Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - SPAM: Democrats Started Chicago Riot That Shut Down Trump Rally

Okian Warrior writes: Videographer James O'Keefe has unveiled a jaw-dropping video that appears to show alleged Hillary Clinton operatives illegally working together with her Super PAC and the Democratic National Committee to coordinate campaign moves. These moves included starting the riot that shut down a Donald Trump rally in Chicago last March.

[Submitter: Starting a riots to shut down a rally? That seems jest a leeeedle bit over the line, no?]

Link to Original Source

Comment Re:Just reruns, filtered thru trolls (Score 0) 394

Regarding releasing the transcripts, on February 5th, Hillary said she would "look into it. I don't know the status." http://www.cbsnews.com/news/hi... She has dragged her feet since then. Now, thankfully, some of them have been released so voters can read them and judge for themselves in time for the election. It obviously was not in her interest to have them made available.

Submission + - SPAM: John Podesta's Password Found in WikiLeaks Dump

Okian Warrior writes: Unauthorized users appear to have accessed Hillary Clinton Campaign Chairman John Podesta’s various accounts after an email containing his Apple ID and password was found within the recent WikiLeaks email release.

One user is alleged to have remotely erased Podesta’s iPhone . Another user tagged WikiLeaks editor Julian Assange in a Twitter post along with various screenshots of Podesta’s Apple account and the comment: “You are going to be getting some interesting information shortly.”

Link to Original Source

Submission + - WikiLeaks drops latest Guccifer 2.0 data on Hillary Clinton, DNC, Democrats (smh.com.au)

SonicSpike writes: WikiLeaks has published what purports to contain "new" Democratic Party documents hacked by the Guccifer 2.0 hacker.

The organisation posted a tweet at around 9am on Wednesday Sydney time, with links that promised access to 678.4 megabytes of new "DNC documents".

Initial images of what appeared to be presentation slides show information about databases used for voter identification and turnout efforts.

Other slides discuss the outcome of past get-out-the-vote campaigns.

Democratic presidential candidate Hillary Clinton was US secretary of state when WikiLeaks released hundreds of thousands of State Department emails in 2010.

The latest document dump comes after an earlier tranche of emails, reportedly hacked by Guccifer 2.0, prompted the resignation of politicians within the Democratic Party on the eve of the party's convention.

Comment Re:The PNOs are clueless (Score 1) 385

Keeping it secret is difficult. A customer decided to add credit card transactions to the booking and reservation program when their service contract was up. Shouldn't be a problem i thought but I was told about it only 4 hours after implications. Their software couldn't negotiate the proxy properly so I went on site. After double checking settings with no luck, I decided to sniff the packets to see if there was a clue there. Immediately I noticed they were sending the CC information in clear text. They acted like I was hacking their program until I finally got them to ask one of their developers about it. I had to threaten to disclose their noncompliance with pci standards for them to even do that.

Now they had one of their developers dealing with me on the inability to negotiate a simple proxy. Never could get it to work and ended up having to install a second gateway for the one computer that processed the cc payment basically bypassing the IDS and real time virus/malware scanning. There was a package they built for a test system that worked but the company (management not the developer) refused to implement it live because of some expensive testing. I called bullshit because their supposed previous testing allowed them to fail encryption of the information.

Next year - they didn't renew the contract and went with another setup altogether that was mainly web based. That created another issue of redundant internet in a remote location but was easier to implement than the CC issue.

Comment Re:Expected efficiency and cost? (Score 2) 195

Not because of this. This would be relatively carbon neutral as you use the carbon removed from the atmosphere as fuel that puts carbon back into the air.

If this became widespread, likely the best we could hope for is enough scale to slow the release of new carbon (carbon that had been in sequestration like fossil fuels).

Comment Re:Not comparable (Score 1) 177

Russia is not an enemy though. You can call them the enemy but it doesn't make it so. Only congress or the president can define enemies unless in an actual invasion which cyber espionage isn't.

Listen. All the way back to the IRS targeting conservatives and their missing emails the joke was that the NSA could release them. It was the same with Hillary's missing emails, just ask the NSA for them. Now they claim it is Russia doing all the spying so the joke shift to just ask the Russians for it.

I know you are passionate about supporting your side but let's not ignore actual facts in recent history in order to press an agenda that doesn't otherwise survive a cursory investigation into the real meaning.

Comment Re:Again with this? (Score 1) 177

Give it up. This guy is a through and through shill. The joke used to be that we would just ask the NSA to find the missing emails because they scoop everything up. It was made about the IRS 5 failed harddrives without backups so emails concerning targeting conservative organizations couldn't be turned over to congress. It resurfaced with Hillary and her deleted emails. Now that the story being pushed is that Russia is doing the same to help trump, very little needed changed to make it again.

Make no mistake, It was a joke. But we know from the leaked emails that Hillary and the DNC pay shills to correct people online. We also know blinded partisan hacks will contort anything they can to maintain a fictional worldview. You are trying to reason with one or the other here.

Comment Re:Again with this? (Score 0) 177

What is the difference between asking the NSA to find Hillary's missing emails and asking the Russians when they are being blamed for a hack and a lot of information being released?

Sometimes -no matter how much different you want it to be - things are as simple as they seem and you have to take people at their own words instead of contorting it into what you want to think.

Comment Re:Magnavox had a concept like this MANY years ago (Score 1) 122

I don't know what brand it was but back inn the early to mid 80s, we had a TV that was ghosting the immage and the sound would cut out at times. The TV repair guy still actually came to the house back then and I watched him work on it. He replaced two modular boards which was new to me because i was use to the tubes. He said the boards would be fixed back at a shop but was in and out in about 30 minutes complete with running test patterns on the screen and some audio thing for the speakers.

I don't know if that is the same or not. I'm wanting to say it was an RCA tv but it was a console with a 32 inch screen and was more like a piece of furniture than modern sleek TVs that sits on top of furniture.

Slashdot Top Deals

"Aww, if you make me cry anymore, you'll fog up my helmet." -- "Visionaries" cartoon