The Rich and Selfish Have Enlisted the Poor to Fight For Them
Obama is trying to raise taxes (by eliminating loopholes) on billionaire corporations that move jobs overseas so that their executives can have more boats and…
Obama is trying to raise taxes (by eliminating loopholes) on billionaire corporations that move jobs overseas so that their executives can have more boats and…
I have many friends who are libertarians, and when I spew here regarding politics I often hear from them in comments or via email, “I…
There is shockingly little truth in any of the normal outlets in America. Universities, mainstream media, common conversation — they all focus on their own…
I’ve been coming repeatedly to a simple conclusion regarding content creation and the use of social services: If something is worth creating, it’s worth keeping…
Many are confused about the meaning of agnosticism as it relates to things we as humans are not certain about. The common mistake is combining…
Microsoft has warned organizations worldwide that threat actors are ramping up their exploitation of critical vulnerabilities in on-premises Exchange Server and SharePoint Server. These attacks,…
From StackOverflow: You mention cutting with yy and complain that you almost never want to cut whole lines. In fact programmers, editing source code, very…
At BSides-LasVegas this year I saw an exemplary talk on the history of lock technology and lock picking. Not only was it informative, but it…
One of the most commonly held debates between non-believers is that of whether someone is agnostic or atheist. The problem is that both terms have,…
The horse is dead. Design, feel, features, openness, customizability — we’ve heard it all. The main arguments are well understood by anyone with an interest…
My web configuration makes use of Varnish as a front-end, and I noticed a bug recently where asking for “/study” was failing, while asking for…
Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated persistence techniques to maintain long-term access within targeted environments. These…