Gregg's Security News Aggregator

Currently, this "blog" is nothing more than a news aggregator which

gets security information from over 30 sources. As you'll note,

a number of the sources are not specific to security. Advanced

filtering is definitely needed.






Subscribe to "Gregg's Security News Aggregator" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
 

 

Friday, April 09, 2004
 

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Out of Hollywood, Rising Fascination With Video Games. Directors are expected to earn as much money or even more from helping create video games as from making movies. By Laura M. Holson.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Consumer Electronics Make Music
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
3.  Vulns: Intel LAN Management Server Setup Utilities Configuration Vulnerability. Intel produces server boards and platforms that are configurable via a LAN using the Intelligent Platform Management Interface (IPMI). This functionality allows remote a...

11:23:13 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Owen Wilson's Celeb-Blog?. A sekrit source, who is a well-known entertainment industry journalist in LA, tells BoingBoing that the anonymous weblog of "Rance" is rumored to belong to Owen Wilson. Anonymous boingboing readers have since chimed in to suggest that it may belong to Benicio Del Toro, George Clooney, Mr. Potato Head, Osama Bin Laden, or Jeffrey "can of whupass" Skilling. Choire at Gawker weighs in, but I don't think he's being serious there. Who knows? Remember: rumors in Hollywood are a dime a dozen. Just like blogs.

Link

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  RepeatSeat Answers Call for Phone Ticketing (Reuters). Reuters - Can you hear me now? RepeatSeat hopes so, as it introduces cell-phone tickets to U.S. event-goers this year.
3.  Court Says Web Porn Law Blocks Free Speech (Reuters). Reuters - Just as the U.S. Supreme Court is preparing to review the Child Online Protection Act, a Virginia court has declared unconstitutional a state law that aims to block sexually explicit material on the Internet.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  FirstClass Client Buffer Overflow in Processing PROXYADDR Parameter Lets Local Users Execute Arbitrary Code
5.  News: Lamo sentencing postponed
6.  Apple responds to Trojan Horse Advisory (MacCentral)
7.  Reader Review: How I Use Open-Source Tools To Stunt Spam
8.  Open-Source Software Accurately Sorts Your Mail
9.  WebInspect Detects Site Defects
10.  Safe and Sound
11.  Always-On WLAN Monitor
12.  CoreStreet's Real Time Credentials Validation Authority
13.  Eye on the Servers
14.  Security Appliances: Little Boxes, Big Bite
15.  Watch Out For Pop-Up Spams Selling Pop-Up Spam Blockers (Strom)
16.  Security Best Practices Should Come Top Down
17.  Dealing With MyDoom
18.  Metrics for CSOs, by CSOs
19.  Fundamentals: Wanted: Integrated Security
20.  All The Rage: Linux: The Hacker's New Target
21.  All The Rage: Don't Count On Microsoft
22.  All The Rage: Look Who's Lobbying
23.  Links To Anti-Spam Resources
24.  Legal Measures Hard-Pressed To Defeat Spam
25.  Anti-Spam Techniques
26.  Inside The Network Intrusion-Prevention Hype
27.  China's Wi-Fi Security Stance Ruffling Feathers
28.  How To Think Like a Hacker
29.  Security Threats Won't Let Up
30.  Fighting Spam, Fueling Growth
31.  Protected From Prying Eyes
32.  Identity Management Takes Hold
33.  Patriot Act Compliance Isn't Easy
34.  The Need For Identity Management

10:22:52 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  George Clooney's Celeb-Blog?. Sekrit sources say the anonymous weblog of "Rance" is rumored to belong to Owen Wilson. New sekrit sources now tell BoingBoing it more likely belongs to George Clooney. Gawker concurs. But remember: rumors in Hollywood are a dime a dozen. Just like blogs.

Link

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  Apple responds to Trojan Horse Advisory (MacCentral). MacCentral - Apple Computer Inc. responded on Friday to an advisory issued by security software-maker Intego on Thursday. Apple said they were aware of the issue outlined by Intego and that they were investigating. While one security analyst doesn't feel this is a very big deal, he does note that this incident gives absolute proof of the vulnerability.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  P2P News Syndication?
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
4.  Microsoft to trim Longhorn ambitions. SAN FRANCISCO - Microsoft Corp. is sacrificing some features it planned for Longhorn as it works to deliver its first beta of the next Windows client next year, a company spokesman said.
5.  Java, BPELJ hailed. Java is getting promotional boosts in the form of a gathering of vendors touting the latest Java specification and a whitepaper pertaining to BPELJ (Business Process Execution Language for Java), which links Java and Web services business processes.
----------------------------------------------------------------------
SecurityFocus News
----------------------------------------------------------------------
6.  News: Lamo sentencing postponed. The hacker's judicial fate won't be decided until June, or later.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
7.  Intego: Q&A about the MP3 Concept Trajan Horse "Intego, the Macintosh security specialist, yeste...
8.  Computer World: Corporate security workgroup announces recommendations "Guidelines call for the ...
9.  Security Focus: Microsoft Internet Explorer Macromedia Flash Player Plug-in Remote Denial of Ser...
10.  BBC News: Experts talk up text security "Mobile phone users concerned that David Beckham's much ...
11.  ZDNet: Security tool more harmful than helpful? "The common wisdom in the security world is that...
12.  Net Security: O'Reilly Releases "Network Security Assessment" "An increasingly popular approach ...
13.  ZDNet: Security issues move Linksys routers off the short list "Linksys is apparently having som...
14.  Cybersecurity task force sparks debate
15.  Liability time bomb
16.  MP3Concept
17.  Power-Grid Operator Crafts Software To Prevent Blackouts
18.  Australian Spam Act Goes Into Effect

9:22:33 PM    comment []

----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
1.  Briefly: Yahoo's Semel gets raise, stock. Plus: Infosys launches consulting unit...Accenture names new CEO...Priceline.com chairman steps down.
2.  Conn., Ohio join Oracle suit. After Michigan joined the antitrust suit days earlier, Ohio and Connecticut bring the total to 10 states working with the Justice Dept. to block Oracle's hostile takeover of PeopleSoft.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Philips Demos Keychain-sized Camcorder
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
4.  AT&T expands managed storage push. AT&T Corp. introduced an e-mail archiving service this week, joining other telecommunications companies that are trying to persuade corporate users to add outsourced and managed storage services to their voice and data contracts.
----------------------------------------------------------------------
InfoWorld: Security
----------------------------------------------------------------------
5.  Cybersecurity task force sparks debate. Rift develops over who decides standards
6.  Liability time bomb. You haven’t heard about big data-security lawsuits so far, but it’s just a matter of time
----------------------------------------------------------------------
SecurityFocus News
----------------------------------------------------------------------
7.  News: Lamo sentencing postponed
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  California Power-Grid Operator Hopes New Technology Can Prevent Blackouts
9.  Death2Spam: The Name Says It All
10.  Law, spam, and 4899/tcp

8:22:15 PM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Longhorn being trimmed, XP reloaded to be marketing campaign. Longhorn will be following in the proud footsteps of Windows 2003, being released without significant portions of its planned advancements. One such causality will be WinFS. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Penny Arcade!
----------------------------------------------------------------------
2.  Djinn And Juice.
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
3.  Yahoo's Semel gets raise, stock. Yahoo CEO Terry Semel got a $150,000 raise in 2003 and was also awarded 2.9 million in new stock options, according to a regulatory filing.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  Chess Improves Machines and Humans Alike
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
5.  Grids at forefront of cluster show. ClusterWorld Conference & Expo might as well have been dubbed GridWorld, given the tenor of discussions at the San Jose, Calif., event last week. Keynote speeches from grid expert Ian Foster and Andrew Mendelsohn, senior vice president of database and server technologies at Oracle, capped the event by placing grid computing center stage.
6.  The mainframe also rises. Big Blue celebrated the 40th anniversary of its first mainframe by unveiling a lower-cost version of its flagship e-Server zSeries z990 mainframe.

ADVERTISEMENT:

Receive a FREE>SunTone Initiative is designed to help you optimize the delivery and management of mission critical IT services.
Click here to learn more

7.  Microsoft and Sun: The morning after. The saga of sniping and legal wrangling between Sun Microsystems and Microsoft is finally over. But is it feel-good posturing or a harbinger of joint development?
8.  The rush to RFID. In an airport at Frankfurt, Germany, a maintenance worker crawls through the cramped ventilation system, wearing a small device that reads data from chips positioned throughout the system to verify that he’s done his job. At a U.S. theme park, a teenager on a waterslide wears a special wristband with an embedded chip that will remember how many rides he has taken, no matter how wet he gets. And at a large drug company’s warehouse, a shipment of the regulated narcotic OxyContin gets tagged with chips to track its route, and discourage theft and counterfeiting.
9.  Transforming data to business logic. The proliferation of RFID readers and tags has valign="top">10.  UPS pilots an RFID rollout. How is UPS,
7:21:53 PM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Puritanical DVD players and derivative works. Wal-Mart and K-Mark are gearing up to sell a new $79 RCA DVD player that purports to playback DVDs with so-called questionable content removed. The capabilities are made possible by technologies developed by Clearplay, a Salt Lake City-based company. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
2.  CSS shakedown issues with Konquerer/Safari. There's some shakedown issues with the new CSS layout and Konquerer/Safari -- we're working on it. In the meantime, beware the quantities of whitespace. Aaaand they're fixed. Metafilter Matt, we owe you one.
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
3.  OS X flaw may leave Macs open to virus attacks. Apple says it is investigating a French security firm's claim that it has found a way to trick Mac computers into opening potentially harmful files.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
4.  States Seek to Join Oracle Antitrust Suit (AP). AP - Ohio, Michigan and Connecticut want to join an antitrust lawsuit seeking to block Oracle Corp.'s $9.4 billion bid for business software rival PeopleSoft Inc., saying they're trying to protect taxpayers.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  Microsoft Authorized Refurbishers
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
6.  FCC to rule on billion-dollar spectrum giveaway. A battle royal over spectrum is heating up once more in the cellular industry with Nextel Communications on one side and Verizon Wireless taking a leadership position representing most of the other wireless carriers on the other side.
7.  Cybersecurity task force sparks debate. WASHINGTON - A cybersecurity task force convened by a U.S. House subcommittee chairman released a series of recommendations this week, but some of the results created rifts between IT vendors and security advocates, including a request to allow IT purchasers to band together to dictate security standards to vendors.
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
8.  Vulns: Blaxxun Contact 3D X-CC3D Browser Object Buffer Overflow Vulnerability. Blaxxun Contact 3D is software that provides an environment and API to produce active multi-media web content. Blaxxun Contact 3D installs a browser object that handles x...
9.  Vulns: TCPDump ISAKMP Decoding Routines Denial Of Service Vulnerability. tcpdump is a freely available, open source network monitoring tool. It is available for the Unix, Linux, and Microsoft Windows operating systems.

A vulnerability has be...

----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
10.  No Windows XP SE as Longhorn jettisons features. Just get this steer out of the door By Andrew Orlowski .
11.  Apple DMCA sends iTunes DRM decryptor offshore. India bound By Andrew Orlowski .
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
12.  Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties,Technical details, Exploits ...)
13.  Re: IPv4 fragmentation --> The Rose Attack
14.  ANNOUNCE: SecLegal mailing list
15.  Gentoo: iproute Denial of service vulnerability
16.  Gentoo: pwlib Multiple vulnerabilities
17.  Gentoo: Heimdal Cross-realm scripting vulnerability
18.  Mandrake: ipsec-tools Signature non-verification vulnerability
19.  Gentoo: Scorched 3D Format string attack vulnerability
20.  Adrian Lamo sentencing postponed
21.  Apple responds to Trojan horse advisory

6:21:34 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  CSS shakedown issues with Konquerer/Safari. There's some shakedown issues with the new CSS layout and Konquerer/Safari -- we're working on it. In the meantime, beware the quantities of whitespace.
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
2.  Tech group urges action on health care mandates. The Information Technology Association of America tells IT providers targeting the health care sector to pay close attention to the details of the HIPAA legislation, or risk legal consequences.
3.  Sun kills UltraSparc V, Gemini chips. Sun Microsystems discontinues development of the two planned chips as it retrenches in a difficult era for the company.
4.  Microsoft reins in Longhorn for 2006 launch. It's aiming to release the Windows update by the first half of 2006--which means scaling back some of its more ambitious plans for features.
5.  Accounting questions delay Salesforce IPO. Federal regulators have taken issue with a change in accounting methods at software maker Salesforce.com, prolonging their scrutiny of the company's plans to offer its stock for public trading.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
6.  Mac OS X Attacked by Trojan Horse (NewsFactor). NewsFactor - Mac users are used to feeling safe as their Windows-based brethren scramble to address security flaws. Now a security firm has discovered what may be the first Trojan horse created to attack Mac OS X.
7.  IBM Calls Daksh Buy Strategic Move (NewsFactor). NewsFactor - IBM (NYSE: IBM) says it will buy an Indian call-center company Daksh eServices for an undisclosed price. Big Blue, which will complete the purchase next month, says the acquisition gives it more presence in the burgeoning Indian I.T. market.
8.  Microsoft Partners on Mainframe Migration (NewsFactor). NewsFactor - Microsoft (Nasdaq: MSFT) is turning its attention to the mainframe, enlisting COBOL software provider Micro Focus International as a partner in the push to move enterprise applications onto the Windows OS platform.
9.  Sun's Microsoft Mistake (Ziff Davis). Ziff Davis - Sun's Microsoft deal will only hurt it in the long run and puts an end to the idea of open-sourcing Java, Linux & Open-Source Center Editor Steven Vaughan-Nichols says.
10.  Dell Sees Rise in Corporate Spending (NewsFactor). NewsFactor - Dell (Nasdaq: DELL) says corporate spending on I.T. products is beginning to strengthen. The company announced that it is shipping more personal computers and other devices in the quarter than it previously forecasted.
11.  Appeals Court Stays Cable Internet Ruling (Reuters). Reuters - A court ruling that could have forced cable companies to offer customers a choice of Internet service providers has been suspended while regulators and cable companies appeal to the U.S. Supreme Court.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
12.  The Pure Software Act of 2006
13.  Are You Reporting Your Internet Purchases?
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
14.  Vulns: Panda ActiveScan ascontrol.dll Denial of Service Vulnerability. Panda ActiveScan is an antivirus application for detecting and eliminating malicious code.

A denial of service vulnerability has been identified in the application that...

----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
15.  Chip start-up boosts Wi-Fi rate by '10-20 times'. The Engim room By Wireless Watch .
16.  Vodafone promises multi-network moves. But Wi-Fi will force pricing rethink By Wireless Watch .

5:21:21 PM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  P2P News Networks: will they fly?. Music and movies are distributed via P2P, why not daily news? It may just happen. By Matt Woodward.
----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
2.  Owen Wilson's Celeb-Blog?. Sekrit sources say the anonymous weblog of "Rance" actually belongs to Owen Wilson. But then, rumors in Hollywood are a dime a dozen.

Link

3.  The $14 SteadyCam. $14 steadycamBrian sez: "For less than 5% of the price of a real Steadicam (the ones made for small video cameras go for about $900), you can apparently build your own "Steady-Cam" for $14 with parts from a hardware store. The sample video makes it look pretty good. Great gift for the amateur videographer in your life who refuses to use a tripod, the bastard. (Oh, and stabilized images compress much better for the Web, too.)" Link
4.  Good time waster: simple sliding tile puzzle. nooffMy dad sent me the url to this java-based slider tile puzzle, and it has killed half my work day so far. He solved it in 48 moves. I guess 44 is the minimum. I can't solve it! If everyone who reads Boing Boing spends ten minutes on it, it will result in 312.5 man-days of wasted time! (It didn't work in Safari for me; I had to use IE) Link
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
5.  Switches look to security to recapture lost luster. When the dot-com boom went bust so did the market for switches that shuttle traffic between servers, but as security concerns mount, these network elements have found new ways to make themselves useful.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
6.  U.S. Music Sales Turnaround Continued 1Q (AP). AP - Online file-sharing and other digital piracy persist, but a gradual turnaround in U.S. music sales that began last fall picked up in the first quarter of this year, resulting in the industry's best domestic sales in years.
7.  Electronic Filing of Taxes Sets Record (AP). AP - Taxpayers have been filing electronic tax returns in record numbers, the Internal Revenue Service reported one week before the April 15 filing deadline.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
8.  Overseas Crooks Abuse TTY Phone Service
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
9.  Adrian Lamo sentencing postponed. BOSTON - A planned sentencing hearing Thursday for noted computer hacker Adrian Lamo has been postponed, a spokeswoman for the U.S. Attorney's Office for the Southern District of New York said.
10.  Apple responds to Trojan horse advisory. Apple Computer Inc. responded on Friday to an advisory issued by security software-maker Intego Inc. on Thursday. Apple said they were aware of the issue outlined by Intego and that they were investigating.
11.  Sun ready to Rock without UltraSparc V. Sun Microsystems Inc. has decided to drop the next-generation UltraSparc V from its road map in favor of its recently disclosed Rock processor, signaling a shift in the strategic direction of the company's processor division.
----------------------------------------------------------------------
InfoWorld: Security
----------------------------------------------------------------------
12.  Adrian Lamo sentencing postponed. It remains unclear whether postponement signals breakdown in agreement
13.  Apple responds to Trojan horse advisory. Company is investigating issue outlined by security firm Intego
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
14.  Mandrake: ipsec-tools Signature non-verification vulnerability
15.  Gentoo: Scorched 3D Format string attack vulnerability
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
16.  BugTraq: ANNOUNCE: SecLegal mailing list. Sender: Thor Larholm [thor at pivx dot com]
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
17.  No Windows XP SE as Longhorn jettisons features. Team told: get this steer out of the door By Andrew Orlowski .
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
18.  Mac OS X Attacked by Trojan Horse
19.  Rumor has it Foundstone is being purchased by Network Associates
20.  RE: Browser bugs [DoS] ... where will you draw a line?
21.  LCDproc Format String and Buffer Overflows Let Remote Users Execute Arbitrary Code
22.  Les remèdes au spam

4:21:01 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Apple I clones for sale.

This guy has built a working Apple I clone, which will run old Apple I software, and has posted PDFs of the original Apple I manuals.

Link

(Thanks, Ahm!)


2.  Playfair bullied offline by Apple, reappears on Indian site. PlayFair, the free software project that allowed you to strip the copy-restriction wrapper off of your iTunes Music Store tracks, has been removed from SourceForge in response to a threatening letter, apparently from Apple. It has been relocated to a server in India, and development continues apace.

Link

(Thanks, Jonathan!)

3.  Canada's NDP leader endorses P2P. Jack Layton is the leader of the NDP, Canada's left-wing New Democratic Party, and is in the running for Prime Minister of Canada in the next election. On the heels of Canada's landmark court decision that essentially legalized file sharing, Layton has turned P2P into an election issue, endorsing file-sharing as a beneficial activity, a gutsy move, considering the Party's close ties with the arts (the NDP has traditionally endorsed strong arts-spending):

"I'm a holder of a copyright myself. But it's a book on homelessness and I don't mind if anyone wants to copy it," he says with a grin. "I'm still not so sure how (file sharing) impacts sales -- some studies even say it enhances them. I don't think the dust has settled on this yet. When I was at university there was a great fear that photocopying was going to destroy the publishing industry and that hasn't happened. It's sometimes best to muddle along, take things one step at a time and see what happens. Society can have a way of sorting things out."

Link

(Thanks, Simon!)

4.  American "Japgrish" tattoos. It's all well and good to snigger at "Engrish" -- weird, random Englishoid phrases printed on Japanese garmets and packaging, but check this out: the Chicago Tribune went out and looked at the "Japanese" characters tattooed on five Chicagoans and had them translated, then compared the results with what the bearers thought their ink meant.

* What he thinks his tattoo says: "strength" and "courage."

* What it actually says: The left part of the symbol appears to say "dog," while the right part conveys something along the lines of "time moving into the past." Smushed together, the two symbols amount to gibberish.

Link

(via MeFi)

5.  Promising anti-obesity pill. Rimonabant is a drug from a French pharma outfit whose clinical trials show remarkable results in controlling appetite with minimal side-effects. It's being hailed as a drug with the potential to practically address the obesity epidemic.

Dr. Despres led a trial of rimonabant in 1,036 overweight patients at high risk for heart problems. All patients were told to cut their food intake by 600 calories daily. Those who received a 20-mg dose lost an average of 20 pounds and trimmed their waistlines by three inches in one year. Those given placebos lost an average of five pounds.

Link

6.  Photo of a male whale's reproductive organ. In the interest of zoology, here is a link to a photograph of a whale's penis. (Probably not safe for work) Link
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
7.  OS X flaw may leave Macs open to virus attacks. Apple says it is investigating a French security firm's claim that it has found a way to trick Mac computers into opening potentially harmful files.
8.  Week in review: Microsoft's new ballpark figures. With a new baseball season getting under way, the software slugger is playing ball with Windows users. But for Mac and Linux fans, a new MSN offering looks more like a shutout.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
9.  Judge: Copyright Doesn't Cover All Sites (AP). AP - A U.S. District Court judge has ruled a Florida company's Internet-searching software program did not infringe on copyrights held by another Web site.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
10.  PlayFair Pulled Due to DMCA Request
11.  Stoplights to Mete Out Punishment?
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
12.  Tracking the Blackout bug
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
13.  BugTraq: RE: Browser bugs [DoS] ... where will you draw a line?. Sender: Drew Copley [dcopley at eeye dot com]
14.  BugTraq: Re: IPv4 fragmentation --> The Rose Attack. Sender: Darren Reed [avalon at caligula dot anu dot edu dot au]
15.  BugTraq: Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...). Sender: Romain Francoise [romain at orebokech dot com]
16.  BugTraq: Re: DoS in Rsniff 1.0. Sender: Luigi Auriemma [aluigi at altervista dot org]
17.  Vulns: CUPS Unspecified Configuration Vulnerability. CUPS, Common Unix Printing System, is a widely used set of printing utilities for Unix based systems.

It has been reported that CUPS is prone to an unspecified configura...

18.  Vulns: Apple Mac OS X Mail Undisclosed HTML Handling Vulnerability. Apple Mac OS X Mail is the e-mail processing application for Mac OS X.

Apple Mail has been reported prone to an undisclosed vulnerability. The issue is reported to prese...

19.  Vulns: KDE Personal Information Management Suite VCF File Remote Buffer Overflow Vulnerability. KDE Personal Information Management Suite (kdepim) helps users organize mail, tasks, appointments, contacts etc. It is packaged with KDE, a graphical desktop for the X W...
20.  Vulns: Citrix MetaFrame Password Manager Failure To Encrypt Application Password Vulnerability. MetaFrame is a remote desktop software package distributed by Citrix. A vulnerability in MetaFrame Password Manager is reported to exist that may result in a failure to p...
21.  Vulns: Adobe Photoshop COM Objects Denial of Service Vulnerability. Adobe Photoshop is a graphics editing software.

A vulnerability has been identified in the application that may allow remote attackers to crash an instance of Microsoft ...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
22.  Security Tracker: Sun Solaris sshd May Fail to Log SSH Client IP Addresses
23.  Secunia: Cisco IPSec VPN Services Module "Denial of Service Vulnerability"
24.  Metasploit 2.0 exploit framework released
25.  Cisco Default Username and Password in WLSE and HSE
26.  Cisco LEAP Authentication Protocol Vulnerability Exploit Tool Released
27.  Bugbear.C using IE CHM Exploitation
28.  Rumor has it Foundstone is being purchased by Network Associates
29.  Linux Vendors Question Forrester Security Report
30.  Secret hackers to aid war on internet fraud
31.  Arrests key win for NSA hackers
32.  Joint Statement about GNU/Linux Security
33.  Networking improvements in the 2.6 kernel
34.  ROI: A Measure Of IT Success
35.  AFICK: Another File Integrity Checker
36.  Firm invites experts to punch holes in ballot software
37.  Understanding Patches
38.  Email attack could kill servers
39.  The Issue of Compliance - It’s Here and It’s Expanding!
40.  Tracking the Blackout bug
41.  RE: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties,Technical details, Exploits ...)
42.  Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties,Technical details, Exploits ...)
43.  Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties,Technical details, Exploits ...)
44.  Re: DoS in Rsniff 1.0
45.  Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...)
46.  LCDproc Buffer Overflow in Processing Too Many Arguments Lets Remote Users Execute Arbitrary Code

3:20:41 PM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Marketers, Music Sites Find It Takes Two To Tango (AdWeek.com). AdWeek.com - On the heels of Pepsi's co-promotion with Apple's iTunes, advertisers and music-downloading sites are pairing up to jockey for a share of what could be a $3 billion industry by 2009.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Losing His Religion: Adrian Lamo Interview
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
3.  BugTraq: Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...). Sender: Chris Wysopal [cwysopal at atstake dot com]
4.  BugTraq: DoS in Rsniff 1.0. Sender: Luigi Auriemma [aluigi at altervista dot org]
5.  Vulns: Floosietek FTGate Mail Server Multiple Input Validation Vulnerabilities. FTGate is a family of email server software supporting such features as webmail, anti-virus and even dial up networking. The software is commercially available for the M...
6.  Vulns: Multiple Monit Administration Interface Remote Vulnerabilities. Monit is a utility for Linux and Unix operating systems that is designed to monitor processes, devices, files, and directories. The application makes use of an HTTP/HTTPS...
7.  Vulns: Cups Internet Printing Protocol Job Loop Denial Of Service Vulnerability. CUPS is a freely available, open source UNIX printing utility. It is freely available for the Unix and Linux platforms.

A problem has been identified in the handling of...

8.  Vulns: Xine Bug Reporting Script Insecure Temporary File Creation Vulnerability. xine is a multimedia player for Unix/Linux variants.

The xine bug reporting scripts (xine-bugreport and xine-check) create temporary files in an insecure manner.

The ...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  Apple responds to Trojan Horse Advisory (MacCentral)
10.  Spam Still Growing, CAN-SPAM No Deterrent
11.  Researcher Claims Free Virus Scanners Flawed
12.  Security Tools More Harmful Than Helpful?
13.  Security tool more harmful than helpful?
14.  The Metasploit Project
15.  New Windows Vulnerability in Help System
16.  Alert TA04-099A - Vulnerability in Internet Explorer ITS Protocol Handler
17.  Privacy Digest Wish List - Just a few things to help me keep this site going.

2:20:21 PM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  Music executives want to see more expensive online music sales. Prices are going up. It's common to find albums selling for $14 online as opposed to that originative $10 mark, and the music industry is finding that selling singles online hurts the bottom line. By Ken "Caesar" Fisher.
2.  Itanium and Xeon to become compatible. This week Intel confirmed that they are planning to make both future versions of the Xeon and Itanium 2 processors socket-compatible. By 2007, Xeon and Itanium 2 CPUs will be pluggable into the same motherboards. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
3.  Metafilter Matt CSSifies Boing Boing. Thanks to Matt Haughey, Boing Boing is now (mostly) CSS based! Still waiting to CSSify the guestbar, but that's gonna have to wait until after we've migrated it to MT. The rendering should be much faster (and more standards-compliant) now, though the bandwidth savings will be negligible, due to the fact that mod_gzip compresses redundant font, etc tags.

Thanks again, Matt!

4.  The truth about camel spiders. camel_spiderHere's the myth about camel spiders, the monsters of the Iraqi desert.
"Supposedly they leap onto the backs of camels and suck out the blood. I've been told that a couple of these things can kill a full grown camel."
Link

"Here's the lowdown on camel spiders, which aren't spiders at all:

In reality, camel spiders aren't some mysterious Arabian creature -- we have them in the United States and in Mexico, where they are called matevenados. They are slightly smaller than the human hand, and while they do run quickly, their top speed is 10 miles per hour, not 25. But they also make no noise, they excrete no venom, and although they can be voracious nocturnal predators, they don't eat camels. They eat delicious crickets and pillbugs, and sometimes scorpions."
Link
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
5.  Apple responds to Trojan Horse Advisory (MacCentral). MacCentral - Apple Computer Inc. responded on Friday to an advisory issued by security software-maker Intego on Thursday. Apple said they were aware of the issue outlined by Intego and that they were investigating.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
6.  Local Area Security Linux LiveCD
7.  The Heavyweight Sea Snail
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
8.  BugTraq: RE: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...). Sender: Richard M dot Smith [rms at computerbytesman dot com]
9.  BugTraq: Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...). Sender: Geoffrey [esoteric at 3times25 dot net]
10.  BugTraq: Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...). Sender: Chris Johnson [johnson at nmr dot mgh dot harvard dot edu]
11.  Vulns: Floosietek FTGate Mail Server Path Disclosure Vulnerability. FTGate is a family of email server software supporting such features as webmail, anti-virus and even dial up networking. The software is commercially available for the M...
12.  Vulns: Gentoo Portage Sandbox Insecure Temporary Lockfile Creation Vulnerability. Portage is the package management system, based on rsync that is used by Gentoo Linux.

Gentoo portage has been reported prone to an insecure temporary file creation vuln...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
13.  9 Apr W32/Agobot-GA
14.  baggle x gaat langzaam vooruit
15.  Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...)
16.  MDKSA-2004:027 - Updated ipsec-tools packages fix vulnerability in racoon
17.  Re: IPv4 fragmentation --> The Rose Attack
18.  monit 4.1 POC

1:20:01 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Battery recharges in 30 seconds. Details are sparse, but NEC Corp announced they've developed a battery that can power a minidisc player for 80 hours yet takes only 30 seconds to recharge! "The company will initially try to commercialize the technology for using the battery as an emergency power source for computers, according to sources at NEC." Link

2.  Computers, Freedom and Privacy reg is open. Reg has just opened for this year's Computers, Freedom and Privacy conference (April 20-23, Berkeley CA), one of the world's oldest and most important tech-policy events (check out the program for items like this one:)

Wardriving, Wireless Networks, and the Law

Wireless networks are exploding in popularity, but are difficult to secure. Locating insecure networks & advertising their locations has become a sport known as "wardriving". We examine the Pen Register Act, the Wiretap Act, the Electronic Communications Privacy Act, the Computer Fraud & Abuse Act to evaluate criminal & civil liability which may apply to wardriving.

Panelists: Steve Schroeder, CCIPS consultant; Simon Byers, AT&T; Kevin Bankston, EFF

Link

(Thanks, Jason!)

3.  Distributed audiobook for Down and Out. Jill Smith has begun a distributed audiobook project for my novel Down and Out in the Magic Kingdom, whose new, liberal Creative Commons license allows for exactly this kind of mishegas (see the distributed audiobook project for Lessig's Free Culture for an example of how well this can work). She's recorded a reading of the prologue and posted it to the Internet Archive's public submission area, where open-licensed material is hosted for free.

I'm immensely gratified by this -- audiobooks are my favorite nontextual medium for storytelling and I can't fall asleep at night without one. I would love for others to take Jill's lead and finish it out.

Link

(Thanks Jill!)

----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
4.  Heads up VoIP--regulation incoming. Though the FCC indicated that it favors applying a light hand on Internet telephony, it's clear that it will not completely escape regulation or taxation.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
5.  Hollywood Video Game (washingtonpost.com). washingtonpost.com - Video game companies are bolstering their presence in Los Angeles (and most notably, Tinseltown), taking cues from their moviemaking brethren in hopes of developing more blockbuster games.
6.  Engineers' eBay auction yields encouraging response (SiliconValley.com). SiliconValley.com - The San Francisco engineers who auctioned themselves on eBay after their jobs were offshored seem to have scored big.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
7.  Microsoft Clips Longhorn
8.  The State of OpenGL
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
9.  PHRACK Call for Papers
----------------------------------------------------------------------
[O.S.S.R]
----------------------------------------------------------------------
10.  Microsoft Clips Longhorn
11.  Growing acceptance of Linux has dark side
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
12.  BugTraq: [ GLSA 200404-11 ] Multiple Vulnerabilities in pwlib. Sender: Aida Escriva-Sammer [aescriva at gentoo dot org]
13.  BugTraq: [ GLSA 200404-12 ] Scorched 3D server chat box format string vulnerability. Sender: Kurt Lieber [klieber at gentoo dot org]
14.  BugTraq: Browser bugs [DoS] ... where will you draw a line?. Sender: Bipin Gautam [visitbipin at hotmail dot com]
15.  BugTraq: Re: Full-Disclosure is now ILLEGAL in France ! (Vulnerabilties, Technical details, Exploits ...). Sender: Chris Johnson [johnson at nmr dot mgh dot harvard dot edu]
16.  Vulns: F-Secure Anti-Virus Unspecified Scanner Bypass Vulnerability. F-Secure Anti-Virus For Linux is a Linux-based virus scanner that may be integrated with mail servers. F-Secure Anti-Virus for MIMEsweeper is an Anti-Virus extension for ...
17.  Vulns: Microsoft Internet Explorer MSWebDVD Object Denial of Service Vulnerability. A denial of service vulnerability has been identified in Internet Explorer that may allow remote attackers to cause an instance of the browser to crash.

The issue exists...

18.  Vulns: Microsoft Internet Explorer Macromedia Flash Player Plug-in Remote Denial of Service Vulnerability. Macromedia Flash is a modular package designed to enhance web browsing, and enables users to view various multimedia web content.

A remote denial of service vulnerabili...

----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
19.  DB2 Web Service Provider security
20.  Improving web application security
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
21.  Don't let spin engulf ID cards
22.  Cisco Warns Customers of Vulnerability
23.  Joint Effort on Security Urged
24.  System Can Detect Fraudulent Passports
25.  It Security More Important Than Cost Cuts, Say UK Firms
26.  Microsoft beefs up executive ranks of security business unit
27.  Webroot Software Introduces Spam Shredder
28.  MCI Strengthens Remote-Access Security, More
29.  Second Cisco WLAN Security Threat Exposed
30.  Mass-Mailing Worm Has Backdoor Component
31.  Growing acceptance of Linux has dark side
32.  PHRACK Call for Papers
33.  Bruno Brocheton (Euro Disney) : « Flexibilité et agilité, deux qualités indispensables au DSI »

12:19:40 PM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Spaced Out on the Interplanetary Internet. My latest article for TheFeature.com is online. It's about the Interplanetary Internet, NASA's effort to extend cyberspace into outerspace. TCP/IP co-inventor Vint Cerf is one of the project leaders. I hadn't heard much about InterPlanet since it was first announced in 1998, so I was surprised to find out that their open source architecture code had recently been publicly released. A ".mars" address is still quite a few years off, but the latest InterPlaNet research may have applications on Earth-based connectivity as well. Link
----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
2.  Microsoft offers charity-friendly software license. The software maker creates a program that allows charities to use donated PCs without breaking its software licensing rules.
3.  Windfall predicted for chip gear makers. Gartner expects that sales of semiconductor manufacturing equipment will surge by 40 percent this year, building on a strong performance in 2003.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
4.  Apple Makes Noise (washingtonpost.com). washingtonpost.com - For years, owning Apple Computer Inc. stock was like owning an Apple computer -- a vote of confidence in a company that sometimes seemed as if it would be crushed any day by larger competitors, chiefly Microsoft Corp.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
5.  Spiderman 2 Trailer
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
6.  Growing acceptance of Linux has dark side
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
7.  Sun shelves UltraSPARC V in favor of the great unknown. Gemini toast too By Ashlee Vance .
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  Nederland tapland weer op politieke agenda
9.  Vind en dicht lekken met het Metasploit Project
10.  Biometrisch beveiligde USB stick bekeken

11:19:24 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  WS-Security: Microsoft, Sun Work Behind the Scenes (Ziff Davis). Ziff Davis - The release of the WS-Security specification by OASIS this week offers a glimpse into a world of improved interoperability for the enterprise via Web services. Microsoft and Sun's recent accord may speed the interop process, experts say.
2.  Microsoft, Sun Detail Legal Deal (PC World). PC World - Software giant can pay million to prevent patent lawsuits, Sun says.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Auto-Censoring DVD Player
4.  MagLev Trains Annoyingly Loud
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
5.  Boeing, StarHub to explore in-flight broadband roaming. The Boeing Co.'s Connexion by Boeing (CBB) unit and Singaporean telecommunications operator StarHub Pte. Ltd. have signed an initial agreement to let StarHub users access in-flight Internet services offered by CBB and have charges billed to their StarHub account, the companies said Thursday.
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
6.  Vulns: MPlayer Remote HTTP Header Buffer Overflow Vulnerability. MPlayer is a multimedia video and audio application. It is freely available for Unix and Unix variants as well as Microsoft Windows.

It has been reported that MPlayer i...

----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
7.  Sun shelves UltraSPARC V in favor of the great unknown. Chip geeks rocked By Ashlee Vance .
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  AzDGDatingLite Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks
9.  NukeCalendar Input Validation Holes Let Remote Users Inject SQL Commands and Conduct Cross-Site Scripting Attacks
10.  Probable Solution Found for ECC2-109 Challenge
11.  Spam and the Law Conference Report
12.  Incredible bulk
13.  Diebold Fails Again in San Diego
14.  Some votes miscounted in primary, officials say
15.  Cisco Products Have Backdoors
16.  Cisco Security Advisory: A Default Username and Password in WLSE and HSE Devices
17.  A Black Box for People
18.  A Black Box for People
19.  See-Through Voting Software
20.  Google Gets More Gmail Guff
21.  Privacy advocates say Google's e-mail scanning process a dangerous precedent
22.  Street cameras raise privacy concerns
23.  Opinion - Security, privacy rights must trump almighty dollar
24.  GROUPS raise privacy concerns over plans for RFID
25.  Gmail takes heat for privacy fears
26.  testvirus.org - "allows you to send a harmless test virus to any email address"
27.  Securiteam: XPLizer - Windows Hardning Frontend Tool "supplies a simple GUI for some of the most...
28.  Security Focus: Host Integrity Monitoring: Best Practices for Deployment "There are now a number...
29.  Security Focus: The Internet surveillance cash cow "A few large companies and entrepreneurs stan...
30.  Applied Magnetics: Disk Erasing Paddle "unit meets or exceeds National Security Agency specifica...
31.  Sun Cluster Global File System Denial of Service Vulnerability
32.  Sun Cluster Global File System Denial of Service Vulnerability
33.  Open WebMail Directory Creation Vulnerability
34.  Open WebMail Directory Creation Vulnerability
35.  Gentoo update for heimdal
36.  Gentoo update for heimdal

10:19:03 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Study: S.F. Area Has Most Wi-Fi Hot Spots (AP). AP - The San Francisco Bay area is the nation's top market for wireless Internet hot spots, according to a new study sponsored by Intel Corp.
2.  AOL Drawing for Spammer's Porsche a Hit (AP). AP - America Online said its members have submitted more than one million AOL screen names in the Internet company's unorthodox drawing for a spammer's seized sports car.
3.  System Can Detect Fraudulent Passports (AP). AP - Australia, one of the United States' strongest allies, has added a new weapon to its arsenal — a toaster-sized document reader that tells in seconds whether a passport is a fraud and identifies travelers who might be included on terrorist watch lists.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  Security Tools More Harmful Than Helpful?
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
5.  Judge rejects Enron plea bargain. The wife of ex-Enron executive Andrew Fastow faces trial in June after a judge rejects her plea bargain.
----------------------------------------------------------------------
InfoWorld: Top News
----------------------------------------------------------------------
6.  Update: Former CA executives plead guilty. Three former executives of Computer Associates International Inc. pleaded guilty on Thursday to criminal charges associated with improper accounting at the Islandia, New York, software company.
7.  Microsoft can buy off Sun legal threats for 10 years. As part of their landmark agreement reached last week, Microsoft Corp. has the option to pay Sun Microsystems Inc. millions of dollars each year to shield itself from patent infringement lawsuits by its former nemesis, Sun's vice president for legal affairs said Thursday.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  VBS.Gaggle.D
9.  È âñå æå î ÊÌ
10.  Security Alert: Bagle.X Worm Seeding in Progress
11.  Dot-Mail Domain Proposed as Spam Solution
12.  NetScreen Brings SSL Security to Collaboration
13.  Sara Tells Viruses to Bug Off
14.  Cisco IPSec VPN Services Module IKE Bug Lets Remote Users Crash the Affected Switch/Router
15.  KAME Racoon IKE Daemon RSA Signature Verification Vulnerability
16.  KAME Racoon IKE Daemon RSA Signature Verification Vulnerability
17.  Gentoo update for ipsec-tools
18.  Gentoo update for ipsec-tools

9:18:40 AM    comment []

----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
1.  States won't write off taxes on Web sales. As online tax filings increase, 19 states are reminding taxpayers to offer up use taxes on out-of-state purchases, including those made over the Internet.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Scam Targets Consumer Bank Accounts
3.  Guardian Digital Launches Next Generation Internet Defense & Detection System

8:18:20 AM    comment []

----------------------------------------------------------------------
CNET News.com
----------------------------------------------------------------------
1.  After years of struggle, GPS is taking off. The market for products that use GPS technology is heating up in response to technological advances, consumer interest and E911 mandates.
2.  States push for piece of online sales. New York and California are among the states asking residents to wade through arcane formulas to calculate sales taxes on Internet purchases and other out-of-state transactions.
3.  Tax sites gear up for last-minute rush. The IRS and major online tax preparation sites report an increase in online filing ahead of next week's tax deadline.
4.  Gutless wonders of 2004. CNET News.com's Charles Cooper says the tech elite's conspicuous absence in the offshore-outsourcing debate attests to a depressing refusal to rock the boat anymore.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
5.  Infosys forms firm to promote offshoring (SiliconValley.com). SiliconValley.com - India's second-largest software company, Infosys Technologies, announced Thursday that it is expanding operations in Fremont with a new management-consulting subsidiary to advise technology companies on shipping software-development work offshore.
6.  'Alamo': Too true to be good (USATODAY.com). USATODAY.com - Reflecting decades of Hollywood's recycled reverence, The Alamo arrives in theaters just as John Wayne's eponymous 1960 epic is being reissued on DVD, and just two weeks after Fess Parker (or Davy Crockett to a generation) donated his coonskin cap to the Smithsonian. The torch is passed - when it's not igniting a cannon. (Related video: Watch a clip from The Alamo)
7.  Engineers' eBay auction yields encouraging response (SiliconValley.com). SiliconValley.com - The San Francisco engineers who auctioned themselves on eBay after their jobs were offshored seem to have scored big.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
8.  nukeKalender Multiple Vulnerabilities
9.  1st Class Mail Server Directory Traversal and Cross Site Scripting
10.  Kerio Personal Firewall URL Handling Denial of Service
11.  Wereldwijde internet politie tegen virusschrijvers
12.  EBCVG: The Pros & Cons of Ethical Hacking "Unless you first know what it is you are looking for ...
13.  Intego: Trojan horse on the Mac "Due to the use of this technique, users can no longer safely do...
14.  PC World: 'Homeless Hacker' Sentencing Delayed "Adrian Lamo had cut deal with prosecutors to let...
15.  Silicon: Microsoft begins security roadshow in New York "Microsoft's on a mission to get technol...
16.  Computer World: Integrity begins within - Security pros lead by example "if we prescribe that em...
17.  New Scientist: Email attack could kill servers "trick involves sending forged emails that contai...
18.  Tech Focus: Losing His Religion - Techfocus Interviews Hacker Adrian Lamo
19.  MSDN Webcast: Computer Crime and Security - Level 200 "The typical misconception is that a hardw...
20.  BBC News: File-sharing to bypass censorship "By the year 2010, file-sharers could be swapping ne...

7:18:00 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Nintendo Tops Japan Videogame Sales (Reuters). Reuters - Nintendo Co Ltd pulled away from the competition and remained Japan's top game software maker in the business year ended March 31, game magazine publisher Enterbrain Inc said on Friday.
2.  Dell to Load Oracle Software on Computer Servers (Reuters). Reuters - No. 2 personal computer maker Dell Inc. (DELL.O) will begin selling database software from Oracle Corp.(ORCL.O) that has been pre-loaded onto its computer servers, an offer aimed at small and medium-sized businesses.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  New Windows Vulnerability in Help System
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
4.  Skype: giving wireless PDAs a new voice. Broadband piggyback By Datamonitor .
5.  Nokia: sales slump caused by inadequate product range. Keep up at the Front By Datamonitor .
6.  Grey stage set for UK PS2 price war. Unofficial discounting force Sony's hand? By gamesindustry.biz .
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
7.  Speaking of Music Piracy ..... Digital music was supposed be a cheaper alternative to grossly overpriced CDs. But the companies controlling the industry are looking for ways to raise prices and boost their profits.
8.  Insanely Destructive Devices. Defending against an attack of self-replicating weapons of mass destruction is probably impossible, so reducing the incentive to attack becomes paramount. By Lawrence Lessig from Wired magazine.
9.  HGH Linked to Brain Eater. Creutzfeldt-Jakob disease is not only caused by meat from mad cows. Some patients who took human growth hormone as children before 1977 wound up with the disease decades later. By Kristen Philipkoski.
10.  Big Blue Marks Birth of Big Iron. The mainframe computer came into the world 40 years ago this week, and techies gather to mark the occasion. Daniel Terdiman reports from Mountain View, California.
11.  Music Gurus Scout Out Free Tunes. Webjay lets users build playlists of MP3s from all corners of the Web to share with others. The service highlights gems like oldies from Eastern Europe, or songs dedicated to Condi Rice. By Katie Dean.
12.  Trojan Horse Attacks Mac OS X. A security company warns of malicious code that targets the operating system. It could be the start of a whole new world of pain for blithe Mac users. By Leander Kahney.
13.  Automakers Roll Out the Future. Concept cars at the New York International Automobile Show offer a peek at what manufacturers think consumers will want. Apparently, there's a lot of technolust out there. John Gartner reports from New York.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
14.  IRS to use Symark software
15.  IBM architecture gets Common Criteria

6:17:40 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  The Playlist: Legal Digital Tunes Go P2P (PC World). PC World - Future downloads, an ITunes hack, and more places to find new music.
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
2.  Computer Associates guilty plea. The audit investigation into US software giant Computer Associates has led to a guilty plea by its former vice president of finance, David Rivard.
3.  File-sharing to bypass censorship. By the year 2010, file-sharers could be swapping news rather than music, eliminating censorship.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  1 miljoen dollar boete voor SMS spam
5.  Oracle verhelpt kritiek lek na bijna een jaar
6.  Security onderzoeker schrijft IE exploit uit wraak
7.  Waarschuwing voor eerste Mac OS X Trojaans paard
8.  Chat met Microsoft over Longhorn, security en WinXP
9.  Nasty Security Flaw Found In Cisco's Wireless LAN Products (TechWeb)
10.  Newest Netsky Worms More Dangerous (TechWeb)
11.  Trojan.Mitglieder.H

5:17:20 AM    comment []

----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
1.  Dilbert for 09 Apr 2004.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
2.  System/360 Turns 40 (TechWeb). TechWeb - Forty years to the day after IBM launched the historic mainframe, its inventors recalled how the product was born.
3.  Microsoft's Ballmer Has (Some) Nice Words For Open Source (TechWeb). TechWeb - "There are some advantages to [it]. You can peek through the door if you can't figure out how something works," the Microsoft CEO said. But he added that "integrated innovation" leads to lower cost of ownership and less complex computing.

4:47:11 AM    comment []

----------------------------------------------------------------------
Digital Identity World
----------------------------------------------------------------------
1.  The Great Enabler
2.  The Digital ID World Newsletter - February 12, 2004 Issue
3.  The Digital ID World Newsletter - February 19, 2004 Issue
4.  The Digital ID World Newsletter - February 26, 2004 Issue
5.  The Digital ID World Newsletter - March 4, 2004 Issue
6.  Identity Helps AXA Financial Insure Success
7.  The Digital ID World Newsletter - March 11, 2004 Issue
8.  The Digital ID World Newsletter - March 18, 2004 Issue
9.  The Digital ID World Newsletter - March 25, 2004 Issue
10.  The Digital ID World Newsletter - April 1, 2004 Issue
----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
11.  Try your hand at balancing the federal budget. US Federal Budget sim created at Berkeley.
This simulation asks you to adjust spending and tax expenditures in the the 2004 budget proposed by the White House in order to achieve either a balanced budget or any other target deficit...According to the White House, the 2004 fiscal deficit is projected to be $307 billion. This does not include the costs of the Iraq War, so it has been increased by a base estimate of $50 billion for those costs in this simulation (which can be increased, lowered or eliminated depending on peoples views of the costs or likelihood of the war.).
Link
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
12.  Exotic Wood Computer Cases
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
13.  Linux a national security risk, competing RTOS vendor claims
14.  Growing Acceptance of Linux has Dark Side

4:47:10 AM    comment []

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  3 Plead Guilty in Computer Associates Case. As three former executives of Computer Associates pleaded guilty to securities fraud, investigators are zeroing in on Sanjay Kumar, the company's chief executive. By Alex Berenson.
2.  Verizon Moves to Head Off Nextel in a Spectrum Swap. Verizon Wireless, the big cellphone provider, told the Federal Communications Commission that it would pay at least $5 billion if an auction were held for unused nationwide spectrum. By Ken Belson.
----------------------------------------------------------------------
LinuxSecurity.com
----------------------------------------------------------------------
3.  Linux Advisory Watch - April 9th 2004
4.  Linux Advisory Watch - April 9th 2004
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  DB2 Web Service Provider security
6.  Intego issues Mac OS X Trojan Horse warning
7.  Improving web application security
8.  Slow down the security patch cycle
9.  Expert releases Cisco wireless hacking tool
10.  FDIC warns of scam targeting consumers' bank accounts
11.  How to keep your company in step with compliance issues
12.  Slow down the security patch cycle
13.  OASIS approves WS-Security Web services spec
14.  Expert releases Cisco wireless hacking tool
15.  FDIC warns of scam targeting consumers' bank accounts
16.  Rice grilled on information-sharing shortfalls

2:16:21 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Nerds Of A Feather (Forbes.com). Forbes.com - Most people grumble when their broadband connections are poky. Israeli venture capitalist Yossi Vardi, who founded the famed ICQ instant message service later bought by America Online, decided to poke fun at it. He and more than a hundred other unhappy Internet addicts convened near Israel's Sea of Galilee last month to flip their digital .subscriber line providers the bird, so to speak. They outfitted three carrier pigeons with teensy, high-density flash memory cards storing a total of 4 gigabytes--the equivalent of 1,000 songs on an iPod mini--and cast them on a 62-mile journey. ...
2.  Into Thin Air (Forbes.com). Forbes.com - When doctors at San Antonio Community Hospital bark orders into their new wireless phones, sensitive medical information will travel not over the phone system but via a Wi-Fi network--technology originally designed to link laptops to the Internet. It seems a risky move: Sending phone calls over Internet-style networks has long been the province of techies who could put up with mediocre quality and uncertain security.
3.  BT Enters Software Business to Protect Film, Music (Reuters). Reuters - British telecoms giant BT Group (BT.L) launched a new software business on Tuesday to protect music, movies and photographs from digital piracy.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  Gigabit Networking for the Home?
----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
5.  DB2 Web Service Provider security
6.  Improving web application security
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
7.  Experts talk up text security
8.  Humans to blame for security breaches
9.  Security issues move Linksys routers off the short list
10.  Security tool more harmful than helpful?
11.  Plug-in flaw leaves RealPlayer users open to attack
12.  Expert releases Cisco wireless hacking tool
13.  ST04-006: Understanding Patches
14.  Cisco Malformed IKE Packet Vulnerability

1:16:00 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Apple offers details about WWDC after hours activities (MacCentral). MacCentral - Apple's Worldwide Developers Conference won't just be a venue to learn about the latest Macintosh technology -- it's also a social gathering and networking event for developers. Apple has posted details about the after hours activities planned for the June conference.
2.  Intego issues Mac OS X Trojan Horse warning (MacCentral). MacCentral - Macintosh security specialists, Intego on Thursday issued a security warning to its customers for the first Trojan horse to affect Mac OS X. Dubbed MP3Concept (MP3Virus.Gen), the Trojan horse exploits a weakness in Mac OS X where applications can appear to be other types of files, according to the company.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  Chipset Integrates Gigabit Ethernet, RAID, Firewall
----------------------------------------------------------------------
Help Net Security
----------------------------------------------------------------------
4.  Humans to blame for security breaches
5.  Security issues move Linksys routers off the short list
6.  Security tool more harmful than helpful?
7.  Plug-in flaw leaves RealPlayer users open to attack
8.  Expert releases Cisco wireless hacking tool

12:15:39 AM    comment []


Click here to visit the Radio UserLand website. © Copyright 2004 Gregg Doherty.
Last update: 5/3/2004; 12:26:38 AM.
This theme is based on the SoundWaves (blue) Manila theme.
April 2004
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30  
Mar   May