Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 09 Issue 29
Volume 9, Issue 29 Atari Online News, Etc. July 20, 2007
Published and Copyright (c) 1999 - 2007
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #0929 07/20/07
~ SunRocket Goes "Poof"! ~ People Are Talking! ~ Symantec's AntiBot!
~ E-mail Scams Using FBI ~ Facebook Privacy Hook ~ USB Mouse Driver!
~ Cyber Extortionists! ~ Wal-Mart's New $300 PC ~ Iran's New Game!
~ Firefox Gaining On IE! ~ Having Too Much E-Mail ~ YouTube & Politics!
-* Confessions of Former Spammer *-
-* EU To Rule On The Microsoft Appeal! *-
-* FBI Uses Spyware To Track Down Bomb Hoax! *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
And that was the week that was! Yikes! If you're an A-ONE reader and
happen to be on our e-mail distribution list, you've probably been on the
receiving end of a lot of errant e-mails this past week. Our old server
has been acting up for the past few months and we've been in the process
of getting everything ready to move to the new server and get it up and
running. Well, there have been a few (okay, a lot!) of bumps along the
way. And to make matters worse, Joe and I were exchanging e-mails without
realizing that one or both of us were writing/responding to the e-mail
list.
So, I just wanted to add my apologies to those of you who got buried in
messages last week. It shouldn't have happened, but it did. We're
hoping that the switch to the new server is completed soon, with
minimal issues. In the meantime, we're bandaging up the old one in the
hopes that it will hold up and continue to support the various functions
it performs (or performed). So, please bear with us just a little while
longer, and before you know it, this comedy of errors will be well behind
us!
Until next time...
=~=~=~=
Alpha Release: USB Mouse Driver v0.80
I have decided to make the latest version of my USB mouse driver available
for public download. This is considered an ALPHA release. There are
things to fix, things to add etc, but it is usable and works on
ST/TT/Falcon with EtherNat or NetUSBee, in TOS and MiNT. As for MagiC,
you'll have to try it, I don't own it, so I can't develop for it.
Get it from the downloads page on http://www.janthomas.org.uk/ and don't
forget to read the text file before you install it!
Obviously, if you don't have an EtherNAT (http://nature.atari.org) or a
NetUSBee (http://hardware.atari.org) there's no point in downloading it!
Please let me know if you are using it (via the email address on my
website, NOT the gmail spamtrap address I use for usenet).
Many thanks for your patience and for being unwilling ALPHA testers! :-)
Coda.
=~=~=~=
PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org
Hidi ho friends and neighbors. Well, it's been an interesting week to
say the least.
When we finally got everything backed up and ready to move to the new
server, we never thought that we'd have the problems that we've had. As
a matter of fact, we were pretty sure that no one would even notice
that we were on a new server. But the combination of a newer version of
the mailing list software and the migration to the new machine thought
otherwise.
I know that Dana wants to mention the "server thing" this week, so I'll
stop here and hope that he hasn't had to re-write his editorial too
much.
Believe it or not, I DO try to curtail my talk about politics here. I
mean, after all, it's a darned computer-related magazine, right? Well,
I apologize kids, but I can't in all good conscience let this one go by
without at least taking a swing at it.
Last week, our esteemed leader, 'The Decider', decided that we Americans
have too many rights, and we really haven't been using the Fifth
Amendment anyway. By executive order, the Secretary of the Treasury (or
his/her agents) may seize property of any person who they feel is
undermining their efforts.
Couple this with the fact that the FBI is now openly stating that
they've been taking advantage of some of the less savory 'gifts' given
to them by 1600 Pennsylvania Avenue, that they've been using spyware to
grab 'offenders', and that they've abused, broken or openly disregarded
even their own rules and guidelines, and I've just got to ask myself
what other, less well-known members of the governmental alphabet soup
(NSA, CSS, CIFA, DSS, NGA, NRO, etc.) are doing 'under the radar'.
Now, there are always going to be those who will tell you that 'we' need
to give up some of the things we've become accustomed to... like the
right to privacy, the right to face one's accusers, or the right to
protection from unreasonable search and seizure. They say that things
are different now, and that if you've got nothing to hide, you've got
nothing to worry about. They say that it's too hard to stop the people
who want to do us harm, and they're just making it easier for law
enforcement to do its job.
Well I've got news for you, friends and neighbors. It's SUPPOSED to be
hard! It's supposed to be hard because if you've got to jump through
hoops... if you've got to cross every "T" and dot every "i"... if
you've got to exhaust every possibility and give the subject every
reasonable doubt, then and ONLY then can you be confident that you're
in the right.
You see, our Founding Fathers knew how genuinely poor a tool the human
being was in the pursuit of justice. They knew about what can happen
when you react out of fear. They had seen what happens when a
government puts the good of the establishment above the good of the
individual. That's why they gave us the Constitution. That's why they
gave us the Bill of Rights. That's why they made the Executive branch
of government the weakest of the three.
It's this complete and utter disregard for that last one that has me
stumped... How many times have leaders substituted their own wishes,
opinions or fears for truth? How many times have they begun their
campaigns of rhetoric with the words, "Everyone knows that..."? It's
that "everyone knows" thing that has gotten us into trouble so often.
With all of that, how is it that we still fall for this? How is it that
we can put our own rights above those of someone else's and not realize
that we're the next in line for 'liberty demotion'? We're just setting
ourselves up for a heapin' helpin' of what I call "Freedom-Light"...
all the comfort, half the responsibility. Remember: All that need
happen for evil to prevail is for men of good conscience to do nothing.
Well, enough of this seditious talk, huh? I can feel the Treasury
Department dicks setting their sights on my websites, emails and phone
conversations already. Hell, they spied on QUAKERS, for cryin' out
loud! Now THERE'S a bunch just lookin' to cause trouble, huh?
Let's get to the news, hints, tips and info available from the UseNet.
From the comp.sys.atari.st NewsGroup
====================================
Jason Harmon asks about the maximum hard drive partition size under
different TOS versions:
"Does anyone know the maximum partition sizes supported by TOS 1.4 and
2.06? "
Uwe Seimet tells Jason:
"The maximum for TOS 1.04 is 256 MB, for TOS 2.0x and TOS 3.0x it's 512
MB, for TOS 4.0x it's 1 GB. Bigger partitions are possible when running
MiNT or MagiC. "
'PPera' asks Uwe to clear something up:
"Interesting... I seen some different values - 512K for 1.04 and 1GB
for 2.0x ..."
Uwe tells PPera:
"Everybody is free to try these values (provided one finds a software
that allows creating these partition sizes for TOS 1.04 and 2.0x). I do
not recommend it because one risks a loss of data. The permitted
partition sizes have been well-known for years since some people had a
close look at TOS and the maximum values in particular for the number
of bytes per sector and the number of sectors per cluster."
PP replies:
"Thanx. On some forums and Wiki sites are those 'optimistic' values. It
will make [for] some discussions there...
Just to add that [I] myself observed troubles with 1GB partition under
TOS 2.06."
Uwe tells PP:
"What I find amazing is that there are any discussions at all. For more
than a decade there has not been a new version of TOS and the partition
size limits for all existing versions of TOS are well-known. These are
limits hard-coded in TOS, i.e. they will not change anymore."
Hallvard Tangaraas asks for info on CD-ROM support while booting:
"I successfully installed the necessary software to be able to read
from an external SCSI CD-ROM drive a few years ago, but I can't
remember all the details and am now trying to figure out an irritating
fact.
Everything works perfectly if:
a) the CD-ROM drive is turned on and
b) a CD (with readable IS-9660 data on it) is inserted into the drive
and is ready for use.
However, if the drive isn't on when the computer boots, then the
drivers aren't loaded and I'm unable to use it later, when turned on.
I guess this sort of makes sense even though it would be nice to have
the drivers load regardless of the CD-ROM's current status.
The next problem is more frustrating however..
If I *don't* have a CD inserted in the CD-ROM drive (or the tray is
open), then the driver software won't load either! Actually the
computer seems to freeze at a certain stage in the boot process.
Here are some more details of my setup:
The computer is a Mega STe with an internal SCSI drive connected to
the original internal Atari SCSI host adapter card. It's set at SCSI
ID 0 and is unterminated, just as I've read and been told numerous
times (failing to un-terminate the drive can lead to burning up the
host adapter I've been told).
The SCSI CD-ROM drive (actually a burner) is connected via a Link 97
to the ACSI port on the rear of the Mega STe. I also have an ICD Link
II, but it didn't recognize the CD-ROM drive, so I suppose it uses
arbitration, which the Link 97 supports, I've been told. The CD-ROM
drive is set to SCSI ID 3 and is terminated.
When it comes to software I've first got HDdriver 6.13 which, when
booting, gives me the following information, which tells me that it
recognizes both SCSI devices:
ACSI 0.0: Quantum LPS540S
ACSI 3.0: Yamaha CRW4416S
Next, it loads a bunch of AUTO programs, the ones concerning the CD-
ROM drive being as follows:
Atari MetaDOS (April, 2 1997)
Version 2.74
... and then:
Spin! /SD 0.34
... and finally the one which gives me problems:
SCSI-treiber v5.00
.... with a CD inserted I get a bunch of confirming messages, but
without a CD inserted or the tray open when the CD-ROm drive is turned
on I get the following message which stays there indefinitely
Scanning busses....
ACSI... 00
At this stage, all I can do is reset the computer.
Is this normal behavior of this setup? I know there are other
software solutions around for enabling CD-ROM reading support, but I
was aiming for a free one, at least to start with.
Actually I just noticed that if I turn off the CD-ROM drive, the boot
process continues with a "not loaded" message concerning the CD-ROM
driver."
'PPera' (one of these days I'll remember to ask for a full name) tells
Hallvard:
"This is what we have. CD support is far from satisfying. You should
go on some commercial solution.
Writing CD drivers from hobby is simple not possible - there is too
much documentation required. It costs time and money."
Uwe Seimet admonishes PP:
"Julian Reschke's SPIN! is (or at least was) available for free, which
IMO means that he wrote it as a hobby. I doubt that writing a CD-ROM
driver needs more time than writing a hard disk driver, and there are
also free hard disk drivers.
By the way, there is a way to use data CDs without a CD-ROM driver, but
it requires a CD-ROM drive that supports 512 physical bytes per sector.
In particular with old CD-ROM drives there were jumpers to configure
this. With such a drive one can write a sector copy of a hard disk to
the CD and then boot from it with HDDRIVER."
Hallvard explains to Uwe:
"The issue isn't that I want to boot directly from a CD, but rather
that I don't want the computer to freeze if it boots without any CD in
the CD-ROM drive.
Will buying commercial CD-ROM software ("Extendos" from Anodyne?) do
away with this problem?
Is there other software that I could try out to see if it solves my
problem?"
Uwe replies:
"I think so, just ask Anodyne. The computer freezing is definitely not
normal when no CD is inserted. I have never had this problem with my
Atari.
You can also try out SPIN!, but I do not know a current download link."
Well folks, I'm going to call it a day. That's about all the stuff for
this week. I'd better get outta here before the men in dark suits show
up a'knockin' on my door. [grin]
Make sure you tune in again next week, same time, same station, and be
ready to listen to what they are saying when...
PEOPLE ARE TALKING
=~=~=~=
->In This Week's Gaming Section - 'Halo 3' To Save Xbox 360?
""""""""""""""""""""""""""""" Iran's New Game, Response!
It's Time for Baseball!
And much, much more!
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
Nintendo vs. Sony vs. Microsoft
News from the virtual world:
* E3 MINI: This year's version of the Electronic Entertainment Expo -
newly christened the E3 Media & Business Summit - was much smaller than
last year's, but it wasn't just the lack of crowd noise that made it seem
a lot quieter. Last year, Sony and Nintendo were still gearing up for the
launches of the PlayStation 3 and the Wii, respectively, while Microsoft
was trying to build momentum for the Xbox 360. Now that the pre-launch
jitters are out of the way, all three companies are focused on finding a
larger audience.
* Wii ALMIGHTY: Nintendo had the most to crow about, with Wii sales
gaining on the 360 and the DS dominating portable gaming. The company
didn't make any big new software announcements, concentrating instead on
2007 releases like "Super Mario Galaxy" and "Metroid Prime 3: Corruption"
(for the Wii) and "The Legend of Zelda: Phantom Hourglass" and "Brain Age
2" (for the DS).
Nintendo did show off some new peripherals designed to appeal to the more
casual gamers who have made the Wii a smash. The Balance Board is a
pressure-sensitive panel, about the size of a bathroom scale, that you
stand on while working out to the company's new "Wii Fit" software. The
Wii Zapper turns the Wii remote into a gun, for shooting games like
Capcom's "Resident Evil: Umbrella Chronicles"; the Wii Wheel turns it
into a steering wheel, for driving games like the next-generation "Mario
Kart."
During his E3 press conference, Nintendo of America president Reggie
Fils-Aime noted that the Wii has been sold out every week since its debut
last year - and executives acknowledged that shortages are likely to
continue through this year's holiday season.
* CENTRAL STATION: Sony led off E3 with a $100 price cut on the current
PS3 and the announcement of a new model with a heftier hard drive. But
any positive vibes were dissipated later in the week when a Sony executive
revealed that the older model was being discontinued - so the $499 PS3
deal will last only until inventory runs out. A Sony representative told
the Next-Gen Web site, "We have ample inventory to meet the immediate
needs of consumers in (North America) for several months to come," but the
switcheroo seems like it's bound to confuse consumers.
Most of the games Sony showcased were previously announced
works-in-progress like "Killzone 2," "Uncharted: Drake's Fortune" and
"Heavenly Sword." "Sly Cooper" developer Sucker Punch showed up with a
new superhero franchise, "Infamous," while the PlayStation Network will be
getting an intriguing new 3D puzzler called "Echochrome."
Meanwhile, the PlayStation Portable is getting a makeover. The new model
will be slimmer and lighter, and its battery will last longer (thank
goodness). It will also have video output, so you can play PSP games on
your TV at home.
* X OVER EASY: The Xbox 360 currently has the most wide-ranging game
library of any of the three new consoles, and Microsoft vice president
Peter Moore spent most of his E3 presentation talking about the system's
exclusives. The big gun, of course, is "Halo 3," but the supporting
players in the 360's 2007 lineup - "BioShock," "Blue Dragon," "Mass
Effect," "Project Gotham Racing 4" - make the console pretty much
indispensable.
Microsoft did make one concession to the "party game" market that
Nintendo's Wii has opened up. The most family friendly new title for the
360 was "Scene It? Lights, Camera, Action," based on the popular board
game. The Xbox version includes 1,800 new trivia questions and will be
packaged with four "big-button" control pads, meant to appeal to players
who may be intimidated by traditional video-game controllers.
* NEW IN STORES: Is it time for football already? EA Sports brings on
"NCAA Football 08" (for the Xbox 360, PlayStation3 and PlayStation 2),
while 2K Sports returns to the gridiron with "All-Pro Football" (360,
PS3). ... EA Sports also has "Rugby 08" for the PS2. ... Sony brings "Hot
Shots Tennis" to the PS2 and "PaRappa the Rapper" to the PlayStation
Portable. ... Namco Bandai tells "Tales of the World: Radiant Mythology"
on the PSP.
'Halo 3' Called On To Combat Xbox 360 Woes
Microsoft is counting on the biggest weapon in its video-game arsenal,
Halo 3, to boost the Xbox 360's fortunes after the company's warranty
problems.
At the company's event Tuesday on the eve of the E3 video game industry
convention, Bungie Studios showed the first live footage from the second
sequel in the best-selling sci-fi combat series.
Halo 3, which arrives in stores Sept. 25, will come in three flavors: a
$60 standard edition; $70 for a limited edition with a bonus making-of
disc and art book; and $130 for a limited "Legendary" edition that comes
in a Spartan military helmet case.
The first two games in the Xbox-exclusive series have sold a total of
nearly 15 million copies.
"If it wasn't for Halo, the Xbox wouldn't exist today," says Van Baker of
information technology research firm Gartner. "It's going to make or
break their fortunes this year on Xbox 360."
Microsoft also will bring to market a special green-and-gold-finished
Halo 3 Xbox 360 system with matching wireless controller, headset and 20GB
hard drive (available in September, no price set).
Microsoft also previewed two new popular-franchise entries with release
dates sandwiching Halo 3's: Madden NFL 08 (EA Sports, Aug. 14) and Grand
Theft Auto IV (Take Two Interactive, Oct. 16). Microsoft has a deal for
exclusive GTA IV content to become available on the Xbox Live online
service next spring.
"The only place you can play all three games is on Xbox 360," says Peter
Moore, vice president of Microsoft's Interactive Entertainment Business.
The company hopes to see no downturn in hardware sales after last week's
announcement it was extending Xbox 360 warranties from one to three
years. The company made the move in response to a larger-than-expected
number of units failing prematurely.
Early reports from retailers found no slowdown, Moore says. "I'm
optimistic, quite frankly, that we have broken down any purchase barrier
with consumer confidence to the Xbox 360 console by standing by it with
the extended warranty," he says.
However, Baker says, Microsoft could reassure potential buyers with "a
statement that we know what caused the problems."
Among other games for Xbox 360 due for the holiday season is a movie
trivia game, Scene It? Lights, Camera, Action (no price set). It features
HD movie clips and four new controllers "with a huge button in the
middle," Moore says. "If you know the answer, you hit it."
* Electronic Arts will unveil early footage of games being developed with
director Steven Spielberg. One is an action game, code-named LMNO (for
Sony PlayStation 3, Xbox 360 and PCs); the other, PQRS (for Nintendo
Wii), involves manipulating blocks a la Tetris. Spielberg got the
Tetris-like idea after playing tennis on the Wii with Nintendo's Shigeru
Miyamoto (creator of Mario, Zelda and Donkey Kong). "I am truly enjoying
the creative collaboration, and we hope that gamers will be as excited as
we are about what we can bring to the medium through our shared vision,"
Spielberg said in a statement.
* Guitar Hero III: Legends of Rock (for PS3, Xbox 360 and Wii, due this
fall from Activision, no price set) will include an original track from
Slash of Velvet Revolver, former guitarist for Guns N' Roses. Slash will
appear as a character as well. His former band's song, Welcome to the
Jungle, will be featured in the game, as will more than 20 unlockable
Gibson guitar models.
Iran's New Game: 'Rescue Nuke Scientist'
An Iranian hard-line student group unveiled a new video game Monday that
simulates an attempt to rescue two Iranian nuclear experts kidnapped by
the U.S. military and held in Iraq and Israel.
The "Rescue the Nuke Scientist" video game, designed by the Union of
Students Islamic Association, was described by its creators as a response
to a U.S.-based company's "Assault on Iran" game, which depicts an
American attack on an Iranian nuclear facility.
"This is our defense against the enemy's cultural onslaught," Mohammad
Taqi Fakhrian, a leader of the student group, told reporters Monday.
Iran and the U.S. have been in a standoff over Iran's nuclear program,
which Washington alleges is a cover for developing atomic weapons. Tehran
denies the charges and says its nuclear projects have peaceful purposes.
Tensions also have escalated over the detention of five Iranians in Iraq.
U.S. authorities have said the five include members of Iran's elite Quds
Force, which is accused of arming and training Iraqi militants. Iran has
denied the allegations and insists the five are merely diplomats.
In "Rescue the Nuke Scientist," U.S. troops capture a husband-and-wife
team of nuclear engineers during a pilgrimage to Karbala, a holy site for
Shiite Muslims, in central Iraq. Game players take on the role of Iranian
security forces carrying out a mission code-named "The Special
Operation," which involves penetrating fortified locations to free the
nuclear scientists, who are moved from Iraq to Israel.
To complete the game successfully, players have to enter Israel to rescue
the nuclear scientists, kill U.S. and Israeli troops and seize their
laptops containing secret information.
If players fail a mission, a message pops up saying: "With resistance,
you can battle the enemy." Iran's red, white and green flag flutters in
the top right corner throughout the game.
"We tried to promote the idea of defense, sacrifice and martyrdom in this
game," Fakhrian said.
Fakhrian said his group was trying to market the video game first in Iran
and other Muslim countries. But the group also has plans to bring the
game, which comes on a CD for computers, to Western countries, he said.
The game comes from the same student group that was behind the infamous
"World Without Zionism" conference in 2005 where President Mahmoud
Ahmadinejad called for Israel to be "wiped off the map."
Ali Reza Masaeli, leader of the group that designed the new game, said it
took three years for his technical team to produce it. The team was based
in Isfahan, a city in central Iran that houses a nuclear site.
"It is an entirely Iranian product in response to the U.S. cyber war
against Iran," Masaeli said.
This game follows the free "Assault on Iran" online series from New
York-based Kuma Reality Games. That game simulates U.S. Special Forces
destroying the Natanz uranium enrichment facility in central Iran. A
message left with Kuma's public relations agency was not immediately
returned.
Time For Baseball!
Hardcore baseball fans, dust off that PlayStation 2 because the champ is
back.
Just in time for spring training, Sony's *MLB 07: The Show* builds on the
success of its predecessor, "MLB 06: The Show."
Making its way to center stage once again in "MLB 07: The Show" is the
expansive and multifaceted Career Mode.
For those unfamiliar with Career Mode, you take control of one of
baseball's raising stars from spring training to the championships.
But this year, Career Mode takes a fork in the road.
You can play from two different modes within the career mode. In the
traditional mode, you take a rookie through the development of his career
on a team where you play regular games with your rookie in the mix. The
other option is the "road to the show" where you take that player and you
can only use him throughout the game. It's good because it creates a more
focused center of play.
As a result, actual games are shorter due to a fast-forward feature
implemented by the developers. Essentially, you only play on defensive
plays that involve your created rookie. It kind of takes away a bit from
the everyday fielding by other positions but keeps the focus on your
player.
Sony has also given baseball novices another tool, which is called
Adaptive Pitch Intelligence. Basically, the computer will help guide you
as to which pitches are the best for this particular batter at that
instant. Before you select a pitch, a selected pitch will be highlighted.
It's as if the catcher is calling the pitch for you.
Another addition to "MLB 07: The Show" is a feature called the Umpire
Personalities. The aim of this feature is to drive home the fact that
every umpire calls a game differently. Each umpire will have unique
tendencies and animations. Basically, each umpire will have a different
definition of what the strike zone should be. This provides for very
tricky play, especially when you're on the mound.
Graphically, the PS2 version doesn't change much from last years "MLB
06." Controls are fairly easy to learn, even for non-baseball fans. Also,
MLB.com Headline News now features a Live MLB Ticker that will show the
live status of all MLB games going on around the league.
All of the bells and whistles that made "MLB 06: The Show" a smash hit
are back. King of the Diamond, Franchise Mode, Home Run Derby, and
Rivalry Mode are all available, as well as playing a simple exhibition
game against a buddy.
As with most sports games, the athlete on the cover is a big deal. If the
publisher selects a player who turns out to be terrible, he will never
hear the end of it. The cover honor for this baseball simulation go to an
the New York Mets' young gun David Wright.
"MLB 07: The Show" can also be found for the PSP with most of the cool
stuff included, such as Adaptive Pitch Intelligence.
Overall, "MLB 07: The Show" is a tight package and has much to offer.
Online play is great with all new options.
We here at *GameCore* headquarters can't wait for the PlayStation 3
version, which sadly isn't available now, but should be available by
opening day. For now, the PS2 version should suffice. The career mode
expansion alone should be more than enough for gamers to pick this one up.
*MLB 07: The Show* is rated "E" for Everyone (content suitable for ages 6
or older) and is available exclusively on the PlayStation 3, PlayStation
2 and PSP game consoles.
Vid-Game Review: 'Darkness' Is Different
Shut off the lights and prepare for an entertaining blend of
mafioso-meets-macabre in the new video game "The Darkness" for the
PlayStation 3 and Xbox 360.
This M-rated, $59.99 first-person shooter, based on the comic-book series
of the same name, dares to be different - and for the most part succeeds.
The surprisingly interesting story centers on mobster Jackie Estacado. He
soon finds himself on the bad side of a deal gone wrong with his employer,
who just happens to be the Don of the New York mafia.
So what does he do? Well, what does any trained assassin do? He kills
stuff.
In "The Darkness," that includes pretty much everything in his path -
mobsters, police officers and random strangers - in a blood-soaked zeal
to exact revenge on his former employers.
He has a variety of weapons, including pistols and shotguns, at his
disposal.
What makes this game different from other first-person shooters are the
demonic powers Estacado gains as the game progresses.
You see, Estacado isn't just a professional killer. He's also somehow
become possessed by evil spirits, giving him a pair of grisly, snarling
tentacle-like serpents that sprout from his shoulders with the tap of a
button.
He can summon this "Darkness" mode and other powers at will, and with
devastating results on his enemies.
He gains the ability to withstand gunshot wounds more effectively, and
his supernatural abilities add various possibilities. I was able to guide
one of the tentacles around corners to take out enemies from afar, for
example.
You also can summon little demonic buddies who'll help unlock doors and
fight for you. (Just be sure to shoot out all the street lamps; demons in
this world don't last long when exposed to light).
It's this dynamic that makes the game so much fun. There's shooting
aplenty, but the demonic powers bring a new dimension to the action,
making the game much more that a simple point and shoot affair.
Blood splatters everywhere and the language is definitely adults-only,
but this is a game that lets you bring out your inner demon unlike any
other.
I did have a few complaints. "The Darkness" has some excellent graphics
but the screen is - surprise, surprise - very dark. I found it hard to
see unless I shuttered the blinds and flicked off the lights.
Another complaint, though it is really a compliment of sorts, is that
"The Darkness" felt too short and left me wanting more. I blew through
the game in a couple days; more dedicated players could probably do it in
one extended sitting.
"The Darkness" is proof that sometimes, anyway, it's good to be bad.
Three stars out of four.
"Casual" The New Video Game Buzzword
Video game companies are hungrily eyeing the millions of people for whom
mowing down alien invaders or battling ninjas holds limited appeal.
The video game industry's annual expo is always a showcase for
testosterone-filled fighting and driving titles, but this year the word on
the lips of many executives is 'casual.'
Driven by the runaway success of Nintendo Co. Ltd.'s motion-controlled Wii
console, makers are pumping out games to play for a few minutes or on the
run, such as puzzles and virtual card games - to the extent that some
analysts worry the industry may be spreading itself too thinly.
"There may be a 'casual' glut by 2008," UBS analyst Ben Schachter wrote
in a note to clients.
Kathy Vrabeck, head of the newly formed casual games unit at top
publisher Electronic Arts Inc., said in an interview that "it's a very
difficult business model," given a variety of platforms, from cell phones
to consoles, for instance.
But EA devoted almost its entire media briefing at the E3 expo in Santa
Monica, California this week to showing off new casual games such as Wii
rhythm title "Boogie."
"We believe it's going to be the fastest-growing area within all of
gaming," Vrabeck said.
UbiSoft, Europe's biggest publisher known for its slate of realistic
military games, also lingered on the casual theme, showing off titles
meant to appeal to women, such as "My Life Coach" for Nintendo's DS
handheld.
The company expects casual games to account for 20 percent of its revenue
this year, double last year's figure.
"It's not the better graphics, it's not the fancy controllers. What we're
talking about is widening the nets, bringing more people into our
industry," said Tony Key, UbiSoft's vice president of U.S. marketing.
The industry, whose global revenue topped $30 billion last year, has tried
for years to shake the stereotype that its consumers consist chiefly of
teen-age boys with too few social skills and too much leisure time.
Yet the Entertainment Software Association puts the age of the average
game player at 33 years, and says 24 percent of players are over the age
of 50. That's almost as much as the portion under the age of 18 - 28
percent.
The surge of interest in casual games is partly the result of shifting
economics that have pressured the bottom lines of many firms.
An A-list title for new gaming consoles from Microsoft Corp. and Sony
Corp. can now take four years to make and cost $30 million, two to three
times the cost of games for the previous generation of machines.
Yet retail prices have only risen 20 percent, to $60 for a newly released
top title.
Moreover, publishers' hopes that gamers would rush to adopt new hardware
were dashed by the high cost of the consoles. Fewer consoles in homes
meant a smaller base of potential game buyers, and thus weaker sales of
those costly new games.
By contrast, casual games, with their simpler graphics and controls, can
cost well under $1 million and take just a few months to make. Although
they might sell for as little as $5 to $30, they appeal to a broader
audience.
Casual games also have their own set of challenges. While much of the
focus has been on the Wii and DS due to their popularity, mobile phone and
online games strongly appeal to women and older players.
A single mobile phone game may need to be tweaked to run on up to 300
different handset models, and unlike hard-core gamers who don't blink at
spending hundreds of dollars a year on the newest games, the casual
audience may not become repeat customers.
"Nintendo seems to be the one company that's expanding the gaming market,
but there's some cause for concern there because who they're attracting
is the casual gamer," said Van Baker, an analyst with research firm
Gartner.
"That's something that someone picks up and does for 15 to 20 minutes and
then they put it aside. The question is, in three months or six months,
is the Wii going to be sitting in the corner forgotten?"
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
EU To Rule On Microsoft Appeal
The European Court of First Instance will give its long-awaited verdict in
Microsoft Corp.'s antitrust appeal on Sept. 17, people involved in the
matter said Tuesday.
It is by far the biggest antitrust case ever referred to the European
Union's second highest court. The outcome of the appeal, which will have
taken more than three years, will influence the future shape of the
software industry and be a reference point for future antitrust cases,
especially those in the fast-changing world of information technology.
The European Commission ruled in 2004 that Microsoft had abused the
dominant position of its Windows OS to muscle in on other sectors of the
software market.
By bundling Windows Media Player, its audio and video playing software,
into Windows, Microsoft competed unfairly against rivals such as Real
Networks Inc. and Apple Inc., the Commission ruled. And by failing to
share technical information about how to interoperate with Windows PCs,
Microsoft managed to steal a march in the market for low-end server
operating systems.
Microsoft appealed both threads of that ruling, and in April last year the
court held a three-day hearing at which the Commission and Microsoft,
together with their respective software industry allies, tried to convince
the judges of their arguments.
There are four possible outcomes of September's decision, two of which are
clear cut but unlikely, and the other two mixed and more probable.
First clear-cut but unlikely outcome: the court sides with the Commission
on both parts of the case - media player and server interoperability. It
deems Microsoft an obstacle to innovation in the software industry and
orders the immediate break-up of the company, effectively appropriating
the Windows operating system and making it a public utility.
Second clear cut but unlikely outcome: the court sides with Microsoft on
both counts. It declares that the break-neck speed of change in the IT
industry is defined by a string of monopolies and that one monopoly is
inevitably overtaken by another in time. Therefore, regulators should not
apply antitrust laws too strictly, and should allow dominant operators
such as Microsoft to use all means to prolong and expand their dominance
of a market.
More likely, the court will give a mixed ruling. It may side with the
Commission on interoperability but uphold Microsoft's appeal of the
bundling ruling. Microsoft is ordered to release all interoperability
information to rivals immediately. The result would be growth of
Microsoft's largest direct rivals, at its expense, and a flattening of
the software market as we know it today, with Microsoft brought slightly
more into line with the likes of Sun Microsystems Inc., Oracle Corp.and
IBM Corp. It would also open up Microsoft Office to open source software
rivals, who until now have been marginalized in the lucrative desktop
application market.
However, Microsoft would no longer need to sell a second version of
Windows with the Media Player stripped out, which it has been forced to do
in Europe today, and it would most probably bundle more and more features
with Windows in future, to the likely detriment of any halfway successful
innovation from a software developer such as Google.
In a nutshell, this outcome would restore fair competition in the
software markets that existed in the 20th century but it would do nothing
to impede Microsoft from muscling in on new markets that have already
started to emerge this century.
Alternatively, Microsoft could lose the bundling argument but win on the
interoperability side. The Court orders Microsoft to set up a separate
company to sell a completely unbundled version of Windows, a
turbo-charged "edition N," if you like (the name for its version of
Windows without Media Player). This separate entity would be free to
compete with the fully bundled version, and free to strike partnerships
with any other software developer.
However, Microsoft could still withhold information about Windows from
rivals to handicap them in some markets, such as the low-end server
operating system market. This would allow Microsoft to dominate the
traditional, office-based computing environment, at the expense of rivals
such as Sun Microsystems, IBM and Oracle.
Put simply, this outcome would secure Microsoft in all the fat, but
mature markets connected to the office environment, but would limit its
ability to fend off challenges in new fields linked to the Internet.
The third of these outcomes is the likeliest, according to lawyers
following the case, although none would be quoted predicting the court's
decision.
FBI, Military Names Being Used In E-mail Scams
The FBI's Internet Crime Complaint Center (IC3) is warning of fraudulent
e-mails that appear to come from the FBI and U.S. military.
"The IC3 has increasingly received intelligence of fraudulent schemes
misrepresenting the FBI and/or Director Robert S. Mueller III," the center
said in an alert published Tuesday. "The fraudulent e-mails give the
appearance of legitimacy due to the usage of pictures of the FBI Director,
seal, letterhead, and/or banners."
The spam is actually pumping lotteries or are phony inheritance
notifications, the IC3 said.
Other scams use the FBI's name to "intimidate and convince the recipient
the e-mail is legitimate," the IC3 said. Criminals have used the agency's
name in extortion e-mails and online auction scams as well.
The IC3 is a clearinghouse for complaints of criminal activity on the
Internet. Run jointly by the FBI and the National White Collar Crime
Center, it works with other law enforcement agencies and industries to
help crack down on illegal online activity.
In a separate statement also issued Tuesday, the IC3 warned that scammers
were also sending out fraudulent e-mail claiming to be from U.S. soldiers
stationed overseas. "The scam e-mails vary in content; however, the
general theme of each is to request personal information and/or funds from
the individual receiving the e-mail," the IC3 said.
The e-mails are variations on long-running scams such as the Nigerian
"419" spam, which has been "surprisingly effective at extracting large
amounts of cash from victims.," said Adam O'Donnell, a senior research
scientist at antispam vendor Cloudmark.
"Users have to be aware that anyone asking for your bank account
information via e-mail, regardless of their stated reason, is trying to
steal your hard-earned money," he said.
FBI Uses Spyware To Track Bomb Hoax
A recently released FBI affidavit in the prosecution of a suspected bomb
hoaxer has revealed the development and deployment of an FBI spyware
program called the Computer & Internet Protocol Address Verifier (CIPAV).
According to Special Agent Norm B. Sanders, Jr., who applied for an
affidavit authorizing the use of CIPAV, the program is capable of secretly
sending to the FBI information about a computer's IP and MAC addresses,
other environment variables, and certain registry-type information.
Lauren Weinstein, cofounder of People for Internet Responsibility and
moderator of the Privacy Forum, said he was not surprised by the
information contained in the affidavit.
"Look, many people have known or suspected for a significant time that
various agencies are using this technique for surveillance," he said. "It
was inevitable that this type of software tool would be developed by law
enforcement, particularly given the advances in techniques for concealing
and encrypting electronic information."
The search warrant authorizing the use of CIPAV was sought in the case of
15-year-old Josh Glazebrook, a student at Timberline High School in
Washington who was suspected of making bomb threats. A handwritten note
containing a threat was discovered on May 30, and the high school
subsequently received e-mail threats and was hit by a denial-of-service
attack.
A week later, another student reported receiving an invitation from a
MySpace account with the handle "Timberlinebombinfo," asking her to post
a link to the bomb threats on her MySpace page. She reported the
invitation to local law enforcement, which subsequently learned that 33
students had received a similar invitation.
When the FBI traced the IP address of the e-mail and MySpace accounts,
they were led to a hijacked computer in the National Institute of Nuclear
Physics in Italy. Having reached a dead end, they determined that the next
step was to send CIPAV to the e-mail address from which the bomb threats
were sent.
The information collected by CIPAV led to the arrest of Glazebrook, who
pleaded guilty on Monday to identity theft, felony harassment, and making
bomb threats. He was sentenced to 90 days in juvenile detention.
While noting that the Glazebrook case is not particularly remarkable,
Weinstein said that it does raise concerns about the power of CIPAV and
what types of information is being gathered by law enforcement. "Once
you've got something like this on someone's computer," he noted, "you can
basically do anything and learn everything about what that person is
doing."
The recent revelations about scope of the FBI's use of National Security
Letters, Weinstein said, undermines the overall confidence in security
and law enforcement agencies, and raises questions about whether a
program like CIPAV will only be used as the FBI says it is being used.
"If techniques like this are going to be used by the FBI and other
agencies," Weinstein said, "then we need to have 100 percent trust in the
agencies about when such tools will be deployed and under what
circumstances. That's the challenge for this society."
Bots Beware: Symantec's AntiBot Is Here
Bots everywhere, beware. Symantec announced on Tuesday the release of
Norton AntiBot, which the company is calling the first targeted security
solution for consumers wishing to fight the "growing botnet pandemic."
The security software firm said that Norton AntiBot is a real-time "bot
detection and removal solution" that continually monitors PC applications
and processes while complementing existing protections.
AntiBot uses behavior-based detection, according to Symantec, which means
that the software looks at how files and applications are functioning so
that malware can be detected and removed as soon as suspicious behavior
shows up.
Bots are a growing threat to networked computer users, and are thought to
be used in many criminal schemes as hard-to-trace robot workers often
controlled by a single botmaster. Symantec said that there were more than
six million active bots in the last six months of 2006, about 30 percent
more than the previous six months.
Rowan Trollope, a Symantec senior vice president, pointed out that most of
those users did not realize that their computers were being hijacked for
malicious purposes.
Bots can take over a computer's processes, usually secretly, turning the
PC into the computer equivalent of one of those aliens in Invasion of the
Body Snatchers. According to Symantec, if bots are improperly removed,
sometimes they can simply reinstall themselves.
But some observers are resisting the layered, multipackage, multipricetag
approach to keeping their computers secure. Networked PCs these days seem
to have as many layers of protection as a deli in a neighborhood caught
between warring gangs.
AntiBot adds "yet another application to the list of security tools
needed by PC users to avoid computer takeover attacks," ZDNet's Ryan
Naraine wrote in his blog on Tuesday. Naraine said that computer security
products, including antivirus, antispyware, antirootkit, antispam, and
others, suck "valuable system resources under the guise of protecting you
from hacker attacks."
Symantec, for instance, is suggesting that AntiBot be used in conjunction
with its Norton AntiVirus, Norton Internet Security, and Norton 360
packages.
For those who do want to add another layer of protection to their
computer security, Norton AntiBot is available for $29.99, which includes
a one-year subscription to updates.
Cyber Extortionists Reappear, Attack U.S. Companies
Online extortionists have resurfaced, breaking into users' systems,
encrypting their data, and then holding it hostage until a $300 ransom is
paid.
A cyberblackmailer tormented users in Russia between 2005 and 2006. Now
the extortionists have reappeared, according to researchers at
Moscow-based Kaspersky Lab. And it also appears they've branched outside
Russian borders.
"It is easy to imagine how upset a user would be when they wake up on a
sunny June morning and discover that their files are unusable: either
they can't be opened or, in the case of .txt files, they contain
garbage," wrote Olga Emelyanova and Denis Nazarov in a blog last year.
"And it's not only MS Office documents - over 80 different types of files
are affected."
GpCode, which used RSA algorithms to encrypt the users' data, has popped
back up again on the Internet, with users outside of Russia reporting
that their documents, photos, and archived files have been tampered with,
reported Aleks Gostev, Kaspersky's senior virus analyst, in a blog entry.
Researchers at Prevx, a U.K.-based Internet security company, reported
that the attackers have hit major U.S. companies and government agencies.
Prevx discovered a Trojan called NTOS.exe. A spokesman for Prevx said
they believe the same attackers are using two different tools.
"Prevx feels it is critical for these major organizations and government
agencies to block any and all access to their computers and systems by
any of the stolen passwords," said Prevx CEO Mel Morris, in a statement.
"It's possible that the authors of this malware, and any parties to whom
they may already have sold information, could gain what appears to be
legitimate access to the compromised systems. This could also lead to
further access to additional confidential information."
According to Kaspersky, the users under attack found that their documents
were turned into junk data, while a file called "read_me.txt" was left on
their systems.
The message, according to Gostev, reads, "You will need at least few
years to decrypt these files without our software. All your private
information for last 3 months were collected and sent to us. To decrypt
your files you need to buy our software. The price is $300 If you will
not contact us until 07/15/2007 your private information will be shared
and you will lost all your data."
The message is signed by the "Glamorous Team."
The malware, which Kaspersky named Virus.Win32.Gpcode.ai, has a limited
shelf life, from July 10 to July 15, reported Gostev.
Prevx is making decryption software available free of charge to consumers
and businesses whose computers may have become infected and encrypted by
the malware. Additional information is available at this Web site.
Prevx researchers, though, say the extortion is just a cover for the
attackers' true intent - harvesting sensitive information, like logons and
IP addresses.
Data-Stealing Trojan Disclosure Frustrates
Researchers, Vendors, and Law Enforcement
There are two questions in the realm of IT security that simply won't go
away: Can cybercrooks successfully attack at will, and are those who
report the details of these attacks causing more harm than good? The
revelation earlier this week by a security vendor and research firm that
a Trojan-horse may have stolen sensitive information from hundreds of
businesses and government entities has revived this heated debate.
U.K.-based security vendor Prevx says its software last week detected a
program running on customers' computers that behaved suspiciously,
creating an outbound HTTP connection to a Web site and sending information
out of customers' IT environments. "These were classic behaviors of an
information-stealing Trojan," Prevx CEO Mel Morris told InformationWeek.
Further study led Prevx researchers to a directory on a Web site
identified as www.martin-golf.net/pajero, which was live up until Tuesday
afternoon Eastern Time but has since been taken down. The directory
offered a list of 494 different computers (identified by their IP
addresses) that were running the mysterious program Prevx had found. The
program encrypted sensitive information such as logins and passwords
while leaving an online ransom note informing the victim that all of
their private information for the last three months had been taken and
that they needed to pay $300 to buy software from the cybercrook that
could decrypt the info.
Morris noted that the martin-golf.net directory was just a front for the
cyberscam and that site's owner likely had no knowledge their site was
being misused in this way.
Prevx, having determined that this was the work of a Trojan that had
infected computers at hundreds of businesses and government agencies,
notified U.K. law enforcement as well as the FBI in the U.S., Morris
said. The next step was to send copies of the malware to a number of
other security vendors, whose products Morris claimed had failed to
detect the Trojan, which was relatively unsophisticated in that it didn't
use a rootkit or techniques for hiding itself.
Here's where the story gets a bit contentious and exemplifies the
competitiveness in the security vendor market as well as the fine line
that security researchers walk when they want to disclose their findings.
Morris said that he and his team on July 14 alerted the FBI to the
presence of this Trojan and had a conference call with the agency the
following day. Prevx told the agency that it had identified 494 computer
systems that had encrypted and transmitted about 200 Mbytes worth of
data, which Prevx had decrypted only to find logins, passwords, and other
sensitive data. "The FBI said they would be moving forward with their
investigation," he said. The FBI confirmed that they had been contacted
by Prevx, but would provide no further details nor confirm whether the
July 15 discussion took place.
Prevx has spoken freely about which companies it contacted to inform them
that they'd been hit by the Trojan. Morris claimed that the Trojan was
found inside IT systems belonging to American Airlines, Booz Allen
Hamilton, and the State Department, although none of them would comment
on Prevx's story. Morris characterized their reaction to Prevx as
ranging from apathetic responses ("they're too busy") to indignant
responses that questioned Prevx's credentials.
Likewise, Prevx claimed to have contacted several security vendors to
alert them that their products had not caught the Trojan. One of the
security vendors, Trend Micro, acknowledged that it was aware of the
Trojan and that its products can now detect and protect customers against
this Trojan.
Yet Trend Micro was "ethically taken aback" by what they see as Prevx's
cavalier attitude to go public so quickly with their research, David
Perry, global director of education told InformationWeek.
Trend Micro, however, is no stranger to controversy over security
disclosure. In late September, 2006, the company, which had been studying
software bots and promoting a service to detect such bots, reported
finding bot infestations in numerous government agencies. Trend Micro's
list included the Defense Department, the Navy Network Information Center,
and the Pittsburgh Supercomputing Center. Several organizations on the
list challenged Trend Micro's research.
While it's not clear how much damage the Trojan in question has caused or
why its creators were asking for only $300 in ransom, it is obvious that
the IT industry, its customers, and law enforcement still aren't on the
same page when it comes to finding, reporting, and fixing security
threats.
Former Spammer: 'I Know I'm Going to Hell'
"Ed," a retired spammer, built a considerable fortune sending e-mails that
promoted pills, porn and casinos. At the peak of his power, Ed says he
pulled in US$10,000 to $15,000 a week, storing the money in $20 bills in
stacks of boxes.
It was a life of greed and excess, one that preyed especially on
vulnerable people hoping to score drugs or win money gambling on the
Internet. From when he was expelled from high school at 17 until he quit
his spam career at 22, Ed - who does not reveal his full name but
sometimes goes by SpammerX - was part of an electronic underworld
profiting from the Internet via spam.
"Yes, I know I'm going to hell," said Ed, who spoke in London on Wednesday
at an event hosted by IronPort Systems Inc., a security vendor now owned
by Cisco Systems Inc. "I'm actually a really nice guy. Trust me."
A quick-witted and affable guy who wears an earring and casual clothes,
there was a time when Ed wasn't so nice. He sent spam to recovering
gambling addicts enticing them to gambling Web sites. He used e-mail
addresses of people known to have bought antianxiety medication or
antidepressants and targeted them with pharmaceutical spam.
In short, Ed said he was "basically what people hate about the Internet."
He spent 10 hours a day, seven days a week studying how to send spam and
avoid filtering technologies in security software designed to weed out
garbage e-mail. Most spam filters are effective 99 percent of the time;
he aimed for that remaining window, using tricks such as including
slightly different images in his spam, which can fool filters into
thinking the e-mail is legitimate.
"The better I got at spam, the more money I made," Ed said.
He would start a spam run by finding an online merchant who wanted to sell
a product. Then he'd acquire a list of e-mail addresses - another
commodity that has spawned its own market in the world of spam. He'd also
set up a domain name, included as a link in a spam message, that, if
clicked, would redirect the recipient to the merchant's Web site,
enabling Ed to get credit for the referral.
The spam would then be sent from a network of hacker-controlled computers,
called botnets. Those machines are often consumer PCs infected with
malicious software that a hacker can control. Ed would "rent" time on
those computers from another group of hackers that specialized in
creating botnets.
If one of the spam recipients bought something, Ed would get a percentage
of the sale. For pharmaceuticals the commission was around 50 percent, he
said.
Response rates to spam tend to be a fraction of 1 percent. But Ed said he
once got a 30 percent response rate for a campaign. The product? A niche
type of adult entertainment: photos of fully clothed women popping
balloons.
To track the money, merchants set up a "referral sales page" where
spammers can see how much they make from a spam run. Ed would log in
frequently, watching the money increase. He was paid into electronic
payment transfer accounts, such as e-gold or PayPal, or into his debit
card account, which he could cash out in $20 bills.
That became problematic when the cash became voluminous. He says he made
$480,000 his last year of spamming. But the lifestyle of being a spammer
was taking a toll. In essence, he had no life.
It's hard to go into a bar and explain your job to a woman by saying "I
advertise penis enlargement pills online," Ed said. "It doesn't go down
very well."
He rationalized his actions by saying spamming is not like robbing
someone, although the lurid impact of spam was clear. Some nine million
Americans have some dependence on prescription drugs, Ed said, and he
noticed that the same people were buying different drugs each month.
"These were addicts," he said.
Additionally, "the product is always counterfeit to some degree. If
you're lucky, sometimes it's a diluted version of the real thing," he
said. Viagra is cut with amphetamines, and homemade pills are common from
sketchy labs in countries such as China, India and Fiji, Ed said.
So Ed got out of the business. He's written a book, "Inside the Spam
Cartel: Trade Secrets from the Dark Side," which he said has had some
take-up in law enforcement circles eager to learn more about the spam
business, which he projects will only get worse.
As broadband speeds increase, spammers will increasingly look to market
goods by making VOIP (voice over Internet Protocol) calls or sending out
videos, Ed said. The ultimate unsolvable problem is users, who continue
to buy products marketed by spam, making the industry possible.
"I think in 10 years we'll still get spam," Ed said. "Be prepared to be
bombarded."
Wal-Mart To Sell $300 PC With OpenOffice
Wal-Mart opened its campaign for the back-to-school PC sales season on
Wednesday by unveiling a $298 desktop from Everex that combines three of
the most popular industry trends - open-source software, a power-efficient
processor, and a lack of "bloatware."
The Everex Impact GC3502 uses Microsoft's Windows Vista OS but substitutes
the OpenOffice.org 2.2 version of word processing and spreadsheet tools
for the traditional Microsoft Office variety. The computer runs on a
1.5GHz C7-D processor from Via Technologies, a chip that meets lead-free
environmental regulations and saves energy with low wattage demands.
The sales price does not include a monitor but is still lower than
comparable packages sold on Wal-mart's Web site, such as an HP Compaq
Presario, an Acer America AcerPower FH Minitower, and a Dell Dimension
desktop.
PC vendors usually compete for customers by slashing prices during the
eight-week back-to-school season, stretching from mid-July to
mid-September. But Everex also hopes to attract buyers by avoiding the
free "trial software" that annoys many users, according to Eugene Chang,
a product manager at Everex, of Fremont, California.
Dell followed a similar strategy on July 10 when it withheld bloatware
from its new Vostro line of PCs for small business users after a
long
campaign by bloggers and Dell customers against common practice by PC
vendors of loading unrequested software onto new computers. Software
companies fund the effort as a way to find new users.
Although those features are popular, they could backfire on Everex because
most U.S. consumers are not yet familiar with Via processors or OpenOffice
software, one analyst said.
"It's not surprising that Wal-Mart, of all retailers, will sell the $298
Everex desktop; it's a good marriage with their biggest audience - budget
buyers," said Toni DuBoise, a senior analyst with Current Analysis West.
"But it has a couple of problems; one is that it uses a Via processor,
which is almost unknown to U.S. consumers. And it runs at just 1.5 GHz,
so it's unknown how it will handle Microsoft Vista," she said. "And
running OpenOffice is kind of a unique tactic. It's anti-Microsoft as
Microsoft obviously owns the market for productivity software. So users
may have some concerns about compatibility."
Firefox Nipping at IE's Heels in Europe
According to the latest results from European researchers, Firefox has
been rapidly gaining market share in Europe and elsewhere overseas at
the expense of Internet Explorer.
The French research firm Xiti Monitor reported that Firefox gained nearly
7 percent of market share among European Web surfers during the past year,
and 3.7 percent over the past four months. In the first week of July 2007,
according to the Xiti Monitor data, Firefox held 27.8 percent of the
European market.
Meanwhile, Firefox's share of North America's browser market has only
grown by 3 percent over the past year to reach 18.9 percent, XiTi Monitor
reported. So it is clear that Firefox still has a long way to go when
taking on Internet Explorer on Microsoft's home turf.
As far as worldwide appeal, global Web statistics organization W3 Counter
reported that Internet Explorer held a 66.48 percent share of the
worldwide browser market during the past week, followed by Firefox at
23.84 percent.
"I think Firefox's success in Europe of late is primarily due to the
unbelievable media coverage it has been getting in the European press,"
said Forrester Research vice president and research director Thomas
Mendel, who is based in Germany. "I mean, it's everywhere; it's in every
magazine you buy and read."
Although Xiti Monitor reported that Internet Explorer remains the most
used browser by far, the firm noted that IE is continuing to lose ground
to its main rival in Europe. When researchers examined the results in
specific European nations, they found that the use of Firefox has been
soaring in countries such as Slovenia, Finland, Hungary, Slovakia, and
Poland.
Mendel suggested that some European users might be avoiding Microsoft's
products due to its ongoing conflict with the European Union over
antitrust issues. "I think the other really interesting development here
in Europe is that the younger people have always used Linux and other
forms of open-source software," Mendel explained. "And in the
universities across Europe, students are strongly encouraged to use
open-source tools."
The latest research indicates not only that Firefox is gaining ground
against IE in Europe, but also that the browser is growing more popular
in the Asia-Pacific region.
"The whole copyright awareness in Asia is slowly changing," Mendel said.
When I lived in Hong Kong about 10 years ago, no one cared about
copyright at all. Now countries such as Singapore are enforcing their
copyright laws - which is why people there are getting more interested in
using cheap or even free open-source software."
Apple CEO Steve Jobs recently announced a Windows version of its Safari
Web browser. Some question how this might muddy the waters with respect
to the global browser market.
"I think Apple will gain a small market share but I don't think we are
talking about a major market disruption," predicted Mendel, who said he
expects Safari's appeal to PC users overseas to remain limited.
YouTube Role Grows As U.S. Election Nears
In 2004, YouTube didn't exist. Three years later, politicians have learned
to fear and revere the video-sharing Web site that has become a vital part
of the campaign for the 2008 U.S. presidential election.
From rapid dissemination of political blunders, often with funny tunes, to
a new wave of music videos featuring scantily clad women singing the
praises of their presidential favorites, YouTube.com has sparked a new
interest in politics.
More than 2.5 million people have viewed "I've Got a Crush...On Obama"
about Democratic Sen. Barack Obama since it was posted last month. A
rebuttal video of women fighting over Obama and leading Republican
contender Rudy Giuliani has been watched more than 500,000 times in four
days.
While much on YouTube is skewed to a U.S. audience, the company - bought
by Web search leader Google Inc. last year for $1.65 billion - now has
local sites reflecting that more than half of viewers are outside the
United States.
Many candidates vying for their party's nomination to run for president
have embraced the technological changes, holding polls via YouTube,
asking for campaign input and making announcements on the site.
"In the past, the campaigns sort of stuck their toe into technology and
innovation - it was a small detail of what was going on," said Phil
Noble, founder of PoliticsOnline.
"The difference in this election is that technology has become
fundamental. Every campaign has figured out ways to use YouTube all the
time."
It's not just the candidates. YouTube members are getting in too, with
thousands of people uploading video questions for upcoming CNN/YouTube
debates.
By Friday midday, more than 1,700 videos had been put on YouTube's site
for Monday's debate among Democratic andidates
(http://www.youtube.com/contest/DemocraticDebate). The Republican debate
will be on September 17.
Some 25 to 30 of the questions will be picked by a political team at CNN
for the two-hour debate. Follow-up questions may also be asked by
moderator Anderson Cooper.
Questions are about health care, Social Security, global warming and U.S.
foreign policy. Some are serious, others are not. One man played a guitar
and sang a song about whom the candidates would choose as running mates
for vice president.
Will Wrigley, a 17-year-old who will turn 18 in time to vote in November
2008, asked the candidates for their views on stem cell research.
"I just decided I wanted to have one in," he said by e-mail.
The issue was important, Wrigley added, because it could "improve the
health of the people in this nation and around the world."
Kim, a 36-year-old breast cancer patient from suburban New York, took off
her wig while saying her chances for survival were not as good as they
could have been because she - like tens of millions of Americans - had no
health insurance.
"What would you as president do to make low-cost or free preventative
medicine available for everyone in this country?" she asked.
CNN political director Sam Feist said the network decided to hold a
YouTube debate in part to highlight the enormous impact the Internet has
on politics.
"Clearly the YouTube phenomenon is the perfect opportunity to merge new
media and old media in a presidential debate," he said, adding that the
unpredictable nature of the questions will make it harder for candidates
to prepare.
Feist said the questions were asked by a diverse group of people - of all
ages and from across the country and several foreign nations. He said he
was surprised by the quality of the questions and that there were not
more about the Iraq war.
Noble, who feels it is too early to call this a "YouTube election," said
it will be fun to see even more innovation.
"What we're doing is putting the most powerful communications tools in
the hands of millions of people all at one time and saying 'Tell us what
you think about politics'."
You Have Mail... Way Too Much!
E-mail management is a critical mission that consumes many hours each week
for an already busy I.T. administrator: Fighting spam. Recovering old
messages. Securing the server. Indeed, the job is never done and the
challenge is only getting worse.
According to the Radicati Group's recent E-mail Archiving Market Research
report, the average corporate e-mail user processes about 18 MB of data
every day, and, that number is expected to climb to 28 MB a day by 2011.
While e-mail servers can handle large volumes of messages, storing so
much data can be quite the challenge.
The storage problem has led to "purge policies" that demand old e-mails
be deleted, but end users often find mailbox size restrictions quite
limiting. Many of these solutions are far from ideal. Not only do they add
another burden to the I.T. admin's back, they can also add more fees to
the corporate budget. To complicate matters even further, today's I.T.
administrators also need to ensure that their e-mail storage solutions are
keeping their company in compliance with government regulations.
"Our research shows that storage is the number one messaging-management
problem," said Michael Osterman, president of Osterman Research, a firm
that focuses on the messaging market. "Organizations are experiencing
plenty of pain in controlling messaging due to the growth of message
volume and the increasing size of attachments. Companies are looking for
new approaches."
Using an outside firm to manage your company's messaging systems is one
option. Osterman estimates the number of hosted-messaging seats in North
America at 1 million, while the Radicati Group forecasts that the
worldwide market for hosted business e-mail services will grow from $626
million in 2006 to over $1 billion in 2010. There are plenty of reasons
why more and more companies are using hosting and outsourcing services
to manage their e-mail systems, said Sudeep Trivedi, director of product
development at AT&T's USinternetworking (USi).
"E-mail has become the most difficult system to manage. Outlook is easy
to use, but behind the scenes, messaging is a complex environment,"
Trivedi said. His perspective on the problem comes from his work at USi,
which specializes in managing enterprise software and e-mail services
available from companies like Oracle, PeopleSoft, Siebel, Microsoft, IBM,
and Ariba.
"The time has come for CIOs and organizations to seriously start
thinking about offloading some of these duties to a third-party provider
so they can concentrate on things that are really important to them,"
Trivedi said. Hosted messaging saves cost, he said, because the
organization is not investing in hardware or message management. I.T.
administrators are also freed from dealing with spam, antivirus engines
and denial-of-service attacks on the e-mail servers - all costly
propositions.
Beyond the drain on I.T. administrators' time, the growing volumes of
e-mail messages also hamper end-user productivity. Researchers at Gartner
estimate that business users spend about two hours per day managing their
mailboxes, while data from Ferris Research shows that 66 percent of users
are forced to work around maximum file-size restrictions on e-mail
messages.
One potential solution to help solve the problem of e-mail storage is
being offered by IBM in the form of a "social software" product called
Lotus Connections. The Lotus Connections platform consists of five
components for managing activities, communities, profiles, blogs, and
"dogear" - IBM's lingo for bookmarking Web pages and sharing those
bookmarks with friends or associates. The "activities" tab lets employees
park documents, presentations and other collaborative content in a shared
space.
"We are trying to get out in front of this ongoing trend for e-mail
inboxes to grow and grow and grow by reducing the e-mail people are
sending," said Penny Scharfman, program director for Lotus Notes and
Domino Products. "We're doing that by providing strong tools to help
manage and store documents in a smart way. This solution [Lotus
Connections] stops the attachments from coming into your mailbox in the
first place."
Another solution to the messaging madness involves archiving systems that
take the content off the mail server and store it on lower-cost
alternatives. This option relies on a technique called "stubbing" wherein
if a user gets a message that exceeds a predefined limit, say 100 MB, or
if the user exceeds 80 percent of his or her allowable quota for e-mail,
the content is automatically removed from the mail server and put into
storage.
The messages are then replaced with a stub - a link back to the archived
message - in the user's mailbox. If the user clicks on the stub, it
pulls the content out of the archives and displays it on the screen. By
some industry estimates, this technique can reduce the volume of I.T.
server storage by as much as 80 percent without limiting user access to
old messages.
According to Osterman, archiving systems offer several advantages. First,
archival storage is less expensive than live storage. Second, if the
e-mail server goes down, it takes much less time to restore the e-mail if
most of the messages do not reside on that server. Otherwise, he noted,
users could go a day or two without e-mail access as the I.T. admin works
feverishly to restore hundreds of gigabytes of data.
With this type of system in place, Osterman said he thinks, "Users will
stop complaining about quotas."
"It's not likely that the individual user will ever reach a 100MB quota
with stubbing, even though [that user] may have tens of gigabytes of data
in the archive," he said. Osterman pointed out that archiving has
traditionally been used for purposes of regulatory compliance or
electronic discovery, and is now being adopted more widely in the
mainstream as a storage management tool.
For all the solutions that are vying for dominance in the hearts of CIOs,
analysts say none of them are end-all solutions. Messaging management,
like other aspects of technology, will continue to evolve. It does seem
though that a tiered approach to archival storage that incorporates
spinning discs and optical storage could further reduce messaging costs.
"As your storage requirements grow, you can actually drive the cost down
a little bit by going to different subsystems," Osterman said. For
example, he suggested, if data is a year old, you may need it for an
e-discovery case but it's unlikely that users are going to need frequent
access to it. Instead of keeping such data on expensive drives, he
advised, "You can store it on lower-cost, less readily-accessible media."
While none of these solutions provides the silver-bullet solution that
businesses may want, a combination of strategies can offer at least some
relief when users are hearing, "You've got mail... and it's way too
much!"
Internet-Call Service SunRocket Cuts Off Service
SunRocket Inc., the second biggest U.S. supplier of Internet phone
services, appeared to have shut down its business on Monday without
notifying its customers, which total more than 200,000.
Vienna, Virginia-based SunRocket, which is a rival to Vonage Holdings in
the home and small business market for Voice over Internet Protocol
(VoIP) phone services, gave no warning it was shutting down operations on
its Web site.
Callers to its customer service line heard a brief recorded message,
saying: "We are no longer taking customer service or sales calls.
Goodbye."
Companies offering calls over the Web were seen as rivals to established
carriers when they sprouted up a few years ago, but many are having a
difficult time financially competing against their big, deep-pocketed and
entrenched rivals.
Calls and e-mails to SunRocket by Reuters were not returned.
A report in the New York Times quoted an unnamed source that had been
briefed on the company's status as saying that SunRocket had ceased
operation and plans to move its customers to one or more companies.
Customers, many of them lured by SunRocket's offer of unlimited phone
calling for one year for an upfront fee of $199 within the Canada, the
United States and Puerto Rico, reported patchy service or full outages on
Monday on Web sites such as FatWallet.com and DSLReports.com.
SunRocket was founded in 2004 and backed by top-name Silicon Valley
venture capital firms Blue Run Ventures, formerly known as Nokia Venture
Partners, Doll Capital Management and the Mayfield Fund. No one was
immediately available to comment at the three financial backers.
ViaTalk, a rival to SunRocket based in Clifton Park, New York, issued a
statement offering a contract buyout to SunRocket customers.
The company added it was offering a coupon for free shipping of ViaTalk
phone equipment to customers looking to switch services, although it did
not lay out the what the overall cost to SunRocket customers would be.
ViaTalk offers a similar $199 per year calling deal. ViaTalk was founded
in 2005 and is an offshoot of a Web hosting company, HostRocket.com.
Spokesman Tom Nardacci said the company had between 50,000 and 100,000
customers.
Vonage, which has reported losses since it held its initial public
offering in May of 2006, has been locked in a patent battle with Verizon
Communications. It is struggling to retain customers who fear service
disruptions owing to its legal woes.
Independent VoIP providers face mounting competition from established
cable television and telephone companies who offer alternative services
as part of packages that may include landline, broadband Internet, TV or
mobile phone services.
It's No Secret: Facebook's Allure Is Its Privacy
The secret of Facebook's success, and its future viability, hinges on how
the social network site protects privacy, taming the anything-goes
intrusiveness of what might as well be known as the World Wild Web.
Chris Kelly, Facebook's chief privacy officer, said users want greater
control over who sees their personal information, rather than expecting
total privacy, or anonymity, the concept underlying much of the legal
thinking on privacy for more than a century.
"Privacy is beginning to transform from the classic 'right to be left
alone' to this notion that 'I want control over my information,"' Kelly
said in an interview on the sidelines of a Fortune Magazine technology
conference held here last week.
Started in 2004 by then-undergraduate Mark Zuckerberg as a social site
for fellow Harvard University students, Facebook has been opened up over
the last year to users of all ages, who have a degree of control over who
sees what personal details.
These privacy controls paradoxically encourage users to reveal more about
themselves within their approved circle of friends than they would do on
the wide-open Web. As a result, many post mobile phone numbers, reveal
political loyalties or even show changes in their dating status for
friends to see.
Facebook has seen membership spike 25 percent to more than 30 million
since May, when it turned the site into a big tent for outsiders to build
software inside it. This lets users engage in online activities while
limiting exposure to security pitfalls.
"We have tried to take a very control-based approach for our users, so
Facebook information doesn't leak out on the Web in general," Kelly said.
"Privacy, as anonymity, is declining, but privacy, as control, is on the
rise."
As a company, Facebook's livelihood hinges on how it balances the
trade-offs between privacy and openness.
The free, advertising-supported site runs a limited number of conventional
Web banner ads. But it also is looking at how to offer ads that match
people's expressed interests without frightening users that their data
will be abused by marketers.
"In a trusted environment you share more," Kelly said of the business
logic of insuring privacy. "There is an opportunity to target
advertising, as long as you keep that trusted environment."
Facebook board member and financial backer Jim Breyer, a partner at
venture capital firm Accel Partners, said the company would do well over
$100 million in revenue in 2007, be profitable, and have significant
positive cash flow this year.
Breyer also sought to knock down rumors the company may be for sale - the
latest speculation last week was that Microsoft Corp. should consider
paying $6 billion for Facebook.
"We continue to focus on building the best stand-alone company we can be
and, simply said, are not for sale," Breyer said via e-mail on Saturday.
Facebook is no privacy nirvana, nor does it mean to be.
Indeed, its core function is to enable a kind of virtual voyeurism that
makes it easy for members to post comments, photos and videos about their
own lives while keeping tabs on what their network of online friends are
up to.
It does this by offering an automated news feed of what friends are doing
on their own Facebook profile pages - a kind of gossip column among
friends.
Highlighting the tension over privacy at the core of the site, when the
feature was introduced last September, members temporarily revolted until
the company introduced greater controls over what information their
friends could see.
In another example of how privacy protections play out on Facebook,
photos are often shared among users, but individuals retain the right to
delete their names from photo labels, providing a degree of insulation
from personal embarrassment.
While large and growing, Facebook functions like an endless series of
online private clubs. The average Facebook user has access to only one
in 200 of its members, Kelly said.
Among diehard Facebook users, many of whom have hundreds of connections
to friends, a more subtle privacy complaint arises. As it now stands,
Facebook software treats friends pretty much equally, a byproduct of
its college-campus roots.
But as more users add different types of contacts - bosses, family
members, colleagues, business acquaintances - demand grows for more
refined privacy controls to distinguish between various types of
real-world relationships.
Kelly said the company was working to address the issue. "Stay tuned:
We are all about user control," he said.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.