Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment More importantly (Score 1) 8

Do you get to listen to the radio at a reasonable volume during the work hours?

HAHA! Just joshin' ya. No, you need a mini fan, or put on some shorts that may hide your boner in case of the aforementioned ladies with less clothing during these warm months. Okay, my wisdom is imparted. Let us rejoice with some bikini pic tweets!

Comment Fun hack of dubious value (Score 1) 105

Pretty cute to house it in a child's toy when you can go to the hardware store and buy a universal garage door opener remote for $30 which already has all the codes you would need and instructions on how to open every brand. Then, to get the "loot" (broken things, my awesome gas-power mower, various motoring fluids, sweet Guitar Hero guitars and a drum set (that's got to be worth $8), other low-tech child's toys, a shitty ladder, a shitty mop, and some other really shitty stuff) you merely have to disguise your rape van to look like a laundry delivery service van(or NSA surveillance van, your choice) so you can do your nearby attack, in the middle of the daytime. Good luck with that!

There are some valuables inside the main house, but now you have to break in there too. Still, many folks consider this a viable option than to read some books, get some skills and make better money at a real job, but that's too hard. HAHAHAHAHA!!1! What dopes.

Comment Re:What's there to dislike? (Score 1) 176

Because the owners of the aforementioned content fail to supply the consumer, who paid for said content, with a flexible manner in which to share said content via fair use to other devices.

All my content is from my own DVD, TV connection and friend's DVD libraries. And I fully support people who download shit for free from sites like the old pirate's bay. Why? Because the claim of "missed revenue" is a matter of complete bullshit. I have watched movies for free at other people's houses that I would never bother paying to see again. Did I just steal something? No, I didn't, even if I copy it, because I would have never paid for it in the first place. People like you are too black and white to see the real big picture of how a corporation wants to control how I used the products I purchased from them. THAT baffles me, guy. Now, Mr. RIAA or MPAA go make some shit movies for me to share with friends via a USB drive, pinhead

Submission US Bombs ISIS Command Center After 'Moron' Posts Selfie Online 1 writes: Brian Everstine writes at Air Force Times that US intelligence officers were able to locate and bomb an Islamic State command center based on a photo and comments in social media. "The [airmen are] combing through social media and they see some moron standing at this command," said Gen. Hawk Carlisle, commander of Air Combat Command. "And in some social media, open forum, bragging about command and control capabilities for Da'esh, ISIL, And these guys go 'ah, we got an in.' So they do some work, long story short, about 22 hours later through that very building, three JDAMS take that entire building out. Through social media. It was a post on social media. Bombs on target in 22 hours."

Carlisle was careful to not go into great detail about the how the information was gathered and what additional effort went into targeting those bombs. It's easy to imagine that in addition to the information gleaned from the initial post that the Air Force used satellite and drone reconnaissance data. It's also possible that US intelligence could have actively engaged with the original poster in order to draw out information. Attackers and researchers have shown time and time again that simply asking a target for information—either by posing as a trusted individual or using carefully created phishing attacks—works even better than fancy information-stealing digital attacks.

Submission Nichelle Nichols, Uhura from Star Trek, Hospitalized with Stroke->

fightinfilipino writes:

“Last night while at her home in L.A., Nichelle Nichols suffered from a mild stroke,” McGinnis wrote. “She is currently undergoing testing to determine how severe the stroke was. Please keep her in your thoughts.” Nichols, 82, appeared in the original “Star Trek” TV series, which ran from 1966-1969, as well as the “Star Trek” movies. She also played the role of Nana Dawson in the ABC show “Heroes,” and voiced characters in the TV series “Futurama,” “Gargoyles” and “Spider-Man.”

Link to Original Source

Comment And nothing of value was lost... (Score 0, Troll) 73

"We take all potential threats to public and private sector systems seriously, and will continue to investigate (hang out and drink coffee) and hold accountable those who pose a threat in cyberspace, except when those posing the threat are the victims who lack any basic Internet security measures and just put any fucking thing online and expect someone else to rescue them when they get breached so hard it's news" -- Fucking Blithering Idiots

Submission Family served arrest warrants for 'disturbing the peace' at graduation-> 1

mpicpp writes: Four people who cheered — allegedly excessively — for their loved ones at a high school graduation ceremony in Senatobia, Mississippi, say they've now been slapped with an excessive punishment.

Two weeks after watching her niece walk across the stage at Senatobia High School's graduation ceremony on May 21, Ursula Miller received a warrant for her arrest for disturbing the peace.

"I just called her name out. 'Lakaydra,' Just like that," Miller told CNN affiliate WREG.

Now, Miller said, she has to appear in court or could face at least a $500 fine.

Link to Original Source

Submission U.S. Office of Personnel Management Hacked - Again

tranquilidad writes: According to a story in the Washington Post, China hacked into the computer system of the United States' Office of Personnel Management last December. This was the second major intrusion in less than a year. According to an AP story, personally identifiable information of approximately 4 million individuals may have been compromised. The compromised information was related to security clearances and employee records. Using new tools, the breach was discovered in April. The agency's director said, "Protecting our federal employee data from malicious cyber incidents is of the highest priority at [Office of Personnel Management]."

Submission Ransomware script kiddie scared out of business->

tdog17 writes: A criminal coder wrote a kit for ransomware that made it easy for others to encrypt victims' hard drives and then extort money from them in order to get the decryption keys. But when Intel Security wrote about the kit — called Tox — the author got cold feet. Now he or she is trying to sell the whole business.
Link to Original Source

Submission Governments of the World Agree: Encryption Must Die!->

Lauren Weinstein writes: Finally! There's something that apparently virtually all governments around the world can actually agree upon. Unfortunately, it's on par conceptually with handing out hydrogen bombs as lottery prizes.

If the drumbeat isn't actually coordinated, it might as well be. Around the world, in testimony before national legislatures and in countless interviews with media, government officials and their surrogates are proclaiming the immediate need to "do something" about encryption that law enforcement and other government agencies can't read on demand.

Link to Original Source

Comment Bell-End Media, we speak your name! (Score 1) 408

Now pipe down you silly bunt. You got your stupid company name out and we viewed it, and now we go back to our lives of overeating and purchasing ever-more-powerful Rascel Scooters to move our pendulous boobs from one fast-food joint to the next!

Blame Canada! Blame Canada!
This Bell-End Media is no surprise, their flapping heads all filled with lies!
Blame Canada! Blame Canada!
Actually all our actors come from there anyway!

Submission NSA Said To Increase Monitoring of US 'Net Traffic To Catch Hackers->

itwbennett writes: The U.S. National Security Agency is reportedly intercepting Internet communications from U.S. residents without getting court-ordered warrants, in an effort to hunt down malicious hackers. The previously undisclosed NSA program monitors Internet traffic for data about cyberattacks originating outside the U.S., according to a New York Times article published Thursday and based on leaks from former NSA contractor Edward Snowden.
Link to Original Source

Comment Re:I thought (Score 1) 88

Thank The Maker! I support the videos taking up screen space and NOT auto starting. Still, this is one I may take the plunge (into my desk for !Beats Headphones) because of the subject matter. Nice they always have the trannys, well that didn't sound right. Nice of them to include a transcript in-line! (there we go)

Never trust an operating system.