Welcome, Internet folks! If you’ve been following along, this is the final post in my three part series on basic Internet security and privacy. In this article, we’re going to get into improving and—just as importantly—understanding Internet privacy.
The Situation You have a list of items that you need to render with comma separation, and an “and” at the end.
Welcome internet traveler, you’ve found your way to my guide on how to improve your online security. Already feel confident in your security abilities? Then get lost! I don’t need that kind of arrogance around here, especially when I’m trying to sound smart. The rest of you nice, humble people, read on.
Update: The next article in this series is now published. Confused about what privacy versus security means in the context of the internet? Haven’t heard these terms before, but are intrigued nonetheless? Not interested in any of this, but are inexplicably still reading? Whatever your deal is, welcome—you’ve found the laypersons guide to all this crap!
I recently saw Babadook (No spoilers), a fantastic horror movie that was not only scary, but had a compelling, thought provoking, and grounded story to back up the supernatural.
A quick, fun tip for Mac and command line users who are fans of The Lord of the Rings;
The other day I had some time in between work and an improv show I was doing that night, so to pass the time, I created a simple web experiment in CSS.
I bought the new 5th edition Dungeons and Dragons players handbook. Having thought 4th edition was somewhat akin to the Jar-Jar Binks of D&D, I was excited to be excited by the game again.
Jekyll is a tool for static site generation, and it’s what powers Github pages, both of which generate and host this site, respectively.