Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:I deny that San Francisco underwater by 2010 (Score 1) 719

A few months ago, there was an "OMG Global Warming!" story here on Slashdot that reported atmospheric CO2 levels rising more than expected - based on measuring CO2 on a friggin a volcano!

If you're talking about the Keeling Curve, it is known to be accurate, based on similar measurements taken all around the world.

Comment Re:Denying Catastrophism, not Science (Score 1) 719

No credible scientists is predicting the end of the world. Nor have the ever done so

Well yes, actually they have. Here's one saying that the oceans will boil off. Quote: "that's it for all the species on this planet." That's James Hansen, one of the leading climate scientists in the world.

Comment Re:So which building will they blow up? (Score 1) 343

Or maybe we can just send a few bloviating politicians over and throw in some mass drops of MP3 players loaded with Sony tunes on the country.

There's a North Korean who escaped to South Korea. He now sends balloons across the border with various messages. He's stated that he's planning on sending balloons with DVDs of the movie.

Comment Why the FBI thinks it's North Korea (Score 5, Informative) 343

We shouldn't just believe the FBI, but here's what they've revealed of their evidence so far:

While the need to protect sensitive sources and methods precludes us from sharing all of this information, our conclusion is based, in part, on the following:

* Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.
* The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
* Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.

Slashdot Top Deals

Say "twenty-three-skiddoo" to logout.

Working...