John King plays The Washington Post March, by John Philip Sousa… on the ukelele! [thanks to Howlin’ Hobbit]
baldmanwatching will be performing March 7 and 8 at the Lee Center for the Arts… 8)
suspects – either pornographers or journalists, i haven’t completely decided. if nothing else, it’s a good reason to avoid P2P software and to use DHCP… if there’s any doubt about your computer, try ShieldsUp which will tell you where the problems are, and make suggestions about what to do to fix them, hopefully before the police show up.
Child porn found on 20,000 computers in Virginia – "Using a national online system that enables them to remotely download incriminating images directly from a suspect’s computer"… waitaminute… somebody, somewhere has a software application that can discern incriminating photos from ones that are not incriminating on any computer, regardless of it’s operating system whether or not it is a server, and whether or not it is protected by a firewall, and that gives them the ability to download those images without leaving a trace in the target computer’s log files?
if they have the ability to download such images from computers regardless of their network presence or operating system, then why don’t they have the capability to replace the images, or shut down the computer, or introduce a virus, or block its network access? i can just see the shocked look on the pornographer’s face when he comes home one afternoon to discover that his entire hard disk has been wiped clean, or all of his pornography has been replaced by pictures of My Little Pony™.
maybe the reason why they are so confident of their numbers is because of the fact that they introduced the incriminating photos themselves. can you imagine a better way to get "potential terrorists" out of the way than to plant child pornography on their computers without their knowledge?
"using the nationwide software system, child pornography can easily be downloaded from the computer hard drives of individuals who utilize peer-to-peer file-sharing" so either they’re using P2P software themselves and have access only to the target hard disk’s "shared folders", or they’re using some "law-enforcement-only" software to access entire disks on P2P networks, not just the “shared folders”. i would think that people who had “incriminating” files on their computer, regardless of whether it was child-pornography, pirated music or plans to blow up the white house, would be smart enough not to put them in a place where they can be downloaded, willy-nilly, by just anyone. those criminals that aren’t that smart deserve what they get.
somehow i doubt that their investigation is actually happening that way, but you’ve got to think that a person whose job it is to write a newspaper article about computers would know enough about them to know.