Beyond the Information Age discusses a new way of thinking about computers, knowledge and understanding. See the editorial for more information....

Attack and Defense

Common methods of attacking and defending knowledge are by disproving, confusing, corrupting, disrupting, destroying, hiding, lying, cheating, stealing, and spoofing. These procedures have been developed and refined over millions of years of human evolution. That makes it very difficult to analyze the exact procedural knowledge of all these understanding affectors. But, you should know how most of them work because you probably used many of them yourself.

Last Update: 2006-Dec-23