Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 07 Issue 31
Volume 7, Issue 31 Atari Online News, Etc. July 29, 2005
Published and Copyright (c) 1999 - 2005
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
http://www.icwhen.com/aone/
http://a1mag.atari.org
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #0731 07/29/05
~ Use E-mail, You're Old ~ People Are Talking! ~ Password Protection
~ 90% of Teens Use Web! ~ GTA Outlawed In Oz! ~ Taxing Internet Porn
~ Grandma Sues Over Sex! ~ 'What the Hack' Conf! ~ Data Security Bill!
-* Apple Upgrades Mini, iBook! *-
-* Book Relives Commodore & Atari War! *-
-* Hackers Find New Ways To Infect End Users! *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
The week started off with a few really hot and humid days - the worst this
summer, but by the end of the week, it's been terrific weather. I can't
believe that we're already at the end of July. Where did this year go?
Every year just seems to fly by more rapidly than the last. If there were
only a way to slow time down a little bit.
During the past couple of weeks, I've received a few e-mails regarding an
article that appeared in the past two issues of A-ONE. Don't get scared,
these were not negative articles or comments. Essentially, the letters were
feedback about the articles. The articles pertained to the recent flap over
the hidden sexual content - allegedly hacked - within a video game, the
latest edition of Grand Theft Auto. My personal feeling is: What is all of
the fuss about? Okay, so there's some gratuitous sex in the game. Like
this is the only game out there with sexual innuendo? Have people seen
what's in other games, such as the Tomb Raider or, my favorites, Leisure
Suit Larry? Do these same people watch television? Soap operas, "reality"
shows, and many other genres? These are games. Like you don't know what
you are getting when you buy such titles. GTA already has a reputation as
having too much gratuitous violence. So people are surprised when they find
sexual content? And if it was hacked into the game, you're going to blame
the publisher? There are more important things out there to be concerned
about rather than blaming society's ills because of video games. I could go
on, but this is a subject that I've talked about in the past. I just had
to mention it again after seeing all of the attention that the subject has
been getting again this past month. I'll get off of my soapbox now.
Until next time...
=~=~=~=
New Book About the Battle Between Commodore and Atari
Find out more about the battle between Atari and Commodore in a new
book, "The Spectacular Rise and Fall of Commodore". Learn how former
Atari 2600/Atari 800 engineer Jay Miner developed the Amiga computer,
and how Atari almost purchased Amiga. Find out how the Atari ST was
partially designed by Commodore engineers while they were still at
Commodore. Atari founder Nolan Bushnell even joined with Commodore to
launch the Commodore CDTV, a precursor to the modern DVD player.
The Spectacular Rise and Fall of Commodore is a detailed history of
the company behind the best selling computer system of all time, the
Commodore 64. This book was almost two years in the making, using over
44 hours of interviews with Commodore engineers and managers.
Title: The Spectacular Rise and Fall of Commodore: The Inside Story
Pages: 624
Size: 6 x 9 inches
ISBN 0-9738649-0-7
August 2005
To read more about The Spectacular Rise and Fall of Commodore, please
visit:
www.commodorebook.com
=~=~=~=
PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org
Hidi ho friends and neighbors. I'll tell you right off that there really
isn't a lot of info on the UseNet this week, but we're gonna give it a
whirl.
Summer has finally slapped us around here in the northeast... not as bad
as some places out west, but enough to let us know that we are still
insignificant beings who, if we are indeed changing the climate, are
only hurting ourselves despite all the power that we think we have.
Personally, I believe that we've made major modifications to the global
climate during the past century or so, but even if I (and the majority
of climatologists and environmental scientists) am wrong and the
climate changes we see (or think we see) are a product of a cycle or
naturally occurring variation, I think it'd be smarter to intervene on
the side of keeping things as close to what they are now, as opposed to
letting Mother Nature turn the "breadbasket" of the country into a
desert and have to get our summer vegetables from Saskatoon
Saskatchewan!... But that's just me. <grin>
But never let it be said that I take sides! I've always had a problem
with those "tree huggers" too. Them with their bumper stickers that
said, "Save the Planet". That's just the height of arrogance. As a
matter of fact, it's even worse than denying that we're affecting the
climate in the first place. No matter what we do, no matter how much of
any of the greenhouse gasses we pump into the air, old Mother Earth
isn't going anywhere. She will continue and thrive. She'll wait and
bide her time... she has plenty of it... and when we short-sighted,
short-lived beings have disappeared, she'll begin the whole process
again. She's got plenty of time to get it right.
Well, I truly have no idea why these thoughts came out tonight. They
just came out of nowhere. I can tell you one thing though: I had fun
playing around with Google's Map utility (http://maps.google.com). I
just clicked on one of the center provinces in Canada and enlarged the
map until I could see the name of a city or town. That's how I came up
with Saskatoon, in case you were wondering.
Well, let's get on with the news, hints, tips and info available from
the UseNet.
From the comp.sys.atari.st NewsGroup
====================================
Greg Goodwin asks about SCSI and the CT60:
"If you are the owner of a CT60, would you kindly post about any SCSI
based issues you are having? I'm having a devil of a time with my CDR,
and I'm attempting to decide if I should keep spending my evenings
trying to figure it out, or just buy an IDE CDRW and the appropriate
adapter."
Mark Duckworth tells Greg:
"With CT60 and 25MHz bus, the scsi gets errors for me on writes. So I
only read from scsi devices."
Kiselo Zelje adds:
"I have 7 scsi devices connected to it and working flawlessly...slow,
though... 1.5 to 2 meg throughput... should do for 4x cd r."
Greg tells Kiselo:
"7 SCSI?!? You are a high priest of SCSI voodoo! (I thought I was
impressive for 5 on my stock Falcon!)
Seriously, what I've been running into is the following:
Given HD 8.13 and the following chain: CT60ed Falcon -- 340MB Lacie HD
-- Panasonic CDR -- external terminator, I had no problem with the SCSI
bus under the stock motherboard (no solders). After the board came
back from Rodolphe with solders (and now 25MHz), the HD appears to work
correctly, but the CDR has the following odd behavior:
1) refuses to read a CD that it read perfectly two minutes earlier
"Drive P: is not responding..."
2) pretends to burn a CD (CDISO gives no errors and reports a
ready-to-use CD), but the result has directory errors (that is, the CD
is the correct number of bytes, but folders and files are missing from
the directory).
3) adds bursts of static while playing CDs on Aniplayer
I spent much of yesterday copying 8MB ZIP files from place to place
attempting to find a pattern and ... had no errors whatsoever?!? The
only thing I can think of that is different is that I rarely have the
external HD turned on. On my stock Falcon I've long had the habit of
just turning on the device I intended to use, but perhaps the CT60
Falcon is more sensitive?
I'll find out over the next few days if my CT60 Falcon has suddenly
become more cooperative."
Rodolphe Czuba tells Greg:
"I think the CD driver you use is the problem ...it runs too fast with
an 060 !!
Did you try to remove the FAST RAM flag to allow it to load into ST-RAM
instead od SDRAM ?? It will slow it..and maybe software timings will
come back to good values...
What is the CD driver you use ???
If it is the extendos, you should report to the author !! He is a CT60
developer... !"
Jean-Marc Maucotel asks about burning CDs on his Falcon:
"What kind of software can i use for burning CDs with a Yamaha CDRW?
French or english would be great."
Ronald Hall tells Jean-Marc:
"A good place to start is here:
http://www.anodynesoftware.com/
ExtenDos Gold and CD Writer Suite.
I use the writer software with my Mega ST and a CDRW.
I've not had a chance to test it on my CT60 equipped Falcon yet, but it
works stock there just fine as well."
Well folks, that's it for this week. See? I told you it was going to be
a short one. Be ready next week for more STuff and, until then, keep
your ears open so you'll hear what they are saying when...
PEOPLE ARE TALKING
=~=~=~=
->In This Week's Gaming Section - EA Gets 'Lord of the Rings'!
""""""""""""""""""""""""""""" Grandmother To Sue GTA Sex!
Sims In Nudity Flap!
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
Electronic Arts To Make 'Rings' Games From Book
Video game publisher Electronic Arts Inc. on Monday said it has acquired
the rights to develop games based on the "Lord of the Rings" book series,
in addition to rights it holds for titles derived from the recent hit
movies.
Financial details of the agreement were not disclosed.
EA, the world's largest publisher of interactive video games, said it is
already working on two new games in the series.
EA won the rights to base games on the books by J.R.R. Tolkien from Tolkien
Enterprises after Vivendi Universal - which released its last game based on
the series in 2003 - did not aggressively use its license. Sales of the
Vivendi Universal games were lackluster.
Gamemaker Sued Over Hidden Sex in GTA
A woman upset that she bought the video game "Grand Theft Auto: San
Andreas" for her 14-year-old grandson without knowing it contained hidden,
sexually explicit scenes sued the manufacturer Wednesday on behalf of
consumers nationwide.
Florence Cohen, 85, of New York, said in the lawsuit filed in U.S. District
Court in Manhattan that the game's manufacturer, Rockstar Games, and its
parent company, New York-based Take Two Interactive Software Inc., engaged
in false, misleading and deceptive practices.
She sought unspecified damages on behalf of herself and all consumers
nationwide, saying the company should give up its profits from the game for
what amounted to false advertising, consumer deception and unfair business
practices.
Cohen said in the suit that she bought the game in late 2004 for her
grandson when it was rated "M" for mature, for players 17 and older.
According to the suit, she directed that it be taken away from her
grandson, which was done.
The game was released in October with an "M" rating. After a storm of
negative publicity about the hidden scenes, the Entertainment Software
Ratings Board, an industry group responsible for rating games, changed the
rating to "AO" for adults only.
Laurence D. Paskowitz, the lawyer who filed the lawsuit on behalf of Cohen,
said no parent would knowingly buy an adult-only video game for their
children.
"They should really make sure this doesn't happen again," he said. "The
least this company can do is offer refunds."
Hidden areas in video games that can be unlocked with special codes or
modifications are not uncommon.
Take Two Interactive initially said the scenes were not part of the retail
version of the game but later admitted they were.
A message left for a company spokesman was not immediately returned. On
Tuesday, Take-Two announced that it had been notified by the Federal Trade
Commission's Division of Advertising Practices that it was conducting an
inquiry into the game's advertising claims.
The company said it planned to cooperate fully with the probe.
"Rockstar Games and Take Two Interactive regret that consumers may have
been exposed to content that was not intended to be accessible in the
playable version of 'Grand Theft Auto: San Andreas'," it said in a
statement.
The company said it had halted production of the game in the controversial
form and was working on a version of the game without the hidden sexual
content.
"Going forward, the company will refine the process by which it edits games
and will enhance the protection of its game code to prevent such future
modifications," it said.
Earlier this week, the House voted 355-21 for a resolution asking the FTC
to investigate the company. Last week, Sen. Hillary Rodham Clinton, D-N.Y.,
asked the FTC to investigate Rockstar, saying the company had "gamed the
ratings system" by concealing sex scenes in the game that can be unlocked
by computer programs available on the Internet.
Wal-Mart Stores Inc., Target Corp., Best Buy Co. and Circuit City Stores
Inc. have pulled the game - last year's top-seller among console games -
from their shelves following the rating change.
Australia Outlaws 'Grand Theft Auto'
Australian officials effectively banned the computer game "Grand Theft
Auto: San Andreas" and ordered it removed from stores Friday because it
contains hidden sex scenes that can be viewed with a special Internet
download.
The Office of Film and Literature Classification said in a statement it had
outlawed sales of the game by stripping it of its official classification
after learning of the explicit content.
"Revocation of a classification means the computer game cannot be legally
sold, hired, advertised or exhibited in Australia from the date the
decision is made," the statement said.
"Businesses that sell or hire computer games should remove existing stocks
of this game from their shelves immediately," said Des Clark, director of
the government-funded classification board.
The game involves a main character seeking bloody vengeance on gang-filled
streets, firing automatic weapons and picking up women along the way.
After downloading and installing a modification to the game - one of many
"mods" available on Web sites maintained by video game enthusiasts - a new
world opens up in which the girlfriends appear nude and engage in explicit
sex acts, according to the modification's author.
The classification board in October 2004 gave the game a MA15+ rating,
meaning it could be sold only to people aged over age 15, and warned that
it contained "medium level animated violence, medium level coarse
language."
On Friday, Clark advised parents to be on the alert for their children
accessing the explicit scenes.
"Parents are strongly advised to exercise caution in allowing children
continued access to the game," he said - particularly if they have access
to the Internet modification.
'Sims' In Nudity Flap
Fresh from the fallout over some sex scenes hidden in a violent video game,
an anti-game crusader is pressuring Electronic Arts to take action against
those who modify another game, "The Sims 2," so that it can display naked
characters.
Last week, a culture war erupted over "Grand Theft Auto: San Andreas," a
violent game that hackers modified to play graphic sexual scenes. The game
industry's ratings board, the Entertainment Software Ratings Board,
canceled the "mature" 17-and-up rating on the game and restricted it to
"adults only."
The game publisher, Take-Two Interactive Software in New York, is under
investigation by the Federal Trade Commission over the incident. The
company had said the sex scenes were hidden on its disks, but hackers found
them and exposed the scenes by creating programs, or "mods," that could
display the scenes. In making its ruling, the game-rating board suggested
that publishers should take action against third-party modders who alter
game content.
On the heels of that ruling, Jack Thompson, a Florida attorney who has
tangled often with the makers of video games, has written a letter to EA
and a number of politicians alleging that teen-rated "The Sims 2" game
should be the next on the list to be re-rated as an "adults only" game.
That's because the game can be "modded" to show naked characters. Normally,
the game blurs, or pixelates, the images of characters when they change
their clothes, take showers or go to the bathroom in the simulation of
ordinary life.
"This is nonsense," said Jeff Brown, spokesman for EA. "Reasonable people
understand there is nothing improper in the game."
He added, "Reasonable people recognize what mods are. A consumer who
chooses to use a mod does so without any kind of agreement with the
company. There is no nudity. There is nothing improper or vulgar in 'The
Sims 2.' "
Thompson alleges that the mod for making the characters fully naked is
available for downloading over the Internet and that EA is doing nothing to
curtail the availability of the mod.
"EA makes it easy, through mods, to add the body parts," he said. "And EA
is not taking action against people for messing with its software. They
need to get their game back."
Brown said that EA normally encourages fans to create their own mods to
make the games more fun. He says the blurring of the game characters is a
"comedic device" and that the unmodified animations of the game characters
themselves are not anatomically correct and that they resemble store
mannequins in that respect.
"Reasonable people understand the San Jose Mercury News is not responsible
for vulgar things that people doodle into the margins of the paper," Brown
said.
In a conference call with analysts Tuesday, EA CEO Larry Probst said the
game-ratings system is working fine despite the recent brouhaha.
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
Bill Would Tax Internet Pornography
A Democratic lawmaker is planning to propose a new 25 percent federal tax
on Internet pornography and new requirements for adult Web sites to help
prevent children from looking at them.
The bill, expected to be introduced next week by Sen. Blanche Lincoln,
D-Ark., would impose the excise tax on transactions with for-profit adult
Web sites, which typically sell monthly subscriptions to Internet users to
look at pornographic photographs or videos.
Money collected from the tax would be used for law enforcement and for
protecting children from Internet-related crimes.
Lincoln's spokesman, Drew Goesl, declined Friday to discuss the provisions.
"We prefer to wait until the bill is introduced to discuss it," Goesl said.
A draft of the legislation circulated this week among pornography and
free-speech groups. Companion legislation was also expected to be
introduced in the House.
Called the Internet Safety and Child Protection Act of 2005, the bill also
proposes new rules for Web sites to verify they do business only with
adults. It would compel sites to use specialized software to verify a
customer's age, subject to enforcement by the Federal Trade Commission.
An FTC spokeswoman said the commission was not aware of the proposed bills.
Apple Upgrades Mini, iBook
Apple Computer has rolled out upgrades to its popular notebook computer
line, the iBook, and its compact desktop machine, the Mini.
The iBook now sports more memory and an Airport card as part of the
baseline configuration. The Mini now ships with additional memory as well,
and a new midrange model comes with the Airport wireless card and Bluetooth
capabilities as standard features.
The changes bring the two products more in line with competitors in the PC
world, said Yankee Group's Nitin Gupta. "This is a natural progression," he
said. "There is nothing out of line with the rest of the industry here."
In fact, consumers now expect their notebook computers - of any stripe - to
ship with wireless networking cards as part of the baseline price, said
Gupta. "It would be hard to find a laptop computer, especially in that
price range, without wireless capabilities," he said.
All iBooks now have Airport Extreme cards that operate using the 802.11g
Wi-Fi standard. The entire product line now also has Bluetooth 2.0
capabilities built in. Prices for iBook models start at US$999. The model
with a faster G4 processor chip and a 14-inch screen costs $1,299.
The upgrade to 512 MB of operating memory has become industry standard on
both laptop and desktop computers, said Gupta. Many of the Mac models
already shipped with that amount of memory, but the company's low-end
computers did not. Now, all iBooks ship with 512 MB of RAM, as do all
Minis.
Apple has expanded the Mini line to include a midrange version that ships
with Wi-Fi and Bluetooth capabilities at $599. A high-end model includes a
SuperDrive for burning CDs and DVDs. That model costs $699. The Mini line
- which requires separate purchase of a monitor and keyboard - starts at
under $500.
Hackers Skip Windows to Embed New Infections
The online security climate continues to deteriorate, as computer hackers
are targeting an increasing number of popular programs such as the iTunes
music service and software that makes backup copies of data, according to
an Internet safety study released yesterday.
Flaws in software that can be exploited by hackers are on the rise, said
the report by the SANS Institute of Bethesda, a cyber-security research and
education center.
The report, issued quarterly, is unwelcome news for consumers and
businesses hoping for relief as software makers such as Microsoft Corp.
work to improve the security of the operating systems that power individual
machines and computer networks.
Hackers now often bypass operating systems, staying one step ahead in the
ongoing cat-and-mouse warfare between those trying to protect computer
systems and those trying to infiltrate or damage them.
For example, worms, viruses and spyware can now infect machines when users
simply visit certain Web sites, rather than requiring victims to click on
a malicious e-mail or file. Individual songs delivered via trusted programs
such as the RealNetworks media player or iTunes can be vehicles for
malicious code that can cripple machines or open them up to remote control
by hackers.
Once able to penetrate a machine, hackers can steal personal data or use it
as a "zombie" to launch attacks on other machines.
Even programs designed in part as a safer alternative to Microsoft, such as
the increasingly popular Web browser Firefox, are being hacked, the report
said.
"The rate of growth of vulnerabilities is actually increasing... and that's
enabling more identity theft," said Alan Paller, director of research at
SANS.
Overall, SANS reported 422 new flaws discovered in the second quarter of
this year, a 10.8 percent increase over the first quarter and a nearly 20
percent rise from the second quarter of last year.
Vendors of the software have issued "patches," or fixes, for all of the
flaws, but they often are not installed rapidly enough by businesses and
consumers, the report said.
Of particular worry to the researchers are weaknesses in software for
backing up data, an essential for most businesses and many consumers. The
study reported flaws in software made by Computer Associates International
Inc. and Symantec Corp., which together account for about 30 percent of the
market.
The primary vehicle for attack remains Microsoft's Internet Explorer Web
browser, the study said.
Amy Roberts, head of product management in Microsoft's security division,
said the company continues to work to stay ahead of the hackers.
She said a more secure version of Internet Explorer will be part of
Microsoft's new operating system, Windows Vista, that is scheduled to be
released for testing next month.
Geeks Meet at 'What the Hack' Conference
There are hundreds of tents on the hot and soggy campground, but this isn't
your ordinary summertime outing, considering that it includes workshops
with such titles as "Politics of Psychedelic Research" or "Fun and Mayhem
with RFID."
This is the three-day "What The Hack" convention, a self-styled
computer-security conference dealing such issues as digital passports,
biometrics and cryptography.
Borrowing heavily from Woodstock and the more professionalized Def Con
conference that begins Friday in Las Vegas, the event held every four years
in the Netherlands draws an international array of experts and geeks. About
3,000 gathered Thursday for the opening.
Unlike better-known and better-funded industry meetings, "What the Hack"
had to fight for its right to exist. The mayor of the southern Dutch town
of Boxtel, who oversees the village of Liempde where the convention is
held, initially tried to stop the event from pitching its hundreds of tents
outside his town - a reluctance stemming from the lingering public image of
hackers as asocial, anarchistic and vaguely menacing.
The mayor withdrew his objections after meetings with organizers.
Some of the scheduled lectures and workshops might reinforce the
convention's shady reputation, such as the talk about mayhem with RFID,
which stands for radio frequency identification tags.
But other seminars appeared wholesome enough, such as the workshop on how
to make homes more energy efficient or how activists can lobby governments
more effectively.
Even the local police officers assigned to monitor "What the Hack" are
being included in the event. Officers are holding daily workshops to
educate the public about how they go about securing events like these. Such
cooperation with authorities would have raised eyebrows in previous years.
Befitting the age of terrorism, the conference is taking up such security
issues as biometrics and new passport technology.
But in line with its anarchic reputation, organizers have made a parody of
their own security arrangements, asking attendees to screen their own
belongings at an unmanned baggage scanner. Rubber gloves for a
"do-it-yourself body cavity search" are provided free of charge.
Overall, the atmosphere resembles that of a music festival, with orderly
people waiting in line to buy Jolt colas and vegetarian meals. Children and
hammocks are as prevalent as ponytails and laptops, and a curiously popular
hangout is the Slacker Salon, a computer-free zone where frenetic Web
surfing is taboo.
The relaxed setting is a conscious choice, according to Internet
entrepreneur Rop Gonggrijp, who in 1989 helped organize the seminal
Galactic Hacker Party, an open-air convention that formed the template for
What The Hack.
"The idea was to break the stereotype" of hackers as sun-averse malcontents
bent on vandalism, he said. "They've never been part of this community. And
now there's fortunately space in the media for more than one kind of
hacker."
Rutgers University anthropologist Biella Coleman said events like these
serve a critical function for the many communities of people who are
acquainted online, but rarely get the chance to meet in the real world.
"Virtuality needs sociality," she said.
Klaartje Bruyn, for example, is a sign-maker by day, but came to What the
Hack for social, rather than professional reasons. Electronically arranging
meetings with friends both real and virtual from the comfort of her
hammock, she lauded how the festival could bring together so many far-flung
yet like-minded people.
"It's like a blind date with 3,000 people," she said.
Professors Make Password Protection Product
The increase in identity theft has prompted two Stanford University
professors to develop software that protects computer passwords from
Internet thieves.
John Mitchell and Dan Boneh will unveil Pwdhash, software that scrambles
passwords typed into Web sites, then creates a unique sign-on for each site
visited, at the Usenix Security Symposium in Baltimore next week.
It's the latest attempt to thwart attempts by cyber-criminals who steal
passwords by creating phony online banking or e-commerce sites. Cyber
criminals dupe victims into believing the site is legitimate and lure them
into typing their passwords. The crooks then use the password to loot the
victim's bank account. For e-commerce shoppers, many of whom have stored
credit card information at their favorite online stores, the thieves may
use their information to go on a shopping spree.
Last year, Mitchell and Boneh developed SpoofGuard, which inspects Web
sites users visit and hunts for clues the site may be bogus. The technology
pores over URLs, graphics, and links. When there's something wrong, the
software notifies the user.
All the security tools are free browser plug-ins available at Stanford's
Web site.
Data-Security Bill Advances in U.S. Senate
Businesses would have to protect credit-card accounts and other sensitive
consumer information and notify them when they have been exposed to
identity theft, under a bill approved on Thursday by a Senate committee.
The lucrative trade in consumers' Social Security numbers would also be
curtailed under a bill approved unanimously by the Senate Commerce
Committee.
The vote marks the first time Congress has taken steps to improve data
security following a string of breaches that have exposed some 50 million
consumers to possible identity theft.
"It's important we get this moved because none of us are going to have any
privacy left if we don't," said Florida Democratic Sen. Bill Nelson.
Dozens of retailers, universities, banks, data brokers and other
institutions have disclosed breaches this year, ranging from attacks by
malicious hackers to losses of backup tapes during transit to storage
facilities.
The announcements were prompted by a California state law that requires
institutions to make such data breaches public. Seventeen states have
since passed similar laws, prompting banks and other businesses to ask
Congress to set a single national standard.
Under the Commerce Committee's bill, businesses and other institutions
would have to notify consumers within 45 days if they are exposed to
identity theft from any security breach. They would also have to notify the
Federal Trade Commission, and the FTC would publicize those that affect
more than 1,000 consumers.
Consumers could also prevent credit bureaus from giving out their credit
reports to deter identity thieves from getting more information.
Businesses and other institutions would not be allowed to sell consumers'
Social Security numbers without permission. They also would not be allowed
to collect Social Security numbers from consumers, or display them
publicly.
Social Security numbers, used to track government retirement benefits, are
now commonly used as a numerical identifier on everything from bank
accounts to drivers' licenses, a practice that experts say makes identity
theft easier.
Other committees are considering data-security bills as well.
In the Senate, leaders of the Judiciary Committee have a bill that would
establish jail time for business leaders who don't tell consumers when they
may be at risk of identity theft. The committee likely won't act on that
bill until after the month-long break that begins on Friday.
Committee Chairman Ted Stevens, an Alaska Republican, said the committee
would also have to harmonize its bill with one being developed by the
Senate Banking Committee.
In the House of Representatives, the Financial Services Committee and the
Energy and Commerce Committee are developing data-security bills.
Teens Using Internet in Record Numbers
A new survey says that the Internet has all but saturated the youth market.
The report compiled for the Pew Internet & American Life Project found that
nearly nine out of 10 young people, ages 12 through 17, have online access
- up from about three-quarters of young people in 2000.
By comparison, about 66 percent of American adults now use the Internet.
David Pulliam, a 17-year-old high school senior from Indianapolis, is a
typical example of a wired teen.
He first got access to the Internet when he was 13, as did most of those
who were surveyed. He has a blog and loves to use instant messaging to stay
in touch with friends he's met at camps and sporting events. He also gets
his news online, as do about three-quarters of teen Internet users who were
surveyed. That's an increase of about 38 percent, compared with 2000
results.
"It's hard to imagine my life without it," Pulliam says of the Net. "In
some ways, life would become a little easier because it would slow down.
But it would become a lot more boring and hard because you would always be
waiting for letters and responses."
At the same time, he says he and his friends also have honed their Internet
use - seeing it more as a tool for communication or research than "a
novelty."
Amanda Lenhart, a Pew researcher, says that rings true with the findings
of the survey. "Teens are very selective - they're smart about their
technology use," she says. "They use it for the kinds of things they need
to do."
As one teen in a focus group told her: "If you're asking for your parents
to extend your curfew, you don't send an e-mail."
The survey, completed in late 2004, included responses from 1,100 young
people who were contacted randomly by phone. It has a margin of error of
four percentage points. Its findings included the following:
Of those surveyed, 87 percent said they use the Internet. About half of the
young people who have online access say they go on the Internet every day,
up from 42 percent in 2000.
Three-quarters of wired teens use instant message, compared with 42 percent
of online adults who do so. Teens most often reserve IMing for friends and
e-mail for adults, including parents and teachers.
About half of families with teens who have an Internet connection have
speedier broadband access, while the other half still use phone lines to
connect.
Nearly a third of teens who use IM have used it to send a music or video
file.
While 45 percent of those surveyed have cell phones, those phones aren't
necessarily the preferred mode of communication. Given a choice, about half
of online teens still use land lines to call friends, while about a quarter
prefer IMing and 12 percent say they'd rather call a friend on a cell
phone.
Older teen girls who were surveyed, ages 15 to 17, are among the most
intense users of the Internet and cell phones, including text messaging.
"It debunks the myth of the tech-savvy boy," Lenhart says. As young people
get Internet access at younger ages, that trend may only continue.
Back in Indianapolis, for instance, Pulliam's 13-year-old sister, Anna,
says she first set up an e-mail account at age 8 - and started using it
regularly at age 10. She's been IMing since she was 11 - and already has a
blog. She also uploads photos from her digital camera to a Web site to
share with friends.
She does not have a cell phone yet - though she notes that many people her
age do.
That leads technology trackers to predict that text messaging, done by
about a third of those surveyed who have cell phones, will grow in
popularity.
"The more other kids are doing it, the more kids want to do it," says
Susannah Stern, an assistant professor of communications studies at the
University of San Diego.
Still, as wired as many young people are, she says the fact that about 3
million of them remain without Internet access is cause for concern. Many
of them are low-income and a disproportionate number are black, the survey
found.
"When so many teenagers have such access, the few that don't are at a
significant disadvantage," Stern says.
Daniel Bassill, who heads an organization that helps build the computer
skills of low-income youth in Chicago, says it's an even greater challenge
to find people to teach teens how to use the Internet.
"Even the kids that have access don't necessarily have people mentoring
them to use the information to their greatest advantage," says Bassill,
president of Cabrini Connections and the Tutor/Mentor Connection.
E-mail Is For Older People, Teens Say In Survey
E-mail is for grown-ups and U.S. teenagers now prefer instant messaging to
communicate with each other online, according to a survey released on
Wednesday.
Internet users from 12 to 17 years old say e-mail is best for talking to
parents or institutions, but they are more likely to fire up IM when
talking with each other, the nonprofit Pew Internet and American Life
Project found.
E-mail is still used by 90 percent of online teens. But the survey found
greater enthusiasm for instant messaging.
Three-quarters of teen Internet users use instant messaging, compared with
42 percent of adults, Pew said. Nearly half of teens said they exchanged
IMs daily, and some said they spent more than two hours each day using
instant-messenger programs.
Half or nearly half of the 1,100 teenagers surveyed said they used IM to
send Web links or photos to each other, while nearly one-third said they
had sent music or video clips over IM. Adults were much less likely to do
any of those things, the survey found.
Nearly nine out of 10 teenagers say they use the Internet, up from 74
percent in 2000. Those are who still not online are likely to be so poor
that they have limited access to technology, the survey found, and are
disproportionately black.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.