Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Re:Story is BS. Make it Right cards aren't that bi (Score 1) 128

by dcw3 (#48659185) Attached to: Comcast's Lobbyists Hand Out VIP Cards To Skip the Customer Service Wait

Many companies do this kind of thing, which leads me to a question for you. Are you sure there wasn't a separate tier, one that not every employee got cards for? My own company does this to us...we outsourced our IT a few years back, and now if you call and tell them you're from a certain location, you get your hand held, and a blow job, while your machine is fixed.

Comment: Re:"We didn't do it. Shutup or we'll do it again." (Score 1) 153

by dcw3 (#48653741) Attached to: US Seeks China's Help Against North Korean Cyberattacks

There isnt a shred of evidence tying the DPRK to this hacking and yet they get all the blame.

Incorrect, but I will agree that what's been provided is not conclusive, and weak. And, I stopped trusting the government commentary long before WMD were claimed to exist in Iraq. I ***hope*** that they're basing their findings on more than just this. But I also know that evidence can't always be made public because it can reveal sources of intelligence, and make them unusable. So, who should we believe, a clearly evil dictator, or a federal agency that for the most part has a pretty good track record. Well, short of us declaring war, I think I'll go with the feds...thanks for playing.

        Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.
        The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
        Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.

Comment: Re:"Cultural arrogance" (Score 1) 153

by dcw3 (#48653395) Attached to: US Seeks China's Help Against North Korean Cyberattacks

Yeah, this is funny, right?

Estimates of the death toll vary widely. Out of a total population of approximately 22 million, somewhere between 240,000 and 3,500,000 North Koreans died from starvation or hunger-related illnesses, with the deaths peaking in 1997.

The International Coalition to Stop Crimes Against Humanity in North Korea (ICNK) estimates that over 10,000 people die in North Korean prison camps every year

North Korean defectors have provided detailed testimonies on the existence of the total control zones where abuses such as torture, starvation, rape, murder, medical experimentation, forced labor, and forced abortions have been reported.

When a Banker jumps out of a window, jump after him--that's where the money is. -- Robespierre