Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 11 Issue 18
Volume 11, Issue 18 Atari Online News, Etc. May 1, 2009
Published and Copyright (c) 1999 - 2008
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #1118 05/01/09
~ Cybercrime Self-Help! ~ People Are Talking! ~ Trick Flu Emails!
~ Cablevision Is Fastest ~ New Twitters: Bye Bye! ~ HP ProBook Laptop!
~ New Firefox Beta Out! ~ Window 7 Public Debut! ~ Opera Turns 15!
~ Win 7, October Launch! ~ Anyone Using Explorer? ~ Recession Games!
-* EU: Microsoft Seeks Hearing! *-
-* Internet Firms Near "Last Chance"! *-
-* U.S. Cyber Warfare Needs Oversight, Debate *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
Another long and tiring week; I must be getting old[er]!! However, the
weather has made it bearable, although I was really too tired to enjoy
it!
Even though I don't have the energy to do it, I'm going to make a few of
the comments I mentioned a couple of weeks ago. A promise is a promise!
In that issue, there was an article pertaining to how spam e-mail is doing
damage to the environment. No, of course not, directly. But the energy
used to send and read it via your computer generates carbon dioxide, which
is partially the cause of out problems. Well, I started to think about
that - for a couple of minutes anyway. Why stop at singling out spam?
How about other e-mail that one gets? You know the ones I mean. Those
messages from your friends with useless factoids. How about those
useless, yet well-meaning chain e-mails? You know the ones: here's a
little story that will cheer you up; send it to ten friends and you'll
have a better life, and such. Or how about the e-mails that have been
passed along to everyone every couple of years ago - send this letter to
all of your contacts and Microsoft will send you $25.00 for doing so!
How about the "you're un-American if you don't send this "Support the
troops" message to everyone you know!" How about all of the activity
generated by all of the porn sites that inundate the internet (speaking
of what I think is out there and not what I've [not] seen personally)?
The list can go on forever! Get rid of all that crap and we can save the
environment for another couple of generations!
The other thing that caused me to do a little thinking this week is the
recent outbreak of swine flu. Not, not the disease itself, but the
"other disease" that's been spawned. How anyone can use a potentially
deadly disease as the basis for spam or phishing schemes is beyond me.
Taking advantage of people's fears has to be one of the lowest forms of
cruel and deceitful behavior! Just one more event that led to
emotional terrorism.
I could go on, but it's getting late, and this issue has a deadline.
So, let's get on to the other news and comments for this week; and we'll
see what happens in the coming weeks!
Until next time...
=~=~=~=
PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org
Hidi ho friends and neighbors. Well, another week has come and gone, and
we've have some fairly interesting developments in the world of politics,
and you know me... I can't pass this stuff up. Add to that the fact that
there is an ongoing paucity of posts in the NewsGroups, and you KNOW that
I'm going to be talking about.
First of all, I want to share with you a couple of comments I got about
last week's column. First, someone emailed me to say that I was all wrong
about Senator Larry Craig, since he has said publicly many times that he
is not gay. Well, dear reader, that may be true. Senator Craig my NOT be
gay. Unfortunately, he was in an airport bathroom looking for some one who
IS.
The second comment was about my view of Minnesota's congresswoman, Michele
Bachmann. The only comment the respondent had was that her name was
spelled 'Michele' and not 'Michelle' as I had typed it. Ok. Mea cupla.
Now, THIS week, we have some really interesting stuff. U.S. Supreme Court
Justice David Souter announced that he's stepping down. I can remember
when the first President Bush nominated Souter. "Oh NO!" most liberals
cried, "He's FAR to conservative!"
Well, first of all. Something told me that he was more of a thinker than a
drum-beater. He's one of those old, New England types who's very quiet and
gives the impression (which may well be true in his case) of being very
prim and proper. He's always struck me as what a Supreme Court Justice
should be: A learned thinker who will speak his mind and take his stand
without needing a three-ring circus around him to do it.
I found it amusing that this guy had been nominated by George "Read My
Lips" Bush, and I still liked him. After I got over the initial shock of
that, I realized that he was going to be an interesting, if quiet,
Justice. A look at his record shows that I was right.
Let's move on to Pennsylvania Senator Arlen Specter. I'll tell you right
from the start that I've never been crazy about Senator Specter. I've got
enormous respect for him, but he's stood against some things that I've
thought were important, and for some things that I thought were the wrong
way to go. He's a savvy politician, and HAS put through some good and
worthwhile legislation, and he should be recognized and applauded for that.
The reason he's "jumped parties" is precisely because he knows that doing
his job has made it impossible to KEEP doing his job. He didn't jump
parties because he agrees with more of the Democratic Party's agenda than
the Republican Party's, he jumped because he stood no chance of remaining a
Senator if he didn't.
In one discussion I had, someone said, "But if he can't pass the primary,
he doesn't deserve to be a Senator".
That's 'kind of true', but the good Senator probably saw the way things
would play out... his own party machinery would be used against him, with
all its money and influence. They'd find some guy who they felt would be
easier to control and count on, shovel money into his campaign coffers,
and let Specter try to fight against it in the primary.
Now that he's "jumped ship", the Republicans can put up whoever they want,
and Specter will get the campaign funds and platform and airtime that he
needs and deserves. He knows he'll have to face an opponent sooner or
later, he just probably felt he deserved to have it happen on a level
playing field. Strange, huh?
For the Democrats who are thinking that this gets them closer to a
filibuster-proof congress, don't get your hopes up. Senator Specter has
proven time and time again that he's his own man, usually at the most
inconvenient time. That's okay. THAT I can respect. And anything that
keeps Senator Specter in the Senate IS a good thing. Whether I agree with
him or not, I think he's a good Senator. Now, if we can just get Senators
Collins and Snowe away from the dark side... [grin]
Okay, last topic for me for this week... North Carolina Congresswoman
Virginia Foxx.
This woman has caught my eye before. She's... not a pip.. a 'pip' is
someone who I find inept in an AMUSING way. She is not. She is inept in a
very basic and troubling, very hurtful way.
This past week, she stood on the House floor and, while sitting/standing
across from Matthew Shepherd's mother, said: "I also would like to point
out that there was a bill -- the hate crimes bill that's called the Matthew
Shepard bill is named after a very unfortunate incident that happened where
a young man was killed, but we know that that young man was killed in the
commitment of a robbery. It wasn't because he was gay....This -- the bill
was named for him, hate crimes bill was named for him, but it's really a
hoax that that continues to be used as an excuse for passing these bills."
Lady, you should be ashamed of yourself! Her 'excuse' was just as
pathetic. She said that she apologized IF some people found her 'mistake'
painful.
Painful or not Ginny, you owe Mrs. Shepherd an apology... and not just for
being the wrong about the reason her son died... they, beat him,
pistol-whipped him, violated him in the most terrible ways imaginable, tied
him to a friggin' fencepost and threw rocks at his head until he died...
and you owe not only his mother an apology, but you owe one to HIM. And
it's not a case of "IF" it hurt anyone, you owe an apology for being wrong
and using your 'power'... the voice of the United States government... to
make a comment as self-serving and as hateful as that. I would have thought
that if you were going to buck conventional wisdom, you'd at least read the
court transcripts or find some other way to be sure you knew what you were
talking about. Shouldn't you be apologizing for using the situation to make
your twisted and incredibly off-point statement in the first place? For
daring to use the death of a young man... who's mother was sitting right
the hell across from you, no less... as a talking point in your stupid
little agenda and getting it freakin' wrong anyway? You disgust me. Right
now I'd like to beat you WITH Michele Bachmann (Ha! Spelled it right this
time!)
Well, that's all for this week. Tune in again next week, same time, same
station, and be ready to listen to what they are saying when...
PEOPLE ARE TALKING
=~=~=~=
->In This Week's Gaming Section - `Fallujah' Game Gets Pulled!
""""""""""""""""""""""""""""" Focus of Games: Recession!
Atari Is Atari Again!
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
Company Pulls Plug on `Fallujah' Video Game
The publisher behind a video game based on one of the Iraq war's
fiercest battles has pulled the plug on the title, called "Six Days in
Fallujah."
A spokeswoman for Japanese game company Konami Digital Entertainment
Inc. confirmed that the company is no longer publishing the game, which
was set to go on sale next year.
The game sought to re-create the 2004 Fallujah battle from the
perspective of a U.S. Marine fighting against insurgents. It was
developed by Atomic Games with input from the Marines.
Konami had advertised "Six Days" as a shooting game "unlike any other,"
combining "authentic weaponry, missions and combat set against the
gripping story of the U.S. Marines on the ground." The game was
criticized by veterans groups and others who called it inappropriate.
Recession Is Latest Focus of Games for Change
With the recession impacting college students, MTV's college network
mtvU is turning to one medium it knows will get attention to help teach
students to cope with tough financial times - a video game.
mtvU has joined with the Peter G. Peterson Foundation's Indebted
Campaign to launch the online video game "Debt Ski," which was designed
by a university graduate and developed by Persuasive Games that
specializes in video games with an opinion.
In the game players guide a pig, Piggy Banks, on a jet ski through
various obstacles to maximize his savings, limit his debt and keep him
happy while buying food, housing and other items, with the aim of
teaching players how to identify and manage debt.
Banks has the choice to buy the latest electronics and clothing which
can make him happy - but plunge him into debt. Spending tsunamis, such
as unexpected medical bills or increases to the cost of living, can hit
him along the way.
When players lose, they get debt management information.
"Arguably, the economic crisis is one of the biggest challenges facing
this generation," said Ross Martin of MTV360.
"College students are dealing with a broad range of issues from rising
tuition to entering one of the most daunting job markets in recent
history. Students don't sit on the sidelines, they take action -- they
become the creative engine driving social change."
"Debt Ski" is the third in a line of games sponsored by mtvU that deal
with serious world issues, with previous games focused on Darfur
refugees - "Darfur is Dying" - and HIV positive patients - "Pos or Not?"
The Peter G. Peterson Foundation was founded last year by the chairman
emeritus of The Blackstone Group with a commitment of $1 billion to
increase public awareness and action on the nature and urgency of key
fiscal challenges threatening America.
Its Indebted Campaign seeks to educate students about their debts as
well as the growing federal debt.
The foundation's president and CEO Dave Walker said there was strong
appeal to using a video game as a messenger as college students spend a
major portion of their day in front of computer.
"Young people, who are arguably the most important audience to reach
these days when it comes to inspiring social change, are hard to reach
through traditional media," said Walker.
The game was designed by 26-year-old Lehigh University graduate Brian
Haveri who won a contest to come up with a video game to promote the
messages of the Indebted Campaign.
Haveri won $10,000 and students are being encouraged to play "Debt Ski"
with a prize of $250 a week on offer through June.
"Early data shows that there are high replay numbers, which means the
audience is spending time on the site and playing the game multiple
times - increasing the odds that the core messages are coming through
and have the potential to make an impact," said Martin.
Over the next few months, the Indebted Campaign is aiming to expand the
ways it puts out its message, such as exploring the iPhone as a new way
to reach gamers.
The Foundation has also partnered with New York-design school Parsons
The New School and the National Association of Public Administration to
create "Budgetball" that teaches students the trade-offs involved in
responsible budgeting.
"Learning about social challenges through games is a great way to help
you visualize the extent of the problem and the impact of possible
solutions," said Walker.
=~=~=~=
->A-ONE Gaming Online - Online Users Growl & Purr!
"""""""""""""""""""
Students Make Atari Games Look Like Atari Again
Ian Bogosts students re-create visual artifacts of old TV video games
for the flat-screen age.
In this sample from Yars' Revenge, the texture of the scanline/CRT grid
pattern is noticeable, whereas the LCD emulated version looks like flat
areas of color. Here you can also see the faint afterimage of the Yar as
it moves toward the Qotile shield.
One of the main themes of Racing the Beam is the strong affinity between
the Atari VCS and the CRT television. The system was designed around the
TV and it interfaces with that display in an unusual and specific way.
In today's world of huge, sharp LCD monitors, it's hard to remember what
a videogame image looked like on an ordinary television of the late
1970s. Emulators like Stella make it possible to play Atari games on
modern computers, serving the function of archival tool, development
platform, and player for these original games. But unfortunately, they
also give an inaccurate impression of what Atari games looked like on a
television.
An Atari game played on a television would exhibit a number of visual
characteristics that cannot be seen on an LCD display:
Texture - The display itself is not constructed out of pixels like a
monitor, but out of the phosphorescent glow of an electron beam as it
shines through a focusing grate. The result produces slightly separated
colored dots on the screen, which become less visible as the viewer
moves away from the set.
Afterimage - The phosphor glow padding a bit of time to "burn off" and
leaves more of an afterimage on the human retina compared to an LCD
display. As a result, images might linger after they had moved or
changed. Atari programmers took advantage of this feature to "flicker"
objects between frames.
Color Bleed - The edges of sprites and scanlines appear as sharp edges
in an emulator. But on a television, luminance from these areas would
bleed into neighboring sectors, both softening the hard edges of
pixel-objects and blending colors together.
Noise - A television transmission is sent via RF, so a natural amount of
noise is introduced into the image ... this is hard to see in a normal
TV broadcast, but the large, flat areas of color in a videogame will
exhibit slight vibration.
Many of today's players may only experience Atari games in emulation.
Indeed, many of my students may have little to no memory of CRT
televisions at all. Given such factors, it seems even more important to
improve the graphical accuracy of tools like Stella.
In Spring 2009, I tasked a Georgia Tech Computer Science capstone group
to modify Stella, adding settings to simulate the CRT behaviors
described above. The group consisted of five committed and talented CS
seniors: Edward Booth, Michael Cook, Justin Dobbs, Will Rowland, and
Prince Yang.
Despite being mighty impressive, the results in a live game are far more
remarkable. Edward and his colleagues have done a fantastic job.
They are currently working with the maintainer of the free, open-source
Stella emulator to patch their changes into the main build, where the
effects will be available as a configurable option. Expect to see it
there shortly, where hopefully it will benefit players, creators,
educators, and archivists alike. Given that we'll be placing the code
back into Stella's repository, I'm also hopeful that this software might
be extended for use in other emulators for computer systems that used
televisions as their primary output.
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
FTC Says Internet Firms Near "Last Chance"
Companies that track consumer behavior on the Web for targeted
advertising without proper consent are near their "last chance" to
self-regulate, the head of the U.S. Federal Trade Commission said on
Monday.
Privacy advocates say regulations on big phone and Internet companies,
such as AT&T Inc and Google Inc, are too lax, giving the firms excessive
control over consumers' personal information.
"From my perspective, the industry is pretty close to its last clear
chance to demonstrate" that it can police itself, FTC Chairman Jon
Leibowitz told the Reuters Global Financial Regulation Summit in
Washington.
Earlier this year, the FTC issued new guidance urging websites to tell
consumers that data is being collected during their searches and to
allow them to opt out.
If companies fail to do a better job of making their privacy policies
understandable to the average person, momentum will keep building for
greater regulation, Leibowitz said. "It's really up to industry."
EU Says Microsoft Seeks Hearing in Antitrust Case
Microsoft is seeking a hearing from EU antitrust regulators in its defence
against accusations of unfairly crushing rivals in the web browser market,
the European Commission said Wednesday.
The commission, Europe's top competition watchdog, opened a new front in
its epic antitrust battle with Microsoft in January, hitting the company
with fresh charges of unfairly squashing competition.
A commission spokesman said that Microsoft had formally responded to the
charges late Tuesday and had requested the hearing, which companies are
allowed to do as part of their defence under EU antitrust rules.
If Microsoft fails to beat back the charges, the commission could slap
the company with huge new fines and order it to change its ways.
The commission accuses Microsoft of crushing rivals by bundling its
Internet Explorer web browser into its ubiquitous Windows personal
computer operating system, giving the programme a huge advantage over
competitors' browsers.
The European Commission and Microsoft have long clashed over the US
company's practice of bundling other software such as media players into
Windows.
In September 2007, Microsoft lost an appeal before Europe's
second-highest court against a fine of nearly 500 million euros (661
million dollars) that EU regulators slapped on the company in 2004 for
abusing its dominant power, partly in the media players market.
In February 2008, the commission hit Microsoft with a further fine of
899 million euros for defying its 2004 ruling.
US Cyber Warfare Needs Oversight, Debate
Shrouded in secrecy, the U.S. government's policies on how and when to
wage cyber warfare are ill-formed, lack adequate oversight and require a
broad public debate, a new report by the National Research Council says.
The report warns that the "undeveloped and uncertain nature" of the
government's cyber warfare policies could lead to them being used
hastily and ill-advisedly during a crisis. That danger is compounded by
secrecy and lack of oversight, the report's authors cautioned on
Wednesday.
"Unsound policy formulated and implemented during crisis may prove
difficult to change or reverse when the crisis has passed," concludes
the report, the first to take a comprehensive look at American cyber war
capabilities. The research council is the working arm of the National
Academy of Sciences.
The U.S. government has spoken only broadly about cyber warfare in the
past, noting its value as a national security tool. Officials routinely
refuse to talk about computer attacks America has launched.
The 322-page report, prepared by an independent panel of academics and
cyber security experts, comes as the Obama administration is on the
verge of releasing its own review of the nation's cyber security.
That review, however, is expected to focus largely on defensive and
administrative measures, including who will lead the nation's cyber
effort, and how the government can better manage and use technology to
protect everything from the electrical grid to the stock market.
Officials have warned in recent months that the nation's computer and
internet networks are at risk and are repeatedly probed by foreign
governments, criminals or other groups.
U.S. offensive cyber war options could range from a more passive cyber
intrusion such as listening in on a foe's communications to an attack
that cripples an enemy's air defense systems to clear the way for a
bomber attack.
A key challenge, however, may be determining who the enemy is,
particularly if U.S. officials are considering a response to a cyber
attack or intrusion against America.
Conducted from hundreds or thousands of miles away, a cyber attack can
be over in a millisecond, with the press of a button. The perpetrator
can be a single hacker looking to do mischief, a terrorist seeking to
kill thousands, or a nation aiming to cripple the U.S. economy.
The council emphasized its call for greater public debate on the
government's plans for cyber warfare, which to date has been
clandestine. The council likened the need for further public airings to
the debates that accompanied the use and testing of nuclear weapons more
than 50 years ago.
"There needs to be a national debate, just as there was in the 1950s
about nuclear weapons," said Kenneth W. Dam, co-chairman of the
committee on offensive information warfare that put together the report.
"The problem is, there is no national decision-making apparatus."
Earlier this month, Air Force Gen. Kevin Chilton, who heads U.S.
Strategic Command, told reporters that the military has rules and
procedures for cyber warfare, just as it does for armed conflict. He
then declined to provide details, adding: "A good defense also depends
on a good offense."
The Research Council's report warned that such secrecy surrounding the
government's exploration of cyber warfare has "impeded widespread
understanding and debate about the nature and implications of U.S. cyber
attack."
It said that while the U.S. has highly developed and sophisticated
capabilities to launch a cyber attack, it is difficult to determine the
outcome of such a move compared to a traditional armed assault.
So far, said study director Herbert Lin, Americans have been focused
more on defensive digital maneuvers - building firewalls, using
anti-virus and other protective software and implementing safety
procedures, such as the Pentagon's recent ban on the use of external
computer flash drives.
Those efforts are important, he said. But he added that the U.S. cannot
just continue to build bigger walls, particularly as cyber attacks grow
and become increasingly easier to execute.
In its final recommendations, the report said the U.S. government must
develop a clear decision-making process for cyber actions, require
periodic accounting of cyber attacks at least in a classified form to
those charged with oversight, and work with other nations around the
world to establish a better legal and ethical framework for such
attacks.
Beware Swine Flu Spam
Swine flu spam is spreading like a virus of its own and recently turned
malicious.
Spam campaigns often start with harmless e-mail messages and slowly
build into more serious threats, according to Stephan Chenette, manager of
security research at Websense Inc.
"Spammers are generally very well connected with each other and see how
well it's working. It always goes through the test phase," he said.
They test campaigns with less threatening approaches, share feedback
between each other, figure out what works and what doesn't and then
launch increasingly harmful attacks, he explained. "
"By us seeing they've increased the number of e-mails that are going out
surrounding the swine flu, it indicates that so far it's been a very
successful campaign," he said.
Websense has been tracking this latest trend, which has grown in the
past week. The number of e-mail messages with subject lines related to
Swine Flu is in the tens of thousands, according to Chenette.
The trend started off with traditional medical spam - or medspam -
that didn't necessarily scam users, he said. "They were enticing the
users by scaring them, but there were no malicious attachments."
Then the spam evolved into money-making schemes, with spammers trying to
sell pharmaceuticals, medical devices and PDFs that contain generic
information on the swine flu for $20 to $30, he explained.
"Medspam has always been something that spammers have used for making
money and the fact that there's a flu-type symptom that allows them to
sell their story in a more convincing way has been good for spammers,"
he said. "
The first swine flu e-mail with a malicious attachment surfaced this
week. Symantec Security Response analyzed the file, which poses as a PDF
document of Swine Influenza FAQs.
"When users attempt to access the PDF file, malcode within the PDF
attempts to exploit an old Adobe vulnerability (BID 33751) in order to
drop malware on the local computer," said a Symantec report.
Symantec detects the malicious PDF as Bloodhound.Exploit.6 and the
dropped file contained in the PDF as InfoStealer, a trojan. Symantec
rates it a Level 1 threat - on the low end of the scale.
Users that follow typical best practices don't have much to worry about,
said Marc Fossi, manager of Symantec Security Response.
A patch from Adobe has been available for some time now, antivirus
software would detect the threat if it attempted installation and
anti-spam software might stop the e-mail in the first place, he explained.
"There's actually nothing overly unique about it. We've seen malicious
code using this sort of technique fairly commonly ... the social
engineering aspect is the real standout here," said Fossi.
Current events are great triggers for spam and phishing campaigns, said
James Quin, senior research analyst at Info-Tech Research Group Inc.
While the underlying malware in the Swine Flu FAQ e-mail is
inconsequential, the technique used to get the malware into end machines
is interesting, he said.
"What makes this one stand out is the same type of techniques that
phishers use are now being used for malware," said Quin.
But the malicious e-mail doesn't surprise Chenette. "There's going to be
more malicious attachments and exploits and various kinds of malicious
executables attached to these e-mails going out," he said.
A similar pattern occurred during the SARS outbreak in early 2000,
according to Chenette. SARS-related spam led to malicious executables
attached to the e-mails, so that's the direction Websense sees spammers
going with the Swine Flu, he said.
Attaching malware to spam isn't typical anymore, according to Chenxi
Wang, principal analyst in Security and Risk Management at Forrester
Research Inc.
"In the old days, when spam first came into existence, they carried
malicious attachments," she said. But as companies "became smarter" and
started disallowing e-mail attachments, spammers stopped adding
malicious attachments to their e-mails, she explained.
It's more common for spammers to put URLs in spam messages and entice
people to click on them, sending them to a Web site that may carry
malware or the Web site may link to another site that carries malware,
she said.
"I don't know how successful attaching malware straight in an e-mail
would be because unless the malware is very polymorphic ... it's pretty
easy to be detected by antivirus software," said Wang.
Wang also doesn't consider the malicious e-mail attachment a sign that
spammer techniques are changing. "You will still see spam with embedded
URLs versus those with malicious attachments," she said.
While it's hard to say whether spam related to the swine flu will
continue to grow, Fossi said it wouldn't surprise him. Symantec saw the
same pattern occur during the U.S. presidential election and last fall
with the economic crises.
Spammers often work with themes, which could include sporting events
like the Olympics, but themes that induce fear are often the most
successful, according to Chenette.
"Spammers are heavily making use of the theme around the swine flu
because there is a big scare. Whenever they are able to scare users, the
likelihood of it being successful greatly increases as opposed to
sporting events," he said.
But the amount of spam circulating around the swine flu isn't unusual
for a major event, according to Wang. "I think it's average in terms of
scale," she said.
"We've seen inauguration spam when Barack Obama took office and we saw
things like Twitter spam when Twitter became popular," she said
Cablevision Has Fastest Internet Speeds for Cable
Cablevision Systems Corp. on Tuesday unveiled the fastest Internet
speeds available from any cable or phone company.
Starting May 11, the Bethpage, N.Y.-based cable operator will offer
speeds of up to 101 megabits per second downstream throughout its
service area, and 15 megabits per second upstream.
That means a 4-gigabyte, high-definition movie can be downloaded in 5
1/2 minutes. It would take two minutes for a 1.6-gigabyte standard
definition movie.
Cablevision, which has 3 million subscribers in the New York metro area,
also plans to double the downstream speed of the Wi-Fi Internet service
it offers at "hot spots" in New York's Long Island, Connecticut and
Westchester County, and in parts of New Jersey.
Cablevision is in a race against Verizon Communications Inc., which is
rolling out its fiber-optic FiOS service in New York City.
At present, Verizon's top Internet speed is 50 megabits per second with
a starting cost of $140 a month plus a free wireless router. Cablevision
is offering its service at $99.95 a month.
The second-fastest Internet speed offered by a cable operator is up to
60 megabits from Charter Communications Inc., available only in the St.
Louis area. Charter, based in St. Louis, is in Chapter 11 bankruptcy
protection.
Philadelphia-based Comcast Corp. offers speeds of up to 50 megabits per
second.
HP Unveils ProBook Laptop Line
Hewlett-Packard Co, the world's top PC maker, is launching a new line of
inexpensive business laptops with fresh features targeting users at
small and medium-size companies.
The HP ProBook s-series, which starts shipping globally on Tuesday, is
the company's new mainstream business notebook, following the release of
its higher-end, lightweight EliteBook line last year.
The ProBook replaces the HP Compaq line, although the Compaq name will
continue to be used as a master brand name in other PCs.
The ProBook offers users a number of new features, including an optional
Linux-based operating system pre-installed - Novell Inc's SuSE Linux
Enterprise Desktop 11 - for those seeking an alternative to the
dominant Microsoft Corp Windows platform.
It is HP's first-ever Linux pre-install on a standard business laptop,
the company said. The PC maker does offer some netbooks with Linux.
"It's pretty much a natural evolution," said Carol Hess- Nickels, HP's
director of marketing for worldwide business notebooks.
"We want to provide a different option ... it's probably a little time
yet before we'll know exactly what the demand is, but we did think it
was something worth trying."
The ProBooks come with 14-inch, 15.6-inch and 17.3-inch screen sizes,
with prices starting at $529. In another first for an HP business
notebook, buyers will be able to add a color finish - "merlot" - if
they choose.
Some models will also feature Qualcomm Inc's Gobi technology, allowing
them to use a single module to access different mobile broadband network
technologies and mobile operators.
HP will also bring higher-end durability features, like its 3D
DriveGuard - which protects the hard drive if a laptop is dropped -
and a spill-resistant keyboard to the ProBook.
HP is the world's No. 1 PC vendor, with a first-quarter global market
share of more than 20 percent, according to research house IDC, well
ahead of second-place Dell Inc. HP also took over the top spot in the
U.S. market from Dell in the first quarter.
Mozilla Releases Firefox 3.5 Beta 4
Mozilla on Tuesday released Firefox 3.5 beta 4, a release that promises
improvements to performance, web compatibility, and speed.
It is now available for Windows, Mac OS X, and Linux via an online
download.
Beta 4 is based on the Gecko 1.9.1 Web-page layout rendering engine.
Improvements to Gecko include speculative parsing for faster content
rendering, Mozilla said.
The release also adds six additional languages, bringing the total to 70.
Mozilla championed the inclusion of the browser's Private Browsing Mode
and TraceMonkey JavaScript engine, though both features were available in
beta 3.
Mozilla released Firefox 3.5 beta 3 in early March, changing the official
title from Firefox 3.1 to Firefox 3.5.
Beta 4 also includes location-based browsing using geolocation, support
for native JSON and web worker threads, and support for new web
technologies such as: HTML5 and elements, downloadable fonts and other
new CSS properties, JavaScript query selectors, HTML5 offline data
storage for applications, and SVG transforms.
Mozilla warned that the release is still for testing purposes.
"Firefox 3.5 Beta 4 is a public preview release intended for developer
testing and community feedback," the company wrote in a blog post.
"We recommend that you read the release notes and known issues before
installing this beta."
Windows 7 To Make Public Debut May 5
Microsoft said Thursday that a nearly-final version of its
next-generation Windows 7 operating system will be publicly released on
May 5.
The release will be available at microsoft.com/downloads in a move intended
to signal that the software giant is putting finishing touches on an
operating system that it hopes will escape criticism heaped on its
predecessor Vista.
"Listening to our partners and customers has been fundamental to the
development of Windows 7," said Bill Veghte, senior vice president for
the Windows business at Microsoft.
"We heard them and worked hard to deliver the highest quality release
candidate in the history of Windows."
The Windows 7 release candidate (RC) was made available to developers on
Thursday.
The release indicates that little is likely to be changed in the final
version of Windows 7 and that companies can begin tailoring software or
hardware to the operating system, according to Microsoft.
Touted features include compatibility with touch-screen computer
controls and with software designed to work with earlier-generation
Windows XP operating system.
Critics lambasted Vista for being too complex and not being compatible
with older software programs.
Windows XP holdouts are being told they will have to upgrade to Vista to
make a transition to Windows 7.
"Windows 7 shows significant promise," Forrester Research analyst Ben
Gray wrote in an independent report on the operating system. "Start
preparing for it now, and the best way to prepare for Windows 7 is by
deploying Windows Vista."
Windows 7 To Launch on October 23
A report by Pocket-Lint.com quotes an Acer executive as saying that
Windows 7 will launch on Oct. 23.
Acer America representatives could not be reached for comment by press
time. A Microsoft spokesman said that the company has not changed its
public plan of record, as far as the launch timing of Windows 7 is
concerned.
"23rd October is the date the Windows 7 will be available. There is a 30
day upgrade time so that customers don't wait to buy a new computer, so
if you buy during that 30 day period, you'll get a free upgrade to
Windows 7", Bobby Watkins, Acer's UK managing director told Pocket-lint.
A Microsoft spokesman did not confirm or deny Pocket-lint.com's report.
"On 30 April we made the Release Candidate (RC) of Windows 7 available
for download to MSDN and TechNet subscribers," a spokesman said in an
email. "Windows 7 Release Candidate is a major business and engineering
milestone, and indicates that the operating system is entering the final
phases of development. Windows 7 RC is the result of feedback from
millions of customers and partners around the world, and is ready for
partners to develop and test applications, device drivers and services.
As we have said for some time, we are committed to making Windows 7
available within three years of the General Availability of Windows
Vista."
Windows Vista for businesses launched on Nov. 30, 2006, while
Microsoft's consumer version launched in January of 2007.
Opera Browser Turns 15
It's hard to believe, but Norwegian browser Opera is celebrating its
15th birthday today.
Jon von Tetzchner, Opera's current CEO, and Geir Ivarsøy first developed
the browser back in late April 1994.
"Geir and I knew the Web would forever change how people live, work and
play - the Web browser would be the tool to enable that transformation,"
von Tetzchner said in a statement. "Today, I am humbled by what our
company, together with the worldwide community of Opera users, has
achieved. In the next 15 years, billions of people will join the Web. I
am confident we will give them even more reasons to choose Opera.
Everyone deserves a good browser, regardless of how or where they
connect to the Web."
According to the company, some 40 million people across the world use
the browser on their PCs. The company is celebrating the birthday on its
site with the "top 15 reasons to use Opera."
Is Anyone Using Internet Explorer?
GigaOM reports that a new survey of the most used applications on
Windows puts Firefox at the top, followed by Google's Chrome browser.
Internet Explorer trailed at #3. And among the youngest users, IE did
even worse.
The survey, by Wakoopa, includes the most used applications on Windows,
Mac and the Web. It is based on the activity of 75,000 participating
users.
Firefox also came out on top among Mac users. On the Web, Facebook was
#1, but Google took four of the top 10 slots. Gmail was #2. The survey
also shows that younger users prefer Firefox over IE by a larger margin.
For more details, check out the Top Ranking Applications chart at GigaOM.
New Twitter Users Say Tweet-Tweet, Goodbye
Oprah Winfrey may have marked a tipping point boosting Twitter. But new
research from Nielsen shows that although new tweeters are signing up in
droves and driving triple-digit monthly membership gains, fewer are
continuing to tweet.
David Martin, vice president of primary research for Nielsen Online,
noted some of the high-profile media attention Twitter has received
recently: Oprah embarrassed herself on Twitter with a stuck caps-lock
key. An actor competed with a major news network to see who could gain
one million followers first. And TV-show host Jon Stewart shook an angry
fist at Twitter.
Indeed, the media hype surrounding Twitter continues as more celebrities
sign on, more news outlets sign up, and more everyday Joes get on the
tweeting bandwagon to follow their favorite stars and shows. But despite
the hockey-stick growth chart, Martin said Twitter faces an uphill
battle in making sure these flocks of new users return to the nest.
According to Nielsen Online, more than 60 percent of Twitter users fail
to return the following month. Put a another way, Twitter's audience
retention rate - the percentage of a given month's users who come back
the following month - is about 40 percent. For most of the past 12
months, pre-Oprah, Twitter has languished below 30 percent retention.
"By plotting the minimum retention rates for different Internet audience
sizes, it is clear that a retention rate of 40 percent will limit a
site's growth to about a 10 percent figure," Martin said. "To be clear,
a high retention rate doesn't guarantee a massive audience, but it is a
prerequisite. There simply aren't enough new users to make up for
defecting ones after a certain point."
Some might think Martin jumped the gun with his analysis. After all,
Twitter is still an upstart and other sites that lived up to
Twitter-like hype suffered from poor retention in the early days, didn't
they? To answer that question and put things into perspective, Martin
compared the Twitter phenomenon to two other social-networking darlings,
MySpace and Facebook, when they were gaining momentum.
Martin's conclusion: Even when Facebook and MySpace were emerging
networks like Twitter is now, their retention rates were twice as high.
When they went through their explosive growth phases, retention went up,
and both sit at nearly 70 percent today.
"Twitter has enjoyed a nice ride over the last few months, but it will
not be able to sustain its meteoric rise without establishing a higher
level of user loyalty," Martin said. "Frankly, if Oprah can't accomplish
that, I'm not sure who can."
Greg Sterling, principal analyst at Sterling Market Intelligence, agreed
that the 40 percent retention rate is a troubling statistic for Twitter.
The retention rate, he suggested, may suggest that lots of people are
hearing about Twitter and test-driving the micro-blogging site but not
finding real value there.
"As Twitter usage continues to grow, I would expect that people will
start to see more value - as an information resource and communication
tool - and retention will improve," Sterling said. "But if this
'quitter' trend persists over the next 12 months, it will require
Twitter to address the issue."
McAfee Launches Cybercrime Self-help Site
Antivirus software maker McAfee today launched a new Web site intended
to provide advice and services to those who suspect they may be victims
of cybercrime.
The Cybercrime Response Unit site starts out with a risk assessment
questionnaire, with questions such as ""There are unexplained charges or
suspicious activity on one or more of my financial accounts," "I opened an
attachment to an email and am now concerned that it might have been
malicious," and "I am worried that my child or I have encountered an
Internet predator."
Ticking checkboxes next to various questions will take you to pages that
provide advice and links for dealing with ID Theft, which includes fraud
reporting phone numbers for major banks. The help page for malware
infections includes a link to a free "Cybercrime scanner" that will scan
your PC for malware, unauthorized network connections and other risks
(using Internet Explorer), and there's also a short page on dealing with
cyber-bullies or online predators.
You'll find the expected occasional plug for a McAfee service or
software, along with pages of decent, basic advice such as "Do not open
messages or click on links from unknown users in your instant messaging
program." There are a good number links to external sites and services,
particularly for dealing with ID theft, but some surprising lacks. I
didn't see any links to annualcreditreport.com under recommendations to
check your credit reports regularly, for instance.
Speaking of plugs, if you're interested in some tips on free security
tools and services, here's my own list of best practices for protecting
yourself against online threats.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.