When we no longer are sure what we are doing, theory tends to become self-conscious. At such moment of crisis, two strategies open: (1) theory may try to supply a ‘correct interpretation of the doctrine that has gone wrong in practice and offer a new rationale for it, or (2) it may attempt to substitute a new theory for the old and inadequate one, in order to ‘suggest that an entirely different way of behaving is now on the historical agenda.
Hitherto people have formed many incorrect ideas about Mahathirism and now may be the time for a re-appraisal of it. Understanding the relevance of Mahathir’s inquiries to our present situation means stripping away the clichés and misrepresentations of his work and thoughts, rediscovering a mode of thinking that allows an engagement with the current legal, economic and social relationships from a position of critical immanence.
Mahathirism theory can explain how our economic relations lead to the alienation, exploitation and domination that determines the form of the social structures and the political realities. An attempt to engage with a reinvented Mahathirism theory can articulate the complex relations between the current social and economic differentiation and disparities, providing a place for the subject and politics in the interests of all members of society. It could help transform the society into a rational order and in doing so, it reclaims a realm of freedom from the realms of political necessity and creates a new order in the interests of all rather than those of the privileged few.
Hitherto people have formed many incorrect ideas about Mahathirism and now may be the time for a re-appraisal of it. Understanding the relevance of Mahathir’s inquiries to our present situation means stripping away the clichés and misrepresentations of his work and thoughts, rediscovering a mode of thinking that allows an engagement with the current legal, economic and social relationships from a position of critical immanence.
Mahathirism theory can explain how our economic relations lead to the alienation, exploitation and domination that determines the form of the social structures and the political realities. An attempt to engage with a reinvented Mahathirism theory can articulate the complex relations between the current social and economic differentiation and disparities, providing a place for the subject and politics in the interests of all members of society. It could help transform the society into a rational order and in doing so, it reclaims a realm of freedom from the realms of political necessity and creates a new order in the interests of all rather than those of the privileged few.
4 comments:
Sorry to digress.
Latest bloggers worry. SECURITY!
------------
Some security tips for all bloggers. Please pass it on and feel free to share other ideas.
EMAIL
1. Standard application like Microsoft Outlook, Eudora, etc (without addon) - Emails are transferred in plain text. Easily intercepted. Not safe.
2. Company's email system - Copy of your inbound/outbound email can easily be made at the servers. Not safe.
3. Web-based email (e.g. Yahoo Mail, Google Mail) - After you open a mail, check the URL. If the URL starts only with "http:" (without 's'), not safe. If the URL starts with "https:", the data is encrypted and safe.
EMAIL SAFETY
1. web-based encryption (http://www.hushmail.com). Free edition has limitations.
2. Or, Use encryption application/addon. Requires technical expertise to integrate into email software.
EMAIL (MY RECOMMENDATION)
- Use the free service, http://www.hushmail.com
SPYING
1. There were cases of companies install spy software in their employees computers. In such cases, encrypted page is not useful.
2. Watch out for non-computer spying, such as; surveillance cameras.
SPYING (MY RECOMMENDATION)
- For whistle blowers, avoid using your company's computer and network to transmit confidential information.
WEB & EMAIL HOSTING
- All data such as logs and files, both encrypted or unencrypted, can be obtained or intercepted at the servers.
WEB & EMAIL HOSTING (MY RECOMMENDATION)
- Important to host only in companies that you trust.
- Consider overseas hosting if local jurisdictions are issues of concern.
Other security tips for computer.
1. Install a firewall
http://www.zonelabs.com/
2. Encrypt your documents especially, if you are using laptop
http://www.truecrypt.org/
3. Anonymous
(such software does not work if you're using a router or behind a local network)
http://tor.eff.org/
4. Anonymous (without software)
(such sites also enable you to access sites that your company blocks)
http://www.shysurfer.com/
5. Check your computer's IP address seen by servers you're accessing
http://www.ip-adress.com/
6. Delete cached data
http://www.ccleaner.com/
7. Wipe your hardisk to prevent deleted document reconstruction
http://www.heidi.ie/eraser/
:D will there be a forum? i wanna sign up ;D
Mave,
if you don't take in the "clichés" flaws, it will turn to "perfect idealism" similar to communism, confucism, etc idealism.
Post a Comment