During that time women had to work because most of the men were off to the war so the government needed people who could work instead of men, because the economy was really bad. Women not only had the opportunity to do the same that the men did but they felt free. They were the men in the house also because without their husband to help them they had to do everything, so they also felt strong
Chapultepec, Battle of, and Capture of Mexico City (1847<span>).By </span>12 September 1847<span>, the Mexican War was almost over; the Americans had been victorious in every major engagement, New Mexico had surrendered, U.S. forces had subdued Upper California, and Maj. Gen. Winfield Scott and 7,000 U.S. troops were camped outside </span>
In 1934 the Communists suffered huge losses against the nationalists in the Chinese Civil War. Faced with the prospect of annhilation the leaders of the Comunist army shose to start what is now called the Long March. This was a tactic of withdrawal into mountainous areas, some 2500 miles to the north and west. The purpose was simple: survival. By undertaking a tactical withdrawal the Communists could ensure that they still had an effective fighting force; could select easy to defend locations; could regroup and could ensure that the Nationalists supply lines were long and susceptible to attacks.
Portuguese. In 1441, two Captains of Portuguese ships, names unknown, took 12 slaves from Africa and brought them back to Portugal as slaves
<span>The Morris Worm was one of -- if not the -- first worms that used the Internet to travel, and it did so by being deposited in the buffer overflow. It used a network service finger vulnerability in Unix to spread from machine to machine: the finger program ran at the root (admin) level and was programmed to assume no username would exceed 100 characters. By creating longer names, the worm code was entered, copied, and passed on. Buffer overflow attacks occur when too much code or data is entered or created for the buffer to hold. This creates an error in which data is stored elsewhere, or in this case, the code entered using the username vulnerability.</span>