... you stole the money from a pirate to see the movie? Who loses then?
You've spelled "America" wrong.
Maybe they just replied to the email.
... Dude, don't listen to my junk.
That's what he's doing! Jees, you'd think I would have figured it out by now. He's eating our privacy.
I agree Brian. I'm a network engineer as well, and uh, even if they find the router, unless it's logging itself to flash, they won't find any evidence. Maybe if it's configured for voip that's some pretty pressing evidence. I think if they want to find out where the call came from, the "stolen router" isn't the key to the technical piece of the investigation. The routing of the phone call is. It would be routed through the telco system a certain way, and if he did fake it, the origin of the call would be the server where the voip client (router or otherwise) was registered, and not his wife's cell phone. A subpoena to the telco in question would yield better evidence and the router config, or the router itself would become a moot point. It's a network. The tracks through the network are the evidence, not any single piece of equipment.
That should read that her laptop is a year _older_ not newer... oops. We all make mistakes.
My wife has a Samsung R580 which is almost a year newer than the laptops the guy mentioned in the article. I was going to scan it with some decent rootkit programs (like f-secure blacklight or rootkit revealer) only to find out some of my favorites don't work with 64bit Win7. I wrote to the guy who wrote the article, asking about the name of the "commercial security scanner" he installed. He never replied back. I booted my wife's laptop into Linux last night using a Live CD, and performed some find commands for supporting files of the StarLogger program (which showed up in a google search). Nothing. I was thinking if this was true, hers was exempt because it was almost a year older. Turns out, I find out today, I did more research than this supposedly "phd security expert" had.
This isn't a datacenter. It's a telco central office. My point is there's a big difference.
I love the vernacular "switch". It's a telco switch. Not to be confused with the more nerdy (and hopefully slashdot-friendly) network switch. As in Layer 2 of the OSI model. Because the $50 gigabit switch sitting on my desk can handle "tens of thousands of gigabytes of data a day" as well. Maybe I'm just not impressed with telco stuff, being a network nerd and overall "virtual protocol" kinda guy. Just wanted to point out if you're thinking network switch like I was, you won't be comparing apples to apples.
I moved to the south four years ago. Sometimes, I think the motto should be "The South: Afraid of the Internet for over 200 years".
If this comes true, just like the three laws of robotics, this can only come to one conclusion. All the best technology will reside outside of the United States. Move and prosper.
suraj.sun sends this quote from Engadget about improving the Kinect 3D video recordings we discussed recently: "[Oliver Kreylos is] blowing minds and demonstrating that two Kinects can be paired and their output meshed — one basically filling in the gaps of the other. He found that the two do create some interference, the dotted IR pattern of one causing some holes and blotches in the other, but when the two are combined they basically help each other out and the results are quite impressive."
sciencehabit writes "Where did Earth's oceans come from? Astronomers have long contended that icy comets and asteroids delivered the water for them during an epoch of heavy bombardment that ended about 3.9 billion years ago. But a new study suggests that Earth supplied its own water, leaching it from the rocks that formed the planet. The finding may help explain why life on Earth appeared so early, and it may indicate that other rocky worlds are also awash in vast seas."