Language Selection

English French German Italian Portuguese Spanish

Reiser Prosecutor to Jurors: 'You Know He Killed Her'

Filed under
Reiser

The prosecutor in the Hans Reiser murder trial on Wednesday continued for a second day to poke at Linux programmer Hans Reiser's defense to accusations he murdered his wife two years ago.

"There's no other conclusion you can draw. He killed Nina," prosecutor Paul Hora said as he concluded his closing argument. "Right when she's dead, he begins to cover it up."
"The story itself is absurd."

Hora captivated the jury with his sometimes thunderous oration, declaring Reiser's testimony about his own behavior following Nina Reiser's disappearance on Sept. 3, 2006 as a "fabrication" and "absurd."

"His explanation just doesn't make sense. It just doesn’t make sense," Hora declared.
The defendant's attorney, William DuBois, is expected to begin his closing arguments after the lunch break.

More Here


Also:

Linux programmer Hans Reiser's defense attorney told jurors here during his closing arguments Wednesday that his client did not kill his wife, "not because he is a nice guy, but the evidence in this case has not proven the crime."

"Hans' conduct can be interpreted as being guilty. It can also be interpreted as innocence, and a product of his own platypus-ian personality, as we will see," defense attorney William DuBois told jurors.

"He is odd in every way," DuBois said.

DuBois, who was summarizing for jurors his geek defense, labeled his client a "duckbill platypus" and said any guilt-like behavior the defendant exhibited in the aftermath of his wife's disappearance could easily be explained because Reiser is paranoid and "socially inept."

"Why did he act the way he acts?" DuBois asked as he held a miniature platypus stuffed animal.

Answering himself, he replied: "He does not understand social cues. He shows almost no emotion is because he has no emotion."

Reiser Defense Blasts Prosecution; Geek Defense Re-Deployed




And: Hans Reiser Trial: April 16, 2008

People's opinions

Personally, I don't think this is even news. All that is really relevant is that Namesys is no more.
In any way, wired.com tends to over bloat stuff. Even if this was "news" some time ago, it's not anymore. Wired.com just like to show their "we cover news" or their "we personally want Reiser in jail" attitudes.

I would rather however not see the word "Linux" in Reiser related articles.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

Red Hat and Fedora: Red Hat Academy, Lynne Chamberlain, Flatpak Apps, and Video of Fedora 26

Security: Windows 10 Bypass, Slackware OpenJDK Update and More

  • [Older] GHOSTHOOK ATTACK BYPASSES WINDOWS 10 PATCHGUARD
    A bypass of PatchGuard kernel protection in Windows 10 has been developed that brings rootkits for the latest version of the OS within reach of attackers. Since the introduction of PatchGuard and DeviceGuard, very few 64-bit Windows rootkits have been observed; Windows 10’s security, in particular its mitigations against memory-based attacks, are well regarded. Researchers at CyberArk, however, found a way around PatchGuard through a relatively new feature in Intel processors called Processor Trace (Intel PT).
  • [Slackware] OpenJDK 8 security round-up for July ’17
    Sooner than I anticipated, there is an update for OpenJDK 8. Andrew Hughes (aka GNU/Andrew) announced the release of IcedTea 3.5.0. The new icedtea framework compiles OpenJDK 8 Update 141 Build 15 (8u141_b15). This release includes the official July 2017 security fixes.
  • ROI (Not Security) the Most Immediate IoT Challenge
    According to Defining IoT Business Models, a new report from Canonical, the software company behind the Ubuntu Linux distribution, device security and privacy (45 percent) falls behind quantifying the return of investment (ROI) of their IoT projects (53 percent) as an immediate challenge. Canonical drew its conclusions from a survey of 361 IoT professionals conducted by IoTNow on behalf of the company.
  • Apply the STIG to even more operating systems with ansible-hardening
    Tons of improvements made their way into the ansible-hardening role in preparation for the OpenStack Pike release next month. The role has a new name, new documentation and extra tests. The role uses the Security Technical Implementation Guide (STIG) produced by the Defense Information Systems Agency (DISA) and applies the guidelines to Linux hosts using Ansible. Every control is configurable via simple Ansible variables and each control is thoroughly documented.
  • Open Source Flaw 'Devil's Ivy' Puts Millions of IoT Devices at Risk
    Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras, Senrio reported this week.
  • Microsoft’s secret weapon in ongoing struggle against Fancy Bear? Trademark law [Ed: Microsoft should make a start by stopping the addition of back doors to all its software]
  • SECURITY FOR THE SECURITY GODS! SANDBOXING FOR THE SANDBOXING THRONE
    Last year, probably as a distraction from doing anything else, or maybe because I was asked, I started reviewing bugs filed as a result of automated flaw discovery tools (from Coverity to UBSan via fuzzers) being run on gdk-pixbuf. Apart from the security implications of a good number of those problems, there was also the annoyance of having a busted image file bring down your file manager, your desktop, or even an app that opened a file chooser either because it was broken, or because the image loader for that format didn't check for the sanity of memory allocations.

5 open source tools for developing IoT applications

The internet of things is growing at a staggeringly fast pace, and is quickly coming to revolutionize virtually every aspect of modern life. Aspiring developers hoping to hop on board and profit off the growing phenomenon are constantly looking for the right tools to use. So what are the open source tools best suited for working with the IoT, and where can developers find them? A plethora of open source tools lay at the disposal of any would-be developer eager and wise enough to use them. By utilizing these five, you’ll find yourself tackling challenges and developing successful applications in no time. Read more Related: