Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Yep, keep searching (Score 1) 434

It doesn't matter. You are trying to correct a political spouting BS to see if people will believe him.

Here is a couple of facts which you should know but got lost within the technical of the sequestration.

First, the Benghazi happened September 11, 2012. Second, the budget sequestration, while becoming law in 2011 under the Budget control act, did not sequester anything until March of 2013. It was supposed to kick in of a budget reconciliation was not passed by January 1 2013 but they extended it in the American Tax Payer Relief Act of 2012.

So while you are technically correct, you simply do not need to be. A fucking calendar and the ability to count is all you need to show how much of a clueless moron looking to justify itself the guy is. The sequestration could not have been the cause of something that happened 7 months before the sequestration. Even if you do not count the delay to march instead of January, we are looking at almost 4 months before the sequestration. Numerous requests for more security was supposedly requested and rejected. The rejection was not in any way due to Sequestration.

Comment Re:Likely misdemeanor mishandling of classified in (Score 2) 434

No he didn''t..lol..

Libby was charged and convicted for crap surrounding the investigation not outing plame. That wa Richard Armatage and it was known from the start of the investigation.

FFS, it's all over the internet and any reference site you wish to pick. Wikipedia, for all it's worth, even cites references. I cannot understand how in this day and age anyone would get this so wrong when it's so easy to do a cursory investigation into the matter.

Comment Re:Not a factor in actually secure environments (Score 1) 227

Were they open to the network or open to VPN into the network?

I've never trusted wireless access. Could never get the funding to really secure it. The answer for those places that just have to have it was a separate network in front of the firewall and VPN everything through. From a user perspective, It could be an open access point but they didn't have access to the company network.

Comment Re:No! (Score 1) 227

You have basically three choices if he doesn't supply the phone. Either do without a phone, do with a different employer, or allow the insane policy.

Working somewhere else won't fix the policy because there will always be someone desperate for employment who would put up with it. But it is a pointless policy because you can copy everything from the comfort of home before it gets to the point of wiping the phone. About the only good use for something like this would be if the phone came up missing and you cannot trust it anymore. I think there are already services you can use to wipe phones (some may even brick them after the wipe) if they became lost or stolen. Not an unreasonable request in my opinion. That is if you are going to keep credentials that allow access to company resources like email or VPN services on it.

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...