Sunday, November 09, 2003

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Wal-Mart Plan Could Cost Suppliers Millions. Wal-Mart's plan to have every carton and palette it receives carry a radio ID tag may cost suppliers millions, a report says. By Barnaby J. Feder.
2.  Oldest Living Start-Up Tells All. RFco is one of several start-ups trying to ride a revolution by making low-power chips that can handle all kinds of radio frequencies for data and voice transmission. By Steve Lohr.
3.  Online Ticket Sales Bolster Crowds. Sports teams have discovered that they can put more spectators in the seats through online ticket sales. By Bob Tedeschi.
4.  Fortified by Linux, Novell Hopes to Regain Strength. Novell was left for dead years ago, another casualty of Microsoft's hegemony over computer operating systems. Now, it may be coming back. By Laurie J. Flynn.
5.  Europe Exceeds U.S. in Refining Grid Computing. Experts say that Europe is moving faster than the United States to capitalize on grid computing. By John Markoff and Jennifer L. Schenker.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
6.  E-Mail, Net Abuse Increases in UK Workplace--Study (Reuters). Reuters - Misuse of e-mails and the Internet in the workplace has become a big headache for British employers, and UK companies are increasingly disciplining staff for accessing racy Web sites or sending porn to colleagues.
----------------------------------------------------------------------
Internet/Network Security
----------------------------------------------------------------------
7.  Backdoor Planted in Linux Kernel. A development version of an upcoming release of the Linux kernel code was found to contain a small, but very sophisticated backdoor. During routine integrity checks of the code a discrepancy was found. The error was small and under casual...

11:14:28 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Chinese court turns down appeals of four Internet dissidents (AFP). AFP - A court here has turned down the appeals of four Internet dissidents who were sentenced to up to 10 years in jail for posting their views on social issues online, relatives said.
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
2.  Warning over credit card fraudsters. Fraudsters steal about £800 a minute using credit cards over the internet, phone or by fax, consumers are warned.

10:14:08 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Nokia Taking Over Psion to Control Symbian?

9:13:47 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  IBM and Its Thoughts on Desktop Linux

8:13:38 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Microsoft Makes Push for COBOL Migration
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability. Sendmail is prone to a buffer overrun vulnerability in the prescan() function. This issue is different than the vulnerability described in BID 7230. The issue exists in...
3.  Vulnerabilities: Ganglia gmond Malformed Packet Remote Denial of Service Vulnerability. Ganglia Monitoring Daemon (gmond) is cluster monitoring software available for a wide variety of Unix-based operating systems, as well as Linux.

When a user transmits a...


7:13:18 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Why Blacklisting Spammers Is A Bad Idea
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Multiple HP Tru64 C Library Vulnerabilities. HP has recently issued fixes for numerous security vulnerabilities in the implementation of the C library for Tru64. These vulnerabilities may affect many programs with ...

6:12:58 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  US online wine sales stymied by "byzantine" state laws (AFP). AFP - US consumers can buy almost anything on the Internet. But online wine sales are subject to a confusing patchwork of state laws, a system drawing more attention from winemakers, lawmakers and others.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  BitPass: Micropayment That Seems To Work
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
3.  Debian: postgresql Remote buffer overflow vulnerability
4.  SCO: ucd-snmp Remote heap overflow

5:12:37 PM    

----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
1.  Vulnerabilities: Acme thttpd/mini_httpd Virtual Hosting File Disclosure Vulnerability. thttpd and mini_httpd are HTTP server implementations that are maintained by Acme. They are intended to run on Unix/Linux variants.

A file disclosure vulnerability has ...

2.  Vulnerabilities: ACME Labs thttpd Cross-Site Scripting Vulnerability. thttpd is a web server product maintained by ACME Labs. thttpd has been compiled for Linux, BSD and Solaris, as well as other Unix like operating systems.

It is possible...

3.  Vulnerabilities: Acme THTTPD/Mini_HTTPD File Disclosure Vulnerability. Acme THTTPD and Mini_HTTPD are both small web servers and will run on Freebsd, SunOs, Solaris, Linux, and other Unix operating systems. They are freely available and main...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  Net-SNMP May Let Remote Authenticated Users Access Excluded Objects
5.  IBM DB2 'db2start', 'db2stop', and 'db2govd' Flaws May Yield Root Privileges to Local Users

4:12:27 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Tetrapaks as pop art. The Viennese artists' group Monochrom has a web exhibit of Tetrapak milk cartons, treating Tetrapak design as a form of pop art:

The breakfast table and other battle sites of the packaging struggle between Burma and Belgium are the real exhibition sites of everyday consumer design, packaging nutrition and luxury foods, filling garbage sacks, but also focusing our aesthetic sensors. There is also a delivery of literature for the table, offering the possibility of studying a language in foreign contexts.

Since the collected examples not only come from shop counters and were saved from garbage death but have also been discovered in ditches and sinks during a situationist meandering through the world with trained eyes, there is also a link to securing evidence.

Link

(Thanks, Johannes!)

2.  Average Internet self-identity.

Inter.Face is the winner of last year's Machinista Russian art festival. It invites visitors to drag and-drop graphic facial-anatomy elements to avatars of themselves; once the project ran through, all the avatars were combined and smoothed to generate an "average net self-identity."

Link


3.  Back and to the Left. "Back and to the Left" is a "scratch-video" composition produced by a Canadian video artist. It makes very witty use of classic film footage and a catchy tune to create an audiovisual composition.

Link


3:12:07 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Online Competition Hurts Adult Magazines (AP). AP - After 35 years in the business of titillating and offending, pornographer Al Goldstein says his magazine can't compete anymore. The audience is just as large, he says, but the Internet has transformed the product and its delivery.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  New Graphics Company, With Working Cards
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Gartner: Time Is Now for VoIP
4.  Will Microsoft Wallop Friendster?
5.  Microsoft unveils new Media Player for the Mac
6.  Security's Brewing Mess

2:11:47 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  IBM Applies for Password Manager Patent
----------------------------------------------------------------------
Internet/Network Security
----------------------------------------------------------------------
2.  How to Use the Nessus Vulnerability Scanner. Last month I posted a brief review of the open-source vulnerability scanner Nessus (see Profile: Nessus Vulnerability Scanner). Harry Anderson has written a detailed introduction to the Nessus program from installing it to using it and describing some of the...

1:11:28 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Software developers calling shots (SiliconValley.com). SiliconValley.com - HYDERABAD, India - Much like Silicon Valley during the boom, software giant Oracle is constantly scouting India's top tech schools, offering free cars, housing allowances and flexible work schedules to the country's best and brightest engineers.
2.  BlackBerry Maker Looks to Regain Edge (AP). AP - Look around the headquarters of Research in Motion Ltd. and it's easy to understand its co-chief executives' optimism about their company and its pioneering invention, the BlackBerry wireless e-mail device.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  The Matrix Going Massively Multiplayer
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
4.  Linux Advisory Watch - November 7th 2003
5.  OpenVPN: An Introduction and Interview with Founder, James Yonan
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
6.  Vulnerabilities: HP-UX Software Distributor Local Buffer Overrun Vulnerabilities. HP has reported that some Software Distributor (SD) utilities are prone to locally exploitable buffer overrun vulnerabilities. Affected utilities include swinstall(1M) a...
7.  Vulnerabilities: Linux Kernel Trojan Horse Vulnerability. It has been announced that a file 'kernel/exit.c' was modified on the kernel.bkbits.net Linux Kernel CVS tree by a malicious party. The file 'kernel/exit.c' was modified ...

12:11:09 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  One-Man Star Wars Trilogy in Chicago
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: HP-UX NLSPATH Environment Variable Privilege Escalation Vulnerability. HP-UX allows the NLSPATH to be set for setuid root programs, which use catopen(3C) and may be executed by other local users. catopen(3C) is used to open message catalogu...

11:10:48 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Shrek 2 Trailer Released
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Sun Java Virtual Machine Slash Path Security Model Circumvention Vulnerability. The Java Virtual Machine (JVM) is a component of the Sun Java infrastructure that performs the handling of Java applets and other programs. It is available for Unix, Lin...

10:10:27 AM    

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  The quest for better wireless security. Wireless security expert Leo Pluswick asks whether the emphasis on time to market and new features will undermine the pursuit of better mobile security.
2.  Week ahead: Dell, others to post earnings. Dell will be among the tech titans reporting quarterly earnings in the coming week, with BEA Systems and Applied Materials also rolling out their results.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Microsoft Faces Showdown at the EU Corral (Reuters). Reuters - Microsoft (MSFT.O) faces a major showdown in Brussels this week when it gets a last chance to defend itself against European Union regulators' charges it abused its dominance of desktop computer operating systems.

9:10:08 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Michael Moore AV archive. The Unoffocial Michael Moore Media Archive is an enormous collection of unauthorized sound and video recordings of Moore's speeches, films, videos and so forth.

Link

(via On Lisa Rein's Radar)

2.  Daily Show on Nat Heatwole. Amazing Daily Show segment on Nat Heatwole, the "blade runner" who stashed weapons on dozens of Southwest Air jets to prove that Homeland Security's invasive searches do nothing to secure our skies.

5.03MB Quicktime Link

(via On Lisa Rein's Radar)

3.  Dog Harry Potter Hallowe'en costume.

There's a Dog Hallowe'en Parade in NYC -- who knew?

Link

(via Exciting Monkeybum Stories for Boys and Girls)


----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
4.  Is the Wireless World a Secure One? (Reuters). Reuters - The wireless world is spreading rapidly, offering business travelers equipped with laptops or other devices the chance to connect everywhere from coffee shops to hotel lobbies.
5.  Can You Hear the Sound of Computing Silence? (Reuters). Reuters - Finding it harder to concentrate at your desk? Maybe it's the constant drone of your personal computer.

8:09:48 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  High ersatzery from Farkistani photoshopper army.

Good Fark photoshopping contest: come up with cheap imitations of well-known products, the cheaper the better.

Link

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  US online wine sales stymied by "byzantine" state laws (AFP). AFP - US consumers can buy almost anything on the Internet. But online wine sales are subject to a confusing patchwork of state laws, a system drawing more attention from winemakers, lawmakers and others.

7:09:37 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  We've had Napster since 1909, and the sky still hasn't fallen. In 1909, residents of Wilmington, DE, were able to subscribe to an online music service that piped phonograph recordings over their telephone lines and through loudspeakers. 1909 was one year after the sheet music publishers were told to get bent by Congress: see, they'd grown alarmed at the prevalance of unauthorized piano rolls and had asked the Congress for a Broadcast-Flag-like regime that would let them veto any new music tech that would endanger their business (like online music delivery), making it illegal. Congress told them to get lost. Good thing we rescued those idiots from themselves back in 1908 -- can you imagine a music industry where the most lucrative product in the market was sheet music?

It's a pattern: the Vaudeville artists sued Marconi over the radio -- which made them rich. The movie studios boycotted TV until Disney sold out to get the funds for Disneyland -- and TV rights made the studios rich. Jack Valenti told Congress that the VCR was the Boston Strangler of the film industry, and then it doubled his income through pre-recorded tape sales and rentals.

Now, of course, Congress has given up on saving the entertainment industry -- and us -- from itself. With the Broadcast Flag, new technologies will only come into the market if they don't disrupt the industries built on the old ones. And with the WIPO Broadcast Treaty in the works, it's fruitless to pray for some technology safe-haven where we'll be able to develop our gear in peace, far from the short-sighted, greedy lunacy of the entertainment companies. The FCC should be ashamed of itself.

When plugged up to a phonograph the subscriber's line is automatically made busy on the automatic switches with which the Wilmington exchange is equipped. Several lines can be connected to the same machine at the same time, if more than one happens to call for the same selection.

Each musical subscriber is supplied with a special directory giving names and numbers of records, and the call number of the music department. When it is desired to entertain a party of friends, the user calls the music department and requests that a certain number be played. He releases and proceeds to fix the megaphone in position. At the same time the music operator plugs up a free phonograph to his line, slips on the record and starts the machine. At the conclusion of the piece the connection is pulled down, unless more performances have been requested.

Link

(via Smart Mobs)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Disposable Cell Phones Arrive

6:09:19 AM    


5:09:08 AM    


4:08:49 AM    


3:08:38 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  New NVidia Graphics Cards Reviewed

2:08:18 AM    


1:07:58 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Novell/SUSE Prime for Aquisition?
2.  Literacy: Natural Language vs. Code

12:07:47 AM