Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Not different (Score 1) 178

Didn't some SA Goons do something similar with a Dwarf Fortress world file? I'm not sure of the stipulations on when your time was up, but it seemed interesting. Someone started a new world, did some work, posted screen caps and summaries, and then handed it off to another Goon. Only one person could play it at a time. Rinse and repeat. The thread was entertaining to read, for sure.

Comment Re:Where's wiki-leaks? (Score 1) 718

I was going to give the Hopefully a while answer but for completely different reasons.

They stated that they have hundreds of people going through it. If one of those hundreds leaked it, I imagine it wouldn't take many resources to figure out who it was. I mean, these guys just killed the Hide and Seek World Champion; surely a mole in their own group would be much easier to locate and neutralize.

Also, is this information relevant? With Wikileaks, lots of the information and cables were in the vein of what the United States government was doing or saying without letting the US citizens know. The data that is contained on some spinning platters in OBL's compound could be, well, anything. It might not even be pertinent to any country's citizens.

Comment Re:Feed 'em false numbers (Score 1) 138

It would be easy to set up a weakly protect access point that did nothing but generate bogus transactions with bad credit card numbers - that could pollute the crook's database, particularly if they don't do a good job of recording of which card number came from which network.

They could do that, yes, but I would hope that these war drivers understand that nearly all credit card numbers are generated according to the Luhn check. They would run those bad credit card numbers through an algorithm that returns a boolean value denoting whether the credit card is valid or not. If not, they would simply send it to the bit bucket in the sky.

Slashdot Top Deals

A list is only as strong as its weakest link. -- Don Knuth