I help people exploit and improve Drupal, a free content management system. Software which restricts its users cannot match the potential of software which gives its users control. Participating in the free software community ensures that the code you invest in has a secure future.
I’m listening to an episode of the Science Talk podcast entitled, “Your Brain, Free Will and the Law.” In order to attack the idea of free will, Robert Sapolsky creates a meaningless definition of free will and claims it does not exist. According to his definition,
Free will is what we call the things that biology has not explained yet.
Several times he says that if his choice was determined by “biological luck,” then “it wasn’t me,” implying that our identities are independent of our biology. He goes on to say that because there is no evidence of choices that are not determined by biology, the idea of holding individuals responsible for their choices is unscientific. This sounds like nonsense to me.
At the close of the Constitutional Convention of 1787, one of the delegates heard a woman ask Benjamin Franklin, “Well, Doctor, what have we got—a republic or a monarchy?” Franklin replied,
A republic—if you can keep it.
I’m afraid that some of my Christian friends have forgotten their duty to keep the republic.
non-retina macOS users that find themselves on mojave:— Dean Herbert (@ppy) September 25, 2018
defaults write -g CGFontRenderingFontSmoothingDisabled -bool NO
sub-pixel rendering on macOS still has its issues, not having it at all can be many times more painful.
If the following MySQL error prevents you from creating or altering a table, you can get the statement to execute successfully by disabling strict mode:
1071 Specified key was too long; max key length is 1000 bytes
Disabling strict mode will change the error to a warning. The key will be shortened to fit the maximum key length. This is fine if you don’t need the full value in the index.
Cryptography is legally protected by the right to free speech. It is also protected by the right to keep and bear arms. Until 2000, cryptography was considered a weapon under United States law, and exporting strong encryption from the United States was banned. The same arguments used to defend gun ownership also apply to the right to use encryption to transmit and store information.
I have often heard (and repeated) the claim that Christmas was originally a pagan holiday. It made sense to me because it is not mentioned in the Bible. Until now, I had assumed that the claim that Christmas was a pagan holiday would not be made unless it had a factual basis.
Some people who believe this claim argue against Christmas decorations in church, so I decided to check the facts for myself. I do not expect facts alone to settle the argument. I just hope facts will help arguments to be based on truth.
Safari does not offer to open downloaded files by default. Black Manticore explains how to create a configuration file that lists downloaded file extensions allowed to open automatically.
If you are trying to connect a device that cannot display a Wi-Fi login screen to a Wi-Fi network that requires a login screen, you will need to spoof the MAC address of the device you are trying to connect on a device that can display a login screen.
A MAC address is a hardware ID that identifies a device on a network. Here’s how to spoof the MAC address on a Mac computer.