Sunday, October 12, 2003

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Island Chronicles: Islomane no more. Our latest Island Chronicles dispatch is up at LA Weekly. Link
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Video Editing Made Simpler, Not Easy (washingtonpost.com). washingtonpost.com - Working with home movies on your computer, once a task of staggering expense and complexity, is reaching the point of actual usefulness -- just in time to save our degrading collections of fragile videotape. The combination of increasingly fast computer processors, increasingly roomy hard drives and increasingly cheap DVD- and CD-recorder drives makes it feasible to edit a tape library down to more watchable versions and then save the result on more permanent DVDs or video CDs (a lower-quality, cheaper way to store video).
3.  Better, Late: New PowerBook Worth Waiting For (washingtonpost.com). washingtonpost.com - For a company whose share of the domestic laptop market only just cracked 7 percent, Apple has gotten a lot of coverage for its portable computers. But it deserves all this ink: The company has developed a talent for fusing metal and plastic into elegant, efficiently sculpted works of art that happen to store music and photos, get on the Internet and play DVDs.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  IBM, Brazilian Government Launch Linux Effort

11:35:19 PM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Digital Projection of Films Is Coming. Now, Who Pays?. Economics and industry politics have delayed the long-predicted digital revolution in movie theaters. By Eric Taub.
2.  Patriot Act Curbing Data Retention. The Patriot Act has led online buyers and sellers to watch what they do. Could it threaten Internet business? By Bob Tedeschi.
3.  Judge Gives Leg Up to Internet Calls. A decision that Minnesota should leave Internet phone businesses unregulated does not put the issue to rest. By Barnaby J. Feder.
4.  Trial Offers Glimpse of Ties of Tech Boom. A telling glimpse into the relationship between Wall Street and corporate America during the technology stock boom has emerged from a court case. By Andrew Ross Sorkin.
5.  Shift Key Opens Door to CD and Criticism. John A. Halderman, a doctoral candidate at Princeton University, has revealing how easy it is to skirt a new security feature of the music industry. By Lisa Napoli.
6.  Copyright Lawsuit Is Turnabout for SCO. SCO, the company that sued I.B.M. contending I.B.M. added parts of Unix to the freely distributed Linux software, may be embarrassed by a similar claim against a company once related to SCO. By John Markoff.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
7.  Vulnerabilities: SANE SANE_NET_INIT Unauthorized Access Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

A vulnerability has ...

8.  Vulnerabilities: SANE Internal Wire Memory Disclosure Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

SANE is prone to a v...

9.  Vulnerabilities: SANE Daemon Connected User Memory Consumption Denial Of Service Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

A problem has been d...

10.  Vulnerabilities: SANE Remote Dubug Enabled Connection Dropping Denial of Service Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

It has been reported...

11.  Vulnerabilities: SANE Strings Memory Allocation Denial Of Service Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

SANE is prone to a m...


10:34:57 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Internet Trailers Ignite Gibson's 'Passion' (Reuters). Reuters - The well-documented controversy swirling around Mel Gibson's upcoming movie "The Passion of Christ," formerly known as "The Passion," has movie fans so curious that they've been crashing Web sites in their search for bootleg trailers.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Matrix Revolutions To Be Released On Imax

9:33:47 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Large buttocks are pleasing to me, nor am I able to lie concerning this matter. Sir Mix-A-Lot's "(I Like) Big Butts)" "Baby's Got Back." In Latin.

magnae clunes mihi placent, nec possum de hac re mentiri.
(Large buttocks are pleasing to me, nor am I able to lie concerning this matter.)
quis enim, consortes mei, non fateatur,
(For who, colleagues, would not admit,)
cum puella incedit minore medio corpore
(Whenever a girl comes by with a rather small middle part of the body)
sub quo manifestus globus, inflammare animos
(Beneath which is an obvious spherical mass, that it inflames the spirits)

Link

(Thanks, chris242!)

----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: IBM dump_smutil.sh Insecure Temporary File Creation Vulnerability. IBM has reported that the dump_smutil.sh utility implemented on AIX 5.1 systems may be prone to symlink attacks due to insecure temporary file creation. The problem occur...
3.  Vulnerabilities: IBM VMM Performance Tools Insufficient Access Controls Privilege Elevation Vulnerability. IBM has reported that specific Virtual Memory Management (VMM) performance tools fail to carry out sufficient access controls. Specifically, the privileges of the user in...
4.  Vulnerabilities: IBM policyd and rsvpd Insecure Temporary File Creation Vulnerability. policyd and rsvpd are daemons implemented in IBM AIX servers.

A vulnerability has been discovered in IBM's implementation of policyd and rsvpd. It has been reported th...

5.  Vulnerabilities: IBM "cu" Unspecified Buffer Overflow Vulnerability. "cu" is a Unix communications program. It is usually installed with enhanced privileges so that it may access hardware communications hardware.

A vulnerability has been ...

6.  Vulnerabilities: HP OpenView Operations for Windows Unauthorized Action Execution Vulnerability. HP OpenView Operations for Windows (and associated products) provide network and system administration services for managing nodes across multiple network domains.

HP ha...


8:29:51 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  IE Vulnerabilities Page Removed
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: IBM AIX UUQ Buffer Overflow Vulnerability. IBM AIX /usr/bin/uuq is ordinarily designed to display the BNU job queue and also provides for the deletion of specified jobs from the queue.

uuq has been reported prone...

3.  Vulnerabilities: IBM AIX Bellmail Race Condition Vulnerability. bellmail is ordinarily used to transmit messages to system users and displays messages received from other users.

IBM AIX implementation of bellmail has been reported pr...

4.  Vulnerabilities: Multiple IBM AIX MUXATMD Buffer Overrun Vulnerabilities. The IBM AIX MUXATMD program is prone to multiple unspecified buffer overrun vulnerabilities. These issues could potentially be exploited to execute arbitrary code in the...
5.  Vulnerabilities: IBM AIX libdiag Trace File Symlink Vulnerability. IBM AIX libdiag is prone to symlink attacks when writing to trace files. Local attackers may potentially exploit this issue to cause critical system files to be corrupte...
----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
6.  Customize this feed. Add more items, descriptions, time stamps, select your version of RSS, aggregate several feeds... Check out NewsIsFree's premium syndication services! (42)

7:29:31 PM    

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  The cost of switching providers. Stanford Graduate School of Business examines how lower switching costs are making different industries more competitive.
2.  HP spotlights mobile gear. Hewlett-Packard is using a Swiss telecom show to unveil a slew of devices that can connect to one--and in many cases more than one--wireless network.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Free-Floating UNIX
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
4.  Vulnerabilities: XFree86 Multiple Unspecified Integer Overflow Vulnerabilities. Multiple integer overflow vulnerabilities have been discovered in XFree86 4.3.0. The problem specifically occurs due to insufficient sanity checks within font libraries. ...
5.  Vulnerabilities: Hummingbird CyberDOCS SQL Injection Vulnerability. Hummingbird CyberDOCS (DM) is document management software, designed to run on Microsoft Windows server platforms in conjunction with a SQL database.

Hummingbird CyberDO...


6:29:12 PM    

----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
1.  Linuxant releases DriverLoader, "a revolutionary compatibility-wrapper allowing standard Windows NDIS drivers shipped by hardware vendors to be used as-is on Linux x86 systems". Ugh.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Microsoft RPCSS DCERPC DCOM Object Activation Packet Length Heap Corruption Vulnerability. Microsoft Windows uses Remote Procedure Calls (RPC) for client-server communications in a distributed computing environment (DCE). A remotely exploitable heap corruptio...
3.  Vulnerabilities: Microsoft Windows Media Player Automatic File Download and Execution Vulnerability. Windows Media Player could allegedly allow files to be downloaded and executed without user intervention.

When a specifically crafted XMLNS (XML Name Space) URI is embed...

4.  Vulnerabilities: Microsoft Windows Media Player IE Zone Access Control Bypass Vulnerability. It has been reported by a reliable source that a method exists for evading the Zone based access control model used by Microsoft Internet Explorer. This technique report...

5:28:50 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  The Step-By-Step DIY Approach To The X-Prize
2.  MS Dissatisfaction High, Users Consider Switching
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Unix Shell Redirection Race Condition Vulnerability. bash, tcsh, cash, ksh and sh are all variations of the Unix shell distributed with many Unix and Unix clone operating systems. A vulnerability exists in these shells that...

4:28:30 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Oracle's Ellison Hopes Bio Isn't Boring (Reuters). Reuters - Between plotting to make Oracle Corp. the world's most important software company and fighting to win back sailing's coveted America's Cup, software titan Larry Ellison has been busy scribbling footnotes to the most detailed account yet of his out-sized life.
2.  HP Aims to Double Telecoms Sales (Reuters). Reuters - Hewlett-Packard (HPQ.N) on Sunday launched a dozen new products and services aimed at the communications industry, saying it aims to double telecoms sales to $12 billion a year within three years.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Successful Do-Not-Call Complaints?

3:28:11 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  My collection reviewed in NYTimes. My short story collection, A Place So Foreign and Eight More, is reviewed in today's NYTimes Sunday Magazine!

[It's] a bracing collection of short stories by a Canadian writer whose influences range from Bruce Sterling and Rudy Rucker to Donald Barthelme and Roald Dahl.

As knowledgeable about computers as he is about flea markets, Doctorow uses science fiction as a kind of cultural WD-40, loosening hinges and dissolving adhesions to peer into some of society's unlighted corners. His best known story, ''Craphound,'' tells of a competitive friendship between two junk collectors, one human and one alien; what it says about the uses of the past is no more mysterious than the prices paid for a vintage Coke bottle or an early Barbie doll. Not every attempt to wrest truth from cliche works -- but you won't want to miss Doctorow's satiric glance at co-opted dissent among the grade-school set or the insidious horror of his updated Pinocchio tale.

Link

2.  Homeland Security deports fiancee of Homeland Security staffer. Dan Hughes sez,

This just hit the wire about my brother, who works *for* Homeland Security, and his fiancée who was incarcerated on Yom Kippur last week *by* Homeland Security. The story broke on the front page this morning.

Beate (Bay - ah - tah), Trevor's fiancée, was returning to the US from Germany. She had interviewed with career diplomats at the American Embassy just weeks before and was granted a 6-month visa. Nevertheless, when she landed in Atlanta she was interrogated for six hours, led away in handcuffs with criminals, booked into the Atlanta prison system (finger prints, mug shots and a group cell) and the next day was placed in solitary confinement in a white room with nothing save a toilet. She was left without food for 20+ hours and finally deported to Germany. The whole time being told that she was not a criminal, nor suspected of any crime!

Link

(Thanks, Dan!)

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Video Editing Made Simpler, Not Easy (washingtonpost.com). washingtonpost.com - Working with home movies on your computer, once a task of staggering expense and complexity, is reaching the point of actual usefulness -- just in time to save our degrading collections of fragile videotape. The combination of increasingly fast computer processors, increasingly roomy hard drives and increasingly cheap DVD- and CD-recorder drives makes it feasible to edit a tape library down to more watchable versions and then save the result on more permanent DVDs or video CDs (a lower-quality, cheaper way to store video).
4.  Recycling Word Power - from Aristotle to Zapata (Reuters). Reuters - At a loss for words? "Don't have a cow!" Quote somebody. From Bart Simpson to Bartlett's, famous quips and familiar quotations speak volumes on the Internet.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  The Step-By-Step DIY Approach To The X PRIZE
----------------------------------------------------------------------
Internet/Network Security
----------------------------------------------------------------------
6.  Book Review: Mike Meyers' Certification Passport- Security+. The Mike Meyers' series of certification preparation books are some of the best on the market. This one, by Trevor Kay, will help refresh your memory and draw your focus to key areas that you may need to reinforce to...

2:27:51 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  SCO Claims IBM/SGI Licenses are Revokable
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: CDE DTPrintInfo Display Environment Variable Buffer Overflow Vulnerability. dtprintinfo is a component of the Common Desktop Environment (CDE). CDE is distributed with several UNIX platforms.

It has been reported that dtprintinfo, installed set...

3.  Vulnerabilities: PHP-Nuke admin.php SQL Injection Vulnerability. PHP-Nuke is a popular web based Portal system. It allows users to create accounts and contribute content to the site.

A vulnerability has been reported to exist in PHP-N...


1:27:31 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Wired illo: Wachowski Brothers, Anim(e)atrix style. In keeping with the live-from-Barcelona Matrix thread (, a commissioned portrait, Anim(e)atrix style, of the photographically elusive Wachowski Brothers -- by Canadian illustrator Kenn Brown. He explains: "Try googling them.. you wont find much - we were lucky to get a very small pic taken at the Wired offices to base this illustration on. The cityscape behind them is based on thier hometown of Chicago and was inspired by the Japanese anime classic Metropolis - (Metropolis was brought to the screen by anime legends Katsuhiro Otomo (of "Akira" fame) and Rintaro who once worked with Tezuka on the anime TV series Astro Boy)... you if you look closely you might recognize a few of the buildings. The windows echo the cascading effect of the famous matrix code." Click here for the full image, and feast your eyes on the gloriously ultra-hi-res version in the current print version of Wired on sale now.

I'm still at Artfutura, btw -- watching a bunch of game developers demo some amazing projects that involve use of wireless technology to blend real and online gamescapes; meshing feedback from both virtual and physical worlds. You can hear helicopters outside, right now, flying over contrasting protests. October 12, is Dia de la Hispanidad, a national holiday celebrating Christopher Columbus. Besides the official celebrations, a bunch of anticolonialist/anti-imperialist protesters are holding manifestaciones on one side of town, and some pro-fascist/anti-immigrant eurosupremacist guys are waving flags on the other side of town.

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  More on Virginia Tech G5 Cluster: 17.6 Tflops
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: OpenOffice Remote Access Denial Of Service Vulnerability. OpenOffice is an open source office software package distributed and maintained by the OpenOffice project. It is available for Unix, Linux, and Microsoft Windows operatin...
4.  Vulnerabilities: DeskPro Remote SQL Injection Vulnerability. DeskPro is a commercially-available contact management software package. It is available for the Unix, Linux, and Microsoft Platforms.

A problem has been reported in th...


12:27:20 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Quarterly earnings could be something to savour (FT.com). FT.com - The third quarter earnings season for US companies gets under way in earnest this week with more than 100 S&P companies reporting, including market heavyweights Intel, Motorola, IBM, General Motors, Ford and General Dynamics.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  "Star Wars: Clone Wars" coming to Cartoon Network

11:27:02 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Anime credit-cards.

If you're lucky enough to live in Japan, you can get yourself an anime-themed credit-card.

Link

(via Geisha Asobi)


2.  Shag does the Tiki Room.

Shag (a one-man tiki-revival!) has produced a series of limited-edition merchandise to coincide with the 40th anniversary of Disneyland's Enchanted Tiki Room.

Link


3.  Gummy mummy.

My friend Jef has discovered and captured evidence of the pinnacle of the gummysmith's art: the Gummy Mummy.

Link

(Thanks, Jef!)


----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
4.  Irish Nuns Go Online to Share Values (AP). AP - A monastery of Roman Catholic nuns living in seclusion on the west coast of Ireland under vows of chastity, poverty and obedience has chosen the Internet as a means of sharing its way of life with the wider world.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  10 Panel LCD Displays

10:26:41 AM    


9:26:31 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Earnings in Wall Street Spotlight (Reuters). Reuters - Investors will be poring over the rush of earnings reports from titans like chip supplier Intel Corp. (INTC.O) and computer maker IBM Corp. (IBM.N) this week for evidence that Wall Street's surge is justified.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Website Coalition Forms to Boycott RIAA Lawsuits

8:26:11 AM    


7:26:00 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  UK Gov't Considers Expanding Open Source Use
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: MySQL Password Handler Buffer Overflow Vulnerability. MySQL is an open source relational database project. It is available for the Microsoft Windows, Linux, and Unix operating systems.

MySQL server has been reported prone t...


6:25:41 AM    


5:25:22 AM    

----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
1.  Student sued over CD piracy. A US student is being sued for showing how to get around anti-piracy technology on a new music CD.
2.  Apple powers college supercomputer. A US college has been able to build a supercomputer by hooking up hundreds of Apple G5 computers.

4:25:02 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Why were computers beige colored?. Why were most personal computers colored beige? I seem to remember reading that some researchers (at 3M?) used focus groups to determine that beige was the most non-obtrusive color to use in an office setting, but I can't find a reference. If you know, email me at mark@well.com.

3:24:41 AM    


2:24:22 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  New Shag fonts from House Industries. The world's best font shop, House Industries, has a new set of fonts designed by retro artist Shag. They're also selling a Shag sculpture and prints. Link
----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
2.  What Price Music?. As musical recordings have increasingly shed their physical form, the record industry and its customers have been at odds over what it all should cost. By Amy Harmon.
3.  To Whom May I Direct Your Free Call?. The makers of the file-sharing application Kazaa have created a way to allow people to make high-quality phone calls over the Internet without having to pay a penny. By Nicholas Thompson.
4.  In Search of Savings, Companies Turn to the Sun. Solar power has evolved from being an expensive, pie-in-the-sky technology to one that is finally beginning to make business sense. By Jim Rendon.
5.  Smile, You're on Candid Cellphone Camera. An army of phonecam amateurs is quietly redrawing the boundaries of privacy in public spaces unknown to most of their subjects. By Amy Harmon.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
6.  Kazaa Backs Plan To Bill P2P Music Transfers

1:24:03 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Video Editing Made Simpler, Not Easy (washingtonpost.com). washingtonpost.com - Working with home movies on your computer, once a task of staggering expense and complexity, is reaching the point of actual usefulness -- just in time to save our degrading collections of fragile videotape. The combination of increasingly fast computer processors, increasingly roomy hard drives and increasingly cheap DVD- and CD-recorder drives makes it feasible to edit a tape library down to more watchable versions and then save the result on more permanent DVDs or video CDs (a lower-quality, cheaper way to store video).
2.  Better, Late: New PowerBook Worth Waiting For (washingtonpost.com). washingtonpost.com - For a company whose share of the domestic laptop market only just cracked 7 percent, Apple has gotten a lot of coverage for its portable computers. But it deserves all this ink: The company has developed a talent for fusing metal and plastic into elegant, efficiently sculpted works of art that happen to store music and photos, get on the Internet and play DVDs.

12:23:51 AM