Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment What about Texts? (Score 1) 228

I live in the US and don't have a land-line, just a cell phone. While I haven't received any unsolicited phone calls in years, I've probably received about five text messages within the past two months for generic mortgage refinancing or auto warranties from area codes elsewhere in the US.

Comment Re:Not different (Score 1) 178

Didn't some SA Goons do something similar with a Dwarf Fortress world file? I'm not sure of the stipulations on when your time was up, but it seemed interesting. Someone started a new world, did some work, posted screen caps and summaries, and then handed it off to another Goon. Only one person could play it at a time. Rinse and repeat. The thread was entertaining to read, for sure.

Comment Re:Where's wiki-leaks? (Score 1) 718

I was going to give the Hopefully a while answer but for completely different reasons.

They stated that they have hundreds of people going through it. If one of those hundreds leaked it, I imagine it wouldn't take many resources to figure out who it was. I mean, these guys just killed the Hide and Seek World Champion; surely a mole in their own group would be much easier to locate and neutralize.

Also, is this information relevant? With Wikileaks, lots of the information and cables were in the vein of what the United States government was doing or saying without letting the US citizens know. The data that is contained on some spinning platters in OBL's compound could be, well, anything. It might not even be pertinent to any country's citizens.

Comment Re:Feed 'em false numbers (Score 1) 138

It would be easy to set up a weakly protect access point that did nothing but generate bogus transactions with bad credit card numbers - that could pollute the crook's database, particularly if they don't do a good job of recording of which card number came from which network.

They could do that, yes, but I would hope that these war drivers understand that nearly all credit card numbers are generated according to the Luhn check. They would run those bad credit card numbers through an algorithm that returns a boolean value denoting whether the credit card is valid or not. If not, they would simply send it to the bit bucket in the sky.

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...