Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
User Journal

Journal Journal: new day new gimmicks

Hahahahahahahaha!
That was my gut reaction to your new-found sincerity.
Maan, just where were you all these years when I was throwing ideas daily at your face?
What is so great about now, that I am so important?
What, do you believe your own Barack gimmick?
Just what?

I guess I must have done something very cruel to someone.
That's why I qualify to be gifted like this.
After all, going by your theory of managing lesser people like me,
the straighter the guy, the easier to exploit - oh wait - the better he _tastes_ !!
So, have i become too stale or too spicy?
Whats with the new f*ckin paper?
Another few dollars down the drain.
But you could swindle me for more, why just a few dollars?
Nah, I'm not interested in profits the size of your ego.
I want to _earn_ just enough to keep myself and my family happy.
What's with this new gimmick?

User Journal

Journal Journal: rush hour traffic and a return ticket

Today, I talked with THE Boss!!
You have such luck? I'm a lucky guy from your point of you :-)

Here's the Transcript of my words - His words, well, you cant hear them, ya know!

I said:
"What for? What pleasure derived?
If treason lurks at every step, whom should we trust?
Does it make for a great movie for you? Oh yes it does!

Does it make for a great memory for me?
NO.

"The law is for man, not man for the law" you say.
But do the exact opposite. Why?
Truth be told, emotions are only an evolutionary step, to be discarded after certain cerebral refinement.
We haven't got there yet. You have. So you play and we pay.
I wonder why you carried forward your animal insecurities while dropping your human emotions on your way to perfect universal intelligence. The other way would have been a better choice. Seriously.

I guess the worst future plots will now involve me. After all, you give me so much attention.
I feel I'm the perfect candidate for a powerful demonstration of your master intelligence.
What's your opinion?

The law is an ass. The law was an ass. Will the law will always remain SUCH an ass?
And The Judge will always be ......

I dont recall treating my "favorite pets" like this.
I feed all my pets regularly. I talk nicely to them. I respect them when they show emotion or intelligence.
Even when they dont I treat them as equals.

I dunno, if you're trying to say that I was Jawa The Hutt, then maybe.
But then we go back to the design-defect angle. Then...
I'm positively tired .. no ... fatigued by all this.
Say it straight and finish it off. It sucks.

You know, I go to crazy extents to behave well and I dont even bother much on your "suck cess" allocations while your yuppie hackers jump and dance around at first chance. Note that I'm not saying real hackers do that.
Right at the beginning I said that the system is complex, pico-allocated to "perfection" and so I dont have to anything in this. But then you came around warning me of nothing to show on the log book.
So I try to put numbers on the log book and suddenly I get so much unwanted attention.
What for? I'm *so* great already? When I cant even, speaking from your dimension, even simply sit straight?
So much attention for what? I'm some great genius? Without a basic degree in anything?
At my best, I cant even run a three-man IT shop properly.
So why do you give so much attention to me?

I think and feel that I'll be much safer and better off if you look at me less often. Here or elsewhere.
I've cursed you more than this before, so stop raising eyebrows.
If there ever was a doubt that you're worse than a fickle lady, it's gone now. Play, play. After all it's your property. But don't screw me in the name of friendship. I know it isn't.
"

To all this outpouring of mine, He smiled with even more Twisted Evil. As usual.
And said - so be it!

So, I hope to escape! :-P

User Journal

Journal Journal: you boon to whom?

"If we sit around and debate for two years about what to do, everyone else -- Apple and Microsoft (NSDQ: MSFT), mainly -- moves forward."
This is something I was saying last year too.
I'm nobody, and a lot many others were saying the same thing, but it isn't those voices that got heard.
I seriously suspect whether there are some microserfs hammering away at the decency in Linux communities by disrupting discussions often by citing philosophies!
In my personal case, I and you, both need to look back.
I might, you will never. I know that. You've never ever ever committed a mistake, after all.
On what I am working right now, I am writing code and documentation.
Therefore, Lee, screw your taunts. "Take that part of your message to someone else."
I'm also trying my level best to get you a larger audience, but you still, after so much muck raking, want to crib around. "Look forward not back" is not for me. I learn a lot these days looking back at how you plotted the whole dirty drama.
And I'm suffering for having been so straight and naive among twisted evil geniuses like you.
No, i'm not on crack. No, I dont do drugs. No, I dont drink. No, I'm not insane.
Yes, I'm writing code and yes, I'm listening your rhetoric much less than before.
And that is helping a L O T . Heh! It seems *you* have something to learn from me.
What a day! Yay! Hurray!

User Journal

Journal Journal: bsod gets new friend - bsos

Apparently The Blue Screen of Death is not alone.
They are replaced by the all new XPerience - upto 36% nastier - the Black Screen Of Stealth!
The Chinese are going nuts over WGA2.0

Rock on, m$! At this rate, Linux will have no problems picking level by 2010.

User Journal

Journal Journal: cheap talk and expensive code

As usual, I must tell you that I do not ask or force you to read this.
Clear?
----------------------------
"Talk is cheap, show us the code."

I showed them the code, and they thought *I* am cheap. No sir!
I don't believe in revenge, least of all in showing people down, but every attack that goes unanswered essentially is encouragement to the crooked.
However, if the crooks are in hundreds and persistent than ever, then they are parasites, no, saprophytes, scavengers. Then, I ignore them.
In your own words, you are feeding on faeces of species lower than you!!
If some "hackers" choose to behave like those kind of beings, can I help it?
You can awaken a sleeping man, but not one already awake!

Mischief of a harmful nature is .... harmful.
You may have your reasons and rights to continue this mischief.
I have my reasons and rights to at least refer to it as such.

That you are called "hackers" by everybody does not change you.

Apologies are in order.

I dont think you "hackers" have that kind of character.
You "hackers" only have code to show, after all.

PS: I'm talking of hackers, not crackers.
PPS: I doubt you guys will take this quietly. Another bad disk and boot sector....
Some more clean filesystems. After all, you built the system from source!!

User Journal

Journal Journal: Poor Linus, what about me.

You guys apparently dont think twice before hounding Linus Torvalds!
Poor him, he too cannot do a thing! What of me, insignificant creature....
But, I'm not Linus and twittering can be good as well.
Things must never be stormy. They must be clean.
Sadly, teh intarwebz and the chatterbots dont like me.
If Linus' decades-long hard work malfunctions in minutes, what chance do *I* stand?
And then there is the "user-friendly" code of Wordpress!!
Why must each and every single bit be against common sense or normalcy?
What's this unduly great importance attached to a little fumbling doggy?
Do I carry some extremely rare cosmic secrets in my skull? What gives?

User Journal

Journal Journal: Finally, I got a copy of your manual.

This is my personal page that gets about 1 hit per day, which is when I write the entry.
(If you expect to find something great here, please move on. There's nothing here.)

No point apologizing, the damage is already done.

http://en.wikipedia.org/wiki/Cyberstalking#cite_ref-4
http://en.wikipedia.org/wiki/Cyber-bullying

From those two sources:

Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Lambèr Royakkers writes that:

        "Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect)."[2]

CyberAngels has written about how to identify cyberstalking:

        When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats.[3]

A number of key factors have been identified:
        * False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.[4]
        * Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective. They often will monitor the victim's online activities and attempt to trace their IP address in an effort to gather more information about their victims. [5]
        * Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
        * False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
        * Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
        * Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
        * Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[6]

* Attempts to gather information about the victim. <-- teh intarwebz!
* Encouraging others to harass the victim. <-- teh blogz and teh slashdotz
* False victimization. <-- this shows that I'm doing the stalking, isn't it?
* Attacks on data and equipment. <-- this is where I lost my cool. I can't do a thing to protest online with a screwed-up boot sector, can I?
* Arranging to meet. <-- this is where I lost my patience, after much relenting and "give them one more chance".

From: http://en.wikipedia.org/wiki/Cyber-bullying

Cyber-bullying (predominantly spelled cyberbullying by many researchers) is when someone repeatedly makes fun of another person online or repeatedly picks on another person through emails or text messages, or uses online forums and postings online intended to harm, damage, humiliate or isolate another person that they don't like.[2]
The National Crime Prevention Council criterion of what constitutes cyber-bullying is "when the Internet, cell phones, or other devices are used to send or post text or images intended to hurt or embarrass another person."[3]
Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements gossip as fact aimed at humiliation.

Comparison to traditional bullying

Certain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes.[4] Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior.

Furthermore, cyber-bullies might be emboldened when using electronic means to carry out their antagonistic agenda because it takes less energy and courage to express hurtful comments using a keypad or a keyboard than with one's voice.

Additionally, electronic forums often lack supervision. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender).

Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone's text messaging capabilities. Cyber-bullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.

One possible advantage for victims of cyber-bullying over traditional bullying is that they may sometimes be able to avoid it simply by avoiding the site/chat room in question. Email addresses and phone numbers can be changed; in addition, most e-mail accounts now offer services that will automatically filter out messages from certain senders before they even reach the inbox, and phones offer similar caller ID functions.

Unfortunately, this obviously does not protect against all forms of cyber bullying; publishing of defamatory material about a person on the internet is extremely difficult to prevent and once it is posted, millions of people can potentially download it before it is removed. Some perpetrators may post victims' photos, or victims' edited photos like defaming captions or pasting victims' faces on nude bodies. Examples of famous forums for disclosing personal data or photos to "punish" the "enemies" include the Hong Kong Golden Forum, Live Journal, and more recently JuicyCampus. Despite policies that describe cyber-bullying as a violation of the terms of service, many social networking Web sites have been used to that end.[15]

Harmful effects

Research had demonstrated a number of serious consequences of cyber-bullying victimization.[4][6][7][8] For example, victims have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, cyberbullying back, being scared, frustrated, angry, and depressed.[6]

One of the most damaging effects is that a victim begins to avoid friends and activities, often the very intention of the cyber-bully.

The content and effects of ridicule in cyber-bullying messages are sometimes so strong that victims have committed suicide. There are at least four examples in the United States where cyber-bullying has been linked to the suicide of a teenager.[6] One example of suicide from being a victim of cyber-bullying is the suicide of Megan Meier.

Intimidation, emotional damage, suicide

The reluctance youth have in telling an authority figure about instances of cyber-bullying has led to fatal outcomes. At least three children between the ages of 12 and 13 have committed suicide due depression brought on by cyber-bullying, according to reports by USA Today and the Baltimore Examiner.

Lost revenue, threatened earnings, defamation

Studies are being conducted by large companies to gauge loss of revenue through malicious false postings. Cyberstalkers seek to damage their victim's earnings, employment, reputation, or safety. A 2008 High Court ruling determined that, generally speaking, slander is when a defamatory statement has been made orally without justification. Libelous statements are those that are recorded with some degree of permanence. This would include statements made by email or on online bulletin boards.[20]

Adults and the workplace

Cyber-bullying is not limited to personal attacks or children. Cyberharassment, referred to as cyberstalking when involving adults, takes place in the workplace or on company web sites, blogs or product reviews.

A survey of 1,072 workers by the Dignity and Work Partnership found that one in five had been bullied at work by e-mail and research has revealed 1 in 10 UK employees believes cyber-bullying is a problem in their workplace.[21]

Cyber-bullying also is rampant on Wikipedia entries, Amazon.com and iTunes, where product reviews along with other consumer-generated data are being more closely monitored and flagged for content that is deemed malicious and biased as these sites have become tools to cyberbully by way of malicious requests for deletion of articles, vandalism, abuse of administrative positions, and ganging up on products to post "false" reviews and vote products down.

Cyberstalkers use posts, forums, journals and other online means to present a victim in a false and unflattering light. If the cyberstalker is distressed by the content of an author's book, for example, he or she will design a cyberstalking strategy that assumes control of how the public views the book and / or diverts the author from marketing practices.[22]

False negative reviews and bully-organized vote-downs to give low popularity ratings have become a major concern for retailers, authors and publishers because they can affect credibility and potential sales.

The question of liability for harassment and character assassination is particularly salient to legislative protection since the original authors of the offending material are, more often than not, not only anonymous, but untraceable. Nevertheless, abuse should be consistently brought to company staffers' attention.

Recognition of adult and workplace cyber-bullying tactics

Common tactics used by cyberstalkers is to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. Various companies provide Cases of cyber-stalking (involving adults) follow the pattern of repeated actions against a target. While motives vary, whether romantic, a business conflict of interest, or personal dislike, the target is commonly someone whose life the stalker sees or senses elements lacking in his or her own life. Web-based products or services leveraged against cyberstalkers in the harassment or defamation of their victims.

The source of the defamation seems to come from four types of online information purveyors: Weblogs, industry forums or boards, and commercial Web sites. Studies reveal that while some motives are personal dislike, there is often direct economic motivation by the cyberstalker, including conflict of interest, and investigations reveal the responsible party is an affiliate or supplier of a competitor, or the competitor itself.

Note these words: "to someone who has said they want no further contact with the sender,"

As the Great Nuisance said: "You dont worry about it..."
Right, I dont worry about it, I just die from it.

Sadly, Karma doesn't apply to you, only to the rest of us, isn't it?

I guess you are capable of publishing this, of course, without putting out my side of the story.
Whatever, I'm not interested in a public trial of my private life.
Case closed.

Once again, lest you use your Karmic theories, I must emphasize that this is a page that NOBODY READS, as of yet.
I'll be lucky if just *one* other person reads this page.
This is a minimal protest and you cannot found any theories of treason or fickleness or me "not being dependable" based on this entry.
Specifically, what you CANNOT claim is that I defamed you by writing this because NO ONE READS THIS PAGE.
Go on, edit out this last para and post it to the front page, you cheat.

User Journal

Journal Journal: i told you so

This is a free speech protest. Your typical authoritarian response will be to hit back silently.
Let's see if you can tolerate this piece. It takes a hundredth of the tolerance that even I can show.
----------------------------------------
I told you! I told you!! I told you!!!
There's a fscking hierarchy even in the pristine Heavens of Opensource. I'm not complaining for myself. As I've stated in the previous post, I'm no good at anything. But you shouldn't go around advertising that everything's free, fair and fine in the FOSS world.
There's a predetermined hierarchy, places are booked, lists are fixed and people are named for posts. It's all done.
That is why, not one of the actually good ideas I suggested has been done by the people to whom I first approached. Who's to do what, is already decided! Why not simply state so?
(btw, do you notice that I'm not taking credit for those ideas? All minds think alike. And many minds are much deeper and/or broader thinking than mine.)
Racism, Classism, Elitism.
Cartels and oligarchy are not only obvious.....they hit you in the face!
Ohloh rankings are the proof of the hierarchy.
---------------------------------------------
So, why don't you open up the causal sources?
---------------------------------------------
You use opensource to topple your enemies. It's powerful to discipline you too.
But you won't be doing that job, will you?
Open source those hidden equations and make visible all those strings that you pull....
Then you have some real credibility when you talk Right To Information.
Cornering people individually and committing organized crime is just as bad as Bush, Cheney and Co.
At your level, what makes you different than them?

User Journal

Journal Journal: haha - not again

The Devil, the Deep Sea or a hundred other Devilish C's, I'm not getting involved this time.
Doing big things requires long term planning and commitment.
It requires ability, stability and ambition.
It needs much more than escapism and voids.
It takes technical expertise of high levels.
To lead, it takes a very calm, thinking head with years or maybe decades of experience.

On the other hand, writing an ordinary web application just requires knowledge of web development.
Which is more achievable?
For me, clearly, programming is the best thing.
Case closed :-)
Whether the world floats on clouds or rests on desks and laps is not my worry :-)
I'm somewhat good at observing, and *zero* in politics. :-)

User Journal

Journal Journal: Google's charity at my or your expense

http://www.informationweek.com/blog/main/archives/2008/09/googles_charity.html

Dont crib, Tom.
Google has hundreds of PhDs and 1000s of Graduates and Post Graduates in Computer Science - all of them, the best of their universities.
You think they can't think up thousands of ideas?

Google owns more than one personal copy of the whole damn web.
And they're a public full-text search engine with awesome precision.

Do you have any idea of how many ideas they already have which they are not encashing?
They even have the world's biggest stock exchange happily dancing to their tunes.

And you think that they need to put up a contest to get your ideas for free?
Give me a break, Tom.

Google is a supercomputing system enough to run this planet, given some conditions.
And the Google Guys know all these things and much more.

My personal problem of course is the digital nature of this contest or exam or test or whatever crap that it is.
There's either 200 million bucks (not to you) or ZERO.
A bit harsh.
Only for intensely dedicated karma collectors!

Me, I'm a tiny developer workstation PC :-)
Not interested in mountains of karma.
I want money, guys, real hard cash.

User Journal

Journal Journal: Is Paulson's Plan the economics equivalent of Iraq?

http://www.bloomberg.com/apps/news?pid=20601087&sid=aFkIYCJHXCbs&refer=home
Pelosi, Dems, don't do it.

If Paulson is working more hours than ever before, *don't* do what he says.
Find out how many hours he used to work before and how many he works now.
If there's a great difference, they have a real problem, and this is not another strategic plan.

They're master schemers and if they're not working overtime, they're not facing personal hardships, which means everything is according to plan.

If they're facing personal hardships, they're most likely in a real soup.
Because it's not common for them to face hardships in their personal lives.

They'll soon be trying to show that McCain saved the day.
McCain cannot be allowed to "save the day". Especially when he clearly cannot talk two straight lines of economics jargon.

They are threatening to play the "Dem-majority Congress rejected our bailout plan" rhetoric just weeks before voting day.
Don't bend. Because once you do, they will say that *they* saved the day by shouting wisdom into you.
So you lose the media battle.

If they win (Diebold is still around, AFAIK), they'll continue screwing the people.
If they lose, you, the Dem Congress, did it. That is OK.
Remember that one JFK can killed, not a 100.

What is not OK is you losing because you did not support the bailout.

But you can ask in every public channel of communication:

Why is Mr. Paulson not open about his specific plans?
Is this going to be done like the War on Iraq?

Is the Paulson Plan the financial equivalent of the Iraq report?

The US economy and the world economy are not going to die so quickly, so much.
It's a big animal and will need a lot of time even to deliberately kill, let alone die so soon, which can be reversed with quick steps and deft handling.

If you have to choose between the Devil and the Deep Sea, choose the Deep Sea.
It gives you a chance. Not the Devil, he will always, always, always, always win.
The Deep Sea is just *one* of the places that the Devil can land you in, if you hand him the controls.
The Devil is tactically orders of magnitude more dangerous than the Deep Sea.

User Journal

Journal Journal: john mccain saves the world economy

by suspending his election campaign to save the rest of the clueless Reps from mismanouvering the economy into hell one final time.

If the Reps have suddenly realized that Govt regulation is necessary, who's opposing regulation any more?

The Democrats need to answer this with the man who made the internet (possible...?) ... Al Gore.

A portal named something like WebGov.org that basically simulates the Gov executive, *openly*, *daily* and *collaboratively*!
Maybe WikiGov.org, based on the wikipedia model!
There's only one problem - it might just remain a Demo(crat) artifact if the Demo-Crats don't get cracking at the code.
I hear 10 ^ 100 footsteps .....

Maybe even a portal that simulates and thus demonstrates Wall-Street's downward spiral, will do to begin with -
as a permanent case study - a standing lesson for future "economics" students - that "economics" as is practised today is *anti-social* and "collapsist" without checks and balances and integration into law and society.

Good Bye, Free Market Economy!
I hope to not see you for another few millenia...
Of course, I think not to see you for another couple of centuries at least...

User Journal

Journal Journal: who's complaining

Who is complaining?
I **don't** want to be big.
I just want to be free as in freedom, not free-for-all as in beer.

User Journal

Journal Journal: Sarah Palin

Sarah comes from the land of HAARP!
And minerals trapped under ice.
I wonder ...

User Journal

Journal Journal: LHC danger - real or fictitious

I'll give my opinion about the LHC: no danger at all.

However, that may not mean no scheming....
Where are Swiss banks located? Any near the area?
Sept 11 on Swiss shores?
Everybody who had money in the Swiss bank, "lost their valuable savings" ?

Wonder why everyone's drumming up the LHC safety issue.
Especially since nuke scientists and particle physicists are the most meticulous and careful people around.
They would never risk such a thing as portrayed by the media.
The media of course, is any paymaster's slave.
So, we'll have to wait and watch.

Do they want to create a eco-disaster / global-warming story from this LHC - a la Chernobyl?

The LHC is not my problem, the media mis-coverage / miscarriage is.

Slashdot Top Deals

A holding company is a thing where you hand an accomplice the goods while the policeman searches you.

Working...