Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:time to sue (Score 3, Insightful) 103

Really? You jump immediately to "sue them!"? Even the submitter calls it "libel" right out of the gate. What the hell is wrong with people anymore? Twitter is under no obligation to link you to anything at all. When sites like Twitter start getting sued every time there's a broken link (or a warning that a link may be to an infected site), they'll just stop parsing links altogether to avoid liability. Enjoy your cut-n-paste web browsing experience from then on.

Comment Washington State Law disagrees... (Score 2) 161

Since it seems to meet the criteria of RCW 9A.52.110, I'd say every attempt to connect is a Class C Felony. However, at the very least, it's a misdemeanor.

RCW 9A.52.110
Computer trespass in the first degree.

(1) A person is guilty of computer trespass in the first degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another; and

          (a) The access is made with the intent to commit another crime; or

          (b) The violation involves a computer or database maintained by a government agency.

          (2) Computer trespass in the first degree is a class C felony.

[1984 c 273 1.]

*****************

RCW 9A.52.120
Computer trespass in the second degree.

(1) A person is guilty of computer trespass in the second degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another under circumstances not constituting the offense in the first degree.

          (2) Computer trespass in the second degree is a gross misdemeanor.

[1984 c 273 2.]

******************

RCW 9A.52.120
Computer trespass in the second degree.

(1) A person is guilty of computer trespass in the second degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another under circumstances not constituting the offense in the first degree.

          (2) Computer trespass in the second degree is a gross misdemeanor.

[1984 c 273 2.]

Comment Re:Complete Failure (Score 1) 378

9/11 changed the stakes dramatically. Prior to 9/11, hijackings almost universally meant "fly this plane to Havana and we'll let you all go". As soon as the hijackers upped the ante to "we're gonna plow this thing into the nearest building, killing all of you", they forever ensured that no box cutter would stop the passengers from beating them into a paste.

Comment Re:spamassassin (Score 2) 190

I don't think there's any such thing as "pretty much finished", especially with a piece of software involved in the arms race that is spam vs. filtering. There's only so much you can do with rules before you need to revisit your engine. Also, it's not just the software that's been stagnant for two years. The website itself hasn't been updated in as long. Not a single news item since 2011. The other respondent mentioned that dev is still active, but dev is not production. Dev is dev. Ever since Spamassassin moved to Apache, it's been pretty much dead.

Comment Re:spamassassin (Score 2) 190

Latest News: 2011-06-16: SpamAssassin 3.3.2 has been released, a minor new release primarily to support perl-5.12 and later. Visit the downloads page to pick it up, and for more info.

Last update was more than two years ago. I know you can refresh your rule sets periodically, but is the software even still maintained?

Comment Amazing (Score 2) 86

I think it's amazing how far-ranging the sharks are. It's interesting that it swims in a wide circle that includes Bermuda. How did it navigate to the island? How did it find its way back to the mainland? I would have expected a much more meandering course, but it's almost like it made a bee-line for it and then another bee-line back to the coast, but in the opposite direction.

Slashdot Top Deals

The biggest difference between time and space is that you can't reuse time. -- Merrick Furst

Working...