
Upward View

For a good portion of my adolescence, I was very combative. In junior high school I was always getting into fights, so much so that my father had enough and sent me to live in Jamaica for a year. In Jamaica I saw how difficult life was for my mom and vowed to not fight again—wanting to help her live a better life, I didn’t believe fighting all the time would help in that goal. As I’m writing this article, I can’t recall getting into any fights since I returned from Jamaica at age fourteen—I’ll be thirty-five in a little over a month.
The 2015-2020 Dietary Guidelines for Americans can be found on the
I’ve been putting in the time to research the many propositions Californians have on the ballot for the November 3rd election. Deciding how to use my vote has been a challenge—both sides of the propositions giving sound arguments. I’ve previously written about Proposition 22, “App-Based Drivers as Contractors and Labor Policies Initiative (2020),” and you can find that article
For three days this week, I hung out in Brooklyn. Before arriving in New York, I planned on fitting in as much time with my close friends and family as I possibly could. A close friend and I planned on having dinner together and spending my last night at an “Oktober Fest” event. With my childhood best friend, we planned on lunch and shooting hoops. And with my god-sister, we planned on spending an afternoon together at my mom’s house conversing and enjoying a home-cooked Jamaican dinner. My main priority for my trip was to spend time with m… OWASP has a list of the top 10 most commonly found vulnerabilities—the “OWASP Top Ten.” The OWASP site describes this list as representing “a broad consensus about the most critical security risks to web applications.” Number one on the list is Injection, the vulnerability hackers love to exploit. There’s something real cool about pulling off an injection attack. Compromising a database, getting the browser to run commands on your behalf, or gaining god-level privileges on a server. But you know what’s cooler? Getting that god-level access with a lot less work. Let me introduce number six on the top ten list—security misconfiguration.
Childhood Hunger - Dr. Marcus Rashford MBE
Getting Ready to Vote | Proposition 14
Stretched
IoT Security