Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 10 Issue 17

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 10, Issue 17 Atari Online News, Etc. April 25, 2008


Published and Copyright (c) 1999 - 2008
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:





To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1017 04/25/08

~ eBay Sues Craigslist! ~ People Are Talking! ~ Debate Over the Web!
~ More Rock Phish Gang! ~ Laptops and Customs! ~ Trojans On the Rise!
~ Infected Web Pages Up! ~ Subpoena for Records! ~ New Ubuntu Is Out!
~ Craigslist Fires Back! ~ OLPS Switch Is Muddled ~ Informal Writing!

-* China Is #1 in Internet Users *-
-* Microsoft in Quandary Over Yahoo Bid *-
-* Russian Prosecutors Eye Internet Censorship *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Well, I'm going to tell you right off the bat - I'm going to keep this
week's commentary short. I'm tired, and sore - it's been quite a week.

I've finished cleaning up the remaining mess from last fall, and the yard
looks good (well, much better!). Still a little to do to clean up some
of my garden areas, but that's a simple task. The outside water is all
reconnected, turned on, and ready to go. A few gutter covers need to be
replaced after a brutal winter - another simple task. The yard has
received its initial blast of weed killer and fertilizer, but could use
some more, plus some seeding. I'm getting there, and way ahead of
schedule!

And last week I started working back at the golf course. Not too hard
at the moment, but I'm using muscles that were practically dormant all
winter. I have to admit, I'm not as young as I'd like to think I am.
And my body is proof of that!

So, it's an early night for me this week. Working again this weekend,
and I need some rest. It's been a long time since I had to get up before
the sun rises!

Until next time...



=~=~=~=



PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org



Hidi ho friends and neighbors. I'll warn you right now that there really
weren't enough messages in the NewsGroup to make a good column this
week, but there's something that I want to get off my chest, so you're
just going to have to suffer through it.

This past week, I got a chance to see the trailer for a movie
called "EXPELLED (NO INTELLIGENCE ALLOWED)". As you've probably
guessed, it's about the Evolution/Intelligent Design controversy.

Now, I know what you're thinking: "Hmmm... didn't that whole thing die
down a couple of years ago?"

Yes, it did. But it seems that now, Ben Stein; teacher, Nixon
speech-writer, television game show host and movie star, has decided
that he wants to make some money on the situation.

I must say right out front that I have not (yet) seen the whole movie.
All I've seen is a trailer which, I can only assume, mimics the overall
tone and mood of the movie.

If I had any doubts about Mr. Stein's political leanings or social
agenda, they have been assuaged by his current offering's tone, tenor
and attitude. Most prevalent right out of the shoot is the theme
that 'they' don't want you to believe <fill-in-the-blank>. It could
lead to you being ostracized, and even get you fired from your job,
they warn.

This is a device that's been used by politicians for eons, and more
often than usual in the past decade. There's no better way to get
people to waste time than to tell them that someone doesn't want them
to know or believe something. It's just one more facet of the 'politics
of fear', I'm afraid.

Next on my checklist was the idea that someone who supports one theory
in favor of another should have something to say in favor of their
preference as opposed to just having something negative to say about
the one they don't support. In other words, don't tell me "this must be
right because I think the other one is wrong". The main argument I
hear 'in favor of' Intelligent Design is that Darwinism doesn't explain
everything completely.

Another of my favorite gripes is proponents of Intelligent Design are
always quick to point out that "evolution is just a theory". And
they're right. But you know what? GRAVITATION is just a theory too.
Take a pencil and drop it in front of you. No matter how many times you
do it, and no matter where you do it (on the surface of the Earth), the
results are going to be the same: the pencil will fall. Despite the
fact that gravitation is 'only' a theory, you will never, ever drop a
pencil anywhere on the surface of the Earth and have it fall UP. The
fact that "Darwinism" is a theory has no bearing on its validity.

Okay, on to my next point. The movie (or, at least the trailer for the
movie) would have you believe that there is widespread disagreement
within the scientific community about the validity of the theory of
evolution. That simply isn't so. It's also fairly common to hear
proponents of Intelligent Design say that they have a right to have ID
taught in the classroom right alongside evolution. Au contrair, mon
frere. The fact that you WANT something to be true doesn't make it so.
Truth is a philosophical quality. FACT is a scientific quality. You
simply cannot say that something is science simply because you want to
believe it.

Next point: Irreducible Complexity. Proponents of ID will often point to
the eye as proof that a 'Creator' or intelligent force must have been
involved in making things exactly as we see them today, because no
combination of pre-existing things could have been brought together or
modified to result in the current thing. Ask any biologist and they'll
tell you that lenses and light-sensing cells abound in the natural
world, and some can even be genetically tied to the evolution of the
eye.

Another 'ding': Stacking the Deck. If you want people to believe in
Intelligent Design, because it is not a valid scientific theory, you
must first work to degrade the scientific theories that oppose it.
Things like the age of the Universe. You'll often hear Creationists and
ID proponents say that current scientific theories must be incorrect
because they take for granted that the Universe must be billions of
years old, and anyone who's read the bible knows that the world is only
a little over six THOUSAND years old.

I've got to admit that this one has me scratching my head. If you can
get people to believe that the world is only six thousand years old,
you can get them to believe anything... why stop at Intelligent
Design?? Why not get them to believe that you really have their best
interests at heart and that giving tax breaks to the very rich will
quickly help the poor? Oh. Nevermind. [grin]

Finally, the thing that got me was that they showed pictures of either
Copernicus or Galileo and Einstein, saying that, in THEIR day,
Intelligent Design would have been accepted as an alternative easily.

Well, on this count, I've got to agree with them. Copernicus and Galileo
lived during times when the Church held sway over everything, and
disagreeing with them could very quickly get unhealthy. Copernicus was
charged with heresy during the Inquisition for teaching that the Earth
revolved around the Sun, not the other way around. This was contrary to
church teachings. Sure, Intelligent Design would have been accepted
back then... it would have fit right in.

And I've got to confess (in keeping with the "church" theme I've got
going here, I guess) that I really have no idea of what point Ben Stein
was trying to make by dragging Einstein into it. Unless, of course,
it's because Nazi Germany had spent at least a couple of decades
denouncing Einstein's theories as "Jewish Science". Does that really
make them feel better? Really?

Well, I leave it to you, my fair reader. You are free to believe in
Intelligent Design, or dueling sea dragons, or the world being carried
on the back of a great turtle. I'll fight to my last breath to protect
that right. But please, PLEASE don't try to tell me that it's science.
Faith is a wonderful thing. It's what makes us who we are, more so than
any other facet of our lives. But Faith-Based Science is an oxymoron. I
find it almost amusing that the reverse doesn't hold true. Don't you?

So, do I want you to get all up-in-arms and boycott this movie
(Expelled: No Intelligence Allowed... limited showings from mid-April,
2008, http://www.expelledthemovie.com)? Hell no! I WANT you to go see
it... Heck, I'll probably see it at least a couple of times to try and
determine if maybe there's some satire involved that I missed from
watching the trailer. Go see the movie. Think about it, and talk about
it.... and think about it some more.

Well, enough of that. Let's get to the news, hints, tips and info
available from the UseNet.


From the comp.sys.atari.st NewsGroup
====================================


Rob Aries asks about alternative storage devices for his Falcon:

"I am trying to resurrect a Falcon 030 that has been in my attic for a
long time. The HD is toast (click of death). I saw somewhere how a
person used a compact flash card to replace his Falcon HD. I bought an
IDE --> CF adapter on Ebay and I have an old 128MB card I was using in a
camera. My next step is to format & partition the card.

Another search of my attic, and the only such software I found was for
my old Link (used with my even older Atari ST). It's ICD software
(v6.2.4 IIRC) but works ONLY with Adaptec host controllers. It sees the
CF card as "unrecognized unit" on ID #15, then it hangs.

Some online searching and I see the well-regarded HDDRIVER software,
however the demo won't format. Since I am really doing all this for
curiosity's sake and may not even use this Falcon (actually it's not even
mine), I am wondering if there is any free/shareware options anywhere
for making this CF card work."


Adam Brannon tells Rob to...

"Go to http://www.atari.org/services/systemdisks.php. It has almost all
Atari system disks available to download, including the Falcon HDD
drivers disks. This should get you started."


Rob tells Adam simply:

"Thank you! Now I have a Falcon with a 120MB flash drive!"


How's that for fast, folks? Pretty slick, huh? Meanwhile, someone posted
last week that the source code for the Jinnee desktop had been lost, so
the project can now be considered dead. The last release of Jinnee, it
seems, truly IS the last. On the subject of Teradesk and its code being
available for use, Henk Robbers talks a bit about building upon it to
make a new desktop:

"I still believe that the name "Teradesk" should remain being associable
with a simple and compact desktop as it is now.

If you want more, the code is GPL, feel free but call it different.
XA_desk sounds like a good idee.

Djordje, do you agree?"


Djordje Vukovic replies:

"Yes, completely.

Regarding the simplicity- or otherwise:
An important part of my concept when I first took part in TeraDesk
project was that it should remain compact and simple. Many times there
arose a situation where I had to weight the benefits of adding some
option against the increase of code size and memory usage, and
increased complexity of use. It seems that people using more capable
machines tend to forget that there is also a number of users with
feebler Atari machines who find that TeraDesk, as it is now, exactly
satisfies their needs. They would have no use of marvelous desktops
needing X megabytes of RAM and XX megabytes of disk space. As there
were already two other desktops targeted at capable machines, I think
it was a good decision to provide a new one having in mind primarily
the feeble and the poor :) - therefore it was clearly said, when
TeraDesk 3 was released, that it was not intended as a replacement for
Thing and Jinnee.

I would also like to point that the (good-natured) objections raised
here against TeraDesk appear to concern the cosmetic side mostly- not
the functionality. There seems to be a general agreement that TeraDesk
does what it is supposed to do, reliably. And yes, I agree that the
code has become tightly connected and there are some legacy segments in
it, but it is all in the function of fulfilling its purpose and design
concept.

By the way. some things should remain simple. I think that there are
rising issues of visual appearance of GUIs, icons etc. (on any
operating system) that will have to be discussed soon. How standardized
should they be? How complex can a display become before it becomes
unmanangeable by human users, whose brains do not double their
processing power every couple of years, as CPUs do?

Imagine that one is driving a fast car and comes to a traffic sign
warning of a dangerous bend ahead (a simple three-colour triangular
icon). Would the message be better and more quickly understood by the
driver if, instead of the traffic sign, there was a magnificent
true color photograph, in 8000x4000 resolution, of a pile of crashed
cars, on which one could read every number on license plates, recognize
the members of salvage teams caught in the scene, and read the logos
and advertisements on cars of media people present?

(a question: why would anyone need a truecolour desktop icon?)


Regarding the naming of names:

In order to avoid confusion, it would indeed be better to create a new
name for any significantly different new fork, and leave "TeraDesk" name
(btw. I never found out what was this supposed to mean) to the current
fork.


About development of a new desktop:

It is all very nice, but I would like to say a few words of warning:
I joined TeraDesk project several months after Henk revived it. It took
us almost a year to overhaul it significantly and create TeraDesk 3.
Since then, a number of things were added, problems fixed and it took
more than four years to get it to its present status (and there are
still some improvements to make- a new bugfix release is due soon). I
am afraid that if a new desktop project is started, by the time it
reaches a really usable state there will hardly be any users left (or
even left alive). We have an example of "Direct" desktop with nice
visual effects but relatively poor functionality that was abandoned
soon after initial release. We have painfully slow advances e.g. in
Highwire (is it still developed at all?) and even in XaAES (when was
the last release?).

There was a general once, who said something about having good ideas
today, against excellent ideas tomorrow..."


Jean-Francois Lemaire answers Djordje's question about needing a
true-color icon:

"Because an icon designed in a modern graphics application with
gradients, Gaussian blurs or transparency looks like crap when
converted in 256 colours, let alone 16. I know that from experience. It
removes much of the fun of creating new icons. Drawing pixel by pixel
in Interface may be courageous, but not everyone is a masochist.

So, the user may not *need* a true colour icon, but the artist *wants*
them because they make it's work easier. Now don't ask me why would
anyone need gradients in an icon."


Djordje replies:

"The last sentence/question is in fact the important one. What an artist
likes is irrelevant. What is relevant is that the interface is convenient
-to the user-. Icons or whatever other symbols are used to communicate
with a computer should be simple, quickly readable by the user,
standardized and possibly human-language independent. Use of gradients,
blurs or transparencies seems to me to be counter-productive in that
context. The "icons" need not be the likenesses of anything- just
easily recognizable, difficult to misinterpret, graphic shapes. A set
of highly-stylised Chinese-like or Egyptian-like pictograms comes to
mind.

OT: for a long time we were taught (more-less) that pictographic writing
was used mostly by "primitive" societies early in human history, and
that it was made obsolete by the invention of phonetic alphabets.
Lately, we are seeing a significant revival of the use of pictograms,
which prove to be more convenient when it is necessary to convey
instantly-readable messages, or communicate across language barriers.
On the other hand, increased use of pictograms, together with increased
graphic power of computers and telecommunications devices, seems to
indicate the onset of wide-spread, computer induced illiteracy- fewer
and fewer people will want to actually read or write anything and a
richness of words will be gradually lost. I am not sure that humanity
will benefit from such development."


Jean-Francois replies:

"What I meant to say is that by allowing true colour icons you allow the
guy/gal who will actually do the drawing full control over it's
creativity. By limiting the display to 256 colours you don't. Liking or
not liking what he/she does with the 16700000 colours at his/her
disposal is just a matter of opinion."


'Phantomm' asks about a virtual memory manager and a Falcon:

"[Has] Anyone had any experience using the program Outside, virtual
memory manager with a CT2B Falcon?

I know that some programs don't work well with the FastRam of a CT2B and
want to make sure that the Outside program is compatible before setting
it up."


Jo Even Skarstein tells Phantomm:

"The CT2 use the MMU to map FastRAM, so I doubt that Outside will work."


Uwe Seimet tells Jo Even:

"It depends on the translation tables. If the mapping is similar to the
one used by the TT TOS it might also work for the CT2."


Mark Bedingfield adds his experiences (and memory):

"I'm pretty sure I got it working on my CT2B. I'll have a look tonight
and see if its still installed. I have 64MB fast ram anyway, so never
use it;-) All that's required is a 030 or better if I remember
correctly."


When someone mentions a "clean way" of installing a separate file
selector using N.AES, Gerhard Stoll asks:

"What [is the] clean way of installing a separate fileselector that
N.AES has?"


Jo Even Skarstein tells Gerhard:

"N.Fsel hooks into N.AES using a clean interface. I'm not sure if it's
documented anywhere though."


Well folks, that's it for this week. Tune in again next week, same time,
same station, and be ready to listen to what they are saying when...

PEOPLE ARE TALKING



=~=~=~=



->In This Week's Gaming Section - Little League World Series 2008!
""""""""""""""""""""""""""""" 'Gran Turismo 5 Prologue'!
EU: Protect Minors Better!
And more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



'Gran Turismo 5 Prologue' Thrills Despite Slim Options


The latest release of Gran Turismo is missing quite a bit under the hood.

Instead of waiting to unveil a full version of the hit racing series for
PlayStation 3, developers roll out the scaled-back Gran Turismo 5
Prologue. The options are slim, but the experience is powerful.

Prologue is the appetizer for the eventual release of Gran Turismo 5.
Players can choose from more than 60 cars. Its predecessor, Gran
Turismo 4, has a garage of 700 vehicles.

After purchasing your first vehicle, you advance to circuit racing. Each
tier involves 10 races you must conquer before moving to the next
circuit. The events are spread across six tracks, including Daytona
International Speedway.

Depending on how you finish, you'll earn points for each race, which you
can use to purchase new vehicles. Unfortunately, none of the visual and
performance customizations are available to buy this time around.

Prologue is one of the most gorgeous racing titles available. Vehicles
glisten in sunlight. Textures like asphalt and metallic finishes look
incredibly authentic. The interior dash perspective is an astounding
first-person view of the action. You'll see your driver shift gears as he
navigates tracks. A high-speed spin out in some of the more powerful
vehicles is dizzying. The sounds of tires screeching or engines revving
are sharp.

Handling is as unique as the vehicles' make and model. Cars with high
horsepower may accelerate quickly, but require greater skill when
navigating sharp turns. On the other hand, some smaller cars may not be
the fastest, but take turns with precision.

What's baffling about Prologue is how vehicles can manage to slam into
walls or other cars at high speeds and show no signs of damage. You can
rear end a car going well over 100 mph and not even end up with a busted
taillight.

The other glaring issue is the lack of options. Granted, the scaled-down
format has been known since the title was first announced. If you're a
Gran Turismo fan, however, prepare to see even less than expected.

Not only are there fewer vehicles and tracks, but there's little variety
in the events available. Standard races, time trials and drift
challenges are among the handful of events. While Gran Turismo finally
makes its online debut, with up to 16-player races, the types of races
remain limited.

But the lack of selections is offset by Prologue's $39.99 price tag,
roughly $20 less than a standard PS3 release. And once you hit the
track, you'll learn the ride in Gran Turismo remains exhilarating.



Activision Steps to the Plate with 'Little League
World Series 2008' for Wii and Nintendo DS


Activision, Inc. announced Wednesday the upcoming release of Little
League World Series 2008 for Wii and Nintendo DS. Players will have the
ability to bat, pitch and field using intuitive controls developed
exclusively for Nintendo's platforms. Little League World Series is the
perfect game to play with your friends and family. The game hits shelves
August 5, 2008.

"Little League baseball fans, players and families simply haven't had a
videogame made just for them, so our goal is to fill this niche," said
Dave Oxford, Activision Publishing. "Creating this game with the Little
League organization has been a pleasure and we look forward to paying
homage to the three million Little League players around the world
today."

Little League World Series is the first officially licensed Little League
video game to hit next-generation consoles. Bat, pitch and field your way
from local sandlot slugger to Little League World Series Champion.
Featuring eight U.S. and eight international teams, extraordinarily deep
character customization, World Series Mode, and various skill based
challenges, Little League World Series offers an exciting, authentic
baseball experience. Motion-sensing controls on Wii make it accessible
for Little League players and parents, while the DS version gives
players the freedom to get on the diamond anywhere.

"Activision has captured the essence of what makes Little League so
wonderful for players and spectators alike," Jud Rogers, Sr. Marketing
Executive, Little League International. "We look forward to working with
them in the upcoming months to help polish the game and bring it to
Little Leaguers and fans."



Asian History Inspires New Online Games


After exhausting just about every elf, dragon and knight featured in
Western cultures, makers of popular online games are turning to ancient
Asian history and war heroes for new inspiration.

Chief among their sources is "Romance of the Three Kingdoms," an epic
Chinese novel whose plots and characters are familiar to most Asians.

"Romance," which long existed in oral form before it was put together in
writing in the 14th century, covers a chaotic two-century period in
ancient China marked by infighting between warlords following the fall of
the Han Dynasty.

The story, full of dramatic and bloody episodes about ruthless ambition,
military tactics, loyalty and betrayal, yielded numerous battle legends
and war heroes that are still venerated by Asians.

It also makes for an ideal theme for movies and TV shows, with the latest
being John Woo's "Red Cliff," to be released just before the Beijing
Olympics.

While awareness of ancient Chinese history is still limited in the West,
critical and popular hits such as the film "Crouching Tiger, Hidden
Dragon" and last week's Jackie Chan vehicle "Forbidden Kingdom" are
preparing Western gamers for the idiosyncrasies of Asian-based games.

Japanese game developer Koei Co Ltd has pioneered games based on
"Romance of the Three Kingdoms," from PC games in floppy disk to brand
new console versions running on Microsoft's Xbox 360.

Its "Dynasty Warriors" series, featuring legendary characters from the
novel combined with kung-fu style action, sold more than 15 million
copies worldwide.

Now, makers of online games are trying to bring the well-known saga into
multiplayer role-playing games. They say the novel provides all the
materials needed, from characters to political landscape, to entertain
online gamers for months of play.

"Romance" could re-energize an industry suffering from the lack of a
major blockbuster game since "World of Warcraft" by Blizzard
Entertainment Inc launched in 2004.

South Korean game developer Wemade Entertainment unveiled a multiplayer
role-playing game, "Chang Chun," last year. In it, characters mingle with
people from real Chinese history and get involved in politics and
battles. Gamers build their martial art skills, acquire weapons and
armor, form clans and lead wars against each other.

Converting centuries-old texts into virtual reality, however, proved a
tough task.

"It took more than four years of research into the novel's contents,
Chinese history, architecture, clothing and so on," said Park Jung-soo,
who leads Wemade's development team. "All members of our team went on
research trips to China."

Gamers appreciate such efforts, saying details and historical facts are
key attractions.

"Managing troops, food supply and other elements to win the war is very
interesting. There's also a whole system for government offices and
rankings," said an online user, who wanted to be identified by ID
sbh8243.

"If you want to engage more, you can join the policy team and lead the
country you're in."

"Warlord" by Neowiz Games takes a step further in its attempt to blend
Western and Eastern war history. A gamer can choose among characters from
different cultures, such as a Chinese general, a Japanese ninja or a
magician knight from ancient Europe. As the game progresses, the gamer
faces famous generals and warriors from history books.

Kim Jae-young, production manager at Neowiz Games, said developers at the
firm combed through not only history books but artwork, prehistoric wall
paintings and artifacts to rebuild the scenes from long-gone historic
moments.

Analysts say well-made games based on "Romance" have the potential to
become money-spinners, given the fast-growing gamer population in China.
Wemade, which is offering a trial of "Chang Chun" in China, said it ranks
among the most popular online games there.

"The Chinese online game market has yet to fully boom up," said Shim
Jun-bo, an analyst at CJ Investment & Securities.

"One day there will be a perfectly made 'Romance of the Three Kingdoms'
game from a major studio like Blizzard, and it will become an absolute
blockbuster."



EU Tells Videogame Industry To Protect Minors Better


Videogame makers and shops have two years to come up with a widely
accepted industry code of conduct to better protect children from violent
images, the European Union's executive body said on Tuesday.

"Creators have to enjoy freedom of expression but at the same time it's
an industry that impacts society," EU Information Society Commissioner
Viviane Reding told a news conference.

Worldwide revenues from videogaming are expected to reach 30 billion
euros ($47.5 billion) within two years, of which the 27-nation EU will
account for about one-third, Reding said.

Public concerns that videogames can cause aggressive behavior have been
heightened by school shootings such as that in Finland last November, and
have led to several countries banning games such as "Manhunt 2," Reding
added.

The EU executive has powers to propose legislation, but decided to give
the sector two years to come up with a code of conduct that has wider
industry backing than the current one. The industry is also being asked
to spend more on advertising its symbols denoting the age suitability of
games.

"When children go out to play today they enter the world of joysticks. We
are not quite sure where they go and there is real anxiety from parents,"
EU Consumer Protection Commissioner Meglena Kuneva said.

The industry's age classification system - Pan European Games Information
(PEGI) - is sponsored by more than 200 industry members and used in 20 of
the 27 EU states. There is also an online version but with far fewer
industry backers.

The Entertainment and Leisure Software Publishers' Association (ELSPA), a
videogame industry lobby, said the PEGI age rating system was robust.

"Importantly, it protects children as games move increasingly online and
therefore should be adopted by UK regulators. We look forward to
discussing this at the forthcoming UK consultation," ELSPA's director
general Paul Jackson said.

The European Commission wants PEGI's age symbols to become familiar to
the public but it accepts there is no conclusive evidence that violent
videogames influence children's behavior.

"We want to work in this environment on a precautionary principle,"
Kuneva said.

Last year a U.S. federal judge struck down a 2005 California state law
barring the sale of violent videogames to minors as unconstitutional,
adding there was no evidence such games were any more harmful than some
television shows and movies.

Scenes of bloody killings were scaled back to allow Manhunt 2 to go on
sale to U.S. players aged 17 years and older.

Making a game for adults only is seen as uncommercial as hardware makers
such as Sony, Microsoft and Nintendo do not allow such content on their
machines, which are popular with children.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



China Vaults Past USA in Internet Users


China, already the world leader in cellphone use, has surpassed the USA
as the No. 1 nation in Internet users.

The number of Chinese on the Internet hit more than 220 million as of
February, according to estimates from official Chinese statistics by the
Beijing-based research group BDA China. The government is likely to
confirm the leap at its half-yearly report in July.

The longtime Internet leader, the USA, which founded and developed the
network of computers, had 216 million users at the end of 2007,
according to Nielsen/NetRatings.

The percentage of American users - 71% - still exceeds China's 17%.
China has 1.3 billion people, compared with nearly 304 million in the
USA.

China, however, has a higher growth rate, says BDA's chairman, Duncan
Clark. By the end of March, for example, Chinese users climbed to 233
million.

At the end of 2007, China's Internet users reached 210 million, a jump of
53% from the previous year, says Zhang Shanshan, media director for the
China Internet Network Information Center, which gathers statistics for
the Ministry of Information Industry.

Clark says the rapid growth is powered in part by China's economic boom.
While the government "continues to filter the Net and encourage
self-censorship, it also has a mandate to promote cheaper technology and
the knowledge economy."

And there is strong government backing for companies such as China
Netcom, which offers broadband service at $10 a month, Clark says.

At the company's Xibahe branch in north Beijing, dozens of people
recently lined up to buy broadband service.

Sun Xin, 19, a student, was helping his parents sign up for DSL.

"My friends all agree - no Internet, no life," Sun says. "We use it
every day for MSN, and I love playing games like World of Warcraft."
The game is so popular that players can pay companies in China to play
in their place so they can continue gaining points.



Microsoft in Quandary Over Yahoo Bid as Key Deadline Looms


Microsoft Corp. is no closer to buying Yahoo Inc. than when it made its
$44.6 billion bid nearly three months ago, leaving the software maker in
a quandary over whether the deal is still worth pursuing.

A decision is likely to emerge in the next few days, with Yahoo facing a
weekend deadline to accept the offer. Although the deadline expires
Saturday, Microsoft has indicated it probably won't reveal its next move
until early next week.

The tense mating dance is at a standstill because Yahoo's board has
repeatedly said it won't sell to Microsoft for less than $45 billion,
even though the bid hoisted its stock shortly after it hit a four-year
low in late January.

The impasse has left most analysts predicting Microsoft will either
sweeten its offer or attempt to replace Yahoo's board with a slate of
directors who will embrace a takeover.

But the architects of Microsoft's bid - Chief Executive Steve Ballmer
and Chief Financial Officer Chris Liddell - have been signaling the
Redmond, Wash.-based company might abandon the bid and leave
Sunnyvale-based Yahoo twisting in the wind.

The public remarks of Ballmer and Liddell could be just part of a
negotiating ploy aimed at pressuring Yahoo to the negotiating table.

But some analysts think Microsoft would be smart to walk away now.

By turning a cold shoulder, Microsoft could position itself to return
with another bid this summer in hopes of completing the acquisition
without suffering through the disruption and rancor likely to erupt if
Microsoft were to try to oust Yahoo's board in a risky process known as a
proxy contest.

This scenario could only pan out if Microsoft is correct in its belief
that Yahoo is stuck in a downward spiral after steadily losing ground in
the online advertising market during the past two years.

Unless Yahoo can bounce back, its shares might eventually drop even lower
than their $19.18 price when Microsoft made its initial bid of $31.

Yahoo shares fell 50 cents to finish Friday at $26.80, pulled down by the
declining value of Microsoft's cash-and-stock bid.

Driven by Wall Street's disappointment with the company's short-term
outlook, Microsoft shares dropped $1.97 to $29.83 on Friday. The decline
lowered the value of the Yahoo bid to $42.7 billion, or $29.68 per share.

If Yahoo's stock were to plummet into the mid-teens, Microsoft
conceivably could return with another offer that would probably be more
warmly received than its original bid.

"Yahoo management would be under inordinate pressure to accept at that
point," said Dinosaur Securities analyst David Garrity. "Why go through
all the distractions and expense of a proxy fight if you see another way"
to an amicable transaction?

Yahoo management has expressed confidence in a turnaround plan that
projects revenue increases of 25 percent in 2009 and 2010. But analyst
estimates for those years have remained substantially below those targets
- a sign of the widespread skepticism about whether Yahoo will be able to
reach its ambitious goals.

Abandoned takeover bids have paved the way to corporate acquisitions
before. Just last fall, Oracle Corp. withdrew a $6.7 billion bid for
rival business software maker BEA Systems Inc. after being spurned and
then wrapped up the takeover for $8.5 billion three months later.

Other analysts remain convinced Microsoft will either raise its bid or
launch a proxy contest because it needs Yahoo's franchise to mount a more
serious challenge Google Inc.'s dominance of the Internet's search and
advertising market.

"We still believe (Microsoft) is committed to completing the transaction
and is unlikely to walk away," Citigroup analyst Brent Thill wrote in a
Friday note.

McAdams Wright Ragen analyst Sid Parakh said he can't envision Microsoft
raising its offer, especially since Yahoo's management hasn't proven its
strategy will boost the company's stock price above $30 on its own.

Microsoft's current bid is "already a stretch, and I don't see any
reason for them to really bid against themselves," Parakh said.

Yahoo could try to extract a higher bid by farming out some of the
advertising on its Web site to Google. The two sides just completed a
two-week trial that allowed Google to show text-based advertising along a
small percentage of Yahoo's search results.

A long-term advertising partnership with Google probably would provide a
significant boost to Yahoo's profits, but antitrust concerns might block
an alliance between the owners of the Internet's two largest search
engines. Combined, Google and Yahoo control more than 80 percent of the
U.S. search market.

Yahoo also has been exploring a possible merger with the online
operations of Time Warner Inc.'s AOL, but most analysts view that as a
weaker alternative to a Microsoft takeover.

As it stands now, Yahoo's first-quarter revenue growth of 9 percent is
far behind both Google's and Microsoft's online services division, which
climbed 42 percent and 40 percent, respectively.

That's just one reason Garrity believes Ballmer and Liddell are realizing
that Microsoft doesn't need Yahoo at any price.

"Sometimes the best deals are the ones that aren't done," he said.



Rock Phish Gang Adds Second Punch to Phishing Attacks


A notorious online gang known for its prolific phishing operations has
expanded its means of attack, potentially putting more PC users at risk
of losing personal data.

The Rock Phish gang surfaced around 2004, becoming well-known for its
expertise in setting up phishing sites, which seek to trick people into
divulging sensitive data, as well as for selling phishing kits designed
for less technical cybercriminals.

Now, the phishing sites linked with the Rock Phish gang are being rigged
with a drive-by download, a type of attack that can infect a PC with
malicious software without any interaction by the user, researchers from
vendor RSA said Monday.

The one-two punch means that even people who go to the phishing site but
aren't fooled into inputting their personal details could still be
infected, wrote Uriel Maimon, a senior researcher, on RSA's blog.

The phishing Web site tries to exploit any software vulnerabilities, and
if it finds one, will then load the Zeus Trojan onto the PC. Zeus is
particularly dangerous: it can collect data on forms, take screen shots,
pilfer passwords from browsers and remotely control the computer, Maimon
wrote.

Zeus also comes in at least 150 flavors. One of the phishing kits being
sold now for US$700 masks how Zeus appears to security programs. That
kit uses a binary generator, which creates a new binary file for Zeus
for every kit.

Antivirus programs uses signatures, or data files, that describe what
malicious programs "look" like in order to be detected. But creating
new binaries can render security programs blind. Most of the popular
antivirus programs can't detect the variants.

"These files are radically different from each other, making them
notoriously difficult for antivirus or security software to detect,"
Maimon wrote.



Web Criminals Fuel Big Rise in "Trojans"


Cyber-criminals are behind a dramatic rise in stealthy programs called
"trojans" that infect computers to sell rogue software, send unwanted
email or steal personal data, a study has found.

In a report released in London, Microsoft said the number of trojans
removed from computers around the world in the second half of 2007 rose
by 300 percent from the first half.

The figure has risen so sharply because more computers are fitted with
software that detects malicious programs and because criminals had come
to see trojans as their "tool of choice," the report said.

"The numbers have simply exploded, it's huge," said Vinny Gullotto,
general manager of the Microsoft Malware Protection Center. "There is a
lot of criminal intent there."

Trojans can log keystrokes to gather passwords, send spam from private
computers or harvest email addresses or personal information for
criminal purposes.

The most common family of trojans last year was "Win32/Zlob," a piece of
malicious software, or malware, that people unwittingly download from the
Internet.

Its designers trick people into saving it by telling them they need a new
piece of software to watch video online.

Once installed, it bombards people with pop-up messages and bogus
flashing warnings that their computer is infected.

The messages say: "Your computer is infected! Windows has detected
spyware infection. Click here to protect your computer."

The trojan then sends adverts offering to sell rogue anti-spyware on
sites that could expose customers to credit card fraud. Microsoft said
the problem is global and linked to organized criminal gangs.

"The majority (of trojans) come from the (United) States, China, Russia
and South America," Gullotto said on the fringes of the Infosecurity
Europe trade conference on Tuesday.

Microsoft said the number of computers around the world that were made
safe after being infected with trojans rose from one million in the
second half of 2006 to 19 million in the second half of 2007.

The report is online: http://www.microsoft.com/security/portal/sir.aspx



Study Finds Infected Web Pages on the Rise


A year ago, one out of every 909 e-mails was infected with malicious
code. In the first quarter of 2008, only one out of every 2,500 was
infected. Good news? Not really. All it means is that the attackers have
changed tactics to overcome the defenses you're building, according to
security company Sophos.

"As companies implement better e-mail defenses, the hackers are looking
for new avenues of attack. E-mail also lacks some of the flexibility that
Web-based attacks can offer," said Richard Wang, U.S. SophosLabs Manager.

A study done by Sophos that examines the security events and trends of
the first quarter of this year showed that the decline in attacks
against e-mail was balanced by what the company calls "an unprecedented
number of threats" targeting Web pages. Last year, the company detected
an average of roughly 5,000 infected Web pages a day; this quarter, the
average is 15,000 per day. That's one new infected Web page every five
seconds.

And these are sites you may well visit: 79 percent are legitimate sites,
not sites set up specifically to host malicious attacks.

"The Web gives hackers an easy way to deliver software to their victims,"
Wang said. "It also allows them to change the software they are using at
a moment's notice. This makes the Web far more flexible as an attack
vector than e-mail."

Companies in the United States are taking the worst beating from the
switch in tactics, with domestic companies now unwittingly hosting the
greatest number of malicious content. (Last year, the number-one spot was
held by China.)

"The most likely cause of this is the hackers' move away from
purpose-built malicious Web sites. The vast majority of sites that we now
see hosting malware are legitimate sites that hackers have broken into
and added their own code. All kinds of sites, from auto parts to Web
design, are now hosting dangerous software," Wang told us.

No one is immune from malware, with attackers taking pains to ensure
that different browsers and operating systems are treated equally.
According to Wang, "If a user browses to an infected Web page, the
hacker can deliver different attack software depending on the operating
system and browser that the user has. A Windows user with Internet
Explorer will experience a different attack from a Mac OS X user with
Safari."

The Sophos report also shows that more than 92 percent of all e-mail sent
in the first quarter of this year was spam. "The sheer number of Web
sites related to spam is growing at an incredible rate," Wang said.
"Sophos finds over 23,000 new spam-related sites every day - that's about
one every three seconds." Expect to find more spam in your in-box,
Sophos says, as spammers continue to bypass CAPTCHA systems meant to
distinguish humans from automated spambots.

Also on the increase are attacks aimed at individuals, Wang said. "We
have seen a significant increase in targeted phishing attacks, also known
as 'spear-phishing.' In these attacks, people known to belong to a
specific organization or group are precisely targeted. We have seen
spear-phishing attacks against college students, ISP users, and even
CEOs."

The best defense, Sophos says, is to defend Web and e-mail gateways,
protect end-point devices, and educate users on safe computing practices.



EBay Sues Craigslist Over Alleged Stake Dilution


EBay Inc, the world's largest online auctioneer, sued Craigslist, a
competitor in which it holds an ownership stake, in a dispute over
whether the Internet bulletin board tried to blunt eBay's control.

EBay alleged in the lawsuit that the board of directors of Craigslist,
the Web's dominant classifieds listing service, took "unilateral
actions" to dilute eBay's 28.4 percent stake by more than 10 percent,
eBay said in a statement.

The suit, filed on Tuesday under seal, asked a Delaware Chancery Court
to rescind the unspecified actions to protect eBay's stockholders and
preserve its stake in Craigslist.

The suit names as defendants Craigslist founder, Craig Newmark, who runs
the company in a famously open-minded style, and Chief Executive Jim
Buckmaster. Newmark and Buckmaster are the only members of Craigslist's
board of directors.

EBay bought a minority ownership stake in 2004, and launched its own
free online classifieds site, called Kijiji, three years later in the
United States.

The two services directly compete in the United States and about a dozen
countries, with Kijiji tailoring its ads to young families rather than
maintaining a Craigslist-style open marketplace.

In an email, Newmark had no comment on the lawsuit, or on whether the
dispute involved the companies' business rivalry, saying Craigslist
needed "a little time to figure it all out."

An eBay spokeswoman said the disputed board actions concerned "corporate
governance issues" and did not involve Kijiji.

She said eBay could reveal no more about its complaint without
Craigslist's permission to protect information about privately held
Craigslist governed by confidentiality restrictions.



Craigslist Fires Back, Blasts eBay Actions As Unethical


Craigslist is firing back at its rival and minority owner eBay, scolding
the online auctioneer's actions as unethical and smelling of a hostile
takeover.

In a move that pits two of the Internet's most popular sites against each
other, EBay Inc. sued the online classifieds company Tuesday, alleging it
unfairly tried to dilute eBay's stake in it.

EBay purchased a 28 percent stake in privately held Craigslist in 2004.

But in January, eBay says, Craigslist's board, consisting of founder
Craig Newmark and Chief Executive Jim Buckmaster, unilaterally acted to
dilute eBay's economic interest in Craigslist by more than 10 percent.

In an entry titled "Tainted Love" that Craigslist posted on its blog
Tuesday night, the company said the allegations are unfounded and the
lawsuit came from out of the blue.

"Coming from a company that views Craigslist as a prime competitor,
filing suit without so much as mentioning these assertions to us
beforehand seems unethical, and suggests ulterior motives. ... Ebay has
absolutely no reason to feel threatened unless a hostile takeover of
Craigslist, or the sale of Ebay's stake in Craigslist to an unfriendly
party, is their ultimate goal," the post said.

EBay, the world's largest online auctioneer, was an unsolicited suitor
to quirky Craigslist in 2004. An unnamed former Craigslist shareholder
sought out eBay and sealed a deal whose financial terms were never
disclosed.

At the time, Newmark said the companies had similar philosophies, but a
company spokeswoman said, "Craigslist has never sought any outside money,
and that's not going to change."

EBay said at the time of the deal that it was interested in learning
about the classifieds business, a portion of its own site that's been
growing rapidly in recent years.

San Jose-based eBay made $7.7 billion in revenue in 2007 and has 279
million registered users. It is the 17th most popular English-language
site, according to traffic ranking site Alexa, while Craigslist ranks
45th.

Craigslist, based in San Francisco, has never disclosed revenue figures.
It charges for job ads and apartment listings only in select cities.

Newmark, a former IBM programmer, founded Craigslist in 1995 as a roundup
of local events in San Francisco, but the bare-bones site fast became a
popular online destination and has branched out to 450 cities worldwide.
Although it has always used a ".org" domain name usually associated with
nonprofits, Craigslist incorporated as a for-profit company in 1999.

With 25 employees working out of Victorian houses in San Francisco's
Inner Sunset neighborhood, the site has grown from 1 billion page views
per month in 2004 to 9 billion per month now, according to Craigslist. It
hosts 30 million new classifieds a month, most posted for free.

EBay spokeswoman Kim Rubey declined to quantify eBay's current stake in
Craigslist.

Much larger eBay, which has 15,000 employees, is asking Delaware's Court
of Chancery to negate Craigslist's board's actions.

The complaint is under seal because of confidentiality restrictions,
according to a company statement. Craigslist may ask the court to make
the complaint publicly available, eBay said.

The lawsuit was announced 45 minutes before stock markets closed Tuesday.
EBay's stock closed at $30.89, up 26 cents, then gained a penny in
after-hours trading.



Senators Debate Future of Web


Federal Communications Commission Chairman Kevin Martin said Tuesday his
agency has all the authority it needs to prevent Internet service
providers from discriminating against Web surfers and that new
legislation is unnecessary.

"I do not believe any additional regulations are needed at this time,"
Martin said at a hearing before the Senate Commerce Committee. "But I
also believe that the commission has a responsibility to enforce the
principles that it has already adopted."

The FCC has conducted two hearings on "network management" following
admissions by Comcast Corp. that it sometimes delayed file-sharing
traffic for subscribers as a way to keep Web traffic flowing.

The hearing was called at a time when the issue of "network neutrality"
- the principle that people should be able to go where they choose on
the Internet without interference from network owners - has heated up.

The network neutrality debate has divided Congress, with Democrats
largely in favor and Republicans mostly opposed, a point that became
clearer at Tuesday's committee meeting.

"It is a political division now and it's getting more so," said Sen. Ted
Stevens, R-Alaska. "It is unfortunate." He said a return to "intense
regulation" of the Internet is "entirely unwarranted."

The hearing included some star power, with the appearance of Justine
Bateman, best known for her role on the TV sitcom Family Ties. Bateman is
now a founding partner of a new online media venture.

"The idea of your site succeeding or failing based upon whether or not
you paid the telecom companies enough to carry your material or allow
quick access is appalling," she told the committee.

Also speaking for a free-flowing Internet was Patric Verrone, the
president of the Writers Guild of America, West, which recently ended a
100-day strike that virtually paralyzed television production. The
Internet was a valuable organizing tool for the writers, he said in an
interview.

"When your employers are the same companies that control the media, it's
hard to get your message out," Verrone said.

To maintain contact with one another, guild members used blog postings,
e-mail and videos. It was the success of that campaign that prompted
Verrone to come to Washington and push for legislation that he hopes
will guarantee the Internet's status as an open forum for communication.

Verrone, a television writer and producer for over 20 years, supports
legislation proposed by Sens. Olympia Snowe, R-Maine, and Byron Dorgan,
D-N.D., that would force those who control Internet service to treat all
traffic equally.

Large network owners like cable and telecommunications companies are
opposed to network neutrality legislation, saying it would add a layer of
regulation that will hurt consumers. They say it is unnecessary and
amounts to a solution in search of a problem.

Kyle McSlarrow, president and CEO of the National Cable and
Telecommunications Association, described the picture painted by pro-net
neutrality commenters as "a complete fantasy."

McSlarrow said of the tens of millions of people who use the Internet
every day, "no one is being blocked" and if they were, they could go to
another service provider.

Martin told the panel that the FCC's anti-discrimination "Internet
Policy Statement," approved in 2005, is enforceable and gives the
commission adequate authority to protect consumers.

When the policy was approved, Martin had a different opinion, however.

In his statement at the time, he noted "policy statements do not
establish rules nor are they enforceable documents" but that the
commission decision "does reflect core beliefs that each member of this
Commission holds regarding how broadband Internet access should
function."



NJ Court Requires Subpoena for Internet Subscriber Records


Internet service providers must not release personal information about
users in New Jersey without a valid subpoena, even to police, the state's
highest court ruled Monday.

New Jersey's Supreme Court found that the state's constitution gives
greater protection against unreasonable searches and seizures than the
U.S. Constitution.

The court ruled that Internet providers should not disclose private
information to anyone without a subpoena.

A Washington lawyer who handles Internet litigation, Megan E. Gray, said
the ruling "seems to be consistent with a trend nationwide, but not a
strong trend."

"It's contrary to what is happening with rights of privacy at the
federal level," Gray said. "But it's all over the board for the states,
with a mild trend toward protecting this information."

Grayson Barber, a lawyer representing the American Civil Liberties
Union, Electronic Frontier Foundation and the Electronic Privacy
Information Center, among other groups that filed friend-of-the-court
briefs in the case, said it was the first ruling in the nation to
recognize a reasonable expectation of privacy for Internet users.

"The reality is that people do expect a measure of privacy when they use
the Internet," Barber said.

The 7-0 ruling upheld lower court decisions that restricted police from
obtaining the identity of a Cape May County woman accused of retaliating
in 2004 against her boss after an argument by changing her employer's
access codes to a supplier's Web site.

Police obtained the woman's identity through her Internet provider,
Comcast Corp., by tracing an Internet fingerprint left by her computer.
The fingerprint consisted of an Internet protocol address, often called
an IP address, that could be identified only by Comcast.

Police obtained a subpoena for the data from a municipal court, but
higher courts said a grand jury subpoena was necessary because an
indictable offense was at issue.

Police must seek a criminal grand jury subpoena to get such
information, the court found. And it said the woman's 2005 indictment on
a charge of theft by computer cannot stand unless prosecutors have
enough proof without the evidence, now suppressed, that they got from
Comcast without having the right subpoena.

Prosecutors can resume their pursuit of the information.

"Suppression under the circumstances present here does not mean that the
evidence is lost in its entirety. Comcast's records existed independently
of the faulty process the police followed," Chief Justice Stuart Rabner
wrote for the unanimous court. "And, unlike a confession coerced from a
defendant in violation of her constitutional rights, the record does not
suggest that police conduct in this case in any way affected the records
Comcast kept."

Cape May County Prosecutor Robert L. Taylor said his office will seek a
grand jury subpoena and a new indictment.



Customs Can Search All Files on a Laptop, Court Rules


Business travelers carrying laptops into the U.S. from overseas may be in
for a rude experience. The Ninth Circuit Court of Appeals ruled Monday
that U.S. Customs and Border Patrol officers can search laptops -
including opening every file on the hard drive - without any reasonable
suspicion.

The decision in United States v Arnold by a three-judge panel reverses a
U.S. District Court decision that said such searches require reasonable
suspicion.

The case concerns Michael Arnold, who arrived at Los Angeles
International Airport from the Philippines and was pulled aside by
customs agents for a random laptop search. When the officers started up
the computer they found two folders on the desktop labeled Kodak Pictures
and Kodak Memories.

When they found photos of nude women in those folders, they spent several
hours opening multiple files until they found images of child
pornography. They seized the computer and two weeks later obtained a
warrant. A grand jury charged Arnold with breaking federal
child-pornography laws.

In its ruling, the Ninth Circuit held that international arrivals at U.S.
airports are subject to the same rules as border crossings. Those rules
give customs officials broad leeway to conduct searches of anything a
traveler brings into the country. The international terminal of a U.S.
airport is the "functional equivalent of a border," the court said,
citing the U.S. Supreme Court case of Almeida-Sanchez v. United States.

In arguments before the court, Arnold's lawyer, Marilyn Bednarski, had a
creative argument to get around the presumption that border searches are
reasonable. Computers are "an extension of ourselves," she told media
outlets this week. "It really is like looking into someone's mind, rather
than looking into a box or a folder or a purse."

In other words, Bednarski argued, laptops are actually an extension of
our bodies. That argument is based on a Supreme Court holding that there
is at least one limit to border officers' ability to search at will. In
a 1985 case, United States v. Montoya de Hernandez, the Supreme Court
ruled that officers do need reasonable suspicion to search the alimentary
canal because "the interests in human dignity and privacy which the
Fourth Amendment protects forbid any such intrusion on the mere chance
that desired evidence might be obtained."

The appeals court didn't buy that argument.

Bednarksi also argued that the laptop was the equivalent of one's home,
since it potentially contains digital versions of all the images and
documents traditionally kept in the home. In another 1985 case,
California v. Carney, the Supreme Court ruled that not even a mobile
home is accorded the same privacy interest as an actual home since it is
"readily movable." A laptop is even more movable than a mobile home, the
court noted.

International travelers uncomfortable with having their laptops searched
might want to consider storing files online and renting a laptop when
they get to their destination country, or encrypting their files if they
do travel with a laptop.

"It's so easy to encrypt your files, passing through any spot where you
are liable to be searched with sensitive data unencrypted seems
brain-dead," one person posted on a blog.



Russian Prosecutors Eye Internet Censorship


The Russian prosecutor's office wants tough anti-extremism laws to be
extended to the Internet, state newspaper Rossiiskaya Gazeta reported
Wednesday, prompting fears of growing media censorship.

The prosecutors office has proposed a legal amendment to bring the
Internet under the same rules as printed media, Vyacheslav Sizov, a top
official at the prosecutor general's office told the daily.

Newspapers deemed in court to have published extremist material can be
shut down

  
under current laws.

The new proposal is for any website deemed to have hosted extremist
material to be blocked by providers in Russia "within a month," Sizov
said.

The Internet is the freest area of the media in Russia, where almost all
television and many newspapers are under formal or unofficial government
control.

The extremism law has already come under fire from human rights
activists, who say its sweeping nature is open to abuse by officials
wanting to outlaw legitimate criticism.

"It is a worry whenever the government tries to change any law," Oleg
Panfilov, director of the Centre of Journalism in Extreme Situations,
told AFP.

"It is difficult to find anyone who is not against extremism but it
depends on how the law is used. The government uses (it) selectively."

News website www.gazeta.ru was warned for extremism last year after it
wrote about cartoons that satirised the prophet Mohammed.



OLPC Switch to Windows on XO Is 'Muddled,' Developers Say


Open-source developers should stop bickering, unite and jointly develop a
Windows user interface to make XO laptops more appealing to users, One
Laptop Per Child Chairman Nicholas Negroponte has urged in a public note
to that community.

Developers in the open-source community did not take lightly to
Negroponte's comments, expressing outrage and questioning the judgment
of OLPC's shift from Linux to Windows for the XO laptop. Developers
called Negroponte's appeal "vague" and "demoralizing" for the future
development of Sugar, the user interface that currently works with Linux
on XO laptops.

In a note on OLPC's community site, Negroponte wrote that Sugar is less
than perfect and needs to be developed for Windows to expand the laptop's
appeal. The nonprofit has engaged in discussions with Microsoft to load
Windows on dual-boot versions of the XO laptop.

"I attribute our weakness to unrealistic development goals and
practices," Negroponte wrote. "Our mission has never changed. It has been
to bring connected laptops for learning to children in the poorest and
most remote locations of the world. Our mission has never been to
advocate the perfect learning model or pure Open Source."

Sugar needs to be separated from the OS core and made platform agnostic,
Negroponte wrote. "To do that, we need to hire more developers, work more
together and spend less time arguing."

This week developers began debating XO's possible shift from Linux to
Windows after Monday's resignation of Walter Bender, OLPC's president of
software and content. Bender gained a following in the open-source
community by promoting open-source software for the XO despite growing
efforts to load the laptop with Windows XP.

In a note posted Monday at OLPC's community news, Bender said that he was
leaving to advance the quality open-source software for learning and
would continue to work with the OLPC community "by adopting the spirit
and methodology of the open-source movement."

Observers contend that Bender left because he was less than happy with
OLPC's move from open source to Windows on the XO laptop. Some developers
saw it as a sign that OLPC is scaling down Sugar's development.

Drawing that conclusion from Bender's departure is incorrect, Negroponte
wrote: "We are scaling Sugar up, not down."

Developers replied that his vision of Sugar for Windows is muddled and
that he is further dividing himself from OLPC's developer community.

"If you are not serious about Sugar on Windows within the next year,
please continue to avoid 'now' and use 'might' and 'someday' when you
talk about it, and we'll continue to try to make Sugar-on-Linux achieve
its potential," wrote C. Scott Ananian in a community posting at the OLPC
site.

"I approve of keeping OLPC's options open, in case your current
development team (myself included) cannot deliver on Sugar's potential,
but setting vague (and demoralizing) goals for future development -
without actually devoting the resources to achieve those goals - is
madness. You have only succeeded in alienating the developers you need
to make Sugar-on-Linux work, without actually achieving any progress on
Sugar-on-Windows," Ananian wrote.

Porting Sugar, which runs on multiple Linux distributions, to Windows
shouldn't be hard, but the question is whether users will have the same
experience on both OSes, wrote Tomeu Vizoso.

Negroponte wrote that Sugar needs to be changed from an omelet to a fried
egg "with distinct yoke and white, rather than having the UI,
collaborative tools, power management and radios merge into one amorphous
blob."

Vizoso wouldn't chew on Negroponte's vision of a fried egg. "My
understanding is that the Sugar UI is composed of inseparable components
because we wanted to give an integrated and coherent experience. In
which way are you suggesting to split Sugar?"



Ubuntu 8.04 Released


The latest version of the popular Ubuntu Linux distribution was officially
released to the public today after the customary beta-test period. This
version is designated "LTS," for "long-term support," which should make it
attractive to business customers who prefer a longer upgrade cycle for
their operating systems.

Ubuntu 8.04 is available in a version tailored for server systems, but in
the past it has been the desktop version that has garnered the most
attention. The new release should be no different, as it includes a
number of improvements for desktop users - most notably, a new installer
that allows the OS to coexist on a Windows computer without partitioning
or re-formatting the hard drive.

As is customary for Linux distributions, Ubuntu 8.04 includes incremental
updates to many of the software packages that make up the system, from
low-level details like the window manager and graphics subsystem, all the
way up to the bundled OpenOffice.org productivity suite. The new release
is also the first to ship with the Firefox 3.0 browser, which is
currently still in late-stage beta testing. Despite some bleeding-edge
additions to the package, my early testing of Ubuntu 8.04 showed it to be
a remarkably stable and well-polished Linux desktop.

Full disclosure: I've tried many different desktop Linux distributions,
but Ubuntu remains my personal favorite. I will definitely be upgrading
the Ubuntu partition on the computer from which I write this, just as
soon as I'm able.

Of course, getting your own copy of Ubuntu may well be the trick. The
main servers are typically overburdened in the first few days after a new
release. Be sure to use the mirror nearest you, or better still, use
BitTorrent. Links to torrent files are hidden away on the main Ubuntu
site, but they're available. Using BitTorrent helps to relieve the load
on the download servers, plus you get the satisfaction of helping fellow
Linux users get their own copies of Ubuntu while you download yours. (If
the server is too slow to let you navigate to the torrent files, try here
for a torrent for the desktop version for i386.)



Not All :) As Informal Writing Creeps Into Teen Assignments


It's nothing to LOL about: Despite best efforts to keep school writing
assignments formal, two-thirds of teens admit in a survey that emoticons
and other informal styles have crept in.

The Pew Internet and American Life Project, in a study released Thursday,
also found that teens who keep blogs or use social-networking sites like
Facebook or News Corp.'s MySpace have a greater tendency to slip
nonstandard elements into assignments.

The results may give parents, teachers and others a big :( - a frown to
the rest of us - though the study's authors see hope.

"It's a teachable moment," said Amanda Lenhart, senior research
specialist at Pew. "If you find that in a child's or student's writing,
that's an opportunity to address the differences between formal and
informal writing. They learn to make the distinction ... just as they
learn not to use slang terms in formal writing."

Half of the teens surveyed say they sometimes fail to use proper
capitalization and punctuation in assignments, while 38 percent have
carried over the shortcuts typical in instant messaging or e-mail
messages, such as "LOL" for "laughing out loud." A quarter of teens have
used :) and other emoticons.

Overall, 64 percent have used at least one of the informal elements in
school.

Teens who consider electronic communications with friends as "writing"
are more likely to carry the informal elements into school assignments
than those who distinguish the two.

The study was co-sponsored by the National Commission on Writing at the
College Board, the nonprofit group that administers the SAT and other
placement tests.

The chairman of the commission's advisory board, Richard Sterling, said
the rules could possibly change completely within a generation or two:
Perhaps the start of sentences would no longer need capitalization, the
way the use of commas has decreased over the past few decades. "Language
changes," Sterling said.

Defying conventional wisdom, the study also found that the generation
born digital is shunning computer use for most assignments. About
two-thirds of teens say they typically do their school writing by hand.
And for personal writing outside school, longhand is even more popular
- the preferred form for nearly three-quarters of teens.

That could be because the majority of writing is short - school
assignments are on average a paragraph to a page in length, Lenhart
said.

Among other findings:

* Teens who keep blogs are more likely to engage in personal writing.
They also tend to believe that writing will prove crucial to their
eventual success in life.

* Parents are more likely than teens to believe that Internet-based
writing such as e-mail and instant messaging affects writing overall,
though both groups are split on whether the electronic communications
help or hurt. Nonetheless, 73 percent of teens and 40 percent of parents
believe Internet writing makes no difference either way.

The telephone-based survey of 700 U.S. residents ages 12 to 17 and their
parents was conducted Sept. 19 to Nov. 16 and has a margin of sampling
error of plus or minus 5 percentage points.



Microsoft Starts Testing Office Subscription Sales


Microsoft Corp started testing a new way of selling its Office software
suite on a subscription basis, packaging it with security software and
free online services.

Microsoft on Friday launched a new test program code-named "Albany"
that will allow consumers to download and install Office 2007, which
includes Word processing and Excel spreadsheet, and then receive
updates for a subscription instead of a more traditional one-time
license fee.

Consumers will also receive Windows Live OneCare, a Web-based security
software, and online applications including Windows Live Mail and
Office Live Workspace.

Microsoft did not disclose how it plans to set the pricing for
"Albany" or when it would be widely available.

The company faces competition from Google Inc and a slew of start-ups
including privately-held Zoho, which are offering applications
comparable to Office but delivered through a Web browser for free or
a monthly subscription.

Microsoft said this is not a complete overhaul of how it sells
software.

"We are definitely not straying from our traditional software sales
model," said Bryson Gordon, product manager for the project.

"There will always be a significant number of users for whom
purchasing a perpetual license to the latest version of Office is
still the best choice. "Albany" just gives customers more choice."





=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT