Upward View

Image taken by @kihomizuno at Yosemite National Park

For a good portion of my adolescence, I was very combative. In junior high school I was always getting into fights, so much so that my father had enough and sent me to live in Jamaica for a year. In Jamaica I saw how difficult life was for my mom and vowed to not fight again—wanting to help her live a better life, I didn’t believe fighting all the time would help in that goal. As I’m writing this article, I can’t recall getting into any fights since I returned from Jamaica at age fourteen—I’ll be thirty-five in a little over a month. 

 

Childhood Hunger - Dr. Marcus Rashford MBE

Image taken by @kihomizuno

The 2015-2020 Dietary Guidelines for Americans can be found on the

Getting Ready to Vote | Proposition 14

Image taken by MJ @ Grand Central Station

I’ve been putting in the time to research the many propositions Californians have on the ballot for the November 3rd election. Deciding how to use my vote has been a challenge—both sides of the propositions giving sound arguments. I’ve previously written about Proposition 22, “App-Based Drivers as Contractors and Labor Policies Initiative (2020),” and you can find that article

Stretched

Image taken by my little sis

For three days this week, I hung out in Brooklyn. Before arriving in New York, I planned on fitting in as much time with my close friends and family as I possibly could. A close friend and I planned on having dinner together and spending my last night at an “Oktober Fest” event. With my childhood best friend, we planned on lunch and shooting hoops. And with my god-sister, we planned on spending an afternoon together at my mom’s house conversing and enjoying a home-cooked Jamaican dinner. 

 

My main priority for my trip was to spend time with m…

IoT Security

Union Station aka my second home. Taken by MJ

OWASP has a list of the top 10 most commonly found vulnerabilities—the “OWASP Top Ten.” The OWASP site describes this list as representing “a broad consensus about the most critical security risks to web applications.” Number one on the list is Injection, the vulnerability hackers love to exploit. There’s something real cool about pulling off an injection attack. Compromising a database, getting the browser to run commands on your behalf, or gaining god-level privileges on a server. But you know what’s cooler? Getting that god-level access with a lot less work. Let me introduce number six on the top ten list—security misconfiguration. 

1 2 3 Next Last