Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Assange running out of time (Score 1) 229

I already covered that:

It's actually built off of corroboration with independent videos and the FEC data showing the woman on the Democratic payroll, getting money to be at those specific protests. You can, in fact, see an independent video of the woman lying to the cops.

You can say whatever nonsense you like, but there are independent sources that allow us to verify who paid her and what she did, so it would appear that you have failed to look at all the evidence if you think it's all based on O'Keefe's video.

So you might want to check your own facts next time.

Comment Re:Ignores the issue (Score 1) 110

It might be "used by hackers" but that doesn't make it hacking per se. Otherwise you muddy the terms. Phishing is exploiting human weakness. Hacking is exposing computer weakness.

It's probably a totally lost cause to get people to use the words in a meaningful way, but for those who don't subscribe to the Humpty Dumpty theory of semantics, it's important to use words correctly.

Comment Re:Phishing, not hacking. (Score 3, Funny) 110

Yeah, I love doing that kind of thing.

I also convince the telemarketers that I'm putting them on hold and never come back. For example, the computer repair scam? Try -

"Oh, I'm so glad you called! I have a HUGE virus problem and my computer is REALLY slow. Yeah, I'll turn my computer on for you. Just wait a few minutes, it can take 15 minutes to boot up with all those viruses. Do you mind if I put you on hold while we wait for it to finish? I'll be right back...."

Now put them on hold or mute and wait for them to hang up.

Comment Re:Ignores the issue (Score 3, Insightful) 110

BTW, the first batch of Obama emails are out:

They're boring, though. Wait for later dumps.

Also, please remember that it may be illegal to view the emails unless you have CNN authorization. You can learn a lot from CNN, like the fact that we already have congressional term limits. Someone might want to let Wikipedia know about that.

Comment Re:Phishing, not hacking. (Score 1) 110

> On March 19 of this year, Hillary Clinton's campaign chairman John Podesta received an alarming email that appeared to come from Google.

This part is funny, because Google puts a giant flag on messages that claim to be from Google saying "THIS IS NOT FROM GOOGLE DO NOT GIVE OUT PERSONAL INFO" or something like that. I probably have a dozen phishing scams in the trash at any given time.

Comment Re:So who runs FEC.GOV exactly? (Score 1) 171

Yes, a routine financial disclosure placing the person in two videos--one of which has her lying to the cops--on the Democrat's payroll.

And no, we don't have to take O'Keefe's word for anything: the video of her lying to the cops about why she's there is independent and has been up for months prior to this revelation.

Comment Re:OMG that's a dodgy check (Score 2) 321

> My Jesuit education tells me that the Saudis were going to hang that homosexual anyway. Taking their money and using it for some good is a gain.

Depends what they get for that money, doesn't it? If it helps them keep doing business with the US instead of getting called on human rights abuses, it doesn't look like a great deal.

Slashdot Top Deals

It is not best to swap horses while crossing the river. -- Abraham Lincoln