decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
New York Times Computer System Target of Lengthy Chinese Hacking Attack | 123 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
New York Times Computer System Target of Lengthy Chinese Hacking Attack
Authored by: Anonymous on Friday, February 01 2013 @ 09:41 AM EST
New York Times Computer System Target of Lengthy Chinese Hacking Attack...

Old Groklaw 2006 Post with old links:

Computer Security is an Oxymoron.

Anti-Virus 101:

Can Viruses Be Detected ?
by Jennifer Lapell
http://www.symantec.com/connect/articles/can-viruses-be-detected

Quote:

"Cohen didn't just define computer viruses. He also earned a Ph.D. proving that it was impossible to create an accurate virus-checking program. Just as there has been some bickering over his definition of a virus, experts have argued back and forth since then about the details of Cohen's Theorem. None so far have proven him wrong. His proof is so diabolically straightforward that contradicting it comes down to arguing that "True" equals "False."

End Quote -

And, IT at the NY Times never told their bosses the truth that Bruce Schneier in a couple of books, says that you can't secure any network.

AND, we still hear of folks that want to VOTE via the web or computer systems... on a network where you can't TRUST it, does not make sense.

[ Reply to This | Parent | # ]

“Tom the Dancing Bug”
Authored by: Anonymous on Friday, February 01 2013 @ 03:51 PM EST
The scope of criminal liability for computer misuse is very broad. A critic of existing law might say that the legislature’s basic approach is to criminalize everything and then rely on prosecutorial discretion to select appropriate cases for criminal punishment.
...
Is this criticism accurate? And if it is, do you think the legislature has acted wisely? [...]
volokh conspiracy

Now if the perpetrator pulls a knife, and slides it between the victims ribs, the weapon and its method is visible, understandable and proscribed as early as Genesis 4.11. Computer crime OTOH is usually invisible at the time it happens, incomprehensible to average citizens, and indistinguishable from magic. Everybody knows Witches Must Be Burned. You can have your shop burned if a passerby performs magic, q.v. Steve Jackson Games. That was only twenty five years ago, a short time in the development of the law.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )