Configure and maintain your computer and use it more effectively to design and program a web site and make money on the web.

Inkscape Layers and Z-Order
Inkscape's use of the Z axis is represented by layers and is called z-order. When you first draw an object on an empty canvas, it has a z-order of 1. If you draw a second object, it has a z-order of 2. If you draw a third object, it has a z-order of 3 and so on. More ...

How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...

Fundamental Digital Logic Gates
All the advanced features of the most powerful computers, such as mulicore and parallel processing are done with digital logic. In this article I explain the fundamental concept of digital logic in simple and clear language so that anyone can understand it. More ...

Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...

Independent Contractor Agreement Template
This is a template for an Independent Contractor Agreement. It contains a series of boxes. Each box does not contain the final text of the agreement. Instead, each box contains a description or suggestion of the type of information that you should type into the box. More ...

Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...

Create Your Own Database Using Only Notepad : CDV
In this article you learn how to create a database using only a basic text editor along with any web browser. You won't believe how simple and powerful this method is. The database we design will have powerful features. More ...

Create a Cool Picture Frame Effect with CSS
By setting the CSS border-color property to a transparent color, and setting the background-origin property to border-box you can create a cool picture frame effect. More ...

Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...

Area of a Quadrilateral Calculator
If you have a regular quadrilateral there are simple formulas to calculate the area. But if you have an irregular quadrilateral you can calculate its area by viewing it as two triangles bucked up against one another. Find the area of each triangle, and then add them together. More ...

IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...

Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...

Introduction to HTML
A Web server sends the response to the client browser with a set of instructions written in HTML (HyperText Markup Language). HTML consists of tags that define the structure of a web page. It is the standard markup language for documents to be displayed in a web browser. More ...

Fiber Optic Bend Radius Standards
Fiber optic cable can be damaged by placing too much tension on the cable or bending the cable excessively during installation. Excessive bending or too much pulling force can permanently damage the fiber by causing micro cracks. More ...

The Truth About the Second Amendment

In 1775 many Americans were members of clubs called "militia" that met a couple times a year for training. These militia men carried their own firearms and made their own bullets because the states and Congress didn't have the revenue to pay for them.

That's why in 1789 when Congress added the bill of rights to the constitution it included the Second Amendment. The Second Amendment to the United States Constitution reads:

"A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed."

Unless you believe that the Founders' knowledge of grammar and sentence structure was suspect (and what right-thinking person would think that?), the Second amendment, though it does employ a peculiar and sometimes awkward construction called an "absolute," is actually a very straightforward call for the establishment of an armed militia when necessary. It has nothing to do with individual gun "rights" except in that context.

Second Amendment does not guarantee gun rights

Why did Congress not address the rights of individuals to own guns? Because in 1787 when the Bill of Rights was written, most Americans were farmers living in wilderness areas with bears, mountain lions, Wolves, and unfriendly Indians. No one would think to question an individuals right to own a gun. Even today, in states like Alaska, it would be unwise to travel in wilderness areas without a gun.

I am a Vietnam War veteran with with a ribbon for marksmanship with the M16 riffle.