Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment This has technical merit (Score 1) 206

Compression of RAW to JPEG and the alteration of JPEG images leaves a distinct signature in it's Error Level Analysis results. Using a simple utility like to automatically prescreen images would relieve a huge burden from their shoulders. For authenticity, requesting the RAW after the JPEG to see if the compression gradients are uniform would work as a nice level of security as well.

Comment Re:Makes sense (Score 3, Insightful) 87

Forcing both parents to work likely isn't causal. The breakup of the family working all together at the same/related jobs is likely more specific. One can work and nurture at the same time, they rightfully go hand in hand. Teach your progeny what you know the way you learned it. It promotes learning and confidence in learning.

Submission + - Idealism or Professionalism, which are you pursuing? (

DontLickJesus writes: '“You pushed your ideas.” Have you ever heard this? I have, and as a negative. We as developers work in a very collaborative way, so at first it’s understandable where this could be viewed poorly. However, when developing products for a client, how does one know when they are pushing idealism vs. professionalism?'

Where do we really draw this line in software development? Let's discuss.

Comment Lost Backups or Outside Email Services? (Score 1) 465

Can anyone speak to the emails they are discussing here? It's obvious that any competent IRS email server would have been backing these emails up, but if they were using Outlook, there is a well known issue regarding the size of PST files, corruption, and subsequent purging of the files. Often administrators will purge the user's inbox after their local PST file has been backed up. Then, that file is remounted in Outlook, or kept on the local machine for use at a later time. If these (or the old Exchange data) weren't being backed up, this is not only poor administration but likely a breach of law.

The second possibility is that other email services outside the IRS were being used. If they are trying to get to this email, I'd like to know.

I'm not defending what they're saying, it all sounds like bullshit. I'd just like someone with some understanding of the technicalities of what's going on to chime in.

Comment Re:The Lavabit case... (Score 1) 69

People wonder why USPS is failing. Do you realize that a fairly simple technical implementation marking data with digital postage would legally shield it all? USPS should be Lavabit, hell an ISP. Its simply because the PEOPLE OCCUPYING OUR GOVERNMENT UNDERSTAND DDOS. Clog all the pipes. Eventually our 'No's will be accepted as authoratative. Because.

Comment A healthy head does not mean a wise one. (Score 1) 2

Segregation from so much of our natural environment leads to weakness against it. Plants deliver a lot more than nutrition. They provide low doses of all sorts of foreign bits to our bodies, allowing us to adjust. Id be willing to venture even to the missing light bands. The production rate is amazing, but never forget that eating your own dirt is essential.

Submission + - GitHub Launches Bug Bounty Program, Offers Between $100 And $5,000

An anonymous reader writes: GitHub today launched the GitHub Bug Bounty program "to better engage with security researchers." In short, the company will pay between $100 and $5,000 for each security vulnerability discovered and responsibly disclosed by hackers. The program currently covers the GitHub API, GitHub Gist, and GitHub says its other Web properties and applications are not part of the program, but it says vulnerabilities found “may receive a cash reward at our discretion.”

Comment Re:not flaming (Score 1) 232

The answer is: If it contains blood or any of it's 4 major parts, Witnesses won't accept it. This doesn't seem to contain those things. There is an understanding that once you break a thing down so far, it's no longer blood. Things beyond the 4 major parts are considered a "conscience decision", which means it up to you whether you take it or not.

Submission + - Intelligence Official Says He Was Fired For Not Lying To Congress (

An anonymous reader writes: We knew this already, but we are only being told what the NSA wants us to know and no defections from the Official Spin are allowed.

As more and more details come out about the NSA surveillance programs, the federal government is looking more and more ridiculous. The latest comes from a column by John Fund at the National Review Online — a publication which has been a pretty strong supporter of the surveillance state. The column highlights that even the NSA's staunchest defenders are beginning to get fed up with the NSA as more leaks come out (especially last week's revelation of thousands of abuses). But the really interesting tidbit is buried a bit:

A veteran intelligence official with decades of experience at various agencies identified to me what he sees as the real problem with the current NSA: “It’s increasingly become a culture of arrogance. They tell Congress what they want to tell them. Mike Rogers and Dianne Feinstein at the Intelligence Committees don’t know what they don’t know about the programs.” He himself was asked to skew the data an intelligence agency submitted to Congress, in an effort to get a bigger piece of the intelligence budget. He refused and was promptly replaced in his job, presumably by someone who would do as told.

Slashdot Top Deals

If I'd known computer science was going to be like this, I'd never have given up being a rock 'n' roll star. -- G. Hirst