Comment At last! (Score 2, Insightful) 424
I'm going to celebrate with some burgers in non-degradable styrofoam containers while driving my three ton car (with wings!) down a twenty lane highway.
Thank you Gernsback! *shudder*
My girlfriend told me i got herpies from using her laptop
You're doing it wrong!
http://xkcd.com/463/
If you want to make a difference in the US, support EFF (www.eff.com)
I live in Sweden and support EFF because looking at track records show that Electronic Frontier Foundation has done a heck of a lot more for freedom of speech in my home country than the Pirate Party. Swedish judges rely heavily on examples from the US (just look at the TPB trial).
You are about to access a Department of Homeland Security computer system. This computer system and data therein are property of the U.S. Government and provided for official U.S. Government information and use. There is no expectation of privacy when you use this computer system. The use of a password or any other security measure does not establish an expectation of privacy. By using this system, you consent to the terms set forth in this notice. You may not process classified national security information on this computer system. Access to this system is restricted to authorized users only. Unauthorized access, use, or modification of this system or of data contained herein, or in transit to/from this system, may constitute a violation of section 1030 of title 18 of the U.S. Code and other criminal laws. Anyone who accesses a Federal computer system without authorization or exceeds access authority, or obtains, alters, damages, destroys, or discloses information, or prevents authorized use of information on the computer system, may be subject to penalties, fines or imprisonment. This computer system and any related equipment is subject to monitoring for administrative oversight, law enforcement, criminal investigative purposes, inquiries into alleged wrongdoing or misuse, and to ensure proper performance of applicable security features and procedures. DHS may conduct monitoring activities without further notice.
Does this mean that they are implying that I'm hacking a DHS server just by following a link to it?
if the people writing exploits for these security holes wrote a worm that once it had got onto a computer patched the exploit and then detached? You could call it Good Samaritan Computing or something
;)
It is still an intrusion in legal sense. Whoever wrote such a worm would face charges if caught.
2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League