Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment How to succeed as an FBI agen: a tutorial (Score 1) 346

Step 1: Install spyware on a computer and then "scrub" such computer
Step 2: Report activities on such computer to authorities, make sure to flash FBI card
Step 3: Wait for reports of internet activity to come in and report anything that is morbidly fascinating; triple points for child porn
Step 4: No evidence? Computer MIA? Get computer user to admit to wrong doing!
Step 4: ?
Step 5: Promotion!
China

Submission + - Why Is China Building Gigantic Structures In the M (gizmodo.com)

cornholed writes:

New photos have appeared in Google Maps showing unidentified titanic structures in the middle of the Chinese desert. The first one is an intricate network of what appears to be huge metallic stripes, the second structure seems to be some kind of giant targeting grid, and the third one consists of thousand of lines intersecting in a titanic grid that is about 18 miles long.


Comment Updated the Slashdot article for you (Score 1) 298

Anyone who is partial to <strike>ketchup with their food</strike> sex will know how difficult it is to get the final dregs from <strike>the bottle</strike> your partner but now the Telegraph reports that <strike>scientists have</strike> K-Y has created one of the most slippery materials ever that promises to result in new <strike>self-cleaning surfaces</strike> hedonistic pleasures that <strike">never</strike> always get dirty

Comment My host's acceptable use policy (AUP) (Score 1) 287

Thanks for the heads up, I had never really read through ;my hosts AUP, just did this morning, and found this: Monitoring/Privacy reserves the right to monitor any and all communications through or with facilities. Customer agrees that is not considered a secure communications medium for the purposes of the Electronic Communications Privacy Act, and that no expectation of privacy is afforded. It may become necessary for employees to examine system accounting logs and other records to determine if privacy violations or other network unfriendly activities have occurred. also reserves the right to access a Customer's mailbox or other files stored on systems to resolve system problems or mail system errors.

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...