Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:It is time to get up one way or the other (Score 3, Informative) 1089 1089

> In the US you can always write in a candidate of your choosing. Now, some people like to protest vote for Mickey Mouse, or various other inanimate objects. However if you were to vote for someone who was eligible to run who was not on the ballot, and they pulled in more votes than anyone else, they would be the winner.

YMMV. In many jurisdictions (if not most) there is a list of pre-qualified write in candidates. I shit you not. Google "qualified write-in list" (with the quotes) for a bunch of examples. Sure, you can write in anyone you want, but if they are not on the list, it will not get counted.

Here is one example, from San Francisco: (http://www.indybay.org/newsitems/2012/11/05/18725142.php)

For voters who wish to cast their vote for candidates other than the ones printed on the ballot in San Francisco-- they need to know that they are still limited to a few official write-in candidate names if their vote is to be counted.

Comment Re:Your justice system is flawed, too. (Score 2, Interesting) 1081 1081

> you agree to by being born into a society, that by doing so, you agree to abide by that societies rules.

I have no doubt you actually believe that horseshit. That statement makes some of the more hilarious proclaimations Christians are so fond of saying seem rational and reasonable in comparison.

Submission + - NSA linked to hard drive firmware hacking across 12 major manufacturers->

An anonymous reader writes: Russian security researchers have published a report [http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage] detailing the insertion of data-stealing software into the firmware of hard drives from over a dozen major manufacturers. The report, from Kaspersky Labs, connects the organisation behind it — which it has dubbed 'The equation Group' — with the National Security Agency, due to common variants in the hard drive malware and Stuxnet, the NSA-driven cyberattack initiative which was used to attack a uranium refinement facility in Iran. The 'Fanny worm' propagated by the firmware hack is used to breach air-gapped networks via infected USB sticks, relaying retrieved information back to command-and-control centers. Reuters claims to have had the allegations confirmed by two ex-NSA employees.
Link to Original Source

Comment Re:Not seeing the issue here (Score 2, Informative) 209 209

> And then the public defender you're assigned because you can't afford a decent lawyer

Hold on just a second. There are many fine public defenders who happen to be far better than just "decent". They will not, however, be able to dedicate much time to your case. THAT is the issue with many PD's. Not that they suck or are not "decent" but that they are over worked.

Real programmers don't bring brown-bag lunches. If the vending machine doesn't sell it, they don't eat it. Vending machines don't sell quiche.

Working...