Nutters: there's alternative thinking and just plain oddness

A prize if any of you can tell us what they're on about

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

1.13GHz P3 system DOA

I'm searching for the cooler for my home cold fusion power station.

Could you provide some info where I can buy active cooler you've mentioned in your review: "1.13GHz P3 system DOA By: Andrew Thomas"

Not since early Russian nuclear submarines have we seen so much active cooling.

Your help will be highly appreciated.

Best regards,

In your The Register article "Pentium 4 to launch in October" you said that the P4 uses 128bit SSE whereas SSE1 is 64bit. That's not true. Both SSE1 and SSE2 use 128bit Registers but with SSE2 it's possible to have two double-precision FP-values in one register instead of four single-precision FP-values

Oliver Schadlich

[Andrew says: smug fucker]

Internet execs the fattest of all fat cats

That sick feeling you get when you hear of the fat cat bonuses is because you're stuck back in Britain, it has nothing to do with the bonuses. Get the hell out, cure yourself of the British disease.

Oh, my mistake you are the disease. Every time I read a loser's article written by your ilk I thank God that I got the hell out of a country with more than it's share of fools who care more about what the other
guy doesn't deserve than getting on with being productive themselves. Never mind about trying to fix it, just keep pulling at the legs of the person further up the ladder Kieren after all you're British.


[Kieren (trying to understand) says: Yeah, like, whatever]

As much as I love The Register, I can't help but notice that the standard of grammar contained within is dropping very quickly. I am writing this after reading your "Pentium 4 platform re-named" story, which features the following typographical blunders:

"Of course, it (the Pentium4] will be Rambus based for its first nonths." Nonths? Months, surely?

"But an unbiased outsider might want to ask why exactly Intel, majoring on this Netbust stuff, hasn't instead concentrated on its 64-bit Itanic collation."

Netbust or Netburst? Or perhaps that was a pathetic attempt at a play-on-words. Bust, burst, oh, harhar!

"More on this tomorrow, if we're allowed to pose the questins." Questins? Questions.

Also, I am assuming that the word "marchitecture" is a deliberate play on words, however, if I'm mistaken, then chalk up another two spelling errors.

Is it really so difficult to run your stories through a spell checker before publication?

Best Regards,
James Sheridan

[This is the week's best (longest?) flame. Strange that it's about an article written about a month ago. But then peculiar minds work in peculiar ways]

Crackers are common criminals

Take your first example:

"You are a judge. Before you in the court stands a pimply-faced youth with greasy hair and an ill-advised vestigial beard. He stands accused of breaking into several dozen houses and stealing credit card details and address books. The address books were used to identify future properties to burgle and, whilst in each house, he burnt all the personal correspondence he could find." - from Andrew the retard

Let's break this down:

"He stands accused of breaking into several dozen houses and stealing credit card details and address
books." First off, the whole comparison between typing on a keyboard and viewing remote data and
breaking/entering/treaspassing into people's homes is wrong. Not only is the ACT totally different (if you had any CLUE about hacking you would understand), but the ACTIONS in specific are not comparable. "stealing credit card details and address books" - in the physical sense means you pick them up and they are in your possession now and not the owner's. This is not true in hacking, where it is like taking a photograph of the address book without touching it. FURTHER, the *intent* and *process* are totally different - in physical theft the jerk who is doing it wants the cards/addressbook/whatever they *want it*. In hacking if someone gets this info it is *incidental* and they usually could give a fuck less. They don't see a shiny little card with a visa logo and think of spending money - they see a plain DATA FILE and think - "how fucking lame": -rw-r--r-- 1 oracle oracle 5462489 Feb 9 2000 database.mdb

"The address books were used to identify future properties to burgle." This is the only semi-accurate statement you make - and not because of the bullshit "burgle" comparison, but because of the exploitation of trust relationships.

"Whilst in each house, he burnt all the personal correspondence he could find." Idiot. This almost never happens - even if you listen to the brain-dead media you still couldn't get this wrong - hackers don't destroy data! Where did you get these wildly incorrect views? Did you watch the movie Hackers and saw the scene where stupid kids "crashed the gibson" and think that makes you an expert? You have publicly humiliated yourself. And your other comparison demonstrates that you have NO CLUE about the Napster issue or the MPAA/DeCSS cases, which you make reference to here:

"Another housebreaker stands accused of a number of break-ins where he stole expensive stereo systems and CD collections. In mitigation, he blames Metallica, Napalm Death and Spinal Tap for making him do it. The reasoning is obvious - if these bands hadn't recorded unencrypted music onto CDs in the first place, he wouldn't have been tempted to pop into other people's houses while they were out and remove them. And he needed the stereo systems to play them on. And the beer from the fridge. And the car to carry it all away in."

First off, you are mixing cases and demonstrate a total LACK OF CLUE. The Metallica issue was a straight-up case of a bunch of tasteless asshole kids bootlegging metallic music using some online service - the service was threatened for facilitating the copying. Encryption had NOTHING to do with it. (neither did hacking)

The second part - the encryption - is your weak/uninformed reference to the DeCSS case. In this case 2600.com was taken to court FOR PROVIDING A **LINK** ON THEIR WEBSITE TO A HARMLESS PROGRAM. Read the court papers - they were never accused of doing anything with the program, providing the program, or any act other than providing a link to it. People who are copying DVD's do not use that program anyway, there are DOZENS of quick and easy ways to copy DVD's and put them on the net and the whole 2600.com legal thing is a complete waste of everyone's time and money.

It is assholes like Andrew that are FUCKING THE UNITED STATES RIGHT INTO THE SHITTER - the next generation will be reading about fucks like him in textbooks "the fools that took your right to LINK TO WEBPAGES ON THE INTERNET" ...

"A hack attack on a Word or Outlook user is surely criminal trespass on their (electronic) property in exactly the same way it is if a burglar breaks into their house. It doesn't matter how easy or hard it is - it's still wrong." Here again you compare sending data to trespass and burglary. How can I describe this clearly.... you are a dangerously stupid fool.

I have lost ALL respect I had for The Register - I once considered it the finest source of "telling it like it is journalism" - but after reading the most idiotic and maliciously stupid article I have EVER READ IN MY LIFE, I will take what I read here with a grain of salt.

Staff: Fire this stupid fuck! He has no clue!

Top three mobile application threats

More from The Register

next story
Och aye! It's the Loch Ness Monster – but only Apple fanbois can see it
Fondleslab-friendly beastie's wake spotted... OR WAS IT?
Japanese boffin EYES up big bucks with strap-on digi-glasses
AgencyGlass saddles user with creepy OLED display
Sleuths find nosy NORKS drones on the Chinternet
UAVs likely to have been made in the Middle Kingdom
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Dorian Nakamoto gets $23,000 payout over Bitcoin invention saga
Maintains he didn't create cryptocurrency, but will join community
Pirate Bay's 10 millionth upload: Colour us shocked, a SMUT FLICK
P2P badboys show online piracy is alive and humping
Teen girl arrested with 70-year-old man's four inch weapon inside her
Charged with introducing .22 snubbie to penile facility. It wasn't firing blanks
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
prev story


Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.