Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.


Forgot your password?

Comment: Re:Repeat after me... (Score 2) 315

by chiefcrash (#47560763) Attached to: Programming Languages You'll Need Next Year (and Beyond)
He's not splitting hairs...

HTML doesn’t really “do” anything in the sense that a programming language does. HTML contains no programming logic. It doesn’t have common conditional statements such as If/Else. It can’t evaluate expressions or do any math. It doesn’t handle events or carry out tasks. You can’t declare variables and you can’t write functions. It doesn’t modify or manipulate data in any way. HTML can’t take input and produce output. Think of it this way: you can’t compute the sum of 2 + 2 in HTML; that’s not what it’s for. This is because HTML is not a programming language.

Comment: Re:So am I. Specifically, violated how? (Score 1) 928

No first amendment rights were violated. But, it appears that extortion may have been committed:

In Colorado: 18-3-207. Criminal extortion – aggravated extortion

(1) A person commits criminal extortion if:

(a) The person, without legal authority and with the intent to induce another person against that other person’s will to perform an act or to refrain from performing a lawful act, makes a substantial threat to confine or restrain, cause economic hardship or bodily injury to, or damage the property or reputation of, the threatened person or another person; and

(b) The person threatens to cause the results described in paragraph (a) of this subsection (1) by:

(I) Performing or causing an unlawful act to be performed; or

(II) Invoking action by a third party, including but not limited to, the state or any of its political subdivisions, whose interests are not substantially related to the interests pursued by the person making the threat.

(1.5) A person commits criminal extortion if the person, with the intent to induce another person against that other person’s will to give the person money or another item of value, threatens to report to law enforcement officials the immigration status of the threatened person or another person.

(2) A person commits aggravated criminal extortion if, in addition to the acts described in subsection (1) of this section, the person threatens to cause the results described in paragraph (a) of subsection (1) of this section by means of chemical, biological, or harmful radioactive agents, weapons, or poison.

(3) For the purposes of this section, “substantial threat” means a threat that is reasonably likely to induce a belief that the threat will be carried out and is one that threatens that significant confinement, restraint, injury, or damage will occur.

(4) Criminal extortion, as described in subsections (1) and (1.5) of this section, is a class 4 felony. Aggravated criminal extortion, as described in subsection (2) of this section, is a class 3 felony.

Comment: Re:Fox News? (Score 1) 682

by chiefcrash (#47271919) Attached to: IRS Recycled Lerner Hard Drive

So, unless there is some compelling reason to think that the drive was corrupted purposefully, or the recovery was disingenuous, then all you have here is SOP for any IT department (fix what's broke).

Hmm, all the IT departments I've worked for always had an SOP to fix what's broke, then store the broken hard drive rather than toss it. Sometimes we end up having to send the drives off to a clean-lab recovery outfit to grab important stuff.

Is it necessarily a conspiracy that the IRS IT Department tossed a drive? No. Is it something that at the very list indicates a need for a policy change? Possibly.

Comment: Secure against Cylons (Score 2) 142

You'll see things here that look odd, even antiquated to modern eyes, like phones with cords, awkward manual valves, computers that, well, barely deserve the name. It was all designed to operate against an enemy who could infiltrate and disrupt even the most basic computer systems. Galactica is a reminder of a time when we were so frightened by our enemies that we literally looked backward for protection...

Comment: Re: Fishy (Score 1) 566

by chiefcrash (#47120095) Attached to: TrueCrypt Website Says To Switch To BitLocker
> ... the amount of reputation harm that Microsoft would endure would literally be crippling.

I'm not so sure. After all, Microsoft seems to have survived despite virtually each of its cryptographic solutions having serious vulnerabilities, often breakable in a trivial manner. Kerberos, encryption of Microsoft Office documents, PPTP VPN, NTLM authentication protocol, SysKey, EFS encryption in Windows 2000, RNG implementations in Windows 2000/XP/Vista, and so on...

Comment: Re:Most gun ban advocates aren't rational about it (Score 1) 584

I'd like to point out that there are a LOT of unhinged gun control proponents out there as well. Like the guy who suggested dragging Republicans behind a truck until they "see the light on gun control". Or the guy who explicitly threatened to kill recall activists taking signatures in Colorado. It may be less publicized, but it's there:

They're armed too. And they have funny ideas about what a right means. And they are also paranoid! Oh and they're pandered to by a major political party.

I won't lump all gun control proponents in with the likes of them. But rest assured, both sides of this fight have unhinged crazies. And they're both just as dangerous...

Comment: Re:Gun nuts (Score 1) 1374

by chiefcrash (#46895975) Attached to: "Smart" Gun Seller Gets the Wrong Kind of Online Attention
The purpose of a handgun magazine capable of holding more than 10 rounds is simple: it allows you to fire more rounds before having to reload. Some would try to say this is more dangerous somehow, but after watching a man fire 12 shots from a 6-shot revolver in about 3 seconds, I have to wonder why...

A military sniper rifle is simply a hunting rifle, just built with better quality control and a camouflage paint job. Seriously: the most popular hunting rifle and the most popular military sniper rifle are both Remington Model 700's...

The purpose of "any military weapon" is impossible to say, seeing as there is such a wide variety. Or are you saying a bayonet and a landmine fulfill the same purpose?

Same with the bombs: flash-bangs and nukes are both technically bombs, with completely different purposes.

"assault grips" is a new one for me, but I guess you're talking about pistol grips and secondary vertical grips. The purpose is simple: to allow an ergonomic hold of the weapon, providing better aiming and control. Same as non-"assault" grips...

Mediocrity finds safety in standardization. -- Frederick Crane