Gregg's Security News Aggregator

Currently, this "blog" is nothing more than a news aggregator which

gets security information from over 30 sources. As you'll note,

a number of the sources are not specific to security. Advanced

filtering is definitely needed.


 




Subscribe to "Gregg's Security News Aggregator" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

 

 

  Saturday, March 13, 2004


----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Macworld Expo SF attendance numbers released; Boston next (MacCentral). MacCentral - Framingham, Mass.-based IDG World Expo on Friday will release attendance figures for January's Macworld Conference & Expo, held in San Francisco, Calif. Attendance for this year's show totaled 32,409, compared to 90,473 for the same Expo held in 2003. These numbers reflect a new accounting procedure implemented by IDG World Expo for January's show. According to the organizers, this does not represent an actual decrease in attendees.
2.  Enterprise Inns takes full control of Unique (FT.com). FT.com - Ted Tuppen, chief executive of Enterprise Inns, has ruled out any more big acquisitions after agreeing to take full ownership of the Unique pub estate in a £609m deal.
3.  Oracle's PeopleSoft Bid Opposed in Europe (AP). AP - European antitrust regulators have joined their U.S. counterparts in objecting to Oracle Corp.'s $9.4 billion hostile bid for rival PeopleSoft Inc., contending that the proposed merger would hurt the business applications software market.
4.  Popularity Growing For Open-Source Databases (TechWeb). TechWeb - Database systems built from open-source code are gaining in capabilities and enjoying rapid adoption by early users of new technology on IT staffs. The trend indicates that open-source databases "will move from the intellectual curiosity of 2003 to widespread mainstream use by 2006," a major analyst firm says in a recent report.
5.  Camera phones intensify competition in Asian mobile market (AFP). AFP - The rapidly growing popularity of camera phones among Asia's trendy consumers is proving to be a massive boost to the hopes of manufacturers playing catch-up to market leader Nokia, industry analysts said.
6.  Verizon Wireless Lets You Get Online and Get Out -- Quickly (washingtonpost.com). washingtonpost.com - For too many people around the Washington area, getting broadband access in their homes is somewhere between difficult, expensive and impossible. Last week, though, I had broadband anywhere I took a laptop -- in my living room, at my desk, in a deli and on a speeding Metro train.
7.  Justice, FBI Seek Rules for Internet Taps (AP). AP - Technology companies should be required to ensure that law enforcement agencies can install wiretaps on Internet traffic and new generations of digital communications, the Justice Department says.
8.  British Robot Unveiled to Help Disabled (Reuters). Reuters - A robot which looks and moves like a caterpillar to help the disabled in the home was unveiled in Britain on Thursday.
9.  U.S. Regulators to Weigh Anti-Spam Tactics (Reuters). Reuters - U.S. regulators said on Thursday they would seek to prevent "spam" messages from reaching mobile phones and consider setting up a registry of e-mail users who don't want to receive junk messages.
10.  Lindows Concedes Name Game to Microsoft in Benelux (Reuters). Reuters - Lindows.com Inc., a maker of low-cost computers running Linux software, on Friday said it had halted operations in the Netherlands, Belgium and Luxembourg in the latest round of its cat-and-mouse legal battle with Microsoft Corp. (MSFT.O).
11.  Desert Terrain Proves Too Rough for Robotic Racers (Reuters). Reuters - Thirteen robot vehicles set out on a 140-mile race across California's Mojave desert on Saturday with the goal of one day running missions in war zones without risking the lives of U.S. soldiers.
12.  Programs: Two Shooting Games Test Reflexes, Patience (Reuters). Reuters - (Gene Emery is a columnist who covers science and technology. His Internet address is GEmery(at)Cox.net. Any opinions in the column are his alone.)
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
13.  Check Point in Firewall-1 security flap
14.  MS releases double-plus critical security fix
15.  UK.gov announces hi-tech elite police squad
16.  The lawyers are coming

11:11:45 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Flashmobs with a purpose: Protests in Madrid organized by SMS, chatrooms. In Spain today, thousands gathered in the streets demanding answers from their government about this week's deadly terrorist attacks in Madrid. Bloggers in Spain tell BoingBoing that these gatherings were decentralized "flash mobs", organized primarily by short text messages sent via Internet-capable mobile devices, and online in chatrooms and weblog forums.

Around 6PM local time in Madrid, an estimated total of 3,000-5,000 protesters gathered spontaneously in front of the headquarters of Spain's ruling "Partido Popular" party, located on calle Genova. Participants shouted slogans against media manipulation, and carried signs asking, "Who did it?". The flashmob extended throughout the country, as parallel gatherings were spontaneously organized by SMS in other cities.

The protests occurred one day before general elections take place in Spain. Government representatives denounced today's gatherings, describing them as illegal assemblies -- but because they were organized in a decentralized manner using mobile technology, there was no one responsible party against whom punitive action could be taken.

Some supporters of president Aznar accused Cultura Contra la Guerra of initiating the text-messages calling for protests. The well-known art-protest group is a collective of artists and performers, and was originally founded to protest Spain's support for the US administration's war in Iraq.

"Whether or not that's true, I don't know -- today was a long day filled with intense emotion for people throughout the country," says Cadiz-based blogger Antonio Delgado of caspa.tv. "Right now -- at 3AM -- it's hard to think clearly. The only thing that matters now is that everyone needs to get out and vote tomorrow."

Blog coverage at Caspa.TV, Barrapunto, commentary and live on-the-scene observations by popular Spanish web pundit Nacho Escolar here. Some photos are here, including the one above. More news: NYT (eng), El Mundo (SP), and Corriere (Italian).

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Interview with Matthew Dillon of DragonFly BSD

10:11:24 PM    comment []

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  A Kurosawa Epic Turned Video Game. Seven Samurai 20XX, a PlayStation 2 game based on Akira Kurosawa's 1954 masterpiece, "Seven Samurai," was made with the cooperation of the filmmaker's son. By Robert Levine.
2.  Covet That Car? For a Price, You Can Cut in Line. If you must be the first on your block to drive one of this year's hottest cars, Internet-based auctions are making it easier to jump to the head of the line. By Fara Warner.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Paris Hilton Primps for 'Simple' Trip (AP). AP - In the sequel to Paris Hilton and Nicole Richie's hit Fox reality show "The Simple Life," the socialites-turned-TV stars are driving themselves on a 30-day cross-country trip with no money, credit cards, cell phones or boyfriends.
4.  Justice, FBI Seek Rules for Internet Taps (AP). AP - Technology companies should be required to ensure that law enforcement agencies can install wiretaps on Internet traffic and new generations of digital communications, the Justice Department says.
5.  Desert Terrain Proves Too Rough for Robotic Racers (Reuters). Reuters - Thirteen robot vehicles set out on a 140-mile race across California's Mojave desert on Saturday with the goal of one day running missions in war zones without risking the lives of U.S. soldiers.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Oracle Application Server Web Cache Vulnerabilities; Port 65506

9:11:04 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Intel Plans CPU Naming Change
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
2.  Vulnerabilities: Multiple BEA WebLogic Server/Express Denial of Service and Information Disclosure Vulnerabilities. BEA Systems has released patches for multiple vulnerabilities in various versions of BEA WebLogic Server and Express. The following issues were reported:

Servers impleme...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  TROJ_DELF.BM
4.  Trojan.Mitglieder.E
----------------------------------------------------------------------
About Internet/Network Security
----------------------------------------------------------------------
5.  March 2004 Microsoft Security Bulletins. Last Tuesday was the monthly Microsoft Security Bulletin and patch release day. Three new bulletins were released: MS04-008 affects Windows Media Services. MS04-009 affects Microsoft Outlook 2002. And, MS04-010 affects MSN Messenger. For more information and the links to the...

8:10:43 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Signing EST Monday at SXSW, loving from Entertainment Weekly. A reminder: I'm signing copies of Eastern Standard Tribe tomorrow Monday at SXSW at 1:30, immediately following the Bloggie Award Ceremony on the trade-floor.

If you're not a registered attendee at SXSW, you can get a free trade-floor pass here.

And on that note, check out the sweet lovin' I got in this week's Entertainment Weekly: "Clerks meets Startup.com... Tribe is packed with big ideas."

----------------------------------------------------------------------
Penny Arcade!
----------------------------------------------------------------------
2.  The Hipness Threshold.
----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
3.  Balky Old New York Embraces Technology. A technological revolution in New York City government is rapidly changing the way that agencies carry out their functions and provide services to residents. By Winnie Hu.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
4.  Verizon Wireless Lets You Get> ----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  I, Robot Trailer Available
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
6.  Vulnerabilities: Invision Power Board Multiple Cross-Site Scripting Vulnerabilities. Invision Power Board is prone to multiple cross-site scripting vulnerabilities.

The issues appear to affect the index.php script and are due to insufficient sanitizati...

----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
7.  DARPA's Grand Challenge proves to be too grand. RoboFlop
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  WORM_BAGLE.M
9.  PE_BAGLE.N
10.  Houston Chronicle: Feds want ability to install wiretaps on Internet "Technology companies shoul...
11.  Security Tracker - Macromedia vulnerabilities: Flash | Dreamweaver "File Permission Setting Lets...
12.  Security Focus: Voice over IP Security "Careful planning and architecture, borrowed from our dat...
13.  CNet: FBI adds to wiretap wish list [pdf] "A far-reaching proposal from the FBI, made public Fri...
14.  eCommerce Times: The End of Passwords "The way passwords are used is dangerous right now"

7:10:25 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Potty mouth and lab-reports: an unbeatably funny combination. Now this is a funny lab report, from a very frustrated solderer of germanium to wire.
Check this shit out (Fig. 1). That's bonafide, 100%-real data, my friends. I took it myself over the course of two weeks. And this was not a leisurely two weeks, either; I busted my ass day and night in order to provide you with nothing but the best data possible. Now, let's look a bit more closely at this data, remembering that it is absolutely first-rate. Do you see the exponential dependence? I sure don't. I see a bunch of crap.

Christ, this was such a waste of my time.

Banking on my hopes that whoever grades this will just look at the pictures, I drew an exponential through my noise. I believe the apparent legitimacy is enhanced by the fact that I used a complicated computer program to make the fit. I understand this is the same process by which the top quark was discovered.

Link(via Chewy)
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Verizon Wireless Lets You Get Online and Get Out -- Quickly (washingtonpost.com). washingtonpost.com - For too many people around the Washington area, getting broadband access in their homes is somewhere between difficult, expensive and impossible. Last week, though, I had broadband anywhere I took a laptop -- in my living room, at my desk, in a deli and on a speeding Metro train.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  TROJ_RB32.A
4.  FBI pushes for broadband wiretap powers
5.  Legislators Urge E-Voting Halt
6.  New Study Reveals Corporate Privacy Spending Patterns
7.  Data mining initiative angers US privacy groups
8.  Sen. Nelson: Outsourced Jobs Threat To Privacy
9.  Wisconsin, New York Unplug Matrix

6:10:03 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Signing EST tomorrow at SXSW, loving from Entertainment Weekly. A reminder: I'm signing copies of Eastern Standard Tribe tomorrow at SXSW at 1:30, immediately following the Bloggie Award Ceremony on the trade-floor.

If you're not a registered attendee at SXSW, you can get a free trade-floor pass here.

And on that note, check out the sweet lovin' I got in this week's Entertainment Weekly: "Clerks meets Startup.com... Tribe is packed with big ideas."

2.  Kim Stanley Robinson on what Martian water means for science fiction. Kim Stanley Robinson, who is, on the one hand, the author of a brilliant, seminal series of novels about terraforming Mars has written a grand, overarching survey of the speculative literature of the Red Planet for the NYT, in the wake of the discovery of Mars's aquaeous history.
Meanwhile, the feedback loop between science and science fiction continues to flow. It is, as we have seen, an elliptical loop, like the orbit of a comet. Science-fiction writers seize on new scientific findings and immediately leap to conclusions, in the form of stories. Then these stories dive into young minds and percolate there, shaping future scientists and giving them dreams, visions, plans.

Leap and percolate. These days I sometimes hear from young people who tell me they are studying some kind of science because of my Mars books. ("But you forgot to mention the math.") I feel like part of the science-fiction loop. I still follow the latest Mars news, and sometimes I wonder what the next wave of Mars stories will be like.

It seems awkward. I suppose the thing to do would be to tell the story of the robot rovers, because that's what we're going to have for a while. Maybe rovers much more powerful than Spirit and Opportunity -- artificial intelligences, in fact, and happy to be on Mars, because it's the world they were designed for, and they're protecting an indigenous cryptoendolithic, or hidden in rock, bacterial culture they have discovered. So that when humans finally arrive in person, it's a disaster in the making for all concerned, and the rover artificial intelligences and little red people have to play dumb and play ghost and change humanity for the good of all, and . . .

Link (via Nelson)
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Canadian Record Industry Presses ISPs in Court
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
4.  Vulnerabilities: Multiple Vendor Internet Browser Cookie Path Argument Restriction Bypass Vulnerability. An Internet cookie is a piece of data sent by a Web server to a user's Internet browser in order to keep track of an active session. Cookies provide for an optional path ...

5:09:44 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Ian McDonald's Hearts, Hands and Voices. Just a quick plug for The Broken Land (originally published in the UK with the much better title Hearts, Hands and Voices), by Ian McDonald. McDonald is one of the great underappreciated science fiction writers of the twentieth century and this is one of his great, underappreciated novels. It's a biotech parable for the Irish Catholic/Protestant conflict, and the bones of that conflict are fleshed with one of the saddest, funniest, strangest stories I've ever read. Start with the Ancestor Tree, on which the heads of the recently dead are spiked, where their brains are kept alive and linked into an (ahem) neural net that makes an oracle out of the combined wisdom of all the dear departed. When the ancestors grow old, the bark grows over their eyes and they go into a dreamtime of bio-computational fantasy. There's an adventure story in here, and a coming of age story, and a lot of deeply kinky biotech thinking, and some of the most poetic prose I've ever read.
2.  NARC video game encourages players to get high as power-ups. The remake of the NARC video-game encourages players to bust dealers, steal their stashes, and use the confiscata as performance-enhancing power-ups.
You're still a cop and you're still looking to take out the dealers and suppliers. And, odds are you'll pick up the cash and drugs scattered about once again. The hook is: In the new "N.A.R.C.", your character can -- and is, in fact, encouraged to -- ingest those drugs.

Looking to slow time around you -- a la "The Matrix" or "Max Payne"? Take a toke. Marijuana puts you into "weed time." Not sure who the bad guys are? Drop some LSD and enemies will appear to have giant devil heads. Moving too slow? A little speed will take care of that, letting you zip around and fight at an incredibly fast pace.

Link (via Costikyan)
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Paris Hilton Primps for 'Simple' Trip (AP). AP - In the sequel to Paris Hilton and Nicole Richie's hit Fox reality show "The Simple Life," the socialites-turned-TV stars are driving themselves on a 30-day cross-country trip with no money, credit cards, cell phones or boyfriends.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  Grand Challenge 1, Competitors 0
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
5.  Vulnerabilities: ATFTP Get File Local Buffer Overflow Vulnerability. atftp is a TFTP client/server implementation for Linux and Unix variants.

atftp is prone to a locally exploitable buffer overflow condition. This issue is due to insuff...

6.  Vulnerabilities: ATFTP Blocksize Command Line Argument Local Buffer Overflow Vulnerability. atftp is a TFTP client/server implementation for Linux and Unix variants.

atftp is prone to a locally exploitable buffer overflow condition. This issue is due to insuffi...


4:09:24 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Sims Online presidential elections. Alphavilla, the capital city of The Sims Online, is having a presidential election. At issue is the appropriate means of warning newbiess off of scam artists, and threcruitment and training of virtual intelligence agents and cops.
Indeed, differing approaches to protecting newbies from scams have evolved as the central issue in the presidential campaign. And while Mr-President seems highly popular and likely to fend off his opponent next month, he could lose to a candidate seen as tougher on scammers.

If she survives Saturday's primary, that candidate could be Ashley Richardson -- the avatar name of a 16-year-old girl named Laura. Of four candidates running in the previous round, she got the most votes out of 213 cast by trumpeting her platform of confronting scammers and giving newbies as much help and welcome as possible.

Link (via /.)
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
2.  Getting the most out of open source. Knowledge@Wharton takes up the question of how open an open-source operating system can be and still survive in the commercial world.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Many Early Breakdowns in Robotic Desert Race (Reuters). Reuters - Thirteen robotic vehicles set out on a 140-mile race across the Mojave desert in California on Saturday with the goal of one day running dangerous missions in war zones without risking the lives of U.S. soldiers.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  Is Security Holding VoIP Back?
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
5.  BugTraq: phpBB 2.0.6d && Earlier Security Issues. Sender: JeiAr [security at gulftech dot org]
6.  Vulnerabilities: OpenSSL ASN.1 Parsing Vulnerabilities. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. OpenSSL does not directly implement ASN.1 but does use ASN.1 objects in X.509 certificates a...
7.  Vulnerabilities: Software602 602Pro LAN Suite Web Mail Cross-Site Scripting Vulnerability. 602Pro LAN SUITE is a all-in-one server application that includes a Web Mail functionality and is maintained by Software602 for Microsoft Windows platforms.

It has been ...

8.  Vulnerabilities: Software602 602Pro LAN Suite Web Mail Installation Path Disclosure Vulnerability. 602Pro LAN SUITE is an all-in-one server application that includes a Web Mail functionality and is maintained by Software602 for Microsoft Windows platforms.

It has been...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  Microsoft trying to fix Hotmail problems
10.  MySQL addresses open-source license problem
11.  Risk management seen as key to IT security
12.  Study: Spam Filters Often Lose E-Mails
13.  Hosting company reveals hacks, citing disclosure law
14.  UK companies hit by rise in costly hacking and phishing attacks
15.  Model security from Microsoft?
16.  McDonald's Wi-Fi recipe could define industry
17.  Voice over IP Security

3:09:04 PM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Broadened FBI wiretapping powers would require net fixes. Yesterday the FBI made public its new proposal for wiretapping powers that would powerfully extend such powers to broadband services such as DSL and cable-based access. By Ken "Caesar" Fisher.
2.  Intel plans to dispel the megahertz myth which served so well. Fate would have it that Intel, the market leader, would rise (or some might say shrink) to the task of dispelling the myth. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  U.S. Plans Targeted Draft for Computer Personnel
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
4.  Vulnerabilities: Invicta WMCam Server Remote Denial Of Service Vulnerability. wMCam server is a web-camera server implemented to run on the Microsoft Windows platform and is commercially available.

It has been reported that wMCam is prone to a rem...

5.  Vulnerabilities: GdkPixbuf Unspecified Bitmap Handling Denial Of Service Vulnerability. GdkPixbuf is a Gnome library that provides functions to load and display images of multiple formats. GdkPixbuf is used in many GNOME utilities, including Evolution mail ...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  TROJ_BANCOS.K

2:08:44 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Sims Online Presidential Campaign Shapes Up
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
2.  BugTraq: [SECURITY] [DSA 463-1] New samba packages fix privilege escalation in smbmnt. Sender: Matt Zimmerman [mdz at debian dot org]
3.  Vulnerabilities: Mozilla Browser Cookie Path Restriction Bypass Vulnerability. Mozilla is an open source web browser available for a number of platforms, including Microsoft Windows and Linux. Internet cookies are intended as an infrequent storage m...
4.  Vulnerabilities: F-Secure Anti-Virus For Linux Unspecified Scanner Bypass Vulnerability. F-Secure Anti-Virus For Linux is a Linux-based virus scanner that may be integrated with mail servers.

F-Secure has reported an unspecified vulnerability in their Anti-V...

5.  Vulnerabilities: Mozilla Browser Proxy Server Authentication Credential Disclosure Vulnerability. Mozilla Browser is reportedly prone to an information disclosure vulnerability that may disclose user credentials to a malicious server.

It has been reported that when a...

6.  Vulnerabilities: Mozilla Browser Script.prototype.freeze/thaw Arbitrary Code Execution Vulnerability. Mozilla is prone to a vulnerability that may theoretically permit remote attackers to execute arbitrary code.

The issue is in the JavaScript Script.prototype.freeze/th...

7.  Vulnerabilities: GNU Anubis Multiple Remote Buffer Overflow and Format String Vulnerabilities. GNU Anubis is an outgoing email processor. Anubis is developed to process and format email after it leaves the MUA and before it reaches the MTA.

GNU Anubis has been rep...

8.  Vulnerabilities: Multiple Vendor S/MIME ASN.1 Parsing Denial of Service Vulnerabilities. Multiple vulnerabilities have been reported to be present in various implementations of S/MIME protocol. S/MIME is used to send binary data and attachments across e-mail...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  HP HTTP Server Certificates Can Be Compromised By Remote Users

1:08:24 PM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Oman Mobile Telecommunications Company set up ahead of privatization (AFP). AFP - As part of moves to privatize state monopoly Omantel, Oman Mobile Telecommunications Company (OMTC) has been set up to provide mobile telecommunication services in the sultanate, officials said.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Bell Labs Plants Nanograss to Cool Mobile Chips
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Plaxo Input Validation Flaw in Job Title Field Lets Remote Users Conduct Cross-Site Scripting Attacks

12:08:04 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Free and unencumbered exotica. Dave sez, "Hello and welcome to Comfort Stand Recordings, a not-for-profit community driven label where all releases are free for download with artwork and liner notes. Having no business model or profit motive we strive to bring you recordings that we find interesting, compelling and downright enjoyable. Everybody needs free music." This is pretty good exotica/tiki tuneage right here.

Link (Thanks, Dave!

2.  Binary LED watch from TokyoFlash. New from TokyoFlash, purveyors of fine and impractical Japanese hipster novelty watches: the LED by Binary. It's a watch with a naked printed circuit board, on which are situated 10 LEDs, which glow to display the time in binary notation. ¥8900.00 -- about $80. Link
3.  Korn's new video damns the music industry. Korn's new video for "Y'all Want a Single? Fuck That," consists of the band trashing a record store, screaming the chorous, while a suprisingly eloquent rant against the recording industry's treatment of artists and the radio oligopolies' top-40 mentalitity scrolls past. The band reveals that they released the video against its label's wishes and urges you to "steal" it. <a href="mms://spark.wm.llnw.net/a32/external/0102cABAAHQAAAAcDle6yKhvE1c0LnEJnNwFajD8QD92LOnSD/kornkamp/explicit_hi.wmv">Streaming WMV Link (via MeFi)
4.  Digital Preservation panel at SXSW this Monday. Somehow, I missed reporting on this panel when I listed my SXSW stuff: I'm on a panel on Digital Preservation on Monday, 15 March, at 3:30 in room 15:
We take for granted that our cultural artifacts will last. It offends and horrifies us when we learn of decaying archaeological sites, looted museums and burning libraries. However, our digital heritage does not afford the durability that we enjoy with cave paintings, cuneiform tablets or even paper. How will digital content preserve its legacy? (Aaron Choate; Tanya Rabourn, Information Architect - MetLife; Barbara Taranto; Cory Doctorow , Outreach Coord - Electronic Frontier Foundation; Adam Greenfield , v-2 Organisation)
Link
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
5.  Justice, FBI Seek Rules for Internet Taps (AP). AP - Technology companies should be required to ensure that law enforcement agencies can install wiretaps on Internet traffic and new generations of digital communications, the Justice Department says.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
6.  MySQL Writes Exception for PHP in License
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
7.  Ban on doctors' 'tips' website. An internet site showing how much doctors demand in cash tips has been branded illegal in Hungary.
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
8.  Vulnerabilities: Sun Solaris Multiple Unspecified Local UUCP Buffer Overrun Vulnerabilities. Sun has reported that Solaris is prone to multiple unspecified local buffer overruns in the uucp utility. Insufficient bounds checking of data passed to the uucp binary ...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  WORM_NACHI.E
10.  US hosting company reveals hacks, citing disclosure law

11:07:44 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Hitachi Makes 400-Gigabyte Hard Drive (AP). AP - Digital media hogs can celebrate. A new, whopping 400-gigabyte hard drive from Hitachi Global Storage Technologies can store up to 400 hours of standard television programming, 45 hours of high-definition programming or more than 6,500 hours of digital music.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Halloween X Author Mike Anderer Speaks Out
----------------------------------------------------------------------
SecurityFocus Vulnerabilities
----------------------------------------------------------------------
3.  Vulnerabilities: Python getaddrinfo Function Remote Buffer Overflow Vulnerability. Python is an open source, object oriented programming language.

A buffer overflow vulnerability has been identified in Python that may allow a remote attacker to execute...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  Adv-20040312.txt
5.  extcompose.txt
6.  OpenPKG-SA-2004.006...>
7.  hydra-3.1.tar.gz
8.  netmrg-0.14.tar.gz
9.  grsecurity-1.9.14-2...>

10:07:29 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  MobilCom hopes to recover part of UMTS licence investment (AFP). AFP - The German telephone company MobilCom may seek to recover part of a multi-billion-euro investment in a UMTS operating licence from the German government, a company spokesman said.
2.  Programs: Two Shooting Games Test Reflexes, Patience (Reuters). Reuters - (Gene Emery is a columnist who covers science and technology. His Internet address is GEmery(at)Cox.net. Any opinions in the column are his alone.)
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  TROJ_ISTBAR.T
4.  TROJ_TINYBAR.A

9:37:14 AM    comment []

----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
1.  Bond blockbuster game falls short. James Bond gets a new lease of life in the latest game of the series, but it fails to excite.

8:36:53 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Hiring may give some a chance to switch (SiliconValley.com). SiliconValley.com - About a year ago, Jeff Lujack's small software company started outsourcing some development work. Lujack wasn't laid off, but he found himself spending more and more time managing engineers who worked in India, rather than doing what he enjoyed: writing code himself.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Fifteen Teams Selected for DARPA Grand Challenge
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Identix contract reaffirmed

7:36:33 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Popularity Growing For Open-Source Databases (TechWeb). TechWeb - Database systems built from open-source code are gaining in capabilities and enjoying rapid adoption by early users of new technology on IT staffs. The trend indicates that open-source databases "will move from the intellectual curiosity of 2003 to widespread mainstream use by 2006," a major analyst firm says in a recent report.
2.  USB Tokens Smaller, Cheaper, More Secure (TechWeb). TechWeb - USB authentication tokens are back, and they're better than ever. With new form factors, hideaway LCD screens and ground-breaking multifactor authentication, the new-style keys are smaller, more sophisticated and more secure than any of their predecessors.
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
3.  Best, Brightest Bots Make Cut. It's off to the races for the 15 lucky teams that qualified for the Grand Challenge, Saturday's robot race across the Mojave Desert sponsored by Darpa. The self-navigating bots are competing for a $1 million prize.
4.  Bush Site Unplugs Poster Tool. The president's campaign website featured a tool for making banner-sized posters with slogans. When opponents started concocting anti-Bush doozies, the Bush camp took it down. By Chris Ulbrich.
5.  Pentagon Harbors Wild Space Plans. Much to the military's dismay, the United States doesn't have space to itself. Now Darpa is working hard to find ways to get ahead in the space race. Noah Shachtman reports from Anaheim, California.
6.  See Astrophysicists in Captivity. It's a branch of science incomprehensible to most, and its practitioners usually labor in obscurity. The American Museum of Natural History attempts to demystify astrophysics by putting real scientists on display as they work. Michelle Delio reports from New York.
7.  Lost E-Votes Could Flip Napa Race. Napa County discovers that one of its e-voting machines did not count ballots correctly in California's primary election. The county may have to recount 11,000 ballots, and change the outcome of at least one close race. By Kim Zetter.
8.  Wisconsin, New York Unplug Matrix. Two more states pull out of the interstate criminal and antiterrorism database known as the Matrix. Wisconsin had joined just a few weeks ago, but once the cost and privacy ramifications became clear, the state reconsidered. By Ryan Singel.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  GAO: Savings from IT integration at DHS hard to pin down
10.  PKI appliance goes for selective security

6:36:14 AM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  FBI Adds to Wiretap Wish List
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
2.  PKI appliance goes for selective security
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Security Tracker: cPanel 'dohtaccess' Input Validation Flaw Permits Cross-Site Scripting Attacks
4.  Security Focus: Hosting company reveals hacks, citing disclosure law "Texas-based Allegiance Tel...
5.  Security Focus: F-Secure SSH Server Password Authentication Policy Evasion Vulnerability "allows...
6.  Info World: Speaking freely with VoIP "If you know what you're doing, you can make VoIP reasonab...
7.  Info World: Rethinking IDS "A jerk lurking at a hotspot with a public domain sniffer can potenti...
8.  Internet Week: HotSpotVPN Provides Easy, Inexpensive Hotspot Security "The best protection again...
9.  More Security Holes News...

5:35:55 AM    comment []

----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
1.  Dilbert for 13 Mar 2004.
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
2.  UI Wars: Sony loves Symbian - grits teeth. Consortium's future in the balance
3.  US hosting company reveals hacks, citing disclosure law. 'The right thing to do'
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  CERT Summary CS-2003-01
5.  CA-2003-11 : Multiple Vulnerabilities in Lotus Notes and Domino
6.  CA-2003-12 : Buffer Overflow in Sendmail
7.  What is my Role in Information Survivability? Why Should I Care?
8.  Updated CERT/CC Statistics
9.  CA-2003-13 : Multiple Vulnerabilities in Snort Preprocessors
10.  Making a Compelling Business Case for Investing in Information Security
11.  Updated CSIRT Handbook
12.  CERT Summary CS-2003-02
13.  OCTAVE Implementation Guide
14.  Congressional Testimony
15.  IN-2003-01: Malicious Code Propagation and Antivirus Software Updates
16.  New CERT. Certification for Computer Security Incident Handlers
17.  CA-2003-14 : Buffer Overflow in Microsoft Windows HTML Conversion Library
18.  Updated CERT/CC Statistics
19.  CA-2003-15 : Cisco IOS Interface Blocked by IPv4 Packet
20.  CA-2003-16 : Buffer Overflow in Microsoft RPC
21.  CA-2003-17 : Exploit Available for the Cisco IOS Interface Blocked Vulnerabilities
22.  CA-2003-18 : Integer Overflows in Microsoft Windows DirectX MIDI Library
23.  CA-2003-19 : Exploitation of Vulnerabilities in Microsoft RPC Interface
24.  IN-2003-02: W32/Mimail Virus
25.  CA-2003-20 : W32/Blaster worm
26.  W32/Blaster Recovery Tips
27.  CA-2003-21 : GNU Project FTP Server Compromise
28.  IN-2003-03: W32/Sobig.F Worm
29.  CA-2003-22 : Multiple Vulnerabilities in Microsoft Internet Explorer
30.  Use Care When Reading Email with Attachments
31.  OCTAVE-S Implementation Guide
32.  CERT Summary CS-2003-03
33.  Congressional Testimony
34.  CA-2003-23 : RPCSS Vulnerabilities in Microsoft Windows
35.  CA-2003-24 : Buffer Management Vulnerability in OpenSSH
36.  CA-2003-25: Buffer Overflow in Sendmail
37.  Press Release: Creation of US-CERT
38.  Digital Millenium Copyright Act (DMCA) Comments and Testimony
39.  IN-2003-04: Exploitation of Internet Explorer Vulnerability
40.  CA-2003-26 : Multiple Vulnerabilities in SSL/TLS Implementations
41.  State of the Practice of Computer Security Incident Response Teams
42.  Staffing Your Computer Security Incident Response Team  What Basic Skills Are Needed?
43.  New PGP Key
44.  CA-2003-27 : Multiple Vulnerabilities in Microsoft Windows and Exchange
45.  Updated CERT/CC Statistics
46.  CA-2003-28 : Buffer Overflow in Windows Workstation Service
47.  New Tech Tip: Before You Connect a New Computer to the Internet
48.  System for Internet Level Knowledge (SiLK)
49.  CA-2004-01 : Multiple H.323 Message Vulnerabilities
50.  Updated CERT/CC Statistics
51.  IN-2004-01: W32/Novarg.A Virus
52.  CA-2004-02 : Email-borne Viruses
53.  Employment Opportunities
54.  What is a Distributed Denial of Service (DDoS) Attack and What Can I Do About It?
55.  CERT/CC Current Activity
56.  CERT/CC Current Activity

4:35:35 AM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Smarter Children Through Food Supplements
----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
2.  I'm not sure if it's really SXSW without Rebecca and JJG, Kottke and Meg, Derek and Heather, or Ben and Mena, but we'll try.
3.  My complaints about winning the animated version of Lord of the Rings at last year's Break Bread with Brad prompted Brad to joke that I'd get something even worse this year. And so the fates resident in Leonard's EFF hat conspired to send me home with Twang! The Ultimate Book of Country Music Quotations.

3:35:14 AM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Finalists prepare for today's DARPA Grand Challenge. Fifteen finalists qualify for the DARPA Grand Challenge although none are expected to finish the rugged course. By Fred "zAmboni" Locklear.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Congratulations to Vickie Palley - Washington D. C. PandaMania Select Artist

2:34:54 AM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Et Cetera: Friday night or Saturday morning edition. Round up of random news including OSS WiFi drivers from Intel, new ATi Catalyst drivers, new version of BitTorrent, a game of twenty questions, and more... By Matt Woodward.
2.  Will tubes or wires dominate in next-generation nanoscale electronics?. While nanotubes have been hyped for next-generation electronics, nanowires may beat them to the punch. By Fred "zAmboni" Locklear.
----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
3.  Mobile fiction micropublishing. Interesting Japanese publishing model: send 1.6k of serialized new fiction to subscribers' phones every day.
The bestselling novel Deep Love was self-published in installments by the author on a website that offers content packaged for users of mobile phones. The story is about a 17-year-old girl named Ayu, who finds love through a chance encounter.

The author, who calls himself Yoshi, created a website providing content for mobile phones in May 2000 with an investment of just ¥100,000 ($909.09 at ¥110 to the dollar). Using a promotional campaign that consisted of passing out business cards to about 2,000 high-school girls in front of Tokyo's Shibuya Station (the center of Tokyo youth culture), Yoshi released The Story of Ayu, the first installment in the longer novel. News of the novel spread by word of mouth, and within three years the site had received a total of 20 million hits.

Mobile phones can receive e-mail of up to 1,600 characters. While this is more than adequate for most personal use, the limit presents unique challenges to the author of a novel. Yoshi, however, not only managed to overcome this challenge but even turned it to his advantage by keeping the prose concise and fast-paced. The novel maintains a straightforward, conversational style and avoids the use of difficult words. Thanks to this quality, the story has found favor even among people who do not typically read novels.

Link(via Engadget)
----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
4.  G.E. Signals a Growing Interest in Solar. General Electric will acquire the assets of the largest American-owned maker of solar equipment, in a move the solar power industry sees as a vote of confidence in the business. By Barnaby J. Feder.
5.  U.S. Wins Ruling in Mexico Case. The United States said it had won a victory at the World Trade Organization that could save people billions of dollars on phone calls to Mexico. By Reuters.
6.  An M.R.I. Machine for Every Doctor? Someone Has to Pay. Syracuse is the epicenter of a high-tech medical arms race, as doctors, their traditional sources of income squeezed, discover a new one: diagnostic imaging. By Reed Abelson.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
7.  Second Generation Homebrew PVR Devices
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
8.  EU regulators inform Oracle of merger objections. Company says it will address the issues in a written reply
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  Top Port: epmap 135
10.  Compaq Web Management, BJs Alerts of Possible Credit Card Theft
11.  Making e-mail identity work - Infoworld Staff
12.  Speaking freely with VoIP - Infoworld Staff
13.  Ten tips for evaluating and deploying IPS and IDS - Infoworld Staff
14.  Rethinking IDS - Infoworld Staff

1:34:33 AM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Howard Stern calls fair game on Bush. Howard Stern is calling on his 8 million listeners (and their friends andfamily) to vote anti-Bush in the next election.
Stern had strongly backed Bush's war on Iraq, but in the past two weeks, he has derided the president as a "Jesus freak," a "maniac" and "an arrogant bastard," while ranting against "the Christian right minority that has taken over the White House." Specifically, Stern has assailed Bush's use of 9/11 images in his campaign ads, questioned his National Guard service, condemned his decision to curb stem cell research and labeled him an enemy of civil liberties, abortion rights and gay rights.
Link
2.  Everquest widows tell all. Everquest Daily Grind is a place where video-game widow(er)s post their personal stories of life with MMO-addicts who ignore spouse, kids, jobs and life for the game.
Last spring my grandmother passed away, and he was so involved in the game that he wasn't there for me. I would go to his house when I only had an hour, and the hour would go by and he would play, and I would sit there, and then I'd have to leave without so much as a kiss. There would be nights when I'd go to sleep there, and wake up at 5 or 6am and he'd still be playing because his guild needed him, or he was retrieving his corpse - which as I'm reading is a popular line!
Link (via evHead)
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
3.  Easier Internet Wiretaps Sought (washingtonpost.com). washingtonpost.com - The Justice Department wants to significantly expand the government's ability to monitor online traffic, proposing that providers of high-speed Internet service should be forced to grant easier access for FBI wiretaps and other electronic surveillance, according to documents and government officials.
4.  Tech Buyers Replacing PCs, Software Next-Study (Reuters). Reuters - U.S. corporate technology spending is moving into a new stage of recovery as demand for computers and network essentials leads to outlays for software and services, International Data Group said on Wednesday.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  Integer Overflows Add Up to Real Security Problems
6.  cPanel 'dohtaccess' Input Validation Flaw Permits Cross-Site Scripting Attacks
7.  Information Assurance in Small Organizations
8.  Considering Operational Security Risks During System Development

12:34:13 AM    comment []


Click here to visit the Radio UserLand website. © Copyright 2004 Gregg Doherty.
Last update: 4/3/2004; 12:16:57 AM.

March 2004
Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      
Feb   Apr