
10·
6 hours agoIt’s not the conclusions that are important. It’s how snazzy the PowerPoint presentation is. If you pay them more, there will even be bar charts.
It’s not the conclusions that are important. It’s how snazzy the PowerPoint presentation is. If you pay them more, there will even be bar charts.
Origami can be used as a basis for geometry:
http://origametry.net/omfiles/geoconst.html
IIRC, you can do things that are impossible in standard Euclidean construction, such as squaring the circle. It also has more axioms than Euclidean construction, so maybe it’s not a completely fair comparison.
Under true capitalism, everyone starts at 0 regardless of their birth
Then true capitalism will never exist. At best, it’s a Platonic Ideal.
Nah, setting non-standard ports is sound advice in security circles.
People misunderstand the “no security through obscurity” phrase. If you build security as a chain, where the chain is only as good as the weakest link, then it’s bad. But if you build security in layers, like a castle, then it can only help. It’s OK for a layer to be weak when there are other layers behind it.
Even better, non-standard ports will make 99% of threats go away. They automate scans that are just looking for anything they can break. If they don’t see the open ports, they move on. Won’t stop a determined attacker, of course, but that’s what other layers are for.
As long as there’s real security otherwise (TLS, good passwords, etc), it’s fine.
If anyone says “that’s a false sense of security”, ignore them. They’ve replaced thinking with a cliche.