A long while back, this blog lost its database. That's why it went dark for some months.
The host claimed that the database was dropped using it's hosting control panel. This post is an examination of that claim using The Chain of Trust.
It tries to break down that claim and other possibilities to understand their likelihood and difficulty. This is a method to untangle claims to line them up and go down that list. If at any point a link in that chain is seen to be impossible, then the entire claim falls apart.
This is the reasoning that should be done with any discussion, especially something as important as the law. Make a bulleted list, go down it from start to finish. For each link, show another chain coming off of it. Any link from that parent-chain that branches must itself have one single unbroken chain.
This could be demonstrated physically, even graphically, but is straightforward to do in a top-down list (a post), a bulleted list for the main chain, bulleted lists for each link, and hyperlinks for any shared problems.
I don't know that I demonstrated this very well, but I'll give it a shot with a real-world claim.
Entertainment > Movies >
A young, broken, man, enters an underground community of computer crackers, trying desperately to prove himself but with consequences.
An extremely good movie. While not quite mandatory, it's definitely a proper advancement of the "hacker kid" movies that have sullied past movies. Highly recommended, even for people that "know their stuff", as it doesn't lay on the techno-babble which describes everything painfully wrong. Instead, it takes a reasonable middle ground, staying away from pop culture and fairly-firmly on the social side of storytelling.
A virus scanner that uses the Clam AntiVirus (Cisco) database.
It does not have a real-time scanner and is used manually.
This problem has not been investigated yet.
The network connection status icon, found at the lower-right of the taskbar (the tray), is a privacy flaw.
This is because in order for it to operate, it has to reach out to check. Its first check will be its internal IP, to your router. Its second check is to ping a Microsoft server. This means every time your computer boots up, or wakes up, it's informing..
Software > WordPress > WordPress Plugins >
Removes comment IPs from new comments.
This plugin will be useful to people that cannot/or don't want to use libapache2-mod-removeip (because you don't use Apache or don't want to wipe out the IP logging on all vhosts).
A password manager.
I found KeePassx while exploring replacing Firefox, and when looking at replacing web browser components. I wanted something cross-platform and open source.
Software + Security >
A secure communications tool which sends messages through a network of users which it doesn't need to trust.
It can be thought of like Tor for email.