Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Child Porn As a Weapon

986151 Re:Hooray! (774 comments)

I read that. It was interesting. However it's definitely the exception rather than the rule.

Things like Truecrypt are fine and "secure" in isolation, but it's very difficult to clear up all the crap that the operating system leaves behind. Windows is especially bad, but nothing I've seen is immune from it. Typically there's enough evidence left in unencrypted temporary files, or in unallocated space that the content of the encrypted volume doesn't really need to be considered. Of course there are exceptions, but I've never been so troubled by encryption that the job has to be abandoned. Even if an IIoC suspect has fully encrypted a drive (Truecrypt WDE, say) there's usually a few CD/DVDs of images lying around for easy access.

As with most aspects of computer security, people are the weak link.

more than 4 years ago

Child Porn As a Weapon

986151 Re:Hooray! (774 comments)

So you believe all computer forensics done by law enforcement is done in a "perfect" manner and is 100% reliable and interpeted and presented by said law enforcement 100% accurately?

No. That's not what I wrote.

I fully agree that the system surrounding computer forensics needs some fixing. High-Tech Crime units are typically understaffed and overworked. Members of the legal profession generally have no understanding of the technical issues (although mostly, in my experience, due to lack of interest rather than lack of intelligence), and jury members can be even worse. I'm just sick of the knee-jerk comments that always appear on posts like this which assume that all computer forensics work is done by corrupt idiots. More than half of the members of my local HTCU have Masters degrees in computer forensics and the rest have more than enough "real world" experience to match.

more than 4 years ago

Child Porn As a Weapon

986151 Hooray! (774 comments)

Oh great! Another forensics-bashing thread. I predict a well-informed and reasoned discussion of the issues facing law enforcement computer forensics in the UK. No, actually I think a whole load of uninformed rubbish about Truecrypt and forensics folk being completely lost when faced with anything but a Windows box with a directory labelled "CP is here" is far more likely. I wonder how many of Happy as a Monkey's commentard stereotypes will appear.

more than 4 years ago

How Students Use Wikipedia

986151 Re:Hate (170 comments)

Lots of my fellow students copy sentences and whole paragraphs from Wikipedia verbatim, without citing sources. I hate that.

more than 4 years ago

What IT pioneer do you respect the most?

986151 Re:Bill Gates (737 comments)

Really? Do you have a link? It's not necessarily that I don't believe you, just that a quick search on the google didn't find anything.

more than 4 years ago

What IT pioneer do you respect the most?

986151 Re:Bill Gates (737 comments)

Bill Gates is a philanthropist? Puhleese! That man is merely trying to buy his way into heaven after all the evil he has done

I'm by no means a fan of his business practices, but evil? Puhleese!

I understand that if anyone can give away billions of dollars and barely miss it, it's Bill Gates, but what would you rather he did with it? Stick it under his mattress?

The huge sums of money he's acquired are never going to be taken from him. The fact that he got it through an illegal computer software monopoly is mostly irrelevant at this point. The money is his now. And so what if he's "trying to buy his way into heaven"? I don't believe in Heaven, but if he can improve Earth by putting a few billion dollars into vaccine research why should I try to stop him?

more than 4 years ago

Opting Out Increases Spam?

986151 Confirms the spam is being read by someone (481 comments)

I've no data on the subject so take with a pinch of salt, but I remember being told a few years ago that responding in any way (even opting out) just confirms that the spam is not only being delivered, but being read, and that this may just lead to more spam being sent to your address. As I said, I don't know how true it is, but it makes sense to me.

more than 5 years ago

Is Cheap Video Surveillance Possible?

986151 Re:Old Macs (700 comments)

Catching your neighbour screwing your wife : Priceless
or £5/month online.

more than 6 years ago



986151 986151 writes  |  more than 7 years ago

986151 (986151) writes "Yesterday, the BBC had a story about a Scottish town being the first to experiment with a new system of electronic voting developed by Swedish technology firm Anoto. FTA:
The system uses the special pens to record the votes on digital paper. Legally, the results of the traditional paper ballot will still form the basis of the election result. But the counted result will be compared with the data captured through the digital pens during the electronic voting trial.
I'm still not convinced by electronic voting, but having the system base itself around a paper-trail seems like a step in the right direction."


986151 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>