Saturday, November 01, 2003

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Credit Card Sized Concept PDA from Citizen
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Easy way to non-blocked sockets
3.  New switching rules may trash millions of cell phones
4.  Get Ready; Here Comes Windows Rights Management
5.  MiMail worm uses ZIP files to rampage across corporations
6.  Hacker 's3r14l k1ll3r' from Brazil's CyberLords busted in Japan
7.  Apple upgrades AirPort Extreme Wi-Fi security
8.  Security Firms Raise Threat Assessment Of Mimail.C
9.  Hackers: Businesses invite attacks
10.  Techfocus Under Attack

11:33:00 PM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Howard Dean's Internet Push: Where Will It Lead?. Howard Dean's use of the Internet to build a base of small donors and fund-raisers has recast the way many in Washington think about how money is raised. By Glen Justice.
2.  Online Agencies as Ombudsmen. Where to go for help when a flight is canceled, a reservation lost. By Bob Tedeschi.
3.  Please Touch the Art. Museums have recently developed devices that allow viewers to virtually browse the pages of rare books and manuscripts. By Carol Kino.
4.  How Quick a Get-Rich Scheme? It's Only a Mouse Click Away. An e-mail trail suggests that digital con artists are skilled not only in reeling in their marks, but in knowing when to cut them loose. By Sam Roberts.
5.  A DVD Offers a Chance to Think Inside Cornell's Boxes. A DVD-ROM created by Cognitive Applications gives readers a three-dimensional tour inside more than 250 Joseph Cornell boxes and collages. By Valerie Gladstone.
6.  Boomers Buoy the Struggling Record Industry. The growing success of albums by artists who appeal to baby boomer tastes offers some solace to an industry mired in a three-year sales slump. By Chris Nelson.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
7.  Sun Donation Spurs Linux Cluster at Purdue
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
8.  Immunix: fileutils Memory exhaustion vulnerability
9.  SuSE: thttpd Remote privilege escalation vulnerability

10:32:39 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Talent Contests Making Inroads on Web (Reuters). Reuters - With the popularity of "American Idol" and other star-making shows, it was only a matter of time before such interactive programs made the leap to the Internet.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Apache 2.0.48 Released
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  WORM_MIMAIL.E

9:32:20 PM    


8:32:00 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  The problem with abundance. BoingBoing pal Clayton says:
Here's an interesting piece on the unforeseen problems that can arise in modern society when previously scarce resources become commonplace... from obesity to P2P. And it kind of puts the Amish desire to "freeze" progress in a new light, as if it were the desire to blunt massive societal upheaval from new tech developments.
Link
2.  SIGGRAPH call for art entries, synaesthesia is 2004 theme. A call for entries in the 2004 edition of SIGGRAPH's annual Art Gallery was issued this week.
Synaesthesia will showcase original digital art that explores new connections between the senses - the technological, the aesthetic, and the critical - and emerges from the conjunction of cybernetics and human vision, inner as well as outer.
Link
3.  Illegal Art: "Sonny Bono is Dead". Sonny Bono is in fact dead, and that is also the title of the latest compilation project from Illegal Art.

This project is a protest against the Sonny Bono Copyright Term Extension Act, which passed through Congress in 1998 and was upheld by the U.S. Supreme Court earlier this year. This act diminished the public's ability to access older works while granting more control to corporations anxious to preserve a few copyrights from the 1920's. Copyright law continues to expand and defeat its original purpose of promoting advances in the arts and sciences. These excesses damage the evolution of our culture and only serve corporate interests.

We encourage artists to liberally sample from works that would have fallen into the Public Domain by the year 2004 had the Sonny Bono Act failed. Artists are also encouraged to create new works by sampling Sonny Bono's output (or other artists who embraced the notion of copyright lasting forever). The deadline for submissions is January 31, 2004.

Link
4.  Cool way to organize travel images for online presentation.

Nice UI: cartoonist/illustrator/blogger Kean organized online photos and sketches from a recent trip to NYC along the subway map. Link (Thanks, Invisible Cowgirl)

5.  Faux stereoscopic photos: "space wiggle" Burning Man images.

While it's true that a fair amount of actual wiggling takes place at Burning Man, the "space wiggle" images at this site are just a nifty optical illusion:

"This method of presenting stereo images uses animated .gifs to rapidly switch between left and right images. For most of us the brain will impose a crude sense of dimensionality on a wildly wiggling scene."

Link to smaller image size (for dialup folks), Link to larger images (for broadband gluttons). NSFW warning: includes naked (and wiggling) body parts. (Thanks, JP!)

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
6.  The Internet content conundrum . There's more Web content than ever, but Knowledge@Wharton examines whether profits will become part of that picture.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
7.  Scamming Spammer Hooks the Wrong Person
----------------------------------------------------------------------
[O.S.S.R]
----------------------------------------------------------------------
8.  Web-site porn attracts women by the millions
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
9.  Vulnerabilities: E107 Chatbox.php Denial of Service Vulnerability. E107 is a content management system written in PHP and MySQL.

E107 has been reported to be prone to a denial of service vulnerability. The issue has been reported to pre...

10.  Vulnerabilities: Privatefirewall FIN/XMas Scan Traffic Handling Vulnerability. Privatefirewall is a security software package distributed and maintained by Privacyware. It is available for the Microsoft Windows platform.

A problem with Privatefire...


7:31:49 PM    

----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
1.  Vulnerabilities: Ipswitch WS_FTP Server FTP Command Buffer Overrun Vulnerabilities. Ipswitch WS_FTP Server is an FTP implementation that is available for Microsoft Windows operating systems.

Ipswitch WS_FTP Server is reported to be prone to buffer overr...


6:31:30 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Alien vs. Predator Movie Trailer Available
2.  MIT's Music Net Shut Down Over License Issues
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: SANE Internal Wire Memory Disclosure Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

SANE is prone to a v...

4.  Vulnerabilities: SANE SANE_NET_INIT Unauthorized Access Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

A vulnerability has ...

5.  Vulnerabilities: SANE Daemon Connected User Memory Consumption Denial Of Service Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

A problem has been d...

6.  Vulnerabilities: SANE Remote Dubug Enabled Connection Dropping Denial of Service Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

It has been reported...

7.  Vulnerabilities: SANE Strings Memory Allocation Denial Of Service Vulnerability. SANE is a freely available, open source scanner compatibility package. It is available for a number of platforms, including Linux and Unix variants.

SANE is prone to a m...

8.  Vulnerabilities: MySQL Password Handler Buffer Overflow Vulnerability. MySQL is an open source relational database project. It is available for the Microsoft Windows, Linux, and Unix operating systems.

MySQL server has been reported prone t...


5:31:10 PM    

----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
1.  AP: Cell Phone Rules May Trash Some Models. "Those who [switch carriers] will need to buy new phones. That's because even carriers that use the same network technologies employ different encryption." This is not the case with GSM, because (ahem) it was designed to foster interoperability from the beginning. Now, what will you give me for a Motorola Timeport P280? Do I hear $2?
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Nokia IPSO Unspecified Denial of Service Vulnerability. IP Security Operating System (IPSO) is the security hardware-based OS maintained and developed by Nokia.

An unspecified denial of service vulnerability has been discover...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files

4:30:51 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Memory Hole Un-Redacts Redacted DOJ Memo
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Multiple Vendor HTTP Server IPv6 Socket IPv4 Mapped Address Handling Vulnerability. IPv6 is a protocol designed to replace IPv4. IPv6 allows for the encapsulation of IPv4 addresses, in order to facilitate transition between the two standards, and allow t...
3.  Vulnerabilities: Libnids TCP Packet Reassembly Memory Corruption Vulnerability. Libnids is library designed to allow programs to easily implement the use of various network data analysis such as IP defragmentation and TCP stream reassembly. Libnids i...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  OpenBSD 3.4 est sortie
5.  VMware GSX Server Buffer Overflow in VMware Authorization Service Input Lets Remote Users Execute Arbitrary Code
6.  Citrix MetaFrame Input Validation Flaw in 'NFuse_Message' Variable Permits Cross-Site Scripting Attacks
7.  Mac OS X Systemic Insecure File Permissions Vulnerability
8.  Mac OS X S Long argv[] Buffer Overflow Vulnerability
9.  InfronTech WebTide 7.04 Directory and File Disclosure Vulnerabilities
10.  VMWare GSX Server Authentication Server Buffer Overflow Vulnerability
11.  TelCondex SimpleWebserver Buffer Overflow Vulnerability
12.  Led-Forums Multiple Vulnerabilities
13.  Serious Sam Remote Server Crash Vulnerability
14.  BEA WebLogic example InteractiveQuery.jsp Cross Site Scripting Vulnerability
15.  BEA Tuxedo Administration CGI Multiple Argument Vulnerabilities
16.  Citrix Metaframe XP Cross Site Scripting Vulnerability

3:30:30 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Lemming Population Flux Solved: Mass Suicide Not to Blame
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  BugTraq: Re: WU-FTPD 2.6.2 Freezer. Sender: Rossen Petrov [rpetrov at gmx dot net]
3.  BugTraq: Internet Explorer Vulnerability: Content-Location works with both triple and double slash. Sender: Mindwarper * [mindwarper at linuxmail dot org]

2:30:12 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Slashdot troll speaks. Tom Coates has been discussing technical tricks for coping with message-board trolls on his Everything in Moderation blog, and, surpisingly, an avowed Slashdot troll has shown up to explain why he undertakes extreme technical measures to disrupt Slashdot's message baords.

..i believe that the people who must be treated with the most public, forthright, and open methods of censure are those who offend us the most. i do not believe that trickery is ever as effective as open methods because trickery is, at its core, dishonest to both the person being tricked and the online community you have secretly enacted policy for.

i believe that secret punishments inevitably lead to abuse and combativeness, that they lead to an arms race against people of equal intelligence and unlimited free time.

Link

(via Oblomovka)

2.  Post-circuit-switched voicemail. Nice rant on how "circuit-switched" thinking is holding back advancement in telephony:

Assume a phone call requires an (extremely generous) 3Kb per second of audio. One hour of stored audio is about 10Mb of data. This is a pretty modest amount by the standards of modern flash memeory. Your mobile phone is perfectly capable of storing all your voicemail. The network is perfectly capable of transmitting the data in a sensible amount of time. Unlike email, most voicemail is listened to -- the amount of wasted download is small...

You should be able to listen to voicemails on your plane journey home. You should be able to reply to them on a store-and-forward basis, even when you're not connected to the network. And most of all, you shouldn't have to use a clunky telephony user interface to navigate a message queue. And you shouldn't be restricted to one device for accessing your own data.

Link

(via Werblog)

3.  Spidering Hacks. The latest book in the O'Reilly Hacks series, "Spidering Hacks," (written by Kevin "Morbus Iff" Hemenway and Tara "ResearchBuzz" Calishain) is out. It's the site-scraper's bible, with 100 tips and tricks for sucking in data from the Web.

Spidering Hacks takes you to the next level in Internet data retrieval--beyond search engines--by showing you how to create spiders and bots to retrieve information from your favorite sites and data sources. You'll no longer feel constrained by the way host sites think you want to see their data presented--you'll learn how to scrape and repurpose raw data so you can view in a way that's meaningful to you.

Written for developers, researchers, technical assistants, librarians, and power users, Spidering Hacks provides expert tips on spidering and scraping methodologies. You'll begin with a crash course in spidering concepts, tools (Perl, LWP, out-of-the-box utilities), and ethics (how to know when you've gone too far: what's acceptable and unacceptable). Next, you'll collect media files and data from databases. Then you'll learn how to interpret and understand the data, repurpose it for use in other applications, and even build authorized interfaces to integrate the data into your own content.

LInk

(via Ben Hammersley)

4.  Bluejacking: anonymous Bluetooth messaging. Bluejacking is the art of sending a message to a nearby stranger's Bluetooth phone, having first encoded the message as the "Name" field of an address-book entry, i.e., "Name: I have bluejacked you, I 0wn l0l0l0l0l." BluejackQ is a new community site for posting bluejacking experiences.

Ellie and I were just outside a shopping centre in town and she was searching for a victim near where we were sitting. She came up with a contact; some Nokia, I'm not sure which one. We found out a few minutes later that our victim (who showed an un-canny resemblance to Alan Ford) was sitting in Starbucks with his wife.

After they'd left Starbucks, we followed the couple all over town for about 30mins. He couldn't understand what was happening to him and was looking around all over the place for his bluejacker! We went up and down, around in circles, dodging his stare; quite literally, up in lifts, down on escalators!

Link

(via Smartmobs)

5.  NYC event tonight: The Art of Gwar. Gwar, the blood-spewingest band in the history of punk/metal/comic book chic, is an ensemble of musicians, artists and performers with stage names like Oderus Orungus, Jizmak Da Gusha and Flattus Maximus. Tonight in NYC, Fuse Gallery launches an exhibit of THE "ART" OF GWAR, and a launch party takes place at Lit Lounge with a live performance by members of the band. Show runs through mid-December.
Kiss, Alice Cooper, Marilyn Manson. When it comes to onstage theatricality and over the top rock and roll antics, these are the names that come to mind. However, to a loyal army of fanatical fans, known affectionately as "Slaves", none hold a candle to Gwar, the undisputed kings of the theatrical concert-performance. The Richmond, Virginia based band is infamous for their heavy but humorous music, pornographic alien-barbarian costumes and outrageous stage props which include huge squirting phalluses, rubber fetuses and gallons of stage blood.
Link
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
6.  British Library to Archive Electronic Resources
7.  AMD Optimal BIOS settings + Overclocking Guide
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
8.  BugTraq: Re: New Varient Of Irc Worm Spreading. Sender: bob [hackerbob at cox dot net]
9.  BugTraq: BRS WebWeaver 1.06 remote DoS vulnerability. Sender: d4rkgr3y [d4rk at securitylab dot ru]
10.  BugTraq: Memory-leak vulnerability in EServ/3.00. Sender: d4rkgr3y [d4rk at securitylab dot ru]
11.  BugTraq: Re: WU-FTPD 2.6.2 Freezer. Sender: Luca Berra [bluca at comedia dot it]
12.  Vulnerabilities: TelCondex SimpleWebserver HTTP Referer Remote Buffer Overflow Vulnerability. TelCondex SimpleWebServer is a Web server designed for use with the Microsoft Windows operating systems.

A vulnerability has been reported to exist in the software that ...

13.  Vulnerabilities: Apple Mac OS X Multiple Vulnerabilities. Apple Mac OS X 10.3 (Panther) has been released to address multiple new and previously known vulnerabilities. These issues may cumulatively allow an attacker to cause den...

1:29:50 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Hercules USB DJ Console Reviewed
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  BugTraq: Immunix Secured OS 7+ fileutils update. Sender: Immunix Security Team [security at immunix dot com]
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
3.  China Locks Up Net Dissident. Chinese security agents have detained civil servant Du Daobin, whose essays are banned by Beijing on the Internet, for 'subverting state power.' It's all part of China's intensified crackdown on online dissent.
4.  Web Search for Everyone Else. Finding a website by typing keywords into the browser's address bar flopped in the United States, but it's proving popular in non-English-speaking countries and could one day spell trouble for traditional search engines.
5.  New Virus Dresses Up as E-Mail. Another seemingly innocuous e-mail is a virus in disguise. The virus threatens to turn any recipient's PC into a spam server ... or a frog. Bwahh haa haa haahhh!
6.  Miramax Chief: Gimme the Tapes. Miramax Films urges major Hollywood studios to relax a controversial new rule that restricts the practice of sending out tapes and DVDs of Oscar-nominated films to Academy Award voters.
7.  Time-Travel Spammer Strikes Back. Former fans of Robby Todino's bizarre mass e-mails say they're the victims of a malicious 'Joe-job' attack. Does the time-travel spammer have a mean streak? By Brian McWilliams.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  Good Thing It Wasn't a Toy Horse!

12:29:30 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Symantec Hit by Product Activation Glitch
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Oracle Files Restricted Content Access Vulnerability. Oracle Files is a file/content security mechanism provided with Oracle Collaboration Suite 1 for use with Oracle Database and Application Servers.

A vulnerability has be...


11:29:11 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  SAP Aiming at Double-Digit Growth in U.S. (Reuters). Reuters - Europe's biggest software group SAP (SAPG.DE)(SAP.N) is aiming at double-digit growth in the United States and intended to increase it market share of the key U.S. software market, SAP chief executive Henning Kagermann said on Saturday.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Motorola Launches A760 Linux and Java Smartphone
----------------------------------------------------------------------
Stupid Security
----------------------------------------------------------------------
3.  Good Thing It Wasn't a Toy Horse!
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
4.  U.K. Plans to Extradite Spammers. Calling the flood of junk e-mail a criminal threat rather than a mere irritant, British lawmakers hatch a plan to bring overseas bulk e-mailers to trial.
5.  Second Solar Storm Blasts Earth. The sun takes another shot at the blue planet, sending a second coronal mass ejection our way in as many days. The latest flare moved faster but was less intense than the first blast.
6.  New Stem Cell Lines Developed. A Harvard biology professor has created 17 new stem cell lines to share with other scientists. He hopes to encourage stem cell research in the face of U.S. legislation that restricted work on stem cells to a small number of cell lines.
7.  RIAA Sues 80 More Swappers. Another round of lawsuits, with warnings beforehand this time, is filed by the music industry against people it says have been sharing songs illegally on the Internet. By Katie Dean.
8.  DNA, Now in XXX-Large. Researchers wanted to be able to more easily see DNA in testing, so the folks at Stanford made it glow. By Kristen Philipkoski.
9.  Cloned Food OK by FDA. The FDA green-lights meat from cloned animals for human consumption. An official decision on whether companies can sell it is due in January.
10.  BBC Offers Power to the People. The Beeb launches iCan, a site for citizens to get government to fill in potholes and build sidewalks. Some call it real e-democracy. Others say it will not address real issues, like war and peace. By Kari L. Dean.
11.  The New Road to the White House. The blog may be the first innovation from the Internet to make a real difference in election politics. But to see just why requires a bit of careful attention. By Lawrence Lessig from Wired magazine.
12.  No More Ringing in Your Ears. If it's popular in Korea, you know it will wind up here. Your calls to a cell phone may never be the same, thanks to ring-back tones, which play music instead of bells when you connect. By Elizabeth Biddlecombe.
13.  Banking Lobby Feels the Heat. California's devastating wildfires give privacy advocates a reprieve by delaying debate over a bill that would almost certainly have derailed California's pending financial privacy bill. By Ryan Singel.
14.  Bye-Bye Data: Glitch in Panther. Apple's Panther has a serious bug that wipes out external FireWire drives during the upgrade procedure. Worse, many Mac users are backing up to external drives before upgrading. Some are losing everything. By Leander Kahney.
----------------------------------------------------------------------
Internet/Network Security
----------------------------------------------------------------------
15.  Book Review: Mac OS X Maximum Security. Mac users don't traditionally have much to worry about regarding vulnerabilities or security in general. However, Mac OS X is based on a Unix / BSD core which adds power and flexibility- but also introduces some security concerns. This book...

10:28:51 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  Backdoor.Ranky.C
2.  Hacker 's3r14l k1ll3r' from Brazil's CyberLords busted in Japan

9:28:34 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Livewire: the Spyware That Came in for the Code (Reuters). Reuters - A batch of files appeared on the popular Kazaa file-sharing network last June purporting to be "cracked" versions of the popular video games "Battlefield 1942" and "FIFA Football 2003."
2.  PluggedIn: Digital Music Migrates to the Home Stereo (Reuters). Reuters - "Music wants to be free!" may be the rallying cry of the digital-music revolution, but all those MP3s can easily end up in a cage of a different sort -- the trusty home computer.
----------------------------------------------------------------------
SecurityNewsPortal.com
----------------------------------------------------------------------
3.  Security Firms Raise Threat Assessment Of New Mimail.C Worm Time to update your anti-virus software
4.  Hacker from Brazil's CyberLords busted while living and hacking in Japan
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
5.  Ireland domain registry CEO resigns. Sorry chapter comes to a close, but will things change?

8:28:10 AM    


7:27:50 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  OpenBSD 3.4 Released
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
2.  China Locks Up Net Dissident. Chinese security agents have detained civil servant Du Daobin, whose essays are banned by Beijing on the Internet, for 'subverting state power.' It's all part of China's intensified crackdown on online dissent.
3.  Web Search for Everyone Else. Finding a website by typing keywords into the browser's address bar flopped in the United States, but it's proving popular in non-English-speaking countries and could one day spell trouble for traditional search engines.
4.  New Virus Dresses Up as E-Mail. Another seemingly innocuous e-mail is a virus in disguise. The virus threatens to turn any recipient's PC into a spam server ... or a frog. Bwahh haa haa haahhh!
5.  Miramax Chief: Gimme the Tapes. Miramax Films urges major Hollywood studios to relax a controversial new rule that restricts the practice of sending out tapes and DVDs of Oscar-nominated films to Academy Award voters.
6.  Time-Travel Spammer Strikes Back. Former fans of Robby Todino's bizarre mass e-mails say they're the victims of a malicious 'Joe-job' attack. Does the time-travel spammer have a mean streak? By Brian McWilliams.

6:27:30 AM    


5:27:10 AM    

----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
1.  MCI cleared to exit bankruptcy. US telecoms firm MCI, formerly known as WorldCom, wins the all-clear to emerge from bankruptcy protection.
2.  Microsoft 'explored Google tie-up'. Software giant Microsoft held abortive talks with internet search engine Google over a partnership or merger, a press report claims.
3.  Physical perils of gaming. Playing video games can lead to all sorts of odd injuries, says Daniel Etherington of BBCi Collective.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  NEC Steps Up PC Protection
5.  Panda Updates Antivirus Programs
6.  New Worm Steals User Data

4:26:50 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Linux Based Tablets Are Coming

3:26:31 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  TROJ_ZEROD.A
2.  Knowledge Center: Four ways to secure your company on a shoestring budget
3.  Apple will fix security flaws in Jaguar
4.  Microsoft to release threat-modeling tool
5.  E-mail virus turns PCs into spam machines

2:26:11 AM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Investment in Technology Is Roaring Softly Back. The recent rise in technology spending is an encouraging sign that the economic recovery may finally be gaining force. By Steve Lohr.
2.  High-Tech Daydreamers Investing in Immortality. The roughly 500 people at Pop!Tech, an annual technology conference, examined the possibility of triumphing over death. By James Gorman.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Apple will fix security flaws in Jaguar
4.  Microsoft to release threat-modeling tool
5.  Innovation, change key to maritime supply chain security
6.  E-mail virus turns PCs into spam machines
7.  Symantec product activation causing headaches
8.  'Smart' cargo containers coming to a port near you

1:25:52 AM    

----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
1.  Judge OKs MCI reorganization plan. MCI should emerge from Chapter 11 bankruptcy protection early next year, company executives said Friday after a federal judge approved the carrier's reorganization plan.
2.  New worm steals user information. A new Internet worm that steals information from users' computers and attempts to shut down two Web sites is spreading, antivirus vendors warned Friday.
3.  Yahoo dissolves enterprise products group. SAN FRANCISCO - Yahoo is closing its Enterprise Solutions unit, discontinuing all products in the group aimed at business users except its enterprise instant messaging product, the company said Friday.

ADVERTISEMENT:

Need a MS Exchange Spam Filter?? - Spam sucks. Your life shouldn't. iHateSpam SE was uniquely developed to be both user- and admin-friendly. Control spam according to the needs of your company and users. V5.5, 2000, Exchange 2003, and Gateway.

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  Serious Sam is not so serious
5.  Re: Mac OS X vulnerabilities
6.  Re: Internet Explorer and Opera local zone restriction bypass
7.  Re: Mac OS X vulnerabilities
8.  RE: Internet Explorer and Opera local zone restriction bypass
9.  WU-FTPD 2.6.2 Freezer
10.  Mimail.C
11.  GLSA:apache (200310-04)
12.  Advisory: Sun's jre/jdk 1.4.2 multiple vulernabilities in linux installers
13.  IRM 008: Citrix Metaframe XP is vulnerable to Cross Site Scripting
14.  RE: Internet Explorer and Opera local zone restriction bypass
15.  VMWare GSX Server Authentication Server Buffer Overflow Vulnerability - Update
16.  Corsaire Security Advisory: BEA WebLogic example InteractiveQuery.jsp XSS issue
17.  Corsaire Security Advisory: BEA Tuxedo Administration CGI multiple argument issues
18.  SUSE Security Announcement: thttpd (SuSE-SA:2003:044)
19.  Redirection and refresh parses local file
20.  VMware GSX Server and ESX Server OpenSSL vulnerability patches
21.  DoS in Plug and Play Web Server Proxy Server
22.  Re: Mac OS X vulnerabilities
23.  Console Root On OSX up to 10.2.8
24.  Macos 10.2.8
25.  Re: WU-FTPD 2.6.2 Freezer
26.  Virginity Security Advisory 2003-002 : Tritanium Bulletin Board - Read and write from/to internal (protected) Threads
27.  Re: Mimail.C (Denial of Service Attack)
28.  New Varient Of Irc Worm Spreading

12:25:32 AM