Comment Re:what about your next job? (Score 1) 229
I just switched jobs, and my new employer asked for my current salary on the application and later verified this information during the background check.
I just switched jobs, and my new employer asked for my current salary on the application and later verified this information during the background check.
Because the staff and management are contractors, not Fed employees, LLNL is not shut down. The Lab will begin shutting down next week (assuming the budget boondoggle continues), but until now has been fully staffed with the exception of a very small number of people directly employed by DOE.
There are a lot of us who support both the ACLU and pro-2A organizations. I'm not a fan of the NRA specifically, but I support several gun-rights groups (including the Second Amendment Foundation and the Calguns Foundation) as well as the ACLU and EFF.
Google searches can be made over SSL. You could also tunnel to your home proxy server.
Unfortunately, a lot of employers perform MITM attacks to defeat SSL. I know my employer does. This creates a significant security risk, not the least because it trains employees to ignore certificate errors, but it's increasingly common.
You really have no idea how bullets work, do you? The metal casings are for the bullets, not the guns. If you attempt to make a bullet with a plastic casing (you can't buy them), it will fail on the first shot. Not the second shot, not the third, the first. If you use plastic casings on a bullet, it will explode and you will fail. No debate.
Caseless ammunition already exists.
It never ceases to amaze me how people are able to seize on the Amendments to justify their own short-sighted, stupid, destructive, extremist and anarchist hankerings.
Of course there are limits to how far you can push your first-amendment rights; there have to be. See e.g. https://en.wikipedia.org/wiki/First_Amendment_to_the_United_States_Constitution and scroll down to Justice Oliver Wendell Holmes who formulated the clear and present danger test for free speech cases.
Thing is, Holmes was wrong in that case.
And now the headline has been updated to "LLNL/RPI Supercomputer...", which is STILL INCORRECT. Sequoia is a DOE computer at LLNL:
Headline is incorrect: Sequoia is at LLNL, not RPI.
He didn't "break in". He sent requests to a publicly-accessible web server, and AT&T sent back private information.
Like sending "requests" to a publicly-accessible ATM using cards with other people's information on them, and then taking the money the bank "willingly" gives you.
Yeah, I totally see the difference between that and "breaking in" to an ATM.
No, that would be like to trying to impersonate people by guessing their passwords. In Weev's case, there was no authentication to circumvent.
Isn't a key element of the legal case that he also retransmitted the private information? He did not merely receive it.
From the court filing, it appears both charges are predicated on the notion that sending GET requests to an unprotected, publicly-accessible web server constitute unauthorized access under Title 18, Section 1030(a)(2)(C).
Meatspace analogy :
If a bank didn't have a door on it's vault, or any forms of security whatsoever, would you walk in and take out all the money? Even if you proceeded directly to the local police department to report the security flaw and deliver the unguarded money, you'd find yourself in quite a bit of trouble.
Here's a better analogy: you send the bank self-addressed stamped envelopes, and they willingly send private information about their clients back to you in those envelopes.
Nearly everything Weev does is malicious, but the question is: is it (or should it be) illegal? He was convicted of identity fraud and "conspiracy to access a computer without authorization". Think about that: requesting unprotected publicly-accessible webpages is "access[ing]" a computer without authorization". By that standard, anyone who uses the internet could be convicted of a crime.
He didn't "break in". He sent requests to a publicly-accessible web server, and AT&T sent back private information. This wasn't hacking, or even a DOS attack. AT&T is at fault here.
When you work from home, you miss a lot of scuttlebutt, impromptu meetings, and hallway chats that electronic communications just don't make up for.
Yeah, but there are also downsides to working from home.
UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker