Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Why WikiLeaks Is Worth Defending, Despite All Its Flaws->

Submitted by
SomePgmr writes "By now, anyone with even a passing interest in the WikiLeaks phenomenon is familiar with most of the elements of its fall from grace: the rift between founder Julian Assange and early supporters over his autocratic and/or erratic behavior, the Swedish rape allegations that led to his seeking sanctuary in Ecuador, a recent childish hoax the organization perpetrated, and so on. Critics paint a picture of an organization that exists only in name, with a leadership vacuum and an increasingly fractured group of adherents. Despite its many flaws, however, there is still something worthwhile in what WikiLeaks has done, and theoretically continues to do. The bottom line is that we need something like a âoestateless news organization,â and so far it is the best candidate we have."
Link to Original Source

Comment: Re:publicly available, but... (Score 1) 847

by scooter.higher (#29084437) Attached to: Woman With Police-Monitoring Blog Arrested

Then look at it this way... how could she have gotten permission to do what she was doing? Could she have gone to a judge and said "I believe there is corruption or misconduct in this police force. I would like permission to follow them around and monitor them for any wrong doing."

This is basically what the police do when they want to stalk a private citizen. They get a warrant from a judge to stalk people.

Now, it appears she may have taken it a bit too far. But if there were a proper mechanism in place for the public to report on the actions of public officials (police, judges, senators, etc) it would make our government a lot more transparent, and possibly lower the instances of corruption and abuse of power.

Comment: Re:They wouldn't have arrested her (Score 2, Interesting) 847

by scooter.higher (#29084367) Attached to: Woman With Police-Monitoring Blog Arrested

Kind of like Richard Armitage exposing an undercover agent? I believe her identity was classified information. Revealing classified information is against the law.

Oh wait, nothing happened to him for revealing classified information...

I guess it depends on who you are when you reveal the identity of an undercover agent.

Comment: Re:Nothing (Score 2, Insightful) 247

by scooter.higher (#28004589) Attached to: What Should Be In a Technology Bill of Rights?

Things like that are covered under Presidential Emergency powers. Just like making weather reports classified and making the U.S. Coast Guard a part of the U.S. Navy.

"It is with great reluctance that I have agreed to this calling. I love democracy. I love the Republic. The powers you give me I will lay down when this crisis has be abated!" - Emperor Palpatine

Comment: Re:Three words: (Score 1) 780

by scooter.higher (#27985645) Attached to: Hacker Destroys, Along With Its Backups

From the Navy textbook:

(c) Applications Software. Ensure that procedures are in place for routine backup of programs and documentation after any change or update. In addition to the working copy, it is recommended that three backup copies of all software be made to support a Contingency Plan. One backup copy is maintained at the working site. A second on-site copy is stored in a fireproof container in an area away from the normal processing area. A third backup copy is stored at an off-site location. It is recommended that a rotational backup system be used to ensure that no magnetically recorded file remains in a stored status for more than six months. Comparisons of files should be made prior to rotation. Verify any discrepancies to assist in preventing the introduction of viruses into backup copies.

(d) Data files. Data files required to support recovery operations (master files or data bases) must be maintained similarly to applications software. Implement procedures to ensure data files are backed up after each update. Maintained files in a manner which facilitates easy restoration of the system at the backup site.

The universe seems neither benign nor hostile, merely indifferent. -- Sagan