Daily Archives: October 12, 2015

NSA Tournament Search – Play NSA

Posted: October 12, 2015 at 9:47 pm

Search Previous Season Tournaments (Click Here) Age Group: Please Select... Adult Youth Season: Select ALL CURRENT SEASON: Sept 2015 to Aug 2016 [Youth Tournaments Only] CURRENT SEASON: Jan to Dec 2015 [Adult Tournaments Only] CURRENT SEASON: Sept 2014 to Aug 2015 [Youth Tournaments Only] CURRENT SEASON: Jan to Dec 2014 [Adult Tournaments Only] CURRENT SEASON: Sept 2013 to Aug 2014 [Youth Tournaments Only] CURRENT SEASON: Jan to Dec 2013 [Adult Tournaments Only] CURRENT SEASON: Sept 2012 to Aug 2013 [Youth Tournaments Only] CURRENT SEASON: Jan to Dec 2012 [Adult Tournaments Only] FUTURE SEASON: Sept 2011 to Aug 2012 [Youth Tournaments Only] CURRENT SEASON: Jan to Dec 2011 [Adult Tournaments Only] CURRENT SEASON: Sept 2010 to Aug 2011 [Youth Tournaments Only] State/Region: Select All Alabama - Statewide Alaska - Statewide Arizona - Statewide Arkansas - Statewide California - Statewide California - Northern California - Central California - Southern Colorado - Statewide Connecticut - Statewide DC - Statewide Delaware - Statewide Florida - Statewide Florida - West Coast Florida - East Coast Georgia - Statewide Hawaii - Statewide Idaho - Statewide Illinois - Statewide Indiana - Statewide Indiana - Northern Indiana - Southern Iowa - Statewide Kansas - Statewide Kentucky - Statewide Louisiana - Statewide Maine - Statewide Maryland - Statewide Massachusetts - Statewide Michigan - Statewide Minnesota - Statewide Mississippi - Statewide Missouri - Statewide Montana - Statewide Nebraska - Statewide Nevada - Statewide New Hampshire - Statewide New Jersey - Statewide New Mexico - Statewide New York - Statewide North Carolina - Statewide North Carolina - Eastern North Carolina - Western North Dakota - Statewide Ohio - Statewide Ohio - Northern Ohio - Southern Oklahoma - Statewide Oregon - Statewide Pennsylvania - Statewide Puerto Rico - Statewide Rhode Island - Statewide South Carolina - Statewide South Dakota - Statewide Tennessee - Statewide Texas - Statewide Utah - Statewide Vermont - Statewide Virginia - Statewide Washington - Statewide West Virginia - Statewide Wisconsin - Statewide Wyoming - Statewide CAN - Alberta - Statewide CAN - British Columbia - Statewide CAN - Labrador - Statewide CAN - Manitoba - Statewide CAN - Newfoundland - Statewide CAN - New Brunswick - Statewide CAN - Nova Scotia - Statewide CAN - Northwest Territories - Statewide CAN - Ontario - Statewide CAN - Saskatchewan - Statewide CAN - Quebec - Statewide CAN - Calgary - Statewide Ireland - Statewide

More here:
NSA Tournament Search - Play NSA

Posted in NSA | Comments Off on NSA Tournament Search – Play NSA

How to Browse Anonymously With Tor

Posted: at 9:47 pm

Everything you do online can be traced back to your IP address. Even if youre accessing encrypted websites, networks can see the websites youre accessing and the websites themselves know your IP address. Use the Tor network to browse with anonymity.

Tor is an encrypted network that can route your traffic through relays, making the traffic appear to come from exit nodes. Unlike with proxies, the exit node itself doesnt know your IP address or where you are.

When you use a Tor client, your Internet traffic is routed through Tors network. The traffic travels through several randomly selected relays (run by volunteers), before exiting the Tor network and arriving at your destination. This prevents your Internet service provider and people monitoring your local network from viewing the websites you access. It also prevents the websites themselves from knowing your physical location or IP address theyll see the IP address and location of the exit node instead. Even the relays dont know who requested the traffic theyre passing along. All traffic within the Tor network is encrypted.

Image Credit: The Tor Project, Inc.

For example, lets say you access Google.com through Tor. Your Internet service provider and local network operator cant see that youre accessing Google.com they just see encrypted Tor traffic. The Tor relays pass your traffic along until it eventually reaches an exit node. The exit node talks to Google for you from Googles perspective, the exit node is accessing their website. (Of course, traffic can be monitored at the exit node if youre accessing an unencrypted website.) The exit node passes the traffic back along the relays, and the relays dont know where it ends up.

Tor offers anonymity and a path through Internet censorship and monitoring people living under repressive regimes with censored Internet connections can use Tor to access the wider Internet without fear of reprisal. Whistleblowers can use Tor to leak information without their traffic being monitored and logged.

Its not a great idea to use Tor for normal browsing, though. While the architecture does a good job of offering anonymity, browsing through Tor is significantly slower than browsing normally.

If you want more detailed information about how Tor works, check out the Tor Projects website.

The Tor Project recommends the Tor Browser Bundle as the safest, easiest way to use Tor. The Tor Browser Bundle is a customized, portable version of Firefox that comes preconfigured with the ideal settings and extensions for TOr. You can use Tor with other browsers and browser configurations, but this is likely to be unsafe. For example, Flash and other browser plug-ins can reveal your IP address the Tor Browser Bundle disables plug-ins for you and provides a safe environment, so you dont have to worry about your browser settings. It also includes the EFFs HTTPS Everywhere extension, which enables HTTPS on websites with HTTPS support. HTTPS provides encryption between the exit node and destination website.

Tor recommends that you not download document files, such as DOC and PDF files, and open them in external applications. The external application can connect to the Internet to download additional resources, exposing your IP address.

After downloading the Tor Browser Bundle, double-click the downloaded EXE file and extract it to your hard drive. The Tor Browser Bundle requires no installation, so you can extract it to a USB stick and run it from there.

Launch the Start Tor Browser.exe file in the Tor Browser folder.

The EXE file will launch Vidalia, which connects to the Tor network. After connecting, Vidalia will automatically open Tors customized Firefox browser.

Vidalia automatically launches the Tor Browser once it connects. When you close the browser, Vidalia automatically disconnects from Tor and closes.

Vidalia creates a local proxy on your system. The Tor Browser Bundle is configured to route all your traffic through it by default, as we can see here in the Tor Browsers connection settings window. You can configure other programs to access Tor through the proxy, but they may reveal your IP address in other ways.

Use the Tor Browser to browse the web just as you would with a normal browser. Its pre-configured with Startpage and DuckDuckGo, search engines that respect your privacy.

Remember not to provide any personal information say, by logging into an account associated with you while using the Tor browser, or youll lose the anonymity.

Chris Hoffman is a technology writer and all-around computer geek. He's as at home using the Linux terminal as he is digging into the Windows registry. Connect with him on Google+.

See the original post here:
How to Browse Anonymously With Tor

Posted in Tor Browser | Comments Off on How to Browse Anonymously With Tor

Tor Browser ndir – Gvenilir ve Anonim Web Taraycs – Tamindir

Posted: at 9:47 pm

Tor Browser, evrimii gvenliine ve gizliliine nem veren bilgisayar kullanclarnn internet zerinde anonim olarak gvenli bir ekilde gezebilmesi ve internet alemindeki tm engelleri ortadan kaldrarak gezinebilmesi iin gelitirilmi olan gvenilir bir internet taraycsdr.

Farkl kaynaklar tarafndan gzetlenebilecek veya izlenebilecek olan a trafiinizi ve veri alveri istatistiklerinin korunmas iin gl bir kalkan grevi gren yazlm, ierisinde yer alan eitli zellikler ve aralar yardmyla bulunduunuz yeri gizlemenin dnda evrimii bilgilerinizi ve internet gemii verilerinizi de gizler.

Sanal sunuculardan kurulu olan a temellerine dayanan Tor Browser, bu sayede internet zerinde anonim bir ekilde gezinmenize ve istediiniz tm sitelere yasaklara veya engellemelere taklmadan giri yapmanza olanak salar. Tm dnya zerinde yer alan eitli sunucularla farkl kurallar ve algoritmalar dahilinde veri alveriinde bulunan tarayc, tm trafii farkl kaynaklar zerinden ald iin takip edilmesi neredeyse imkanszdr.

Firefox'un zelletirilmi bir versiyonunu kullanmakta olan Tor, Vidalia adnda sade ve kolay kullanlabilir bir kullanc arayzne sahiptir. Bu sayede her seviyeden kullanc tarafndan rahatlkla kullanlabilecek olan yazlm, zellikle daha nce Firefox'u kullanm olan kullanclara ok daha tandk gelecektir.

Kolay ve sorunsuz bir kurulum ileminin ardndan taraycnz kullanmaya balayabilmek iin ncelikli olarak gerekli yerel a ayarlarn yapmal veya otomatik ayarlar kullanarak Tor ana balanmalsnz. Bu sylediim ilemleri kurulum sonras karnza gelecek olan arayz zerinde bir iki tklamayla gerekletirebilir ve Tor ana balanmanzn ardndan otomatik olarak alacak olan Tor Browser' hemen kullanmaya balayabilirsiniz.

Bahsetmi olduumuz tm bu zellikleri bir araya getirdiimiz zaman, internette zgrce srf yapabilmek ve engelli sitelere girebilmek iin kullanabileceiniz en etkili ve gvenilir web tarayclarndan biri olarak dikkat eken Tor Browser, tm bilgisayar kullanclarnn arivinde yer almas gereken programlardan bir tanesi.

Read the original post:
Tor Browser ndir - Gvenilir ve Anonim Web Taraycs - Tamindir

Posted in Tor Browser | Comments Off on Tor Browser ndir – Gvenilir ve Anonim Web Taraycs – Tamindir

Tor Browser 5.0.3 Download – TechSpot

Posted: at 9:47 pm

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

View post:
Tor Browser 5.0.3 Download - TechSpot

Posted in Tor Browser | Comments Off on Tor Browser 5.0.3 Download – TechSpot

Tor Browser for Mac – Free download and software reviews …

Posted: at 7:47 am

1 stars

"Downloads spam extensions onto my mac"

March 09, 2014 | By steelsmith80

| Version: Tor Browser Bundle 3.5.2.1

Pros

tor is a benefit if you can look past all of the hijacking you'll deal with

Cons

each and every chrome profile has 4 extensions added to it and they took over my default browser. I consider this pretty shady.

Summary

not worth the shady, spammy issues you'll encounter. I'd consider a non-cnet download from now on

Reply to this review

Was this review helpful? (0) (0)

4 stars

"What's downloading is v2.3.25-12, not 13"

October 03, 2013 | By zunipus

| Version: Tor Browser Bundle 2.3.25.13

Pros

What's downloading is v2.3.25-12, not 13

Cons

What's downloading is v2.3.25-12, not 13

Summary

Not a perfect solution to anonymity. You have been warned. But it has lots of other great uses!

Reply to this review

Was this review helpful? (0) (0)

4 stars

"Works the same as the old browser"

March 03, 2013 | By Zandiman1

| Version: Tor Browser Bundle 2.3.25.4

Pros

I can't tell. As far as I can see it works exactly the same

Cons

Every time you update Tor, it loses all the settings, tabs and bookmarks you had in the previous version.

This is particularly annoying if you've put a lot of time in creating macros and scripts for your download client.

Since the Tor browser is essentially Firefox, it shouldn't be that hard for Tor to have the browser act like the regular Firefox and keep all of it's settings after the update.

Reply to this review Read reply (1)

Was this review helpful? (0) (0)

Reply by Zandiman1 on July 10, 2013

EXACTLY RIGHT. It's a giant pain in the ass which keeps from updating it. Unless they give me a compelling reason, such as there are security holes with the current version, I will hold off on updating. You'd think they'd address this basic problem.

4 stars

"The link is for 32-bit Tor, but 64-bit also available!"

February 22, 2013 | By zunipus

| Version: Tor Browser Bundle 2.3.25.4

Pros

The wonders of the Onion project, Vidalia, and the Tor network all running on Firefox. It is much simpler than it used to be...

Cons

...But this is still fundamentally geekware IMHO if you want to use much more than its anonymity features. The learning curve is kind of rocky.

Summary

NOTE: The 32-bit version is downloaded via the link here. HOWEVER! There is also a 64-bit version! You can choose which of the two versions to download HERE:

https://www.torproject.org/download/download-easy.html.en

There are a lot of terrific things you can do with Tor and the Tor community. Read read read and play play play to learn and figure it all out.

You still have to be careful out there because ratty types like to hang out anonymously too. Be safe at all times. Enjoy your natural right to PRIVACY. Don't let any bozos take it away. Not ever!

Reply to this review

Was this review helpful? (0) (0)

1 stars

"***? Updated flash and still get an error message"

November 24, 2012 | By JOMADSinCEBU

| Version: Tor Browser Bundle 2.2.39-5

Pros

Interface was fine.

Cons

All I got was an error message telling me to update Flash Player.

Summary

I'm a MAC user for several reason one of which I like when applications JUST WORK! If I wanted to spend time geeking around with an app I'd be a winblowz user.

Tried to view a youtube video not allowed in the 3rd world I'm in now. Tried this browser. A message telling me to update my Flash Player appeared. OK. Updated flash. Still no luck. What's the point?

Reply to this review

Was this review helpful? (0) (0)

5 stars

"Tor works just great!"

July 10, 2012 | By heidisman

| Version: Tor 2.2.37-1

Pros

It took me a while to find a way to hide my IP address and I finally 'discovered' the Tor Browser. I have been using Tor for about two months and it does exactly as detailed on the Tor website.

Cons

So far I have none.

Reply to this review

Was this review helpful? (0) (0)

3 stars

"Hello,what about Tor for windows?!please consider"

June 02, 2011 | By KamRanZandi

| Version: Tor 0.2.1.30

Pros

Hello,what about Tor for windows?!please consider

Cons

Hello,what about Tor for windows?!please consider

Summary

Hello,what about Tor for windows?!please consider

Reply to this review Read reply (1)

Was this review helpful? (0) (4)

Reply by zunipus on September 4, 2011

Follow the link to the Tor site via the 'See full specifications' link above. At the Tor site you will find that it is written for Windows XP, Vista and 7ista as well as Mac OS X Intel and GNU/Linux i686. It's amazing what doing your homework can accomplish. 😉

5 stars

"The Ultimate Proxy for Personal Privacy"

January 18, 2011 | By zunipus

| Version: Tor 0.2.1.29

Pros

Tor is an Open Source project, independent of any political or oligarchic meddling. It works beautifully and restores faith in the human right of privacy. Once you understand what it's for, what it does and how to use it, it just works.

Cons

There is a steep learning curve if you want to understand Tor/Vidalia. It essentially is geekware, requiring patience with the accompanying difficult or missing documentation.

Summary

I learned about the Onion/Tor project via studying computer security and an interest in circumventing the deceitful "1984"-like political atmosphere developing in the USA over the last decade. I also wanted to circumvent ridiculous and abusive marketing blackouts around the world that prevent the sharing of information and media around the world. Tor/Vidalia is brilliant in solving these problems. Once you comprehend everything about it, I also found it remarkably easy to use.

Read more from the original source:
Tor Browser for Mac - Free download and software reviews ...

Posted in Tor Browser | Comments Off on Tor Browser for Mac – Free download and software reviews …

Space Settlement

Posted: at 7:45 am

spreading life throughout the solar system "I know that humans will colonize the solar system and one day go beyond." Mike Griffin, former NASA Administrator.

A billion years ago there was no life on land. In a phenomenal development, by 400 million years ago land life was well established. We are at the very beginning of a similar, perhaps even more important, development. Today Earth teems with life, but as far as we know, in the vast reaches of space there are only a handful of astronauts, a few plants and animals, and some bacteria and fungi; mostly on the International Space Station. We can change that. In the 1970's Princeton physicist Gerard O'Neill, with the help of NASA Ames Research Center and Stanford University, discovered that we can build gigantic spaceships, big enough to live in. These free-space settlements could be wonderful places to live; about the size of a California beach town and endowed with weightless recreation, fantastic views, freedom, elbow-room in spades, and great wealth. In time, we may see millions of free-space settlements in our solar system alone. Building them, particularly the first one, is a monumental challenge. If this sounds exciting, read on.

Arthur C. Clarke once wrote that new ideas pass through three periods:

NASA Website Privacy Statement

Read the rest here:
Space Settlement

Posted in Moon Colonization | Comments Off on Space Settlement

Atopic eczema – Treatment – NHS Choices

Posted: at 7:44 am

There is no cure for atopic eczema, but treatments can ease the symptoms. Many children find their symptoms naturally improve as they get older.

The main treatments for atopic eczema are:

Other treatments include topical pimecrolimus or tacrolimus for eczema in sensitive sites not responding to simpler treatment,antihistamines for severe itching, bandages or special body suits to allow the body to heal underneath, or more powerful treatments offered by a dermatologist (skin specialist).

Read on to learn about the different treatments you may be offered. You can also read a summary of the pros and cons of these, allowing you to compare your treatment options.

As well as the treatments mentioned above, there are thingsyou cando yourself to help easeyour symptoms and prevent further problems.

Eczema is often itchy and it can be very tempting to scratch the affected areas of skin. But scratching usually damages the skin, which can itself cause more eczema to occur.

The skin eventually thickens into leathery areas as a result of chronic scratching. Deep scratching also causes bleeding and increases the risk of your skin becoming infected or scarred.

Try to reduce scratching whenever possible. You could try gently rubbing your skin with your fingers instead. If your baby has atopic eczema, anti-scratch mittens may stop them scratching their skin.

Keep your nails short and clean to minimise damage to the skin from unintentional scratching. Keep your skin covered with light clothing to reduce damage from habitual scratching.

Your GP will work with you toestablish what mighttrigger the eczema flare-ups, althoughit may get better or worse for no obvious reason.

Once you knowyour triggers, you can try to avoid them.For example:

Althoughsome people with eczema are allergic to house dust mites, trying to rid your home of them isn't recommendedas it can be difficult and there is no clear evidence that it helps.

Read more about preventing allergies.

Some foods, such as eggs and cows' milk, can trigger eczema symptoms. However, you should not make significant changes to your diet without first speaking to your GP.

It may not be healthy to cut these foods from your diet, especially in young children who need the calcium, calories and protein from these foods.

If your GP suspects you have afood allergy, you may be referred to a dietitian (a specialist in diet and nutrition), who can help work out a way to avoid the food you're allergic to while ensuring you still get all the nutrition you need.

Alternatively, you may be referred to a hospital specialist such as an immunologist, dermatologist or paediatrician.

If you are breastfeeding a baby with atopic eczema, get medical advice before making any changes to your regular diet.

Emollients are moisturising treatments applied directly to the skin to reduce water loss and cover it with a protective film. They are often used to help manage dry or scaly skin conditions such as atopic eczema.

In addition to making the skin feel less dry, they may also have a mild anti-inflammatory role, and can help reduce the number of flare-ups you have.

Several different emollients are available. You may need to try a few to find one that works for you. You may also be advised to use a mix of emollients, such as:

The difference between lotions, creams and ointments is the amount of oil they contain. Ointments contain the most oil so they can be quite greasy, but are the most effective at keeping moisture in the skin.

Lotions contain the least amount of oil so are not greasy, but can be less effective. Creams are somewhere in between.

If you have been using a particular emollient for some time, it may eventually become less effective or may start to irritate your skin.

If this is the case, your GP will be able to prescribe another product that suits you better. The best emollient is the one you feel happy using every day.

Use your emollient all the time, even if you are not experiencing symptoms. Many people find it helpful to keep separate supplies of emollients at work or school, or a tub in the bathroom and one in a living area.

To apply the emollient:

You should use an emollient at least twice a day if you can, or more often if you have very dry skin.

During a flare-up, apply generous amounts of emollient more frequently, but remember to treat inflamed skin with a topical corticosteroidas emollients usedon their ownare not enough to control it.

Don't put your fingers into an emollient pot use a spoon or pump dispenser instead, as this reduces the risk of infection. And never share your emollient with other people.

If your skin is sore and inflamed, your GP may prescribe a topical corticosteroid (applied directly to your skin), which can reduce the inflammation within a few days.

Topical corticosteroids can be prescribed in different strengths, depending on the severity of your atopic eczema and the areas of skin affected.

They can be very mild (such as hydrocortisone), moderate (such as clobetasone butyrate), or even stronger (such as mometasone).

If you need to use corticosteroids frequently, see your GP regularly so they can check the treatment is working effectively and you are using the right amount.

Don't be afraid to apply the treatment to affected areas to control your eczema. Unless instructed otherwise by your doctor, follow the directions on the patient information leaflet that comes with your medication. This will give details of how much to apply.

Most people will only have to apply it once a day as there is no evidence there is any benefit to applying it more often.

When using a topical corticosteroid:

Occasionally, your doctor may suggest using a topical corticosteroid less frequently, but over a longer period of time. This is designedto help prevent flare-ups.

This is sometimes called "weekend treatment", where a person who has already gained control of their eczema uses the topical corticosteroid every weekend on the trouble sites to prevent them becoming active again.

Topical corticosteroids may cause a mild stinging sensation for less than a minute as you apply them.

In rare cases, they may also cause:

Most of these side effects will improve once treatment stops.

Generally, using a strong topical corticosteroid for many months,using them in sensitive areas such as theface, armpits or groin, or using a large amount will increase your risk of side effects. For this reason, you should be prescribed the weakest effective treatment to control your symptoms.

Antihistamines are a type of medicine that blocks the effects of a substance in the blood called histamine. Theycan help relieve the itching associated with atopic eczema.

They can eitherbe sedating, which cause drowsiness,ornon-sedating. If you have severe itching, your GP may suggest tryinga non-sedating antihistamine.

If itching during a flare-up affects your sleep, your GP may suggest taking a sedatingantihistamine. Sedatingantihistamines can cause drowsiness into the following day, so it may be helpful to let your child's school know they may not be as alert as normal.

In some cases, your GP may prescribe special medicated bandages, clothing or wet wraps to wear over areas of skin affected by eczema.

These can either be used over emollients or with topical corticosteroids to prevent scratching, allow the skin underneath to heal, and stop the skin drying out.

Corticosteroid tabletsare rarely used to treat atopic eczema nowadays, but may occasionally be prescribed for short periods of five to seven days to help bring particularly severe flare-ups under control.

Longer courses of treatment are generally avoided because of the risk of potentially serious side effects.

If your GP thinks your condition may be severe enough to benefit from repeated or prolonged treatment with corticosteroid tablets, they will probably refer you to a specialist.

In some cases, your GP may refer you to a specialist in treating skin conditions (dermatologist).

You may be referred if your GP is not sure what type of eczema you have, normal treatment is not controlling your eczema, your eczema is affecting your daily life, or it's not clear what is causing it.

A dermatologist may be able to offer the following:

A dermatologist may also offer additional support to help you use your treatments correctly, such as demonstrations from nurse specialists, and they may be able to refer you for psychological support if you feel youneed it.

Some people may find complementary therapies such as herbal remedies helpful in treating their eczema, but there is little evidence to show these remedies are effective.

If you are thinking about using a complementary therapy, speak to your GP first to ensure the therapy is safe for you to use. Make sure you continue to use other treatments your GP has prescribed.

Page last reviewed: 25/11/2014

Next review due: 25/11/2016

Read more:
Atopic eczema - Treatment - NHS Choices

Posted in Eczema | Comments Off on Atopic eczema – Treatment – NHS Choices

Second Amendment – National Constitution Center

Posted: at 3:40 am

The Second Amendment

Modern debates about the Second Amendment have focused on whether it protects a private right of individuals to keep and bear arms, or a right that can be exercised only through militia organizations like the National Guard. This question, however, was not even raised until long after the Bill of Rights was adopted.

Many in the Founding generation believed that governments are prone to use soldiers to oppress the people. English history suggested that this risk could be controlled by permitting the government to raise armies (consisting of full-time paid troops) only when needed to fight foreign adversaries. For other purposes, such as responding to sudden invasions or other emergencies, the government could rely on a militia that consisted of ordinary civilians who supplied their own weapons and received some part-time, unpaid military training.

The onset of war does not always allow time to raise and train an army, and the Revolutionary War showed that militia forces could not be relied on for national defense. The Constitutional Convention therefore decided that the federal government should have almost unfettered authority to establish peacetime standing armies and to regulate the militia.

This massive shift of power from the states to the federal government generated one of the chief objections to the proposed Constitution. Anti-Federalists argued that the proposed Constitution would take from the states their principal means of defense against federal usurpation. The Federalists responded that fears of federal oppression were overblown, in part because the American people were armed and would be almost impossible to subdue through military force.

Implicit in the debate between Federalists and Anti-Federalists were two shared assumptions. First, that the proposed new Constitution gave the federal government almost total legal authority over the army and militia. Second, that the federal government should not have any authority at all to disarm the citizenry. They disagreed only about whether an armed populace could adequately deter federal oppression.

The Second Amendment conceded nothing to the Anti-Federalists desire to sharply curtail the military power of the federal government, which would have required substantial changes in the original Constitution. Yet the Amendment was easily accepted because of widespread agreement that the federal government should not have the power to infringe the right of the people to keep and bear arms, any more than it should have the power to abridge the freedom of speech or prohibit the free exercise of religion.

Much has changed since 1791. The traditional militia fell into desuetude, and state-based militia organizations were eventually incorporated into the federal military structure. The nations military establishment has become enormously more powerful than eighteenth century armies. We still hear political rhetoric about federal tyranny, but most Americans do not fear the nations armed forces and virtually no one thinks that an armed populace could defeat those forces in battle. Furthermore, eighteenth century civilians routinely kept at home the very same weapons they would need if called to serve in the militia, while modern soldiers are equipped with weapons that differ significantly from those generally thought appropriate for civilian uses. Civilians no longer expect to use their household weapons for militia duty, although they still keep and bear arms to defend against common criminals (as well as for hunting and other forms of recreation).

The law has also changed. While states in the Founding era regulated gunsblacks were often prohibited from possessing firearms and militia weapons were frequently registered on government rollsgun laws today are more extensive and controversial. Another important legal development was the adoption of the Fourteenth Amendment. The Second Amendment originally applied only to the federal government, leaving the states to regulate weapons as they saw fit. Although there is substantial evidence that the Privileges or Immunities Clause of the Fourteenth Amendment was meant to protect the right of individuals to keep and bear arms from infringement by the states, the Supreme Court rejected this interpretation in United States v. Cruikshank (1876).

Until recently, the judiciary treated the Second Amendment almost as a dead letter. In District of Columbia v. Heller (2008), however, the Supreme Court invalidated a federal law that forbade nearly all civilians from possessing handguns in the nations capital. A 54 majority ruled that the language and history of the Second Amendment showed that it protects a private right of individuals to have arms for their own defense, not a right of the states to maintain a militia.

The dissenters disagreed. They concluded that the Second Amendment protects a nominally individual right, though one that protects only the right of the people of each of the several States to maintain a well-regulated militia. They also argued that even if the Second Amendment did protect an individual right to have arms for self-defense, it should be interpreted to allow the government to ban handguns in high-crime urban areas.

Two years later, in McDonald v. City of Chicago (2010), the Court struck down a similar handgun ban at the state level, again by a 54 vote. Four Justices relied on judicial precedents under the Fourteenth Amendments Due Process Clause. Justice Thomas rejected those precedents in favor of reliance on the Privileges or Immunities Clause, but all five members of the majority concluded that the Fourteenth Amendment protects against state infringement the same individual right that is protected from federal infringement by the Second Amendment.

Notwithstanding the lengthy opinions in Heller and McDonald, they technically ruled only that government may not ban the possession of handguns by civilians in their homes. Heller tentatively suggested a list of presumptively lawful regulations, including bans on the possession of firearms by felons and the mentally ill, bans on carrying firearms in sensitive places such as schools and government buildings, laws restricting the commercial sale of arms, bans on the concealed carry of firearms, and bans on weapons not typically possessed by law-abiding citizens for lawful purposes. Many issues remain open, and the lower courts have disagreed with one another about some of them, including important questions involving restrictions on carrying weapons in public.

The right to keep and bear arms is a lot like the right to freedom of speech. In each case, the Constitution expressly protects a liberty that needs to be insulated from the ordinary political process.

Gun control is as much a part of the Second Amendment as the right to keep and bear arms. The text of the amendment, which refers to a well regulated Militia, suggests as much.

Not a Second Class Right: The Second Amendment Today by Nelson Lund

The right to keep and bear arms is a lot like the right to freedom of speech. In each case, the Constitution expressly protects a liberty that needs to be insulated from the ordinary political process. Neither right, however, is absolute. The First Amendment, for example, has never protected perjury, fraud, or countless other crimes that are committed through the use of speech. Similarly, no reasonable person could believe that violent criminals should have unrestricted access to guns, or that any individual should possess a nuclear weapon.

Inevitably, courts must draw lines, allowing government to carry out its duty to preserve an orderly society, without unduly infringing the legitimate interests of individuals in expressing their thoughts and protecting themselves from criminal violence. This is not a precise science or one that will ever be free from controversy.

One judicial approach, however, should be unequivocally rejected. During the nineteenth century, courts routinely refused to invalidate restrictions on free speech that struck the judges as reasonable. This meant that speech got virtually no judicial protection. Government suppression of speech can usually be thought to serve some reasonable purpose, such as reducing social discord or promoting healthy morals. Similarly, most gun control laws can be viewed as efforts to save lives and prevent crime, which are perfectly reasonable goals. If thats enough to justify infringements on individual liberty, neither constitutional guarantee means much of anything.

During the twentieth century, the Supreme Court finally started taking the First Amendment seriously. Today, individual freedom is generally protected unless the government can make a strong case that it has a real need to suppress speech or expressive conduct, and that its regulations are tailored to that need. The legal doctrines have become quite complex, and there is room for disagreement about many of the Courts specific decisions. Taken as a whole, however, this body of case law shows what the Court can do when it appreciates the value of an individual right enshrined in the Constitution.

The Second Amendment also raises issues about which reasonable people can disagree. But if the Supreme Court takes this provision of the Constitution as seriously as it now takes the First Amendment, which it should do, there will be some easy issues as well.

District of Columbia v. Heller (2008) is one example. The right of the people protected by the Second Amendment is an individual right, just like the right[s] of the people protected by the First and Fourth Amendments. The Constitution does not say that the Second Amendment protects a right of the states or a right of the militia, and nobody offered such an interpretation during the Founding era. Abundant historical evidence indicates that the Second Amendment was meant to leave citizens with the ability to defend themselves against unlawful violence. Such threats might come from usurpers of governmental power, but they might also come from criminals whom the government is unwilling or unable to control.

McDonald v. City of Chicago (2010) was also an easy case under the Courts precedents. Most other provisions of the Bill of Rights had already been applied to the states because they are deeply rooted in this Nations history and tradition. The right to keep and bear arms clearly meets this test.

The text of the Constitution expressly guarantees the right to bear arms, not just the right to keep them. The courts should invalidate regulations that prevent law-abiding citizens from carrying weapons in public, where the vast majority of violent crimes occur. First Amendment rights are not confined to the home, and neither are those protected by the Second Amendment.

Nor should the government be allowed to create burdensome bureaucratic obstacles designed to frustrate the exercise of Second Amendment rights. The courts are vigilant in preventing government from evading the First Amendment through regulations that indirectly abridge free speech rights by making them difficult to exercise. Courts should exercise the same vigilance in protecting Second Amendment rights.

Some other regulations that may appear innocuous should be struck down because they are little more than political stunts. Popular bans on so-called assault rifles, for example, define this class of guns in terms of cosmetic features, leaving functionally identical semi-automatic rifles to circulate freely. This is unconstitutional for the same reason that it would violate the First Amendment to ban words that have a French etymology, or to require that French fries be called freedom fries.

In most American states, including many with large urban population centers, responsible adults have easy access to ordinary firearms, and they are permitted to carry them in public. Experience has shown that these policies do not lead to increased levels of violence. Criminals pay no more attention to gun control regulations than they do to laws against murder, rape, and robbery. Armed citizens, however, prevent countless crimes and have saved many lives. Whats more, the most vulnerable peopleincluding women, the elderly, and those who live in high crime neighborhoodsare among the greatest beneficiaries of the Second Amendment. If the courts require the remaining jurisdictions to stop infringing on the constitutional right to keep and bear arms, their citizens will be more free and probably safer as well.

The Reasonable Right to Bear Arms by Adam Winkler

Gun control is as much a part of the Second Amendment as the right to keep and bear arms. The text of the amendment, which refers to a well regulated Militia, suggests as much. As the Supreme Court correctly noted in District of Columbia v. Heller (2008), the militia of the founding era was the body of ordinary citizens capable of taking up arms to defend the nation. While the Founders sought to protect the citizenry from being disarmed entirely, they did not wish to prevent government from adopting reasonable regulations of guns and gun owners.

Although Americans today often think that gun control is a modern invention, the Founding era had laws regulating the armed citizenry. There were laws designed to ensure an effective militia, such as laws requiring armed citizens to appear at mandatory musters where their guns would be inspected. Governments also compiled registries of civilian-owned guns appropriate for militia service, sometimes conducting door-to-door surveys. The Founders had broad bans on gun possession by people deemed untrustworthy, including slaves and loyalists. The Founders even had laws requiring people to have guns appropriate for militia service.

The wide range of Founding-era laws suggests that the Founders understood gun rights quite differently from many people today. The right to keep and bear arms was not a libertarian license for anyone to have any kind of ordinary firearm, anywhere they wanted. Nor did the Second Amendment protect a right to revolt against a tyrannical government. The Second Amendment was about ensuring public safety, and nothing in its language was thought to prevent what would be seen today as quite burdensome forms of regulation.

The Founding-era laws indicate why the First Amendment is not a good analogy to the Second. While there have always been laws restricting perjury and fraud by the spoken word, such speech was not thought to be part of the freedom of speech. The Second Amendment, by contrast, unambiguously recognizes that the armed citizenry must be regulatedand regulated well. This language most closely aligns with the Fourth Amendment, which protects a right to privacy but also recognizes the authority of the government to conduct reasonable searches and seizures.

The principle that reasonable regulations are consistent with the Second Amendment has been affirmed throughout American history. Ever since the first cases challenging gun controls for violating the Second Amendment or similar provisions in state constitutions, courts have repeatedly held that reasonable gun lawsthose that dont completely deny access to guns by law-abiding peopleare constitutionally permissible. For 150 years, this was the settled law of the landuntil Heller.

Heller, however, rejected the principle of reasonableness only in name, not in practice. The decision insisted that many types of gun control laws are presumptively lawful, including bans on possession of firearms by felons and the mentally ill, bans on concealed carry, bans on dangerous and unusual weapons, restrictions on guns in sensitive places like schools and government buildings, and commercial sale restrictions. Nearly all gun control laws today fit within these exceptions. Importantly, these exceptions for modern-day gun laws unheard of in the Founding era also show that lawmakers are not limited to the types of gun control in place at the time of the Second Amendments ratification.

In the years since Heller, the federal courts have upheld the overwhelming majority of gun control laws challenged under the Second Amendment. Bans on assault weapons have been consistently upheld, as have restrictions on gun magazines that hold more than a minimum number of rounds of ammunition. Bans on guns in national parks, post offices, bars, and college campuses also survived. These decisions make clear that lawmakers have wide leeway to restrict guns to promote public safety so long as the basic right of law-abiding people to have a gun for self-defense is preserved.

Perhaps the biggest open question after Heller is whether the Second Amendment protects a right to carry guns in public. While every state allows public carry, some states restrict that right to people who can show a special reason to have a gun on the street. To the extent these laws give local law enforcement unfettered discretion over who can carry, they are problematic. At the same time, however, many constitutional rights are far more limited in public than in the home. Parades can be required to have a permit, the police have broader powers to search pedestrians and motorists than private homes, and sexual intimacy in public places can be completely prohibited.

The Supreme Court may yet decide that more stringent limits on gun control are required under the Second Amendment. Such a decision, however, would be contrary to the text, history, and tradition of the right to keep and bear arms.

More here:
Second Amendment - National Constitution Center

Posted in Second Amendment | Comments Off on Second Amendment – National Constitution Center