Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $9,038
11%  
Woo hoo!! And we're now over 11%!! Thank you all very much!! God bless.

Keyword: code

Brevity: Headers | « Text »
  • Reddit user claims to be Austin bomber, compares himself to 'Zodiac Killer'

    03/20/2018 7:36:00 PM PDT · by conservative98 · 72 replies
    NY Daily News ^ | March 20, 2018 | CHRIS SOMMERFELDT
    A mysterious social media user claims to be behind the bombings that have terrorized Texas in recent weeks, vowing that he won't stop until he becomes "as prolific as the Zodiac Killer."
  • Man Cracks Strange Coded Voicemail He Got And It's Deeply Disturbing

    03/16/2018 10:33:27 AM PDT · by 1_Inch_Group · 68 replies
    iheart.com ^ | Today | Dave Basner
    It literally translates to "Danger SOS it is dire for you to evacuate be cautious they are not human SOS danger SOS" and then gives coordinates... i am throwing my phone away
  • Spain cracks King Ferdinand's 500-year-old secret code

    02/04/2018 1:16:14 PM PST · by SunkenCiv · 63 replies
    BBC ^ | February 3, 2018 | unattributed
    A 500-year-old secret code used in letters between one of Spain's most famous monarchs and a military commander has been cracked. Ferdinand of Aragon's letters have tantalised historians for centuries. Constructed using more than 200 special characters, they were deciphered by the country's intelligence agency. He was behind the final recapture - Reconquista - of Spain from the Moors in 1492 and Columbus's journeys to the Americas. The letters between Ferdinand and Gonzalo de Córdoba include instructions on strategy during military campaigns in Italy in the early 16th Century. They were written using secret code in case they fell into...
  • WikiLeaks release shows how the CIA uses code to hide the origins of its hacking attacks

    03/31/2017 4:58:44 AM PDT · by Enlightened1 · 13 replies
    Daily Mail ^ | 3/31/17
    WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran. The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks. WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language). It says: 'This would permit a forensic attribution double game, for...
  • FLASHBACK: Spy found dead in a bag 'had infuriated his MI6 bosses by hacking Bill Clinton' (tr)

    08/31/2016 12:48:19 PM PDT · by TigerClaws · 31 replies
    The British spy whose body was found padlocked inside a bag in his flat had illegally hacked into secret data on former U.S. president Bill Clinton, it has been revealed. Gareth Williams, 31, was discovered in a holdall in the bath at his London home five years ago this month, but the mystery surrounding his death has never been solved. Today, it has been revealed the spy had dug out a guest list for an event Clinton was due to attend as a favour for a friend. The hack breached Mr Williams' security clearance and this sparked anger among MI6...
  • MI6 spy found in holdall 'hacked into secret data about Bill Clinton'

    08/30/2015 1:13:17 PM PDT · by Islander7 · 22 replies
    The Mirror ^ | August 30, 2015 | By Sam Webb
    MI6 spy Gareth Williams hacked into restricted information about former US President Bill Clinton, it has been claimed. The 31-year-old codebreaker was discovered inside a padlocked bag in a bathtub at his London home in 2010, sparking a real-life mystery worthy of any 007 thriller.
  • Crowdsourcing a modern means to crack code on Civil War texts

    07/03/2016 11:32:13 AM PDT · by BenLurkin · 20 replies
    The Wall Street Journal reported on a trove of Civil War era telegrams — many of them to and from Abraham Lincoln — that have never been decoded. The telegrams are owned by the Huntington Library, Art Collections and Botanical Gardens in San Marino. They have started a project, "Decoding the Civil War," to transcribe and decipher their collection of nearly 16,000 Civil War telegrams between Lincoln, his Cabinet and Union Army officers. About a third of the telegrams were written in code. The library is crowdsourcing the project through the largest online platform for collaborative volunteer research, Zooniverse. They...
  • Programmer cleared of stealing code from Goldman Sachs

    02/18/2012 9:18:11 PM PST · by DeaconBenjamin · 8 replies
    guardian.co.uk ^ | Saturday 18 February 2012 01.38 EST
    Sergey Aleynikov has conviction dismissed out of hand by appeal judges after serving a year for copying trading software A former Goldman Sachs computer programmer has been freed from prison after a surprise ruling from a federal appeals court quashed his conviction for stealing computer code. "Justice occasionally works," said Russian-born Sergey Aleynikov, who walked free after serving one year out of a sentence of eight years or more. Aleynikov, a naturalised US citizen who emigrated from Russia in 1990, was first arrested in July 2009 as he returned from a trip to Chicago to the offices of his new...
  • Arrest Over Software Illuminates Wall St. Secret

    08/25/2009 1:07:10 PM PDT · by khnyny · 12 replies · 1,552+ views
    The New York Times ^ | August 23, 2009 | Alex Berenson
    Flying home to New Jersey from Chicago after the first two days at his new job, Sergey Aleynikov was prepared for the usual inconveniences: a bumpy ride, a late arrival. He was not expecting Special Agent Michael G. McSwain of the F.B.I. At 9:20 p.m. on July 3, Mr. McSwain arrested Mr. Aleynikov, 39, at Newark Liberty Airport, accusing him of stealing software code from Goldman Sachs, his old employer. At a bail hearing three days later, a federal prosecutor asked that Mr. Aleynikov be held without bond because the code could be used to “unfairly manipulate” stock prices.
  • Text of the Federal Restricted Buildings and Grounds Improvement Act of 2011

    03/12/2016 11:04:07 PM PST · by ATOMIC_PUNK · 23 replies
    https://www.govtrack.us ^ | Feb 29, 2012 | One Hundred Twelfth Congress of the United States of America
    Section 1752 of title 18, United States Code, is amended to read as follows: (a)Whoever— (1)knowingly enters or remains in any restricted building or grounds without lawful authority to do so; (2)knowingly, and with intent to impede or disrupt the orderly conduct of Government business or official functions, engages in disorderly or disruptive conduct in, or within such proximity to, any restricted building or grounds when, or so that, such conduct, in fact, impedes or disrupts the orderly conduct of Government business or official functions; (3)knowingly, and with the intent to impede or disrupt the orderly conduct of Government business...
  • Universal Genetic Code? No!

    01/22/2016 10:45:28 AM PST · by fishtank · 4 replies
    Jay L. Wile ^ | Jan. 18, 2016 | Jay L. Wile
    Universal Genetic Code? No! The basic process by which proteins are made in a cell. (click for credit) The basic process by which proteins are made in a cell. (click for credit) I am still reading Shadow of Oz by Dr. Wayne Rossiter, and I definitely plan to post a review of it when I am finished. However, I wanted to write a separate blog post about one point that he makes in Chapter 6, which is entitled “Biological Evolution.” He says: To date, the National Center for Biotechnology Information (NCBI), which houses all published DNA sequences (as well as...
  • Researchers have written quantum code on a silicon chip for the first time

    11/17/2015 6:53:19 PM PST · by LibWhacker · 28 replies
    Science alert ^ | 11/17/15 | FIONA MACDONALD
    Researchers have written quantum code on a silicon chip for the first time And so it begins... FIONA MACDONALD 17 NOV 2015           For the first time, Australian engineers have demonstrated that they can write and manipulate the quantum version of computer code on a silicon microchip. This was done by entangling two quantum bits with the highest accuracy ever recorded, and it means that we can now start to program for the super-powerful quantum computers of the future.Engineers code regular computers using traditional bits, which can be in one of two states: 1 or 0. Together, two bits...
  • New backdoor regulations render store stock non-code compliant

    11/11/2015 1:06:56 PM PST · by George from New England · 15 replies
    self
    I was in my local Lowes store today. Zipcode: 33541 I was shopping for and inquiring about windows to put in the wall of an existing home. There are metal, vinyl, etc. Single, double pane variations. Some block some of the light from the sun from entering to some extent. The Lowes salesman asked me if I was planning on pulling a county permit? I asked why he asked ! He said starting about two months ago they changed the code and requirements for windows. He told me the code that had been applying only to new construction had been...
  • Bill Clinton and CIA Gave Iranians Blueprint for Nuclear Bomb

    04/14/2006 6:32:01 AM PDT · by RepublicNewbie · 26 replies · 2,549+ views
    The Post Chronicle ^ | 4/14/06 | Jim Kouri
    Last night, radio talk show host and former US Justice Department official Mark Levin shocked many listeners when he reported that President Bill Clinton gave nuclear technology to the Iranians in a harebrained scheme. He said that the transfer of classified data to Iran was personally approved by then-President Clinton and that the CIA deliberately gave Iranian physicists blueprints for part of a nuclear bomb that likely helped Tehran advance its nuclear weapons development program. The CIA, using a double-agent Russian scientist, handed a blueprint for a nuclear bomb to Iran, according to a new book "State of War" by...
  • China asks world to impose 'code of conduct' on Internet (Internet Censorship)

    10/12/2015 3:16:47 AM PDT · by Enlightened1 · 8 replies
    Washington Examiner ^ | 10/10/15 | Rudy Takala
    A Chinese official on Friday called on the United Nations to impose an international code of conduct on the Internet. "It is highly necessary and pressing for the international community to jointly bring about an international code of conduct on cyberspace at an early date," said Wang Qun, director-general of the Arms Control Department of the Chinese Foreign Ministry, in comments to the U.N. General Assembly. Wang's comments were reported by China's main state-owned press outlet, the Xinhua News Agency. "China, for its part, will continue to commit itself to establishing a peaceful, secure, open and cooperative cyberspace and pushing...
  • former freeper

    12/04/2014 6:38:34 PM PST · by mirkwood · 241 replies
    12/314 | mirkwood
    I will find you and pay you back. Thank you.
  • Feds Launch Investigation of Tires

    05/14/2014 11:48:43 AM PDT · by Paul46360 · 6 replies
    WLSAM ^ | 5-14-14 | Brian Ross
    An ABC News investigation found that a badly-flawed and archaic government recall system has permitted millions of potentially dangerous tires to remain in use, on store shelves for sale or simply unaccounted for.
  • How you can push back against Mozilla/Firefox's gay marriage thuggery

    04/07/2014 7:04:06 AM PDT · by NYer · 51 replies
    NC Register ^ | April 7, 2014 | Jimmy Akin
    Snip What You Can Do It is important that people give Mozilla pushback--and a lot of it--because the less people suffer the consequences of this kind of behavior, the more it will be invited in the future. You want Christians to experience a new and even worse persecution than what they're facing now? Do nothing. You want to fight back? Here's what you can do . . .   1) Mozilla has a web page where you can leave feedback on its Firefox browser. THAT WEB PAGE IS HERE. At the time of this writing, the feedback in the last...
  • Homeland Security Chief Swoons Over Terrorist Support Group CODE PINK – Asks For Medea Benjamin’s

    03/18/2014 6:35:30 PM PDT · by Nachum · 32 replies
    The Gateway Pundit ^ | 3/18/14 | Jim Hoft
    Medea Benjamin, left sans vagina costume, leads group meeting Homeland Security Sec. Jeh Johnson, photo by Code Pink.It’s an Obama world. As the United States faces a Cold War showdown over Russia annexing Crimea and an international passenger jet having seemingly disappeared, Secretary of Homeland Security Jeh Johnson met with leaders of the terrorist support group Code Pink at Homeland Security headquarters in Washington, D.C. on Monday. Medea Benjamin wipes her feet on ‘Homeland Security’, photo by Code Pink.It is another feather in the cap of a group that has a history of working with terrorists and state sponsors...
  • Code Pink Co-Founder Says Egyptian Security Forces ‘Brutally Assaulted’ Her and Broke Her Arm

    03/04/2014 8:24:01 AM PST · by ConservativeMan55 · 68 replies
    The Blaze ^ | Mar. 4, 2014 | Sharona Schwartz
    The co-founder of the U.S. anti-war group Code Pink says that she was detained at Cairo International Airport, placed in a jail cell and had her arm broken when she was roughed up by Egyptian security forces Monday night.