Saturday, November 15, 2003

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Hope for the Upstate Economy in the Next Wave of Computer Chips. It is Gov. George E. Pataki's hope to turn the old Erie Canal corridor into a place where new technologies are developed and futuristic products manufactured. By James C. Mckinley Jr..
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Rules for Teenage Internet Access?

11:08:44 PM    

----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
1.  Vulnerabilities: Multiple BEA WebLogic Server/Express Denial of Service and Information Disclosure Vulnerabilities. BEA Systems has released patches for multiple vulnerabilities in various versions of BEA WebLogic Server and Express. The following issues were reported:

Servers impleme...


10:08:24 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Bicycle Tech Drivetrain Advances Showcased
----------------------------------------------------------------------
Stupid Security
----------------------------------------------------------------------
2.  Diebold Voting Software and Disclosure

9:08:06 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  My NYT Mag piece on robots. I wrote a piece on home robotics for the New York Times Magazine as part of a section on Home Automation with contributions from James Gleick, Paul Boutin, Clive Thompson and others; it shipped today:

Home robots were the jet-pack future's sweetest lie: personal assistants working tirelessly and without complaint -- companions, servants and pets. They would be nimble and able, and computers would be blinking omniscient behemoths.

How wrong they were. Just as millions of users defied the first engineers' narrow visions of what a home computer could be, and figured out how to make PC's bend to their will, the cheapness and flexibility of commodity computer components are now enabling a new hobbyist revolution in home robotics. C.P.U.'s -- the brains of a PC -- are cheap like borscht, and the sensors that allow computers to see, hear, feel and smell have likewise plummeted in cost. (Pinhead digital cameras, for example, are so cheap these days that it's hard to find a pocket-size gizmo that doesn't have one built in.) All it takes to turn these pieces into a robot is packaging the brains and the senses atop a mobile platform and stirring in some clever code.

Link

(Thanks, Paul)

2.  Silvery Roger Wood clock. I love coming home, firing up my mailer and finding a new Roger Wood clock in my in-box. Link
----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
3.  Fast and Furious: The Race to Wire America. The wiring of America for high-speed Internet access represents huge opportunities and risks for companies large and small. By Matt Richtel.
4.  When the House Starts Talking to Itself. The complications of home ownership in the digital age. By James Gleick.
5.  These Are Your Movies on Piracy. A series of public service announcements from the Motion Picture Association of America combat the idea that Internet file-sharing is a victimless crime. By A. O. Scott.
6.  What if Jackson Pollock Were a PC?. Daniel Shiffman's computer-based "Swarm" creates an electronic-expressionist portrait of its viewer that changes as the person moves. By Sarah Bayliss.

8:07:44 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Sexy Math. BoingBoing patron saint Bruce Sterling points our dirty minds to a website containing this suggestive series of images created entirely from mathematical algorithms. "If you find them offensive in any way," says the site's creator, "all I can say is that beauty (or obscenity) is in this case most certainly in the eye of the beholder." If high school algebra had been half this fun, perhaps I would have passed. Link
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Japanese firms to raise output of flat-panel TVs abroad: report (AFP). AFP - Japan's major electronics makers, including Matsushita Electric Industrial Co. and Sony Corp., will boost output of flat-panel television sets overseas to meet growing demand, a daily said.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  IBM Releases Desktop Linux Presentation
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
4.  Vulnerabilities: Info-ZIP UnZip Encoded Character Hostile Destination Path Vulnerability. Info-ZIP UnZip contains a vulnerability during the handling of pathnames for archived files. Specifically, when certain encoded characters are inserted into '../' directo...
5.  Vulnerabilities: FortiGate Firewall Web Interface Cross-Site Scripting Vulnerabilities. FortiGate are a series of commercial firewall appliances which run an embedded operating system entitled FortiOS.

Multiple cross-site scripting vulnerabilities have been...


7:07:24 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Earth's Asteroid Risk Downgraded
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Nokia Bluetooth Device Unauthorized Access Vulnerability. Bluetooth is a wireless communication protocol, which, amongst other functions, is designed to allow interoperability between devices produced by different vendors, such ...

6:37:15 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Red Hat, SUSE Announce Educational Discounts
----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
2.  It's kind of sad that all the people asking for Uru hints are farther along than I am. But my absolute favorite part of the single-player game is the puzzles that are designed for multiple players.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Multiple Vendor Bluetooth Device Unspecified Information Disclosure Vulnerability. Bluetooth is a wireless communication protocol which, amongst other functions, is designed to allow interoperability between devices produced by different vendors, such a...
4.  Vulnerabilities: Multiple Ethereal Protocol Dissector Vulnerabilities. Multiple Ethereal protocol dissectors are prone to remotely exploitable vulnerabilities. These issues have been addressed with the release of Ethereal 0.9.16.

The follo...

5.  Vulnerabilities: MIT Kerberos 5 Principal Name Buffer Underrun Vulnerability. Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. Kerberos i...
6.  Vulnerabilities: Hylafax HFaxD Unspecified Format String Vulnerability. Hylafax is a software package designed to handle the transmission of Faxes.

Hylafax hfaxd (daemon) has been reported prone to an unspecified format string vulnerability ...


5:36:54 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  3D London Tube.

These 3D rendered London Tube maps are pretty mind-blowing.

Link

(via Blackbelt Jones)


2.  Secrets of drivers' licenses revealed!. It turns out that drivers' license numbers contain coded information about your name and other details. If you're going to verify -- or generate -- a driver's license number, you need to know about this:

Soundex is a hashing system for english words. You might want to look at further information on how soundex works.

The example soundex is F255, so the example name starts with F, so the name starts with an F, followed by a gutteral or sibilant, followed by a nasal, followed by another nasal. This is correct, as the example person's last name is "Fakename"

For my license generator, I simply implement this. For my license reverser, I simply take likely guesses. I also generated the Soundex code for the top 10,000 (ish) last names in the US, and I suggest the top 10 for any given code.

Link

(via Crypto-Gram)

3.  Secret documents revealed!. The Austrian techno-activist group Quintessenz has created a sizable archive of secret documents; they want your contributions:

All the doquments in this section are being published here for reasons of scientific research only. They have been collected mainly from various open sources on the internet. Our sole intention is to inform the public about what is being done to their personal data right now in the digital networks.

We just preserve here what governments, various international bodies and certain IT companies did not care to publish or took off the net.

Link

4.  Secret cameras revealed!. How to find hidden cameras:

Some methods to hide cameras solely rely on the way human perception works. A very simple way to "hide" a camera is to install it at a large distance from the space to be surveilled. This does not restrict the usefulness of the camera images in any way because tele lenses can be used to compensate for the distance. For this application there is no need for subminiature cameras, although these are even easier to hide. Standard surveillance cameras painted the right color are very hard to spot and usually have a CMount or CS-Mount 7 socket which is needed for attaching the necessary high quality tele lens.

260K PDF Link

(via Crypto-Gram)

5.  Privacy-consciousness-raising stickers.

The Austrian cyber-activists Quintessenz put on the local Big Brother Award ceremony. To promote it, they distributed these stickers that look like hidden cameras, encouraging people to put them up in toilets and other places where privacy matters. The caption means "The Most Shameless Surveilleur."

116k PDF Link

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
6.  Broadcom Accuses Atheros Of WiFi Pollution
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
7.  Vulnerabilities: Xinetd Rejected Connection Memory Leakage Denial Of Service Vulnerability. Xinetd is intended as a secure replacement for inetd. It is designed for use with Linux and Unix variant operating environments.

A denial of service vulnerability has be...

8.  Vulnerabilities: Clam AntiVirus E-mail Address Logging Format String Vulnerability. Clam AntiVirus is an anti-virus product for Linux and Unix derived operating systems.

Clam AntiVirus is prone to a format string vulnerability when logging e-mail addres...

9.  Vulnerabilities: MIT Kerberos 5 Principal Name Buffer Overflow Vulnerability. Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret- key cryptography. Kerberos ...

4:36:34 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Google Code Jam Winner Announced
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  BugTraq: pServ 2.0.x:beta webserver remote buffer overflow exploit by jsk. Sender: yan feng [jsk at ph4nt0m dot net]
3.  Vulnerabilities: Qualcomm Eudora Encrypted EMail Attachment/Image Storage Vulnerability. Eudora is an e-mail client for Microsoft Windows and other operating systems. It is maintained and distributed by Qualcomm.

Eudora has been reported to be prone to a vul...


3:36:15 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Cellphone jammer. The SH066P Personal Cell Phone Jammer is disguised as a phone, has an effective radius of 10-15 yards, and comes in US and worldwide frequency-flavors. They're illegal to use in most places, but (usually) not illegal to possess, build or sell. I'm as bugged by mobile abuse as the next person, but using one of these strikes me as a much greater breach of the social contract than talking too loudly or subjecting your coachmates to the default Nokia ring.

Link

(via Gizmodo)

2.  My NYT Mag piece on robots. I wrote a piece on home robotics for the New York Times Magazine as part of a section on Home Automation with contributions from James Gleick, Paul Boutin, Clive Thompson and others; it shipped today:

Home robots were the jet-pack future's sweetest lie: personal assistants working tirelessly and without complaint -- companions, servants and pets. They would be nimble and able, and computers would be blinking omniscient behemoths.

How wrong they were. Just as millions of users defied the first engineers' narrow visions of what a home computer could be, and figured out how to make PC's bend to their will, the cheapness and flexibility of commodity computer components are now enabling a new hobbyist revolution in home robotics. C.P.U.'s -- the brains of a PC -- are cheap like borscht, and the sensors that allow computers to see, hear, feel and smell have likewise plummeted in cost. (Pinhead digital cameras, for example, are so cheap these days that it's hard to find a pocket-size gizmo that doesn't have one built in.) All it takes to turn these pieces into a robot is packaging the brains and the senses atop a mobile platform and stirring in some clever code.

Link

(Thanks, Paul)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Familiar Distribution for iPAQ Handhelds
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
4.  Vulnerabilities: XFree86 Multiple Unspecified Integer Overflow Vulnerabilities. Multiple integer overflow vulnerabilities have been discovered in XFree86 4.3.0. The problem specifically occurs due to insufficient sanity checks within font libraries. ...
5.  Vulnerabilities: Stunnel Leaked File Descriptor Vulnerability. Stunnel is a freely available, open source cryptography wrapper. It is designed to wrap arbitrary protocols that may or may not support cryptography. It is maintained by ...
6.  Vulnerabilities: Qualcomm Eudora Spoofed Attachment Line Denial Of Service Vulnerability. Eudora is an e-mail client for Microsoft Windows and other operating systems. It is maintained and distributed by Qualcomm.

A vulnerability has been reported by Qualcomm...

7.  Vulnerabilities: MPG123 Remote File Play Heap Corruption Vulnerability. mpg123 is a freely available, open source audio file player. mpg123 is available for the Linux and Unix platforms.

A problem in the handling of some types of remote fil...


2:35:55 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Owner Override: a proposal to fix Trusted Computing. My collegaue Seth Schoen has written an audacious article for Linux Journal in which he calls on the architects of "Trusted Computing" [TCPA|TCG|Palladium|NGSCB] systems -- which ostensibly solve some of the Internet's security problems by adding cryptographicallly secured tamper-detection to the hardware of the commodity PC -- to add a feature that he calls "Owner Override."

Trusted Computing proposals have drawn fire as tools for lock-in and other anti-competitive strategies; Seth's Owner Override allows the owner of a computer to override the Trusted Computing security when it is in her own interest.

For example, you could use Owner Override to tell a "lie" to your bank, which insists that you use Microsoft Internet Explorer to access its website, and convince the bank's webserver that your copy of Opera or Safari or Mozilla is really Internet Explorer. This is possible (even routine) today, but in a Trusted Computing universe, it will be impossible, modulo Owner Override.

Fortunately, this problem is fixable. TCG should empower computer owners to override attestations deliberately to defeat policies of which they disapprove. Giving the owner this choice preserves an essential part of the status quo: third parties can never know for sure what's running on your PC. TCG already defines a platform owner concept. The TCG specification also should provide for a facility by which the platform owner, when physically present, can force the TPM chip to generate an attestation as if the Platform Configuration Registers (PCRs) contained values of the owner's choice instead of their actual values.

APIs and a clear user interface for the override mechanism could be specified by an appropriate TCG committee. Only the platform owner should be able to do this; whenever a machine provides an inaccurate attestation, it does so for what its owner considered an appropriate reason. This change would do nothing to undermine the basic security benefits of the TCPA hardware, including those outlined in the Safford article; you still could tell whether your computer had been altered.

Link

(via Vitanuova)

2.  Censorware thinks blogs are unsavory. SurfControl, a censorware vendor, has roped off blogs from some of its customers' machines. That means that if your workplace, library or school relies on SurfControl to keep naughty pages away from its computers, you can't get at blogs, either.

Now that the Supreme Court has upheld the federal mandate requiring libraries to censor their terminals, companies like SurfControl control more than surfing: they control basic access to information.

Link

(via Dan Gillmor)

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
3.  Linux leaders offer education discounts. Red Hat and SuSE Linux launch new discounts to attract students and educational institutions, a strategically important customer set for technology companies.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  E-Voting Expert Testifies
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
5.  BugTraq: [Exploit]: Microsoft FPSE fp30reg.dll Overflow Remote Exploit (MS03-051). Sender: Adik [netninja at hotmail dot kg]
6.  BugTraq: idsearch.com and googleMS.DLL. Sender: trappers [trappers at mail15 dot com]
7.  BugTraq: UnAce 2.20 Exploitable Stack-Based Overflow (exploit code). Sender: [Li0n7 at voila dot fr]
8.  Vulnerabilities: Cerberus FTP Server Unspecified Buffer Overflow Vulnerability. Cerberus FTP Server is an FTP server designed to provide powerful, multithreaded FTP server performance for a desktop user.

A vulnerability has been reported to exist in...

9.  Vulnerabilities: SCO UnixWare/Open UNIX Insecure Handling Of ProcFS Vulnerability. procfs is a virtual file system, it is not associated with a block device but rather exists in memory. The files in the procfs provide for access to data from the kernel....
10.  Vulnerabilities: KDE KDM PAM Module PAM_SetCred Privilege Escalation Vulnerability. KDM is the KDE Display Manager, a component of the KDE Desktop Environment. It is available for Linux/Unix operating systems. KDM provides a graphical login interface f...

1:35:36 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  First Look at Debian's Next Generation Installer
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  BugTraq: RE: Vulnerability Disclosure Formats (was "Re: Funny article"). Sender: Russ [Russ dot Cooper at rc dot on dot ca]
3.  Vulnerabilities: Opera Multiple MIME Type File Dropping Weakness. Opera includes support for multiple MIME types used for configuration and installation of browser skins that potentially could be abused by a malicious web page to drop f...
4.  Vulnerabilities: Opera Web Browser Opera: URI Handler Directory Traversal Vulnerability. Opera is a web browser available for a number of platforms, including Microsoft Windows, Linux and Unix variants and Apple MacOS.

Opera uses an internal URI handler ca...

5.  Vulnerabilities: Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability. Sendmail is prone to a buffer overrun vulnerability in the prescan() function. This issue is different than the vulnerability described in BID 7230. The issue exists in...
6.  Vulnerabilities: Sendmail Ruleset Parsing Buffer Overflow Vulnerability. Sendmail is a widely used MTA for Unix and Microsoft Windows systems.

Sendmail has been reported prone to a buffer overflow condition when parsing non-standard rulesets...

7.  Vulnerabilities: Microsoft Internet Explorer file.writeline Local File Writing Vulnerability. A problem has been reported in the handling of the file.writeline function in Microsoft Internet Explorer. Because of this, it may be possible for an attacker to write a...

12:35:15 PM    

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  How to floss your security system. Diana Kelley of Computer Associates says that managing security patches is like flossing teeth--and a lot harder to pull off than it sounds.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Farscape is Back
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Nokia IPSO Voyager HTTPDAccessLog.TCL Remote Script injection Vulnerability. IPSO is the security hardware operating system maintained and developed by Nokia.

It has been reported that Nokia IPSO httpdaccesslog.tcl script does not properly handle...


11:34:55 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Send Emails After Your Death

10:34:45 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Rich and Poor States Split Before Internet Summit (Reuters). Reuters - Developed and developing nations were wide apart Saturday on managing the Internet and closing the digital divide between rich and poor at the end of what was meant as a final meeting before a world summit.
2.  Livewire: Plucking Musical Gems from the Web (Reuters). Reuters - Unsigned, underground bands love the Internet. But how can fans filter out the cacophony of awful music there to find the elusive, undiscovered geniuses?
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
3.  Hungover CNET wakes up next to MP3.com. What do we have in the bed with us?

9:37:05 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Artists' own album covers.

The Art Rocks asked 100 artists to produce album covers for their favorite musicians. It turns out that Kurt Vonnegut is also a painter, and a Phish fan.

Link

(Thanks, Eli the Bearded!)



8:36:45 AM    


7:36:25 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Worldchanging: tools for building sustainability, democracy and open systems. Worldchanging is a new group blog "covering tools for building sustainability, democracy and open systems." Lots of interesting stuff up there right now, including this Brian Eno challenge:

Tonight, at a rousing lecture sponsored by the Long Now Foundation, Brian Eno described his next undertaking. It's a book, 250 Projects for a Better Future.

Like most good ideas, the premise is deceptively simple: can we describe the 250 projects most critical to building a better future?

Link (Thanks, Alex!)

----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
2.  Lowering the Boom on Copycats. A bill pending in the Senate would impose a prison sentence of up to five years for anyone caught distributing movies or music ahead of their official release dates.
3.  Opening Doors With the DMCA. A U.S. District Court rules that it's OK to use a universal remote to open a garage door, despite the plaintiff's claim that the DMCA prohibited it. By Katie Dean.
4.  Mac Supercomputer Joins Elite. It's official: Virginia Tech's Mac supercomputer is the world's third-fastest. Meanwhile, IBM is building a monster machine that will blow it -- and all other supercomputers -- out of the water.
5.  Where Sharing Isn't a Dirty Word. The University of North Carolina has a wealth of information available on ibiblio, its massive digital library. And it's free. Michelle Delio reports from Chapel Hill, North Carolina.

6:36:05 AM    


5:35:47 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  IBM Dishes Out Small, Low-Power Supercomputer (TechWeb). TechWeb - IBM said its Blue Gene/L supercomputer is the size of a dishwasher and uses air-cooling methods to cut energy costs.
2.  SCO Subpoenas Torvalds, OSDL (TechWeb). TechWeb - Linus Torvalds and the Open Source Development Labs got subpoenas from attorneys for The SCO Group regarding the company's pending litigation with IBM over Linux source code.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Move Over Mini-ITX, Here Comes The gigaQube
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
4.  Off-piste with online games. Good online console titles are on the way but fixing tech glitches should be easier, says Daniel Etherington of BBCi Collective.

4:35:36 AM    

----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
1.  Fry's is giving away the Myst 10th Anniversary set free with Uru. I told you preordering was for suckers. I noticed in the readme that Uru uses Speex, Vorbis, and OpenSSL.
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
2.  Broadband net user numbers boom. High-speed broadband internet access is winning more and more converts around the world, research suggests.

3:35:18 AM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  2 Microsoft Competitors Address Antitrust Hearing in Europe. Sun Microsystems and Real Networks presented their arguments on the third and final day of a closed hearing in the antitrust proceedings Friday. By Paul Meller.
2.  Prosecutors Seek Unusual Appeal. Prosecutors will seek to reinstate the insider-trading conviction of John Cassese, co-founder of the Computer Horizons Corporation. By Bloomberg News.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  TV Comes to Cell Phones (PC World). PC World - New service streams live video to Sprint PCS Vision customers.

2:35:06 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Cell phone switchers have new sites for info (USATODAY.com). USATODAY.com - Several Web sites have launched to cash in on a new rule that lets cell phone users keep their numbers when they switch carriers.

1:34:48 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  TV Comes to Cell Phones (PC World). PC World - New service streams live video to Sprint PCS Vision customers.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Big Science has a Twenty-Year Plan
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
3.  Social networking site Emode tickles Ringo. Betting that the social networking niche of the online services market will become broader and more established, Emode.com has tripled its social networking members by buying competitor Ringo, Emode announced on Thursday.
4.  Former Gateway CFO denies SEC fraud charges. Former Gateway Inc. Chief Financial Officer (CFO) John Todd denied charges of fraud brought against him by the U.S. Securities and Exchange Commission (SEC), his lawyer said in a statement released Friday.
5.  Internet usage increases among U.S. Hispanics. U.S. Hispanics are using the Internet longer and with more sophistication than they were a year ago, according to a study released this week by comScore Media Metrix.
6.  Microsoft ordered to pay $62M in patent suit. A jury has ordered Microsoft to pay $62.3 million in damages for infringing on a technology patent held by a division of manufacturing and technology company SPX, the companies said Friday.
7.  Copper heats up Gigabit switch market. Worldwide Gigabit Ethernet switch port shipments grew by almost a million ports in the third quarter of 2003, according to recent research from the Dell'Oro Group.

ADVERTISEMENT:

Evaluating SSL VPNs? Listen to the experts! - Get secure remote access in about an hour, with no client, no server changes and no maintenance. PC Magazine just gave Neoteris Editors Choice, while Gartner, InStat and META have named Neoteris the category leader. Take a look at the reports and find out why!

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  'Smart shelf' test triggers fresh criticism
9.  New Windows Worm on the Way?
10.  Yahoo tests pop-up blocking toolbar
11.  Al Jazeera hacker gets community service

12:34:37 AM