Sunday, December 14, 2003

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Honors for Down and Out in the Magic Kingdom. My novel, Down and Out in the Magic Kingdom, has made the Amazon and Chapters/Indigo editors' picks lists for best science fiction novels of 2003. Also, it's only three recommendations short of making the preliminary Nebula ballot (any SFWA members out there who dug the book?). Oh yah, and the Livejournal people are considering adding Whuffie to their system. Killer news, all 'round.

(Thanks, Amanda and Bo and Micah!)

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Report: El Paso to Sell GulfTerra Stake (Reuters). Reuters - Cash-strapped El Paso Corp. (EP.N) is selling its controlling interest in a natural-gas pipeline unit, GulfTerra Energy Partners LP, to Enterprise Products Partners LP (EPD.N) for $3.2 billion, the Wall Street Journal reported on its Web site Sunday night.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  NHTCU targets SMEs with e-crime guidance

11:36:19 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Crippled "disposable" digital camera hacked and improved. The Walgreens-branded PureDigital camera is a "disposable" digital cam, requiring that you bring the device to a Walgreens to have your pix "developed" (printed and/or exported). A hacker has cracked the device, so that you can add Smartmedia memory and export pictures to your PC at home, reusing the camera.

you will see there is a daughter board on there with the nand flash for picture storage ..

if you remove that board you can add a smartmedia socket and using smartmedia card you will

be able to get the pics with a smartmedia reader standard jpg's but it will not do more that

25 pics still (think its using fat12)..

Slashdotted Link,

Mirror Link,

Another Mirror

(via /.)

2.  Help the music industry figure out which way to jump. Aaron Swartz has started a blog to record and discuss "alternative compensation schemes" -- business models for music in the era of P2P nets.

Here's the proposal in a nutshell: Some group of people pay a small fee (like a couple dollars a month). In return, they can download whatever they want, however they want. We track what is downloaded and then distribute the money received, in proportion, to the people responsible for the songs. Everybody wins: users get all the music they want, software developers can continue innovating, and the industry gets paid.

Link

3.  Voting By Design. Voting By Design is a "Knowledge Map" and report on how design affects the voting process.

Link

4.  Left Behind deconstructed. "Left Behind" is an immensely popular science fiction series about the sinners left behind on earth after good Christians are swept up in the rapture. Over at Slacktivist, a blogger has been dissecting the book in two- and three-page chunks, tearing apart the assumptions, fallacies and curiously compelling heresies in the story.

Charlie Stross and I just finished "Appeals Court," the sequel to Jury Service, which Argosy magazine will publish bound together in January, in a fix-up novel called "Rapture of the Nerds." "Appeals Court" is, in part, a response to "Left Behind": a story about a world where the only hominids who haven't ascended to the post-human cloudmind are reactionaries, missionaries, and religious fundamentalists.

Here's a little chunk of "Appeals Court," so you can see what I mean:

The ant-colony has taken the entire Atlantic coast of the US, has marched on Georgia and west to the Mississippi. It is an anarchist colony, whose females lay eggs without regard for any notional Queen, and it has entered its eighth year of life, which is middle-aged for a normal colony, but may be just the beginning for the Hypercolony.

The God-botherers have no treaty with the ants, but have come to view them as another proof of the impending end of the world. Anything that is not contained in chink-free, seamless plastic and rock is riddled in ant-tunnels within hours. They've learned to establish airtight seals around their homes and workplaces, to subject themselves to stinging insecticide showers before clearing a vestibule, to listen for the tupperware burp whenever they seal their children in their space-suits and send them off to Bible classes.

The ants have eaten their way through most of the nematode species beneath the soil, compromised all but the most plasticized root-systems of the sickening flora (the gasoline refining forests are curiously symbiotic with the colony -- anarchist supercolonies like living cheek-by-mouth-part with a lot of hydocarbons). They've eaten the bee-hives and wasp-nests, and they've laid waste to any comestible not tinned and sealed, leaving the limping Americans with naught but a few billion tons of processed food to eat before their supply bottoms out.

The American continent is a fairy tale that the cloudmind tells itself whenever it doubts its collective decision to abandon humanity. The left-behinds there spent their lives waiting for an opportunity to pick up a megaphone and organize crews with long poles to go digging through the ruins of civilization for tinned goods. Presented with their opportunity in the aftermath of the Geek Rapture, they are happy as evangelical pigs in shit -- plenty to rail against, plenty of fossil fuel, plenty of firearms.

What more could they possibly need?

and here's Slacktivist on "Left Behind":

The first words of Left Behind are "Rayford Steele," the protagonist's name.

It sounds like a porn star's name -- and in a sense it is. The Left Behind series is dispensational porno, but it's more than that. One of the most disturbing things about this book is the way LaHaye and Jenkins portray men, women and the relationships between them.

Note that Tim LaHaye's wife is something of a professional misogynist. She runs the 500,000-member "Concerned Women for America" -- jokingly referred to by its critics as "Ladies Against Women." For years, while Beverly LaHaye's husband pastored a church in San Diego, Mrs. L. spent most of her time 3,000 miles away, in Washington, D.C., running a large organization committed to, among other things, telling women they should stay at home and sacrifice their careers for their husbands. She is not an ironic woman and doesn't seem to find any of this inconsistent. (Nor, as I found out firsthand, does she appreciate jokes about the Freudian implications of the view from her L'Enfante Plaza office window. Sometimes the Washington Monument is just a cigar.)

Link

(Thanks, Kathryn!)

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
5.  El Paso to Sell Interest In GulfTerra Energy-Sources (Dow Jones). Dow Jones - NEW YORK -- El Paso Corp. (NYSE:EP - News) , still trying to recover from a costly move into energy trading and a scandal tied to the California energy crisis, is selling its controlling interest in a natural-gas pipeline unit, GulfTerra Energy Partners LP , to Enterprise Products Partners LP in a deal that values GulfTerra at $3.2 billion in cash and stock, people familiar with the matter said, The Wall Street journal has learned.
6.  Book 'Em Jerry (washingtonpost.com). washingtonpost.com - The state of Virginia, channeling the frustrations of millions of e-mail users worldwide, yesterday put its tough anti-spam law to work, busting a North Carolina man believed to be one of the Internet's most prolific spammers.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
7.  Netscape-Branded ISP Launching February 2004

10:36:00 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Michael Jackson fan-portaiture.

Here's a creepily magnificent gallery of portraits of Michael Jackson, painted by an obsessive fan who sends her work to MJ and sells prints on the Interweb.

Link

(Thanks, Johannes!)


2.  Japanese dollar-store opens doors in North America. Hyaku Yen, a Japanese dollar-store, has begun to open shops in North America.

At its Aberdeen store, at Hazelbridge and Cambie Road, 45,000 items will initially be sold at $2 Cdn each. These are to include cosmetics, gardening tools, household goods, soft drinks, snack food and stationery.

"A public survey in Japan showed Daiso-Sangyo as being the second most recognizable brand-name retailer after Disney World in Tokyo," Fairchild chairman and CEO Thomas Fung said Tuesday. "They ranked ahead of famous brands such as Coca-Cola, McDonald's, Sony, Toyota and Starbucks."

Link

(Thanks, [sorry, deleted your name]!)

3.  Micronations: folly and grandeur. A conversation this weekend got me to thinking about this old Wired article from March 2000, "It's Good to Be King." The piece is about obsessives who create "countries" by declaring their bedrooms or homes to be sovereign states, and then start issuing passports, attracting adherents, and generally ruling. Just re-read it, and it's as striking as it was when I first found it three years ago:

Some claim physical territory - the family farm, a square foot of Scottish fen, the bottom of the ocean, or, in Talossa's case, the east side of Milwaukee plus a chunk of Antarctica and a small island off the coast of France - but none would actually take power even if it were offered to them. Most feature a founder with the requisite lofty title, and almost all make their home, in one form or another, on the Web...

An entire subcategory of micronations owes its existence to adolescent alienation. These empires of angst betray themselves in one of two ways - either with hackneyed origin myths, usually involving benevolent sultans and distant tropical seas, or with paranoid rants against authority punctuated by proclamations of universal domination and reprinted Rage Against the Machine lyrics. Though almost all teen kingdoms claim legions of subjects, more often than not, populace, ruler, and disaffected youth are one and the same. The Kingdom of Triparia (www.triparia.cx), founded in 1998, is a classic of the genre: 17 citizens, with fancy titles and a penchant for posting overintellectualized bulletin-board messages, united in an act of collective imagination.

Link

4.  Virtual casino added to Everquest. Everquest has added a virtual casino to its gamespace:

The casino is a game of chance. To play you will need to buy a token from one of the wait staff in the casino. You can then take this token to one of the dealers and hand it in to him. There are four different dealers, each with prizes suitable for the different class types. When you turn the token in, he will deal you a hand of King's Court. Based on what your hand turned out to be, you will be awarded a prize. The chance to win a Gold Ticket exists on every hand you play. If you win the Gold Ticket you can turn it in to the manager of the casino and he will spin a grand prize wheel. The number the wheel lands on will determine the item you receive. There are many prestigious items that you can obtain from the ticket turn-in. Some of them are the Guise of the Deceiver, Fungus Covered Great Staff, and Holgresh Elder Beads. There are many more, and we also have intentions of adding more prizes in later patches if the games are popular.

Link

(via Terra Nova)

5.  Orange cubic PC.

The T-Cube is a new tiny, orange, cubic PC intended for sale in China. It runs some whacky OS called T-Engine.

Link

(via Gizmodo)


6.  Social people don't need social networking. Kevin Werbach points out that social networking sites like LinkedIn and Tribe and so forth have very little to offer highly connected people like Esther Dyson, who would nevertheless be a real asset to the network:

Esther and Pierre don't need LinkedIn to reach pretty much anyone they want to contact. Yet there are a whole lot of folks who want to reach them, and don't have a personal connection to do so. So the service worsens their email overload with little corresponding benefit.

Link

7.  Geek tatts.

Killer gallery of geeky tattoos.

Link

(via Geisha Asobi)


8.  Wiki inventor goes to MSFT. Ward Cunningham, the inventor of wikis, is taking a job at Microsoft: he's put up a wiki page to solicit advice for surviving there.

You can have a huge impact on Microsoft's culture. Push yourself to the max. Prepare the family -- working at Microsoft is fun and I went overboard. Sometimes the family doesn't understand. Take days to yourself. Try to build friendships and get a mentor or two. That'll help.

Link

(via Many2Many)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
9.  Where Are The Edges Of Today's Technology World?
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
10.  Vulnerabilities: mIRC DCC SEND Buffer Overflow Vulnerability. mIRC is a chat client for the IRC protocol, designed for Microsoft Windows based operating systems.

A vulnerability has been reported to exist in mIRC that may allow a r...

----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
11.  Customize this feed. Add more items, descriptions, time stamps, select your version of RSS, aggregate several feeds... Check out NewsIsFree's premium syndication services! (51)
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
12.  DDoS: In Depth - by badpack3t

9:35:40 PM    


8:35:21 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Cerritos Goes Wi-Fi (TechWeb). TechWeb - The California city, which couldn't get DSL or cable service, has approved a proposal by Airnet Wireless to install a citywide Wi-Fi network.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Roland Backs Down On MT-32 Emulator
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  The Cleaner Database v3428

7:35:00 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Free, Open Source OS For TI Calculators

6:34:40 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Online shopping coming of age for 2003 holidays (AFP). AFP - The Internet is making strong strides in retailing and is expected to take a growing slice of sales from the key US holiday shopping season, analysts say.

5:34:18 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Money Problems May Derail First U.S. MagLev Train

4:33:59 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  The Life of a Spammer
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
2.  Vulnerabilities: Mozilla Browser URI MouseOver Obfuscation Weakness. It has been discovered that the Mozilla browser is prone to a URI obfuscation weakness that may hide the true contents of a link. The problem occurs when a user@location ...
3.  Vulnerabilities: Multiple Vendor XML DTD Parameter Entity SOAP Server Denial Of Service Vulnerability. SOAP is the Simple Object Access Protocol, which is implemented in numerous web service software packages by various vendors. SOAP servers are available for the Unix, Lin...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  Re: A .NET classbug that can hang a machine instantly
5.  Re[2]: A new TCP/IP blind data injection technique?
6.  WORM_AGOBOT.EU
7.  Cyberterrorist beware... Canada has a new Dept of Homeland Security

3:33:47 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  A Bug That Pulls the Wool Over Your Site (washingtonpost.com). washingtonpost.com - A newly discovered security bug can let Internet scammers make phony sites that look even more authentic than usual in Internet Explorer for Windows: Instead of betraying their origin by showing the wrong address under IE's toolbar, phony sites can appear to have the same address as the real thing.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Small Form Factor Comparison Matrix
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: IRSSI Remote Denial of Service Vulnerability. irssi is a freely available, open source irc client. irssi is available for the Linux and Unix operating systems.

A remote denial of service vulnerability has been disco...

4.  Vulnerabilities: RemotelyAnywhere Default.HTML Logout Message Injection Weakness. RemotelyAnywhere is a remote host administration solution that allows a system to be accessed via a web interface from a remote location.

RemotelyAnywhere has been repor...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  RSN â LiveJournal
6.  XSS-óÿçâèìîñòü â ôîðóìå ixbt.com
7.  XSS-óÿçâèìîñòü â ôîðóìå ixbt.com
8.  XSS-óÿçâèìîñòü â ôîðóìå ixbt.com
9.  XSS-óÿçâèìîñòü â ôîðóìå ixbt.com
10.  XSS-óÿçâèìîñòü â ôîðóìå ixbt.com

2:33:28 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Mondo Cane -- the proto-shockumentary. Excellent NYT article about proto-shockumentary Mondo Cane and it spawn by Boing Boing pal Matt Haber.
.."Mondo Cane" presented bizarre, humorous, frightening and downright dubious dispatches from the farthest corners of the world: Italians in the village of Calabria slicing themselves with glass in celebration of Good Friday, the French painter Yves Klein painting with his naked "human paintbrushes," a woman in New Guinea suckling a pig and swanky New Yorkers dining on insects in a restaurant. As seen by Mr. Jacopetti, the world was a truly strange and frightening place.
Link
----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
2.  Net delivers early news of Hussein's capture. Americans log onto the Internet to learn about the capture of the deposed Iraqi leader because the news broke after most of the nation's newspapers had gone to print.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  The Future of Flight
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
4.  Vulnerabilities: Cyclonic Webmail Authentication Bypass Vulnerability. Cyclonic webmail is web-based software that provides an interface to allow remote users to read and send emails via a third party POP3 and SMTP server.

Cyclonic webmail ...

5.  Vulnerabilities: Sun Solaris Text Editor ed Temporary File Creation Vulnerability. ed is a is a line-oriented text editor.

A vulnerability has been reported to be present in Sun Solaris that may allow an attacker to overwrite or create any file on the ...

6.  Vulnerabilities: Cyclonic Webmail Information Disclosure Vulnerability. Cyclonic webmail is web-based software that provides an interface to allow remote users to read and send emails via a third party POP3 and SMTP server.

Cyclonic webmail ...


1:33:07 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  In Search of the Digital Uberdevice
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
2.  Vulnerabilities: SX Design sipd Remote Denial of Service Vulnerability. sipd is a SIP (Session Initiation Protocol) proxy and location server.

A vulnerability has been identified in sipd that may allow a remote attacker to cause a denial of ...


12:32:46 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Walgreens PureDigital Camera Hacked
2.  Officials secretly RFID'd at Internet Summit
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
3.  UN summit pledges net for all. Delegates at UN's digital divide summit agree on principles of web equality, but fail to commit on who pays.
4.  Games show nasty side of life. A wave of video games are tapping into the disturbing side of real-life culture.
5.  Apple's Panther bares its teeth. Apple, fed up with playing second string to Windows, is taking its operating system from strength to strength.

11:32:28 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Saddam Hussein Arrested

10:32:06 AM    

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  Week ahead: Oracle, 3Com earnings. Earnings reports overshadow an otherwise quiet week, as some tech notables gear up to release their quarterly results.
2.  XML--Rodney, are we there yet?. The acceptance and respectability of XML seems assured, but Software AG's William Ruh warns of potential bumps in the road ahead.

9:31:46 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  PowerPoint Makes You Dumb
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  ethereal-0.10.0a.tar..>
3.  vr-8.0a.tar.gz

8:31:26 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Multimedia Sharing Just Isn't There Yet (washingtonpost.com). washingtonpost.com - Sending a song or a photo around the world can take just a few clicks and a few seconds, but if you merely want to send the same MP3 or JPEG file to the stereo or television in your living room, forget it.
2.  Online shopping coming of age for 2003 holidays (AFP). AFP - The Internet is making strong strides in retailing and is expected to take a growing slice of sales from the key US holiday shopping season, analysts say.

7:31:07 AM    

----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
1.  Apple's Panther bares its teeth. Apple, fed up with playing second string to Windows, has been taking its operating system from strength to strength.

6:30:46 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Chock Full o' NetBSD!

5:30:26 AM    

----------------------------------------------------------------------
Calvin and Hobbes
----------------------------------------------------------------------
1.  Calvin and Hobbes for 13 Dec 1992.
2.  Calvin and Hobbes for 14 Dec 1992.
----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
3.  Dilbert for 14 Dec 2003.
----------------------------------------------------------------------
Non Sequitur
----------------------------------------------------------------------
4.  Non Sequitur for 14 Dec 2003.
----------------------------------------------------------------------
User Friendly
----------------------------------------------------------------------
5.  User Friendly for 14 Dec 2003.

4:30:06 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  A Bug That Pulls the Wool Over Your Site (washingtonpost.com). washingtonpost.com - A newly discovered security bug can let Internet scammers make phony sites that look even more authentic than usual in Internet Explorer for Windows: Instead of betraying their origin by showing the wrong address under IE's toolbar, phony sites can appear to have the same address as the real thing.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  MSMQ and .NET: Send MSMQ Messages Securely Across the Internet with HTTP and SOAP
3.  Ecma International Moves to Standardize C++ Binding for CLI
4.  Programming Security and Inventory Visibility in Order Systems
5.  Implementing Secure Business Transactions Across Organizations
6.  Code Secure: Analyzing Your Applications with Windows Application Verifier
7.  Security Briefs: Strong Names and Security in the .NET Framework

3:29:46 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  New Zealand Shows Music Piracy Boosts Sales

2:29:27 AM    


1:29:07 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Japan leads the charge in fuel cell applications (AFP). AFP - Japanese companies are leading the way in fuel-cell research, becoming the first to launch prototypes of the technology for use in laptop computers and mobile phones.
2.  Sony, Bertelsmann Sign Music Merger Deal (Reuters). Reuters - Germany's Bertelsmann AG (BERT.UL) and Sony (6758.T) of Japan on Friday finalized terms of an agreement to merge their music businesses, as the industry confronts competition from DVDs and video games and the threat of Internet file-swapping.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  UK To Start Biometric Passport Trials
----------------------------------------------------------------------
Internet/Network Security
----------------------------------------------------------------------
4.  Introduction to Packet Sniffing. Used properly, packet sniffing can be a valuable tool to help a network administrator monitor and maintain the flow of traffic on the network. However, it is also possible to gather sensitive information such as usernames and passwords that can...

12:21:16 AM