NBC Reporter with hidden camera in purse hoping to catch conference attendees committing to crimes (according to Defcon staff) flees Defcon 15 after being outed.
OMG FUCKING LOOOOOOLLLLL!!!!
For more information on this awesome totally ethical NBC program, see this.
AHAHA!
But really I think that she should lose her job for such a stunt... This is unethical and I think dateline is taking it too far...
Is she a member? She was awarded something from them in 2003.
She has a BSJ02/MSJ03 from Northwestern so I assume she is not an idiot.
She will be here in October ... someone should drop in and say Hi! ... more it's a public place... someone should go film her undercover getting drunk...
Is there anyone on MemeStreams who regularly uses linux on their desktop?
I have to use Windows every day at work. There is something nice about my home computing environment being a little more slick. I like being able to open a unix command prompt. I like the design subtleties of my mac. Its pleasant to use. But I think it may be time to part ways.
I'm tired of Apple. My first mac, an iBook, had a problem where the screen would "go fuzzy" and require a motherboard replacement. This would happen annually, sometimes twice a year. For a while, Apple replaced the motherboards for free, but every time this occured, it involved a week without a machine. Once it also involved a computer which came back with a completely new hard drive. All my data was gone. Clearly, Apple never got to the root cause of the problem, as it kept happening over and over again. Eventually, last summer, Apple said they wouldn't replace the motherboard for free anymore, and their price was in excess of $1000. I had no choice but to buy a new computer.
So I bought a Macbook. I knew it was going to be trouble, but I did it anyway. It was nice for while.
About a month ago I spilled some beer on it. Obviously, my fault. Not like my prior problem. However, these things do happen to laptops and laptops ought to be designed with that in mind.
Instantly, one of the design flaws of the MacBook that I knew would be a problem going in reared its ugly head: There is no way to remove the keyboard. Keyboards get nasty. They get dirty. They do not last as long as the rest of a laptop. Good laptops are designed to make them easy to replace. But not the macbook. Its keyboard is embedded into the system. Its hard to remove and hard to clean. You have a problem with it, you have to send the system in for service.
After 24 hours of drying out, the keyboard didn't work, and so I figured it was going in for service. Fortunately, after a few more days of drying out the keyboard miraculously recovered. Worked fine. Worked fine for a while, anyway. Eventually the mouse started sticking. This got worse and worse over time until last week, when the mouse simply stopped working altogether.
Having no simple way to take the computer apart, my theory was that dust had collected to stickiness in the mouse, and that if I removed the battery and literally sprayed some water on the trackpad and then gave it a few days to dry out, it would likely be fine. This was a stupid idea. I should have SSHed into the thing and cleared out my data first. But I didn't. Again, my fault, not Apple's.
The computer isn't fine. I must have shorted something against the clock battery (which is basically impossible to access) and fried a motherboard component. There is gunk in the computer which might be capacitor guts. I'm fucked.
The reason its hard to get inside the macbook is that it has 27 screws which must be removed. These screws are extremely small, ... [ Read More (0.4k in body) ]
3 Men Arrested in Brief Confusion Over Homemade Submarine!
Topic: Technology
3:28 am EDT, Aug 4, 2007
This is actually really cool. These guys would have probably been fine had they not floated their replica submarine a bit close to the QEII--which made the police panic a bit.
Abizaid: US military has failed to embrace cyberspace in terror war
Topic: Technology
3:25 am EDT, Aug 4, 2007
Here is retired Army Gen. John Abizaid, former CENTCOM commander, on June 20, at Transformation Warfare '07:
“The enemy is in fact more networked, more decentralized, and operates within a broader commander’s intent than any 20th century foe we’ve ever met,” he said. “In fact, this enemy is better networked than we are.”
Tapping information is particularly vital to empower lower-level American soldiers in theater, but the “architectures and the switches” are now being pulled by generals and politicians, he said.
He said because too many stovepipes and bureaucrats hamper the effective use of technology in the field, it may be time for a national dialogue after the 2008 elections about reforming the defense establishment to fight future wars.
Abizaid scolded reporters for not telling enough stories about the enemy.
This is the end Beautiful friend This is the end My only friend, the end
Of our elaborate plans, the end Of everything that stands, the end No safety or surprise, the end
We gave it a great send off over the last few days. Many drinks. Many toasts. To those who aren't here, but who got us here. To those that did without to build something great. But all good things come to an end. And now it's gone.
Ever wanted a semi-plausible looking identity to feed to a website you don't much care for, but were too lazy to cook one up on your own? Now there's help!
The fakenamegenerator site will instantly cook up just about everything you need to put in a bogus order for Viagra from those people who won't leave your grandmother alone, or even for filling out mortgage and loan applications from shifty online financiers. Full name, address, phone number, social security number, even a ficticious mother's maiden name... It's all cranked out for you, and all of it checks out until/unless someone tries to actually do something with it. The credit card numbers pass mod10 checks. The addresses appear to exist. The phone numbers have the right area code and a convincing exchange for the area they're in. The SSN is even apparently from a series that would have been handed out in that area at the time the fictional person was "born".
Microsoft tries evading new GPL grasp | Tech News on ZDNet
Topic: Technology
7:08 am EDT, Jul 8, 2007
"If you arrange to provide patent protection to some of the people who get the software from you, that protection is automatically extended to everyone who receives the software, no matter how they get it," Smith said in a statement. "This means that the patent protection Microsoft has extended to Novell's customers would be extended to everyone who uses any software Novell distributes under GPLv3."