Saturday, November 29, 2003

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Put These Question Marks by the Hardware (washingtonpost.com). washingtonpost.com - Shopping for consumer electronics is a pain. The promise of finding something cleverly designed and fairly priced that makes your life a little better is rarely outweighed by the worry of paying too much, buying too many features or buying too few. And technology's constant, rapid evolution makes finding that elusive balance of price and capability still harder.

11:17:24 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Planned California Bill Targets Video Game Sales
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Do Not Bother Contacting Us For 72 Hours. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 2f3965a6d19bf70fb2b12391fdf45498.
3.  In 72 Hours, Your Ban Will Be Lifted. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 2f3965a6d19bf70fb2b12391fdf45498.
4.  You May Only Load Headlines Every 30 Minutes. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 2f3965a6d19bf70fb2b12391fdf45498.
5.  Your Headline Reader Has Been Banned. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 2f3965a6d19bf70fb2b12391fdf45498.
----------------------------------------------------------------------
Internet/Network Security
----------------------------------------------------------------------
6.  Computer Security 101: Lesson 1. Computer Security 101 is a 10-part series designed to introduce users to the basic concepts, technology and terminology associated with computer and network security. Each lesson is followed by a quiz and there is a Final Exam at the end....

10:17:06 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Journey Thru Innerspace lives again in 3D animation.

A trufan of the sadly defunct Journey Thru Innerspace ride from Disneyland's Tomorrowland has recreated the ride as a 3D model and is publishing stills and flythroughs of the textured mesh.

Link

(Thanks, John!)


2.  Herald Square Xmas tree topped with open WiFi antenna. Yahoo! has sposored the ornament atop the Xmas tree in NYC's Herald Square this year: a WiFi antenna broadcasting an open connection to the Manhattan passers-by who want to get in the holiday spirit with a little open spectrum. What a brilliant idea.

Link

(via Gizmodo)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  New IE Holes Discovered
4.  Monster Garage's Robotic R/C Car Challenge
5.  Anti-static Polymer Stores Data, Too
6.  Game Piracy Results in Lower Prices?
7.  PC Magazine Reviews Sharp's 3D Notebook
8.  Viruses Find A New Host: Cell Phones
9.  Embedded Device Manufacturers Ignoring GPL
10.  Track People Using Their Mobile Phones
11.  Computer Folklore, Circa 1984
12.  Lost Disney Rides Recreated in CGI
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
13.  Computer Caught Cheating At Chess

9:16:47 PM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Taking the Memorial Designs for a Test Drive. The ground zero memorial presentation was most people's first real chance to experience the new animated architectural rendering technology. By James Sanders.
2.  Internet Sex Column Thrills, and Inflames, China. The writings of Mu Zimei have prompted a raging debate in China about sex and women on the Internet. By Jim Yardley.
3.  Web Merchants Go Global. Online travel agencies are expanding their international air fare offerings. By Bob Tedeschi.
4.  New Rules, and Maybe Profits, in Cellphones. Brian T. Modoff, senior wireless equipment analyst at Deutsche Bank, talked last week about the industry and how to invest in it. By Kenneth N. Gilpin.

8:16:27 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Do Not Bother Contacting Us For 72 Hours. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: a9897ebed5ca5bb8ff1cf0423c8e122b.
2.  In 72 Hours, Your Ban Will Be Lifted. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: a9897ebed5ca5bb8ff1cf0423c8e122b.
3.  You May Only Load Headlines Every 30 Minutes. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: a9897ebed5ca5bb8ff1cf0423c8e122b.
4.  Your Headline Reader Has Been Banned. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: a9897ebed5ca5bb8ff1cf0423c8e122b.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
5.  Vulnerabilities: Glibc Getgrouplist Function Buffer Overrun Vulnerability. The GNU C library, glibc, contains standard C libraries called by various applications.

The getgrouplist function in glibc does not perform adequate bounds checking on d...

6.  Vulnerabilities: Stunnel Leaked File Descriptor Vulnerability. Stunnel is a freely available, open source cryptography wrapper. It is designed to wrap arbitrary protocols that may or may not support cryptography. It is maintained by ...
7.  Vulnerabilities: Epic CTCP Nickname Server Message Buffer Overrun Vulnerability. Epic is a freely available IRC client for Unix and Linux variants.

A remotely exploitable buffer overrun has been reported in Epic. This issue may reportedly be exploit...


7:16:07 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  The Future of Battlefield Robots
2.  Need... More... Power...
3.  New IE Holes Discovered
4.  Monster Garage's Robotic R/C Car Challenge
5.  Anti-static Polymer Stores Data, Too
6.  Game Piracy Results in Lower Prices?
7.  PC Magazine Reviews Sharp's 3D Notebook
8.  Viruses Find A New Host: Cell Phones
9.  Embedded Device Manufacturers Ignoring GPL
10.  Track People Using Their Mobile Phones
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
11.  Vulnerabilities: My_EGallery Module Remote Include Command Injection Vulnerability. My_eGallery is a freely available, open source PostNuke module. It is available for the Unix and Linux platforms.

A vulnerability has been identified in the handling of...

12.  Vulnerabilities: SuSE Linux SuSEWM Configuration File Insecure Temporary File Vulnerability. SuSEConfig is a component of the SuSE Linux operating system. It is designed to be a standardized configuration tool to SuSE operating systems.

A problem exists in the ...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
13.  Pieterpost - access to "vitual" account
14.  Re: Unhackable network really unhackable?
15.  Re: Unhackable network really unhackable?
16.  Re: phpBB 2.06 search.php SQL injection

6:15:47 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Turing paper into ASCII. Gary Wolf has a wonderful feature in this month's Wired about the parallel efforts to put texts, indices and images of books on the net (and to render them in cheap wood-pulp substrate) from the Internet Bookmobile to the Amazon Search Inside the Book system:

Kahle is happy to sidestep the problem of digitizing commercially successful books. He has no wish to antagonize the publishing industry. What he hates is that the Million Book Project cannot legally digitize countless books that aren't generating money for anybody. US libraries hold about 30 million unique volumes. No one knows how many of those books continue to be protected by copyright or are available from commercial publishers. Still, Kahle says, "they can't be digitized because the copyrights can't be cleared, and the copyrights can't be cleared because it's too much work to identify the copyright holders. Some people call them abandonware. I call them orphans."

"Amazon is taking a cut at the commercially available titles," continues Kahle. "We are going for the public domain titles. But who is taking care of the orphans? Nobody."

Link

2.  DNA sequencing for children.

Discovery toys is selling an $80 toy called the DNA Explorer, which allows small children to extract and sequence the DNA from a variety of foodstuffs.

Link

3.  Eroticising trademarked battlemechs.

ScoutWalker is a novel form of Star Wars porn: giant AT-ST Walkers engaged in scenes from the Kama Sutra.

Link (Thanks, Jed!)

4.  Dishonest anti-bootleg DVD ad. The UK-based Federation Against Copyright Theft is running ads in UK newsmags that warn:

BEAT THE CON MEN

To ensure your complete enjoyment, don't be persuarded to buy fake DVDs -- especially pre-release copies. Pirate DVDs are a rip-off, with poor sound and picture quality. Even if the packaging looks convincing, you will probably be disappointed with the contents. Avoid being conned by con men. You can report any suspicious activity in confidence to the Federation Against Copyright Theft (FACT) on 0845 6034567. Copyright is a matter of FACT.

This ad makes the fairly hilarious and very hysterical assertion that people who buy pre-release DVDs at fun-faires or out of the trunks of suspicious cars are somehow being duped into buying less than they expect; that purchasers of bootleg DVDs assume they're getting crystal-clear sound and picture and are, in fact, patsies of these sinister con artists who dupe them left and right. It's my suspicion that the FACTs are quite different -- that most customers of DVD bootleggers know exactly what they can expect when they buy a fake DVD off a blanket on a side-street. And they buy them anyway.

When I was in Hong Kong's Temple Street night market, I found stalls selling bootleg VCDs of current release movies for less than a (US) dollar; alongside the stalls were permanent storefronts selling the licensed VCDs (months behind the theatrical release) for about US$8. The life-cycle of the movies there appears to be: buy the bootleg, check to see if it's worth seeing in the theatre. See the good movies, buy the licensed discs. So long as the studios make movies people want to see, the bootlegs merely serve as advertisements for cinema tickets and licensed discs.

It's all well and good for FACT to pursue its goals of convincing Britons to buy licensed discs instead of bootlegs, but this ad is pretty intellectually dishonest.

Link

----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
5.  The Inquirer: Broadband nightmare cost to providers revealed.
6.  The Register: Toshiba blue laser tech chosen for HD DVD spec.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
7.  Vulnerabilities: Macromedia JRun Administrative Interface Multiple Cross-Site Scripting Vulnerabilities. Macromedia JRun is a J2EE application server for use with IIS 4/5 on the Microsoft Windows operating systems.

Macromedia JRun includes a web-based administrative consol...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  10 W32/Mimail-E
9.  9 W32/Klez-H
10.  8 W32/Mimail-J
11.  7 W32/Nachi-A
12.  6 W32/Gibe-F
13.  5 W32/Mimail-A
14.  2= W32/Mimail-F
15.  2= W32/Mimail-C
16.  1 W32/Sober-A
17.  Winny author investigated, users arrested in Japan.
18.  eMule 0.30d Released.
19.  W32.Spex.B.Worm
20.  La TV sur ADSL chez Free pour le 1er Decembre
21.  Apache mod_python String Processing Bug Lets Remote Users Crash the Web Server
22.  Applied Watch Command Center Authentication Flaw Lets Remote Users Add Accounts and IDS Rules
23.  Kudos for Yahoo Security - They Care About Your Safety
24.  ControlBreak International commercialise l’offre logiciel de sécurité SafeBoot
25.  Deux nouveaux experts « recherche de preuves informatiques » chez Kroll Ontrack
26.  Microsoft Probes Reports of New Holes in Explorer
27.  Wi-Fi arrest in Toronto highlights security dangers
28.  New Longhorn screenshots
29.  Samsung says it will overtake Nokia
30.  Hackers haunting Europe now
31.  Single bug or virus attack could cost your business £66,000
32.  Security of handhelds far too lax, experts say
33.  Debian attacker may have used new exploit
34.  Viruses may jeopardize power supplies, official

5:15:26 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Lockers create love hotel loyalty. According to Joi Ito, Japanese love-hotels have lowered churn and increased customer loyalty by adding storage lockers, because:

Married couples found it convenient to store adult toys and other things that they didn't want their children to find in these lockers. These lockers created a relationship between the customer and the hotel and dramatically increased customer retention. Now these lockers are used to store all sorts of "Not Safe For Home" things.

Link

2.  Custom crocheted laptop sleeves.

For 60 Euros (and up), avant-gardge Viennese artist Evelyn Fürlinger will hand-crochet you a custom laptop sleeve with a design of your choosing: I'm especially fond of the red go-faster stripes.

Link

(Thanks, Johannes!)

3.  Replace storage with the bag it came in.. Anti-static plastic, the kind used in RAM envelopes and other component-wrappers, is an excellent candidate for high-density storage. Reminds me of the Lily Tomlin bit: "I bought a garbage can and brought it home in a plastic bag. When I got there, I put the bag in the can."

Any device resulting from their work would be a "write-once, read-many" format and could perhaps be used to store films or music.

The researchers speculate that very dense memory blocks could be created by stacking the thin layers of the material on top of each other.

They team estimates that working devices could be up to 10 times more dense than current hard disks.

Link

(via /.)

4.  Labels detect and display fruit-ripeness. A new labelling technology foor fruit senses the ripeness of the underlying comestible and changes color accordingly:

The system, developed at the Horticulture and Food Research Institute of New Zealand, uses a punnet that traps the volatile compounds fruit emit. As the fruit ripen, the colour of the label changes in response to changing concentrations of these compounds.

Since pears need to soften before they achieve their best flavour, shoppers often squeeze the fruit to test them, which can damage them, says Ron Henzell, who led the research team.

Link

5.  Aussie passports get animated kangaroos. The new Australian passports have an anti-counterfeiting laser-generated image of a kangaroo that hops up and down when you change your viewing-angle.

Link

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
6.  Do Not Bother Contacting Us For 72 Hours. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 0d5716aa59a4638221ee77e01d6d4467.
7.  In 72 Hours, Your Ban Will Be Lifted. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 0d5716aa59a4638221ee77e01d6d4467.
8.  You May Only Load Headlines Every 30 Minutes. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 0d5716aa59a4638221ee77e01d6d4467.
9.  Your Headline Reader Has Been Banned. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 0d5716aa59a4638221ee77e01d6d4467.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
10.  Vulnerabilities: Apple MacOS X DHCP Response Root Compromise Vulnerability. A vulnerability has been identified in Apple MacOS X that may allow an attacker to gain root access to a vulnerable system via DHCP responses.

The problem reportedly occ...


4:15:07 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Viruses Find A New Host: Cell Phones
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  Vulnerabilities: HP-UX DCE Unspecified Remote Denial Of Service Vulnerability. HP-UX is a UNIX Operating System variant distributed and maintained by HP.

A problem has been identified in the Distributed Computing Environment (DCE) that may allow at...

3.  Vulnerabilities: HP-UX Unspecified Network Traffic Program Failure Denial Of Service Vulnerability. HP-UX is the Unix Operating System variant distributed by HP.

It has been reported that some types of network traffic sent to HP-UX systems may cause programs to fail. ...


3:14:46 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  World Pop Stars Perform at Mandela's AIDS Concert (Reuters). Reuters - Bono, The Corrs, Beyonce Knowles and other international stars answered Nelson Mandela's call to help fight the scourge of AIDS on Saturday, putting on a musical extravaganza broadcast across the world on the Internet.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Economics of File-Sharing
3.  Javascrypt
4.  Microsoft Drags Feet with Settlement Claims
5.  The Future of Battlefield Robots
6.  Need... More... Power...
7.  New IE Holes Discovered
8.  Monster Garage's Robotic R/C Car Challenge
9.  Anti-static Polymer Stores Data, Too
10.  Game Piracy Results in Lower Prices?
11.  PC Magazine Reviews Sharp's 3D Notebook
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
12.  Vulnerabilities: Microsoft Internet Explorer Window.MoveBy/Method Caching Mouse Click Event Hijacking Vulnerability. Microsoft Internet Explorer is an Internet browser application that is shipped with Microsoft Windows. Internet Explorer provides support for JavaScript by default. windo...
13.  Vulnerabilities: Microsoft Internet Explorer Invalid ContentType Cache Directory Location Disclosure Weakness. Microsoft Internet Explorer is prone to a weakness that may allow attackers to enumerate where cached Internet content is stored on the client filesystem. The attacker c...
14.  Vulnerabilities: Microsoft Internet Explorer Browser MHTML Redirection Local File Parsing Vulnerability. A vulnerability has been reported in Internet Explorer that may allow an attacker to parse local files on a system.

A vulnerability (MhtRedirParsesLocalFile) has been re...

15.  Vulnerabilities: Microsoft Internet Explorer MHTML Forced File Execution Vulnerability. A vulnerability has been discovered in Microsoft Internet Explorer when handling MHTML file URIs that may be exploited to download a malicious file to the client system a...
16.  Vulnerabilities: Microsoft Internet Explorer BackToFramedJPU Cross-Domain Policy Vulnerability. A vulnerability has been reported in sub-frames in Microsoft Internet Explorer. Because of this, an attacker may be able to violate cross-domain policy.

The problem is ...


2:14:26 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Do Not Bother Contacting Us For 72 Hours. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 489c85b01d1e0bf32055d035488e61fd.
2.  In 72 Hours, Your Ban Will Be Lifted. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 489c85b01d1e0bf32055d035488e61fd.
3.  You May Only Load Headlines Every 30 Minutes. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 489c85b01d1e0bf32055d035488e61fd.
4.  Your Headline Reader Has Been Banned. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: 489c85b01d1e0bf32055d035488e61fd.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  Do Not Bother Contacting Us For 72 Hours. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: ba377610ab1eb47bb615462e3e990bbb.
6.  In 72 Hours, Your Ban Will Be Lifted. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: ba377610ab1eb47bb615462e3e990bbb.
7.  You May Only Load Headlines Every 30 Minutes. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: ba377610ab1eb47bb615462e3e990bbb.
8.  Your Headline Reader Has Been Banned. Your RSS reader is abusing the Slashdot server. You are requesting pages more often than our terms of service allow. Please see the FAQ link for more information, and if you email us, include your IPID MD5: ba377610ab1eb47bb615462e3e990bbb.
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
9.  Vulnerabilities: Microsoft Internet Explorer Double Slash Cache Zone Bypass Vulnerability. A vulnerability has been reported in Internet Explorer that may allow cached Internet content to be rendered in the My Computer zone. Normally, cached content should be ...

1:14:06 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Anti-static Polymer Stores Data, Too
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
2.  BugTraq: Re: Unhackable network really unhackable?. Sender: Kurt Seifried [bt at seifried dot org]
3.  BugTraq: Re: phpBB 2.06 search.php SQL injection. Sender: Hat-Squad Security Team [service at hat-squad dot com]
4.  BugTraq: Pieterpost - access to "vitual" account. Sender: [datasink at op dot pl]
5.  BugTraq: Re: Unhackable network really unhackable?. Sender: Thor [thor at hammerofgod dot com]

12:13:46 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Programs 'Runaway' Uncommonly Literate Computer Game (Reuters). Reuters - It begins with a plan to drive to California. Brian Basco is on his way to a job in the physics department of the University of Berkeley when his car strikes a beautiful nightclub singer fleeing the men who have just killed her father. In her bag is a mysterious cross that may be a key to solving the mystery of his death.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Monster Garage's Robotic R/C Car Challenge
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
3.  Vulnerabilities: Samba Server Encrypted Password Buffer Overrun Vulnerability. Samba is a freely available file and printer sharing application maintained and developed by the Samba Development Team. Samba allows file and printer sharing between ope...
4.  Vulnerabilities: Mozilla Chatzilla IRC URI Handler Memory Corruption Vulnerability. Mozilla web browser includes support for various chat protocols such as IRC via the Chatzilla component.

The Mozilla Chatzilla IRC URI handler is prone to a memory corru...


11:13:27 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  New IE Holes Discovered

10:13:06 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Need... More... Power...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Software for a Song

9:12:06 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Sociology of cellular. "The Effects of Mobile Telephones on Social and Individual Life" is an interesting paper by Motorola sociologist Dr. Sadie Plant. Joi points out the fascinating stuff on cellular body-language:

Those who use their mobiles with this light touch often have their index finger aligned with the aerial at the top of the phone. There are also variations in the ways in which people’s eyes respond to a mobile call. Some mobile users adopt the scan, in which the eyes tend to be lively, darting around, perhaps making fleeting contact with people in the vicinity, as though they were searching for the absent face of the person to whom the call is made. With the gaze, the eyes tend to focus on a single point, or else to gaze into the distance, as though in an effort to conjure the presence of the disembodied voice.

1327k PDF Link

(via Joi Ito)

2.  P2Pnets: where deleted documents are reborn. Matt Jones posted a strategy document he'd written for the BBC, his then-employer, on his blog. They asked him to take it down. As is inevitably the case when this happens, people are coming by and posting to the comments section, asking where the document can be had. Turns out, it's circulating on Kazaa.

Link

----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
3.  Dilbert for 29 Nov 2003.
----------------------------------------------------------------------
Non Sequitur
----------------------------------------------------------------------
4.  Non Sequitur for 29 Nov 2003.
----------------------------------------------------------------------
Penny Arcade!
----------------------------------------------------------------------
5.  Please Don't Read This, Mom.
----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
6.  Neat Thieves Are Zeroing In on Laptops. Since laptops became common in the mid-1990's, criminals have sought them in particular as a way to make a quick profit. By The Associated Press.
7.  Microsoft Probes Reports of New Holes in Explorer. Microsoft is investigating a report of seven new security holes in its Internet Explorer browser discovered by a Chinese researcher. By Reuters.
8.  Chip Sales Rose 6.8% in October. Global sales of semiconductors in October showed their strongest growth from the previous month since March 2002. By Reuters.
----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
9.  iPod's 'dirty secret' wins Web fans. Irked by the difficulty and expense of replacing the dead batteries in their iPod, two filmmakers have embarked on an 'antiadvertising' Net campaign.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
10.  Surviving In The CRM Space (TechWeb). TechWeb - Smaller providers have a future by offering lower costs and focusing on vertical niches.
11.  Can Wireless Save Handhelds? (washingtonpost.com). washingtonpost.com - These are stormy days for the handheld industry, and particularly for its dominant player, the company formerly known as Palm Inc.
12.  FCC to Look at Phone Firms' Use of Internet to Carry Calls (washingtonpost.com). washingtonpost.com - The telecommunications industry, eager to find a route around a 100-year-old regulatory regime, has turned to a new path: the Internet.
13.  Where You Can't Hear Me Now in New York City (Reuters). Reuters - Trying to use your wireless phone to hook up with friends in Midtown Manhattan? You might end up spending the evening alone.
14.  Microsoft Probes Reports of New Holes in Explorer (Reuters). Reuters - Microsoft Corp. (MSFT.O) is investigating a report of seven new security holes in its Internet Explorer browser discovered by a Chinese researcher, a company spokesman said on Friday.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
15.  DVD Forum Approves HD-DVD Standard
16.  Have Your Family Gather 'Round the Virtual Table
17.  Phoenix Sounds Death Knell for BIOS
18.  Kernel 2.4.23 Released
19.  Apple Responds to Exploit
20.  Economics of File-Sharing
21.  Javascrypt
22.  Microsoft Drags Feet with Settlement Claims
23.  The Future of Battlefield Robots
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
24.  Terrorism in the living room. Terrorism as a game, film or book theme is now more acceptable, says Daniel Etherington of BBCi Collective.
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
25.  WLNP is a boon to customers - Infoworld Staff.
26.  IBM expands financing arm to life sciences.
27.  Breach of copyright no crime under draft E.U. law.
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
28.  Wi-Fi arrest highlights security dangers
29.  DVD security cracker turns to iTunes, faces court
30.  Mandrake: GnuPG Serious key vulnerability
31.  FreeBSD: Bind Negative-cache DOS vulnerability
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
32.  Elsewhere: Wi-Fi arrest in Toronto highlights security dangers. Wireless security for home networks is in the spotlight following an unusual arrest in Canada, where a man stands accused of downloading child pornography over a hijacked...
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
33.  BugTraq: [Hat-Squad] phpBB search_id injection exploit. Sender: Hat-Squad Security Team [service at hat-squad dot com]
34.  BugTraq: Applied Watch Response to Bugtraq.org post - Was: Multiple Remote Issues in Applied Watch IDS Suite (advisory attached). Sender: Eric Hines [eric dot hines at appliedwatch dot com]
35.  BugTraq: Re: phpBB 2.06 search.php SQL injection. Sender: [n dot teusink at planet dot nl]
36.  BugTraq: FreeBSD Security Advisory FreeBSD-SA-03:19.bind. Sender: FreeBSD Security Advisories [security-advisories at freebsd dot org]
37.  Vulnerabilities: OpenSSH Buffer Mismanagement Vulnerabilities. A buffer mismanagement vulnerability has been reported in OpenSSH. This issue exists in the 'buffer.c' source file.

The source of a problem is that a buffer structure...

38.  Vulnerabilities: OpenSSH Channel Code Off-By-One Vulnerability. OpenSSH is a suite implementing the SSH protocol. It includes client and server software, and supports ssh and sftp. It was initially developed for OpenBSD, but is also w...
39.  Vulnerabilities: HP ProCurve Switch Denial of Service Vulnerability. A denial of service vulnerability has been reported to exist in the HP ProCurve Switches. The problem is reported to occur in the presence of RPC worms such as W32.Welch...
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
40.  Intel Fields Wireless Desktop Hub. Taking aim at the market for standalone wireless routers, Intel is building a wireless access point in a forthcoming chipset. The move could simplify the process of setting up networks if the computer itself can act as a hub.
41.  Manhattan's Dead Cell Zones. Last month, a hotline recorded calls from New York cell phone users to log places they can't get a clear signal. Nearly 5,000 calls showed the busy city center may be one of the worst places to place a mobile phone call.
42.  Tim Burton's Great Big Adventure. The director of Beetlejuice, Edward Scissorhands and Mars Attacks! talks about freaks, FX and fantasy -- and his upcoming movie, Big Fish. By Bill Desowitz of Wired magazine.
43.  Comin' In on a Wheel and a Prayer. Snowmobile-maker Bombardier envisions a futuristic personal transport vehicle called Embrio. It would use gyroscope, electronic and fuel-cell technologies to whiz around in traffic on one wheel. Will it fly? By Kari L. Dean.
----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
44.  Struggle in Australia over anti-spam laws
45.  Hackers haunting Europe now
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
46.  Elsewhere: Wi-Fi arrest in Toronto highlights security dangers
47.  Wi-Fi arrest highlights security dangers
48.  Kit de sécurité antivirus + firewall PC-cillin offert par Noos à ses abonnés
49.  Re: Multiple Remote Issues in Applied Watch IDS Suite (advisory attached)
50.  Applied Watch Response to Bugtraq.org post - Was: Multiple Remote Issues in Applied Watch IDS Suite (advisory attached)
51.  [Hat-Squad] phpBB search_id injection exploit
52.  TSLSA-2003-0045 - stunnel
53.  TSLSA-2003-0044 - bind
54.  Re: Unhackable network really unhackable?
55.  Re: phpBB 2.06 search.php SQL injection
56.  Re: Speedtouch 510 DOS
57.  Re: phpBB 2.06 search.php SQL injection
58.  DVD security cracker turns to iTunes, faces court
59.  More bad hospital security policy
60.  Extending the Protected Network Wirelessly

8:11:48 AM