Bin Laden Hideout Recreated In Counter-Strike
From the link the parent provided:
Usama Bin Laden is wanted in connection with the August 7, 1998, bombings of the United States Embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya. These attacks killed over 200 people. In addition, Bin Laden is a suspect in other terrorist attacks throughout the world.
So I would agree with the parent that the FBI didn't have enough evidence to tie him to 9/11. Otherwise the FBI would have certainly mentioned it.
My $200 Laptop Can Beat Your $500 Tablet
Right on! I have always wondered why everybody wanted an iPod. When I was still traveling a lot, I got me a nokia n800: http://en.wikipedia.org/wiki/Nokia_N800. It does everything I needed when I was on the go. I can read my email, browse the web (it has flash) and skype with people. I admit that the screen size is not impressive, but on the other hand, this thing fits in my coat pocket.
Nokia did not market the thing Apple did with the iPad. And it does not have all the fancy games like Crazy Birds. But that was not why I needed it. I just needed it for the email and web. I was waiting for a new version with MeeGo, but I will wait to see how that project develops.
Aussie Gov't Says Wiretap Laws Fine, Telcos 'Wrong'
And has never seen Monty Python and the Holy Grail: http://www.youtube.com/watch?v=SII-jhEd-a0
Australia's Privacy Boss Slams Gov't Data-Retention Scheme
Somebody gets a clue about the impact of data retention. If only somebody with enough cloud in the EU will take the same stance...
Firefighters Let House Burn Because Owner Didn't Pay Fee
I don't know where the GP got their $30,000 from, but your reasoning is flawed.
The FD has 45 people and needs 10 firefighters to put out a fire. The FD needs people 24/7, so they need at least 4 shifts. Which means that you only have 11 people available at any time. That would make the grand total according to your example to about $8300
Windows DLL Vulnerability Exploit In the Wild
In our polytheism world we can have multiple gods, so we have a secure OS that can run QMail and DJBDNS
Avoiding GM Foods? Monsanto Says You're Overly Fussy
I agree with your comment, but you might want use another introduction next time:
It reminds me of how the Romans brought in lead piping for their water. They thought it was great - water pumped to your home, the ultimate sign that you'd made it. An entire ruling class slowly poisoning themselves.
The calcium in the water was deposited on the pipes, which prevented the introduction of lead in the water: http://penelope.uchicago.edu/~grout/encyclopaedia_romana/wine/leadpoisoning.html
New Tool Reveals Internet Passwords
Nowhere in TFA it says anything about an expoit that reveals your password to a website you visit. It mentions that it reveals passwords that are cached. From the FTA:
The password breaker gives users the ability to instantly retrieve the login and password information to a variety of resources such as those routinely cached by Web browsers. The tool can quickly recover cached logins and passwords to Web sites, including pre-filled forms and auto-complete information stored in the Internet Explorer cache. In addition, the tool makes it possible to instantly replace or reset IE Content Advisor passwords.
Google To Add Pay To Cover a Tax For Gays
A woman gets one or two periods, and then she's pregnant.
Depending if she is having sex or not.
Breastfeeding suppresses the menstrual cycle. The woman can almost certainly go 3 months without a period, and stands a decent chance of going 18 months or more.
Fixed that for you. Found a site here: http://www.babycentre.co.uk/baby/youafterthebirth/startingperiodsq/. My wife had here period after less then two months after giving birth
BitTorrent CEO On Net Neutrality
Can you please explain why DSL wouldn't cut it. The most basic ADSL speed my provider offers is 8 Mbit down and 1 Mbit up. Are these speeds comparable with what you can get for DSL.
More on topic, I can get a range of providers here in the Netherlands for both cable and ADSL. I have chosen a provider that has a history of good service and without the blocking of some ports I use (i.e. port 25).
Serious Apache Exploit Discovered
And don't hold your breath waiting for a patch from Oracle.
Banks Accept Dubai Assassins' Stolen IDs
Strangely they were not capable of catching a known terrorist before he got victimized by somebody
Why should the Dubai police arrest this man?
why is this a problem if a known terrorist gets killed and it is not a problem when he can travel as he pleases (he was obviously well known in Dubai)?
Again, why should the Dubai police arrest this man?
$4,400/Yr. Coders May Work On Dept. of Labor Project
Translate this page using google or something, so you can read the ministry of justice as a source: http://www.justitie.nl/onderwerpen/criminaliteit/drugs/coffeeshops/.
Basically it says a coffee shop can't sell more then 5 grams a day to a person and can't have more then 500 grams in stock.
Apple Seeks To Ban Nokia Imports To US
It's like saying a car is useless because most people cant drive properly.
Fixed that for you
$4,400/Yr. Coders May Work On Dept. of Labor Project
Sorry to dissapoint you, but cannabis is not legal in the Netherlands. The police and politicians have decided to tolerate small amounts of cannabis, so they can spend their time chasing and prosecuting people that sell "hard" drugs like cocaine, lsd, etc and people that trade cannabis in large quantaties. You can read more on wikipedia:
Does Your PC Really Need a SysRq Button Anymore?
That doesn't work when your kernel crashes. No terminal, no nothing. It is nice to know why your kernel crashed. That is what the SysRq is used for in Linux. Read more here: http://en.wikipedia.org/wiki/Magic_SysRq_key
Two Senators Call For ACTA Transparency
Obama appointed only one judge, Sonia Sotomayor. Don't know which other judges you mean.
"Going Google" Exposes Students' Email
Yes they do: https://www.google.com/support/a/bin/answer.py?answer=139019
Superguns Helped Defeat the Spanish Armada
The ancient Greek, Egyptian and Roman navy used ramming as well. I think that was before there even was a US Navy.
Microsoft's 'IsNot' Patent Continued...
Their track record for refusing stupid patents isn't that great. To name a few:
Need I go on? You can see some more here:
Enter The 'Stupid Patent Tricks' Contest
olderchurch hasn't submitted any stories.
Pentest questionnaire results
Here are the results of the questionnaire for pentesters about definitions, methods, standards and reporting: http://www.hacktoolrepository.com/article/14/Results%20pentest%20questionnaire
I am writing my thesis for my EDP auditor education. In my thesis I will compare the used methods and standards used by penetration testers with the method and standards used by the Dutch IT auditor association.
I need to know which methods and standards are used the most by penetration testers and how the final report looks like. To get my answers I have developed this short questionnaire about penetration testing. It will ask questions about methodologies, standards, classification and reports.
The questionnaire consists of 22 questions and will only take a few minutes. You can find the questionnaire here:
You would help me a lot by completing this questionnaire. I will share the results here for your benefit.
MSN password finder
MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:
- MSN Messenger
- Windows Messenger (In Windows XP)
- Yahoo Messenger (Versions 5.x and 6.x)
- Google Talk
- ICQ Lite 4.x/5.x/2003
- AOL Instant Messenger (only older versions, the password in newer versions of AIM cannot be recovered)
- AOL Instant Messenger/Netscape 7
MessenPass can only be used to recover the passwords for the current logged-on user on your local computer, and it only works if you chose the remember your password in one of the above programs. You cannot use this utility for grabbing the passwords of other users.
Hack Tool Repository, collection of security related tools
http://www.hacktoolrepository.com/ is a collection of computer security related tools, which have been tested on several operating systems. You can download an installation script or use the source and follow the comments to install it on you favorite distro.