The Cybersecurity Act of 2009 Passes Senate Panel 367
An anonymous reader writes "The Cybersecurity Act of 2009 passed a Senate panel, giving the president unprecedented power to issue a nation-wide blackout or restriction on websites without congressional approval. The bill, written by Sen. Jay Rockefeller [D-WV] and revised by Sen. Olympia Snow [R-ME], was drafted in an attempt to thwart internet-based terrorist threats, and gives the president this 'kill switch' without oversight or explanation. The bill is up for Senate vote."
Oh yeah? (Score:5, Funny)
Well, you can't contr[Connection dropped by USA Presidential request].
It's ok people (Score:5, Funny)
A Kill Switch? (Score:3, Funny)
Re:Bye, bye freedom... (Score:5, Funny)
Vote.
Run for office.
Rebel.
I believe you forgot:
????
Profit!
Re:Hopenchange (Score:3, Funny)
I really thoughts the democrats would be different.
Don't blame me (Score:2, Funny)
I voted for Hillary.
Re:A Kill Switch? (Score:3, Funny)
It's a poison pill. It acts like a virus. It replicates, eating up all the memory. If you see this affecting your machine as the system administrator, don't be an idiot. Type "Cookie". That will help to head the program off at the pass.
The second portion of this poison pill is a "Zero Bug". it attacks all the login and overlay files. I advise that you run anti-virus, while checking out the systems display.
The third, and final payload is a "rabbit" virus which infects administration systems. A smart administrator would sent a digital flu-shot. Without said precaution, the rabbit will replicates 'till it overloads a file, then it spreads like cancer. ...
I got hit by the backdoor. It led to massive infections. Multiple GPI and FSI viruses.It came in from the remote nodes. It attacked my kernal! My system command process!
Luckily, Penn Jillette (the astute computer tech, not the magician) was there to help secure my Gibson supercompuuter.
Re:Report to Congress (Score:2, Funny)
Oh, wait.
Re:Bye, bye freedom... (Score:2, Funny)
Re:It's ok people (Score:3, Funny)
You are mistaken. Any number of "accidental catastrophes" could befall an operator. House fire, robbery, drive-by shooting, "random" murder during the commission of a robbery...
Let's not forget a bad review on Yelp [slashdot.org].
Re:How does this work? (Score:3, Funny)
This is probably your answer.
Change you can believe in (Score:5, Funny)
Change you can beli-- 404 ERROR...
Re:Need to have a fast method if needed (Score:3, Funny)
Re:Uh huh, terrororists (Score:1, Funny)
Let me translate his post for readers here:
President has "R" after his name: censorship = Bad
President has "D" after his name: censorship = Good
BTW, I haven't voted for the D team or the R team in over a quarter century.
Re:How does this work? (Score:3, Funny)
Simply make two rules:
Define "Everyone" below as any ISP in the USA.
1) Everyone has to BGP peer with Big Brother AS number 666, one way or another
2) Everyone has to accept (not filter) a 0/0 route from Big Brother AS 666 (most people filter anything bigger than a /8)
Seems like it would be simple enough...
According to my favorite AIM buddy "BGP Bot" AS 666 is not currently assigned, probably pending this law.
Re:How does this work? (Score:3, Funny)
All those series of tubes are connected to a big donkey wheel in the cellar of the White House where you can shut it off.
Interesting response (Score:2, Funny)
Did you read it off your palm?