100% found this document useful (1 vote)
101 views65 pages

Cybersecurity Fundamentals 1st Edition Kutub Thakur All Chapters Instant Download

Thakur

Uploaded by

ofoggosehaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
101 views65 pages

Cybersecurity Fundamentals 1st Edition Kutub Thakur All Chapters Instant Download

Thakur

Uploaded by

ofoggosehaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Download the Full Version of textbook for Fast Typing at textbookfull.

com

Cybersecurity Fundamentals 1st Edition Kutub


Thakur

https://textbookfull.com/product/cybersecurity-
fundamentals-1st-edition-kutub-thakur/

OR CLICK BUTTON

DOWNLOAD NOW

Download More textbook Instantly Today - Get Yours Now at textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Cybersecurity Fundamentals: A Real-World Perspective Kutub


Thakur

https://textbookfull.com/product/cybersecurity-fundamentals-a-real-
world-perspective-kutub-thakur/

textboxfull.com

No Time Like Now 1st Edition Naz Kutub

https://textbookfull.com/product/no-time-like-now-1st-edition-naz-
kutub/

textboxfull.com

Approaching Almost Any Machine Learning Problem 1st


Edition Abhishek Thakur

https://textbookfull.com/product/approaching-almost-any-machine-
learning-problem-1st-edition-abhishek-thakur/

textboxfull.com

Management Education in India Perspectives and Practices


1st Edition Manish Thakur

https://textbookfull.com/product/management-education-in-india-
perspectives-and-practices-1st-edition-manish-thakur/

textboxfull.com
Work Education Gandhiji s Nai Talim And Community
Engagement 1st Edition Veera Thakur

https://textbookfull.com/product/work-education-gandhiji-s-nai-talim-
and-community-engagement-1st-edition-veera-thakur/

textboxfull.com

Sustainable Food Waste Management Concepts And Innovations


Monika Thakur

https://textbookfull.com/product/sustainable-food-waste-management-
concepts-and-innovations-monika-thakur/

textboxfull.com

Cybersecurity For Dummies 1st Edition Joseph Steinberg

https://textbookfull.com/product/cybersecurity-for-dummies-1st-
edition-joseph-steinberg/

textboxfull.com

Cybersecurity Analytics 1st Edition Rakesh M. Verma

https://textbookfull.com/product/cybersecurity-analytics-1st-edition-
rakesh-m-verma/

textboxfull.com

Cybersecurity and Applied Mathematics 1st Edition Leigh


Metcalf

https://textbookfull.com/product/cybersecurity-and-applied-
mathematics-1st-edition-leigh-metcalf/

textboxfull.com
Cybersecurity Fundamentals
Taylor & Francis
Taylor & Francis Group
http://taylorandfrancis.com
Cybersecurity Fundamentals
A Real-World Perspective

Dr Kutub Thakur
Dr Al-Sakib Khan Pathan
First edition published 2020
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press


2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

© 2020 Taylor & Francis Group, LLC


CRC Press is an imprint of Taylor & Francis Group, LLC

Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
The authors and publishers have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish in this form has not been
obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information storage
or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.
co.uk

Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.

ISBN: 978-0-367-47648-9 (hbk)


ISBN: 978-0-367-47250-4 (pbk)
ISBN: 978-1-003-03562-6 (ebk)

Typeset in Times
by codeMantra
“To my Father and Mother, Billal Thakur and Nurunnahar Parul”

Kutub Thakur

“To my Father, Abdus Salam Khan Pathan, and my Mother, Delowara Khanom”

Al-Sakib Khan Pathan


Taylor & Francis
Taylor & Francis Group
http://taylorandfrancis.com
Contents

Preface xiii
About the Authors xv

1.1 Introduction to Computers 1


1.2 History of Computers 2
1.2.1 First Generation (1937–1946) 3
1.2.2 Second Generation (1947–1962) 3
1.2.3 Third Generation (1963–1971) 3
1.2.4 Fourth Generation (1971–2010) 3
1.2.5 Fifth Generation (2010–Present) 3
1.3 Components of Modern Computer 4
1.3.1 Input
 Devices 4
1.3.2 Output
 Devices 6
1.3.3 Central Processing Unit (CPU) 6
1.3.4 Storage Components 7
1.3.5 Software Components 7
1.4 Future Machines 8
1.4.1 Artificial
 Intelligence 9
1.4.2 Quantum
 Computing 9
1.4.3 Nanotechnology 9
1.4.4 Parallel
 Processing 11
1.5 Introduction to Computer Networks 11
1.5.1 Network Topologies 12
1.5.2 Major Network Protocols 13
1.5.3 Elements of Computer Network 14
1.5.4 Types of Networks 14
1.6 The Internet Explored 14
1.6.1 History and Evolution of Internet 16
1.7 Internet in Today’s World 17
1.7.1 Telecommunication 18
1.7.2 Retail Sales 18
1.7.3 Education 18
1.7.4 Business Processes 18
1.8 Elements of the Internet 19
1.8.1 Internet Cloud 19
1.8.2 Edge Router 20
1.8.3 Core Router 20
1.8.4 Firewalls 20

vii
viii Contents

1.8.5 Switches 21
1.8.6 Hubs 21
1.8.7 Servers 22
1.8.8 Connectivity 22
1.8.9 Hosts 23
1.9 Internet Software Infrastructure & Protocols 23
1.9.1 IP Address 24
1.9.2 DNS Server 25
1.9.3 TCP/IP Protocol 26
1.9.4 HTTP 27
1.9.5 World Wide Web (WWW) 27
Sample Questions and Answers for What We Have Learned in Chapter 1 28
Sources 29

2.1 Introduction 31
2.2 Importance of Cybersecurity 32
2.3 Introduction to Cyberattacks 34
2.4 Objectives of Cyberattacks 35
2.4.1 Confidentiality Breach 36
2.4.2 Availability Breach 37
2.4.3 Integrity Breach 37
Sample Questions and Answers for What We Have Learned in Chapter 2 38
Sources 39

3 Types of Cyberattacks 41
3.1 Introduction 41
3.2 Denial of Service (DoS) 42
3.3 Distributed Denial of Service (DDoS) 43
3.4 Man-in-the-Middle (MITM) Attacks 44
3.5 Cryptojacking 45
3.6 SQL Injection 46
3.7 Spamming 47
3.8 Cyberterrorism 48
3.9 Digital Property Misappropriation 49
3.10 Zero-Day Exploitation 50
3.11 Phishing 51
3.12 Digital Vandalism 52
3.13 Cyberstalking 53
3.14 Cyber Frauds and Forgery 54
Sample Questions and Answers for What We Have Learned in Chapter 3 55
Sources 56

4.1 Introduction 59
4.2 Equifax Data Theft 60
Contents ix

4.3 VPNFilter Cyberattack 61


4.4 WannaCry Ransom Attack 62
4.5 Peta Cyberattack 64
4.6 US Election Manipulation 66
4.7 Power Grid Hacking 68
4.8 Shadow Network Attack 70
4.9 GitHub DDoS Attack 2018 71
4.10 Under Armor Account Hacking 73
Sample Questions and Answers for What We Have Learned in Chapter 4 74
Sources 75

5.1 Introduction 77
5.2 Viruses 78
5.3 Trojan Horse 80
5.4 Rootkit 82
5.5 Spyware 85
5.6 Worms 87
5.7 Adware 90
5.8 Scareware 92
5.9 Browser Hijacker 94
Sample Questions and Answers for What We Have Learned in Chapter 5 95
Sources 96

6 Securing Your Computers 99


6.1 Introduction 99
6.2 Firewall Settings 101
6.3 Antivirus Software 103
6.4 Anti-Spyware Software 105
6.5 Anti-Spam Software 106
6.6 Security Updates 108
6.7 Secure Browsing Settings 110
6.8 Scan Devices before Data Transfer 111
6.9 Social Engineering Attack Precautions 112
6.10 Miscellaneous Tips 113
Sample Questions and Answers for What We Have Learned in Chapter 6 115
Sources 116

7 Password Management 119


7.1 Introduction 119
7.2 Basics of Passwords 120
7.2.1 Threats to Passwords 122
7.2.2 Good and Bad about Passwords 123
7.2.3 How Do Bad Guys Hack Your Password? 124
7.3 Effective Password Management Tips 125
7.4 Creating and Managing Secure Passwords 126
x Contents

7.4.1 
Strong Password 127
7.4.2 Use of Biometrics 128
7.4.3 Two-Factor
 Authentication 129
7.4.4 Multi-Factor Authentication 131
7.4.4.1 What you know 132
7.4.4.2 What you are 132
7.4.4.3 What you have 132
7.4.5 One-Time Password (OTP) 132
7.4.6 Using Password Managers 133
7.4.6.1 Main reasons to use a password manager 135
7.5 Password Manager Tools 135
7.5.1 Dashlane 135
7.5.2 LastPass 137
7.5.3 ZOHO Vault 138
7.5.4 KeePass 140
7.5.5 RoboForm 141
Sample Questions and Answers for What We Have Learned in Chapter 7 143
Sources 144

8.1 Introduction 147


8.2 Algorithms and Techniques 150
8.2.1 Cyberattack Detection 151
8.2.2 Cyberattack Prediction 153
8.2.3 Cyberattack Prevention 154
8.3 Firewalls 156
8.3.1 Activating Windows Firewall 157
8.3.1.1 Windows 10 firewall 157
8.3.1.2 Windows 7 firewall 158
8.3.1.3 Enabling Windows 7 firewall 158
8.3.1.4 Enabling Windows firewall service 162
8.3.2 Traffic Issues 163
8.3.2.1 What are traffic rules? 163
8.3.2.2 Creating a new inbound rule 164
8.3.2.3 Creating outbound rule 167
8.3.2.4 Creating connection security rule 167
8.3.2.5 What is the monitoring feature on advanced
firewall settings? 170
8.4 Intrusion Detection/Prevention Systems 171
8.4.1 Intrusion Detection System (IDS) 171
8.4.2 Intrusion Prevention System (IPS) 172
8.5 Authentication Using Hash 174
8.5.1 Message Digest 5 175
8.5.2 Secure Hash Algorithm 176
8.6 Multi-Factor Authentication 176
8.6.1 Activating Two-Factor Authentication 177
Contents xi

8.6.2 Creating Application Specific Passwords 182


8.6.3 What If Your Phone with All Apps Enabled Is Lost? 185
8.7 Mac Computer Firewall Configuration 186
8.7.1 Important
 Note 189
8.8 Choosing the Right Browser 190
8.9 Secure Sockets Layer 193
8.10 Virtual Private Network 196
Sample Questions and Answers for What We Have Learned in Chapter 8 198
Sources 199

9.1 Introduction 201


9.2 LAN Vulnerabilities 203
9.2.1 Reconnaissance
 Vulnerability 205
9.2.2 Resource Stealing and Invasion 205
9.2.3 Rogue Access Points (APs) 206
9.2.4 STA and AP Plain Text Transaction 207
9.2.5 Denial of Service (DoS) 207
9.2.6 Default AP Configuration 207
9.2.7 Rogue
 Insiders 208
9.2.8 Protocol
 Vulnerabilities 208
9.2.9 Ad Hoc Network Mode Security Problems 209
9.3 Wireless WAN Vulnerabilities 210
9.4 IoT Vulnerabilities 211
9.5 Wireless Network Security Measures 212
9.5.1 Modify Default Configuration 213
9.5.2 Wireless Router Location 214
9.5.3 Update Router Software 214
9.5.4 Stronger Encryption Algorithms 215
9.5.5 MAC Address Filtering 215
9.6 Useful Tips on Safe Use of Wireless Network 216
Sample Questions and Answers for What We Have Learned in Chapter 9 217
Sources 218

10.1 Introduction 221


10.2 HTTP Websites 223
10.2.1 Hypertext Transfer Protocol Secure (HTTPS) 224
10.2.2 Installing Security Certificate on Windows IIS Server 226
10.2.3 How SSL Encryption Works 230
10.3 Secure Electronic Transactions (SET) 230
10.3.1 What Is SET Transaction Flow? 231
10.3.2 Main Features of SET Technology 233
10.3.3 Key Stakeholders of SET Protocol 233
10.4 Web Fraud Detection Systems 234
10.4.1 What Is a Card Not Present Transaction? 235
xii Contents

10.4.2 Workflow of Web Fraud Detection System 235


10.4.3 What Algorithms Are Used in WFDS? 236
10.5 Browser Cache Clearing 236
10.5.1 Google Chrome 237
10.5.2 Mozilla Firefox 239
10.5.3 Internet Explorer 241
10.6 Frequent Password Changes 242
10.7 Updating OS 244
10.7.1 Updating Windows 10 245
10.7.2 Updating Windows 7 246
10.8 Updating Apps 248
10.8.1 Updating Google Chrome Application 249
10.8.2 Important Computer Application Updaters 250
10.9 Useful Tips on Safe Browsing and Online Shopping 251
Sample Questions and Answers for What We Have Learned in Chapter 10 252
Sources 253

11 Mobile Device Security 255


11.1 Introduction 255
11.2 Importance of Mobile Security 257
11.3 Types of Mobile Platforms 257
11.3.1 Android Operating System 259
11.3.2 iOS Operating System 259
11.4 Locked Branded Phones 260
11.5 Android Phone Security Guidelines 261
11.5.1 Guidelines for Security 261
11.5.2 How to Enable Biometric Security on Android Phone 263
11.6 iPhone Security Guidelines 266
11.6.1 Major Guidelines for iPhone Security 266
11.6.2 How to Enable Biometric Security on Apple iPhone 267
11.7 Windows Phone Security Guidelines 269
11.8 Mobile Application Management 271
Sample Questions and Answers for What We Have Learned in Chapter 11 273
Sources 274

12 Cybersecurity Standards 275


12.1 Introduction 275
12.2 ISO/IEC 27001 & 27002 Standards 276
12.3 Information Security Forum (ISF) Standards 277
12.4 Payment Card Industry Data Security Standard (PCI/DSS) 278
Sample Questions and Answers for What We Have Learned in Chapter 12 279
Sources 279

Index 281
Preface

This book describes the detailed concepts of computer networks and cybersecurity.
It talks about the types of major computer malware programs and the major
cybersecurity attacks that shook the cyber world in recent years. The details of the
major attacks and their impacts on the global economy are analyzed. The details of
the malware codes that help the hacker initiate hacking attacks on networks are also
described in length.
A few chapters are fully dedicated to high-tech cybersecurity programs, devices,
and mechanisms that are extensively adopted in modern security systems. The exam-
ples of those systems include intrusion detection systems (IDS), intrusion prevention
systems (IPS), and security firewalls. The general prevention mechanisms from the
cyberattacks are detailed in a couple of dedicated chapters.
Password management with modern technologies that help to create and manage
passwords more effectively is described in full detail. This book also covers aspects of
wireless networks and their security mechanisms. Details of commonly used wired and
Wi-Fi routers are provided with step-by-step procedures to configure and secure them
more efficiently.
This book is designed for users to benefit from the following major issues related to
the computer and network security:

• Detailed knowledge of computer and networks


• Knowledge of major cybersecurity threats and their impact on the world
• Knowledge of major cyber threats and computer malware programs
• Knowledge of cybersecurity and its importance in the modern world
• Details of major cybersecurity mechanisms
• Cybersecurity aspects of wireless networks and routers
• Step-by-step procedures on how to browse securely on the Internet
• Step-by-step guidelines on how to shop securely on the Internet
• Knowledge of mobile security to secure the mobile devices more effectively
• Details about the types of digital fraud carried out in the cyber environment
• Knowledge of how to make your online presence more secure and reliable
• Details about what to do and what not to do in the web environment to main-
tain the security of your digital resources
• Details of the major cybersecurity standards that help secure digital activities
and resources

xiii
xiv Preface

We hope that this book will offer great benefits to the students of graduate and under-
graduate classes, researchers, and practitioners. This could be a suitable textbook for
even non-CS (computer science) students or students who want to learn about basic
computer networking, security issues, and cybersecurity issues.

Kutub Thakur, PhD


Professional Security Studies Faculty,
New Jersey City University, NJ 07305-1597, USA
[email protected]

Al-Sakib Khan Pathan, PhD, SMIEEE


Department of Computer Science and Engineering,
Independent University, Dhaka, Bangladesh
[email protected]
About the Authors

Kutub Thakur is the Director of NJCU Center for


Cyber Security, and Assistant Professor and Director
of Cybersecurity Program at New Jersey City
University. He worked for various private and public
entities such as the United Nations, Lehman Brothers,
Barclays Capital, ConEdison, City University of New
York, and the Metropolitan Transport Authority. He
received his PhD in Computer Science with specializa-
tion in cybersecurity from Pace University, New York;
M.S in Engineering Electrical and Computer Control
Systems from the University of Wisconsin; B.S and
A.A.S in Computer Systems Technology from the City
University of New York. He reviewed for many pres-
tigious journals and published many papers in repu-
table journals and conferences. His research interests include digital forensics, network
security, machine learning, IoT security, privacy, and security and user behavior. He is
currently serving/served as the Program Chair for many conferences and workshops.
He is also currently supervising/supervised many graduate and doctoral students for
their thesis, proposal, and dissertation in the field of cybersecurity.

Al-Sakib Khan Pathan is a Professor of Computer


Science and Engineering. Currently, he is with the
Independent University, Bangladesh, as an Adjunct
Professor. He received his PhD in Computer
Engineering in 2009 from Kyung Hee University,
South Korea, and BSc degree in Computer Science
and Information Technology from Islamic University
of Technology (IUT), Bangladesh, in 2003. In his
academic career so far, he has worked as a Faculty
Member at the CSE Department of Southeast
University, Bangladesh, during 2015–2020; Computer
Science Department, International Islamic University
Malaysia (IIUM), Malaysia, during 2010–2015; at
BRACU, Bangladesh, during 2009–2010; and at NSU, Bangladesh, during 20 04–2005.
He was a Guest Lecturer for the STEP project at the Department of Technical and
Vocational Education, Islamic University of Technology, Bangladesh, in 2018. He
has also worked as a Researcher at Networking Lab, Kyung Hee University, South

xv
xvi About the Authors

Korea, from September 2005 to August 2009, where he completed his MS leading
to PhD. His research interests include wireless sensor networks, network security,
cloud computing, and e-services technologies. Currently, he is also working on some
multidisciplinary issues. He is a recipient of several awards/best paper awards and has
several notable publications in these areas. So far, he has delivered over 20 keynotes
and invited speeches at various international conferences and events. He has served as
a General Chair, Organizing Committee Member, and Technical Program Committee
(TPC) member in numerous top-ranked international conferences/workshops such as
INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP,
IWCMC, VTC, HPCC, and SGIoT. He was awarded the IEEE Outstanding Leadership
Award for his role in the IEEE GreenCom’13 conference. He is currently serving as
the Editor-in-Chief of International Journal of Computers and Applications, Taylor
& Francis; Associate Technical Editor of IEEE Communications Magazine; Editor of
Ad Hoc and Sensor Wireless Networks, Old City Publishing, International Journal
of Sensor Networks, Inderscience Publishers, and Malaysian Journal of Computer
Science; an Associate Editor of International Journal of Computational Science and
Engineering, Inderscience; Area Editor of International Journal of Communication
Networks and Information Security; Guest Editor of many special issues of top-ranked
journals; and Editor/Author of 21 books. One of his books has been included twice in
Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st
half of 2014; three books were included in IEEE Communications Society’s (IEEE
ComSoc) Best Readings in Communications and Information Systems Security, 2013;
two other books were indexed with all the titles (chapters) in Elsevier’s acclaimed
abstract and citation database, Scopus, in February 2015; and a seventh book is trans-
lated to simplified Chinese language from English version. Also, two of his journal
papers and one conference paper were included under different categories in IEEE
Communications Society’s (IEEE ComSoc) Best Readings Topics on Communications
and Information Systems Security, 2013. He also serves as a referee of many presti-
gious journals. He has received awards for his reviewing activities, including one of
the most active reviewers of IAJIT several times and Elsevier Outstanding Reviewer
for Computer Networks, Ad Hoc Networks, FGCS, and JNCA in multiple years. He is
a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.
Computers and
Networks 1

1.1 INTRODUCTION TO COMPUTERS


Computer is an electronic device that takes the raw data through the input components
and processes that into meaningful information and produces that information
through the output components of the device for use. A complete unit of modern
computer system consists of many components, which can be classified into two major
categories – referred to as the software components and the hardware components as
shown in Figure 1.1.
The software components consist of the following:

• Firmware
• Operating system or OS software

1
2 Cybersecurity Fundamentals

FIGURE 1.1 Personal computer (PC).

• Device drivers
• Application software

And, the hardware components consist of the following:

• Central processing unit (CPU)


• Data storage
• Input devices
• Output devices (input and output devices are often together called “I/O devices”)

Every software and hardware component can consist of many other small hardware and
software items, which altogether form a modern computer machine that we use for our
day-to-day activities.

1.2 HISTORY OF COMPUTERS


The history of computers dates back to the 19th century when an English mathemati-
cian Charles Babbage first designed a computer named as “Analytic Engine”. That
basic design lays the foundation for the evolution of computers to the modern shape
and scale.
The history of computers can be divided into five major eras or generations as
described below.
1 • Computers and Networks 3

1.2.1 First Generation (1937–1946)


The first-generation computers were based on the vacuum tubes. The first machine was
invented by J P Eckert and J W Mauchy between 1943 and 1945. It was a huge machine
developed in the state of Pennsylvania in the United States. The name of this machine
was Electronic Numerical Integrator and Computer (ENIAC). This machine consisted
of over 20 thousand vacuum tubes, 70 thousand resistors, and 10 thousand capacitors.
The gigantic machine weighed about 30 tons. When it was first powered up, a big dip in
power was observed in many surrounding areas of the state.

1.2.2 Second Generation (1947–1962)


The second-generation computers were based on the transistor technology. The first
commercial computer named as Universal Automatic Computer (UNIVAC 1) was
based on the transistor technology. It was launched in 1951. IBM launched 650 and
700 series computers in 1953. A large number of computer programming languages
emerged in the marketplace. The assembly languages got grounds in this computer era.

1.2.3 Third Generation (1963–1971)


The third-generation computers were based on the integrated circuits or ICs. The advent
of silicon material miniaturized the size of the transistors, and ICs were built for the
electronic circuitries. The punch cards were replaced by the keyboards and new operat-
ing systems emerged, which were able to run more than one application simultaneously.
The examples of third-generation computers include IBM 360 & 370 and DPD 11.

1.2.4 Fourth Generation (1971–2010)


The fourth-generation computers became very popular with the masses. These com-
puters were mostly based on the very large-scale integration (VLSI) microprocessors.
Many new companies and manufacturers of computers emerged in this tenure. New
types of machines were introduced with many different types of operating systems
and technologies. Personal computers (PCs), laptops, personal digital assistants (PDAs),
and other computer machines were introduced under this generation of computers.
Windows, Linux, UNIX, Solaris, and Macintosh operating systems were introduced in
this era as well.

1.2.5 Fifth Generation (2010–Present)


The fifth-generation computers are those machines that are substantially powered by
the artificial intelligence (AI) and ultra-large-scale integration (ULSI) and robotic
processes. Although the use of AI started long before 2010, the higher level of influence
4 Cybersecurity Fundamentals

started in the present decade. This generation includes the new computers such as IBM
Watson, multicore processing machines, distributed processing machines, and the latest
AI-enabled mobile devices and tablets.

1.3 COMPONENTS OF MODERN COMPUTER


As a machine, computer has evolved from first-generation computer to the modern day’s
fifth-generation computer machine by passing through many changes in the software
and hardware components. The components explained below form a modern computer
device extensively used in our regular life and industries nowadays. A few images of
modern computers are shown in Figure 1.2.

1.3.1 Input Devices
The input devices of a computer are those components that are connected to the com-
puter to insert raw data in different formats for processing purpose. A few major input
and output devices are shown in Figure 1.3.
The major input devices for our modern computers include the following:

• Keyboard
• Microphone
• Barcode reader
• Camera
• Electronic pen
• Joystick

FIGURE 1.2 Modern computers.


1 • Computers and Networks 5

FIGURE 1.3 Computer input/output devices.

• MIDI (Musical Instrument Digital Interface) port


• Pointing devices
• Gamepad
• Touch screen
• Wireless antenna
• USB (Universal Serial Bus) port
• Scanner
• Motion sensor
6 Cybersecurity Fundamentals

1.3.2 Output Devices
The output devices of a computer are those components that are connected to the
computer for producing meaningful information processed from the raw data inserted
through input devices. The major output devices of a modern computer include the
following:

• Monitor
• Printer
• Speaker
• Headphone
• Projector
• Plotter
• Computer Output Microfilm (COM)

1.3.3 Central Processing Unit (CPU)


The CPU is the brain of computer that controls the entire functionalities of the machine.
It takes the raw data from the input devices, processes the data to generate meaningful
information, and sends out the information to output devices or saves it on the data stor-
age. Figure 1.4 shows the CPU unit.
The major components of a CPU include the following:

• Arithmetic logic unit (ALU)


• Random access memory (RAM)
• Read-only memory (ROM)
• Control unit (CU)

FIGURE 1.4 Central processing unit (CPU).


1 • Computers and Networks 7

FIGURE 1.5 Data storage devices.

1.3.4 Storage Components
The storage component of a computer is the data storage bank to keep the data saved
on the secondary location, where the data can be easily accessed and managed
(Figure 1.5).
The storage components include the following:

• Hard disk drive (HDD)


• Flash disk drive (FDD)
• Optical disk drive (ODD)
• Magnetic tapes

1.3.5 Software Components
A computer is the combination of hardware and software components. All hardware
components mentioned above are dumb and deaf without the power of software
components of a computer. Figure 1.6 shows some of the software running on a
computer.
The major software components of a computer include the following:

• OS software
• Component drivers
• Application software
• Utility software
• Firmware
8 Cybersecurity Fundamentals

FIGURE 1.6 Computer software.

1.4 FUTURE MACHINES


The pace of advancement in computer science has been much faster than many
other technologies. Computer technology not only progressed fast but also
impacted heavily on the other technologies and business processes of the world.
This fast growth of computer technology made it one of the most unpredictable and
volatile technologies of the world. The field of information technology (IT) is the
fastest-changing technological sector in the world. See the changing shape of future
computers in Figure 1.7.
The future of the computers will be governed by the major prospective technolo-
gies as explained in the subsequent subsections:

FIGURE 1.7 Future machines.


1 • Computers and Networks 9

FIGURE 1.8 Artificial intelligence concepts.

1.4.1 Artificial Intelligence
AI has been in the field for quite some time, but this technology will impact the com-
puter heavily in the time to come. With the help of augmented reality and virtual reality
(AR/VR), voice recognition, text interpretation, image processing, motion detection,
and other technologies based on AI technologies, the future of computers looks even
smarter and more exciting. The conceptual image of AI is shown in Figure 1.8.

1.4.2 Quantum Computing
The quantum computing idea is not a new one, but its practical existence is still in
infancy. There is no high level of quantum information processing, which has yet been
completed (at the time of writing this book). Only a few small-scale projects of process-
ing of quantum information in quantum bits (qbits) were successful. When this new
field of computing kick starts, the existing binary processing in our modern computers
will be heavily impacted with the quantum information processing. The virtual image
of quantum computing is shown in Figure 1.9.

1.4.3 Nanotechnology
The size of the hardware, especially in electronics and computer technology, is decreas-
ing exponentially. The size of first data storage based on 18,000 vacuum tubes was
about 1,800 ft2 to keep that tube tank cool. Can you imagine how much data could that
huge area store? Yes, that could store up to 18,000 bits of data only.
10 Cybersecurity Fundamentals

FIGURE 1.9 Virtual image of quantum computing.

One vacuum tube could store one bit of data for computer processing and storage.
The size of the hardware has got reduced to hundreds of thousands of times by this
time. Just a small flash of less than a nail size can store billions of bytes of data! The size
of the electronic hardware is expected to get reduced even more in the time to come.
The processing of matter to the level of 100th part of a nanometer is referred to as
nanotechnology (Figure 1.10). The partnership of nanotechnology and quantum physics
will work well in the future, once the technology progresses. The success of quantum
and nanotechnology will revolutionize the modern computers to a new level.

FIGURE 1.10 Conceptual image of nanotechnology.


1 • Computers and Networks 11

FIGURE 1.11 Schematic diagram of parallel processing.

1.4.4 Parallel Processing
The distribution of computer processing in multiple components comprehensively
coordinated with each other has already been extensively used in computer science to
increase the processing power of a computer. The virtualization, cloud computing, and
distributed processing systems are examples of parallel processing. The implementa-
tion of parallel processing at a large scale is going to rock the computer field in the near
future. Schematic diagram of parallel processing is shown in Figure 1.11.

1.5 INTRODUCTION TO
COMPUTER NETWORKS
Computer network is the combination of two or more computers connected with each
other to share their resources, establish communication, and exchange data electroni-
cally based on some pre-agreed rules and protocols. The end devices or computers are
also known as hosts.
A computer network consists of networking devices (e.g., switches, hubs, routers),
computer hosts, wired media (copper or fiber cables), wireless media, connectors, and
software protocols. Multiple computers are connected with each other through different
configurations (physical and logical) known as network topologies. Those computers
can be connected through wired or wireless media with the help of media connectors.
Figure 1.12 shows the image of a computer network.
This entire hardware configuration is governed by the communication protocols that
control the communication rules and patterns in a network. There are many communi-
cation topologies, protocols, and network types commonly used in computer networks.
12 Cybersecurity Fundamentals

FIGURE 1.12 Computer network.

1.5.1 Network Topologies
Network topology is a type of computer connectivity in which the computers or devices
are connected with each other to form a network. These topologies are normally physical
references of network connectivity. Figure 1.13 shows the major network topologies
used in the modern computer networking.
Major network topologies used in the computer network communication are listed
below:

• Star network topology


• Bus network topology

FIGURE 1.13 Network topologies.


Other documents randomly have
different content
GOVERNOR GLASS AND HIS RESIDENCE

“I little thought, Captain Greig, ever to see this day; but I will
bring relief to you and young Mr. Alexander, if I perish in the
attempt. If I never see you again, sir, God bless you for your
kindness to me during the years we have been shipmates.”
In the punt with the cook went five volunteers, three able
seamen, the gunner, and the sail-maker, but not one of the ship’s
officers. These six fine fellows were ready to risk their lives for
others, but the quarter-deck failed to share in the splendid action.
The punt hoisted sail, the cook and his comrades shouted three
cheers, and they stood out from the lee of the island to face a heavy
sea. This was the last ever seen of them. They must have perished
soon after.
The castaways waited week after week, desperately hungry and
wholly discouraged. Meanwhile the carpenter had finished his boat,
but delayed his voyage until certain of fine weather, and wasted
much time in skirting the island in the hope of finding some trace of
the cook. It was late in October, almost three months after the loss
of the Blenden Hall, before the carpenter attempted to reach Tristan.
Nine men were with him, five able seamen, the boatswain, the
steward, a boatswain’s mate, and a carpenter’s mate. Again the list
was conspicuous for the absence of an officer.
On the following day two boats were seen approaching
Inaccessible Island. They were stanch whale-boats, in one of which
was the ruler of Tristan da Cunha, Corporal William Glass, late of the
Royal Artillery. He brought provisions and a warm welcome to his
kingdom. It was found that more than one trip would be necessary
to transport the castaways to Tristan. In the first boat-load were
Mrs. Lock and Mrs. Painter, whose animosities were lulled by the
blessed fact of rescue. It was an armistice during which they wept
on each other’s necks and mingled their prayers of thanksgiving
while the crew of the Blenden Hall sang “God Save the King.”
All hands were safely landed at Tristan where they found a neat
hamlet of stone cottages thatched with straw, and green fields of
grain and potatoes. Mrs. Glass was the only woman of the colony in
which there were five Englishmen and two American sailors. To
provide for eighty shipwrecked people severely taxed their resources
but the spirit of hospitality was most cordially displayed. The captain
and the passengers signed an agreement to pay Governor Glass at
the rate of two shillings and sixpence per day for board and lodging,
which was no more than fair, but nothing was said about the sailors.
They were expected to pay for their keep by working as farm-hands.
This rubbed the long-suffering tars the wrong way, and as the diary
explains it:

“The passengers walking about at their ease was a sight to


which Jack could not long submit; at last they all struck,
declaring that they would not work unless their ‘mortal enemies’
were compelled to do the same. Upon this, the captain begged
Governor Glass to be firm with them and on no account to serve
out any provisions unless they returned to their duty.
Consequently several meetings with a great deal of ill feeling
took place upon the subject, and when prayers were read the
following Sunday at Government House, every sailor absented
himself.”

Food was refused the striking seamen until they threatened to


break into the potato sheds and then burn the settlement. The
boatswain and his lash tamed the mutiny after Joseph Fowler had
been tied up and his back cut to ribbons with nine dozen blows of
the rope’s-end. After this the seamen marched off to another part of
the island and fed themselves by fishing and hunting wild goats and
pigs. To their simple minds there was no good reason why they
should sweat at building stone walls and digging potatoes while
Captain Miles and the six assistant surgeons of the Honorable East
India Company, Major Reid of the Poonah Auxiliary Forces, and
Quartermaster Hormby of his Majesty’s foot were strolling about in
idleness.
For lack of something better to do, the passengers began to find
fault with the food supplied by the worthy Governor Glass, and this
caused much difficulty and several formal conferences and protests.
He promised to do better, and honestly tried to, bearing the situation
with unfailing good humor and courtesy. If the rations were
scrimped, it was no doubt because he feared he might be eaten out
of house and home and left without reserve supplies.
On New Year’s day there was a notable celebration, when the
four children of the Glass family were formally christened by Dr.
Hatch of the Blenden Hall, who had taken holy orders in his youth.
Governor Glass wore his scarlet uniform of the Royal Artillery, “Mrs.
Lock stuck so many white feathers in her hair that it resembled a
cauliflower, while Mrs. Painter sported a white turban of such ample
dimensions that the Grand Sultan himself might have envied her.”
Bonfires blazed, flags flew from every roof, and the islanders were
dressed in their best.
On January 9 the English merchant ship Nerinae hove to off
Tristan da Cunha to fill her water-casks. She was bound from Buenos
Aires to Table Bay with a hold filled with live mules. Uncomfortable
shipmates these, but the people of the Blenden Hall were not in a
captious mood. They were taken on board, and sailed away from
Governor Glass after spending three months with him, and it is to be
fancied that he felt no profound regrets.
A bit of romance touched the parting scenes. The night before
the Nerinae sailed from Tristan, the pretty maid servant of Mrs. Lock
slipped ashore in a boat, with what few belongings she had, and
joined her sailor sweetheart, Stephen White, who had decided to
remain behind on the island. This Peggy was a Portuguese half-caste
from Madras who is referred to in the diary as a “female attendant.”
Seaman White is called a worthless fellow, but this may be taken for
what it is worth. The important fact is that he had found a
sweetheart during the weary exile on Inaccessible Island and that
they were resolved to stay together and let the rest of the world go
hang. Governor Glass was quite competent to unite them in the
bonds of a marriage that was proper in the sight of God.
There is one final glimpse of Mrs. Lock and Mrs. Painter shortly
before the good ship Nerinae, with her freightage of mules and
castaways, anchored in Table Bay.

The two ladies having for a considerable time been very


quiet, Captain Greig thought he would make another trial at
reconciliation, and begged Mrs. Lock to shake hands with Mrs.
Painter which the latter was willing to do, but the commodore’s
wife declared, “Me do anything Captain like, but me will bring
action for defamation against little Painter and his damn wife,
please God me ever get back to Bombay.”
Mrs. Lock used to say that she fully expected to find her
dear commodore dead with grief. Mrs. Painter repeatedly
retorted that it was far more likely she would find him with
another wife, but she might make up her mind it would not be a
black one.
Thus concludes the story of the Blenden Hall, East Indiaman, but
it is so interwoven with the fortunes of Tristan da Cunha and its
colonists that further tidings of them may prove interesting. In 1824,
four years after the wreck of the East Indiaman, an author and artist
of New Zealand, Augustus Earle, was accidentally marooned at
Tristan, and stayed six months as the guest of Governor Glass before
another ship touched there. He had sailed from Rio for Cape Town in
a sloop, the Duke of Gloucester, which passed so close to the island
in calm weather that the thrifty skipper concluded to land and buy a
few tons of potatoes for the Cape market.
The artistic passenger went ashore to stroll about with dog and
gun while the sailors were loading potatoes into the boat. A sudden
storm swept the sea, and the boat was caught offshore, but
managed to reach the sloop, which was driven far from the island
and gave up trying to beat back to it. The skipper was a practical
man and it was foolish to delay the voyage for such a useless
creature as an author and artist. Mr. Augustus Earle was compelled
to make the best of the awkward situation, and he seems to have
enjoyed his protracted visit of half a year.
The village then consisted of five or six thatched cottages “which
had an air of comfort, cleanliness, and plenty truly English.” The
young sailor Stephen White, whom the Blenden Hall had left behind
with his precious Peggy, was still happy in his bargain, and their
babies were playing with the lusty little flock of the Glass family. The
island was no longer a hermit’s retreat. The marooned artist noted
that “children there were in abundance, and just one year older than
another.” Small wonder that he saw little of the two women, who
were fully occupied with their domestic duties.
The worthy Governor William Glass had a curious yarn to tell of
that first ruler of the island, Jonathan Lambert of Salem, who had
published his grandiose proclamations and whose ambitious dreams
were so soon eclipsed. The accepted account is that he was
drowned while out in his boat, but the British garrison had found on
the island a man who said he had been there with Lambert and that
he suspected another companion of the first king of Tristan da
Cunha of having made away with him in order to secure his hoard of
gold. Afraid of discovery, the regicide had fled the island, leaving the
treasure behind him.
The ingenious inventor of this narrative had professed to know
where the treasure was buried,

and that he would some day reveal it to the man of the garrison
who pleased him most, thus insuring good treatment from the
men, each hoping to be favored. But one day after drinking
immoderately of liquor he was taken suddenly ill and expired
before he could explain to his comrades where his treasure was
concealed.

At any rate, the story sufficed to supply the imaginative


vagabond with free rum and tobacco, which, no doubt, was the end
in view.
Augustus Earle hunted the wild goats, which had multiplied on
the mountain-slopes, and he has left us this pleasing picture of the
simple and righteous existence led by these dwellers on remote
Tristan da Cunha:

Governor Glass informed me that the last time they had


ascended the mountain after goats, one of the party got too
close to the precipice and fell down several hundred feet. They
found the corpse next day in a miserably mangled state. They
interred it in the garden near their settlement and placed at the
head of the grave a board with his name and age, together with
an account of the accident which caused his death, and the
remark that it happened on a Sunday, a dreadful warning to
Sabbath-breakers. The people all say they will nevermore
ascend the mountain on that sacred day. Indeed, from all I have
seen of them, they pay every respect to the duties of religion
that lies in their power.
My clothes beginning to wear out, my kind host, who was an
excellent tailor, made me a pair of trousers consisting of sail
cloth and the rear of dried goat’s skin, the hair outside, which
they all assured me would be very convenient in sliding down
the mountains. I laughed heartily when I first sported this
Robinson Crusoe habiliment. “Never mind how you look, sir,”
said my kind host, “His Majesty himself, God bless him, if he had
been left here as you were, could look no better.”

Governor William Glass ruled over the island for thirty-five years,
until his death in 1853. By that time the population had increased to
a hundred souls, and a flourishing trade was carried on in
provisioning the fleet of American whalers out of New Bedford and
Nantucket which cruised in those waters. A few years later, twenty-
five of the younger men and women emigrated to the United States,
stirred by a natural ambition to see more of the world. At the death
of Governor Glass, an old man-of-war’s-man, William Cotton, who
had been for three years one of Napoleon’s guards at St. Helena,
became the head of the community.
To-day the settlement consists of a hundred people or so, most
of them of the old British strain, and many of them descended from
the families of Corporal William Glass of the Royal Artillery and the
young seaman Stephen White and his devoted Peggy who were
wrecked in the Blenden Hall, East Indiaman, a century ago. They
manage their own affairs without any written laws, and are
described by recent visitors as religious, hospitable to strangers,
industrious, healthy, and long-lived.
The British Government has kept a paternal eye on them, and
from time to time a minister of the Church of England has served in
the stone chapel and the trim little school-house. Their worldly
wealth is in cattle, sheep, apple and peach orchards, and they are
unvexed by politics, the League of Nations, or the social unrest.
Enviable people of Tristan da Cunha! And peace to the memories of
old William Glass and Jonathan Lambert, and the faithful
sweethearts of the stately old Blenden Hall!
CHAPTER V
THE ADVENTURES OF DAVID WOODARD,
CHIEF MATE

LONG before the art of Joseph Conrad created Lord Jim to follow the
star of his romantic destiny to the somber, misty coast of Patusan,
an American sailor lived and dared amazingly among the sullen
people of those same mysterious islands of the Far East. He was of
the race of mariners whose ships were first to display the Stars and
Stripes in those far-distant waters and to challenge the powerful
monopolies of the British and Dutch East India companies. Only
seven years earlier, in fact, the American ship Empress of China had
ventured on the pioneering voyage to Canton. The seas still
swarmed with pirates and every merchantman carried a heavy
battery of guns and a crew which knew to use them. Amid such
conditions were trained the sailors who were to man the Constitution
and the other matchless frigates of 1812.
The American ship Enterprise sailed from Batavia for Manila on
the twentieth of January, 1793, and laid a course to pass through
the Straits of Macassar. Head winds and currents kept her beating to
and fro in this torrid passage for six weeks on end, and the
grumbling crew began to wonder if they had signed in another
Flying Dutchman. Food was running short, for this protracted voyage
had not been expected, and while the Enterprise drifted becalmed
on the greasy tide, another ship was sighted about five miles distant.
Captain Hubbard ordered the chief mate, David Woodard, to
take a boat and five seamen and row off to this other vessel and try
to buy some stores. The men were William Gideon, John Cole,
Archibald Miller, Robert Gilbert, and George Williams. Expecting to be
gone only a few hours, they took no food or water, and all they
carried with them was an ax, a boat-hook, two pocket-knives, a
disabled musket, and forty dollars.
It was sunset when they pulled alongside the other ship, which
was China bound and had no provisions to spare. A strong squall
and heavy rains prevented them from returning to the Enterprise
that night, and they stayed where they were until next morning.
Then the wind shifted and blew fresh from the southward to sweep
the Enterprise on her course, and she had already vanished hull
down and under. Stout-hearted David Woodard guessed he could
find her again, confident that Captain Hubbard would not desert
him, and his men cheerfully tumbled into the boat after him.
The skipper of the China ship, a half-caste with a crew of
Lascars, was a surly customer who seemed anxious to be rid of his
visitors. As a friend in need he was a glaring failure. Protesting that
he had no fresh water to spare, all that their money could buy of
him was a bottle of brandy and twelve musket-cartridges. The
Yankee sailors tugged at the oars all day long, but caught never a
glimpse of the missing Enterprise. At nightfall they landed on an
island and found water fit to drink, but nothing to eat. A large fire
was built on the beach in the hope of attracting the attention of their
ship, but there was no responsive signal.
It was the land of Conrad’s magic fancies, where “the swampy
plains open out at the mouth of rivers, with a view of blue peaks
beyond the vast forests. In the offing a chain of islands, dark,
crumbling shapes, stand out in the everlasting sunlit haze like the
remnants of a wall broached by the sea.”
The chief mate and his five hardy seamen tightened their leather
belts another hole and shoved off again in the small open boat. For
six days they sailed the Straits, blown along by one rain squall after
another, until they were within sight of the coast of Celebes. Hunger
and thirst then compelled them to seek the land and risk death at
the hands of the savage Malays. It was their hope to proceed by sea
to Macassar, which they reckoned lay about three degrees to the
southward.
They must have had a little water during these six days, but
David Woodard’s statement that the rations were a few cocoanuts is
entirely credible. Many a boat-load of castaways has died or gone
mad after privations no more severe, while on the other hand a crew
of toughened seamen, in the prime of their youth, is exceedingly
hard to kill.
Toward a cove on this unknown, hostile shore of Celebes the
gaunt sailors wearily steered their boat and beached it in the languid
ripple of surf. They had no sooner crawled ashore than two proas
skimmed in from seaward, dropping anchor and making ready to
send off a canoe filled with armed Malays. Woodard shouted to his
men, and they pushed the boat out and scrambled into it before
they were discovered. Skirting a bight of the shore, they headed for
the open sea and dodged away from the proas.
Four miles beyond, after they had rounded a green point of land,
a feathery cocoanut-grove ran to the water’s-edge, and they could
go no farther. The mate left two men to guard the boat, and the
three others went with him; but they were too weak to climb the
trees, and had to hack away at the trunks with an ax. Two of them
were mere lads who made such bungling work of it that Woodard
sent for a couple of the stronger men in the boat, leaving Archibald
Miller alone with it. They were busy gathering cocoanuts to carry to
sea with them when poor Miller was heard to “scream aloud in the
bitterest manner.” The mate ran to the beach and saw his precious
boat filled with Malays, who were just shoving off in it. On the sand
lay Miller, who had been hacked to death with creeses.
David Woodard and four sailors were therefore marooned with
no resources whatever, but they talked it over and agreed to try to
get to Macassar by land. Leaving the swampy coast, they slowly
toiled toward the blue mountains and, afraid of discovery, concluded
to hide themselves in the jungle until night. Then with a star for
their guide they bore south, but progress was almost impossible,
and they lost their bearings in the dense growth. After blundering
about in this manner for several nights, they turned toward the sea
again in the hope of finding some kind of native boat. They had
existed for thirteen days since losing their ship, and it is evident that
the indomitable spirit of the mate kept the other men going.
“Woodard was himself stout in person,” explains the narrative,
“and much accustomed to fatigue and exercise, whence he felt less
exhausted, particularly from keeping up his spirits and having his
mind constantly engaged.”
At length they came to a deep bay between the mountains, and
lay hidden all day in a leafy ambush while they watched the Malay
fishermen in their canoes. Three of the sailors were taken
desperately ill after eating some yellow berries and thought they
were about to die; but the mate could not tolerate this kind of
behavior, “although his comrades now resembled corpses more than
living men.” He used rough language, damned them as worthless
swabs if a stomach-ache was to make them lie down and quit, and
then went in search of water for them until he found some in a
hollow tree. But his strength and courage could haul them along no
farther and reluctantly he admitted that they would have to
surrender themselves to the natives.
WOODARD RAISED HIS EMPTY HANDS TO ASK FOR PEACE AND
MERCY
They went down to the beach of the bay, wondering what their
fate might be, John Cole, who was a stripling lad of seventeen,
blubbering that he would sooner die in the woods than be killed by
the Malays. The canoes had gone away, but three brown-skinned
girls were fishing in a brook, and they fled when they saw the
tattered castaways. Presently a group of men came down a forest
path, and Woodard walked forward to meet them, raising his empty
hands to ask for peace and mercy.
The Malays stood silent for a long time, and then the chief
advanced to lay down his creese and ceremoniously accept the
strangers as captives. They were given food and conducted to a little
town of bamboo huts, there to await the pleasure of the rajah in
what Woodard called the judgment hall, while all the villagers
gathered about them.
Soon the rajah strode in, tall and straight and warlike, a long,
naked creese in his hand. These were the first white men that had
ever been seen in his wild domain. He gazed admiringly at the
stalwart chief mate, who looked him straight in the eyes, while the
people murmured approval of the captive’s bearing, for “he was six
feet and an inch high, strong in proportion, and the largest-boned
person they had ever beheld.”
These were two bold, upstanding men who stood face to face in
the judgment hall, and the rajah, after consultation with his chiefs,
gave each of the five American sailors a betel-nut to chew as a
token of his gracious inclination to spare their lives.
For twenty days they were closely held as prisoners in this forest
settlement, during which time two old men arrived from another
town and displayed a lively interest in the situation. They toddled off
into the jungle, but came again with a Mahomedan priest called
Tuan Hadjee, who was a bit of a linguist in that he spoke a few
words of English, some Portuguese, and a smattering of the Moorish
tongue. He was a man of the world, having journeyed to Bombay
and Bengal on his way to Mecca, and displayed a letter from the
British governor of Balambangan, on the island of Borneo, to show
that he was a good and trustworthy person and was empowered to
assist all distressed Englishmen.
This Tuan Hadjee lived up to his credentials, for he offered the
rajah a hundred dollars in golddust as ransom for the five seamen,
which price was haughtily refused, and the kindly priest went away
to see what else could be done about it. Nothing more was seen of
this amiable pilgrim, and the Americans were set to work in the
forest to clear the fields or to gather sago. After two months they
were left unguarded by day, but shut up in a house at night. Week
after week dragged by in this wearisome drudgery, but they kept
alive, and their spirit was unbroken, although the food was poor and
scanty and the tropical heat scorched the very souls out of them.
At the end of half a year of this enslavement another rajah who
seems to have been a kind of overlord of the region summoned
them into his presence at a town on the sea-coast. There Woodard
almost died of fever, but a woman befriended him and greatly
helped to save his life. The episode suggests a romance, and this
viking of a sailor who drifted in so strangely from an unknown world
was a man to win the love of women. In this respect, however, he
was discreetly silent when it came to relating the story of his
wanderings in Celebes, and the interest which he inspired is sedately
described as follows:

At her first visit she looked at him some time in silence, then
went to the bazaar and bought some tobacco and bananas
which she presented to him, as also a piece of money. Seeing
him scantily clothed, she asked whether he had no more
clothing and whether he would have some tea. Then carrying
one of the other sick men home with her, she gave him tea and
a pot to boil it in. She likewise sent rice and some garments,
with a pillow and two mats. This good woman was of royal blood
and married to a Malay merchant. These were not her only gifts,
for she proved a kind friend to the seamen while they were at
that place.
Another house being provided for the five men, Woodard,
unable to walk, was carried thither accompanied by a great
concourse of young females who immediately on his arrival
kindled a fire and began to boil rice. His fever still continued
very severe and on the morning of the fourth day of his
residence an old woman appeared with a handful of boughs,
announcing that she was come to cure him and that directly. In
the course of a few minutes four or five more old women were
seen along with her, according to the custom of the country in
curing the sick. They spent the day in brushing him with the
boughs of the trees and used curious incantations. The
ceremony was repeated in the evening and he was directed to
go and bathe in the river. Although he put little faith in the
proceedings, the fever abated and he speedily began to recover.

From a Dutch fort seventy miles away the commandant came to


see Woodard and invited him to return with him, offering to buy him
out of slavery. The chief mate refused, because he was afraid of
being compelled to join the Dutch military service. He was shrewd
enough to perceive that this was what the commandant had in mind,
and he therefore begged to be sent to Macassar, whence he could
make his way to Batavia. At this the commandant lost interest in the
castaways and made no more attempt to help them.
Soon after this they were carried back to the village of their first
imprisonment, but Woodard had seen blue water again and he was
resolved to risk his life for liberty. Eluding his guards, he took a spear
for a weapon and followed the forest paths all night until he
emerged on a beach, where he discovered a canoe and paddled out
to sea. Rough water swamped the ticklish craft, and he had to swim
half a mile to get to land again. Back he trudged to his hut on the
mountain-side and crawled into it before dawn.
Undiscouraged, he broke away again, and made for a town
called Dungalla, where he had a notion that his friend Tuan Hadjee,
the priest, might be found. He somehow steered a course through
the forests and ravines and fetched up at the stockade which
surrounded Dungalla. As a disquieting apparition he alarmed a
nervous old gentleman, who scampered off to shriek to the village
that a gigantic white devil was sitting on a log at the edge of the
clearing. The old codger turned out to be a servant of Tuan Hadjee,
who warmly welcomed the chief mate and took him into his house
as a guest.
The rajah to whom Woodard belonged got wind of his
whereabouts and wrathfully demanded that he be sent back. The
prideful rajah of Dungalla refused in language no less provocative.
Woodard smuggled a message through to his men, urging them to
escape and join him. This they succeeded in doing, and the people
of Dungalla were delighted to receive them. This episode strained
the relations of the two rajahs to the breaking-point, and war was
promptly declared.
Inasmuch as they were the bone of contention, Woodard and his
seamen promptly offered to fight on the side of the rajah of
Dungalla; so they proceeded to imperil their skins in one of those
tribal feuds which eternally flicker and smolder in the Malaysian
forests. Woodard was placed in command of a tower upon the
stockade wall, where he served a brass swivel and hammered
obedience into a native detachment. His sun-blistered, leech-bitten
sailors, clad only in sarongs, held the other barricade with creeses
and muskets, and were regarded as supernatural heroes by the
simple soldiery of the rajah.
A drawn battle was fought, with about two hundred men in each
army, and a good many were killed or wounded. After that the war
dragged along and seemed to be getting nowhere, and the chief
mate lost all patience with it; so he bearded the rajah and flatly told
him that his men would fight no longer unless some assurance was
given that they would be conveyed to Macassar.
The rajah was stubborn and evasive and bruskly commanded the
high-tempered Yankees to return to their posts on the firing-line.
Woodard argued no longer, but marched back to his watch-tower,
sent for his seamen, and told them to turn in their muskets. Before
the astonished rajah had decided how to deal with this mutiny, the
five mariners broke out of the town under cover of darkness and
stole a canoe, carrying with them as much food as they could hastily
lay hands on. They were delayed in a search for paddles, and a
sentry gave the alarm.
Twenty soldiers surrounded them and dragged them back to the
rajah, who locked them up, while he chewed betel-nut and
meditated on the case of these madmen who refused to be tamed.
Just then the priest Tuan Hadjee was sailing for another port, and he
vainly petitioned the royal assent to taking the American sailors
along with him. The rajah’s wrathful refusal so annoyed the
impetuous chief mate that he organized another dash for freedom.
Captivity, privation, and disappointment seemed to daunt him not at
all.
This time the five mariners surprised the sentries at the gates,
deftly tied them up, and lugged them to the beach. There a large
canoe was discovered, and the fugitives piled aboard and hoisted
the sail of cocoanut matting. Unmolested, they moved out of the
starlit bay and flitted along the coast until sunrise. Then they hauled
in to hide at an island until night. While making sail again, one of the
men carelessly stepped upon the gunwale of the cranky craft, and it
instantly capsized almost a mile from shore.
They climbed upon the bottom, managed to save the paddles,
and navigated the canoe back to the island by swimming with it.
There they rekindled their fire, dried and warmed themselves, and
were ready to try it again. They had lost the sail and mast, but they
paddled all night and began to hope that they had gone clear of
their troublesome rajah.
In the morning, however, a proa swooped down like a hawk, and
again the unlucky seamen were taken captive. They told the Malay
captain that they were bound to the port for which Tuan Hadjee had
sailed, as he was a friend and protector of theirs, and requested that
they be landed there. Apparently the amiable priest had some power
and influence even among the cutthroats who manned these proas,
for the captain agreed to do as he was asked, and he proved to be
as good as his word.
In this manner the chief mate and his men were carried to the
port, which they called Sawyeh. Tuan Hadjee was there, and he
gave them a house and was a genial host while they looked the
situation over and endeavored to unravel the strands of their tangled
destiny. The priest entertained them with tales of his own career,
which had been lurid in spots. He was now sixty years of age, with a
girl wife of sixteen, and a man of great piety and much respected,
but in his younger days he had been a famous pirate of the island of
Mindanao.
Among his exploits was the capture of a Dutch settlement in the
Strait of Malacca, when he had commanded a proa of ten guns and
two hundred men. He had been in a fair way of becoming one of the
most successful pirates of those seas, but while chasing a merchant
vessel his proa had turned turtle in a gale of wind, and he thereby
lost all his property and riches. After this misfortune he had forsaken
piracy and turned to leading an honorable life.
He was an excellent companion to these exiled sailormen from
faraway New England and even gave them the use of an island
where there was fruit and wild game and a pleasant house to live in,
but they were no more contented. After several weeks, Tuan Hadjee
announced that he had some business to attend to on another part
of the coast, but would return in twenty days and then attempt to
send the chief mate and his men to their own people at Batavia.
While he was gone, a merchant proa came into port, and Woodard
found that she was bound to Sulu, in the Philippine Islands, whence
he felt certain he could get passage in some ship trading with
Manila. In high hopes he arranged matters with the master of the
proa, and the five castaways sailed away from Celebes.
Alas! this Malay skipper was an honest man, according to his
lights, and the gossip of the town had led him to draw his own
conclusions. His inference was that these white men belonged to
Tuan Hadjee and were bent on running away during his absence. No
hint was dropped to Woodard and his companions, and they happily
beguiled themselves with visions of deliverance. But the captain of
the proa had taken pains to inform himself of the destination of the
absent Tuan Hadjee; wherefore he shifted his helm and bore away,
to turn his passengers over to their proper owner. To their amazed
disgust, they sailed into a little jungle-fringed port called Tomboa,
and there, sure enough, was the no less surprised Tuan Hadjee.
The honest Malay skipper explained the situation and sailed
away again, while Woodard and his disconsolate shipmates stood on
the beach and cursed their luck and shook their fists at the
departing proa.
Their reunion with Tuan Hadjee was a painful episode. As a
reformed pirate he could swear harder and louder and longer than a
Yankee seaman. He took the Malay skipper’s view of it, that these
guests of his had broken faith with him by absconding while his back
was turned. The chief mate had learned to adorn his language with
an extra embroidery of Malaysian profanity, and the interview was
not only eloquent, but turbulent. Then Tuan Hadjee, having
exhausted his breath, turned sulky, and the villagers took the cue.
They ignored the white visitors as though they were under a ban of
excommunication until Woodard delivered a speech in the crowded
market-place.
Speaking to them in their own tongue, he eloquently declaimed
that the unfortunate strangers had been guilty of no other crime
than that of yearning to behold once more the faces of their own
dear wives and children. The feelings of Tuan Hadjee were
profoundly stirred by the oration. Amid the applause of the fickle
populace he clasped the chief mate to his breast, and vowed that
while a mouthful of rice remained to him, his friends should share it
with him.
Nothing was said, however, about setting the captives free, and
these energetic sailors began to plan another voyage on their own
account. Tuan Hadjee shrewdly suspected something of the sort,
and all the canoes were carried away from the beach and guarded
when the sun went down. A pirate proa came winging it into the
harbor of Tomboa to fill the water-casks and give the crew shore
liberty. Woodard noticed that the men came ashore in a canoe
unusually large and seaworthy, and resolved to steal it by hook or
crook. He asked the sociable pirates to let him use the canoe to go
fishing in and offered to share the catch with them. To this they
consented, providing he went out in the daytime and stayed well
inside the bay.
After several fishing trips, Woodard sauntered down to the beach
in the dusk as though to overhaul the canoe for an early start next
morning. The villagers had ceased to watch his movements. The
proa rode at anchor only a few yards away, where the channel ran
close to a steep bank. The pirates were lounging on deck and in the
cabin, and none of them happened to glance in the direction of the
canoe. Woodard waited a little, and slid the canoe into the quiet
water. As silent as a drifting leaf it moved away with the tide, while
he lay in the bottom with a fishing-line over the side as a pretext if
he should be hailed from the proa.
Unobserved, he landed at another beach, where his comrades
awaited him. They embarked, and stole out of the bay with food and
water to last them several days. At last they were bound for
Macassar and again ready to defy the devil and the deep sea. For
three days they held on their way and began to think the luck had
turned when a small proa tacked out from the land and overtook the
canoe. Woodard recognized the crew as acquaintances of his from
Tomboa, and frankly told them where he was going. They
commanded him to fetch his men aboard the proa, and they would
be given up to the rajah of Tomboa; but the odds were so nearly
even, five Americans against seven natives, that Woodard laughed at
them. Hoisting sail, he drove his canoe to windward of the proa, and
handled it so well that he fairly ran away from pursuit.
The wind was too strong for the fragile canoe, and they had to
seek refuge in the mouth of a river, where they built a fire to cook
some rice. Here they encountered two natives who had come ashore
from a trading proa, one of them a captain who had seen the
fugitives while at Tomboa. He insisted that they surrender and return
with him. Tired of so much interference, the chief mate knocked him
down, and held a knife at his throat until the Malay mariner changed
his opinion.
The proa chased them, however, when the canoe resumed its
voyage; but night came on, and a thunder squall enabled them to
slip away undiscovered. Eight days after leaving Tomboa they began
to pass many towns and a great deal of shipping on the coast of
Celebes, but they doggedly kept on their course to Macassar. They
fought off a war-canoe, which attacked them with arrows and
spears, but had no serious misadventures until a large boat came
swiftly paddling out of an inlet and fairly overwhelmed them by force
of numbers.
Captives again, the five long-suffering seafarers were carried
into Pamboon, where the rajah found them unsatisfactory to
interview. David Woodard, chief mate, was in no mood to be
thwarted, and it is related of him that “he was examined in the
presence of the rajah and all the head men of the place. He made
the same answers as before, saying that he must not be stopped
and must go on immediately, thus being more desperate and
confident from the dangers and escapes he had experienced. The
rajah asked him if he could use a musket well, which he denied,
having formerly found the inconvenience of acknowledging it. The
rajah then showed him a hundred brass guns, but he declined taking
charge of them. His wife, a young girl, sat down by the mate and,
calling her sister and about twenty other girls, desired them to sit
down, and asked Woodard to select a wife from among them. This
he refused and, rising up, bade her good night and went out of the
house, where they soon brought him some supper.”
In the morning this redoubtable Yankee mate who, like Ulysses,
was deaf to the songs of the sirens and was also as crafty as he was
brave, waited on the rajah of Pamboon and very courteously
addressed him in the Malay tongue, requesting prompt passage to
Macassar on the ground that the Dutch governor had urgently
summoned him, and if he were detained at Pamboon, it would be
most unpleasant for the rajah, whose proas would be seized and his
ports blockaded, no doubt, by way of punishment.
This gave the haughty rajah something to think about. The
fearless demeanor and impressive stature of this keen-eyed mariner
made his words convincing. After due reflection, the rajah sent for
the captain of a proa, and told him to take these troublesome white
men to Macassar with all possible haste. Woodard was worn out, his
bare back terribly burned and festered, his strength almost ebbed,
and he had to be hoisted aboard the proa upon a litter; but he was
still the resolute, unconquerable seaman and leader. The
accommodations were so wretched that after three days of suffering
he ordered the proa to set him ashore and to send word to the
nearest rajah.
This was done, and the dusky potentate who received the
message did all in his power to make the party comfortable, fitting
out a proa, which enabled them to make the final run of the voyage
with no more hardship. Tales of Woodard had passed by word of
mouth along the coasts of Celebes until he was almost a legendary
character. It was on June 15, 1795, that these five wanderers
reached their goal of Macassar after two years and five months of
captivity among the Malays. They were not only alive, every man of
them, but not one was permanently broken in health.
The Dutch governor of the island and the officers of the garrison
of the Dutch East India Company treated them with the most
generous hospitality, providing clothes and money and refusing to
listen to promises of recompense. They soon sailed for Batavia,
where the four sailors, William Gideon, John Cole, Robert Gilbert,
and George Williams signed articles in an American ship bound to
Boston, and resumed the hard and hazardous toil of the sea to earn
their bread. Their extraordinary experience was all in the day’s work,
and it is unlikely that they thought very much about it.
Woodard took a berth as chief mate in another American ship
that was sailing for Calcutta and while in that port was offered
command of a country ship engaged in the coastwise trade. During
one of his voyages he was strolling ashore when he came face to
face with Captain Hubbard of the Enterprise, which had vanished in
the Straits of Macassar and left its unlucky boat adrift. The delighted
captain explained that he had waited and cruised about for three
days in a search for the missing boat and had given it up for lost.
He warmly urged Woodard to join him in his fine new ship, the
America, and go to Mauritius. The former chief mate gladly accepted
the invitation, for he was homesick for his own flag and people. At
Mauritius Captain Hubbard gave up the command because of ill
health and turned it over to David Woodard. Thus the true story all
turned out precisely as should be, and it was Captain Woodard who
trod the quarterdeck of his taut ship America as she lifted her lofty
spars in the lovely harbor of Mauritius.
Coincidence is often stranger in fact than in fiction. Before he left
Mauritius, Captain Woodard ran across three of his old sailors of the
open boat and the two years of captivity among the Malays. They
had been wrecked on another China voyage, and were in distress for
lack of clothes and money. Their old chief mate, now a prosperous
shipmaster, with a share in the profits of the voyage, outfitted them
handsomely and left them with dollars in their pockets.
In later years Captain David Woodard traded to Batavia, and met
more than one Malay who had seen him or had listened to fabulous
tales of his prowess during his long durance in the jungles and
mountains of Celebes. In 1804 this splendid adventurer of the old
merchant marine was able to retire from the sea with an
independent income. Near Boston he bought a farm and lived on it,
and this was the proper way to cast anchor, for such is the ambition
of all worthy mariners when they cease to furrow the blue sea.
CHAPTER VI
CAPTAIN PADDOCK ON THE COAST OF
BARBARY

THE veterans of the Revolution of ’76, who had won a war for
freedom, were still young men when American sailors continued to
be bought and sold as slaves for a few dollars a head on the farther
side of the Atlantic. It was a trade which had flourished during the
colonial period, and was unmolested even after the Stars and Stripes
proclaimed the sovereign pride and independence of this Union of
States. Indeed, while hundreds of American mariners were held in
this inhuman bondage, their Government actually sent to the Dey of
Algiers a million dollars in money and other gifts, including a fine
new frigate, as humble tribute to this bloody heathen pirate in the
hope of softening his heart.
It was the bitterest touch of humiliation that this frigate, the
Crescent, sailed from the New England harbor of Portsmouth, whose
free tides had borne a few years earlier the brave keels of John Paul
Jones’s Ranger and America.
The Christian nations of Europe deliberately granted immunity to
these nests of sea-robbers in Algiers, Morocco, Tunis, and Tripoli in
order that they might prey upon the ships and sailors of weaker
countries and destroy their commerce. This ignoble spirit was
reflected in a speech of Lord Sheffield in Parliament in 1784.

“It is not now probable that the American States will have a
very free trade in the Mediterranean. It will not be to the
interest of any of the great maritime powers to protect them
from the Barbary States. If they know their interests, they will
not encourage the Americans to be ocean carriers. That the
Barbary States are advantageous to maritime powers is certain.”

It was not until 1803 that the United States, a feeble nation with
a little navy, resolved that these shameful indignities could no longer
be endured. While Europe cynically looked on and forbore to lend a
hand, Commodore Preble steered the Constitution and the other
ships of his squadron into the harbor of Tripoli, smashed its
defenses, and compelled an honorable treaty of peace. Of all the
wars in which the American Navy had won high distinction, there is
none whose episodes are more brilliant than those of the bold
adventure on the coast of Barbary.
The spirit of it was typical of Preble, the fighting Yankee
commodore, who fell in with a strange ship one black night in the
Straits of Gibraltar. From the quarterdeck of the Constitution he
trumpeted a hail, but the response was evasive, and both ships
promptly manœuvered for the weather gage.
“I hail you for the last time. If you don’t answer, I’ll fire into
you,” roared Preble. “What ship is that?”
“His Britannic Majesty’s eighty-four gun ship-of-the-line
Donegal,” came back the reply. “Send a boat on board.”
Without an instant’s hesitation the commodore thundered from
his Yankee frigate:
“This is the United States forty-four-gun ship Constitution,
Captain Edward Preble, and I’ll be damned if I send a boat aboard
any ship. Blow your matches, boys!”
Until the hordes of Moorish and Arab cutthroats and slavers were
taught by force to respect the flag flown by American merchantmen,
there was no fate so dreaded by mariners as shipwreck on the
desert coast of northern Africa. For a hundred and fifty years they
risked the dreadful peril of enslavement under taskmasters incredibly
inhuman, who lashed and starved and slew them. In the
seventeenth century it was no uncommon sight in the ports of Salem
and Boston to see an honest sailor trudging from house to house to
beg money enough to ransom or buy his shipmates held in Barbary.
The old records note many such incidents, as that in 1700:

Benjamin Alford and William Bowditch related that their


friend Robert Carver was taken nine years before a captive into
Sallee, that contributions had been made for his redemption,
that the money was in the hands of a person here, and that if
they had the disposal of it they could release Carver.

The expansion of American trade in far-distant waters which


swiftly followed the Revolution increased the number of disasters of
this kind, and among the old narratives of the sea that were written
about 1800 no theme is more frequent, and few so tragic, as the
sufferings of the survivors of some gallant American ship which laid
her bones among the breakers of the African coast. These personal
experiences, simply and movingly written by some intelligent master
or mate and printed as thin books or pamphlets, were among the
“best sellers” of their day when the world of fact was as wildly
romantic as the art of fiction was able to weave for later
generations.
Among these briny epics of the long ago is the story of Captain
Judah Paddock and his crew of the ship Oswego. She sailed from
Cork in March, 1800, for the Cape Verd Islands, to take on a cargo
of salt and hides and then to complete the homeward voyage to
New York. The Oswego was a fast and able vessel of 260 tons,
absurdly small to modern eyes, and carried thirteen sailors, including
boys. After passing Cape Finisterre, Captain Paddock began to
distrust his reckoning because of much thick weather, but felt no
serious concern until the ship was fairly in the surf, which pounded
and hammered her hull with one tremendous blow after another.
Daylight disclosed what the old sea-songs called “the high coast
of Barbary” no more than a few hundred yards distant. The Oswego
was beating out her life among the rocks, and it was time to leave
her. The boats were smashed in trying to land, and the only refuge
was this cruel and ominous shore, the barren wastes of sand and
mountain, the glaring sun, the evil nomads.
With a few bottles of water and such food as they could pack on
their backs, these pilgrims set out to trudge along the coast in the
direction of Mogador, where they hoped to find the protection of an
English consul. It was not an auspicious omen when they discovered
a group of roofless huts rudely built of stone, a heap of human
bones, and the broken timbers of a large frigate washed up by the
tide. These relics were enough to indicate the fate of a large
company of seamen who had been cast away in this savage region.
There were men of all sorts among these hapless refugees of
the Oswego, and most of them endured their hard lot with the
patient courage of the deep-water mariner. The cook, however, was
an exasperating rascal of an Irishman called Pat who had smuggled
himself aboard at Cork as a ragged stowaway, and he lost no time in
starting trouble on the coast of Barbary. In his pack was a bottle of
gin, which had passed the skipper’s inspection as water, and while
on sentry duty at night to watch for prowling Arabs, Pat got
uproariously drunk and fought a Danish foremast hand who was
tippling with him. In the ruction they smashed several precious
bottles of water, and were too tipsy next morning to resume the
march.
The other sailors held an informal trial. This was their own affair,
and Captain Paddock’s protests were unheeded. Pat was so drunk
that he could not appear in his own defense, and the sentence was
that his share of the bread and water should be taken from him and
he be left behind to die. He was accordingly abandoned, blissfully
snoring on the sand, the empty gin bottle in his fist; but after a mile
or so of painful progress two of the men relented and listened to the
captain’s appeal. Back they went, and dragged Pat along, damning
him bitterly and swearing to kill him on the spot if he misbehaved
again.
After three days the torments of thirst were severe, and the heat
blistered their souls. In the wreck of the Oswego there was water in
barrels, plenty of it, and this was all that the fevered minds of most
of the sufferers could think of. Captain Paddock urged them to keep
on with him to the eastward a few days longer toward Mogador, but
they were ready to turn and struggle back to the ship, fifty miles,
just to get enough water to drink. It mattered not to them that they
were throwing away the hope of survival.
The captain was made of sterner stuff, and so they amiably
agreed to part company. A black sailor, Jack, stepped forward and
said with simple fidelity:
“Master, if you go on, I go, too.”
The other negro of the crew grinned at his comrade and
exclaimed:
“If you go, Jack, I reckon I’s obliged to stand by.”
The scapegrace Pat, regarding the captain as his friend and
protector, also elected to stay with him.
So Captain Judah Paddock was left to toil onward with Black
Sam and Black Jack and the impossible Irish cook as his companions
in misery while the mate and the rest of the crew turned westward
to find the wreck of their ship. The parting scene has a certain
nobility and pathos, as the captain’s narrative describes it.

The generosity of my fellow sufferers ought not to pass by


unnoticed. To a man they agreed that we should have a larger
share of the water remaining than those returning to the ship.
Furthermore, they invited us to join them in taking a drink from
their own stock and at the conclusion, sailor-like, they proposed
a parting glass, also from their own bottles. All things arranged
and our packs made up, we took of each other an affectionate
leave and thus we separated. The expression of every man on
this truly trying occasion can never be erased from my memory
as long as my senses remain. Some of us could hardly speak the
word farewell. We shook hands with each other and silently
moved in opposite directions.

Captain Paddock and his little party were captured by Arabs on


the very next day. He met them calmly, his umbrella under one arm,
spy-glass under the other, expecting instant death; but they were
more intent on plunder, and the four men were stripped of their
packs and most of their clothes in a twinkling. It was soon apparent
that shipwrecked sailors were worth more alive than dead, and they
were hustled along by their filthy captors, who gave them no more
water and food than would barely keep soul and body together.
The Arabs traveled in haste to reach the wreck of the Oswego as
a rare prize to be gutted. When they arrived on the scene, another
desert clan, two hundred and fifty strong, had already swooped
down and was in possession. There was much yelling and fighting
and bloodshed before a truce was declared and the spoils were
divided. Meanwhile Captain Paddock found opportunity to talk with
the mate of the Oswego and the band of sailors who had returned to
the wreck just in time to be made miserable captives. Presently
Captain Paddock was dragged away from them. This was, indeed, a
last farewell, for of this larger party of American castaways only one
was ever heard of again.
Flogged and starved and daily threatened with death, Captain
Judah Paddock, Irish Pat, and the two black seamen were carried
into the desert until their captors came to a wandering community of
a thousand Bedouins, with their skin tents and camels and sheep
and donkeys. Amid the infernal clamor the Americans heard a voice
calling loudly in English:
“Where are they? Where are they? Where are the four sailors?”
And then, as Captain Paddock tells it,

A young man once white pressed through the crowd, burnt


with the sun, without hat or shoes, and his nakedness covered
only with a few rags. The first words spoken to us by this
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like