Protecting Your Internet: Why You Should Use Cloudflare’s New DNS Service

What Is DNS? DNS stands for Domain Name System. Basically, whenever you go to a website, you are using that website’s domain name to access it. For example, going to designbypixl.com will take you to this fine site, and going to google.com will take you to Google. But how does your browser know to do that? How does it know […]

Where Is My Moon Landing?

Wednesday, July 16, 1969. That was the day the Apollo 11 launched from the Kennedy Space Center in Florida. Four days later on Sunday, July 20th, 1969, at 4:18 PM ET, the world watched in unison as Neil Armstrong and pilot Buzz Aldrin landed the lunar module Eagle on the moon. Humanity has taken its first steps amongst the stars.

The UBI Problem – Universal Basic Income

Universal Basic income, or UBI, is going to be a necessity sometime in the future. In its simplest form, UBI is when the government gives enough money every month to each citizen to live above the poverty line. This allows every single citizen to afford food, shelter, and other basic human rights even if they never work a day in their lives or if they work 80 hours a week.

Lately, I’ve been thinking a lot about UBI: advantages, disadvantages, and overall why I think that it will eventually become a necessity. I’ve seen a lot of poor arguments against UBI, and I’ll be discrediting some of the more common ones in this article, but before I do, we need to zoom out and take a larger look at the direction society and technology is heading.

The Best Way To Create and Send Invoices Using WordPress

My new plugin for Wordpress, HD Invoice, is easiest way to quickly create professional looking invoices from your own site. Targeted towards freelancers, small businesses’, contractors, and entrepreneurs around the world, learn more about my new breakthrough system!

Adding a Remote to OpenElec XBMC KODI

How to connect a remote to OpenElec

Truth About the Recent Sony Hacks

So to get a full picture you have to read a lot of very technical reports from the network security community. My understanding of the attack comes from reading (probably way too many) technical reports about it. I’ll try and give the most readable sources here.

Share this article