Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re: That org is garbage (Score 1) 377

That's a completely separate section of law, and it merely says that threatening to use deadly force by brandishing a weapon, is not deadly force. That does not change the fact that brandishing a weapon is a crime in Texas, nor does it change the myriad of other laws in other states and jurisdictions.

Comment Re: That org is garbage (Score 1) 377

The definition of 'brandishing' varies from state to state in the USA.

In Texas (the last state I noticed being mentioned), the closest thing to 'brandishing' is Disorderly Conduct: Sec. 42.01 DISORDERLY CONDUCT. (a) A person commits an offense if he intentionally or knowingly:
(8) displays a firearm or other deadly weapon in a public place in a manner calculated to alarm;

So, you could be charged with that crime even if you were brandishing your firearm in a legitimate defensive situation, and, unlike some of the other disorderly conduct charges, there's no defense to prosecution carved out to protect those who took this action because of a fear of bodily injury.


It seems we could all benefit from being slower to shoot our mouths off.

Comment Re:What is "crypting"? (Score 5, Informative) 81

But the bad guys didn’t exactly take this innovation laying down; rather, they responded with their own innovations. What they came up with is known as the “crypting” service, a service that has spawned an entire industry that I would argue is one of the most bustling and lucrative in the cybercrime underground today.

Put simply, a crypting service takes a bad guy’s piece of malware and scans it against all of the available antivirus tools on the market today — to see how many of them detect the code as malicious. The service then runs some custom encryption routines to obfuscate the malware so that it hardly resembles the piece of code that was detected as bad by most of the tools out there. And it repeats this scanning and crypting process in an iterative fashion until the malware is found to be completely undetectable by all of the antivirus tools on the market.

Slashdot Top Deals

Real programs don't eat cache.