Berkeley CSUA MOTD:Entry 22322
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2001/9/6 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:22322 Activity:low
9/5     does shit like this still happen?
        http://www.techlawjournal.com/courts/kathleenr/20010306op.asp
        or is that only in backwater states?
        \_ um dude, that's livermore, ca.
        \_ and what's wrong with it? an idiot woman brought an idiot suit
           to court, and the case was dismissed.  BFD.
                /- I think she IS an idiot, trying to make up for her own
                   bad parenting skills.  Obviously, this kid knew what he
                   was doing; (printing his school schedule over the top
                   of a "scantily clad woman"--how much money did he get
                   for that from his buddies?) the library was just a means
                   to an end. --sowings
           \_ I don't think the woman is an idiot.  I think this scum is smart
              enough to realize that she can probably make some quick bucks by
              filing this idiot suit and reaching a settlement.  Oh did she
              remember to get the media involved?  Oh she might even be able to
              write a book afterwards on how her son's innocence was violated
              and how she was physically and emotionally hurt and how she
              spent years in turmoil before she recovered and blah blah blah.
        \_ You are right, this is terrible. Those librarians should be shot.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2013/8/22-10/28 [Computer/Companies/Yahoo, Industry/SiliconValley] UID:54732 Activity:nil
8/22    http://marketingland.com/yahoo-1-again-not-there-since-early-08-56585
        Y! is back to #1! Marissa, you are SEXY!!!
        \_ how the heck do you only have 225M uniq vis/month when there
           are over 1 billion internet devices out there?
           \_ You think that every single Internet user goes to Y!?
        \_ Tall blonde skinny pasty, not my type at all -former Y!
	...
2013/6/26-8/13 [Computer/Domains, Computer/Networking, Computer/SW/WWW/Browsers] UID:54697 Activity:nil
6/26    This ones for you psb -ausman
        http://25.media.tumblr.com/027fe67c84c2288cc16e9c85db690834/tumblr_mp0ag8DCQI1qzwozco1_1280.jpg
        \- that's pretty good. i wish someone had put the idea to be before i saw
           it on the internet, so see if i'd have put the 9 justices in the same
           boxes. JOHN PAUL STEVENS >> All the sitting justices. --psb
        \- that's pretty good. i wish someone had put the idea to be before i
	...
2012/4/2-6/4 [Computer/SW/Languages/Java, Computer/SW/RevisionControl] UID:54353 Activity:nil
4/02    We use Perforce at work for revision control. It seems to work okay.
        Lately, a lot of the newer developers are saying that Perforce
        sucks and we should switch to Mercurial or Git. I have done some
        searching on the Internet and some others have this opinion. Added
        advantage is that Mercurial and Git are free. However, there would
        be some work to switch for the sysadmins and the developers.
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
	...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2011/11/16-12/28 [Academia/Berkeley/CSUA, Computer/HW] UID:54230 Activity:nil
11/16   We'll be taking all CSUA machines offline in the near future for a Soda
        Hall server room reorganization (we're being moved to a neighboring
        server cabinet).  Downtime will hopefully be minimal.  --jordan
        \_ Thanks for all your work keeping the machines running!  It's
           been awesome having soda actually working again.
        \_ Update:  this is tentatively scheduled for Saturday afternoon.
	...
2011/8/9-27 [Computer/SW/Editors/Emacs, Academia/Berkeley/CSUA] UID:54162 Activity:nil
8/9     So I just found out that an old college friend of mine lost her
        four month old daughter to SIDS. What is the correct response here?
        \_ "Did she sleep with her belly?" and "Did you breastfeed?"
        \_ try this joke:
           How do you make a dead baby float?
           ˙ʎqɐq pɐǝp ÉŸo sdooÉ”s oʍʇ puɐ ɹÇ\
	...
Cache (8192 bytes)
www.techlawjournal.com/courts/kathleenr/20010306op.asp
Editor's Notes: Tech Law Journal converted an MS Word version of this opinion into HTML. TLJ converted footnotes into endnotes, and added two way hyperlinking. TLJ eliminated pagination, paragraph indentations, and double spacing. Filed 3/6/01 CERTIFIED FOR PUBLICATION IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA FIRST APPELLATE DISTRICT DIVISION FOUR KATHLEEN R. V-015266-4) In this case we hold that a city is not subject to suit for damages or an injunction for offering unrestricted access to the Internet through computers at a public library. RECORD This case was filed against respondent 8 City of Livermore by appellant Kathleen R. Respondents demurrer was sustained without leave to amend on the ground that the complaint did not state facts sufficient to constitute a cause of action, and the case was dismissed. Respondents library has computers linked to the Internet which patrons of any age are free to use. Twelve-year-old Brandon went to the computers without appellants knowledge and downloaded sexually explicit photos from the Internet onto a floppy disk that he brought to the library. Without any adults knowledge or permission Brandon printed the photos at a relatives computer. Appellant alleges that the photos Brandon obtained are harmful to minors and that some of them are obscene. One of the photos is reproduced in color on the first page of the complaint and others are attached as exhibits. In one of the exhibits a middle school schedule is superimposed over the image of a scantily clad woman. A copy of the Internet access policy adopted by respondents library board of trustees is attached to the complaint. This policy states in part: "The Board of Trustees supports the idea that all members of the community have free and equal access to the entire range of library resources, regardless of content, approach, format or amount of detail. These rights extend to all users of the public library including minors. The Internet and its available resources may contain materials of a controversial nature. Livermore Public Library does not monitor and has no control over the information accessed through the Internet and cannot be held responsible for its content. Individuals must accept responsibility for determining what is appropriate. Parents and guardians are encouraged to work closely with their children. Parents are expected to monitor and supervise childrens use of the Internet in selecting material that is consistent with personal and family values. The section 1983 claim alleges that: Minors are expected to go to the library to complete public school assignments; All of appellants causes of action seek injunctive relief. The state claims seek to enjoin respondent: from acquiring or maintaining computers which allow people to access obscenity or minors to access harmful sexual matter; The nuisance and premises liability claims also request declarations that respondent is liable for all future damages appellants children suffer from "sexual and other material harmful to minors" they access at library computers connected to the Internet. DISCUSSION A public library is in a "damned if you do, damned if you dont" situation in deciding whether to restrict access to the Internet from its computers to prevent harm to minors. A case in Virginia shows that the library can be sued if it limits Internet access ( 11 Mainstream Loudoun v. The state law claims in this case are preempted by federal law, and there is no entitlement to relief under section 1983. State Law Causes of Action The state causes of action are precluded by title 12 47 United States Code section 230 ( 230). Respondent is not an "information content provider" in this case because it is not "responsible, in whole or in part, for the creation or development" of any of the harmful matter accessible through its computers. Nothing in the text or stated purposes of that provision supports this argument. In that case, a public librarys board of trustees was alleged to have violated the First Amendment rights of adult patrons by installing filtering software on library computers to block Internet sites which contained matter harmful to minors. The board claimed immunity under section 230, a different immunity than the one asserted here. Unlike the immunity here, the immunity claimed in Loudoun I conflicted with section 230s stated purposes. Also, appellants reading of Loudoun I is belied by the courts subsequent opinion in Loudoun II. For all of these reasons appellants reliance on Loudoun I is misplaced. Loudoun I held that this immunity did not extend to the plaintiffs First Amendment claim because " 230 was enacted to minimize state regulation of Internet speech . Section 230 immunity serves rather than undermines the purpose of minimizing state regulation of Internet speech insofar as it precludes claims based on public entities failure to undertake that regulation. Thus, the rationale for the denial of immunity in Loudoun I has no application in this case. In any event, there can be no doubt that the Loudoun court thought that public libraries could claim immunity under section 230 because the court ventured in Loudoun II that this immunity should alleviate any concern the library might have had with potential criminal liability. Appellant contends that section 230 cannot be interpreted to confer immunity in this case because her claims are consistent with the aims of Congress in passing that law. Appellant notes that title 47 United States Code section 223 ( 223) was enacted along with section 230 as part of the Communications Decency Act of 1996, and submits that certain of section 223s provisions addressed the same concerns as her lawsuit. Appellant refers to section 223, which made it a crime to "use any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs, regardless of whether the user of such service placed the call or initiated the communication," and section 223, which made it a crime to "knowingly permit any telecommunications facility under ones control to be used for such activity . The problem with this line of argument is that this is not a criminal case. At most, the statutes appellant cites raise the issue of whether section 230 prevents enforcement of state laws pertaining to criminal conduct, an issue not presented by the allegations of the complaint in this civil case. Appellant attempts to raise this issue in her briefs with charges and hypotheticals involving intentional provision of obscene pornography to minors. Appellant asserts that "it is not the providing of unrestricted Internet access which is the problem; Appellant asks us to imagine an adult enticing minors to view obscene images he had called up on a library computer screen, and suggests that to grant the library immunity here would insulate this adult from criminal prosecution or liability for intentional infliction of emotional distress. Appellant describes this result as "patently absurd and hardly what Congress intended. The mans wrong exists not in creating or distributing the images but in choosing to publicly exhibit them to impressionable youngsters. To combat that problem and "remove disincentives for the development and utilization of blocking and filtering technologies" ( 230), Congress conferred section 230 immunity for actions to restrict access to objectionable material. However, as the Fourth Circuit observed in the context of a tort claim against a commercial interactive computer service, "Congress made a policy choice . Congress recognized the threat that tort-based lawsuits pose to freedom of speech in the new and burgeoning Internet medium. The imposition of tort liability on service providers for the communications of others represented, for Congress, simply another form of intrusive government regulation of speech. Appellant contends that any immunity in this case would extend only to tort claim...