Saturday, January 31, 2004

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  Commentary: The VoIP conundrum
2.  Silicon Valley's resurgence: Real this time?. Things are again percolating but Knowledge@Wharton offers a reality check on whether the good times have indeed returned.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  The Cola Giants Align With Music Vendors (washingtonpost.com). washingtonpost.com - The Internet may not be the biggest hypster of today's Super Bowl in Houston -- leave that to television -- but you can count on it making a respectable contribution.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  India Becoming a Major Hub for Western Job Seekers
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  Microsoft delays major changes to Web browser
6.  FTC proposes label for porn e-mail
7.  Low-Level Enumeration With TCP/IP
8.  Wi-fi networks step up security
9.  MATRIX - A Dossier for Every Person in Utah
10.  Dossier program alarms Utahns

11:35:52 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Typepad and iPhoto united with Atom. Atom is a powerful, open, RSS-like syndication format, but so far, not a lot has been done with it. Now, Deez Steeles has used Atom to ship an iPhoto-to-Typepad tool that directly exports pictures that are retouched, selected and organized in Apple's iPhoto to Movable Type's Typepad blogging service. That's pretty sweet.

I'm digging the new Atom API interface to typepad. I have just completed a prototype of an iPhoto2Typepad interface. That means that its now possible to select photos in iPhoto and directly export into a Typepad Photo Album. This is basically my Holy Grail of digital photo convenience. Now the same program we use to import, and organise our pictures can send them right to Typep

Link

(via Dive Into Mark)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  2.4 vs 2.6 Linux Kernel Shootout

10:35:32 PM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  The Coming Search Wars. Microsoft and Google are eyeing each other like wary prizefighters entering the ring. By John Markoff.
2.  First the Web, Then the Greens. The Internet has made it easier to arrange and book golf trips. By Bob Tedeschi.
3.  Considering Chip Shares? Look for Plant Owners. A good way to sift through semiconductor stocks for values is to search for companies that have their own chip fabrication plants. By Norm Alster.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  MATRIX - A Dossier for Every Person in Utah

9:10:46 PM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  FTC Urges Open Relayers to "Secure Your Server"

8:10:26 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Rosetta, the Comet Hunter
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
2.  HP's Fiorina aims to put Bush on the moon. Gives new meaning to offshore

7:10:06 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Digital Camera Image Verification

6:09:46 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  New Linux Desktop Environment (Ziff Davis). Ziff Davis - Xandros Desktop OS 2 Deluxe offers would-be Linux users easy installation, and more.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Netcraft Jokes About SCO's Virus Fears

5:09:28 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Microsoft Works to Ward Off Virus Attack (AP). AP - Microsoft Corp. said Friday it was working to ward off an Internet virus that was set to attack the software company's Web site on Tuesday.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  A Look at Microsoft's Regulatory Problems
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: Macromedia ColdFusion MX Security Sandbox Circumvention Vulnerability. ColdFusion MX is the application server for developing and hosting infrastructure distributed by Macromedia. It is available as a standalone product for Unix, Linux, and ...
4.  Vulnerabilities: Macromedia ColdFusion MX Form Fields Denial of Service Vulnerability. A denial of service vulnerability has been reported to exist in Macromedia ColdFusion MX that may allow a remote attacker to cause the service to crash or hang. The issu...

4:09:07 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Online Gaming for Couples?
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
2.  Vulnerabilities: TRR19 Privilege Escalation Vulnerability. TRR19 is a typing game on GNU Emacs.

TRR19 has been reported prone to a privilege escalation vulnerability. The issue presents itself, because the TRR19 binaries do not...

3.  Vulnerabilities: ZoneAlarm Random UDP Flood Denial Of Service Vulnerability. ZoneAlarm is a firewall software package available for the Microsoft Windows operating system. It is distributed and maintained by Zone Labs.

A denial of service vulnera...

4.  Vulnerabilities: ELM frm Command Remote Buffer Overflow Vulnerability. ELM is a mail user agent for unix.

A buffer overflow vulnerability has been reported to exist in ELM e-mail client that may allow a remote attacker to execute arbitrary ...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  Group rips banks' privacy policies
6.  FTC Urges Open Relayers to ''Secure Your Server''

3:08:46 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Superbowling
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
2.  Vulnerabilities: TCPDump ISAKMP Decoding Routines Denial Of Service Vulnerability. tcpdump is a freely available, open source network monitoring tool. It is available for the Unix, Linux, and Microsoft Windows operating systems.

A vulnerability has be...

3.  Vulnerabilities: TCPDump Malformed RADIUS Packet Denial Of Service Vulnerability. tcpdump is a freely available, open source network monitoring tool. It is available for the Unix, Linux, and Microsoft Windows operating systems.

A vulnerability in the ...

4.  Vulnerabilities: TCPDump ISAKMP Decoding Routines Multiple Remote Buffer Overflow Vulnerabilities. tcpdump is a freely available open source network monitoring tool. It is available for the Unix, Linux, and Microsoft Windows operating systems.

Multiple buffer overflo...

5.  Vulnerabilities: Ethereal SMB Protocol Dissector Denial of Service Vulnerability. Ethereal SMB protocol dissector is prone to remotely exploitable denial of service vulnerability. This issue has been addressed with the release of Ethereal 0.10.0.

I...

6.  Vulnerabilities: Ethereal Q.931 Protocol Dissector Denial of Service Vulnerability. Ethereal Q.931 protocol dissector is prone to remotely exploitable denial of service vulnerability. This issue has been addressed with the release of Ethereal 0.10.0. ..
7.  Vulnerabilities: CVS Daemon RCS Off By One Local Buffer Overflow Vulnerability. CVS is the concurrent versioning system. CVS is a freely available, open source software development package for the Unix, Linux, and Microsoft Windows platforms.

A pro...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  Firm Posts Dip in E-Vote Sales
9.  Netherlands Nabs Nigeria Scammers
10.  Privacy watchdogs challenge EU-U.S. air data deal
11.  AT&T waffles on privacy
12.  Mercury News | 01/29/2004 | Group rips banks' privacy policies
13.  Comcast Redesigns Privacy Notice

2:08:26 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Secret, personal weblog of slain CNN employee Duraid Isa Mohammed. A BoingBoing reader who wishes to remain anonymous points us to what is understood to be the personal weblog of slain CNN employee Duraid Isa Mohammed. Duraid died earlier this week along with fellow CNN employee Yasser Khatab, when the vehicle they were traveling in came under fire from Iraqi insurgents. The weblog, titled "Memories of a war torn heart: Sometimes I feel like screaming", was started just one week before Duraid was killed.

The following poem, "Risks" -- printed in English and signed "anonymous" -- was found in Duraid's personal car in Baghdad. The nature of the poem is similar to other material on his short-lived blog. It is presumed that Duraid did not author the poem, but that the handwriting was his (a quick Google search turns up the same poem on various "inspirational quotes" webpages throughout the 'Net).

To laugh is to risk appearing the fool.
To weep is to risk appearing sentimental.
To reach out for another is risk involvement.
To expose feelings is to risk exposing your true self.
To place your ideas, your dreams, before a crowd Is to risk their loss.
To love is to risk not being loved in return.
To live is to risk dying. To hope is to risk despair.
To try is to risk failure.
But risks must be taken, because the greatest hazard in life is To risk nothing.
The person who risks nothing dies nothing, Has nothing and is nothing.
They say they avoid suffering and sorrow, But they cannot learn, Feel, change, grow, love, feel.
Chained by their attitudes, they are slaves.
They have forfeited their freedom.
Only a person who risks is free.
-- Anonymous

Duraid's blog does not bear his full name; each entry is signed "Mr. D.," and one post states, "I work as a journalist now with a big corporation, I was a basketballer in college, I was a DJ in my Baghdad, a war-torn town by now." The blog includes lyric quotes from Poison and Bon Jovi, and mentions that its author was permitted to travel with the military. This link to a related CNN story mentions also that Duraid was a DJ before the war. The BoingBoing reader who brings this story to our attention shares further information (and asks that it not be repeated here) which leads me to believe that the blog is in fact Duraid's.

2.  Product-placement film. A Negativland-produced indie film coming to the San Francisco Indie festival features nothing but product-placement shots from other movies.

Steve Seid, Video Curator for Pacific Film Archive and Peter Conheim of Negativland present a finely tuned montage of egregious product placement shots, drawing on 70 films?removing the gratuitous and unnecessary plots and leaving behind just the exhilarating core of consumerism.

Link

(Thanks, Steve!)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Three Blind Phreaks
----------------------------------------------------------------------
Meerkat: An Open Wire Service: O'Reilly Weblogs
----------------------------------------------------------------------
4.  An Editorial on Terrorism from Bruce Schnier. Bruce Schnier has written an elegant argument against our country's slide towards a police state. Agree or disagree with his politics, you should read this piece.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
5.  Vulnerabilities: phpBB GroupCP.PHP SQL Injection Vulnerability. phpBB is an open-source web forum application that is written in PHP and supported by a number of database products. It will run on most Unix and Linux variants, as well ...
6.  Vulnerabilities: TRR19 Privilege Escalation Vulnerability. TRR19 is a typing game on GNU Emacs.

TRR19 has been reported prone to a privilege escalation vulnerability. The issue presents itself, because the TRR19 binaries do not...

7.  Vulnerabilities: ZoneAlarm Random UDP Flood Denial Of Service Vulnerability. ZoneAlarm is a firewall software package available for the Microsoft Windows operating system. It is distributed and maintained by Zone Labs.

A denial of service vulnera...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  FreeBSD mksnap_ffs Command May Reset Security Flags on a Filesystem

1:08:16 PM    

----------------------------------------------------------------------
Digital Identity World
----------------------------------------------------------------------
1.  2003: The First "Big Year" for Digital Identity
2.  Predictions for Digital Identity in 2004
3.  Why the Identity Paradigm Matters
4.  What is Going On?
5.  Digital ID World Print Magazine Online
6.  RFID and the Internet of Things
7.  Identity Integrates ProBusiness
8.  Financial Services Discover Identity
9.  Biometrics and Financial Services -- Show me the money!
10.  When the walls come tumbling down
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
11.  Groklaw Traces Contribution of ABIs back to SCO.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
12.  Vulnerabilities: phpBB Privmsg.PHP Cross-Site Scripting Vulnerability. phpBB is an open-source web forum application that is written in PHP and supported by a number of database products. It will run on most Unix and Linux variants, as well ...
13.  Vulnerabilities: DotNetNuke Multiple Vulnerabilities. DotNetNuke (formerly known as the IBuySpy Workshop) is a web based content management system.

Multiple vulnerabilities have been identified in the software that may allo...

14.  Vulnerabilities: Loom Software SurfNow Remote HTTP GET Request Denial Of Service Vulnerability. SurfNOW is a commercially-available proxy software package designed to obscure identity and protect privacy on the Internet. It is available for the Microsoft Windows pl...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
15.  Arrest In Sale Of Fake Software

12:07:46 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Juarez killers: five untouchable drug-lords?. An investigative journalist is publishing a book alleging that five untouchable rich narco-gangsters are responsible for the murders of hundreds of women in Ciudad Juarez.

'Mexican federal authorities have conducted investigations, which reveal who the killers are,' she claims. 'Five men from Juarez and one from Tijuana who get together and kill women in what can only be described as blood sport. Some of those involved are prominent men with important political connections - untouchables.'

The chosen victims are so young, explains Washington, to avoid sexually transmitted diseases. Underlings supply new victims: 'They capture the girls and bring them to their masters.'

Washington alleges at least 100 women have been killed by these men, of whom all but one are multi-millionaires. They have political connections going all the way to President Vicente Fox, and some have allegedly made contributions to Fox's presidential campaign. They have ties to the Juarez Cartel, and have used their drug wealth to build respectable businesses.

Link

(Thanks, Zed!)

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  US-based software vendor SCO braces for onslaught by Mydoom worm (AFP). AFP - The US-based software vendor SCO braced itself for an attack on its website by the Mydoom worm as experts sought to determine the origin of the virus and the extent of the economic fall-out.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  The Lookout: Get Patched
4.  The Big One

11:07:32 AM    

----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
1.  Vulnerabilities: Leif M. Wright Web Blog File Disclosure Vulnerability. Web Blog is a web application, written by Leif M. Wright.

Web Blog is prone to a file disclosure vulnerability. Remote attackers may gain access to files on the system ...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Should You Trust TrustE?

10:37:15 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  We Like Dyke ad runs in Daily Telegraph. An ad calling for the return of BBC-director Greg Dyke, paid for and signed by hundreds of BBC staffers, ran in the Daily Telegraph today.

"Greg Dyke stood for brave, independent and rigorous BBC journalism that was fearless in its search for the truth. We are resolute that the BBC should not step back from its determination to investigate the facts in pursuit of the truth," the ad reads. "Through his passion and integrity, Greg Dyke inspired us to make programmes of the highest quality and creativity. We are dismayed by Greg's departure, but we are determined to maintain his achievements and his vision for an independent organisation that serves the public above all else."

Link

(via Plasticbag)

2.  Mobile interface myths. Twelve myths about mobile interface design:

Myth: Users want power and aesthetics. Features are everything.
Myth: What we really need is a Swiss army knife.
Myth: 3G is here!
Myth: Focus groups and other traditional market analysis tools are the best way to determine user needs.
Myth: If it works in Silicon Valley, it will work anywhere.
Myth: The killer app will be games, er, no, I mean, horoscopes, or
Myth: Mobile devices will essentially be phones, organizers, or combinations, with maybe music/video added on.
Myth: The industry is converging on a UI standard.
Myth: Highly usable systems are just around the corner.
Myth: One underlying operating system will dominate.
Myth: Mobile devices will be free-or nearly free.
Myth: Advanced data-oriented services are just around the corner.

My only modification: for "Silicon Valley," substitute, "Silicon Valley, Japan or Finland."

Link

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Programs: Prevention Is the Best Way to Fight Adware (Reuters). Reuters - If there is a special place in hell for telemarketers, spammers, and malcontents who unleash computer viruses, there must also be a suite set aside for the purveyors of adware.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
4.  Vulnerabilities: BRS WebWeaver ISAPISkeleton.dll Cross-Site Scripting Vulnerability. BRS WebWeaver is an HTTP/FTP server implementation for Microsoft Windows platforms.

BRS WebWeaver has been reported prone to a cross-site scripting vulnerability. The i...


9:36:56 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  GNOME in the Year of the Monkey
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
2.  Are video games breeding killers?. Can playing a killer make you one, wonders Daniel Etherington of BBCi Collective in his weekly column.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: Internet Security Systems BlackICE PC Protection blackd.exe Local Buffer Overrun Vulnerability. Internet Security Systems BlackICE PC Protection is a firewall/IDS implementation for desktop systems running Microsoft Windows.

It is reported that BlackICE PC Protecti...

4.  Vulnerabilities: Apache Web Server ETag Header Information Disclosure Weakness. Apache is a freely available web server. It is available for a variety of platforms including the Unix, Linux and, Microsoft Windows operating systems.

A cache managemen...


8:36:35 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  PeopleSoft meeting set for March 25 (SiliconValley.com). SiliconValley.com - In a move designed to speed up a showdown over Oracle's hostile takeover bid launched in June, PeopleSoft on Friday set a pivotal shareholder vote two months earlier than expected.
2.  PC makers combine to form industry's No. 3 (SiliconValley.com). SiliconValley.com - The deal announced Friday combining PC maker Gateway and its low-cost rival eMachines is expected to put pressure on Hewlett-Packard at the retail level and result in layoffs and store closings for Gateway.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: Internet Security Systems BlackICE PC Protection Upgrade File Permission Vulnerability. Internet Security Systems BlackICE PC Protection is a firewall/IDS implementation for desktop systems running Microsoft Windows.

BlackICE PC Protection is reported to in...


7:36:17 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  The Internet by Motorbike
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
2.  Office workers want to break free. Employees that can telecommute from the beach or their back garden could be more productive, a survey suggests.
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
3.  Netherlands Nabs Nigeria Scammers. Dutch police raid 23 apartments and arrest 52 people in one of the largest busts of suspected Nigerian e-mail hucksters. The detainees' identities are not released, but police believe most were, in fact, Nigerian.
4.  Firm Posts Dip in E-Vote Sales. On the heels of a report detailing security flaws its computerized voting systems, Diebold Inc., maker of bank machines and election equipment, posts a sharp rise in quarterly profits. But revenues for its election division slip.
5.  Scientists Clamor to Save Hubble. NASA's initial decision to stop sending astronauts to service the Hubble Space Telescope is meeting strong resistance from astronomers, who say the scope's useful life span is far from over. By Erik Baard.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Microsoft Offers Mydoom Bounty
7.  Mydoom Mail Keeps on Coming
8.  How to Kill the Worm
9.  NIST issues authentication draft
10.  Sun Solaris pfexec May Execute Profile Commands With Elevated Privileges

6:35:55 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  BKDR_SPYBOT.EQ

5:35:36 AM    

----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
1.  Dilbert for 31 Jan 2004.
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
2.  Office workers want to break free. Employees that can telecommute from the beach or their back garden could be more productive reveals a survey.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Why Google needs Orkut
4.  FTC vs. Open Relays, round 2
5.  Vulnerable Servers Warned
6.  Chinese Internet Censorship Proves Difficult
7.  Chinese activists evade web controls
8.  Maryland Electronic Voting Systems Found Vulnerable
9.  Md. Voting Machines Vulnerable, Firm Says
10.  All Things Considered for Thursday, January 29, 2004 - Hackers Help Test Voting Machines
11.  Security Poor in Electronic Voting Machines, Study Warns

4:35:16 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Sun and Eclipse Squabble

3:34:56 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  Md. Voting Machines Vulnerable, Firm Says
2.  Microsoft offers $250,000 reward in Mydoom.B attacks
3.  University of Georgia computer systems hacked
4.  As victims clean up, Mydoom mail keeps coming

2:34:36 AM    

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Early weekend science brief. An early weekend dose of science including news about Hubble, Mars, mad cow disease, and evolution By Fred "zAmboni" Locklear.
----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
2.  Rules for living. This is a great collection of aphorisms by which you would be well-served if you were to build your life around them.

Yeah, I know Sid Vicious wore a lock on a chain around his neck just like that. But the first time you try and pogo with that thing on it?s gonna chip a tooth, Road Warrior.

Now that you?ve climbed up there, it?s a lot higher than it looks, isn?t it? Dumbass.

The Renaissance Faire may not be the source of all your problems, but it sure as shit isn?t helping any.

You?re probably doing something that bugs the next guy twice as much. Clam up and get on with your life.

Link

(via AccordionGuy)

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
3.  Gateway Makes Deal to Acquire EMachines. The deal is the latest effort by Gateway to stanch its losses and capture a bigger share of the market for low-end personal computers. By Carolyn Marshall.
4.  Tucked Behind the Home Page, a Call to Worship. An increasingly popular strategy for evangelism on the Internet involves creating sites that attract visitors by avoiding overtly religious imagery or themes. By John Leland.
5.  Take-Two Interactive Software to Restate Earnings for 5 Years. Take-Two, which has been under investigation by the S.E.C. for about two years, said the restatement would affect fiscal 1999 through 2003 and its outlook for 2004. By Reuters.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Keylogger.Stawin
7.  Microsoft offers $250,000 reward in Mydoom.B attacks
8.  University of Georgia computer systems hacked
9.  As victims clean up, Mydoom mail keeps coming

1:34:15 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Radiohead's Thom Yorke on BBC and Hutton Report. In today's Guardian, an op-ed by Thom Yorke:
Lord Hutton's damning report of the BBC is a whitewash. The result will create fear at the Today programme, where there should be pride. As so many times before, they were there with a story that nobody else would touch. And I still cannot see why Gavyn Davies and Greg Dyke have had to resign. It flies in the face of reality, ripping all evidence to shreds.

This is a theatre of the absurd. It has left everybody I know shaking their heads in disbelief and anger. Such a performance should make us all deeply nervous about the future of Britain. While Blair wishes to draw a line under the whole episode, I hope this doesn't happen. Sometimes a story will end up being told, no matter how many times they try to close the book

Link
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  All the News That Fits (Forbes.com). Forbes.com - Few things in China are as predictable as the government's official and faithful mouthpiece, the Xinhua News Agency. Yet even this organ of propaganda has caught China's money bug, evolving into a global operation that takes cues from America's media conglomerates. At home Xinhua owns real estate, distributes Motorola mobile phones and holds 7% of Chinadotcom, a Nasdaq-listed Internet portal.
3.  Xerox Seeks Momentum with New High-Volume Printers (Reuters). Reuters - Xerox Corp. (XRX.N) on Thursday unveiled redesigned additions to its key DocuTech line of high-volume printers, hoping to sustain momentum fueled by recent strong office equipment sales and historic highs in its stock price.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  FTC vs. Open Relays, round 2
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
5.  PeopleSoft pushes forward meeting for board vote. PeopleSoft Inc. said Friday it will hold this year's annual shareholders' meeting in March, several months earlier than usual, in an effort to limit the effects of Oracle Corp.'s hostile takeover bid and planned attempt to replace a majority of PeopleSoft's board.
6.  Oracle's U.S. midmarket apps bundle delayed.  Oracle Corp. is facing delays in bringing to market a U.S. version of its E-Business Suite Special Edition, a package of enterprise applications delivered ready to run on a hardware server by Oracle resellers and targeted at midsize companies.
7.  Oracle to cut price on lower-end database.  Oracle Corp. on Tuesday plans to announce a price cut for a lower-end version of its database, part of an effort to lure potential customers away from Microsoft Corp.'s SQL Server software, according to a source familiar with the plan.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  Kietu? Include File Flaw Lets Remote Users Execute Arbitrary Commands
9.  PhpGedView Include File Holes in 'conf' Files Let Remote Users Execute Arbitrary Commands

12:33:56 AM