Language Selection

English French German Italian Portuguese Spanish

Reiser

Hans Reiser Murder Trial: The Vilification Defense Begins

Filed under
Reiser

blog.wired.com: The vilification of Nina Reiser is commencing in earnest here at Hans Reiser's murder trial. After three months of the prosecution's case, Hans Reiser's defense opened Tuesday with verbal salvos portraying wife Nina Reiser as the not-so-perfect woman.

Nina Reiser's Mother, Defense Attorney Verbally Sparring

Filed under
Reiser

blog.wired.com: The trial of People v. Hans Reiser picked up here Thursday where it left off the day before: The murder defendant's attorney was sparring with the mother of the defendant's missing wife.

Also: Prosecution Rests in Hans Reiser Murder Trial; Defense Moves for Acquittal

Nina Reiser's Mother Calls Son in Law 'a Killer'

Filed under
Reiser

blog.wired.com: Nina Reiser's mother took the witness stand for the second day in the trial of Hans Reiser. She testified Wednesday that Hans Reiser told her Nina Reiser was a "bad wife."

Also: CBS Paying Nina Reiser's Mother $20,000 as Part of Trial Broadcast

Last Prosecution Witness to Take Stand in Hans Reiser Murder Trial

Filed under
Reiser

blog.wired.com: The Hans Reiser murder trial reaches a milestone Monday, when the prosecution is expected to put on its last witness -- three months after jurors began hearing some 50 witnesses here in Alameda County Superior Court.

Also: Nina Reiser's Mom Sobbing on Witness Stand

Hans Reiser Subject of New Play

Filed under
Reiser

Hans Reiser, Linux Programmer currently on trial for murdering his estranged wife, is now the subject of a local theater groups' play on the hazards of the technology field.

Nina Reiser's Last Phone Call Was to Hans Reiser on Day She Vanished

Filed under
Reiser

blog.wired.com: The phone call from Nina Reiser's cell phone was placed to her estranged husband, Hans Reiser -- the popular Linux programmer who is accused of killing her, according to testimony here Thursday.

Hans Reiser Murder Trial Refocusing on Nina Reiser

Filed under
Reiser

blog.wired.com: After weeks of forensic evidence and other testimony, the softer side of the Hans Reiser murder trial re-emerged here Wednesday when the 3-month-old case refocused on the Linux programmer's wife, who vanished Sept. 3, 2006.

Hans Reiser Murder Trial Delayed 2 Days

Filed under
Reiser

blog.wired.com: The Hans Reiser murder trial was delayed for two days Monday. Prosecutor Paul Hora is unable to attend the proceedings here in Alameda County Superior Court until Wednesday. His wife had a baby boy Saturday.

Reiser's son afraid to return to U.S.

Filed under
Reiser

abclocal.go.com: Attorneys for Nina Reiser's mother say Nina's son is afraid to return to the U.S. from Russia because of all the trauma he has suffered since Nina disappeared, a social services worker testified today.

Also: Cops Find $9,000 and Passport on Hans Reiser

Hans Reiser's 'Mental State' Created by Police

Filed under
Reiser

blog.wired.com: If Hans Reiser's behavior seemed suspicious following his wife's disappearance, thank the Oakland Police Department. That's what the 44-year-old defendant's defense attorney, William DuBois, said Wednesday at his client's murder trial here.

Syndicate content

More in Tux Machines

Linux firewalls: What you need to know about iptables and firewalld

A firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through. Here’s a simple example... Read more

Mozilla: Firefox GCC/LLVM Clang Dilemma, September 2018 CA Communication and CfP

  • Fedora Firefox – GCC/CLANG dilemma
    After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries. The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6. Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.
  • September 2018 CA Communication
    Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:
  • Emily Dunham: CFP tricks 1
    Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

today's howtos

Security: Quantum Computing and Cryptography, Time to Rebuild Alpine Linux Docker Container

  • Quantum Computing and Cryptography
    Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length. This is why cryptographers are hard at work designing and analyzing "quantum-resistant" public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn't. But even assuming aliens have developed the technology to its full potential, quantum computing doesn't spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we're working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we'll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory -- albeit with significant loss of capability. At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
  • This New CSS Attack Restarts iPhones & Freezes Macs
  • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
  • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg