Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $75,363
85%  
Woo hoo!!! And now less than $12.7k to go!! Less than $3.9k to the yellow!! Go, FReepers, GO!!

Keyword: code

Brevity: Headers | « Text »
  • 9 lies programmers tell themselves

    11/12/2019 3:41:01 AM PST · by ShadowAce · 67 replies
    InfoWorld ^ | 28 October 2019 | Peter Wayner
    Programmers have pride with good reason. No one else has the power to reach into a database and change reality. The more the world relies on computers to define how the world works, the more powerful programmers become.Alas, pride goeth before the fall. The power we share is very real, but it’s far from absolute and it’s often hollow. In fact, it may always be hollow because there is no perfect piece of code. Sometimes we cross our fingers and set limits because computers make mistakes. Computers too can be fallible, which we all know from too much firsthand experience....
  • Mueller’s ‘Pit Bull’ Arranged Meeting With Reporters To Discuss Manafort Investigation

    07/08/2018 9:38:27 PM PDT · by Texas Fossil · 44 replies
    The Daily Caller ^ | 11:48 PM 07/08/2018 | Chuck Ross
    Justice Department documents released on Friday confirm that the DOJ attorney known as Robert Mueller’s “pit bull” arranged a meeting with journalists in April 2017 to discuss an investigation into Paul Manafort.The documents show that Andrew Weissmann arranged a meeting with DOJ and FBI officials and four Associated Press reporters on April 11, 2017, just over a month before Mueller was appointed special counsel.Manafort’s lawyers obtained the documents on June 29 and revealed them in a briefing filed in federal court in Virginia. The attorneys are pushing for a hearing into what they say are possible leaks of secret grand...
  • Bristol academic cracks Voynich code, solving century-old mystery of medieval text

    05/15/2019 5:12:44 AM PDT · by vannrox · 52 replies
    PHYS ^ | 15may19 | by University of Bristol
    A University of Bristol academic has succeeded where countless cryptographers, linguistics scholars and computer programs have failed—by cracking the code of the 'world's most mysterious text', the Voynich manuscript. Although the purpose and meaning of the manuscript had eluded scholars for over a century, it took Research Associate Dr. Gerard Cheshire two weeks, using a combination of lateral thinking and ingenuity, to identify the language and writing system of the famously inscrutable document. In his peer-reviewed paper, The Language and Writing System of MS408 (Voynich) Explained, published in the journal Romance Studies, Cheshire describes how he successfully deciphered the manuscript's...
  • CORTEZ GIVES TWITTER A LESSON ON 'CODE SWITCHING' AFTER CONSERVATIVES CRITICIZE HER ACCENT

    04/08/2019 1:48:40 PM PDT · by Libloather · 92 replies
    Newsweak ^ | 4/07/19 | GILLIAN EDEVANE
    New York Congresswoman Alexandria Ocasio-Cortez continued to defend herself against claims promoted by Donald Trump, Jr. and others that she changes her accent to pander to minority audiences. In a string of Saturday evening tweets, the first-term Democrat wrote that her habit of "code-switching" was informed by years of navigating professional and social environments as a woman of color. "Next time you‘re told straight hair is 'unprofessional' and that speaking like your parents do is 'uneducated,' then you can complain about code-switching," she wrote, referring to the practice of changing speech patterns based on environment. "Code-switching is a tool communities...
  • NJ anti-gun AG is trying to take down the free access of Gun blueprints on the Internet (my title)

    02/07/2019 4:59:17 AM PST · by vannrox · 17 replies
    Code is free speech ^ | FR post 7FEB19 | Editorial staff
    UPDATE: FEBRUARY 5, 2019After Threat of Prosecution, Free Speech Advocates Seek Restraining Order Against New Jersey Attorney General Gurbir Grewal in Federal Civil Rights Lawsuit TRENTON, N.J. (February 5, 2019) — Today, attorneys for six advocacy organizations and one individual, Firearms Policy Coalition founder Brandon Combs, filed a new lawsuit and a motion seeking a restraining order and preliminary injunction against New Jersey Attorney General Gurbir Grewal. The case was filed just days after Grewal’s Office of the Attorney General sent a threat of prosecution to Cloudflare, a major Internet services company headquartered in San Francisco, about www.CodeIsFreeSpeech.com. A copy of...
  • SOURCES: CHINA HACKED HILLARY CLINTON’S PRIVATE EMAIL SERVER

    08/28/2018 6:46:14 AM PDT · by E. Pluribus Unum · 104 replies
    The Daily Caller ^ | 9:22 PM 08/27/2018 | Richard Pollock | Reporter
    A Chinese-owned company penetrated former Secretary of State Hillary Clinton’s private server, according to sources briefed on the matter. The company inserted code that forwarded copies of Clinton’s emails to the Chinese company in real time. The Intelligence Community Inspector General warned of the problem, but the FBI subsequently failed to act, Texas Republican Rep. Louie Gohmert said during a July hearing. A Chinese-owned company operating in the Washington, D.C., area hacked Hillary Clinton’s private server throughout her term as secretary of state and obtained nearly all her emails, two sources briefed on the matter told The Daily Caller News...
  • BREAKING: E-mails Show FBI Brass Discussed Dossier Briefing Details With CNN

    05/21/2018 8:49:01 PM PDT · by Bigtigermike · 55 replies
    Newly revealed e-mails show that former Federal Bureau Investigation (FBI) deputy director Andrew McCabe was keenly aware of CNN’s internal understanding of a secret briefing about the infamous Steele dossier, days before CNN published any stories on the matter. The e-mails, which were obtained by Sen. Ron Johnson (R-Wisc.), also reveal that top officials used coded language to refer to the salacious and unverified allegations made by Steele. Former FBI director James Comey briefed then-President-Elect Donald Trump on January 6, 2017, on at least one unproven allegation contained in Steele’s dossier, which was jointly funded by the Hillary Clinton campaign...
  • Who Can Crack this Code (something fun on a Friday night)

    04/20/2018 6:36:19 PM PDT · by ealgeone · 64 replies
    vanity | 04-20-18 | ealgeone
    5-12-5-5-12 4-1-21-1 What does this mean?
  • Reddit user claims to be Austin bomber, compares himself to 'Zodiac Killer'

    03/20/2018 7:36:00 PM PDT · by conservative98 · 72 replies
    NY Daily News ^ | March 20, 2018 | CHRIS SOMMERFELDT
    A mysterious social media user claims to be behind the bombings that have terrorized Texas in recent weeks, vowing that he won't stop until he becomes "as prolific as the Zodiac Killer."
  • Man Cracks Strange Coded Voicemail He Got And It's Deeply Disturbing

    03/16/2018 10:33:27 AM PDT · by 1_Inch_Group · 68 replies
    iheart.com ^ | Today | Dave Basner
    It literally translates to "Danger SOS it is dire for you to evacuate be cautious they are not human SOS danger SOS" and then gives coordinates... i am throwing my phone away
  • Spain cracks King Ferdinand's 500-year-old secret code

    02/04/2018 1:16:14 PM PST · by SunkenCiv · 63 replies
    BBC ^ | February 3, 2018 | unattributed
    A 500-year-old secret code used in letters between one of Spain's most famous monarchs and a military commander has been cracked. Ferdinand of Aragon's letters have tantalised historians for centuries. Constructed using more than 200 special characters, they were deciphered by the country's intelligence agency. He was behind the final recapture - Reconquista - of Spain from the Moors in 1492 and Columbus's journeys to the Americas. The letters between Ferdinand and Gonzalo de Córdoba include instructions on strategy during military campaigns in Italy in the early 16th Century. They were written using secret code in case they fell into...
  • WikiLeaks release shows how the CIA uses code to hide the origins of its hacking attacks

    03/31/2017 4:58:44 AM PDT · by Enlightened1 · 13 replies
    Daily Mail ^ | 3/31/17
    WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran. The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks. WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language). It says: 'This would permit a forensic attribution double game, for...
  • FLASHBACK: Spy found dead in a bag 'had infuriated his MI6 bosses by hacking Bill Clinton' (tr)

    08/31/2016 12:48:19 PM PDT · by TigerClaws · 31 replies
    The British spy whose body was found padlocked inside a bag in his flat had illegally hacked into secret data on former U.S. president Bill Clinton, it has been revealed. Gareth Williams, 31, was discovered in a holdall in the bath at his London home five years ago this month, but the mystery surrounding his death has never been solved. Today, it has been revealed the spy had dug out a guest list for an event Clinton was due to attend as a favour for a friend. The hack breached Mr Williams' security clearance and this sparked anger among MI6...
  • MI6 spy found in holdall 'hacked into secret data about Bill Clinton'

    08/30/2015 1:13:17 PM PDT · by Islander7 · 22 replies
    The Mirror ^ | August 30, 2015 | By Sam Webb
    MI6 spy Gareth Williams hacked into restricted information about former US President Bill Clinton, it has been claimed. The 31-year-old codebreaker was discovered inside a padlocked bag in a bathtub at his London home in 2010, sparking a real-life mystery worthy of any 007 thriller.
  • Crowdsourcing a modern means to crack code on Civil War texts

    07/03/2016 11:32:13 AM PDT · by BenLurkin · 20 replies
    The Wall Street Journal reported on a trove of Civil War era telegrams — many of them to and from Abraham Lincoln — that have never been decoded. The telegrams are owned by the Huntington Library, Art Collections and Botanical Gardens in San Marino. They have started a project, "Decoding the Civil War," to transcribe and decipher their collection of nearly 16,000 Civil War telegrams between Lincoln, his Cabinet and Union Army officers. About a third of the telegrams were written in code. The library is crowdsourcing the project through the largest online platform for collaborative volunteer research, Zooniverse. They...
  • Programmer cleared of stealing code from Goldman Sachs

    02/18/2012 9:18:11 PM PST · by DeaconBenjamin · 8 replies
    guardian.co.uk ^ | Saturday 18 February 2012 01.38 EST
    Sergey Aleynikov has conviction dismissed out of hand by appeal judges after serving a year for copying trading software A former Goldman Sachs computer programmer has been freed from prison after a surprise ruling from a federal appeals court quashed his conviction for stealing computer code. "Justice occasionally works," said Russian-born Sergey Aleynikov, who walked free after serving one year out of a sentence of eight years or more. Aleynikov, a naturalised US citizen who emigrated from Russia in 1990, was first arrested in July 2009 as he returned from a trip to Chicago to the offices of his new...
  • Arrest Over Software Illuminates Wall St. Secret

    08/25/2009 1:07:10 PM PDT · by khnyny · 12 replies · 1,552+ views
    The New York Times ^ | August 23, 2009 | Alex Berenson
    Flying home to New Jersey from Chicago after the first two days at his new job, Sergey Aleynikov was prepared for the usual inconveniences: a bumpy ride, a late arrival. He was not expecting Special Agent Michael G. McSwain of the F.B.I. At 9:20 p.m. on July 3, Mr. McSwain arrested Mr. Aleynikov, 39, at Newark Liberty Airport, accusing him of stealing software code from Goldman Sachs, his old employer. At a bail hearing three days later, a federal prosecutor asked that Mr. Aleynikov be held without bond because the code could be used to “unfairly manipulate” stock prices.
  • Text of the Federal Restricted Buildings and Grounds Improvement Act of 2011

    03/12/2016 11:04:07 PM PST · by ATOMIC_PUNK · 23 replies
    https://www.govtrack.us ^ | Feb 29, 2012 | One Hundred Twelfth Congress of the United States of America
    Section 1752 of title 18, United States Code, is amended to read as follows: (a)Whoever— (1)knowingly enters or remains in any restricted building or grounds without lawful authority to do so; (2)knowingly, and with intent to impede or disrupt the orderly conduct of Government business or official functions, engages in disorderly or disruptive conduct in, or within such proximity to, any restricted building or grounds when, or so that, such conduct, in fact, impedes or disrupts the orderly conduct of Government business or official functions; (3)knowingly, and with the intent to impede or disrupt the orderly conduct of Government business...
  • Universal Genetic Code? No!

    01/22/2016 10:45:28 AM PST · by fishtank · 4 replies
    Jay L. Wile ^ | Jan. 18, 2016 | Jay L. Wile
    Universal Genetic Code? No! The basic process by which proteins are made in a cell. (click for credit) The basic process by which proteins are made in a cell. (click for credit) I am still reading Shadow of Oz by Dr. Wayne Rossiter, and I definitely plan to post a review of it when I am finished. However, I wanted to write a separate blog post about one point that he makes in Chapter 6, which is entitled “Biological Evolution.” He says: To date, the National Center for Biotechnology Information (NCBI), which houses all published DNA sequences (as well as...
  • Researchers have written quantum code on a silicon chip for the first time

    11/17/2015 6:53:19 PM PST · by LibWhacker · 28 replies
    Science alert ^ | 11/17/15 | FIONA MACDONALD
    Researchers have written quantum code on a silicon chip for the first time And so it begins... FIONA MACDONALD 17 NOV 2015           For the first time, Australian engineers have demonstrated that they can write and manipulate the quantum version of computer code on a silicon microchip. This was done by entangling two quantum bits with the highest accuracy ever recorded, and it means that we can now start to program for the super-powerful quantum computers of the future.Engineers code regular computers using traditional bits, which can be in one of two states: 1 or 0. Together, two bits...