Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment extradition and double criminality principle (Score 2) 351

A fundamental underpinning of extradition proceedings is the âoedouble criminalityâ principle. If Canada is to extradite, there must be an offence charged in the U.S. that corresponds to one in Canadian law. While Canada has followed the UN with sanctions on Iran as regards nuclear and missile technology, I'm not aware that UN sanctions ever covered the trade in telecoms. Since in Canada sanctions like this emanate from the UN, I doubt there is a matching crime here. There is also the Foreign Extraterritorial Measures Act that spells out that American sanctions cannot operate in Canada -- otherwise 10,000s of Canadians who have visited Cuba could be rounded up.

Comment Can we stop the "critics call torture" horseshit (Score 5, Insightful) 319

It is one of the total failures of journalism that they keep acting like the jury is out on whether waterboarding is torture. It is torture by the definition of multiple US courts -- ones that successfully prosecuted Japanese soldiers for torture in the 40s precisely for waterboarding. It is a long-standing precedent that waterboarding is very much torture in the eyes of the US court system. The promulgation of this phony sense of ambiguity is a lie perpetrated by the media for the benefit of the neocon establishment.

Comment Re:hypocrites (Score 5, Insightful) 644

They are not hypocrites.

It is not fundamentally hypocritical to follow the rules as they exist and simultaneously advocate that the rules be changed. This fallacy is what gets trotted out on Fox every time Warren Buffet says the same thing.

It's like calling someone a hypocrite if they advocate for pot legalization, but don't smoke up. There's nothing hypocritical about this position at all.

Comment Need to use the system against itself (Score 4, Interesting) 200

(1) go to the local police station, city offices, courts, city hall and make a note of a bunch of license plates in the employee lots.
(2) print out paper license plate sized versions of the plate numbers
(3) park a car at the speed sensor.
(4) tape a paper copy on the back of the car
(5) cover a softball with tin-foil
(6) play catch in front of the speed sensor
(7) repeat for all your fake license plates
(8) ?????
(9) Profit!

Comment RequestPolicy and NoScript (Score 1) 353

I use many plugins and my go-to ones are CookieMonster, Ghostery, FlashBlock, NoScript and RefControl. CookieMonster, Ghostery and Flashblock are easy to get used to, but NoScript and RefControl make an interesting pair.

Using these at first is incredibly painful. It is a true education how fragile the construction of some web sites is, with scripts and components coming from all over the place. Because you have to approve every cross site reference, separately to load and to execute scripts, you really get a feel for how cobbled-together some sites really are -- random CSSs loading from who knows where, scripts from google, trackers, CDNs, web design houses, software vendors -- a real dogs breakfast. It can be a challenge to work out how much actually has to run in order for the site to work, versus how much is analytics and advertising overheads.

As I type this, scripts from three different google tracking systems, as well as rpxnow and ooyala, whoever they are, are NOT running in my browser. But for some reason slashdot won't work without loading some junk from fsdn.com.

Comment VM/CMS DASD mounts (Score 1) 231

When I was first in school -- and by school I mean graduate school -- the school had a IBM running VM/CMS for general computing. Everyone had an account. In those days you could set up virtual disks to be shared and there was a mount command in exec 2 that let you mount a shared volume given the password. A lot of people would put the mount command and password in an executable script that would run at login. When a professor or admin gave you credentials to a volume, it might have a script in it with credentials for another volume.

I wrote an exec2 program to sift through the files in a volume looking for shared volume mount commands, then recursively mount and search any found volumes. It seemed to work pretty well.

At that point I showed the script to a random undergrad and forgot about it. He was later expelled and arrested.

Slashdot Top Deals

"If truth is beauty, how come no one has their hair done in the library?" -- Lily Tomlin

Working...