipolar Disorder. According to the National Institute of Mental Health about one percent of the American population have been diagnosed with bipolar disorder. Living with a person that has been diagnosed with bipolar disorder is very difficult, especially not knowing anything about bipolar. There are many questions to be asked. Such as what is the disorder? Is bipolar disorder heredity? How is the disorder treated? First of all, Bipolar Disorder, also known as manic-depressiveRead MoreBipolar Disorder And Mental Health855 Words   |  4 Pagesexperience a mood disorder known as Bipolar Disorder. According to the National Institute of Mental Health about one percent of the American population has been diagnosed with bipolar disorder. Living with a person that has been diagnosed with bipolar disorder is very difficult, especially not knowing anything about bipolar. There are many questions to be asked. Such as what is the disorder? Is bipolar disorder heredity? How is the disorder treated? First of all, Bipolar Disorder, also known as manic-depressiveRead MoreBipolar Disorder And Mental Health755 Words   |  4 PagesBipolar disorder has become more prevalent in the United States, particularly Bipolar Disorder II, which accounts for 30-50% of patients with depression (Thomas Hersen, 2002). Historically bipolar was known as manic depression (Thomas Hersen, 2002). According to National Institute of Mental Health (n. d.) â€Å"Most scientists agree that there is no single cause, rather many factors that act together to produce the illness or increase the risk† (NIMH, n. d.) Some of those factors can be family, workplaceRead MoreBipolar Disorder And Mental Health1840 Words   |  8 PagesInstitute of Mental Health (2015), bipolar disorder is a brain disorder that may cause random shifts in mood, energy, activity levels, and their ability to perform everyday tasks. There are different types of bipolar episodes; the high, euphoric episodes are known as mania, and the low, miserable episodes are known as depression. The median age, of those who are affected by this illness, is 25 years old. Although, it can start in early childhood, or as late as 50 years old. This mental illness doesRead MoreBipolar Disorder And Mental Health Issue1619 Words   |  7 Pages The word â€Å"bipolar† is commonly tossed around in our daily vocabulary to simply describe a person who is overly moody and easily irritated. However, the implications of the mental health issue, that is bipolar disorder, is much more complex than is implied. Bipolar disorder was first discovered in 1851 by French psychiatrist Jean-Pierre Falret who described the condition as â€Å"la folie circulaire† which literally translates to circular insanity (SeddlerRead MoreBipolar Disorder : Mental Health Condition981 Words   |  4 PagesBipolar disorder, or manic-depressive disorder, is a disorder characterized by extreme mood changes. An individual who suffers from this disorder can have extreme highs or extreme lows. They could go from being overly energetic and outgoing to feeling empty, depressed, angry and just completely worthless on a daily, weekly, monthly and or even yearly basis. Diagnosis, dramatic changes in one’s life, and even treatment can have a ser ious effect on an individual that is suffering from Bipolar disorderRead MoreBipolar Disorder : Mental Health Diagnosis797 Words   |  4 PagesBipolar disorder is a mental health diagnosis when a person can experience extremely different moods. It also can affect the brain during the progression of the illness. A person with this diagnosis usually experiences mood changes of extremely high moods/ manic or extremely low moods which look like depression. There are two different types of Bipolar disorders. The first is Bipolar I which is when a person’s mood can go to severe mania or severe depression. The second type is Bipolar II whichRead MoreDepression And Bipolar Disorder : The National Institute Of Mental Health Essay1358 Words   |  6 PagesDepression and Bipolar Disorder Whitney Keeton Mr. John Davis Jr., MFA, M. Ed. English Composition 1 - ENC 1101 Monday, Tuesday, and Thursday 6-10 PM Keiser University â€Æ' Depression and Bipolar Disorder The National Institute of Mental Health (NIMH) has stated that depression is a common but serious mood disorder. Depression is also a form of mental illness; that have many different types. Some of the types of depression are as follows: †¢ Persistent depressive disorder †¢ Perinatal depression †¢ Psychotic

Tuesday, December 10, 2019

Systematic Fuzzing Testing Of TLS Libraries -Myassignmenthelp.Com

Question: Discuss About The Systematic Fuzzing Testing Of TLS Libraries? Answer: Introduction Computer security is a major part of a business enterprise and the security threats associated with it is also a major point of concern. In the field of computer securities, vulnerability in the system is termed as a weakness which can eventually lead to dangerous threats. This can also be termed as a weakness which can eventually be used by unethical users or dangerous hackers for breaching into the system. This report includes a discussion about the Bleichenbacher attack whose main workings were based on damaging the SSL certificate of a network. This report also includes the possible threats available from this kind of attacks. Moreover, this report also includes the mitigation procedures that can be utilized in case of this type of attacks. Discussion This section of the report discusses about the main concepts of this bleichenbacher attack and the possible resources associated to it. Overview The ROBOT attack is also termed as a customized form of the Bleichenbacher that allows the use of a private key belonging to a TLS server for performing signing as well as RSA decryptions [1]. In addition, this type of attack can also be used to attack the HTTPS host in a website. Recent threat According to the ROBOT attack on the various vendor companies including Palo Alto network and IBM, there has been a new kind of Bleichenbacher attack which utilized the SSL vulnerabilities. The description of this type of attack was published by three researchers who were responsible for providing the reason for this. Their research was mainly done by running the Bleichenbacher attack algorithm against the known RSA key exchanges. This was followed by running through a modern set of TLS stacks which led to the discovery of vulnerable sites [2]. In addition, the researchers were also responsible for contacting these websites and working with the TLS stack vendors. Several websites found on the internet were affected which also included well-known websites like Paypal and Facebook. In addition, according to a report, 27 of the top 100 websites ranked by Alexa were affected by this kind of attack. Description of the attack The description of Bleichenbacher attack is termed to be the million message attack which is in place from the year 1998. The main workings of the Bleichenbacher attack involve sending various amounts of cipher texts in variations to a TLS server destination. This is the main reason for it to be considered as the original padding Oracle attack for TLS servers [3]. After receiving such amounts of cipher texts, the destination TLS server tries to decrypt the sent cipher texts and sends either one of the two error codes. These codes are mainly the failure in decrypting messaguse e or the messing up of padding message. By sending varied cipher texts to a TLS server and by analyzing the difference between the two received error codes, an attacker can construct the sequence of the message using one bit at a time. During this sending and receiving session of a TLS server, the attacker can hack in to the system to steal user credentials which will lead to a breach in the system. There have been many varied attempts of the Bleichenbacher attack which have been found to be the main cause for many types of breaches. According to the records of the python-rsa library in the year 2016, there have been reports of the Bleichenbacher attack. Moreover, a German security team was responsible in finding the evidence of this kind of attack in the XML encryption in the year 2012. Name Vulnerability type Patches F5 BIG-IP SSL vulnerability CVE-2017-6168 Citrix TLS Padding Oracle Vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway CVE-2017-17382 Bouncy Castle Fix in1.59 beta 9,Patch / Commit CVE-2017-13098 Cisco ACE Bleichenbacher Attack on TLS Affecting Cisco Products,End-of-Sale and End-of-Life CVE-2017-17428 Impact of the Bleichenbacher attack The Bleichenbacher is termed as a protocol attack on theories. However, there are no such types of attacks are ever seen to be executed closely. To address these, the secret forward ciphers, including the DHE and the ECDHE are applied which are not supposed to be vulnerable to the Bleichenbacher attack. In addition, the major TLS stacks support forward secrecy which is in turn supported by the browsers as well [4]. However, there are vulnerabilities in a small population of the world mainly due to presence of two factors. The one are those people who use RSA for various reasons and the other group of people who does not utilize the forward secrecies due to the need for passive monitoring requirements. There are also major companies who are adopting such means and their customers are the one who faces the risk. This is mainly because breaches in the system can lead to the theft of information from the system. This in turn will lead to the customers losing faith from the business [5]. As a result, the business will be heavily impacted which may result in the reduction of the brand image in the market Another impact of this kind of attack is the active TLS handshake. This attack can also be used to get the TLS server to accept arbitrary messages. This will lead to the formation of an incident relating to a man-in-the-middle attack. However, for an attacker to utilize the Bleichenbacher attack, it would require a long time for a successful breach which is termed as the biggest limitation of this kind of attack. Lastly, the Bleichenbacher attack can also be customized for various other kinds of attacks. The Bleichenbacher padding can be used to decrypt some other secret cipher which will then be used to crack any other recorded TLS session [6]. This is another impact which is to be mitigated strictly. Mitigation strategies For adopting standards to mitigate the risks required, there are several ways to do so. The first mitigation strategy is to identify the presence of patches to the system. This will help in making the system secure and address the vulnerabilities present in the system. In addition, the use of the Cisco ACE device must be avoided. Since a long time, this device was discontinued by Cisco and hence no updates of such devices are possible [7]. It was found that there are various hosts which still use this kind of devices. These kinds of devices cannot support any cipher suites and thus, they cannot be used for generating a secure TLS connections. The second mitigation standard is to disable the RSA encryption. The Bleichenbacher attack can only affect the TLS cipher related nodes that are associated with RSA encryption. In the modern times, almost all of the TLS stack servers are associated with Elliptic Curve Diffie-Hellman key exchange which needs the RSA encryption standards for signature related purposes. These nodes are considered to be risky as well as less secure [8]. Moreover, these nodes do not support any kind of forward secrecy ciphers. However, only the ciphers which start with TLS_RSA are to be disabled and not the ones with RSA signatures like DHE or ECDHE. The last option is to rate-limit the SSL handshakes from each individual IP addresses. If the TLS stack server includes a data plane which can be programmable, a simple tracking rule for keeping record of the TLS requests for each flow will be sufficient address it [9]. In addition, due to various attacks, the handshake operation of the TLS stack server is limited to less than 10 seconds. Vulnerabilities and future references The implementers of the TLS stack servers are considered for their replying mechanisms. They reply written messages for each text received. For foiling the padding attacks and the timing oracle attacks, the attackers need to reply with single error codes. In addition, this must be considered by replying at the same time. For addressing such vulnerabilities, the server administrator needs to develop a copy of the message and then make a comparison of the incoming message with the copy of the file developed. If there is a match, then there are no vulnerabilities [10]. If there is no match, only a single line error code will be sent. This helps in solving the padding oracle attacks and the timing oracle attacks. However, this can only be implemented by sophisticated and advanced programmers who have experience with the infosec requirements. Conclusion Thus, it can be concluded that the Bleichenbacher attack can cause heavy damages to any system. This will also be responsible for any company or organization to lose their brand images in the market. For this reason, the Bleichenbacher attack is termed to be a dangerous attack which utilizes the SSL vulnerability in any kind of system. It has been mentioned in this report about the list of the companies who have been found to be vulnerable. In addition, this report has also discussed the various impacts of the Bleichenbacher attack. Moreover, the mitigation strategies that can be adopted are also listed in this report. Lastly, this report has also discussed about the future applications which can be adopted to reduce the presence of any further attacks. References [1] Meyer, Christopher, Juraj Somorovsky, Eugen Weiss, Jrg Schwenk, Sebastian Schinzel, and Erik Tews. "Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks." InUSENIX Security Symposium, pp. 733-748. 2014. [2] Paar, Christoph, David Adrian, Emilia Kasper, J. Alex Halderman, Jens Steube, Juraj Somorovsky, Luke Valenta et al. "DROWN: Breaking TLS using SSLv2." (2016). [3] Jonsson, Jakob, Kathleen Moriarty, Burt Kaliski, and Andreas Rusch. "PKCS# 1: RSA Cryptography Specifications Version 2.2." (2016). [4] Bck, Hanno, Juraj Somorovsky, and Craig Young. "Return Of Bleichenbachers Oracle Threat (ROBOT)." (2017). [5] Sheffer, Y., R. Holz, and P. Saint-Andre.Summarizing known attacks on transport layer security (tls) and datagram tls (dtls). No. RFC 7457. 2015. [6] De Mulder, Elke, Michael Hutter, Mark E. Marson, and Peter Pearson. "Using Bleichenbachers solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: etended version."Journal of Cryptographic Engineering4, no. 1 (2014): 33-45. [7] Aviram, Nimrod, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta et al. "DROWN: Breaking TLS Using SSLv2." InUSENIX Security Symposium, pp. 689-706. 2016. [8] Holz, Ralph, Yaron Sheffer, and Peter Saint-Andre. "Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)." (2015). [9] Jager, Tibor, Jrg Schwenk, and Juraj Somorovsky. "On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption." InProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1185-1196. ACM, 2015. [10] Somorovsky, Juraj. "Systematic fuzzing and testing of TLS libraries." InProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1492-1504. ACM, 2016. [11] Jayalakshmi, Mrs N., and Mrs Nimmati Satheesh. "A STUDY ON OPEN SSL VULNERABILITIES WITH HEART BLEED WORM DETECTION."INTERNATIONAL JOURNAL(2015). [12] Dubeuf, Jeremy, David Hely, and Vincent Beroulle. "Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors." InInternational Workshop on Constructive Side-Channel Analysis and Secure Design, pp. 65-82. Springer, Cham, 2017.

Tuesday, December 3, 2019

The Big Secret free essay sample

Have you ever had a secret so huge and heart breaking? You lied about it to hide the truth from others, especially your parents. Some secrets can be painful or a surprise to others. I think my mom knew my secret but was in denial and was waiting for me to say it. Besides, since I thought she already knew I just ignored ever telling her until I left home for college. You want to know what my secret is. My secret is that I am a lesbian and have a girlfriend. The time I finally told my parents that I am a lesbian were when my girlfriend told her mom. It wasnt like I sat down and said Im gay. I waited and just told my mom that I have a girlfriend. Yes, she was disappointed. She was so mad and hurt that it even hurt me. During the months afterwards I felt bad when I told my mom that my girlfriend and I were going out because she didnt like it. We will write a custom essay sample on The Big Secret or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In addition to that, I felt bad because I am my moms only child and she wants me to have kids and be married to a man. However, thats not what I want. I dont want to get married to a man and dont even know if I want to get married to a woman. Marriage itself is a huge step no matter what the gender is. I usually lied to them on where I w as going or doing because I felt like I already embarrassed them. Sometimes I feel like my grandma is ashamed of my being gay because she doesnt want me telling anyone in school or even our family. She says shes not ashamed but I doubt that at times. Its like shes embarrassed but I mean I dont blame her because its not something every parent wants. At one time their anger and pain got to the point where they made me take my orientation off on my myspace that said Lesbian. This might be funny or dumb to you and I know you are probably thinking, oh thats it. Well this wasnt an easy secret that my parents can forgive you for or leave it alone. Although I was scared to tell her that I am gay I am scared to tell her that I might want to adopt. Yes, my grandma is still praying for me to find a nice young man to get married to and give her great children. Telling them that Ive been thinking of adoption just might make the situation worse than what it is. Its already weird and awkward to talk to your parents about sex or being in a relationship. Now imagine trying to talk to them about a relationship where the other person is the same gender as you. From time to time grandma might bring up how GOD didnt make it for woman and woman to be together but I told her that I believe that GOD wants to be happy which I am. I do believe that it is possible for gay people to go to heaven. Now as time flew by my parents have tried to accept it but I understand it is hard for them. Grandma says I have changed since I dont talk to her about everything I do and she says that Im becoming grown. Telling her everything I do is asking for too much from me. I have to grow up but I dont plan on doing this too soon. I want to grow up being independent, achieving my goals, and learning new things every day. As for my grandfather, I havent told him and I dont think I ever will. I am terrified and scared that he might just stop talking to me. The other day he had said the reason why we moved out of Adams Morgan in DC was because of gay people. I do feel like I am a disappointment to my parents but I am always being known as the girl in the family who is bragged about. My parents brags to everyone how well I do in school, how I have traveled to England and France, how I am in the band, and how I have a car and job. I dont want them to do this too much because Im not the type of person that wants or needs everyones praise or boost. I am the type of person that follows my heart, and do what I say I am going to do or what I believe is right. Most of my family knows and really doesnt have a problem with it. They just tell me to be careful, or if its what I want, they are not mad. However as time flies, my parents have become a little easy on me with that heartbreaking secret I held for so lon g. Now they just accept it, but from time to time my mom still brings up the question of if she will ever become a grandmother. I am happy that I told them because it was the responsible thing to do. Besides if you define gay, it will say happy and happy is something that I really am. Im happy I told them and Im happy of who and what I am.