I had written a roundly rejected magic item for a Pathfinder RPG contest some years back, and just stumbled across it again. For those of the game-nerding persuasion, have a look.
I started buying records a few months ago, and I’ve already compiled a large body of imagined insults to my person about why I’d do such a dumb, dusty thing.
This new healthcare overhaul bill in the senate is already deeply unpopular, but for anyone still unconvinced, I’d like to add my own story to the mix.
I recently saw Titicut Follies, the 1969 documentary film about the harrowing conditions in a Massachusetts prison for the criminally insane. The movie was banned by the state of Massachusetts until it was deemed unconstitutional in the late 80s. One of the subjects is a man who has been transferred from a regular prison to this mental facility. He is very clearly sane, and argues logically in his own defense.
Welcome, Internet folks! If you’ve been following along, this is the final post in my three part series on basic Internet security and privacy. In this article, we’re going to get into improving and—just as importantly—understanding Internet privacy.
The Situation You have a list of items that you need to render with comma separation, and an “and” at the end.
Welcome internet traveler, you’ve found your way to my guide on how to improve your online security. Already feel confident in your security abilities? Then get lost! I don’t need that kind of arrogance around here, especially when I’m trying to sound smart. The rest of you nice, humble people, read on.
Update: The next article in this series is now published. Confused about what privacy versus security means in the context of the internet? Haven’t heard these terms before, but are intrigued nonetheless? Not interested in any of this, but are inexplicably still reading? Whatever your deal is, welcome—you’ve found the laypersons guide to all this crap!