Spurred by the advent of social historical methods, a new generation of historians found Unionists interesting as manifestations of the Confederacy's internal weaknesses.
Jacob gave examples of some of the vulnerabilities like Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), HTTP Response Splitting, Session Fixation, and SQL Injection.
But her hip-and-thigh relationship with her husband underlines her two biggest weaknesses-her scandal-ridden past in the White House remember Marc Rich?
If we want to avoid making similar mistakes in the future, everybody—especially the most intelligent and powerful—would do well to humbly acknowledge their own weaknesses.