Language Selection

English French German Italian Portuguese Spanish

Reiser

Reiser Attorney Seeks Mistrial

Filed under
Reiser

sfgate.com: Defense attorney William Du Bois has filed papers asking for a mistrial on the grounds that Judge Larry Goodman improperly -- in open court -- strenuously rebuked Du Bois last month.

Scientist Now Not Sure Where Nina Last Seen

Filed under
Reiser

wired: A forensic specialist testified here Wednesday she had made a mistake when analyzing blood found in the house where Hans Reiser's wife was last seen.

Jurors Shown 'Stuff Sack' Stained With Nina Reiser's Blood

Filed under
Reiser

wired: Jurors in the Hans Reiser murder trial for the first time in the three-month trial were shown actual forensic evidence -- a sleeping bag cover that was stained with blood from the missing wife whom the Linux programmer is accused of killing.

Criminalist Testifies That Blood Was Found In Reiser House

Filed under
Reiser

wired blog: Jurors judging the murder trial of Linux guru Hans Reiser were provided a glimpse into the prosecution's forensic evidence -- trace amounts of "nice shiny red" blood found inside the defendant's house -- the last place his wife Nina Reiser was seen alive.

Hans Reiser Defense Priming Jurors for Closing Arguments

Filed under
Reiser

blog.wired.com: A police officer on Wednesday testified here in the Hans Reiser murder trial that the Linux programmer was under heavy surveillance following the 2006 disappearance of his wife, Nina Reiser.

Namesys vanishes, but Reiser project lives on

Filed under
Reiser

c|net: Namesys, the company run by murder suspect Hans Reiser, has fallen off the face of the Internet, but the file-system software it was commercializing is still under development by volunteers.

Foliage on Nina Reiser's Tires 'Consistent' with Leaf in Hans Reiser's Car

Filed under
Reiser

wired blogs: A police officer testified in the Hans Reiser murder trial here Tuesday that foliage discovered on the tires of his missing wife's van wife was "consistent" with a leaf found inside a vehicle used by the defendant.

Hans Reiser Murder Trial Resumes After Three-Week Recess

Filed under
Reiser

wired blogs: The Hans Reiser murder trial resumed here Monday after a three-week holiday recess. On the stand throughout the entire morning was Oakland Police Department technician Bruce Christensen.

Traffic Officer Says He Saw No Blood on Reiser's Car Seat

Filed under
Reiser

wired: A police officer testified in the Hans Reiser murder trial Tuesday he pulled over the defendant for a traffic violation nine days after the Linux programmer's wife went missing and noticed no signs the vehicle was used to dispose of a body.

Witnesses Describing Motive and Method in Hans Reiser Murder Trial

Filed under
Reiser

wired blog: Week six in the Hans Reiser murder trial began Monday combining both motive and method, at least according to how prosecutors want jurors to see it, over why and how the Linux programmer's wife was killed.

Syndicate content

More in Tux Machines

LMMS Guide Part 1: Creating Simple Melodies Using Sounds And Instruments

​LMMS stands for Linux Multimedia Studio. It is a very good open-source program that is used to create music tracks using sound files, predefined instruments, and sound effects. LMMS has versions for Windows and macOS in addition to Linux. Their website, of course, lists all of their features offered to users. This article will attempt to provide practical guides and tips for composing songs using LMMS. Read
more

How To Create Shell Scripts

Having to type the same command over and over again can be a daunting task and tiresome for that matter. The shell scripts are really easy to create and run saving you from a lot of misery and anguish if you really prefer using the terminal over using the GUI for running tasks. Read
more

Today in Techrights

Security Leftovers

  • Thousands of FedEx customers' private info exposed in legacy server data breach

    Uncovered by Kromtech Security Center, the parent company of MacKeeper Security, the breach exposed data such as passport information, driver's licenses and other high profile security IDs, all of which were hosted on a password-less Amazon S3 storage server.

  • Correlated Cryptojacking

    they include The City University of New York (cuny.edu), Uncle Sam's court information portal (uscourts.gov), Lund University (lu.se), the UK's Student Loans Company (slc.co.uk), privacy watchdog The Information Commissioner's Office (ico.org.uk) and the Financial Ombudsman Service (financial-ombudsman.org.uk), plus a shedload of other .gov.uk and .gov.au sites, UK NHS services, and other organizations across the globe.

    Manchester.gov.uk, NHSinform.scot, agriculture.gov.ie, Croydon.gov.uk, ouh.nhs.uk, legislation.qld.gov.au, the list goes on.

  • Facebook using 2FA cell numbers for spam, replies get posted to the platform

    Replies ending up as comments appears to be a bizarre bug, but the spamming seems intentional.

  • Swedish Police website hacked [sic] to mine cryptocurrency

    Remember now, it is a Police Force that allowed their website to be hijacked by this simple attack vector. The authority assigned to serve and protect. More specifically, the authority that argues that wiretapping is totally safe because the Police is competent in IT security matters, so there’s no risk whatsoever your data will leak or be mishandled.

    This is one of the websites that were trivially hacked [sic].

    It gives pause for thought.

    It also tells you what you already knew: authorities can’t even keep their own dirtiest laundry under wraps, so the notion that they’re capable or even willing to protect your sensitive data is hogwash of the highest order.

  • New EU Privacy Law May Weaken Security

    In a bid to help domain registrars comply with the GDPR regulations, ICANN has floated several proposals, all of which would redact some of the registrant data from WHOIS records. Its mildest proposal would remove the registrant’s name, email, and phone number, while allowing self-certified 3rd parties to request access to said data at the approval of a higher authority — such as the registrar used to register the domain name.

    The most restrictive proposal would remove all registrant data from public WHOIS records, and would require legal due process (such as a subpoena or court order) to reveal any information supplied by the domain registrant.

  • Intel hit with 32 lawsuits over security flaws

    Intel Corp said on Friday shareholders and customers had filed 32 class action lawsuits against the company in connection with recently-disclosed security flaws in its microchips.

  • The Risks of "Responsible Encryption"

    Federal law enforcement officials in the United States have recently renewed their periodic demands for legislation to regulate encryption. While they offer few technical specifics, their general proposal—that vendors must retain the ability to decrypt for law enforcement the devices they manufacture or communications their services transmit—presents intractable problems that would-be regulators must not ignore.

  • Reviewing SSH Mastery 2nd Ed

    It’s finally out ! Michael W Lucas is one of the best authors of technical books out there. I was curious about this new edition. It is not a reference book, but covers the practical aspects of SSH that I wish everybody knew. Rather than aggregating different articles/blogs on SSH, this book covers 90% of the common use cases for SSH that you will ever encounter.