Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Sour Grapes (Score 1) 72

Why are you using this dumbass expression?

I would suspect one of two reasons.

Either 1:
He isn't talking about just musicians. He's talking about musicians, authors and filmmakers.

Or 2:
He's doing whatever he can to avoid calling people like Young Thug, Kodak Black and Lil Uzi by the label "Artists".

LK

Comment Re: And the other end of the deal? (Score 1) 209

There is nothing inherent about women that would make them not work as hard as men. That's nonsense.

If you're talking about "putting forth as much effort", you're probably right but if you're talking about "able to perform as much physical labor in the same amount of time", you're definitely wrong.

Obviously there are individual women who are stronger than most men but on average men are stronger and can perform more physical labor.

It's not discrimination that lead to most loggers, miners and firefighters being male, it's biological differences.

There is some physical recovery for the woman after childbirth, especially depending on the method of delivery. However, the amount of leave goes beyond what's necessary for recovery.

They would probably just outright lose the employee if they didn't give what she deemed to be "Adequate" leave when a child is born. It's a compromise that employers make because it's better for them to wait a few additional weeks for the experienced employee to return than it is to hire and train a replacement.

LK

Submission + - British Companies Are Selling Advanced Spy Tech To Authoritarian Regimes (vice.com)

An anonymous reader writes: Since early 2015, over a dozen UK companies have been granted licenses to export powerful telecommunications interception technology to countries around the world, Motherboard has learned. Many of these exports include IMSI-catchers, devices which can monitor large numbers of mobile phones over broad areas. Some of the UK companies were given permission to export their products to authoritarian states such as Saudi Arabia, the United Arab Emirates, Turkey, and Egypt; countries with poor human rights records that have been well-documented to abuse surveillance technology. In 2015, the UK's Department for Business, Innovation and Skills (BIS) started publishing basic data about the exportation of telecommunications interception devices. Through the Freedom of Information Act, Motherboard obtained the names of companies that have applied for exportation licenses, as well as details on the technologies being shipped, including, in some cases, individual product names. The companies include a subsidiary of defense giant BAE Systems, as well as Pro-Solve International, ComsTrac, CellXion, Cobham, and Domo Tactical Communications (DTC). Many of these companies sell IMSI-catchers. IMSI-catchers, sometimes known as “Stingrays” after a particularly popular brand, are fake cell phone towers which force devices in their proximity to connect. In the data obtained by Motherboard, 33 licenses are explicitly marked as being for IMSI-catchers, including for export to Turkey and Indonesia. Other listings heavily suggest the export of IMSI-catchers too: one granted application to export to Iraq is for a “Wideband Passive GSM Monitoring System,” which is a more technical description of what many IMSI-catchers do. In all, Motherboard received entries for 148 export license applications, from February 2015 to April 2016. A small number of the named companies do not provide interception capabilities, but defensive measures, for example to monitor the radio spectrum.

Submission + - Trump's shock troops: Who are the 'alt-right'? (bbc.com)

alternative_right writes: Anthony Smith, a journalist for the website Mic, got a tip that the image had appeared on 8chan, an extreme message board with many users who self-identify as members of the alt-right movement.

At first Smith was sceptical that he'd be able to stand the story up. The message board is fast-moving, threads get deleted quickly, and it's difficult to search for and find images. But within an hour, he had his answer.

Submission + - FBI: Hillary Clinton used BleachBit to wipe emails (neowin.net) 1

An anonymous reader writes: The open source disk cleaning application, BleachBit, got quite a decent ad pitch from the world of politics after it was revealed lawyers of the presidential hopeful, Hillary Clinton, used the software to wipe her email servers. Clinton is currently in hot water, being accused of using private servers for storing sensitive emails.

“She and her lawyers had those emails deleted. And they didn't just push the delete button; they had them deleted where even God can't read them. They were using something called BleachBit. You don't use BleachBit for yoga emails or bridesmaids emails. When you're using BleachBit, it is something you really do not want the world to see.”

Two of the main features that are listed on the BleachBit website include “Shred files to hide their contents and prevent data recovery”, and “Overwrite free disk space to hide previously deleted files”. These two features would make it pretty difficult for anyone trying to recover the deleted emails.

Comment Re:Big surprise some jackhole Silicon Valley (Score 2) 241

I can hear the 80s era commercial version of their service.

"Is that pesky first amendment getting in your way?
Is someone saying things about you that you don't like?
Did someone publicize something sleazy that you did but was recorded without your knowledge?

We can help. We'll sue them into oblivion and maybe get you some money in the process.

Call 1-800-SHYSTER
There's no fee unless WE get money for YOU!"

LK

Comment Re:NO FUCKING SHIT (Score 1) 183

For the purposes of commercial marketing, it's not incorrect.

Someone who is assigned a "Conservative" marketing profile is probably NOT going to read sponsored content from HuffPo while someone who is assigned a "Liberal" marketing profile is probably NOT going to read sponsored content from FreedomOutpost and if by chance they do, they're not going to patronize the advertisers of those sites.

Someone who reads content from across the spectrum just might look at content from either of those sources and probably won't penalize advertisers quite so much.

LK

Comment Re: Rape sympathizers (Score 2) 228

Assange committed a "crime" that isn't a crime in the US. He lied to a woman to convince her to have sex with him. Apparently that's "rape" in Sweden, and not in the US.

Nope, that's a lie. He had sex with an unconscious woman, knowing that before she fell asleep, she told him 'no'. And not only is that a crime in Sweden, it's also a crime in the US. And it's also a crime in the UK, where Assange tried exactly the defense you're offering: he said that because she didn't fight him off later, it shouldn't be a crime. The UK High Court, in its opinion upholding extradition, stated:

Our view is, as we have set out, that a jury would be entitled to find that consent to sexual intercourse with a condom is not consent to sexual intercourse without a condom which affords protection. As the conduct set out in the EAW alleges that Mr Assange knew SW would only have sex if a condom was used, the allegation that he had sexual intercourse with her without a condom would amount to an allegation of rape in England and Wales.

As the EAW sets out the circumstance that SW was asleep, s.75 which applies to rape is also material: [quote of statute removed].
As it is alleged SW was asleep, then she is not to be taken not to have consented to sexual intercourse.

Comment Re:SJW Bullshit (Score 0) 228

I posted this in another post below, but I just wanted to reiterate it here, for those who might not fully understand the situation.

It might help your understanding of the situation to understand that the CIA and NSA now use fake rape and sexual assault/harassment claims as their preferred method of character assassination (much easier, less messy, and just as effective as actual assassination). It happened to the poor bastard IMF head who made the VERY stupid mistake of challenging the supremacy of the U.S. Dollar.

What would you call someone who repeatedly changes their story, offering details, then recanting them over and over? The "poor bastard IMF head", maybe? He originally said nothing happened and he had never even seen his accuser; then that he may have been in the room while she was cleaning but he doesn't pay attention to housekeeping staff; then that he was naked in the room while she was cleaning; then that they had consensual sex; then that they had "rough" consensual sex during which he tore her rotator cuff. That doesn't sound like someone who is the victim of character assassination - you'd expect that such a victim would be able to maintain a constant story.

It also happened to Julian Assange and others.

Assange who has admitted he had sex with an unconscious woman? If all it takes to be a honeypot is to fall asleep around Assange, then they're not really entrapping him into doing anything he wouldn't do otherwise, are they?

Comment Re:I lean the other way. (Score 1) 148

In general (not talking about actual crypto here), the whole password/passcode policy thing is nothing more than a CYA and comfort food for the paper pushers.

You make a password more complex than 8 characters and a cap (or number or special)... you got the easiest password to break. The monitor post-it.

But if you ignore the enforced artificial complexity and suggest pass phrases, you get easily remembered, but very strong passwords. For example, even assuming a brute force attacker limits their search space to 26 characters plus punctuation - and further limits it to common english words - if you have a pass phrase like "everyday for breakfast, my cat, muffin, enjoys eating tuna dipped in milk", the resulting Shannon entropy is 365 bits. By comparison, a keyboard-mashed password of "a8gh!#hZ0-" only has 40 bits of entropy. Even though the former has a very limited search space, the length is sooooo much longer that protons will decay before you brute force it.

Slashdot Top Deals

C Code. C Code Run. Run, Code, RUN! PLEASE!!!!

Working...