It seems that the hurdle you have to jump over is everyone's informed opinion. When you're a young playwright, you're probably too precarious in your own technique to understand that when these seemingly informed opinions are contradicting each other...
Alright, alright, I admit it: my husband is the quiet, kind, accepting parent, and I'm the one who wants so much to be part of our two daughters' lives than I can't even let them finish a story without interrupting.
When you're young, faith is often a matter of rules. What you should do and shouldn't do, that kind of thing. But as you get older, you realize that faith is really a matter of relationship - with God, with the people around you, with the members of ...
Although skin color is undoubtedly the most salient signal of racial identity in America, other actual or imagined bodily features have also been seen as distinctive markers of Negritude. These include the shapes of heads, feet, lips, and noses as we...
So long as procreation stems from parents of the same race, appearance and lineage are typically congruent. Interracial unions give rise to added complexity. Interracial amalgamation will produce some individuals whose features diverge from those com...
Your 'hara' is here, where your uterus is if you're a woman, where the tummy sticks out if you're a man, the centre of gravity of the human body. It is the synthesis of our intellect, body and spirit, and by developing our consciousness of it, we can...
Some artists are able to pull off a very form-fitting, painted-on look that's very modern, but I have actually come around to embracing the idea that that these costumes are more like athletic uniforms than high-tech skin suits.
The requirements for illustrating an eight-page story are as different from that of an ensemble-cast mini-series as they are different from a solo ongoing. Whether or not they're named Captain America or Ruby Thursday matters less to me than whether ...
We like things to manifest right away, and they may not. Many times, we're just planting a seed and we don't know exactly how it is going to come to fruition. It's hard for us to realize that what we see in front of us might not be the end of the sto...
A child is not an adult, a child didn't ask to be here. Any man that doesn't take care of his responsibilities to his family and to his children, do me a favor STOP calling yourself a man..at least have the decency to admit that you're a boy. You don...
I realised how much misdirection is in stunt co-coordinating. It's similar to magic, the tricks we use to make people think the stunt is real. I also have a lifelong fascination with gambling cheats. I'm not one, but I do have a fascination with it.
Urban Fantasy is a subgenre pretty much designed for teenagers. It's pretty twee, but I adore it. I've been trying to come up with an Urban Fantasy comic ever since I'd read the Nancy Collins 'Sonja Blue' series years ago.
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore ca...
If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection.
I think a cyber-terrorism attack is overblown, though the threat exists. I think al Qaeda and other groups are more interested in symbolic terrorism, like what they did to the World Trade Center - suicide bombers or something that really has an effec...
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and b...
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices...
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems...
Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to ...
If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient.