Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 07 Issue 46

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 7, Issue 46 Atari Online News, Etc. November 11, 2005


Published and Copyright (c) 1999 - 2005
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:




To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
http://www.icwhen.com/aone/
http://a1mag.atari.org
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #0746 11/11/05

~ Grokster To Shut Down! ~ People Are Talking! ~ Worm Targets Linux!
~ Homebrew Computer Club ~ Video Game Law On Hold ~ New Phishing Scam!
~ Universal Print Driver ~ EU Ruling By Spring? ~ Spyware Crackdown!
~ California Botnet Plot ~ MS To Buy AOL Stake? ~ Kill Bill's Browser!

-* Spam Finds New Home In Blogs *-
-* Yahoo Pulls Out of AOL Stakes Talks *-
-* Microsoft Antispyware To Become Defender! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



It continues to be a mad house around here, at work. This accreditation
survey coming up has everyone completely insane. Typically, it's having a
huge impact on my department, as we are the area that does what it can to
help our physicians be compliant. In some cases, our workload has increased
ten-fold. A few more weeks and it will be over!

No snow in my neck of the woods this past week - thankfully - although it
wasn't that far off. We have been getting gale winds, so the leaves are
rapidly ending up in the yard. Hopefully, we'll be able to get most of them
cleaned up this weekend; I can barely see the lawn underneath! With all of
the leaves quickly falling, I'm reminded that the holidays are rapidly
approaching. Like Joe, I'm sure, we're anxiously looking forward to
enjoying another Thanksgiving feast. Both my wife and I actually have the
day after the holiday off this year, so I know I'll be able to "bird out"
and have a day to be able to sleep it off! Well, it's been so hectic this
week that I haven't really had much time to pick a hot topic to ramble on
about. So, let's get right to another round of A-ONE.

Until next time...



=~=~=~=



->A-ONE User Group Notes! - Meetings, Shows, and Info!
"""""""""""""""""""""""



Crowd Gathers for Homebrew Computer Club's 30th


If you've never seen a couple hundred bona-fide geeks sitting on the edge
of their seats with excitement, you should have been on hand Saturday for
an appreciation of the 30th anniversary of the Homebrew Computer Club.

The celebration, which was part of Vintage Computer Festival at the
Computer History Museum here, was a lovefest for several mavericks of
technology. And amid tales of building some of the world's first personal
computers, the adoring audience of Silicon Valley elders got to hear a
series of nostalgic stories about the history of one of the most
influential computer users' groups of all time.

Founded in 1975, the Homebrew Computer Club boasted a series of very
well-known technologists. Among them was Steve Wozniak, the co-founder of
Apple Computer and a man known for his particular skill in putting together
rudimentary, yet powerful, personal computers.

"It was the most important thing in my life and every two weeks I lived
for it," Wozniak told CNET News.com, speaking of the Homebrew Computer
Club. "I was too shy to even speak at all. The only two times I ever spoke
were to introduce the Apple I and the Apple II."

Throughout the afternoon panel session, Wozniak and fellow club pioneers
Lee Felsenstein, Bob Lash, Allen Baum and Michael Holley regaled the
audience of several hundred - at least 100 of whom were standing along the
walls of the overcrowded meeting room - with tales of the Homebrew club's
history.

Felsenstein, who moderated many of the club's meetings, talked at length
about how it served as a nexus of computer fanatics eager to meet
likeminded people, exchange ideas and find project partners.

He said the club often would invite guests. Sometimes, though, they
wouldn't show up and so he discovered that by asking the gathered
participants if anyone knew anything about the subject the speaker was
supposed to talk about, a discussion would quickly ensue that progressed
from idea to idea as it moved around the room.

"So several times we created a lecture from the audience," Felsenstein
said.

To some on hand Saturday, the Homebrew Computer Club was emblematic of the
unique atmosphere made possible in the Bay Area in the mid-1970s.

"There were computer clubs at the time all over the country and the
Homebrew Computer Club was one of the most famous and the most
successful," said Liza Loop, who attended some of the club's meetings. "Two
things made the (club) so successful. One was where it was, because it was
in Silicon Valley...The other thing was the California counter-culture
which encouraged the free exchange of ideas."

It was through the club's meetings that several members of the group
created the machines that would become world famous. In particular,
Wozniak's work on the Apple I set the tone for the future of personal
computers that could be cobbled together from specific parts bought
piecemeal from computer stores and at computer shows.

And it was during the meetings that the participants grew to know each
other and appreciate each others' work.

"The significance of it for me was that it was where I met Woz," said Loop,
who has spent much of her life advocating for the advancement of computers
in education. "That's how I got the first Apple I."

Throughout the session, the panelists kept the audience laughing with
anecdotes illustrating the lighthearted nature of the club and of the
community of computer hobbyists in mid-1970s Silicon Valley.

"We had a lot of humor in the club," Wozniak said. "Any time you did
technical work, you had to have humor or it just wasn't enjoyable."

Indeed, Wozniak related a story about figuring out how he and fellow Apple
co-founder Steve Jobs had broken into the digital user group account of
John Draper - the inventor of the blue box, a device that allowed its user
to make illegal free long-distance calls from any phone.

"We found his resume," Wozniak remembered, "and we were going to add
something about his arrests, but we didn't."

Saturday's session at times had much the same feel of one of the club's
meetings, veterans said. At first, the event's organizers tried to get a
computer hooked up to a projection system, a process that took much longer
than planned. Then, the only method anyone could think of to pipe in Len
Shustek, another club veteran who was unable to attend the event Saturday,
was to call him on a Treo and turn on its speakerphone. Predictably, the
results were only mildly successful.

"This is really a lot like a club meeting, I guess," said Bruce Damer,
whose Digibarn computer museum organized the panel. "Complete chaos."

In any case, the panel itself was only one piece of a weekend of events for
the Vintage Computer Festival.

After the panel, the crowd moved upstairs to an exhibit hall where Wozniak
signed autographs and hundreds of computer enthusiasts prowled around a
room full of vintage equipment, much of which was for sale.

Among the featured items were original Macintoshes, stacks of Commodore
64s, Atari 2600s and dozens of its game cartridges, a complete Apple IIe
system for $50, and an original copy of Borland's Turbo Pascal for DOS.



=~=~=~=



PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org



Hidi ho friends and neighbors. It seems that the weeks are just flying
by. Thanksgiving is less than two weeks away and Christmas is only
around 4 weeks after that. Where oh where has the time gone?

I've had a little project on the back burner for a while now. When I was
in college, I was an editor on the campus newspaper. I decided to track
down as many of the old crew as possible. I found a few of them, and
we've traded emails back and forth. We were a fairly tight little
group, and it's damned good to be in touch with them again. Just
trading memories about things we did a quarter of a century ago brought
back all the good times. If you've got the time and the inclination, I
highly recommend searching around the 'net for your old "crew".

Well, I'm about talked out for tonight, so let's get on with the news,
hints, tips and info available from the UseNet.


From the comp.sys.atari.st NewsGroup
====================================


Erik Hall posts this:

"Hello all !

New version of MyMail 1.84 released.


Major improvements & bugfixes:
-----------------------------
- A index file corruption problem fixed.
- Re-write of code to get faster downloads in the case when the
user is saving mail on server.
- Printing errors fixed.
- Some minor bugfixes.

Read more in the history.txt file.

Download from:
--------------
http://erikhall.mine.nu/~erikhall/programs/mymail.html "


Ekkehard Flessa tells Erik:

"I've found it earlier and already added it to my online hotlist :-)

But that's not the reason I'm writing this.

I'm still using version 1.74, because with all otherwise working 1.8x
versions I've tried, the SPAM filtering won't work as expected.

- I select "check mail"
- MyMail does so and says "you've got xx mails"
- I choose "details", as sometimes the SPAM filter will miss some or
worse, classify non-SPAM mails as SPAM.
- The list displayed contains only SPAM messages. But once I hit the
"retrieve" button, they are downloaded anyway! With 1.74, they were
deleted, and that's what I mostly need MyMail for...

I don't want to manually un-check every single SPAM in the list, as in
that case I wouldn't need any SPAM filter."


Jean-Luc Ceccoli tells Ekkehard:

"The spam filter is enabled within the "Select user" menu.
This 1.84 seems very stable again (unlike previous 1.8x) and all the
post-1.74 bugs and strange behaviours seem corrected as well.
I think you ought to give it another try, after backing up your data,
then in a few days you might find it's worth it."


Edward Baiz adds:

"It works fine for me, but when I get or send mail, the screen that
shows the messages gets messed up. No real problem. I just have to
close the window and then re-open it."


Ronald Hall posts this about the PeST DEKA interface update:

"Hey gang. I guess specifically Alison and Chris. :-)

Anyway, now that I got the PeST in, I actually hooked it up to my
CT60'ed Falcon, with a DEKA interface, using a Logitch optical mouse.
The kind that has the adaptor that lets you use it like a serial or USB
mouse.

Using the adaptor with the PeST, I tried it with straight TOS, straight
TOS with the CT60 disabled, and everything going, booted into MINT. The
results were always the same.

The PeST works just fine, as far as movement, clicking, etc, etc, but
holding both buttons down for 10 seconds does *nothing*.

Well, thats it for now. Let me know if there are any other tests or
things I can try."


Greg Goodwin tells Ronald:

"Yep, although to be a bit more precise, mine does jiggle slightly.

The PeST IS in setup mode, however, and one can select the various
modes well enough. For me, only one of the four is pleasant to use.
Which do you prefer?"


Ronald replies:

"I never even tried any of the modes, once I saw it wasn't working like
it was supposed to. Guess I'll have to hook it back up - or better yet,
to my Mega ST where I can see what its doing."


'Chris' adds:

"Not wanting to sound dumb, though have you "counted" 10 seconds or
timed it to a clock ? If nothing happens after say 15 seconds then
something is a bit odd somewhere. No matter what you plug pest into
the 10 second time will always be the same. In fact if you put LED's on
PeSTs outputs and put 5V power on it, the LED's would flash after about
10 seconds...

BTW, Have you checked the 5V line ? Check it as far down the line as
possible.... it *could* be that you have a small voltage drop on your 5V
line, in which case this *could* effect the timings, I am not 100% sure
as I have not done much work with the microcontrollers which PeST uses
yet, but my best guess is that your 10 second timing could be delayed
due to volt drops. Try holding down up to 30 seconds... basically as
long as PeST has power it should be fine in that respect...

I've been using PeST on my CT60 Falcon all week and its fantastic, makes
me wonder how I lived without one :P

Let us know how you get on!"


Ronald tells Chris:

"Yes, I held it for probably 15-20 seconds, by the second hand on my
wristwatch.

Under MINT, after 10 seconds, the menu came up, the one that normally
comes up when you press the right mouse button.

In normal TOS, it just does nothing."


Carey Christenson posts this question about a friend's EtherNEC:

"I have a friend that tore down his CT60'ed Falcon for remodeling his
basement when he reinstalled everything he plugged in the EtherNEC
cable to the cart port upside down. Now he cannot access the internet.
He uses MagicNET like I do and it says something needs to be specified
in services or something like that. Can this be fixed and if so how??
I seem to remember a thread from a while ago that talked about this.
Cannot place my finger on it right now."


Djuro Pucaric tells Carey:

"Well, that's serious trouble, cartridge port may be damaged very
possibly."


Edward Baiz adds:

"It could be something as simple as a bent connection since it was put
in upside down. Happened to me once. Or it could be that something is
blown on the motherboard, but I do not believe that is the case.

When and where does he get this message about the services? It also
could be something is messed up in his settings, most likely in his ETC
folder. When I installed my new Western Digital hard drive, I could not
connect either with MagicNet. Turns out files in my ETC folder had to
be replaced."


Ronald Hall adds his thoughts:

"Umm, if I recall that thread correctly, it potentially can blow
something like a resistor or capacitor on the Falcons motherboard and
you have to replace it.

Its a very bad thing to do, from my understanding. I hope not in your
friends case, maybe he dodged a bullet."


Carey tells Ronald:

"I just did some google searching and found the exact thread after some
searching and it appears to be a blown fuse named F2. His Falcon
though is apparently booting properly. Unlike others that I have read
that have said that their falcon resets with the EtherNEC plugged in.
But I passed the information on to my friend so that he can get his
Falcon fixed soon."


Ronald replies:

"No problem. Sorry to hear anyone is having trouble with their Atari
computers. It does sound like he may have gotten off a bit lucky
though!"


Paul Hopkins asks about a hard drive for his Falcon:

"Have any of you had any success with using a Hitachi DK23CA-10
(10 Giga Byte) IDE drive in a Falcon ?

I am using HD 7.1 . The program lists the drive but cannot see it
when I try to partition. The Falcon Just bombs out.

I seem to remember reading somewhere that a Falcon could access max
128Gbyte. Is that really so ?

The drive checks out ok on my friends PC notebook as being fully
functioning.

Any ideas please as new drives of low capacity are now almost impossible
to find.I am using a 6Gig IBM DCMA 21440 drive with no problems on my
Falcon but my wife's drive on her Falcon is going down fast and I need
to replace it as soon as possible."


Ronald Hall jumps in and tells Paul:

"You might need a later version of HDDriver? I think you can download a
8.x demo that should tell you whether or not thats the problem.

I'm not sure what the total top size is for hard drivers on the Falcon.
I believe its about 1 gig per partition, up to the letter P? Not sure.
Using something like MagiC or MINT though, you can certainly go much
higher. I've got an 80 gig Maxtor HD that works fine with MINT."


Well folks, that's it for this week. I know it's short, but the
NewsGroup has been a little slow again. C'mon back next week and listen
to me obsess about Thanksgiving Day turkey. I love turkey!

'Till then, keep your back to the wall, your ear to the ground, your eye
on the horizon and your shoulder to the wheel... now try to get
anything done in THAT position! Till next week, keep listening to what
they're saying when...


PEOPLE ARE TALKING



=~=~=~=



->In This Week's Gaming Section - Atari Licenses Unreal License!
""""""""""""""""""""""""""""" Michigan Video Game Law On Hold!





=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Atari Licenses Unreal Engine 3


Atari, Inc. and Epic Games announced that Atari has obtained the rights to
use the Unreal Engine 3 and tools for games on next-generation platforms in
a multiple-licensing agreement.

"We're excited to continue building our relationship with Epic Games and we
look forward to tapping the potential of Unreal Engine 3 technology," said
Jean-Marcel Nicolai, Senior Vice President of Worldwide Product Content,
Atari, Inc. "By utilizing the Unreal Engine 3, Atari will gain rapid
prototyping capabilities."

"We've had a long-standing licensing and publishing relationship with Atari
and it is especially gratifying to me to see our technology partnership
continue," said Mark Rein, Vice President and Co-founder of Epic Games.
"We're confident that Atari will make several great games with our
technology and look forward to working with the company and its developers
in achieving that goal."



US Judge Puts Michigan's Video Game Law On Hold


A federal judge on Wednesday granted video game industry groups' request
for a preliminary injunction preventing the state of Michigan from
enforcing a new law aimed at banning sales of violent video games to
minors.

The ruling from the U.S. District Court for the Eastern District of
Michigan comes amid a fierce campaign by lawmakers and some parents' groups
to limit access to games with adult content. California and Illinois have
passed similar laws and a Florida lawmaker is trying to get like
legislation passed.

"(Michigan) has been unable to demonstrate the perceived harm it seeks to
protect against," Judge George Caram Steeh wrote in a ruling obtained by
Reuters.

He added that the state had failed to show what harm could result from
selling games to minors. The judge also said "obvious harm" could arise
from "stifling free speech" if the law goes into effect as planned on
December 1.

"Plaintiffs have demonstrated that the Act is unlikely to survive strict
scrutiny, and that irreparable harm follows from the loss of First
Amendment freedoms," Judge Steeh wrote.

The Entertainment Software Association, the Video Software Dealers
Association and the Michigan Retailers Association took on the Michigan law
and are fighting the same battles in California and Illinois.

Courts already have blocked similar legislation in Washington State, the
city of Indianapolis and St. Louis County in Missouri, finding that the
laws violated free speech guarantees in the U.S. Constitution.

Calls to Michigan Gov. Jennifer Granholm's press office were not
immediately returned.

"We are gratified that Judge Steeh has issued this preliminary injunction
and in so doing has suggested that the arguments and research relied on by
Gov. Granholm and the legislature are weak and unpersuasive," Douglas
Lowenstein, president of the ESA, said in a statement.

The furor over video game content flared anew this summer when game
publisher Take-Two Interactive Software Inc. pulled its blockbuster title
"Grand Theft Auto: San Andreas" from store shelves following the discovery
of hidden sex scenes in its code.

In 2004, the U.S. video game industry reaped sales of $7.3 billion,
rivaling U.S. box office.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



EU Takes Swipe at U.S. Internet Oversight


The European Commission on Friday took a swipe at U.S. oversight of the
Internet but offered no concrete alternatives, in advance of an
international summit on how the Internet should be run.

A U.N. report has proposed a multinational approach as a more democratic
and clearer way of running the Internet.

The controversy centers around the Internet Corporation for Assigned Names
and Numbers (ICANN), a California-based non-profit company set up in 1998.

ICANN doles out Internet suffixes such as the familiar .com, country
suffixes such as .uk, and newer suffixes such as .tv, .biz or .eu. It
authorises changes to the "root zone file," which matches those domains
with numerical addresses.

The U.S. Commerce Department has ultimate control of the root zone file,
and Washington made clear recently it intends to maintain that role.

The U.S. Commerce Department was expected to surrender its control of
ICANN, but said in July it would "maintain its historic role in authorizing
changes or modifications to the authoritative root zone file."

Europe cried "foul," arguing Washington changed the rules of the game and
plans to keep permanent control of the system.

"There was an agreement that the Department of Commerce control would be
phased out but this summer the United States announced they would maintain
this oversight function," a Commission official said.

A second European official added: "We just say this needs to be addressed
in a more co-operative way ... under public policy principles."

Both officials asked not to be identified.

The European Union will try to reach agreement at the World Summit on the
Information Society (WSIS) in Tunis on Wednesday and Thursday. But the
United States has said it will not agree to any changes.

As matters stand, for example, if a country wants to change some aspects of
its national top level domain, such as .nl for the Netherlands, that
decision must be approved first by ICANN and then by a Commerce Department
official.

The European Commission wants to take the Commerce Department out of the
loop, but it is vague about what should replace that.

Pressed, European Commission officials referred reporters to its
principles, which say that "the role of governments ... should be mainly
focused on principle issues of public policy, excluding any involvement in
the day-to-day operations."

But to American ears that sounds like replacing what they call the "light
touch" of American Internet regulation with potential interference from
upwards of 200 countries.

"We don't really see how an organization can have oversight and final veto
control and not have an impact on day-to-day activities," said David
McGuire of the non-government Center for Democracy and Technology in
Washington, D.C.

"We don't think it's optimal for any government to be directly involved in
the oversight management," of ICANN.

He said the U.S. government has never reversed an ICANN decision and
eventually the organization should stand on its own two feet.



Grokster Downloading Service to Shut Down


Grokster Ltd., which lost a Supreme Court fight over file-sharing software
used for stealing songs and movies online, agreed Monday to shut down and
pay $50 million to settle piracy complaints by Hollywood and the music
industry.

The surprise settlement permanently bans Grokster from participating,
directly or indirectly, in the theft of copyrighted files and requires the
company to stop giving away its software, according to court papers.

Executives indicated plans to launch a legal, fee-based "Grokster 3G"
service before year's end under a new parent company, believed to be
Mashboxx of Virginia Beach, Va. Mashboxx, headed in part by former Grokster
president Wayne Rosso, already has signed a licensing agreement with Sony
BMG Music Entertainment.

"It is time for a new beginning," Grokster said in a statement issued from
its corporate headquarters in the West Indies.

Grokster's Web site was changed Monday to say its existing file-sharing
service was illegal and no longer available. "There are legal services for
downloading music and movies," the message said. "This service is not one
of them."

The head of the Recording Industry Association of America, Mitch Bainwol,
described the settlement as "a chapter that ends on a high note for the
recording industry, the tech community and music fans and consumers
everywhere."

It was unclear whether Grokster can afford to pay the $50 million in
damages required under the agreement. The head of the Motion Picture
Association of America, Dan Glickman, said the entertainment industry will
demand full payment unless Grokster satisfies all its obligations under the
settlement.

Grokster's brand will survive. The new fee-based version of its software
will be available within 60 days, according to one executive involved in
the deal. This executive spoke only on condition of anonymity because the
sale of Grokster's assets is pending.

Grokster's decision was not expected to affect Internet users who already
run the company's file-sharing software to download music and movies
online, nor was it expected to affect users of rival downloading services,
such as eDonkey, Kazaa, BitTorrent and others.

Glickman said Grokster will send anti-piracy messages to existing users,
and the company is forbidden from maintaining its software or network.
"Without those services, the system will degrade over time," Glickman said.

Grokster lost an important Supreme Court ruling in June. Justices ruled
that the entertainment industry can file piracy lawsuits against technology
companies caught encouraging customers to steal music and movies over the
Internet.

The decision, which gave a green light for the federal case to advance in
Los Angeles, significantly weakened lawsuit protections for companies that
had blamed illegal behavior on their own customers rather than the
technology that made such behavior possible.

The court said Grokster and another firm, Streamcast Networks Inc., can be
sued because they deliberately encouraged customers to download copyrighted
files illegally so they could build a larger audience and sell more
advertising. Writing for the court, Justice David H. Souter said the
companies' "unlawful objective is unmistakable."

"They're out of business," said Charles Baker, a lawyer for Streamcast.
"It's over for them. There was a lack of desire to continue to fight this
thing going forward." Baker said the settlement does not affect Streamcast,
the co-defendant in the entertainment industry's lawsuit.

The Supreme Court noted as evidence of bad conduct that Grokster and
Streamcast made no effort to block illegal downloads, which the companies
maintained wasn't possible.



Phishing Scam Lured Users with Bogus Google Site


An online scam offering the lure of free money through a bogus Google Web
site has been uncovered by security company Websense, which reported that
the site was shut down about 30 hours after it was first discovered on
Monday.

The phishing attack employed a page that closely resembled the real Google
home page, with a banner message claiming "You won $400.00!"

Users were instructed to collect their prize money by transferring it to a
credit card. To do so, they were asked to provide their account numbers.
They also were asked to provide their home addresses and phone numbers.

After the sensitive personal information was collected, users were
redirected to Google's legitimate Web site. The phishing site was hosted in
the U.S., Websense said.

"This is a little different than other phishing attacks in that it
attempted to entice people into divulging their credentials and using the
Google name, as opposed to attacks that target banks or e-commerce sites,"
said Dan Hubbard, senior director of security research at Websense.

This particular phishing site did host other attacks targeting financial
institutions, he added, noting that the approach taken by these criminals
was fairly rudimentary when compared with attacks that use a Trojan horse
or log a user's keystrokes.

And the Google mimicry reflects a disturbing trend. A recent Gartner survey
showed that phishing attacks grew at double-digit rates last year in the
U.S.

In the 12 months ending in May 2005, some 73 million U.S. Internet users
said they received an average of more than 50 phishing e-mails in the prior
year.

And an estimated 2.4 million online consumers report losing money directly
because of the phishing attacks. Of these, approximately 1.2 million
consumers lost $929 million during the year preceding the survey, Gartner
reported.

"The standard security rules apply in protecting yourself from a phishing
attack," said Hubbard. "Don't click on links in e-mail messages, type in
the address of a bank yourself, run the latest antivirus software, and
obtain the latest security patches."



EU Court Hopes to Rule on Microsoft by Spring


The European Union's Court of First Instance hopes to rule on Microsoft's
antitrust case by early spring, court President Bo Vesterdorf said on
Friday.

Microsoft has gone to the EU court to challenge a 2004 decision by the
European Commission, which found the U.S. software company used
near-monopoly power to muscle rivals.

"Hopefully we will have a ruling in early spring, hopefully before April,"
Vesterdorf told reporters on the margins of a competition conference.

He made no further comments about the case.

Brussels found that Microsoft had violated European antitrust rules through
unfair business practices. It fined Microsoft and ordered it to make
available a version of its Windows operating system without Windows Media
Player.



FTC Cracks Down on Alleged Spyware Site


A U.S. district court today ordered a Web business offering free music
files, browser upgrades, and ring tones to halt downloads of alleged
spyware and adware, at the request of the U.S. Federal Trade Commission.

The U.S. District Court for the Central District of California, in Los
Angeles, also froze the assets of an organization doing business as
Enternet Media, Searchmiracle.com, C4tdownload.com, and Cash4toolbar.com,
according to the FTC. In addition, the court halted downloads from an
affiliate site, Iwebtunes.com, that allegedly spread spyware by offering
free background music to Weblog operators.

The FTC's November 1 complaint alleges that the Web sites of the defendants
and their affiliates caused installation boxes to pop up on users' computer
screens. In some cases, the installation boxes offered a variety of
freeware, including music files, mobile phone ring tones, photographs, and
song lyrics. In another variation, the pop-up box warned users that their
Internet browsers were defective and offered free upgrades or security
patches, according to the FTC.

Instead of receiving the free files or patches, users' computers were
infected with spyware, says the FTC.

The FTC complaint alleges that the defendants' software code could track PC
owners' Internet use, change their home page settings, insert new toolbars
into their browsers, insert a large frame displaying advertisements into
browsers, and display pop-up ads. The software installed interfered with
computer functions and could be difficult to remove, the FTC says. (A PDF
of the complaint is available.)

The FTC is seeking a permanent injunction against the downloads. The agency
is also asking the court to order the defendants to give up their
"ill-gotten gains." Microsoft, Webroot Software, and Google assisted the
FTC in its investigation, the agency says.

Defendants named in the FTC complaint are Enternet Media, Conspy & Co.,
Lida Rohbani, Nima Hakimi, and Baback Hakimi, doing business as Networld
One, all based in California. The affiliate, also charged in the complaint,
is Nicholas C. Albert, doing business as Iwebtunes, based in Ohio.

The FTC asks anyone who has experience with any of these defendants to
contact the agency at enternetmedia@ftc.gov or to call 202/326-2992.



Microsoft AntiSpyware Renamed Windows Defender


In anticipation of the new security features that will ship with the
Windows Vista operating system, Microsoft has updated and renamed a key
component of its security arsenal. Windows AntiSpyware, in beta for roughly
a year, will be called Windows Defender.

The shift is not just a name change for the software. Microsoft has
introduced several new technologies to the tool, including the ability to
detect and remove malware such as rootkits and keystroke loggers.

Windows Defender will not be available for a while, but likely will ship
prior to the release of Windows Vista.

When released, the Windows Defender tool will be more closely tied to the
fundamental layer of the operating system itself, with the software running
as a system service instead of as a separate application. In addition,
malware-signature updates will be delivered through Windows Update instead
of through an update engine specific to the tool, as is the case now with
Windows AntiSpyware.

According to Microsoft, the detection mechanisms of Windows Defender will
be substantially improved over Windows AntiSpyware because it will use some
of the malware-detection technology found in the forthcoming Windows
antivirus software.

The Windows Security Center in Vista will be redesigned to detect whether
an antispyware application is running and operating normally. Users will
have the option of disabling or turning off Windows Defender and installing
a third-party antispyware application.

Enterprise and corporate customers using Windows Server Update Services
soon will start seeing Windows Defender in the product category as well as
in a new category called Definition Updates.

In addition to being available to those who purchase Windows Vista, the new
software will be available to Windows XP users as an upgrade, replacing the
current Windows AntiSpyware technology.

Yankee Group senior analyst Andrew Jaquith pointed out that Windows
Defender is part of a "rolling wave" of announcements associated with the
highly anticipated launch of Vista.

"Microsoft is putting all the pieces together by adding rootkit and
keylogging detection to its antispyware and antiphishing applications, and
the company most likely will add host-intrusion and buffer-overflow
protection to the package," he said.

The company's objective, said Jaquith, is to gain greater control over
security in its products. "But the question is whether they offer
compatibility with other security offerings or try to do this all on their
own," he said.



Spam Finds a New Platform in Blogs


Spam, the bane of e-mail and the Internet, has found different digs
online - Web logs. Blogs have become an irresistible lure for scammers
eager to create new methods to deliver their junk advertisements.

The unwanted advertisements, known on the Web as "splogs," go where junk
e-mail, faxes, and adware have never gone before, using the same deceptive
practices in varying form.

Although the method of delivery might be different, splogs push the same
old merchandise, including online gambling, porn, and get-rich-quick
schemes.

The most common tactic is to create a fake blog filled with links to other
Web sites. People using a search engine to find a blog on breast cancer,
for instance, might find themselves on a site containing advertisements and
links for porn sites.

Another method, known as link-spam, uses the feedback fields of blogs.
Spammers post phony comments that have nothing to do with the blog's topic
of discussion, and instead include a sales pitch or link to another Web
site.

For example, the blog topic could be insomnia and a spammer will post a
message about garden furniture.

The goals of splogging are twofold: trying to get people to visit the Web
site, and at the same time trying to increase the Google ranking of the
site to which it is linked.

"Spammers try to influence that [ranking] and make their own sites more
popular," said Graham Cluley of Sophos.

The faux blogs and links are for the most part a nuisance for bloggers and
companies that provide free blogs, according to Cluley, because they waste
bandwidth and hard-disk space. Splogging also presents a security risk to
bloggers who allow HTML posts from their readers.

"If you allow people to post comments on your blog, not only might they
link to a malicious Web site, but they can post malicious code on your Web
site," Cluley said.

Cluley recommended that bloggers limit the scope of what people can post.
People who keep blogs might want to stipulate that respondents not include
links to other sites, or they might restrict the type of HTML allowed.

"That will be a real pain to the spammers, although they may try to
obfuscate their Web addresses by leaving off the 'http' or [putting] spaces
between the [periods] in the URL," Cluley said.

Although blog providers are developing splog filters similar to those used
for spam, Cluley says the failsafe solution is for blog keepers to moderate
the comments their readers post.

"That will help and also let [bloggers] scan for offensive or inappropriate
content as well," Cluley said.



California Man Charged in Far-Reaching Botnet Scheme


The FBI has arrested a California man accused of assembling a botnet
comprising hundreds of thousands of computers to spread spam and other
malware, and of profiting from the zombie machines through the unauthorized
distribution of adware.

Jeanson James Ancheta, 20, of Downey, California, was indicted yesterday in
two separate conspiracies, as well as on charges of attempting to cause
damage to protected computers, causing damage to computers used by the
federal government in national defense, and accessing protected computers
to commit fraud and money laundering.

The 17-count indictment from the U.S. Attorney's office alleges that
Ancheta wrote malicious computer code, used that code to assemble botnets,
and sold access to the infected computers for the purpose of launching
distributed denial-of-service (DDoS) attacks and sending spam.

The U.S. accuses Ancheta of conspiring to modify and disseminate the Trojan
horse program "rxbot," which allowed him to create botnets, each with
thousands of Internet-connected computers reporting to an Internet Relay
Chat (IRC) channel that Ancheta controlled. In a separate IRC channel,
Ancheta advertised the sale of his botnets, according to the indictment.

Ancheta also is accused of providing commands needed to instruct the
botnets to launch DDoS attacks or send spam, along with malware that would
allow the botnets to spread.

The second conspiracy outlined in the indictment alleges that Ancheta
caused adware to be downloaded onto the infected computers that were part
of his botnet armies. To do this, according to the U.S. Attorney, he
directed the compromised computers to servers he controlled where adware
he had modified would surreptitiously install onto the infected computers.

Ancheta was an affiliate of several adware companies, which paid him a
commission based on the number of installations. The indictment charges
that he would vary the download times and rates of the adware installations
to avoid detection, and that when companies hosting Ancheta's adware
servers discovered the malicious activity, he redirected his botnet armies
to a different server he controlled to pick up adware.

The suspect made about $60,000 by installing adware on some 400,000
compromised computers, according to the U.S. Attorney's office.

Among the systems affected by the botnets were computers at the Weapons
Division of the United States Naval Air Warfare Center, as well as machines
operated by the U.S. Department of Defense.

This case comes on the heels of the October arrests of three individuals in
the Netherlands accused of operating a botnet of 1.5 million infected PCs
worldwide, and of using this network to steal personal information and
launch a DDoS against a U.S. adware firm in an effort to extort money from
the company.

"This is clearly a growing problem with serious consequences," said Graham
Cluley, senior technology consultant for security specialist Sophos. He
noted that about 80 percent of new viruses are distributed by botnets,
which can use thousands of computers to spread malware. "They are used to
deliver spam, Trojan horses, and other malicious code very quickly."

What is noteworthy about the California case, said Cluley, is that the
perpetrator went beyond launching a denial-of-service attack and found a
way to make money with his zombie machines. "The adware companies do not
condone this type of behavior by their affiliates, but it obviously can be
done," he said.

Cluley said throwing the book at Ancheta can serve notice to others who
would wreak havoc through botnets. "People think they can get away with
this, and can make money by selling access to botnets, so the fact that he
faces several years in jail could be a deterrent."

If convicted of all charges, Ancheta could be sentenced to 50 years in
prison. The case was investigated by the FBI in Los Angeles with the
assistance of the Southwest Field Office of the Naval Criminal
Investigative Service and the Western Field Office of the Defense Criminal
Investigative Service.



HP Crafts Universal Printer Driver


Hewlett-Packard plans to announce an update to its printer management
software along with a one-size-fits-all printer driver at its ImagePrint
conference in Orlando on Wednesday, according to a company executive.

Web Jetadmin 8.0 adds the capability to gather usage data on individual
users or applications and assign privileges to them, instead of just the
printer itself, said Tom Codd, director of marketing for HP's enterprise
imaging and printing group. For example, an IT manager could allow color
printing only by members of the marketing department or only for documents
created by a certain application, he said. Users who were printing word
processing documents or other everyday material could be restricted to
black-and-white printing, which is far cheaper.

The updated version of the software also allows IT managers to get a better
handle on the status of ink and toner supplies and automatically order new
cartridges if the supply falls below a certain level. And now printers that
aren't directly connected to a company network, but are connected to
networked PCs, will show up in Web Jetadmin 8.0's management console, Codd
said.

Printers are the last frontier in the quest to inventory all the technology
assets within a company. As printers have become more sophisticated,
similarly sophisticated software is required to manage those printers and
to make sure companies have a handle on their printing
costs.

Web Jetadmin is available as a free download from HP's Web site.

As part of HP's announcement, the company is unveiling a Universal Print
Driver, which will allow HP printer users to install a single driver that
will work on just about any HP monochrome or color printer produced since
January 1997, Codd said.

Driver management is a huge headache for HP's customers, which often have
dozens of different printers scattered throughout their organizations, Codd
said. The Universal Print Driver is recommended for just about every HP
printer customer managing a fleet of printers, he said.

Certain customers who need tighter control over the shading of a color
printer or the resolution of a black-and-white printer will want to use the
specific drivers for those printers, an HP spokeswoman said. The company
believes these users make up an extremely small percentage of their
customers, she said.

The announcements come almost exactly a year after HP's previous extensive
release of printers and accessory products.



Microsoft May Buy Stake in AOL


Microsoft Corp. has emerged as the front-runner in talks surrounding the
potential sale of a stake in America Online.

Several issues could delay any potential transaction. The New York Times
reports one issue is whether such an alliance would be another risky
partnership for Time Warner Inc. The company is also looking at whether a
new partner at AOL could help Time Warner navigate the digital world.

Microsoft approached AOL several months ago to discuss joint ventures, but
any agreement is still likely weeks away.

Last week Time Warner's chairman and chief executive, Richard Parsons,
acknowledged the talks. But he says the discussions are very fluid, and
they don't know whether a deal will even be reached.



Yahoo Pulls Out of America Online Talks


Yahoo Inc. has pulled out of discussions over buying a stake in America
Online Inc., leaving Microsoft Corp. and Google Inc. as the leading
potential suitors.

The decision to abandon the talks came after Yahoo chief executive Terry
Semel and chief finance officer Susan Decker met in late October with Time
Warner executives in New York, said Yahoo spokeswoman Joanna Stevens.

Stevens said Yahoo had "politely passed" on proposed terms and "walked away
from any interest in a deal."

Two people close to the discussions said a key stumbling block was Time
Warner Inc.'s insistence that it retain majority ownership in the AOL unit.
They spoke on condition of anonymity because public discussions of any
private negotiations were contrary to their companies' policies.

One of the people, familiar with Time Warner's position, said one
arrangement under discussion had called for Yahoo to pay Time Warner in
stock worth $13 billion for an 80 percent stake in AOL's growing content
business, which includes its Web sites and the news, music and other
services featured on them.

Under that proposal, the person said, Time Warner would keep all of AOL's
Internet access business, which is in decline as users abandon dial-up
connections for higher-speed cable and DSL lines.

The Yahoo withdrawal, reported earlier on the Web site of The Wall Street
Journal, leaves Microsoft and Google as the leading contenders, with Google
possibly combining with Comcast Corp. in a bid.

The interest in AOL comes as the company transforms itself from a declining
"walled garden" focused on providing dial-up access to a provider of free
content that is tapping the recent boom in online advertising.

Late last year, the Dulles, Va.-based company abandoned its longtime
strategy of exclusivity and began making its rich offerings - including
concerts, news, sports and e-mail - available through AOL.com for free, a
model Yahoo drove to become the Web's top brand.

The Web portal side of AOL's business is worth about $11.3 billion, based
largely on AOL's advertising potential, according to media analyst Michael
Nathanson at Sanford C. Bernstein.

A Google deal with AOL would give the Internet search leader a way to build
a portal - and grow its advertising potential - while preserving an
existing relationship with AOL. More than 10 percent of Google's revenues
come from a partnership in which AOL uses Google's search results and the
two companies share ad revenues.

A deal with AOL would be in Microsoft's interest as it could dampen
competition from Google and create synergies. Microsoft's MSN online
division and AOL share many businesses, including an online portal, instant
messaging services and dial-up access.

There would also be considerable overlap between AOL's and Yahoo's
businesses.

Yahoo, based in Sunnyvale, Calif., is the leading Web destination,
according to Nielsen/NetRatings and comScore Media Metrix, as more people
head to the Internet for news, entertainment, communications and other
services.



Worm Targets Linux Systems


A new worm that attacks Linux systems and exploits several vulnerabilities
in the operating system has been reported, and security firms are urging
caution among users.

The worm has been dubbed "Lupper" by antivirus firm McAfee and "Plupii" by
Symantec. Threat levels range from low to medium risk among security
companies, mainly because the worm has not been distributed widely.

Although its threat rating is low, the worm is being watched for its
potential to hurt Linux systems. It installs a backdoor on infected
servers, which then can be exploited to create a network of systems that
can launch attacks on other computers.

According to McAfee, the worm spreads by exploiting Web servers hosting
vulnerable PHP/CGI scripts. It is a modified derivative of the Slapper and
Scalper worms, which targeted Linux and BSD respectively.

The worm blindly attacks Web servers by sending malicious HTTP requests on
port 80, McAfee noted in its advisory.

"If the target server is running one of the vulnerable scripts at specific
URLs and is configured to permit external shell commands and remote file
download in the PHP/CGI environment, a copy of the worm could be downloaded
and executed," the advisory states.

Similar to Slapper and Scalper, the new worm creates a network of
compromised servers based on peer-to-peer principles. This network could be
used for denial-of-service attacks, McAfee warned.

Symantec and McAfee have updated their products to provide some protection,
but Secunia security researcher Thomas Kristensen noted that because the
vulnerability is in the library of many products, users of third-party
applications might not know they are at risk.

"Users should be less concerned if the application they're using is from a
Linux distributor, because they have patches available," said Kristensen.
"But with third-party vendors, users might not know about the problem until
they read about it."

The vulnerabilities being exploited are somewhat complicated to patch, he
added. "Users should be careful to make sure they're protected by going to
security sites and looking at the different components involved here."



"Kill Bill's Browser" Site Aims To Cash In On Google's Bounty


Four political activists from Massachusetts launched a parody Web site
Wednesday dubbed "Kill Bill's Browser" to convince Web users to switch from
Internet Explorer to Firefox.

Along the way, they just may make themselves a few bucks by getting people
to change browsers.

With a color scheme reminiscent of Quentin Tarantino's "Kill Bill" films,
the site features "13 Good Reasons to Switch from Internet Explorer to
Firefox." Number 7? "It will make Bill Gates soooooooooo mad." Number 11?
"Reduce your weekly family & friends tech support load to 8 hours."

But according to one of the quartet behind the site - who are also behind
ExplorerDestroyer.com, which offers free scripts that Web site owners can
use to entice converts - the parody is serious business.

"We think there's a huge opportunity for anyone who's creative to make a
good case why people should switch to Firefox, and make money at the same
time," said Holmes Wilson.

"If we got a ton of traffic, we can make a dollar per person the same as
anyone else," he added. "But we really did it to showcase how anyone can
do this."

Holmes, and his partners - Nick Nassar, Tiffiniy Cheng, and Nicholas
Reville, all of Worcester, Mass. - are taking advantage of a new Google
affiliate program called Adsense Referrals. The new plan, which debuted to
virtually no fanfare Tuesday, pays Web site operators $1 for each user they
refer who downloads and runs a copy of Firefox.

"This is amazing, a bounty of $1 on the head of each IE user," said Holmes,
like his colleagues, a long-time Firefox user. "It's a story that could fly
under the radar. Google's literally setting the stage for a gold rush
around convincing people to switch from Microsoft."

While Holmes and the others have been fans of Firefox's community marketing
site, SpreadFirefox.com - "It really raised the bar for organizing people
online," said Holmes - Kill Bill's Browser and ExplorerDestroyer are their
first real efforts in Firefox proselytizing.

On ExplorerDestroyer.com, the four posted a letter explaining why they
created the site.




=~=~=~=


Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT