Sunday, November 23, 2003

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Study: 21% of Cell Phone Users Weigh Ending Home Service (washingtonpost.com). washingtonpost.com - People under 30 are likelier to abandon their old telephone lines to rely more heavily on cell phones and the Internet, according to a study by the Pew Internet & American Life Project examining the tech-loving trendsetters in the United States.

11:34:43 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Philip K. Dick's Hollywood Afterlife
----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
2.  Customize this feed. Add more items, descriptions, time stamps, select your version of RSS, aggregate several feeds... Check out NewsIsFree's premium syndication services! (48)

10:34:23 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Son of Concorde

9:34:03 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  PCs' New Flash (washingtonpost.com). washingtonpost.com - After years in a soul-searching identity crisis, the personal computer industry finally seems to have figured out what people want.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Recycling TV Ads

8:33:43 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Survey: 31 Percent of U.S. Tech-Savvy (AP). AP - Technology geeks, unite. There are more of you than you might have realized. A study released Sunday found that 31 percent of Americans are "highly tech-savvy" people for whom the Internet, cell phones and handheld organizers are more indispensable than TVs and old-fashioned wired phones.
----------------------------------------------------------------------
Meerkat: An Open Wire Service: O'Reilly Weblogs
----------------------------------------------------------------------
2.  Meetup and Blogging Stats as an Opinion Indicator?. Meetup is an increasingly important tool for political campaigns. Do Meetup and blogging stats tell us anything about the popularity of the candidates, or do they just tell us who's figured out how to use these powerful new internet tools?
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Sendmail Headers Prescan Denial Of Service Vulnerability. Sendmail is a widely used MTA for Unix and Microsoft Windows systems.

Sendmail has been reported prone to a denial of service vulnerability when handling malicious SMTP ...

4.  Vulnerabilities: Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability. Sendmail is prone to a buffer overrun vulnerability in the prescan() function. This issue is different than the vulnerability described in BID 7230. The issue exists in...

7:33:24 PM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Love in the Time of No Time. How Internet dating is re-engineering flirtation, seduction, relationships and the love-seeking self. By Jennifer Egan.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Can America Trust Electronic Voting?
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Sybase Adaptive Server Remote Password Array Heap Overflow Vulnerability. Sybase Adaptive Server is a full SQL relational database management system. It is available for a variety of platforms including Microsoft Windows operating systems.

Sy...

4.  Vulnerabilities: Sendmail Ruleset Parsing Buffer Overflow Vulnerability. Sendmail is a widely used MTA for Unix and Microsoft Windows systems.

Sendmail has been reported prone to a buffer overflow condition when parsing non-standard rulesets...

5.  Vulnerabilities: Apache Web Server mod_cgid Module CGI Data Redirection Vulnerability. Apache has reported a potential vulnerability in the mod_cgid module when the threaded MPM (Multi-Processing Module) is used. The problem is said to be due to mishandling...
6.  Vulnerabilities: Apache Web Server Multiple Module Local Buffer Overflow Vulnerability. A vulnerability has been reported to exist in Apache that may allow a local attacker to gain unauthorized access by executing arbitrary code on a vulnerable system. The c...
----------------------------------------------------------------------
Stupid Security
----------------------------------------------------------------------
7.  Excellent Diebold/Voting Machines Article at SecurityFocus

6:33:03 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Debian 3.0r2 Released

5:32:44 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Fiber to the People: Lessig, IEEE & AFNs
----------------------------------------------------------------------
Stupid Security
----------------------------------------------------------------------
2.  Cuts down on support calls

4:32:30 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Tale of Two Tech Hubs: Silicon Glen & Chandiga
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  France Telecom lance l'option PING

3:32:13 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Hong Kong's Lessons on Number Portability
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: IBM AIX RCP Utility Local Buffer Overrun Vulnerability. rcp is the remote file copy program. It is designed to allow the copying of files from one system to another across a TCP/IP network. It is also designed to be syntactica...

2:31:53 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  House Passes Anti-Internet Spam Bill (Reuters). Reuters - The U.S. House of Representatives voted overwhelmingly on Saturday for a bill to outlaw most Internet spam and create a "do not spam" registry for those who do not wish to receive unsolicited junk e-mail.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  The Opus Interview
3.  Open Source Tools in Data Centers
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
4.  Vulnerabilities: EffectOffice Server Remote Service Buffer Overflow Vulnerability. EffectOffice Server is a commercially available office software infrastructure. It is available for the Microsoft Windows platform.

A problem has been reported in the s...


1:31:33 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Decoding the Algorithm for Pop Music
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: GNU Zebra / Quagga Remote Denial of Service Vulnerability. GNU Zebra is an open source implementation of TCP/IP routing software. It supports BGP-4, RIPv1, RIPv2 and OSPFv2 protocols. Quagga is a routing software suite which was...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Opera Browser Skin File Handling Vulnerabilities

12:31:13 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Microsoft to Spend $10 Bln on Small Firms (Reuters). Reuters - Microsoft (MSFT.O) is to invest $10 billion over the next five years to develop its software offerings for small and medium-sized businesses, according to Germany's Euro am Sonntag Sunday newspaper.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Companies Move Away From Cubicle Culture
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Spoofed Kernel Netlink Interface Message Denial of Service Vulnerability. The Linux kernel includes the use of an optional netlink driver, which when used creates the netlink device. This device can be used to allow a channel between the kernel...
4.  Vulnerabilities: phpFriendlyAdmin Unspecified Cross-Site Scripting Vulnerability. phpFriendlyAdmin is a remote database management tool written in PHP.

An unspecified cross-site vulnerability has been reported to exist in the software that may allow a...

5.  Vulnerabilities: Sun Solaris PGX32 Libraries Unspecific Privilege Escalation Vulnerability. The PGX32 is a frame buffer distributed by Sun Microsystems. It is available for some types of Sun Sparc hardware.

A problem has been reported in the libraries used by ...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Online movies proposed by 2005.
7.  Music and Creative Commons.

11:30:53 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Brazil's Government Snuggles Up to Linux (Reuters). Reuters - Brazil's government is urging its massive bureaucracy to use free software like Linux on its computer systems in a cost-cutting move that could cost Microsoft (MSFT.O) millions of dollars in lost revenue.
2.  Technology Removes Need for Human Pilots (Reuters). Reuters - The Wright Brothers demonstrated that man could fly. A century later, we're looking at a future in which planes fly without humans.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  DVD-Rs go 8x
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
4.  Vulnerabilities: Cisco PIX ICMP Echo Request Network Address Translation Pool Exhaustion Vulnerability. A problem has been reported in Cisco PIX network firewalls when global IP address pools are exposed to ICMP traffic. This may result in a denial of service to network re...

10:30:38 AM    

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  Week ahead: A meager feast. Tech conferences and earnings take a break as the Thanksgiving holiday nears, though some trade shows are taking place in Asia and Europe.
2.  The hidden cost of going virtual. A recently published paper by Stanford Business scholars suggests that virtual teams may extract an unexpected price in the coin of employee alienation from the organization.

9:30:14 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Wireless-Friendly Microwaves

8:29:54 AM    

----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
1.  Bangkok's software piracy battle. Pirated software is easily available in Thailand, despite efforts to stop the illegal trade, the BBC finds.

7:29:35 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Mobile Phone for the Blind

6:29:23 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Lessig: Towns should own their fiber. Lessig has an op-ed in this month's Wired explaining why towns should own the fiber in their soil.

The answer, as Cornell economist Alan McAdams argues, has nothing to do with Karl Marx and everything to do with basic economics. AFNs are natural monopolies. That doesn't mean that there can be only one, but rather that if there is one, then it is far cheaper to simply add customers to the one than to build another. The electricity grid in a local neighborhood is a good example of a natural monopoly. Sure, we could run four wires to every home, but do we really need four electricity companies serving every home?

Most economists would leap from the premise of a natural monopoly to the conclusion that such a monopoly must be regulated. But regulation is not the end that McAdams seeks. Ownership is. If a traditional network provider owned an AFN in a particular area, that network provider, acting rationally, would charge customers a monopoly price, or restrict service to get its monopoly benefit. But if the customer owned the network, then the customer could get the same access at a much lower price and be free of use restrictions. McAdams is pushing - and Burlington and other cities are actually deploying - customer-owned AFNs.

Link


5:29:05 AM    

----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
1.  Dilbert for 23 Nov 2003.
----------------------------------------------------------------------
Non Sequitur
----------------------------------------------------------------------
2.  Non Sequitur for 23 Nov 2003.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Hylafax HFaxD Unspecified Format String Vulnerability. Hylafax is a software package designed to handle the transmission of Faxes.

Hylafax hfaxd (daemon) has been reported prone to an unspecified format string vulnerability ...


4:28:45 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Linux in 2004?
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Opera HREF Malformed Server Name Heap Corruption Vulnerability. Opera is a web browser available for a number of platforms, including Microsoft Windows, Linux and Unix variants and Apple MacOS. Opera also includes the M2 Mail Client, ...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Microsoft 2003 Enterprise Engineering

3:28:25 AM    


2:28:04 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Singapore "cyberterrorism" laws raise fears of abuse (AFP). AFP - New laws allowing Singapore to launch pre-emptive strikes against computer hackers have raised fears that Internet controls are being tightened and privacy compromised in the name of fighting terrorism.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: SAP DB Privilege Escalation and Buffer Overrun Vulnerabilities. Multiple vulnerabilities have been reported in SAP DB. The following issues were reported:

A local privilege escalation issue (CAN-2003-0938) exists in SAP DB on Window...


1:27:46 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Documentary about Professional Gaming
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: Apple Mac OS X Jaguar/Panther Multiple Vulnerabilities. Apple has released APPLE-SA-2003-11-19 which includes security updates to address several known vulnerabilities in components included in Jaguar and Panther releases of M...

12:27:24 AM