Saturday, May 23, 2020
The Day Before Jesus Christ - 952 Words
On the night before Jesus Christ was crucified, the Lord organized the last meal called the last super with His disciples. Here during this meal, He established/instituted a sacrament of His body and blood. He did this as a memorial from everlasting to everlasting of all generation of Christians. A perpetual sacrifice of the cross for all ages and to build his church. As written in Matthew, ââ¬Å"And as they were eating, Jesus took bread, blessed and broke it, and gave it to the disciples and said, ââ¬â¢Take eat; this is my body.ââ¬â¢ Then He took the cup, and gave thanks, and gave it to them, saying, ââ¬ËDrink from it, all of you.ââ¬â¢ for this is my blood of the new covenant, which is shed for many for the remission of sins.â⬠(Matthew 26:26-28) The meaning of what Christ did is in the Eucharist - - The Mystery of our Faith. The bread and the wine. ââ¬Å"I am the living bread that came down from heaven; whoever eats this bread will live for- ever, and the bre ad that I will give is my flesh for the life of the world.â⬠(John 6:51). The body and the blood of Jesus Christ, the Eucharist is a mystery that no Christian can unravel and the church cannot explain in words. In the Liturgy of the Eucharist we declare, ââ¬Å"Christ has died. Christ is risen. Christ will come again.â⬠Our Lordââ¬â¢s death was His mission to die for the sins of the world. Whoever that believes in Him will have life and have it more abundantly. (John 10:10). Going away from His disciples was a journey in two stages. Calvary was theShow MoreRelatedJohn 14 : 2-3 ( Niv ) Essay979 Words à |à 4 Pagesall names, he holds the world in his hands, and one day Jesus promise us that he will come back and receive his children. ââ¬Å"My Fatherââ¬â¢s house has many rooms; if that were not so, would I have told you that I am going there to prepare a place for you? And if I go and prepare a place for you, I will come back and take you to be with me that you also may be where I am.â⬠John 14:2-3 (NIV). Can you picture it? The day when we can finally be with Jesus face to face, speaking to him directly as we do toRead MoreChrists Resurrection Essay923 Words à |à 4 P agesbodily resurrection of Jesus Christ from the dead is the greatest proof of Christianity. Everything else that was said or done by Christ and the apostles is secondary in importance to the resurrection. If the resurrection did not take place, then Christianity is a false religion built on lies. If it did take place, then Christ is God and the Christian faith is absolute truth. Without the resurrection, it is quite certain there would have been no Christian church. Did Christ actually rise from theRead MoreWho Is Jesus Christ? Essay1272 Words à |à 6 PagesThe name Jesus Christ spawns multiple feelings throughout cultures. Jesus Christ is also a name that has impacted everyone in a monumental way and is impacting all aspects of society. No matter how you feel about Jesus Christ, it is insurmountable to deny the fact that he is not an impactful figure in the world we live in today. The question that is frequently asked about this ponderous figure is ââ¬Å"who is Jesusâ⬠. Th is question does not hold only one individual answer, but withholds multiple answersRead MoreEssay about Gospel Of Matthew1027 Words à |à 5 Pagesonly one account of the Passion of Jesus Christ or they believe that each story is the same; whereas there are four separate Gospel accounts of the Passion of Our Lord. Each of these Gospel accounts supplements the others, however each gospel account of the crucifixion of Jesus is unique, not only in how the story is told but also in the events and features themselves. Matthew, Mark, Luke and John clearly present different portrayals of the death of Jesus Christ. By examining each account the readerRead MoreThe Between Jesus Christ And God The Father926 Words à |à 4 Pagesclaimed Jesus Christ and God the Father were different substances (hypostasis). Due to Arianismââ¬â¢s outrages claims Constantine, a Roman emperor, ordered all Bishops to gather and discuss the consensus of the relationship between Jesus Christ and God the Fathe r. They gathered in Nicea and created the Creed of Nicea in 325. The creed gave light to the relationship between Jesus Christ and God the Father. The Council of Nicea revealed four arguments to support the relationship between Jesus Christ and GodRead MoreJesus Christ s Miracles?1117 Words à |à 5 PagesJesus Christââ¬â¢s Miracles Jesus Christ has done many miracles and keeps creating miracles for thousands of people. He has healed the sick, blind, lame, and deaf. He has healed our souls when we were stuck in a depressing or stressful state of life. People still today are healed by Jesusââ¬â¢s touch. People today are still saved when they follow Christ. We all become enlightened when we read His words. He is not only the leader of Christianity He is also the Creator. He is the incarnation of God. HoweverRead MoreThe Resurrection Of Jesus A Historical Event1679 Words à |à 7 Pagesexaction. When Jesus rose from the grave, the impact was felt immediately and has continued to reverberate throughout the world. This is certainly why many people have attacked the resurrection and set out to disprove it and as Christians it is our job to defend this important part of history that determines the future of so many people. So in order to defend the greatest day in history one has to ask; is the resurrection of Je sus a historical event? Everyone agrees that Jesus Christ was a moral manRead MoreCounter Measure : Examining The Wmscog Just Like The Pharisees1378 Words à |à 6 PagesThe True WMSCOG Counter Measure: Examining the WMSCOG just like the Pharisees Is everything that people are discussing about the WMSCOG true? A lot, of people speak against the World Mission Society Church of God, Christ Ahnsahnghong and Heavenly Mother, it may seem that what they are speaking is true. But when you actually look at the context of what they are saying it is clearly seen that their behavior and actions are following the pattern of the pharisees 2,000 years ago. In the book of EcclesiastesRead MoreIn The Book Of Revelation, John Writes An Apocalyptic Letter1654 Words à |à 7 Pagesan apocalyptic letter each to the seven churches in the ancient Roman providence of Asia (The Bible Project). Before writing the letters, John of Patmos, or another John, is persecuted for preaching the Gospel; as punishment, he is exiled on an island called Patmos where he meets Jesus in a vision, seeing the risen Savior in His full glory. This becomes the start of Revelation where Jesus would tell John about the present events likely to happen with the future outcomes of history. This happened withRead MoreDefense of The Passion of the Christ Against Charges of Anti-Semitism806 Words à |à 4 PagesPassion of the Christ. Wrong. The controversial motion picture The Passion of the Christ has been at the height of discussion since first word of its inception. Throughout history both Christians and Jews have been at odds and many have taken their passions, perceptions, and perversions of the Cross of Christ to the extreme. The core issue is that the Jews have been blamed for the death of Jesus Christ. The movie Passion of the Christ portrayed the last twelve hours of Christs life before and up to
Tuesday, May 12, 2020
World War 1 A Short Timeline 1919-20
The Allies decide upon the terms of peace, a process they hope will shape the future of post-war Europe... Historians still debate the consequences of these decisions, especially those behind the Versailles Treaty. While experts have dialed back from the idea that Versailles automatically caused World War 2, you can make a strong case that the war guilt clause, the reparations demand and the whole imposition of Versailles on a new socialist government wounded the new Weimar regime so greatly that Hitler had an easier job of subverting the nation, taking power, and destroying huge parts of Europe. 1919 â⬠¢ January 18: Start of Paris peace negotiations. The Germans are not given a fair place at the table, as many in Germany were expecting given their armies were still on foreign land. The allies are deeply divided on their aims, with the French wanting to cripple Germany for centuries, and Woodrow Wilsons American delegation wanting a League of Nations (although the American people were much less keen on the idea.) There are a lot of nations present, but events are dominated by a small group.â⬠¢ June 21: The German High Seas Fleet is scuttled at Scapa Flow by the Germans rather than allow it to come into possession of the allies.â⬠¢ June 28th: The Treaty of Versailles is signed by Germany and the Allies. It is labelled a diktat in Germany, a dictated peace, not the negotiations they were hoping to be allowed to take part in. It probably damaged the hopes of peace in Europe for many years after, and will be the subject of books for many more.â⬠¢ September 10: The Trea ty of St Germain en Laye is signed by Austria and the Allies.br/>â⬠¢ November 27: The Treaty of Neuilly is signed by Bulgaria and the Allies. 1920 â⬠¢ June 4: The Treaty of Trianon is signed by Hungary and the Allies.â⬠¢ August 10: The Treaty of Sà ©vres is signed by the former Ottoman Empire and the Allies. As the Ottoman Empire no longer practically exists, more conflict follows. On the one hand, World War 1 was over. The armies of the Entente and Central Powers were no longer locked in battle, and the process of repairing the damage had begun (and in fields across Europe, continues to this day as bodies and munitions are still found in the soil.) On another hand, wars were still being waged. Smaller wars, but conflicts directly triggered by by the chaos of the war, and leading on after it, such as the Russian Civil War. A recent book has used this notion to study the end and extended it into the 1920s. Theres an argument you could look at the current middle east and extend the conflict yet further. Consequences, certainly. But the end game of a war that lasted much longer? Its a horrible notion which has attracted a lot of emotive writing. Back to the Start Page 1, 2, 3, 4, 5, 6, 7, 8
Wednesday, May 6, 2020
Google Hacking Free Essays
Google Hacking Abstract: Google hacking is the term used when a hacker tries to find vulnerable targets or sensitive data by using the Google search engine. In Google hacking hackers use search engine commands or complex search queries to locate sensitive data and vulnerable devices on the Internet. Keywords: hacking, hack, Google, Google hack, hacking techniques, attack, ethical hacking, search engines, search engine hacking What is Google Hacking? Google hacking is the term used when a hacker tries to find vulnerable targets or sensitive data by using the Google search engine. We will write a custom essay sample on Google Hacking or any similar topic only for you Order Now In Google hacking hackers use search engine commands or complex search queries to locate sensitive data and vulnerable devices on the Internet. Although Google hacking techniques are against Google terms of service1 and Google blocks wellknown Google hacking queries, nothing can stop hackers from crawling websites and launching Google queries. Google hacking can be used to locate vulnerable web servers and websites which are listed in the Google search engine database. In other words, hackers can locate many thousands of vulnerable websites, web servers and online devices all around the world and select their targets randomly. This kind of attack is most commonly launched by applying Google hacking techniques to satisfy junior hackers. It is obvious that the Google hacking procedure is based on certain keywords, which could be used effectively if they are used by some internal commands of the Google search engine. These commands can be used to help hackers narrow down their search to locate sensitive data or vulnerable devices. Nevertheless, the success of Google hacking techniques depends on the existence of vulnerable sites, servers and devices. However, we should not ignore the power of the search engines in providing information about the targets to the hackers in the reconnaissance phase. Beyond Vulnerability Malicious hackers can use Google hacking techniques to identify vulnerable sites and web servers for known vulnerabilities. In addition, they can look for error pages with the help of technical Page 1 of 8 nformation or retrieve files and directories with sensitive contents such as databases, passwords, log files, login pages or online devices such as IP cameras and network storage. Google Proxy Hackers can use the Google Translate service (http://translate. google. com/translate_t) as a proxy server to visit a website or translate the contents of the website or URLs without leaving any footprints. Figure 1: Google Translate Service. Google Cash Google copies the content of a website in its databa se. This function helps users to access the content of the website if the site is not available. However, a hacker can use this function to access and visit a targeted website without leaving any footprint and in complete anonymity. Figure 2: The red cycle indicates the link to access the Cached page. Page 2 of 8 Directory Listings Web server applications such as Apache and IIS provide facilities that a user can browse and navigate website directories by clicking on the directory name and links such as Parent Directories. The directories and their content can be listed if directory listing or directory browsing are enabled by the administrator. This vulnerability gives an unauthorized access to the files and it may help hackers to gain access to the information which can help them to hack a website or a web server or download its contents. Directory listings make the parent directory links available to browse directories and files. Hackers can locate the sensitive information and files just by simple browsing. In Google it is easy to find websites or web servers with enabled directory listings because the title of the pages start with the ââ¬Å"index ofâ⬠phrase so we can use index of in the search box to find the directory listings-enabled website. If we want to get better result from our search we can use this combination in the search box intitle:index. of or we can use intitle:index. of ââ¬Å"Parent Directoryâ⬠. Figure 3: The result of using intitle:index. of ââ¬Å"Parent Directoryâ⬠. It is obvious that with the first command we used the Google search engine to search in its database for the websites which have been listed with the title of ââ¬Å"Index ofâ⬠. In the second command we used Google to search for sites with the directory listings and with the keyword which is often found in the directory listings. Specific Directory Hackers can locate specific directories by using the directory name in their search queries. For instance to locate an ââ¬Å"adminâ⬠directory in addition to directory listings, the hacker can use these commands: intitle:index. of. admin or intitle:index. of inurl:admin. Page 3 of 8 Figure 4: The result of using intitle:index. of. admin. Specific File It is possible to search for a certain file by directory listings. For instance, to search for the password. mdb file, this search query can be used: intitle:index. of password. mdb . Figure 5: The result of using intitle:index. of. password. mdb. Specific File Extension Google lets users search its database for a specific file extension by using the filetype: command. For instance, if you want to search for pdf files, then you can use the query filetype:pdf in the search box. Server Information It is possible to use Google hacking techniques to determine the version of the web server application along with directory listings. This kind of information is vital to an attacker because it will à © Ali Jahangiri www. alijahangiri. rg Page 4 of 8 help him or her to use the best way to attack the web server. For instance, hackers can use the search query intitle:index. of ââ¬Å"server atâ⬠to find the web sites with vulnerable directory listings which are operated by an Apache server. Figure 6: The result of intitle:index. of ââ¬Å"server atâ⬠. Different versions of Microsoft IIS servers have wide usage all around the world. It would be easy to find the ser vers which are operated by Microsoft IIS 6. 0 servers, which are listed in the Google database by using the query ââ¬Å"Microsoft IIS/6. server atâ⬠on the Google search engine. Error Pages The error pages and warning pages are informative for hackers because these pages could be used to determine the vulnerability of the target. Most of the time hackers use the error messages as keywords or search phrase to find their targets. For instance, if you use ââ¬Å"Syntax error in query expression â⬠ââ¬âthe in the Google search box, you can find the websites which have this error message as an Access error message; this message can display path names, function names and filenames which are helpful for the hackers. Page 5 of 8 Figure 7: The result of ââ¬Å"Syntax error in query expression â⬠ââ¬âthe. Hackers may use Google to locate vulnerable servers by searching for the error pages of web servers such as IIS. The queries intitle:â⬠the page cannot be foundâ⬠and ââ¬Å"internet information servicesâ⬠can be used to search for IIS servers that present error 404. Default Pages Default pages are major sources of information about targets for hackers. They use Google to find live servers which are on the default page; most of the time, these servers have default configurations with many vulnerabilities. Login Pages The login pages can be use for brute force attacks and gain unauthorized access to the target. In addition, the login pages can be useful to provide information about the target server. For instance, if we use the search query allinurl:â⬠exchange/logon. aspâ⬠in the Google search box, we can find the login page of the Microsoft Outlook Web Access. For the typical login page in the web applications or portals which have been programmed by ASP, you can use inurl:login. asp or inurl:/admin/login. asp. Figure 8: The result of allinurl:â⬠exchange/logon. aspâ⬠. Locating CGI-BIN Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with web servers. Hackers can use Google to locate the CGI-BIN applications or pages to target. For instance, the search query inurl:/cgi-bin/login. cgi locates the login pages base on CGI-BIN. Online Devices It is possible to create special search phrases to locate online devices such as IP cameras, network storage and printers with Google. In this technique hackers use the default pages or the application names which vendors used for hardware and that have been supplied by vendors. à © Ali Jahangiri www. alijahangiri. org Page 6 of 8 For instance, if you want to locate AXIS Network cameras then you can apply the search phrase inurl:indexFrame. shtml Axis to find online AXIS cameras. Here is another example: to locate online Linksys network storage with the GigaDrive Utility, you can use the search phrase intitle:â⬠GigaDrive Utilityâ⬠in the Google Search box. Figure 9: The result of inurl:indexFrame. html Axis. Google Hacking Database There is an unofficial website (http://johnny. ihackstuff. com/ghdb. php) which acts as a database for hacking of Google. This database has been used since its creation in 2004 by the Google hacking community. You would be able to develop your own Google hacking database by studying the behaviour of the equipment and identifying the pages, page titles and files which can be cal led and accessed by user and which will be listed in Google. Disclaimer: ? This document is to educate, introduce and demonstrate Google hacking. You should not use the information which has been presented in this document for illegal or malicious attacks and you should not use the described techniques in an attempt to compromise any computer system. Ali Jahangiri operates a policy of continuous development. The information which this document contains reflects his understanding at the time when presented. Ali Jahangiri reserves the right to revise this document or withdraw it at any time without prior notice and states no obligation to update the data included in his document. The contents of this document are provided ââ¬Å"as isâ⬠. No warranties of any kind, either express or implied, including, but not limited to, the implied warranties of solutions and instructions for a particular purpose, are made in relation to the accuracy, reliability or contents of this document. Under no circumstances shall Ali Jahangiri be responsible for any loss of data or income or any special, incidental, consequential or indirect damage s howsoever caused. How to cite Google Hacking, Papers
Sunday, May 3, 2020
Sickening day Essay Example For Students
Sickening day Essay Does that excuse your lateness? She bellowed in an authoritative tone Looks like the Logans are going down in their standardsà I felt cheated and hurt that she had the cheek to criticise my family when she was so horrid. Its not my familys fault Miz.à She looked down on me as if I was muck on the classroom floor. Never Never answer back to me Cassie Logan, and you address me properly, I am a teacher not one of your friends, its Miz.Crocker to you not Miz. She paused and took in a deep breath of air You better go and get seated in your seat Logan child before you get a whipping. Now get moved. You know that feeling, the one deep down in your stomach?à The one that makes you feel as if its going to be one of those days? I had thatIm sure there are a hundred butterflies down there. I decided to get on with my sums and keep a low profile, I pulled out my math book and pencil 7+6=13à So 13 -7 must be 6these were too easy, I flew through the work and slipped into a blank daydream. See you all after the break. Class dismissed All the class stood up and sighed in relief, there were sounds of talking and laughter. Then silence, it was if a thundercloud had moved directly over our heads, I looked up to the front of the room, Mr.Granger and Mr.Jamison were talking to Miss.Crocker. After a few minutes of talking, Miss walked towards the front Cassie. Stacey.Here please, everyone else out. The children scampered toward s the door and out, Stacey and I walked to the front, I managed to shoot him the whats all this about? look and he shrugged his shoulders.à As we approached the 3 adults, Mr.Jamison took his hat off, and walked towards us, as he held his hat in front of his chest, I am sure I saw a tear in his crystal clear green eyes, I already knew what they were going to say, it was T.J..They didnt have to speak; I could see it in their eyes. A sort of forlorn stareMr.Jamison almost distant. Im sorry Mr.Jamison whispered, I shook my head in despair no! It cant be, oh pleasenot T.J. Once again my tears of emotion over took me, I broke down in a giant weep on the classroom floor. Stacey just said in a deep voice What has happened? This was typical of Stacey, he had to know all the facts before making a judgement or movement. Miss. Crocker cleared her throat Due to the behaviour of a Master. Avery, T.J., he has to be hanged later on today, you cant say that good-for nothing dont deserve it. She probably didnt feel any sympathy or remorse for T.J.She walked out of the classroom with her back to us all while Mr.Jamison put a firm hand on Staceys shoulder, Stacey shrugged it off YouYou all wanted dis to happen, all you whites. You all ate dat poor ole fellow. Stacey paused and sniffed, not letting his tears fall Well, I tell u something that ole nigger who you ate, he hes my best buddy, and you aint gonna kill him. Wait til my Papa and his Papa hear bouts you, going round Mr.Granger stopped Stacey from talking Look at that, Jamison, little black kid thinks hes like his father too! Huh, they all think they own the place. Oh lil kids you mightas well know dat your family have lost the land. Yeah, your decent family couldnt afford to keep it. Its public property now. His tone was sarcastic and hurtful. It was stabbing Stacey and I in the back and he knew it. You cant take the land, its ours, you mighta well take everything off us! Thats our livelihood, wait til my Papa hears bout dis Stacey stood in front of Granger, but facing Jamison II wanna comes wit you, I wanna see my ole pal, please? .uab3cef656eee64b84268d9ccc34df3be , .uab3cef656eee64b84268d9ccc34df3be .postImageUrl , .uab3cef656eee64b84268d9ccc34df3be .centered-text-area { min-height: 80px; position: relative; } .uab3cef656eee64b84268d9ccc34df3be , .uab3cef656eee64b84268d9ccc34df3be:hover , .uab3cef656eee64b84268d9ccc34df3be:visited , .uab3cef656eee64b84268d9ccc34df3be:active { border:0!important; } .uab3cef656eee64b84268d9ccc34df3be .clearfix:after { content: ""; display: table; clear: both; } .uab3cef656eee64b84268d9ccc34df3be { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uab3cef656eee64b84268d9ccc34df3be:active , .uab3cef656eee64b84268d9ccc34df3be:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uab3cef656eee64b84268d9ccc34df3be .centered-text-area { width: 100%; position: relative ; } .uab3cef656eee64b84268d9ccc34df3be .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uab3cef656eee64b84268d9ccc34df3be .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uab3cef656eee64b84268d9ccc34df3be .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uab3cef656eee64b84268d9ccc34df3be:hover .ctaButton { background-color: #34495E!important; } .uab3cef656eee64b84268d9ccc34df3be .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uab3cef656eee64b84268d9ccc34df3be .uab3cef656eee64b84268d9ccc34df3be-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uab3cef656eee64b84268d9ccc34df3be:after { content: ""; display: block; clear: both; } READ: Ap English Literature Essay PromptsThey looked at him as if he was from outer space. Big Mas faithful solicitor nodded his head If youre sure, it can be awful upsetting for lil ones.à Stacey looked at the two adults Its what T.J. woulda wantedà Jamison nodded Yes, I understandwell we better get you in to da car, Cassie dont suppose youre up for comin?à Could I cope with seeing one of the best friends I have die in such an explicit way? I thought about, Stacey was right, T.J. needs all the help he can get at this moment in time, and I would go. No matter what it did to me, it was our friend who we should be thinking of not us. A short and round white man whom I didnt recognise stood before us all. He was red in the face, I didnt know if it was through embarrassment or the Mississippi heat. He wiped his brow with a plump hand and began to speak Public people, you are invited hear today to witness four niggers get killed a cheer rippled over my head and about thirty adults pushed to the front, knocking me and Stacey to the ground. I dont think we should delay any longer, these blacks are Mr.Frethor, he knocked a white man to the ground only last week, Mr.Longerd he had the cheek to steal from a good store owner, Mr.Avery he murdered and stole of some good friends of this community A huge gasp was heard and finally Mr.Kijja he refused to move his vehicle on several occasions. Anyway on the with the showLadies and gentlemen have fun! A smile appeared on his face, and more whites rushed up to the front, I scanned the crowds for any blacks, There was only a family who we didnt recognise. As the four people who were convicted walked up to the front, I caught T.J.s eye, I mouthed sorry but what good was that going to do? T.J. looked even worse than he usually does, he was naked and his bones showed through his almost transparent, thin looking, skin, as they began to put the ropes round their thin necks, I closed my eyes. It was too unbearable to watch. Stacey grasped my hand tightly. We both needed some support. I could sense Stacey turning his head away; he had seen some things in his time-but nothing could even come close to this sickening day. Now for the good bit. The white man laughed and pulled away the station on which the four black boys and men stood. T.J. was coughing and spluttering, how could I help him? None of my plans were going to solve this one and I felt completely useless. Stacey kept his eyes locked on T.J., T.J. was fighting for breath like an exhausted athlete. Stacey clenched my hand harder, Lets go. He pulled me away from the cheering audience. He led me under a tree, there he collapsed. I stared at him, not knowing quite what to do. He was banging the sandy ground with his fists, fat tears rolling down his face, like snowballs down a mountain. Why? he kept on sobbing, I dont think it was an answer he was looking for, his dark face was buried in tin the sand while his fists banged the ground. I knelt down to him, the words got stuck in my throat, I was silent. I wish Papa were here to comfort Stacey. He was so alone now and he knew it. T.J. and Stacey were so close. What was the future going to hold out for Stacey? As far as Stacey was concerned, his life was over too. And what about the land? How can we survive without Papas work? Now Mamas out of a job, we need all the money.
Subscribe to:
Posts (Atom)