mikeeusa2 writes: """"Mary Winkler Could Only Serve 60 Days(This is the woman who shot and killed her preacher husband in the back with a shotgun).
Daringest on Sat, 2007-06-09 03:49. informs us:
The trial of Mary Winkler is saddening and disappointing, but it's not surprising. Women get away with murder probably everyday.
The foreman was on the jury this Friday morning on CourtTV. According to him the women on the jury wanted to acquit the murderess. He, the jury foreman, was disappointed by the verdict but said the decision was a compromise since the ten women on the jury wanted to set her free.
Lisa Bloom, host of the CourtTV program and daughter of famed misandrist Gloria Allred, said the defense attorney was smart to keep the platform heels next to the defendant when she was on the stand. Apparently, Mz. Bloom thinks this helped the female jurors to sympathize with and exonerate the murderess. If a man wants his wife or girlfriend to wear heels, he deserves to be killed.
When a man gets married, he gives his wife the right to take his life, as well as his rights and property.
What's interesting is that in another case some months ago, a man was sentenced to eight (8) years in jail for trespassing in a women's apartment and trying on her underwear. So women believe a man who tries on her underwear should be jailed for eight years but a woman has a right to kill a man just because she feels like it. Where's the "equality" here?"""" Link to Original Source
firesquirt writes: In an article from WIRED
The few souls that attempt to read and understand website privacy policies know they are almost universally unintelligible and shot through with clever loopholes. But one of the most important policies to know is your internet service provider's — the company that ferries all your traffic to and from the internet, from search queries to BitTorrent uploads, flirty IMs to porn. Link to Original Source
Anonymous Coward writes: "It is a while that slashdot is filtered in Iran and other interesting and scientific sites are becoming banned one after another.People in Iran are used to see their favorite sites banned without any logical reason .
It seems that a robot which is sensitive to specific words is used to control the passing traffic without any human supervision and there are no places to complain about or no one is going to be responsible about it.
The main purpose of censorship was said to be stopping people's access to pornographic and political sites ,
The number of dedicated hosts in European countries are increased which are just used for VPN connections. In Iran, people simply know how to tunnel using softwares like VTUND and OpenVPN and where to buy VPN accounts .
What they are doing is hiding their head under snow and claiming nothing's going on."
Roy van Rijn writes: "Researchers at Tel Aviv University in Israel have demonstrated that neurons cultured outside the brain can be imprinted with multiple rudimentary memories that persist for days without interfering with or wiping out others. The israeli scientists have taken a crucial first step in showing that a network of neurons outside the body can be stimulated to create multiple memories that they sustain for days." Link to Original Source
Chatmag writes: "In what was the most controversial sting conducted in online chat rooms, and involving a suicide, no charges will be filed in the Murphy, Texas Dateline NBC "To Catch a Predator"
series, leaving the door open for 24 civil suits against Dateline NBC." Link to Original Source
Mendy writes: Tim Ankers, a British archaeologist claims to have found the wreck of the HMAS Sydney, lost during World War 2. He says that he's done this using software he wrote called Merlindown which can analyse satelite photographs to "peer 75m into the earth and 16,000 metres beneath the seas". The Times has a little more information here Link to Original Source
h00manist writes: "Ndiyo, the project to build the lowest-cost-ever computer/terminal, made a one-chip prototype, and now has finally launched a sample starter kit. The kit includes 5 ethernet-connecting Nivo terminals, which can be added to a PC to create a 6-user system. Each Nivo is capable of supporting a standard LCD monitor at resolutions up to 1280x1024 and 24-bit colour depth."
Anonymous Coward writes: "I know Wikipedia has definitions for both terms, but I want the Slashdot community's opinion: What is the difference between a so-called "script kiddie" and a bona fide "hacker?" It seems that if you crack wifi using readily available tools, you're a script kiddie. If you use the Metasploit framework, you're a script kiddie. At what skill level or accomplishment can one truly be called a hacker?"
Josh writes: "An anonymous Republican Senator has placed a secret hold on the Open Government Act. Ironically, the purpose of this act is to strengthen the Freedom of Information Act. It is a shame that Senators are taking such a cowardly route to avoid a floor debate on this important legislation. The Seminal explains a plan to use the power of the Internet to determine which Senator is at fault. The plan involves using dispersed knowledge and resources to contact the 46 Republican Senators who aren't cosponsors to ask them if they placed the anonymous hold. A centralized tally is being maintained at this link. The American people deserve to know which Senator is responsible for this."
Bob Uhl writes: "I've just finished reading O'Reilly's latest GNU/Linux title, Linux
System Administration (full disclosure: I was sent a reviewer's copy).
Bottom line up front: it's a handy introduction for the beginner
GNU/Linux sysadmin, and a useful addition to an experienced sysadmin's
The book is essentially a survey of various Linux system-administration
tasks: installing Debian; setting up LAMP; configuring a load-balancing,
high-availability environment; working with virtualisation. None of the
chapters are in-depth examinations of their subjects; rather, they're
enough to get you started and familiar with the concepts involved, and
headed in the right direction. I like this approach, as it increases
the likelihood that any particular admin will be able to use the
material presented. I've been working with Apache for almost a decade
now, but I've not done any virtualisation; some other fellow may have
played with Linux for supercomputing, but never done any web serving
with it; we both can use the chapters which cover subjects new to us.
I really like some of the choices the authors made. A lot of GNU/Linux
'administration' books focus on GUI tools — I've seen some which don't
even bother addressing the command line! I've long said that if one
isn't intimately familiar with the shell — if one cannot get one's job
done with it — then one isn't really a sysadmin. Linux System
Administration approaches nearly everything from the CLI, right from the
The authors also deserve praise for showing, early on, how to replace
Sendmail with Postfix. In 2007, there's very, very little reason to use
Sendmail: unless you know why you need it, you almost certainly don't.
Postfix is more stable and far more secure.
Another nice thing is how many alternatives are showcased: Xen & VMware;
Debian, Fedora & Xandros; CIFS/SMB & NFS; shell, Perl, PHP & Python and
so forth. One really great advantage of Unix in general and GNU/Linux
in particular is choice — it's good to see a reference work which
implicitly acknowledges that.
The authors are also pretty good about calling out common
pitfalls — several got me, once upon a time. It'd have been nice to have
had a book like this when I was cutting my teeth...
Lastly, I liked that the authors & their editor weren't afraid to refer
readers to books from other publishers, in addition to O'Reilly's
(uniformly excellent) offerings. Not all publishers would be so
forthright; O'Reilly merits recognition for their openness.
The book's not quite perfect, though. I wish that PostgreSQL had at
least been mentioned as a more powerful, more stable (and often faster
in practice) alternative to MySQL, and one doesn't actually need to
register a domain in order to set up static IP addressing. Still, these
are pretty minor quibbles.
I'd say that the ideal audience for this book is a small-to-medium
business admin who'd like to start using Linux, or who already is but
doesn't really feel confident yet. It covers enough categories that at
least a few are likely to be relevant. Even an experienced admin will
probably find some useful stuff in here."
shird writes: "Reports of google trying to clean up its search results by cracking down on dubious Web sites that contain little content but lots of ads, sometimes known as "Made for AdSense" (MFA) sites, have been reaching the media. The Jensense blog reports "Numerous AdSense publishers have been receiving emails from Google the past couple of days stating that their use of their AdSense account is an unsuitable business model and that accounts would be disabled as of June 1st, giving publishers about two weeks notice to prepare for the loss of the AdSense accounts." Google regularly bans and rejects AdSense accounts in violation of the TOS, however this change appears to be affecting a much larger quantity of MFA sites profiting from the imbalance of AdWords costs vs AdSense profits. Currently being discussed over at WebMasterWorld."