Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Spreadsheets (Score 2) 144

Any place where you have to take a number of observations and perform statistical analysys on the data. A lot of yield analysis in agriculture is done this way; remember, agriculture was the mother of statistics. Then you branch out to the other hard sciences and a spreadsheet is the right tool for the job. Once you learn the limitations of the tool (precision, range, accuracy) it can slash effort to a fraction of other methods.

Comment Re:Meth Hype is Common: (Score 1) 98

Well this is not how Walter White would have done it, is it?

That's the coward's way out, using drugs, where 90% of your synthesis has been done for you by already by some Big Pharma company selling pseudoephedrine to people who need to clear their noses.

"Now get me my phenylacetic acid... bitch!"

Comment Re:"Secure in their ... papers" (Score 1) 157

Are we talking about a single piece of paper, or are there three independent pieces of paper? If the former, then the warrant would have to be served on Bob, because he has possession of the letter. If you made a copy or otherwise made a separate recording of the letter, then LEO could come after YOU for the contents. And you have no standing to contest the warrant on fourth amendment grounds. You could be questioned about the contents in either case.

Comment Re:Nonsense law still can't be ignored (Score 1) 157

Where the third party *does* have standing to challenge the warrant is when there is an undue financial burden on said third party to provide the requested information. Telephone companies have routinely charged the issuer of the warrent a fee for, say, the local-calling record of a party. The key is that word "undue" -- that can be interpreted many ways. The Founding Fathers of our country could not have predicted this, given the record-keeping practices of the time, versus now, and the fluidity of the concept of "ownership" of information. I'm afraid it would take a constitutional amendment to bring personally identifying information to be owned by the *person* and not by the party who collected it as a "normal part of business."

Comment Re:Nonsense law still can't be ignored (Score 2) 157

But what is being demanded is information being held by a third party, and not under the control of the party being investigated. Once you disclose anything to a third party, that information is now "out there", where the government can pick it off when they want to. The same is true if you use a third party to handle your e-mail, web site, or any other service. Look at the second phrase: the warrants fall within the four corners of the restrictions. Plus, the gag order that usually accompanies such requests prevents the data-holding party from tipping off the person being investigated.

Comment First, the attacker has to get through to SSH (Score 1) 157

On my edge router, I use TCPWRAPPERS to block access to a number of quasi-public services, like SSH. If the attacker isn't coming from the limited number of IP addresses allowed, the attempts get stopped and logged. Too many rejects, and they land in my edge ACL for all services, not just SSH. (Going on the theory that a bad apple hitting SSH probably has other bad habits.)

Slashdot Top Deals

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...