In Texas, a white teenager burns down her family’s home and receives probation. A black one shoves a hall monitor and gets 7 years in prison. The state NAACP calls it `a signal to black folks.’
The mystery behind who produced an elaborate Internet ad slamming Sen. Hillary Clinton and promoting Sen. Barack Obama has been solved.
Phillip de Vellis, a Democrat and Obama supporter, said he made the video “because I wanted to express my feelings about the Democratic primary, and because I wanted to show that an individual citizen can affect the process.”
De Vellis was an employee with Blue State Digital, an Internet company that provides technology to presidential campaigns, including Obama’s. De Vellis said he resigned from the company “so as not to harm them, even by implication.” The company issued a statement Wednesday, saying he was terminated.
“Pursuant to company policy regarding outside political work or commentary on behalf of our clients or otherwise, Mr. de Vellis has been terminated from Blue State Digital effective immediately.
Apple‘s Mac OS X remains almost completely free of any sort of malware threat despite several years of availability, a significant market share, and even an entire month dedicated to pointing out its flaws.
And security experts are not exactly sure why. In an article for the McAfee Avert Labs blog, security researcher Marius van Oers pointed out that Mac malware is “pretty much non-existent at the moment”.
The researcher said that out of 236,000 known pieces of malicious software, only seven affect Mac OS X.
“With an estimated OS X market share of about five per cent on desktop systems we would expect to see more malware for OS X,” said van Oers.
The Mac OS X system is not inherently more secure than other operating systems, according to the researcher.
The Unix/BSD code on which OS X is based is fairly well known, and van Oers noted that there are more than 700 pieces of malware targeting various Unix and Linux platforms.
Vulnerabilities in OS X are also plentiful. Apple’s most recent update patched more than 30 security flaws.
But van Oers pointed out that many malware authors simply prefer to target the low-hanging fruit of a poorly maintained Windows system.
The NSA agrees…
Does DRM drive even honest well-meaning people to piracy? Yes, of course it does.
Reader and music lover Jarrett tried to send the following “detailed, passionate complaint letter” to Rhino, but their only reply was:
450 Server configuration problem
Good for us, because Jerrett decided to send his letter to us. So, without delay, here is “How I Become A Music Pirate” by Jarrett.
The case of Elektra v. Santangelo has been one of the more closely followed cases in the RIAA’s crusade against suspected file sharers, due in no small part to the aggressiveness of Patti Santangelo’s defense. Ray Beckerman is reporting that Judge Colleen McMahon has denied the RIAA’s motion to dismiss the case without prejudice, ruling that the case must either proceed to trial or be dismissed with prejudice.
It’s a noteworthy ruling because if the case is dismissed with prejudice, Santangelo would be considered the prevailing party and would likely be entitled to an award of attorneys’ fees, as in Capitol v. Foster. In her ruling, Judge McMahon concluded that “no conceivable interest of justice would be served by permitting this case to be dismissed without prejudice against defendant.” Instead, the defendant should have a shot at vindication via a trial or have the case dismissed with prejudice.
“This case is two years old,” wrote Judge McMahon. “There has been extensive fact discovery. After taking this discovery, either plaintiffs want to make their case that Mrs. Santangelo is guilty of contributory copyright infringement or they do not.”
The choice is clear-cut for the RIAA: either proceed with a full-blown jury trial in which they will have to convince a jury that the defendant is guilty of secondary infringement—making the same argument that the judge in Capitol v. Foster didn’t buy—or agree to an order dismissing the action with prejudice.
Het downloaden van auteursrechtelijk materiaal blijft in de Europese Unie toegestaan. VVD-Europarlementariër Toine Manders diende in december een voorstel in om consumenten die inbreuk maken op iemand auteursrecht te vervolgen voor heling, maar dat plan heeft het bij een stemming dinsdag niet gehaald.
Manders wilde met het voorstel productie van namaakartikelen, zoals valse merkkleding of nep-Rolexen, aanpakken. Maar volgens critici had hij zijn plan zo ruim geformuleerd dat consumenten ook tal van andere situaties strafbaar zouden worden. “Een pot huismerk pindakaas kan al inbreuk maken op een pot Calvé pindakaas. Hier hebben consumenten helemaal geen zicht meer op.”
Het voorstel zou ook het downloaden van auteursrechtelijk beschermd materiaal strafbaar gesteld hebben. Internetters die muziek of films van internet plukken, zouden dan vervolgd kunnen worden. Ook als ze die gekocht hebben in een webwinkel die – vaak zonder medeweten van de klanten – auteursrechten schendt, zoals het Russische AllofMP3.com.
In tegenstelling tot het aanbieden van dergelijke bestanden, is het downloaden ervan onder de huidige wetgeving in Nederland toegestaan.
update: English article that also states downloading will remain legal, but has a lot of other interesting details as well.
The coasters were printed using a special invisible red ink, which spreads only when moistened. The Mumbai Traffic Police placed at tables and bar counters in Mumbai’s prominent bars. When a customer places their moist glass of alcohol on it, the red ink starts spreading and the face starts to bleed.
A database service call went rather awry when a network specialist accidentally wiped a hard-drive containing Alaska’s $38bn Oil Fund. The multi-billion-dollar boner was performed under the watchful eyes of a Dell storage specialist working on a remote desktop session, a report obtained today by The Register has revealed.
In June, Alaska’s Department of Revenue attempted to fix errors reported in its Dell/EMC storage system’s processors. (The department used a cluster of Dell servers running MS SQL 2005 connected to Dell/EMC storage boxes with approximately 3TB of space.) The technician given the fix assignment — who mercifully is kept anonymous but herein known as Johnny McBunglepants — was advised by the Dell specialist to unbind then bind the two partitions (LUNs) that were corrupted after a first attempt to correct the error failed.
Unfortunately, neither administrator managed to correlate which data partition corresponded to which drive letter on the server and moved some files — notably containing 800,000 PDFs of Alaska’s applicant information for an oil-funded sales account — on to the doomed drive. Both the Dell specialist and McBunglepants missed the error.
McBunglepants’s attempts to restore the database from tape were thwarted when he realized the primary filegroup (MDF) of the 2006 PDF database had not been selected to be backed up. Because a check box had not been placed next to the .MDF file restoration was futile. The department worked over the weekend to restore file groups for 2000-2005 using an older backup MDF file, but was unable to use it for the 2006 file group.
I think a commenter in our document dump research thread may have been the first to notice that the emails released by the Justice Department seem to have a gap between November 15th and December 4th of last year.
(Our commenter saw it late on the evening of the dump itself — see the comment date-stamped March 20, 2007 02:19 AM in the research thread)
The firing calls went out on December 7th. But the original plan was to start placing the calls on November 15th. So those eighteen days are pretty key ones.
Mike Allen spotted it this evening in the Politico.
I’m sure Khalid Sheikh Mohammed already confessed to erasing those 18 days worth of emails.