Saturday, February 07, 2004

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  New twist in Bikram Yoga copyright feuds. Bikram Choudhury, the eccentric Beverly Hills yoga master who once said in a Business 2.0 interview, "I have balls like atom bombs, two of them, 100 megatons each. Nobody fucks with me," has been suing practitioners he accuses of illicitly teaching his particular style of yoga (26 postures, done twice each in a >105-degree-hot room). Now, one group of yoga enthusiasts is suing back.

Choudhury, America's best known and most controversial yogi, opened one of his first yoga schools in San Francisco in 1973 and now boasts 900 studios worldwide. He copyrighted, trademarked and franchised his poses, breathing techniques and dialogue, creating the first chain of its kind. He also hired lawyers who set loose a flurry of cease-and-desist letters warning yoga teachers in the Bay Area and beyond not to teach his yoga or anything "derivative" if they haven't graduated from his $5,000-per-person training program and are not paying a studio franchise fee. His letters threaten a penalty of $150,000 per infringement.

Now, a San Francisco nonprofit organization of yoga enthusiasts from San Rafael to Ft. Lauderdale, Fla., is countering with a federal lawsuit attacking the guru's claim that yoga is proprietary. They say that yoga is a 5,000-year- old tradition that cannot be owned. The suit is asking the judge to determine whether Choudhury is entitled to copyright and trademark his material under federal copyright laws. A trial date has been set for next February.

Link to SF Chron story, Link to Reuters story
2.  Snitchpix as photojournalism.

These pictures of moron vandals trashing cars on the Northeastern University campus after the SuperBowl have been posted by the campus cops in order to garner snitch-tips that will help them bust these guys; but the pictures themselves are actually pretty compelling when considered as pieces of photojournalism.

Link

(Thanks, Vandal!)


3.  Geek love poem. Here's a lovely, pithy geek poem written by KillerHamster, a Slashdot poster. Select from here --> roses are red, violets are blue, all my base are belong to you <-- to here for a white-on-white translation.

Roses are #FF0000
Violets are #0000FF
chown -R you ~/base

Link

(Thanks, Mozai!)

4.  Virus writers profiled. Clive Thompson's written a lyrical and evocative article profiling several European virus-writers, coders who write and post proof-of-concept malware to demonstrate security flaws in Microsoft products.

Benny, clean-cut and wide-eyed, has been writing viruses for five years, making him a veteran in the field at age 21. ''The main thing that I'm most proud of, and that no one else can say, is that I always come up with a new idea,'' he said, ushering me into a bedroom so neat that it looked as if he'd stacked his magazines using a ruler and level. ''Each worm shows something different, something new that hadn't been done before by anyone.''

Benny -- that's his handle, not his real name -- is most famous for having written a virus that infected Windows 2000 two weeks before Windows 2000 was released. He'd met a Microsoft employee months earlier who boasted that the new operating system would be ''more secure than ever''; Benny wrote (but says he didn't release) the virus specifically to humiliate the company. ''Microsoft,'' he said with a laugh, ''wasn't enthusiastic.'' He also wrote Leviathan, the first virus to use ''multithreading,'' a technique that makes the computer execute several commands at once, like a juggler handling multiple balls. It greatly speeds up the pace at which viruses can spread. Benny published that invention in his group's zine, and now many of the most virulent bugs have adopted the technique, including last summer's infamous Sobig.F.

Clive touches on, and dismisses the free-speech arguments for publishing malware code (interestingly, he does so without any quotes from legal scholars and impact litigators who work on First Amendment issues, and so ends up eliding the nuance in the argument and presenting a somewhat cartoonish picture of the issue) but misses the far more important notion of legitimate security research.

If, as Schneier says, "Any person can create a security system so clever s/he can't think of a way to defeat it," then the only experimental methodology for evaluating the relative security of a system is publishing its details and inviting proof of its flaws -- proof readily embodied in malware.

Codebreakers and worm-writers are the only mechanism we know about for reliably strengthening systems, and the idea that they should refrain from publishing their research in order to keep us safe is fundamentally flawed, since it depends on the idea that malicious people will never be clever enough to independently reproduce their techniques, and that the public is better served by remaining ignorant of the potential risks in the systems they've bought than by being exposed to the evidence of the rampant flaws in those systems.

This notion falls flat when considered in light of the real world. If a developer was building condos whose doors could all be unlocked with an unbent paper-clip, this line of reasoning demands that the person(s) who discover this should keep mum about it, in the hopes that no bad guy ever catches on. In the real world, the best answer is usually to scream about this to high heaven, so that the bad developer can't silence you and cover his ass, and so that his customers can get their locks fixed.

Link

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
5.  The Pornography Industry vs. Digital Pirates. The copyright rumble is playing out a little differently in the red-light districts of cyberspace. By John Schwartz.
6.  As Newcomers Swarm, Sony Girds for a Fight. For a company that has long flexed its muscles and built a reputation on being first, Sony is now in the awkward position of having to play catch-up. By Ken Belson.
7.  The Virus Underground. Young people around the world spend their Saturday nights writing fiendishly contagious computer viruses and worms. Are they artists, pranksters or techno-saboteurs? By Clive Thompson.
8.  The Gear. For hip-hoppers, sound equipment is all about ease and portability. By Sasha Frere-jones.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
9.  We'd Like a Bit More, For a Little Less (washingtonpost.com). washingtonpost.com - It used to be easy to tell the difference between regular and high-speed Internet: The latter ran 10 times faster than the former, and it was the only kind worth bragging about.

11:37:26 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Dealing With Copyright Online: Porn v. Music
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  OpenJournal 'uid' Authentication Flaw Grants Remote Users Access to the Control Panel
3.  Matrix FTP Server Can Be Crashed By Remote Users

10:37:07 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Worst Terms of Service Ever

9:35:56 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  SCO Complaint Filed -- Including Code Samples

8:35:35 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Piracy for pornos. Jonno on Fleshbot says:
Interesting New York Times article on the adult industry's take on file sharing and digital piracy, with responses ranging from legal threats (Titan Media) to a regulated "if you can't beat 'em, join 'em" approach (Playboy.com). (For the record: we here at Fleshbot believe that porn wants to be free, but also think that people deserve to be credited and/or compensated for their creative efforts. How's that for a diplomatic response?)
Link to "The Pornography Industry vs. Digital Pirates" (NY Times; registration required)
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Vodafone poised for imminent 40-billion-dollar AT and T bid: reports (AFP). AFP - British mobile telephone giant Vodafone is poised to launch a 40-billion-dollar (32-billion-euro) bid for AT&T Wireless, the third largest mobile operator in the United States, reports said.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: Multiple RealPlayer/RealOne Player Supported File Type Buffer Overrun Vulnerabilities. RealPlayer/RealOne Player are media players that are available for various operating systems, including Microsoft Windows and Mac OS.

It has been reported that various R...

4.  Vulnerabilities: RealPlayer/RealOne Player RMP File Handler Unspecified Code Execution Vulnerability. RealPlayer/RealOne Player are media players that are available for various operating systems, including Microsoft Windows and Mac OS.

RealPlayer/RealOne Players have bee...

5.  Vulnerabilities: RealOne Player SMIL File Script Execution Variant Vulnerability. RealOne Player is a media player that is available for a number of platforms including Microsoft Windows and MacOS systems.

RealOne Player includes support for Synchroni...

6.  Vulnerabilities: RXGoogle.CGI Cross Site Scripting Vulnerability.. RXGoogle.CGI is a free search script implemented in perl that facilitates internet wide searching from a local web site.

It has been reported that the rxgoogle.cgi sea...

7.  Vulnerabilities: Apache mod_python Module Malformed Query Denial of Service Vulnerability. Apache's mod_python is a module which allows the web server to interpret Python scripts. mod_python supports Apache 1.3.x and 2.x, and is available for Windows, Linux and...

7:35:16 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  New AIM supports video IM, crossplatforms with iChat AV 2.1. BoingBoing pal Mike Outmesguine says:

The new version of AIM (5.5, released Thursday, 2/5/04) now supports video instant messaging. That's kind of cool in and of itself. But check this: AOL Video IM crosses platforms and works with Apple's iChat AV 2.1 "public beta".
Link
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Red Hat to Release Enhanced-Security Linux
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: GNU Radius Remote Denial Of Service Vulnerability. GNU Radius is a server used primarily by Internet service providers as a solution for authentication and accounting.

GNU Radius has been reported prone to a remote denia...

----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
4.  Extortionists attack Paddypower.com. Gamblers Anonymous
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  Discuz! Board Cross Site Scripting Vulnerability
6.  IBM Cloudscape SQL Database Remote Command Injection Vulnerability
7.  shmat() Reference Count Buffer Overflow Vulnerability

6:34:57 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Microsoft Lawyer To Lead ABA's Antitrust Section
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Une faille IPv6 dans openBSD 3.4 !

5:34:36 PM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  How C# Was Made
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Port 1080, 3127 and 3128; Apache-SSL Optional Client Certificate Vulnerability

4:34:15 PM    

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Intel to demonstrate 64-bit x86 "CT" chip in two weeks. Intel will demonstrate its x86 64-bit technology at the Intel Developer Forum, February 17-19. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Business Spending Seen Likely to Rise (AP). AP - Cisco Systems' cautious comments on future demand for its networking products may have temporarily tanked technology stocks, but that doesn't mean companies won't splurge on capital improvements this year.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Requiem For The Record Store

3:33:56 PM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Nextel Sets High-Speed Wireless Test in N.C. (Reuters). Reuters - Nextel Communications Inc. (NXTL.O), the No. 5 U.S. wireless telephone company, said on Friday it will test a wireless broadband service in the Raleigh-Durham, North Carolina, market, one of the options it is considering for high-speed wireless Internet access.
2.  SCO Ups Ante Against IBM with Copyright Claim (Reuters). Reuters - The SCO Group Inc. on Friday added two claims of copyright infringement to its year-old, $3 billion lawsuit against IBM, lifting potential damages to $5 billion, according to court documents.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  What to Get My Geek for Valentine's Day?
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  [ GLSA 200402-01 ] PHP setting leaks from .htaccess files on virtual hosts
5.  Re: http://www.smashguard.org
6.  [Fwd: zyxel prestige ethernet information leakage]
7.  Surveillance Cameras in Britain Not Effective?
8.  Big Brother in Britain: Does more surveillance work?
9.  False Domain Info May Mean Jail
10.  Enhanced Penalties for Privacy
11.  Michigan Dems Vote Online

2:33:36 PM    

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Et Cetera: it's the weekend!. Round up with bits on AMD, more Internet voting, university deals with Napster, and more. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  NASA Engineers Dispute Hubble Safety Claim
----------------------------------------------------------------------
Meerkat: An Open Wire Service: O'Reilly Weblogs
----------------------------------------------------------------------
3.  Integrating IM Presence with Geo data. Instant Messaging Planet reports on IETF efforts to integrate location data with presence notification. Definitely a taste of the future here, and some issues that need to be dealt with.
4.  Microsoft Lawyer to Run Antitrust Panel for ABA. It sounds like an April Fool's joke. But it isn't. From the AP, via Dave Farber's IP List: "Microsoft associate general counsel Richard J. Wallis takes over as chairman this summer of the American Bar Association's antitrust section, an unusual role for a corporate lawyer. Even before Wallis' arrival, the panel is already organizing opposition to a congressional plan requiring more aggressive oversight by the courts of such antitrust settlements."...
5.  Clay Shirky on Internet Campaigning. End of discussion. Clay Shirky has written the definitive piece on what conclusions we ought to draw from Howard Dean's internet momentum and real world voting disappointment. (David Weinberger adds some insider perspectives to Clay's analysis. Even if you don't follow the internet in politics, this piece is worth a read.

1:33:16 PM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  Garbage house via eBay.

A SomethingAwful user has posted dozens of photos of the house he shares with his mother, who has some compulsion to order tchotchkes from eBay well beyond her ability to display or use them, so that the house is full of hundreds of unopened boxes of glass paperweights and god-knows-what. It's like a garbage house, but with bubblewrap and Mailboxes, Etc boxes instead of kittylitter (though she does have a lot of parakeets).

Link


2.  Physics of Haute Couture. BoingBoing reader Roland Piquepaille says:

In this article, Nature tells us that mathematicians have set up "equations that predict how fabric will fold." This theory of drapery could help fashion designers build clothes that hang straight. It also will allow computer animators to "model more realistically how clothes hang and move." "Mahadevan's equations could also allow clothing companies to give online shoppers a personalized, virtual view of how a garment will look on them -- something they are keen to do as web-based retailing gathers pace. This overview contains more details and references on wrinkles and crumples because one of the leading researchers studied them extensively. It also includes pictures of how a crumpled sheet exhibits deformations that are strongly localized around peaks and ridges and of "crow's feet" wrinkles that appear around people's eyes as they age.
Link
3.  Cool Tokyo-retro shopping arcade.

BoingBoing reader Rob Satterwhite says,

"This week Tokyo Q magazine is running a special feature on the Nakano Broadway complex in Tokyo. It's a very old shopping arcade that's now filled with tiny shops catering to all sorts of "otaku" collectors - shops selling comic books, collectible toys, cels from anime films, old movie posters, "costume play" shops selling full-size outfits for comic-book dress-up parties, etc.

"One of my favorite shops is Rough Toys, which specializes in "urban vinyl" - limited-edition artistic hiphop action figures from Hong Kong (Link). Another nice shop is Robot Robot (Link), where you can find Ren and Stimpy dolls and thousands of other cartoon-related toys. This article covers the entire complex, with links at the bottom to seven more short articles about some of the most interesting individual shops. "

Sweet! I'm dying for one of the Robot Robot shop logo t-shirts -- a stick-figure 'bot sketch captioned, "childhood obsession with robots drove us insanity." Link

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
4.  Canadian teen makes money from feud with Microsoft (AFP). AFP - A Canadian teenager who fought Microsoft Corp. over his Internet domain name has sold documents and e-mails pertaining to the feud on eBay for 1,386.83 Canadian dollars (1,040 US dollars).
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  BBC Argues Games Don't Cause Violence
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
6.  BugTraq: [Fwd: zyxel prestige ethernet information leakage]. Sender: DiSToAGe [distoage at sbbi dot net]
7.  BugTraq: Re: http://www.smashguard.org. Sender: Theo de Raadt [deraadt at cvs dot openbsd dot org]
8.  Vulnerabilities: All Enthusiast ReviewPost PHP Pro Multiple SQL Injection Vulnerabilities. ReviewPost PHP Pro is a web based bulletin board application written in PHP.

Multiple vulnerabilities have been reported to exist in the software that may allow an atta...

9.  Vulnerabilities: Web Crossing Web Server Component Remote Denial Of Service Vulnerability. Web Crossing is a collaboration server platform. Web Crossing ships with a Web Server component.

The Web Crossing Web Server component has been reported prone to a remot...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
10.  PHP_RABOW.A
11.  Book Review: Programming .NET Security
----------------------------------------------------------------------
About Internet/Network Security
----------------------------------------------------------------------
12.  Book Review: Programming .NET Security. O'Reilly Publishing generally publishes exceptional books- especially when it comes to programming. This book is no exception. Adam Freeman and Allen Jones have written a must-read book for anyone programming for .NET. There are a plethora of books on programming...

12:32:57 PM    

----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
1.  Chile IT's still awaiting takeoff. Knowledge@Wharton reports on the stops and starts in the creation of a digital economy in Latin America's most wired nation.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Requiem for the Record Store (washingtonpost.com). washingtonpost.com - With a total stock of more than 85,000 albums, Manifest Discs & Tapes was a music lover's mecca in the North and South Carolina towns where it operated. And despite an industry-wide downturn in CD sales in recent years, all five Manifest stores were turning a decent profit right up until the end of 2003.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  AMD Receives $683M for Dresden Plant
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
4.  BugTraq: [ GLSA 200402-01 ] PHP setting leaks from .htaccess files on virtual hosts. Sender: Tim Yamin [plasmaroo at gentoo dot org]
5.  Vulnerabilities: TYPSoft FTP Server Remote Denial Of Service Vulnerability. TYPSoft FTP Server is a freely available ftp server implemented for the Windows platform.

TYPSoft FTP server has been reported to be prone to a remote denial of service ...


11:32:36 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Programs: Stripping Adware/spyware from PC Can Be Tricky (Reuters). Reuters - One of the biggest challenges a computer owner can face is getting rid of adware or spyware, programs that can sneak onto your PC when you agree to download free utility software from the Web.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Configuring the 2.6 Linux Kernel

10:32:15 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Surveillance Cameras in Britain Not Effective?

9:31:56 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  TROJ_TMB.A
2.  BKDR_LAO.A

8:31:36 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  BKDR_SDBOT.EI
2.  Biometric systems security [WAS: Re: Hacking USB Thumbdrives, Thumprint authentication]

7:31:16 AM    

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Samsung Puts Satellite TV in Cell Phones
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
2.  Michigan Dems Vote Online. The Michigan Democratic Party opted to use an Internet voting system in Saturday's caucuses in hopes of boosting turnout. But experts say the system shares some of the security risks found in the scrapped Pentagon effort.
3.  Music Labels Raid Kazaa Offices. The music industry raids offices of Kazaa's parent company, Sharman Networks, in Australia, looking for evidence to bolster its copyright infringment case.
4.  Europe Has No Taste for GMOs. Foods labeled as free of genetically modified organisms sell briskly at a major food fair in Germany, but Wired magazine's Bruce Sterling sees a dark side. He says the potential benefits of GMOs are being overlooked in Europe.
5.  For Nonprofits, Web Is a Windfall. Online donations are surging. Among the big winners in 2003 were the American Society for the Prevention of Cruelty to Animals and Howard Dean's presidential campaign. By Amit Asaravala.
6.  False Domain Info May Mean Jail. Congress may pass a bill that would impose stiff penalties on people who don't give real names and addresses when registering domain names and go on to break a law. Kiss online anonymity goodbye, opponents say. By Ryan Singel.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
7.  [SECURITY] [DSA 435-1] New mpg123 packages fix heap overflow
8.  RE: [security] Re: Major hack attack on the U.S. Senate
9.  Re: BUG IN APACHE HTTPD SERVER 2.0.47/48 (to who replied me)
10.  Re: RFC: virus handling

6:30:57 AM    

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
1.  Pentagon Votes 'No' on SERVE
2.  Dotnetnuke Multiple Vulnerabilities
3.  RE: http://www.smashguard.org

5:30:36 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  How fanfic makes kids into better writers (and copyright victims). Here's an amazing Technology Review piece about how kids are writing Harry Potter fanfic and editing one-another's stories in order to become great and prolific writers. The author, Henry Jenkins, characterizes this as an "unconventional" way of teaching creative writing, but I think that fanfic is more conventional than he credits (the first story I wrote was set in the Star Wars universe; I was six -- and the first long-form work I wrote was a Conan pastiche, at 12). The biggest difference between the kids' fanfic of yore and that of today is that back in the old days, kids had no way to readily collaborate with one another on their creations -- nor to expose themselves to copyright infringement liability from overzealous rightsholders who indiscriminately shut down kids' sites with threatening letters.

FictionAlley, the largest Harry Potter archive, hosts more than 30,000 stories and book chapters, including hundreds of completed or partially completed novels. Its (unpaid) staff of more than 200 people includes 40 mentors who welcome each new participant individually. At the Sugar Quill, another popular site, every posted story undergoes a peer-review process it calls "beta-reading." New writers often go through multiple drafts before their stories are ready for posting. "The beta-reader service has really helped me to get the adverbs out of my writing and get my prepositions in the right place and improve my sentence structure and refine the overall quality of my writing," explains the girl who writes under the pen name Sweeney Agonistes?a college freshman with years of publishing behind her.

Like many of the other young writers, Agonistes says that Rowling's books provide her with a helpful creative scaffolding: "It's easier to develop a good sense of plot and characterization and other literary techniques if your reader already knows something of the world where the story takes place," she says. By poaching off Rowling, the writers are able to start with a well-established world and a set of familiar characters and thus are able to focus on other aspects of their craft. Often, unresolved issues in the books stimulate them to think through their own plots or to develop new insights into the characters.

Link

(via /.)

2.  Garbage house via eBay.

A SomethingAwful user has posted dozens of photos of the house he shares with his mother, who has some compulsion to order tchotchkes from eBay well beyond her ability to display or use them, so that the house is full of hundreds of unopened boxes of glass paperweights and god-knows-what. It's like a garbage house, but with bubblewrap and Mailboxes, Etc boxes instead of kittylitter (though she does have a lot of parakeets).

Link


----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
3.  Dilbert for 07 Feb 2004.
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
4.  Blaming the dark side of gaming. It is trite and irresponsible to accuse video games of promoting violence, argues BBCi's Daniel Etherington.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
5.  BugTraq: RE: http://www.smashguard.org. Sender: Hilmi Ozdoganoglu [cyprian at purdue dot edu]
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Re: Hysterical first technical alert from US-CERT
7.  CactuSoft CactuShop 5.0 Lite shopping cart software backdoor
8.  Apache-SSL security advisory - apache_1.3.28+ssl_1.52 and prior

4:30:17 AM    

----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
1.  iTunes blocks you from sharing music with YOURSELF, on your own computer. Rael has discovered another "feature" of iTunes: if you leave a copy of it running in one of my user accounts and switch to another, I'm blocked from launching it. That's right, iTunes is set up to keep you from sharing music with yourself.

It's silly enough that I can share my tunes across my home network yet I can't share them with someone on the same machine. Despite keeping all my music in /Macintosh HD/Users/Shared/Music, I still have to wander from account to account adding each new CD or iTunes Music Store purchase to each user's library just so that we can share _our_ (defined in the strictest sense) music. Surely your iTunes library on the local machine should show up in my iTunes window just like any other network-shared iTunes library?

You cannot open the application "iTunes" because another user has it open.
Ask the other user to quit the application, then try again.
[OK]

No, not OK.

Should I mistakenly leave "my copy" of iTunes open and wander off for a bit, there's no music for anyone until my return. No music for you! Nobody but an administrator capable of killing off other logins and processes has the ability to rectify this situation. Should every user really need to be an administrator to truly share this multi-user environment?

Link

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Kids Improve Writing Online
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Apache-SSL 'SSLFakeBasicAuth' Lets Remote Users Forge Client Certificates to Be Authenticated
4.  CactuShop Lite Backdoor Lets Remote Users Delete Arbitrary Files
5.  Wayne Rosso attacks Sharman's DCIA
6.  RealNetworks warns of media player security flaws
7.  Mydoom lesson: Take proactive steps to prevent DDoS attacks
8.  Re: Decompression Bombs [...missed something]

3:30:07 AM    

----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
1.  BugTraq: Re: Decompression Bombs [...missed something]. Sender: Bipin Gautam dot [door_hunt3r at blackcodemail dot com]
2.  BugTraq: Re: Hysterical first technical alert from US-CERT. Sender: [Valdis dot Kletnieks at vt dot edu]
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  RE: Hysterical first technical alert from US-CERT

2:29:45 AM    

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Ericsson, in a Surprise, Reports a Profit. The telecommunications equipment maker Ericsson surprised markets on Friday by reporting its first quarterly profit since 2001. By Heather Timmons.
2.  Asian-Americans Take Offense at a Law Firm Memo. Responding to a note seeking someone to adopt a puppy, a partner in the London office of the law firm of Dewey Ballantine wrote what some saw as an offensive message. By Jonathan D. Glater.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  RealNetworks warns of media player security flaws
4.  Mydoom lesson: Take proactive steps to prevent DDoS attacks

1:29:26 AM    

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Microsoft Expands Xbox Live in Asia (Reuters). Reuters - Microsoft Corp said on Thursday it would kick off its Xbox Live online gaming service in Taiwan, Hong Kong and Singapore in April, making inroads into Asian markets dominated by Sony's PlayStation 2 console.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Smog Busting Paint Breaks Down Noxious Gasses
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
3.  Update: SCO looks to widen Linux complaint against IBM. The SCO Group aimed more legal fire at IBM this week, filing a motion to amend its Linux complaint against the company ahead of a hearing due to take place Friday.

12:23:16 AM