Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 06 Issue 30
Volume 6, Issue 30 Atari Online News, Etc. July 23, 2004
Published and Copyright (c) 1999 - 2004
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
Kevin Savetz
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
http://www.icwhen.com/aone/
http://a1mag.atari.org
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #0630 07/23/04
~ MS, Lindows Settle! ~ People Are Talking! ~ MiNT On Coldfire!
~ Dell Launches Help Site ~ UK Bans PS 'Chipping'! ~ New MyAES Release!
~ Unlimited Web Sites? ~ Data Theft Hacker Bust ~ More Worms Surface!
~ SCO Suffers Setback! ~ MS Takes On Phishers! ~ ASMA 2.8 Released!
-* Open Source Gaming Galore! *-
-* NY Settles E-Mail Marketer Lawsuit! *-
-* Technology To Widen Reach of Amber Alerts! *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
This past weekend, I happened to be checking the news and weather reports
for the upcoming week (this past week) to see what I might be missing had I
scheduled my recent vacation for different weeks. I was kind of elated to
see that rain was forecast for most of the week! Well, that forecast didn't
hold up! The rain held off, and we've had some really oppressive weather
this past week - at least compared to what we've been having up to now! The
only down side was that had I been on vacation this past week, I would have
had more of an opportunity to enjoy the comforts of our pool. Otherwise,
this weather is for the birds!
Returning to work after a vacation is no picnic! Not only do you feel a
little down that the vacation is over (okay, a lot down!), but just walking
into the job to see two weeks of work piled up is downright inhumane! I've
been back a week, and I still can't see the top of my desk yet! And as I'm
trying to clean up the work from when I was gone, new stuff gets added
daily! Yes, it's a fair trade-off as far as I'm concerned! I'm sure that
Joe will have similar sentiments.
I know that Joe has been drilling into people's brains lately about
registering to vote, and then actually getting out to vote come election
time. I couldn't agree more. And, I really hate politics, for the most
part. Yet, it's my right to do so - people fought and died to give us that
right. Don't ever give it up! Speaking of elections, the Democratic
National Convention is being held in Boston next week. In and of itself, it
sounds like an incredible event, and an important coup for Boston to play
host. But, in this post-9/11 time, I think this event is going to cause
more hassle than it's worth. The security measures are going to be
unbelievable! Getting in and out of the city next week is going to be
incredibly difficult, if possible at all. Thankfully, I moved out of Boston
a few years ago and won't be directly impacted. I guess it all has to be
done, but the cost may be too high. It's almost humorous in a way. The
local news station that I watch on television has a daily update for the DNC
called "The DNC Survival Guide". During this news segment, they provide
daily updates to the new security decisions, what roads and services will
be closed, and other things that will impact "routine" life in and around
the city. I think people are going to be glad when this event is over! All
for a week's worth of politicking (that reads P-A-R-T-Y!) and to listen to a
presidential candidate's nomination acceptance speech to the delegates.
Until next time...
=~=~=~=
MiNT on Coldfire
Anders Eriksson has announced:
I just want to let you know that the MiNT kernel runs now also on the
Coldfire. I wrote a detailed description of how I ported the kernel to this
platform. You can read it at:
http://acp.atari.org/articles/mcf5407eval/mcf5407eval.html
There is also a summary about the TOS-dependencies of MiNT (at least the
needed things for the startup), I stumbled across.
All in all, I must say that I liked the fact that MiNT leaves the hardware
initialization for timers, keyboard etc. to TOS. This enabled me to perform
these initializations in a Coldfire-specific way in advance and then
calling the MiNT kernel. (very much like a PC BIOS, that sets the system to
a well defined state)
Frank told me that he wants to make MiNT take over the whole system and
kick out all dependencies to the underlying TOS. This means, to include all
drivers that are needed for MiNT's startup (keyboard, screen, timers etc.)
into the MiNT kernel. I would like to keep MiNT behaving like it does now.
The great advantage for now is, that MiNT makes no assumptions about any
devices except the CPU.
My current execution environment for the MiNT kernel is very small (ca. 600
lines of code). It supports character output and keyboard input (over a
serial connection). There is no block device support yet.
Thank you all for your great achievements with MiNT!
Greetings,
Norman
http://acp.atari.org/articles/mcf5407eval/mcf5407eval.html
Open Source Gaming Galore!
Anders Eriksson has announced:
Gildor, who brought you the Yeti3D engine port to Atari continues his
porting frenzy. We've gotten no less than four complete games ported from
other platforms to the Atari. Ok ok, which ones? Here goes..
* Wolfenstein 3D
Ported from the original, so everything's there as it should be. Demo
levels included in the archive.
* Spear of Destiny
A Wolfenstein 3D spin-off, very similar but different levels and some
new stuff (textures with transparency for instance).
* LTris
Well the name says it all really. You need a 25MHz bus for this one,
or a SuperVidel; it needs 640x480 16bit hi-colour graphics.
* Moonlander
A remake of an old Atari classic game. This one also needs 25MHz bus
or a SuperVidel, same reasons as above.
* Yeti3D
Well as a little bonus, an updated version of the Yeti3D engine, now
with better low res mode (centered graphics etc).
These portings are all using the latest SDL versions, so they should be
using the fast C2P routines from Mikael Kalms/TBL. Gildor also tells us
that the games runs _much_ better in MiNT than TOS (MagiC untested).
Wolfenstein 3D: http://files.dhs.nu/files_game/wolf3d.zip
Spear of Destiny: http://files.dhs.nu/files_game/spear.zip
Moonlander: http://files.dhs.nu/files_game/lander.zip
LTris: http://files.dhs.nu/files_game/ltris.zip
Yeti3D: http://files.dhs.nu/files_game/yeti3d.zip
ASMA 2.8 Released
Another update to the famous 8-bit music collection called Atari SAP Music
Archive has been released. It adds 70 new songs and now the whole
collection has exceeded 10 MBytes! Get 1840 POKEY tunes and players at the
ASMA homepage.
URL: http://asma.atari.org/
New MyAES Release
The multitasking AES for (Free)MiNT called MyAES has been upgraded with new
features.
Highlights from the new release includes:
* 256-colour icon support
* Loadable keymaps (compatible with MagiC)
* Window resize from all window borders
* Real-time scrolling
http://myaes.free.fr/
=~=~=~=
PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org
Hidi ho friends and neighbors. Remember that thing I was talking about
where the number of posts goes down as the temperature goes up? Well, it
must be hot as all get-out SOMEWHERE. <g>
The number of posts is incredibly small this week, so it's going to be a
short column. I guess that the outdoor activities and vacations and such
are taking their toll again. Although I feel it now much more than in
years past.
Oh, one thing I'd like to mention before we get into the posts from the
UseNEt. I'd like to thank Fred Horvat for his short article last week
about the weekly Atari chat. It's nice to know that there are those who
look forward to something as simple as a weekly chat with some old (or
new) Atari buddies.
Again, if you want to join the chat on Tuesday evenings, just point your
telnet or ssh client to atarinews.org and use bbs as both the login name
and password to get in. From there, if you haven't already done so,
create an account for yourself and then hit "T" for talk and then "C"
for chat. After that, all you need to do is supply a 'handle' and you'll
be in the chatroom with the rest of us. Chats are held every Tuesday
night at 9:00 eastern / 6:00 pacific time. Be there or be square!
Now let's get to the STuff from the UseNet.
From the comp.sys.atari.st NewsGroup
====================================
Mikael Holm asks for help in locating an old disk:
"I just got hold of a book called "Introducing Atari ST Machine Code"
by R. Pearson and S Hodgson, published by zzSoft (ISBN 1 873423 01 2)
It is supposed to be accompanied by a disk containing an assembler,
editor, some sample programs etc...
Does anybody out there have this disk? If so can I have it? Or a copy
or image file of it?"
John Oakes tells Mikael:
"I have the original disk if you want a copy. It small
enough to download if you wish."
Coda also gets involved:
"I also have this book, and wouldn't mind the disk if anyone has it...."
Sam F. looks around for a new keyboard:
"Anybody got a working TT030/Mega/MegaSTE keyboard laying around which they
don't need and are willing to let go of it for a reasonable price?"
Mark Duckworth tells Sam:
"I should have at least one good MSTe/TT keyboard that works. I have Mega
ST keyboards but they're all flaky.. Mystery mouse movements and that
sort of thing."
Sam asks Mark:
"So, if that keyboard is for sale, how much do you want for it? And would
it be practical on a re-cased Falcon mb in a tower case?"
Mark replies:
"Indeed it's practical. My setup is a falcon style to mega ste style
keyboard adapter (home made, but they are selling them on ebay for $1.00
or so). Then I bought a very long 6 wire RJ-11 telephone cable from radio
shack. Cut the wire right down the center, flip it on one side and
resolder (not sure why the keyboard cable is like this, but if you DON'T
do this you will fry the keyboard controller and kill the keyboard). And
resolder everything then and tape it up. Then you can put your computer
wherever you want and have a long cable. As far as the one I have, I have
to first have the motivation to find it and test it. Then I can decide on
a price based on condition. Some of them are discolored and have
cigarette burns from their prior owner. What condition are you interested
in?"
Sam now asks about his Falcon re-casing project:
"After fooling around a bit, I can maneuver the falcon mb onto the
backplane without having to remove the backplane.
My question now is, I drilled a practice hole on the mainboard and tried to
screw in a standoff but...I nearly had to force it in and the threads on
the standoff got a bit mashed.
Is there a special way the holes for the standoffs need to be drilled?"
Steve Sweet rushes in and tells Sam:
"No!!! Stop, DO NOT DRILL THE MOTHERBOARD (Shouting intentional)
Sam calms Steve:
"Sorry for the confusion....what I meant to say was that I drilled a
practice hole in the backplane....ha ha ha ha!! :)
Sheesh, I'm not that stupid, though some would argue otherwise!!"
Mark Duckworth tells Sam:
"I drilled larger than the standoffs and then found the proper nuts for the
back of the standoff at home depot and bolted them in so that there was no
chance of them coming back out. If your standoffs have good depth you can
even throw a washer in there for good measure."
Sam tells Mark:
"That sounds like a great idea. Now, where can I purchase standoffs and
the screws that go with them? I've got 7 standoffs but not the screws. I
guess Home Depot would be a good start eh?
Thanks a bunch Mark!!!!"
Well folks, that's it for this week. See? I told you it was going to be a
short column. Make sure you tune in again next week, same time, same
station, and be ready to listen to what they are saying when...
PEOPLE ARE TALKING
=~=~=~=
->In This Week's Gaming Section - 'Missing' Game Is Unnerving!
""""""""""""""""""""""""""""" 'Pure Pinball' Coming to Xbox!
'The Guy Game'! "Chipping" Banned!
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
'Missing' Game Is Unnerving, Captivating
Three years ago, Electronic Arts combined phone messages, e-mail, faxes,
streaming video, Web sites and AOL Instant Messenger to create a conspiracy
game known as "Majestic."
It was intriguing. It was ambitious. It was unique. But for a variety of
reasons, it didn't last.
Now Lexis Numerique has scaled down the concept to create "Missing: Since
January," which also tries to give players a sense that they're solving a
real-life mystery.
There are no faxes, phone calls or AOL messages.
But "Missing: Since January," which was released in Europe about six months
ago as "In Memoriam" and is distributed in North America by the Adventure
Co., does give you a sense that you're communicating on the Internet with a
disturbed computer genius.
You'll have to do some real-life exploration of the Web to get the
solutions to several puzzles. And to help you in your quest, you will
receive e-mail, purportedly from a television production company and people
who are trying to find a missing reporter and his girlfriend.
You can sample the plot on the Web site for the fictional production
company (http://www.skl-network.com). There you'll see information about
40-year-old reporter Jack Lorski, read some stories he was working on, and
inspect his desk as he left it when he disappeared with Karen Gijman, a
32-year-old independent illustrator.
The $20 game comes with a black CD-ROM that, according to the story, was
sent to the network by someone who calls himself (or herself) "The Phoenix"
and claims to be holding Lorski and Gijman hostage.
Obviously the Phoenix knows his way around computers. Once you load up the
disk, he begins communicating with you, taunting you and, quite literally,
playing with you.
He keeps unveiling a series of puzzles and mini-games that must be solved
in order to get more information about the Lorski case. Some are pretty
rudimentary, requiring nothing more than clicking on objects that dart
around the screen. Some are pretty challenging. Some are very disturbing.
("Missing" is rated for mature audiences.)
One puzzle includes a movie showing the girlfriend's face underwater. She's
struggling. Someone is obviously trying to drown her.
In fact, the whole game radiates the aura of a disturbed mind, with
haunting, unsettling sound effects that will make you want to keep the
lights on if you play at night.
Some challenges involve real detective work, using a combination of real
Web sites and those created just for the game.
In one case, you must search the Internet to find the identities of six men
shown in an old photograph. Fortunately, the names are so unusual that a
search engine like Google quickly tracks down the picture.
Another puzzle requires players to piece together portions of film showing
an assassination. You'll also have to find the name of a girl with the
tattoo of a snake on her belly.
The more puzzles you solve, the more the Phoenix reveals.
You learn that the reporter had stumbled onto an old Super 8 mm movie
camera. The film, once developed, shows two men carrying out a murder. The
owner of the camera was apparently killed when the murderers spotted him.
Lorski had become obsessed with finding out where the pictures were taken,
who was murdered, and who the killers were.
As you progress through the game, you see video footage taken by Lorski and
Gijman, who has her own link to the case.
If you get stuck, you won't be alone in your quest. E-mails sent to you
from the ersatz production company and other people supposedly trying to
help you find the missing couple will give you hints or tell you where to
find tools to help analyze the evidence.
"Majestic" failed because it was an open-ended subscription-based game
where signing up was so complicated that nine out of 10 players who started
to register never completed the process. And the streaming video could be
very choppy.
"Missing: Since January" is a one-shot, self-contained game where signing
up consists of choosing a log-in name and giving your e-mail address. The
game instantly mails you a password, and you're ready to play.
And because all the videos are on a CD-ROM, they run smoothly.
Whether "Missing" succeeds in North America will depend on how many
computer owners would rather solve mysteries and puzzles than pick up
animated guns and blast everything in sight.
Pure Pinball Coming for the Xbox
Iridon Interactive and XS Games LLC have announced an agreement that will
see XS Games publish Pure Pinball for the Xbox throughout North America,
with distribution handled by Take 2 Interactive.
Featuring photo-realistic 3D graphics, Pure Pinball will test player's
pinball skills across more than 30 challenges and missions, spread across
four table layouts inspired by authentic American pinball designs. Each
table layout provides a distinct challenge, and the mission structure will
test the skills of even the best of players.
"The Xbox delivers the power we need to provide the most realistic pinball
experience on any platform", said Iridon CEO Bjorn Larsson. "Pure Pinball
is the closest you'll get to owning a real pinball machine without actually
buying one."
"We're proud to being able to bring Pure Pinball to the Xbox", said XS
Games CEO Steve Grossman. "The realism of the game brings the fun and
enjoyment of the pinball genre to the Xbox for the first time ever, and
pinball fans will not be disappointed."
Players can also share their high scores on Xbox Live with other players
from around the world, competing in a next generation flipper fest to see
who can prove themselves a true pinball wizard.
Pure Pinball for the Xbox is scheduled for release across North America in
early August 2004 at an estimated retail price of $20 USD.
Features
* Complete more than 30 challenges and missions across 4 tables based
on authentic American pinball table architecture.
* Photo-realistic 3D graphics create lifelike pinball machines, with
each table created from more than 150,000 polygons, all rendered in
real time.
* Making use of Xbox Live, players can compete for world dominance by
sharing high scores with other players from all over the world.
* The Xbox Controller vibration functions allows for trigger sensitive
flippers, allowing players to feel the ball, offering a level of
realism missing from other pinball titles.
* Making use of a next generation physics engine, with more than 1,500
calculations per second, the game provides unparalleled ball movement
and collision detection within the 3D environment of the table.
* Multiple camera setups are possible using the real-time 3D graphics
engine, allowing you to view the pinball table in a complete
overview, close-up on the ball, traditional scrolling style, or even
following the ball using the 'ball-cam'.
* Advanced transform & lighting technology makes for amazing special
effects, including real-time light flares, metallic and glass
reflections and decorative backlights.
Tables
* Feel the adrenaline in the Excessive Speed table, winning race
missions to prove your handling ability.
* Fight the good fight with the World War table, completing mission
assignments to win the war.
* Ride the rails of the Pony Express in the Old West with the Runaway
Train table.
* Explore the universe, taking the controls of the Hyper Space table.
The Guy Game Announced
Hottie Hi-Jinks Coming to PlayStation 2 and Xbox
Combining spring break excitement with an engaging trivia challenge
TOPHEAVY Studios and Gathering, a publishing label of Take-Two Interactive
Software, Inc. today announced The Guy Game, a new video game based around
the insanity that is Spring Break. Available in August for the PlayStation2
computer entertainment system and the Xbox video game system from
Microsoft, The Guy Game (ESRB Rating: M) was shot live on location on South
Padre Island during Spring Break, and challenges players to match wits with
over 60 attractive co-eds, all of whom are set on showing off their best
"assets."
"I feel innovation is incredibly important in the video game industry. With
The Guy Game we set out to do something completely different than what had
been done before," said Jeff Spangenberg, CEO of TOPHEAVY Studios. "We feel
that guys will be extremely pleased with the final result."
Features of The Guy Game include:
* 20 outrageous episodes featuring interviews, stunts and challenges
with over 60 attractive college babes;
* Hosted by funnyman Matt Sadler, as seen on MTV and winner of HBO's
National Talent Search;
* Smackdown with up to four players. Top scorer becomes "President" and
makes the rules; low scorer loses influence and respect;
* Over 1000 popular trivia questions from the worlds of sports, movies,
TV and more;
* Choose one of eight sexy babes to be a personal cheerleader;
* Find out who has the biggest Ballz in high-speed action mini-games
such as Ballz Out, Ballz In and Ballz Shotz;
* Features the world famous Hottie Challenge.
The Guy Game is rated 'M' by the ESRB and is scheduled for release in
August.
UK Bans PlayStation 'Chipping'
The selling of "mod chips" for Sony PlayStation 2 game consoles has been
ruled illegal by a UK high court.
A PlayStation 2 with a modified chip installed can play imported or pirated
copies of the console's video games.
Mr Justice Laddie backed Sony's legal argument that its intellectual
property was being infringed by people selling the chips to console owners.
The ruling is thought to be one of the first brought under a controversial
European Union directive on copyright.
Sony brought its case against a man called David Ball who was accused of
selling about 1,500 "Messiah" mod chips.
In the High Court, Mr Justice Laddie ruled that Mr Ball was acting
illegally in selling the chips which get around the built-in copy
protection system on Sony's console.
As well as declaring the sale of the mod chips illegal, Mr Laddie said that
the use, advertising or possession of them for commercial purposes should
be considered illegal too.
Sony brought the case under the EU Copyright Directive which was enacted in
the UK in October 2003.
Under that directive, it is illegal to circumvent copy protection systems.
But some cyber-liberties advocates claim that such laws only enshrine
existing monopolies.
They say that neither professional criminals nor technically savvy users
will be deterred by such legislation.
The ruling is not the first victory Sony has won against makers of mod
chips. In Belgium it also won a similar case against another mod chip
seller.
However, in Italy a judge threw out Sony's case saying it was up to owners
of a console what they did with it.
Similarly in Spain, mod chips are seen as legal despite the EU copyright
legislation.
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
Technology to Widen Reach of Amber Alerts
A new technology debuting in 12 states will significantly extend Amber
alerts, reaching cell phones, e-mail and handheld computers, and could also
be used to transmit weather and terrorism alerts.
"It might not be the all-alert system, but the backbone is going to be
there," said Chris Warner, president of E2C in Scottsdale, Ariz., which led
the system's development. "Homeland Security could take it right over."
Police officers in Arizona and Washington, starting Monday, were able to
send Amber alerts - notifications of a child abduction - from a highly
encrypted system in their cars then update them with photos and more
detailed descriptions, Warner said. Ten other states are expected to launch
the expanded alerts this summer.
"The goal of this is to make it so pervasive, no one will be stupid enough
to take a child," said Warner.
The system will use a simple broadcast technology that takes the
information into a Web portal and reconfigures it for different types of
broadcast. A state department of transportation, for instance, might
receive one format for its road signs and another for its information
number.
Using the new system, people with cell phones can sign up for Amber alerts
in with county or state authorities. The text of an alert can be shot
immediately to local TV news programs' Web sites, with automatic updates.
"What we've done is create a fairly simple publishing and broadcasting
tool," said Stuart McKee, who worked on the system when he was chief
information officer for Washington state and is now the U.S. national
technology officer for Microsoft Corp.
The system also represents a next generation of public warning.
Many state emergency managers have clamored for a system that would
instantly dispatch disaster information, including evacuation maps, on cell
phones, the Internet and hand-held devices.
Gov. Brad Henry of Oklahoma has said he hopes the technology could
eventually be used to warn residents about severe weather, said Phil
Bacharach, a state spokesman.
The idea came about after McKee saw Warner give a presentation on another
information-sharing network he had developed, Earth911, an Internet
clearinghouse with local information about recycling different types of
trash.
State agencies and companies including Hewlett-Packard Co., Intel Corp. and
Symantec Corp. worked together for 18 months to develop the system.
Symantec said in May it is providing the external security monitoring of
the host site and backup locations. The companies donated a total of $4
million in development time, Warner said.
The system will help police in part because they can spend much of the 24
hours after an Amber alert is issued answering phone calls from people
looking for more information, McKee said.
Amber alerts were created after the 1997 kidnapping and murder of
9-year-old Amber Hagerman, who was abducted while riding her bicycle in
Arlington, Texas.
New Technology Heralds Unlimited Web Sites - ICANN
ICANN, the U.S. body overseeing Web site allocations globally, has launched
a new technology that will allow virtually unlimited Internet addresses,
its chairman told Reuters on Tuesday.
Vinton Cerf of the Internet Corp. for Assigned Names and Numbers (ICANN)
said the next-generation protocol, IPv6, had been added to its root server
systems, making it possible for every person or device to have an Internet
protocol address.
Rapid growth in the use of the World Wide Web has in recent times prompted
concerns about future scarcity of domain addresses, with demand threatening
to overload the existing system, the IPv4.
"This is a big, big step," Cerf said, speaking on sidelines of ICANN's
annual conference held in the Malaysian capital.
Los Angeles-based ICANN was given the job of overseeing the Internet's
naming and numbering system globally by the U.S. government.
Cerf said about two-thirds of the 4.3 billion Internet addresses currently
available were used up, adding that IPv6 could magnify capacity by some
"25,000 trillion trillion times."
He said the IPv6 system would run parallel to IPv4 for about 20 years to
ensure that any bugs or system errors were weeded out.
Microsoft Settles Lawsuit Against Lindows
Microsoft Corp. settled all its trademark infringement suits against
Lindows Inc. with a $20 million payment to the Linux operating system
upstart, which agreed to change its name to Linspire.
Details of the settlement, reached Friday, were disclosed in documents
Lindows filed Monday with the Securities and Exchange Commission as part of
plans for an initial public offering.
In a statement, the companies said the settlement ends a spate of
litigation in the United States and abroad.
"We are pleased that Lindows will now compete in the market place with a
name distinctly its own," said Tom Burt, Microsoft's deputy general
counsel.
Lindows chief executive Michael Robertson said the terms "make business
sense for all parties."
Microsoft, based in Redmond, Wash., sued San Diego-based Lindows in 2001
in U.S. District Court here, alleging the name infringed on its trademark
for the ubiquitous Windows operating system. Microsoft then filed similar
complaints in Europe and Canada. It won preliminary injunctions in the
Netherlands, Finland and Sweden, before quietly settling the Dutch case.
In addition to the U.S. litigation, cases were pending in France, Spain
and Canada.
In April, Lindows changed the name of its products to Linspire after U.S.
District Judge John Coughenour refused to halt the trademark infringement
cases outside the United States.
But the company had until now stuck with Lindows as a corporate name.
Lindows makes a computer operating system that competes with Windows but is
based on the Linux operating system.
Proponents of Linux and other open-source technology say it is cheaper and
can be more secure, in part because the underlying software blueprints and
any improvements are freely shared.
Microsoft tightly guards the proprietary blueprints for Windows.
Under the settlement, Lindows has 60 days to stop using the Lindows name on
its products.
Microsoft will pay Lindows $15 million in the next 30 days. The remaining
$5 million will paid out once Lindows transfers control of most of
Lindows-related Web site names over to Microsoft. That must be done by
Jan. 25.
Lindows has four years to continue using two of its Web addresses -
www.lindows.com and www.lindowsinc.com - but only to redirect visitors to
its new Web sites. After the four years have passed, those sites will also
be transferred to Microsoft.
The San Diego company said the cash settlement and the public offering
could help eliminate concerns that it will not be able to stay afloat, but
it noted that it still expects to have significant losses over the next
several years.
SCO Suffers Legal Setback
The SCO Group took a hit Wednesday when a circuit court judge in Michigan
dismissed the Unix software provider's claim that automaker DaimlerChrysler
violated its software agreement by refusing to provide certification of
compliance with the provisions of that agreement.
SCO spokesperson Blake Stowell told NewsFactor that Judge Ray Lee Chabot
tossed aside all but one of the company's motions in the case, essentially
granting DaimlerChrysler's motion for dismissal of the lawsuit. The
remaining sticking point is whether the auto giant took too long to certify
compliance with the Unix software agreement, he said.
"Their lawyer argued that DaimlerChrysler did offer certification
compliance, but they did that after the suit was filed," Stowell said. "We
are satisfied that DaimlerChrysler has certified its compliance with the
agreement, and the purposes of our litigation have been fulfilled."
The suit was initially filed in March, along with another action against
AutoZone that alleges software-copyright violations. That suit charges
AutoZone with violating SCO's Unix copyrights by running versions of the
Linux (news - web sites) operating system that contain code from SCO's
proprietary Unix System V software.
That case is on hold, with SCO recently given more time to collect
information, through discovery and depositions, before proceeding with a
preliminary injunction.
SCO also has suits pending against IBM and Novell, charging copyright
infringement. In response, Linux vendors Red Hat, HP and Novell are
offering various types of indemnification to their customers. SCO's amended
suit against IBM includes nine allegations of copyright and contractual
violations, with SCO seeking US$5 billion in damages.
Stowell said the Michigan ruling would not impact the other cases, pointing
out that they involve software distribution and title issues.
Yankee Group analyst Laura DiDio told NewsFactor that the case against
DaimlerChrysler was a long shot, and that the ruling came as no surprise.
"They may have been overreaching when they took on a multinational
corporation like this," she said. "This certainly puts a damper on any
additional lawsuits by SCO."
SCO sent letters to thousands of Unix licensees in December, requiring that
they offer proof of compliance with their contracts within 30 days.
Virus Purporting Bin Laden Suicide Hits Web
A virus purporting to show images of Osama Bin Laden's suicide popped up on
the Internet on Friday, designed to entice recipients to open a file that
unleashes malicious software code, security experts said.
The virus was attached to a message that was posted on over 30,000 usenet
newsgroups and is not being spread via e-mail, said Web security vendor
Sophos.
The U.S. government has been hunting for Bin Laden since 2001, holding him
responsible for masterminding the attacks on the World Trade Center and
Pentagon on Sept. 11, 2001, but he has not yet been found.
Chris Kraft, senior security analyst at Sophos, said the message and virus
was designed to lure unsuspecting readers into opening a file, similar to
the Anna Kournikova virus that enticed readers to open a file that
unleashed malicious software code.
"If you don't know the person or the origin of a message, you shouldn't be
opening it," Kraft said.
The fake Bin Laden suicide file, when opened, unleashes a program called a
Trojan horse that makes it possible for attackers to take over infected
personal computers running Microsoft Corp.'s Windows operating system.
Kraft said the virus itself had already appeared on the Internet before,
but the virus writer had apparently repackaged it by saying it contained
Bin Laden's suicide photos.
More Worms Inch Across the Internet
New versions of the Bagle and MyDoom worms surfaced on the Internet this
week, and appear to be spreading.
Bagle.AI and MyDoom.N are both so-called "mass mailing" worms that use a
built-in SMTP engine that sends e-mail messages carrying worm-infected file
attachments from computer to computer on the Internet, both using faked (or
"spoofed") sender addresses, antivirus companies say.
The new worm variants are just the latest in a string of virus releases in
recent days that have antivirus software companies scrambling to keep their
customers protected.
W32.Bagle.AI first appeared Monday and is rated a "medium" threat by
McAfee's Antivirus Research Team, citing reports of the virus from
customers. McAfee rates MyDoom.N a "low" threat, whereas Computer
Associates International notes the prevalence and destructiveness of the
worm.
Similar to earlier versions of Bagle, the AI variant spreads through shared
file folders and in e-mail messages carrying the worm file as an
attachment, according to advisories from Sophos and McAfee.
E-mail messages generated by the worm used forged (or "spoofed") sender
addresses and the subject line "Re:" Worm-infected file attachments might
be in.zip,.exe,.scr,.com, or.cpl and also have nonspecific names like
"Moreinfo," "Details," or "Readme," antivirus companies say.
Infected file attachments use one of a short list of names including "MP3,"
"Doll," and "Cat."
The worm can also send copies of itself as a password-protected compressed
file with a.zip extension. The password needed to unzip the.zip file is
contained in a second file with a.txt,.ini,.doc, or other extensions,
McAfee says.
The MyDoom.N worm uses spoofed sender addresses such as "postmaster," "Post
Office," and "MAILER-DAEMON" that make the e-mail resemble a rejected
message.
MyDoom.N messages also have nondescript Subject lines such as "hello,"
"hi," and "delivery failed." Virus file attachments have names like
"readme," "mail," "text," and "attachment." File extensions include .cmd,
.bat, .com, .exe, and .zip, McAfee says.
Antivirus companies issued updated virus definitions that can detect the
new Bagle and MyDoom variants and recommended that customers update their
antivirus software.
N.Y. Settles E-Mail Marketer Lawsuit
New York authorities on Monday settled a lawsuit filed against a
Colorado-based electronic mail marketer for allegedly sending unsolicited
and deceptive "spam" messages on behalf of clients.
New York Attorney General Eliot Spitzer said the marketer, Scott Richter,
and his company, OptInRealBig.com, paid $40,000 in penalties and $10,000
in investigative costs under the agreement, which was signed before state
Supreme Court Justice Eileen Bransten in Manhattan. The company also agreed
to provide Spitzer's office with customer information and all
advertisements it sends as well as promising to use proper identifying
information when registering domain names.
"This settlement holds Richter and his company to a new standard of
accountability in their delivery of e-mails," Spitzer said. "If he does not
fulfill these standards, he will find himself back in court, facing greater
penalties."
When Spitzer filed the civil suit against Richter, OptInRealBig.com and
some of the company's clients and other individuals in December 2003, the
attorney general said he was seeking $20 million in penalties.
Steve Richter, father and lawyer of Scott Richter, said Monday the
settlement basically involved a "no harm, no foul" situation from Richter's
standpoint. The fact the attorney general settled for $50,000 while
initially talking about $20 million in damages "speaks for itself," Steve
Richter said.
Richter said he and his son were also angered by a news release Monday from
Spitzer in which Scott Richter was referred to as a "deceptive spammer."
"We vigorously and strongly dispute that claim because there is no finding
by anyone that OptInRealBig.com or Scott Richter is a deceptive spammer,"
Steve Richter said. "That misrepresents the settlement."
OptInRealBig.com said in a statement Monday that as part of the settlement
with Spitzer, it agreed to abide by the terms of the 2003 federal Can Spam
Act. The Westminster, Colo.-based company said it's been complying with the
act all along anyway.
Spitzer spokesman Brad Maione said neither Scott Richter nor
OptInRealBig.com admitted any wrongdoing in the settlement.
When announcing his suit, Spitzer said special Hotmail e-mail accounts set
up by his investigators found thousands of e-mails in May and June 2003
that carried bogus "from" and "subject" lines, often indicating that the
messages were part of ongoing conversations instead of being unsolicited
commercial lures.
A lawsuit Microsoft Corp. filed against Richter in Washington state was not
affected by New York's settlement.
Hacker Indicted In One of Biggest Case of Online Data Theft
A 45-year-old man was indicted on charges of hacking into the computers of
a marketing company with one of the world's largest databases of personal,
financial and company information, officials said.
The indictment unsealed in Arkansas charges Florida resident Scott Levine
with conspiracy, unauthorized access of a protected computer, access device
fraud, money laundering and obstruction of justice.
"The charges stem from an alleged scheme to steal vast amounts of personal
information from a company database and represent what may be the largest
cases of intrusion of personal data to date," the Justice Department said
in a statement.
Officials said Levine controlled a company called Snipermail, which sent
out vast amounts of e-mail ads on behalf of advertisers or their brokers.
The indictment said Levine and other Snipermail employees broke into a
computer database owned by Arkansas-based Acxiom Corporation, one of the
world's largest companies managing personal, financial, and corporate data.
He then sold e-mail addresses to other marketing firms.
Officials did not say how much personal data may have been stolen. But the
indictment charges 139 counts of illegal access, and said Levine downloaded
some 8.2 gigabytes of data from the Acxiom server from April 2002 to August
2003.
"The protection of personal information stored on our nation's computer
systems is critical to public trust in those networks and to the health of
our economy," said Assistant Attorney General Christopher Wray.
"We will aggressively pursue those who steal private information from
computer networks and make it clear that there are serious consequences
for such crimes."
Six other individuals associated with Snipermail have agreed to cooperate
in the investigation, officials said.
Microsoft Takes on the Phishers
Microsoft is donating close to $50,000 worth of software to an anti-crime
agency to help stamp out phishing and other online fraud activities.
The donation, which comes with the services of a full-time analyst from
Microsoft's Internet Safety Enforcement group, goes to the National
Cyber-Forensics & Training Alliance, an anti-crime organization run by the
FBI (news - web sites), the National White Collar Crime Center, Carnegie
Mellon University and West Virginia University.
The analyst will help the unit interpret the data as it relates to the
Can-Span Act and what is known about phishers. He or she will also help the
unit design training programs for enforcement agencies.
"The tactics of spammers, hackers and other online con artists are becoming
increasingly sophisticated, and as a company, Microsoft is dedicating
resources to help law enforcement find those responsible for harming
consumers," Nancy Anderson, deputy general counsel for the company, said in
a statement.
The donation is part of Microsoft' bigger push to root out virus writers
that target its applications and operating system. For all the gripes -
legitimate and not - about security flaws in Microsoft's software, few
would charge that Microsoft is not leveraging its greatest asset: its bank
account. Many credit the increase in leads and arrests with Microsoft's
proffered bounty.
"I doubt we would have ever caught the Netsky author if it hadn't been for
that," Carole Theriault, Security Consultant with Sophos, tells
NewsFactor.
"People are getting caught because they talk, and their friends turn them
in because of the reward," Panda Software CTO Patrick Hinojosa agrees.
Now, Microsoft is working to curtail phishing activity. While these scams
do not always make headlines the way a new virus does, they are a related
concern. Indeed, many of these e-mails piggyback on viruses written
specifically for this purpose.
Growing Numbers Phishing, while not directly traced to Microsoft's security
flaws, is having as great an impact on online users as the viruses are.
Phishing employs e-mail lures to "fish" for identity information, such as
passwords and financial data. Armed with this personal data information,
scammers commit identity theft and fraud, explains Dan Meyer, director of
communications for the Anti-Phishing Working Group and director of product
marketing at Tumbleweed, a corporate anti-spam vendor. "We've seen a pretty
significant growth trend over a number of months, and there is nothing that
is going to change that in the near future," says Meyer.
Dell Launches Site To Fight Spyware, Viruses
Dell Inc. on Tuesday launched a site to help consumers battle the growing
number of computer problems related to spyware, viruses and other online
security threats.
In debuting the site, Dell, based in Round Rock, Texas, joined Yahoo Inc.,
Microsoft Corp. and a growing list of other companies offering services to
help consumers battle the increasing number of malicious applications
floating around the network.
Dell's and the others' motives are not only altruistic. Virus attacks and
spyware have prompted an increasing number of customers to contact
computer, software and services vendors, placing a heavy burden on customer
service operations.
"Spyware is the root cause of many of the performance problems our
customers face," Mike George, vice president and general manager of the
computer maker's consumer business, said in a statement.
Up to 20 percent of the calls received by Dell's consumer-desktop technical
support workers are for spyware and virus-related issues, far surpassing
any other performance issue, George said.
The new PC Security site includes how-to information on identifying
spyware, viruses and other Internet threats; tips for protecting PCs; and
information and promotions on firewall, anti-virus and anti-spyware
products.
Phone support for troubleshooting and removing malicious software is
available to Dell customers for $39 per incident.
Users Sidestep Required Logins For Content Sites
Readers fed up with entering personal information in exchange for accessing
Web site content can circumvent the process using BugMeNot.com to generate
login names and passwords for sites requiring registration
Many content Web sites, particularly newspapers, oblige readers to login to
view content. Content providers offer readers access free of charge in
exchange for demographic information - most commonly gender, birth year,
and ZIP code. The site then uses the demographic information for
advertising purposes.
Newspapers have long claimed that they need to demographic information to
maintain advertising revenue. However, there has been widespread
speculation that registration information fuels spam. Web users are
generally reluctant to provide personal information and many readers are
known to enter false information.
To use BugMeNot, users enter the URL of the registration page for a site
that requires login on the BugMeNot site. The site then provides bogus
account information that allows users to access the site without providing
their own demographic information. If the site has not already been
"liberated" by BugMeNot, users receive instructions for creating a login.
According to their Web site, Australia-based BugMeNot.com has liberated
almost 16,000 sites from what they term "registration bondage." The most
actively requested site on BugMeNot.com are:
1. www.nytimes.com
2. www.washingtonpost.com
3. www.latimes.com
4. www.ajc.com
5. www.chicagotribune.com
BugMeNot works with Mozilla and Internet Explorer. The site also offers a
toolbar that users can install by dragging to their browser. The site also
offers a plug-in for Mozilla written by Eric Hamiter and a Dean
Wilson-authored plug-in for IE.
Another free service, specifically for the New York Times, is New York
Times Link Generator. Created by Stanford-bound teenager, and
self-proclaimed hacker, Aaron Swartz, this site creates Web-log-safe links.
Web-loggers can then place these links on their Web logs to direct users to
New York Times content, bypassing the login.
The BugMeNot site is decidedly anti-commercial, including a manifesto
against required logins, providing instructions for linking to the site,
and even requests donations for the cause. The site also promotes both
Mailinator and Spamgourment to users for creation of pseudo e-mail
addresses that can be used for registration.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.