Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 12 Issue 31
Volume 12, Issue 31 Atari Online News, Etc. July 30, 2010
Published and Copyright (c) 1999 - 2010
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
Fred Horvat
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #1231 07/30/10
~ From Rivals to Allies! ~ People Are Talking! ~ U.S. Flank Is Exposed!
~ Cyber Mastermind Caught ~ Ask.com Seeks Humans! ~ Black Hat and Defcon!
~ Facebook Online Safety ~ $150 Android Tablet! ~ Rumored BlackPad Due?
~ Microsoft Tablet Coming ~ Amiga: 25 Years Later! ~ The "Magic Trackpad"!
-* Facebook Data Torrent Debacle *-
-* FBI Access Raises Many Privacy Fears *-
-* Internet Is Upgraded To Foil Cyber Crooks! *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
Joe and I have been "involved" in some capacity with the Atari community
for over 20 years. I'd say that we've both been involved in a variety of
different aspects of "all things Atari". One of the things that both Joe
and I feel very strongly about in all of those activities - and probably
the most profound aspects of our Atari-related activities - are the people
that we've met along the way, whether in person or via some online
experience. We've made a lot of friends (and a few "enemies") over the
years. And over those same years, we've lost a few.
One of those long-time friends is Terry "Teebird" Bird, from Iowa. It is
with great sadness that we're reporting that Teebird lost his wife, Marlene,
after a long illness. Marlene and Terry were married for 50 years. Marlene
passed away in her sleep a couple of weeks ago. All of us here at A-ONE
want to send Terry and his family our most sincerest condolences.
I can't remember when we first met Teebird, but I'm pretty sure that we all
"met" on the Delphi online service many years ago, back when it was among
the three text-based online services. Terry was a frequent user in the
Atari Advantage forum, and I recall being in many chat room chats with Terry
in attendance. Who can remember any of the numerous things that were
discussed in those days?! But, I do remember that the "discussions" were
always fun, even if of "serious" Atari-related topics of the day. And I can
remember that Terry was a supporter of what Joe and I used to write about
when we were both writing for STReport, so many (it seems) years ago. He
didn't always agree with what was written, but fully understood what we were
trying to say. I'm sure that Marlene yelled at him him quite a bit for
being online for long periods of time, and often, like so many of our
wives (or girlfriends at the time) were doing! For putting up with his
online activity (and our enjoyment), we're very grateful to Marlene!
Teebird, our thoughts and prayers are with you!
From the Ames Tribune (Iowa), we're including Marlene's obituary:
Marlene Ann Bird
Marlene Ann Bird, 72, of Ames, passed away peacefully in her sleep at home
Saturday, July 17, 2010, following a long illness. No formal service is
planned at this time.
Marlene Bird was born Oct. 30, 1937, in Dows, to William Jay Jr. and Arlene
Ashmore. Her family moved to Story City and then to Ames, where she lived
with her mother and maternal grandparents, Adolph and Emelia Iverson, as
her father passed away in California in 1949. She married Terry Bird
March 9, 1960, at First United Methodist in Ames.
She enjoyed spending time with her granddaughters. She loved attending
concerts and was addicted to chocolate.
She is survived by her husband, Terry "Teebird" Bird, of Ames; two
daughters, Michelle (Scott Schoba) Sime, of Ames, and Traci (James) Brooks,
of Nevada; two granddaughters, Alex Sime and Elizabeth Brooks; mother,
Arlene M. Ashmore, of Ames; and two aunts, Viola Bergeson, of Ames, and
Ilene Wilhelm, of Lathrop, Calif.
She was preceded in death by her father and both maternal grandparents.
Memorial contributions may be directed to the Susan B. Komen fund or the
Bliss Cancer Center.
Condolences may be sent online to www.stevensmemorialchapel.com.
Stevens Memorial Chapel is assisting the family.
Until next time...
=~=~=~=
Amiga: 25 Years Later
Black-tie, celebrity-studded gala at the Vivian Beaumont Theater in New
York's Lincoln Center. It debuted to rave reviews and great expectations -
heck, InfoWorld said it might be the "third milestone" in personal computing
after the Apple II and the IBM PC.
The computer was Commodore's Amiga. In an era in which the most common
form of microcomputer was an IBM PC-compatible system with a text-only
display and a tinny internal speaker, the Amiga had dazzling color
graphics and stereo sound. Its Intuition user interface looked like the
Mac, but offered an advanced feature known as "multitasking." The machine
was a stunner, especially given that it came from a company previously
known for rinkydink home computers such as the VIC-20 and Commodore 64.
Over the next nine years, Commodore sold millions of Amigas. People who
liked the system really liked it, and its graphical chops were so potent
that it was the first PC widely used by TV broadcasters and movie studios.
None of which was enough to keep Commodore from declaring bankruptcy and
ceasing operations in 1994.
The Amiga was one of the greatest computers ever made - and for my money,
it was the greatest cult computer, period (Macintosh users would come to
be accused of cultlike tendencies, but when the Mac arrived eighteen months
before the Amiga, its whole marketing message was that other computers were
cultish - its TV commercials carried the slogan "The computer for the rest
of us" and showed IBM PC owners as zombie slaves.)
Amiga users were indomitable. They were outraged that obviously-inferior
IBM PC clones dominated the market. They rejoiced when the computer hit
major sales milestones. They petitioned major software companies to support
the machine, and wrote angry letters to computer magazines that failed to
give it its due. And they kept on using their Amigas for years after
Commodore went kaput: The market for Amiga-specific magazines lasted into
this century.
Other platforms and tech products would inspire similarly fanatical
followings - most notably OS/2 and Linux, both of which developed
Amigaesque reputations for technical superiority. But Amiga nuts of the
1980s and early 1990s - like, um, me - remain the ultimate fanboys, even
though it hadn't yet occurred to anyone to hurl that word at computer
users.
When the Amiga was born, consumers and businesses were still figuring out
what computers were and why anybody would want one. But you didn't have to
spend much time in the presence of an Amiga to get why it was cool - all
you had to do was see and hear what it could do. I bought mine after
walking by a computer retailer and spying an Amiga in the window, where it
was displaying a full-motion video clip. And to this day, the system is
synonymous with the "Boing" demo that its creators used to show off its
capabilities even before it went on the market:
If you weren't using computers in the 1980s, trust me: that bouncing ball
was spectacular enough to sell Amigas by itself.
Even before it hit the market, the Amiga had an uncommonly checkered
history. It began as the project of an independent startup called Amiga
Corporation. (It was otherwise best known for the Joyboard, a game
controller you stood on.) Amiga cofounder Jay Miner was the man behind the
potent graphics capabilities of Atari's 800 and 400 models; Atari advanced
the fledgling Amiga company money in return for rights to the chips it was
developing.
There's probably some alternate universe in which Amiga ended up being an
Atari product. But in September 1984, it was Commodore that acquired Amiga
Corporation and the computer it was developing (which was code-named
"Lorraine") for an estimated $30 million. Atari CEO and Commodore founder
Jack Tramiel - who had acquired Atari from Warner Communications after
Commodore had fired in January of 1984 - sued. He also introduced the
computer his company had been developing, the Atari ST, a low-rent Amiga
rival that was known in the industry as the "Jackintosh."
Commodore was a famously parsimonious outfit, but it splurged on the
Amiga's introduction. The highlight of that Lincoln Center product launch
was a demo in which pop art legend Andy Warhol used an Amiga to "paint"
Blondie's Debbie Harry. The exercise didn't prove much of anything other
than that Warhol was able to use the paint program's fill command, but it
was heady stuff:
The company also ponied up for TV commercials that looked like outtakes
from 2001: A Space Odyssey.
From the start, Commodore struggled mightily to position the Amiga in a
way that made sense in the 1980s computer market. An Amiga A1000 with
256KB of RAM and one floppy disk went for $1295. Even after you added
$500 for a color monitor, it offered vastly better bang for the buck
than a $2795 black-and-white Macintosh. But as home computers go, the
Amiga was pricey. The Atari 520ST, which started shipping a couple of
weeks before the Amiga was announced, packed double the RAM and cost
$999 - /with/ a color display.
So even though Amiga Corp.'s original idea had been to build the ultimate
home computer, Commodore spun the Amiga as a business machine, and talked
up an option that let the system run IBM PC compatible software. It turned
out to be a tough sell, especially few major business applications were
available and most of the major computer retail chains refused to sell it.
(The machine ended up being sold mostly by mom-and-pop stores such as The
Memory Location, where I bought my Amiga in 1987.)
Why wouldn't big computer retailers carry an impressive computer like
the Amiga? Commodore itself was part of the problem. It was famous for
selling undistinguished home computers at bargain-basement prices at
stores such as Toys "R" Us. The very idea of it launching a computer as
slick and powerful as the Amiga was jarring - it was as if Yugo had
bought out DeLorean. And without Jack Tramiel, Commodore lacked the
ambition, heart, guerrilla tactics, and raw nervous energy that had made
the Commodore 64 the best-selling computer of its time.
In July of 1985, computer magazines had talked about the Amiga
overtaking the Mac; within a few months, they were questioning whether
Commodore had a future. Like Mac owners of the mid-1990s, Amiga users had
to deal with constant predictions of the imminent demise of their platform.
Except in the case of Commodore, the naysayers turned out to be right.
Benj Edwards' Amiga teardown at PCWorld is a great guided tour of the
system's innards, which, like the original Mac, featured the signatures of
the design team engraved on the inside of the case.)
Even the Amiga's defects were part of its lore. The multitasking operating
system lacked memory protection, so errant apps could crash the whole
machine in the spectacular meltdown known as a Guru Meditation - one of
the greatest error messages of all time.
Thinking back, I'm struck by the excellence and innovation shown by
third-party Amiga products. Electronic Arts shipped a powerful image
editor called Deluxe Paint that would make my short list of the greatest
applications of all time. NewTek's TV-studio-in-a-box, the Video Toaster,
was a famous piece of vaporware for years, but when it finally arrived
it changed the way television was produced. Using an app like Sculpt 3D,
you could do raytraced 3D animation on the Amiga - as long as you didn't
mind waiting a few hours for each fame to render. And Games, such as the
multimedia epics from a company called Cinemaware, were often eye-popping.
Basically, the companies that built Amiga apps and add-ons seemed to
understand the machine's potential far better than Commodore's executives
ever did.
So did Amiga users, although they tended to be longer on missionary zeal
than social graces. When computer magazines gave the computer short
shrift, they'd receive angry missives from Amigoids that left editors
wanting to avoid saying anything that might attract the attention of the
Amiga community, period. (I still remember an editor I once worked for
receiving a piece of hate mail from an OS/2 user, shaking his head, and
saying "At least they're not as bad as the Amiga people.")
Amiga owners tended to form a complex attitude towards the machine, its
place in the computer world, and what their ownership of an Amiga said
about them. It was one part superiority complex (owning an Amiga showed
you were a person of discerning taste!) and one part inferiority complex
(being a Commodore customer was enough to leave anyone feeling a little
bedraggled).
In the end, their deep faith in the Amiga was both touching and
profoundly unrealistic. Even in the early 1990s, Amiga magazines -
there were a gazillion of them, and I read them all - were full of
letters from people who thought the system might be on the cusp of
explosive popularity. I also belonged to two Amiga user groups, and have
vivid memories of attending one meeting that was largely focused on the
urgency of convincing Lotus to release an Amiga edition of 1-2-3. Once
that happened, wouldn't businesses everywhere jump on the bandwagon?
Like I said, complex.
Amiga 500 (which was much cheaper) and Amiga 2000. They were eventually
succeeded by models such as the 3000, 4000, and 600; Commodore also
introduced the CD32, a CD-ROM-equipped game console based on Amiga
technology.
Except for the specialized market of video professionals, the company
pretty much gave up on the notion that the Amiga was a business machine -
here's a later TV commercial that sort of positions the 500 as a
super-powerful Commodore 64:
It really wasn't until the mid-1990s that Windows PCs and Macs began to
catch up with the multimedia panache that the Amiga had displayed back in
the Reagan administration. And by then, Commodore was terminally ill. In
May of 1994, it went bankrupt and stopped making Amigas.
Which didn't mark the end of the Amiga: Its assets were bought by a
German company called Escom, which hatched grandiose plans for the
platform. It failed to realize them, and went bankrupt in 1996.
In 1997, direct-market PC giant Gateway acquired Amiga, hatched a different
set of grandiose plans, failed to realize them, and gave up on its
acquisition in 1999.
That was eleven years ago, and the Amiga still isn't dead. But if you can
parse its recent history, you're paying better attention than I have. All
I know is that it involves multiple companies promising Amiga hardware and
software that never amounts to anything - and that a company called A-Eon
intends to release a new Amiga called the AmigaOne later this year.
Bottom line: The Amiga's quarter-century of existence includes nine bumpy
years under Commodore ownership, and sixteen years of limbo under too many
owners to count. The fact that people continue to think of it as a
platform with a future is amazing. But I wouldn't wish its post-Commodore
history on the junkiest computer in the world, let alone one that was once
so full of potential. (And some of its classic games may be coming to the
iPhone.)
My take: Maybe it's okay that the platform's period of viability was
relatively short, and that it never became a blockbuster. I must confess
that I gave up on my Amiga in 1991 and replaced it with a mundane PC
clone. But we Amiga owners had a good time while it lasted - and the
memories make me smile even now.
=~=~=~=
PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org
Hidi ho, friends and neighbors. Well, another week has come and gone. It's
been HOT here. I'm not talking about Death Valley hot, no, that's not what
we get here in the northeast. But it's been hotter than usual even for
late July. The one thing we have here that they don't in Death Valley is
humidity. It's been very humid, muggy, whatever you want to call it.
For quite a while (a couple of weeks), it was quite hot (90's) and we got
no precipitation at all. Now, since we pay for the water we use, I haven't
been watering the lawn. It's been hot enough that the ground dried out and
the grass all turned brown and died away. Then Mother Nature did her thing
and let it rain. Some of the grass came back quickly, but there are still
big brown patches everywhere. If they were more symmetrical, I'd tell
people that they were crop circles. [grin]
The upshot is that, while some of lawn is thick and green and overgrown,
some of it is still just brown and sickly looking. We'll see if I continue
to play the fiscally responsible one and not water the lawn. I don't know.
I've never been one to want to put a lot of work into the lawn (ask
Dana)... it's just grass, after all, but I must admit that there's
something about a well-kept, green, thick lawn that looks nice. Know what
I mean?
Well, things that grow are Dana's area. He genuinely enjoys that stuff. I
usually do it because it has to be done and leave it at that. So I'll
leave it at that and talk about something else.
A couple of something else's, actually.
First of all, I've got some very sad news. Some of you probably remember
Terry Bird from chatrooms years ago. He was one of my favorite people to
chat with because he's intelligent, witty and an all-around good guy. He's
retired now, but he was a police captain in Iowa. Well, he sent me an
email last week that broke my heart.
Marlene, his wife of 50 years, passed away after a long illness. My heart
goes out to Terry and his daughters, and it's times like this that I wish
all good friends could be closer physically. In this case, so that I could
take my grieving buddy a pizza from one of the best pizza places on the
planet. No, a pizza will not salve an aching soul, but the camaraderie can
help, at least a little.
There simply are no words at a time like this to express something so
painful, but I hope that we all stop for just a moment and say a quick
prayer (if you're so inclined) or even just think good warm thoughts for a
moment for our friend and an upstanding member of the Atari community.
I also want to mention a couple of "Power Without the Price" computers.
There is, of course, The One Laptop Per Child XO computer. It's brightly
colored, feature-packed and fairly sturdy (despite some issues with
keyboard failures), and I'll have a review of it in a couple of weeks right
here in A-ONE.
The XO (or OLPC, as it's commonly known), is designed for younger kids, as
a low-cost way to introduce them to computing. The idea is that
governments will purchase these machines and distribute them to kids in
schools so that they can learn the principles of computing and
collaboration. The 'target price' for these machines is $100 US. They
missed the mark, and if I remember correctly, they're currently selling
them for $175. There's at least one other machine on the OLPC drawing
board, and the idea is catching on. I'm of two minds about the use of
government funds for computers for school kids, but I look at it as an
experiment. I mean, with the worldwide problems of war and famine and the
lack of clean water to drink, should governments really be spending money
on computers for school kids who might not have enough to eat or drink or
have to worry about malaria or any number of curable diseases?
On the other hand, might not the discipline of structured thinking and
familiarity with technology help to "raise" them to a higher, more
efficient, more "marketable" position?
And that's not even considering the usefulness of the computers
themselves. The XO comes with built-in WiFi and a rather interesting
networking philosophy that aids in collaboration. I'll cover all of that
as best I can in the review. But back to the 'usefulness'. Since its WiFi
enabled, all that's required is a 'hotspot' and someone with an XO can
surf the net to get news, weather, hell, even Tweet and blog. The problem,
of course, will be finding a hotspot in the Kalahari.
More on the OLPC XO-1 in a couple of weeks.
There's other news on the "Power Without the Price" front too. Last week
it was announced that India (the Indian Institute of Technology and the
Indian Institute of Science) have a design on the drawing board for a
touch tablet aimed at students for the unbelievable price of $35! Imagine
that! A touch tablet for 35 bucks! While that's still a large sum of money
for many Indians, it's about one percent of what I paid for my first
laptop! Now THAT is power without the price! Even if it's under-powered by
today's standards, it'll beat the wee wee out of products like Amazon's
Kindle and other 'e-readers' out there for reading electronic books, if
nothing else.
No one has released details about the specifications of the thing yet, but
rumors are that it'll have two gigabytes of RAM, a webcam and will run
Linux as its operating system.
This tablet will be aimed at students also, but more likely high school
and college students. Running Linux instead of something like a Microsoft
operating system cuts the cost way down. Imagine a $35 tablet computer
decked out with ANY version of Windows let alone Win7. Even buying a copy
on eBay would probably put you over the cost of the PC itself!
It remains to be seen if this machine will actually debut, and if it'll
reach its target price, but regardless, it shows that there are always
alternatives, and always options.
Well, that's it for this time around. Tune in again next week, same time,
same station, and be ready to listen to what they are saying when...
PEOPLE ARE TALKING
=~=~=~=
->In This Week's Gaming Section - Rebooted Starcraft Aims To Draw New Gamers!
"""""""""""""""""""""""""""""
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
Rebooted Starcraft Aims To Draw New Gamers
Twelve years after Starcraft, one of the highest grossing videogames in
history, its makers released a sequel Tuesday in hopes of drawing new fans
to its intergalactic adventure.
Much-awaited "Starcaft II: Wings of Liberty" picks up where the 1998 game
ended, set in the 26th century in a distant part of the Milky Way, where
the Terrans, human exiles from Earth, are at war with the Zerg and the
Protoss.
Developed by US studio Blizzard, makers of the world's most popular online
videogame "World of Warcraft", the new chapter in the adventures of Terran
rebel leader Jim Raynor is to be followed by two extensions.
Players are given 30-odd missions in the game, positioning units to
overcome enemy armies through troop transport, construction and
engineering or armoured attack.
"By keeping the three races from the first Starcraft we enable players
to find their bearings and continue the adventure where they left off,"
lead designer Dustin Browder told AFP.
"But we have added new units to force them to think up new tactics."
And to draw in new players, Blizzard has adopted a system allowing fans
to progress stage by stage.
"They can play alone on the main campaign then take on challenges before
going on to play against other gamers on the Internet," Browder said.
"We have set up a mechanism allowing players of similar level to play
against each other online so the game never loses interest."
The first episode was a standard bearer for electronic games,
particularly in South Korea where championships are held. Half of the
first episode's 10 million sales were in South Korea.
Analyst Mike Hiuckey of Janco Partners expects seven million copies of
Starcraft II to be sold by the end of the year.
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
Software Rivals Turning to Allies To Battle Cyber Crime
As a major computer security conference kicked off here Wednesday, Microsoft
announced that teamwork between technology rivals is paying off in the
perpetual arms race with hackers.
"As we look at the industry, we see this continued need for shared
responsibility," said Microsoft Trustworthy Computing Group director
Dave Forstrom. "We must work together."
Microsoft chose a Black Hat computer security conference in Las Vegas as
the stage to unveil findings that initiatives it launched here two years
earlier were getting software makers, users and defenders to become allies.
As of June, there were 65 companies worldwide taking part in the
Microsoft Active Protections Program (MAPP) for early access to the
technology giant's security updates.
"MAPP shifted the competitive advantage from attackers to defenders,"
Forstrom said.
"Before MAPP, we released vulnerability patches on Tuesday and immediately
there was a race with the hackers trying to reverse-engineer and attack,
and IT guys working to put in patches."
Releasing software fixes to everyone at the same time gave hackers an
"attack window" that remained open until computer users applied upgrades
or patches.
The MAPP program let "good guys" got a head start building or installing
patches or fixes before cyber criminals could craft attacks targeting
the vulnerabilities.
Microsoft's other initiatives involved indexing how dangerous bugs are
so businesses can prioritize responses and checking for vulnerabilities
in third-party software that runs on the technology titan's platforms.
Adobe recently signed on to the Microsoft initiatives and is using the
network as a conduit for details about updates or patches for its suite
of software that includes Flash and Reader.
"Vendors had to wait for the day we published an update, then begin a
foot race with bad guys who try to leverage attacks," said Brad Arkin,
senior director for product security and privacy at Adobe.
"It is all about narrowing the window of vulnerability. The success of
the MAPP program has demonstrated to us it is worth it."
He added that since opening up to "partners on the front line" the time
it takes his team at Adobe to learn about new software attacks has
plummeted from weeks to seconds.
"Customers aren't concerned about competitive differences," Forstrom
said. "They want to know how software vendors out there are working
together and have their backs."
Forstrom equated collaborative efforts of computer software and security
rivals to US "Neighborhood Watch" programs in which neighbors form
tightly knit groups united against crime in their communities.
"Cops were not able to keep up with crime so they involved citizens with
law enforcement," Forstrom said. "We see the same thing in the online
landscape. These criminals are invading our homes, our businesses and
our privacy."
Last week, Microsoft proposed a standard that would call on those who
discover software bugs to give program creators chances to fix the flaws
before telling the rest of the world.
Responsibly sharing details about software weaknesses is bound to be a
hot topic here this week as Black Hat segues into a notorious DefCon
gathering of hackers whose status comes from exposing ways past computer
defenses.
"Some of these debates may never be resolved," Forstrom said. "There
should be a refocusing on the fact that criminals really are at the
heart of this and are the one common enemy we share."
Software wizards in DefCon contend they routinely take their discoveries
to companies involved.
US Flank Exposed on Cyber War Front
Former US spy master and retired general Michael Hayden warned on Thursday
that the country's "cyber flank" was exposed and it was losing clout to
influence rules of war on the Internet.
"Our flank is totally exposed," Hayden said at the "Black Hat" computer
security gathering in Las Vegas, comparing the nation's tactical
position on the Internet to a battle of land troops.
"If tomorrow they show up on that flank they are going to roll down."
Black Hat founder Jeff Moss equated the situation to the nuclear faceoff
between superpowers during the Cold War years of his childhood.
"You could wake up any day and get nuked, but you got up every day and
went on with your life anyway," Moss said.
Hayden dodged giving his assessment of the threat level on the Internet,
saying people were abusing the term "cyber war" by applying it to
anything unpleasant that happens on the Internet.
The former head of both the CIA and the top secret National Security
Agency dismissed the idea of labeling online espionage as acts of war
since it is standard practice between nations.
"If you understand the meaning of war to include intelligence gathering,
sure there is cyber war," Hayden said. "We don't call sucking out
information an attack. That's exploitation. States do that all the time."
The retired general said he was in "absolute awe and wonderment" at the
Chinese cyber espionage campaign but that they were certainly not the
only nation doing it and the United States is "actually very good at
this."
There isn't a country on the planet that has promised to refrain from
cyber spying, according to Hayden.
"Quit whining, act like a man and defend yourself," he concluded,
quoting advice his father gave him when he was a boy.
He faulted an Internet built on the premise of quickly and freely
sharing information for creating an open landscape that gives attackers
an edge over defenders.
"You guys make the cyber world look like the north German plain and then
you bitch and moan because you get invaded," he told a Black Hat
audience. "We all get treated like Poland on the Web."
Hayden called for the creation of Internet versions of rivers,
mountains, and other geographic features that soldiers use for defensive
positions in real world battles.
"Cyber is a domain like land, sea, air, and space," Hayden said. "The
difference is that God made four and you made the last one. God did a
better job."
He welcomed recent signs that US officials are open to establishing
international rules of engagement on the Internet, saying the move is
far overdue.
"We'd better move fast; our voice in this is weaker as time goes by,"
Hayden said.
The United States should have taken the lead in setting cyber codes of
conduct a decade or more ago, when it was king of much of the technology
involved and countries weren't walling off territories on the Web, he
added.
"Now that you see this gradual balkanization, the US influence weakens,"
Hayden said.
Sensitive targets such as power grids and financial systems, while
legitimate targets in times of war, could be deemed off-limits to
routine espionage to avoid unintended catastrophe.
Countries could be made accountable for any cyber attacks from within
their borders and aid could be given to nations that genuinely want to
curb online espionage but lack resources.
He contended that state-sponsored spying causes so much "turbulence" on
the Internet that calming the behavior with international rules of
behavior would make it easier to spot "truly malevolent terrorist"
attacks.
Internet Warriors Hone Skills at Black Hat - DefCon
Internet warriors are gathering this week to explore chinks in the armors
of computers, bank teller machines, mobile phones, power grids, and other
"smart" devices intrinsic to modern life.
Black Hat USA kicks off in Las Vegas on Wednesday with briefings at
which security professionals from technology firms including Microsoft
and Cisco will dissect ways to safeguard or foil computers.
Black Hat segues on Friday into DefCon, an infamous annual assembly of
hackers that pride themselves on finding ways around computer defenses.
Attendance at the events overlaps, with security professionals and
software rogues sharing insights in an irreverent setting that has
become a recruiting ground for US law enforcement agencies.
"Black Hat is a place where security researchers go to show off their
work and get peer feedback," said Jeff Moss, who founded and runs both
gatherings.
"DefCon is the fun stuff they don't have time to do in their day jobs."
The packed roster of topics at Black Hat will include hacks that make
automated teller machines spew cash and the vulnerability of nuclear
power plants, chemical factories and other online systems.
Hot trends are expected to include vulnerabilities of smartphones along
with how hackers, and the crime fighters trying to catch them, are
adapting to programs hosted as services in the Internet "cloud."
"There is a continuing focus on ways the current Web works and how to
attack that," said Moss, whose hacker name is Dark Tangent. "Smartphones
are a big target."
Attacks aimed at Internet browsers continue to grow as more aspects of
people's lives go online.
Hackers are hiding malicious viruses in mini-applications, videos and
other files to take advantage of the trust with which people share and
download digital content.
Tracks focused on cyber war, government technology policy, and organized
crime have been added this year.
A "Chinese Cyber-army" presentation by the chief technology officer of
Taiwan-based Armorize Technologies was yanked by the company, reportedly
due to concerns it would anger Chinese officials.
"That is a shame, because they had real numbers and these guys were
going to really frame the size of the problem," Moss said of the
canceled presentation of data about China-backed hacking during the past
decade.
"This is the environment we are all living in. We'd better have our eyes
open."
DefCon is "an order of magnitude cheaper" than Black Hat and notoriously
attracts the kinds of basement-dwelling computer savants portrayed as
quirky geeks in Hollywood films.
DefCon's array of activities includes a lock picking village and a
"capture the flag" contest to see who can break into a computer network
and fend off rivals.
A "social engineering" contest will challenge contestants to prove how
adept they are at telephoning people at companies and talking them into
revealing information that hackers could use to crack networks.
"There is a lot of voodoo and mysticism around social engineering," Moss
said. "We are trying to clarify what works and what doesn't."
DefCon talks this year target the gamut of computerized gadgets and some
unusual sessions, such one about how to "hack your own body."
"We like DefCon because it is a great forum for the right people," said
lock-busting expert Marc Tobias, who will show how top locks from a set
of well-known companies can be popped in seconds.
"Fingerprint locks, electromagnetic locks... all these guys are winning
all kinds of awards and nobody wants to admit that Egyptian locks from
four hundred years ago are more secure. Clever doesn't mean secure."
Lock picking has natural appeal in the world of hackers, since getting
hold of a computer can make it easier to break into the machine.
Even DefCon badges keep with the theme, bearing computer circuitry that
can be turned into radios, light message boards or other gadgets by
hackers clever enough to bend the hardware to their wills.
So many national security officials speak or recruit at DefCon that the
traditional game of "Spot the Fed" has been modified so that only
hackers spotting a cop with a badge and actual arrest authority can win
a T-shirt.
Black Hat attendance is up 35 percent this year and DefCon, which
doesn't register people in advance, is expected to reflect a similar rise.
Facebook Launches Web Page Devoted to Online Safety
Facebook on Monday launched a Web page devoted to staying safe on the
Internet.
The "Safety Page" will highlight news and initiatives focused on ways
people can keep data secure at the world's leading online
social-networking community, Joe Sullivan of Facebook said in a blog
post.
The new page was intended to augment a virtual Safety Center that
Facebook introduced in April and was based on a "security page" that
boasted more than 2.2 million "fans" as of Monday.
"Online safety is a shared responsibility," Sullivan said. "We'll
continue to think of innovative ways to promote safety on our service
and elsewhere on the Web."
The number of people using Facebook topped the 500 million mark last
week, meaning one in every 14 people on the planet has now signed up to
the social network.
The launch of the Safety Page came in the wake of demands by privacy
activists that Facebook give users of the booming social network more
control over the use of their personal data.
A coalition of privacy groups, in an open letter to Facebook co-founder
and chief executive Mark Zuckerberg last month, welcomed the social
network's recent overhaul of its privacy controls but said additional
steps were needed.
The Facebook Data Torrent Debacle
Security concerns over Facebook have been raised yet again after a
security consultant collected the names and profile URLs for 171 million
Facebook accounts from publicly available information. The consultant, Ron
Bowes, then uploaded the data as a torrent file allowing anyone with a
computer connection to download the data.
Simon Davies a representative of the U.K.-based privacy watchdog Privacy
International accused Facebook of negligence over the data mining
technique, according to the BBC. Facebook, however, told the British news
service that Bowes actions haven't exposed anything new since all the
information Bowes collected was already public.
So what are the security risks? Should you be concerned? Let's take a
look.
*What data was collected?*
Ron Bowes, a security consultant and blogger at Skull Security, used a
piece of computer script to scan Facebook profiles listed in Facebook's
public profile directory. Using the script Bowes collected the names and
profile URLs for every publicly searchable Facebook profile. All together,
Bowes said he was able to collect names and Web addresses for 171 million
Facebook users. That's a little more than a third Facebook's 500 million
users.
*What did he do with the data?*
Bowes compiled this list of text into a file and made it available
online as a downloadable torrent.
*How many people have downloaded the torrent?*
The Pirate Bay lists 2923 seeds and 9473 leechers for the torrent file
at the time of this writing. Seeds are people who have downloaded the
entire file and are uploading to others. Leechers are actively
downloading the file.
*Is this a big deal?*
That depends on who you ask. Facebook points out that some of the data
Bowes collected was already available through search engines like Google
and Bing. The entire data set is also available to any user signed into
Facebook. So the data was already publicly available, and nobody's
private Facebook data has been compromised. Nevertheless, this is the
first time that 171 million Facebook profile names have been collected
into one set of files that can be easily analyzed and searched by anyone.
*What could a malicious hacker use the data for?*
As Bowes pointed out in a blog post, someone could use this data as a
starting point to find other publicly available user data on Facebook.
After all, you have to wonder how many of these 171 million Facebook
users have publicly exposed e-mail addresses, phone numbers and other
information on their profiles?
It has been proven time and again that the more a bad guy knows about
you the greater your security risk is. Collecting personal data allowed
a French hacker to steal confidential corporate documents at Twitter.
Researchers were alarmed when Netflix wanted to release anonymous user
data including age, gender and ZIP code for the Netflix Prize 2. Security
researchers said the data dump by Netflix was irresponsible since it is
possible to narrow down a person's identity just by knowing their age
and ZIP code. The contest was eventually canceled. One Carnegie-Mellon
study also found a flaw in the social security numbering system that could
allow a sophisticated hacker using data mining techniques to uncover up to
47 social security numbers a minute.
*How do I know if my name was caught in the data dump?*
From your Facebook profile dashboard click on 'Account' in the upper
right hand side of your dashboard. Select 'Privacy Settings,' and then
on the next page under 'Basic Directory Information' click on 'View
Settings.' You should see a page similar to the image above. If the
first listing called "Search for me on Facebook" is set to "Everyone."
Then chances are, your name and profile URL are in the torrent file.
(*Click image to zoom*)
You should also check to see if external search engines like Google and
Bing are indexing your profile. To do this go back to your main privacy
settings page, and at the bottom click on the "Edit Settings" button
next to "Public Search." On the next page, if the "Enable public search"
check box is ticked then search engines are indexing your profile. To
stop this just uncheck the box and then click on "Back to Applications."
*My name is not in the public directory should I be concerned?*
If you were not in the public directory Bowes says your name is not in
the torrent file. However, you could be exposed to similar data mining
techniques in the future. Bowes says that if any of your Facebook
connections have made their friends lists public then your profile could
easily be found through data mining your friends' profiles.
*What can I do to keep my information private?*
The biggest concern isn't so much about your name and profile URL being
exposed. The greater concern, for you anyway, is the publicly available
information contained on your profile page.
To protect yourself, you may want to reconsider your current privacy
settings. To do that visit your Facebook profile's Basic Directory
Information page by following the steps listed above.
On the top right of the page you should see a button that says "Preview
My Profile." Clicking that button will show you all the information you
make public on Facebook. Data you may want to consider hiding includes
your hometown, birth date, age, phone number, current city and e-mail
address.
So what do you say? Is Bowes' data dump making your rethink your
Facebook profile settings or are you not concerned?
Internet Upgraded To Foil Cyber Crooks
The Internet has undergone a "critical" upgrade that promises to stop cyber
criminals from using fake websites that dupe people into downloading
viruses or revealing personal data.
The agency in charge of managing Internet addresses teamed with online
security services firm VeriSign and the US Department of Commerce to
give websites encrypted identification to prove they are legitimate.
"This is, by any measure, an historic development," ICANN chief executive
Rod Beckstrom said while breaking the news at a premier Black Hat computer
security conference in Las Vegas on Wednesday.
"This security upgrade matters to everyone who uses a computer, and that
means most of us."
The Domain Name System Security Extensions, referred to as DNSSEC,
basically adds a secret, identifying code to each website address.
The domain name system is where the world's Internet addresses are stored
and plays a key role in enabling computers around the world to speak with
one another online.
Applications commonly used on the Internet can be tailored to essentially
check the ID of a website to make certain it is what it claims to be,
according to Dan Kaminsky, a hacker turned computer security specialist.
For example, web browser software such as Google or Bing could be adapted
to tell whether a bank log-in page is authentic.
"When a user receives an email from a bank they should know it came from
a bank," Kaminsky said. "This is something we needed as engineers to
make this a reality."
FBI Access to E-mail and Web Records Raises Fears
Invasion of privacy in the Internet age. Expanding the reach of law
enforcement to snoop on e-mail traffic or on Web surfing. Those are among
the criticisms being aimed at the FBI as it tries to update a key
surveillance law.
With its proposed amendment, is the Obama administration merely clarifying
a statute or expanding it? Only time and a suddenly on guard Congress will
tell.
Federal law requires communications providers to produce records in
counterintelligence investigations to the FBI, which doesn't need a judge's
approval and court order to get them.
They can be obtained merely with the signature of a special agent in charge
of any FBI field office and there is no need even for a suspicion of
wrongdoing, merely that the records would be relevant in a
counterintelligence or counterterrorism investigation. The person whose
records the government wants doesn't even need to be a suspect.
The bureau's use of these so-called national security letters to gather
information has a checkered history.
The bureau engaged in widespread and serious misuse of its authority to
issue the letters, illegally collecting data from Americans and foreigners,
the Justice Department's inspector general concluded in 2007. The bureau
issued 192,499 national security letter requests from 2003 to 2006.
Weathering that controversy, the FBI has continued its reliance on the
letters to gather information from telephone companies, banks, credit
bureaus and other businesses with personal records about their customers
or subscribers - and Internet service providers.
That last source is the focus of the Justice Department's push to get
Congress to modify the law.
The law already requires Internet service providers to produce the records,
said Dean Boyd, a spokesman for the Justice Department's national security
division. But he said as written it also causes confusion and the
potential for unnecessary litigation as some Internet companies have argued
they are not always obligated to comply with the FBI requests.
A key Democrat on Capitol Hill, Senate Judiciary Committee chairman Patrick
Leahy of Vermont, wants a timeout.
The administration's proposal to change the Electronic Communications
Privacy Act "raises serious privacy and civil liberties concerns," Leahy
said Thursday in a statement.
"While the government should have the tools that it needs to keep us safe,
American citizens should also have protections against improper intrusions
into their private electronic communications and online transactions," said
Leahy, who plans hearings in the fall on this and other issues involving
the law.
Critics are lined up in opposition to what the Obama administration wants
to do.
"The FBI is playing a shell game," says Al Gidari, whose clients have
included major online companies, wireless service providers and their
industry association.
"This is a huge expansion" of the FBI's authority "and burying it this way
in the intelligence authorization bill is really intended to bury it from
scrutiny," Gidari added.
Boyd, the Justice spokesman, said the changes being proposed will not allow
the government to obtain or collect new categories of information; rather
it simply seeks to clarify what Congress intended when the statute was
amended in 1993, he argued.
Critics, however, point to a 2008 opinion by the Justice Department's
Office of Legal Counsel which found that the FBI's reach with national
security letters extends only as far as getting a person's name, address,
the period in which they were a customer and the numbers dialed on a
telephone or to that phone.
The problem the FBI has been having is that some providers, relying on
the 2008 Justice opinion - issued during the Bush administration - have
refused to turn over Internet records such as information about who a
person e-mails and who has e-mailed them and information about a person's
Web surfing history.
To deal with the issue, there's no need to change the law since the FBI
has the authority to obtain the same information with a court order
issued under a broad section of the Patriot Act, said Gregory Nojeim,
director of the Project on Freedom, Security and Technology at the
Center for Democracy and Technology, a nonprofit Internet privacy group.
The critics say the proposed change would allow the FBI to remove
federal judges and courts from scrutiny of its requests for sensitive
information.
"The implications of the proposal are that no court is deciding whether
even that low standard of `relevance' is met," said Nojeim. "The FBI
uses national security letters to find not just who the target of an
investigation e-mailed, but also who those people e-mailed and who
e-mailed them."
Cyber Mastermind Arrested, Questioned in Slovenia
A cyber mastermind from Slovenia who is suspected of creating a malicious
software code that infected 12 million computers worldwide and
orchestrating other huge cyberscams has been arrested and questioned, police
said Wednesday.
Leon Keder, a spokesman for the Slovenian police, did not identify the
suspect. Keder told The Associated Press the man was released after police
made sure that he could not tamper with evidence or leave Slovenia, but
offered no details pending an investigation.
The FBI told The AP in Washington that a 23-year old Slovene known as
Iserdo was picked up in Maribor in northwestern Slovenia 10 days ago, after
lengthy investigation by Slovenian police, FBI and Spanish authorities.
His arrest comes about five months after Spanish police broke up the massive
cyberscam, arresting three of the alleged ringleaders who operated the
Mariposa botnet, which stole credit cards and online banking credentials.
The botnet - a network of infected computers - appeared in December 2008
and infected hundreds of companies and at least 40 major banks.
Botnets are networks of PCs that have been infected by a virus, remotely
hijacked from their owners, often without their owners' knowledge, and
put into the control of criminals.
"In the last two years, the software used to create the Mariposa botnet
was sold to hundreds of other criminals, making it one of the most
notorious in the world," said FBI Director Robert Mueller in a statement.
"These cyber intrusions, thefts, and frauds undermine the integrity of the
Internet and the businesses that rely on it; they also threaten the
privacy and pocketbooks of all who use the Internet."
The Mariposa botnet, which has been dismantled, was easily one of the
world's biggest. It spread to more than 190 countries, according to the
researchers who helped take it down after examining it in the spring of
2009.
Jeffrey Troy, the FBI's deputy assistant director for the cyber division,
said Iserdo's arrest was a major break in the investigation.
On Wednesday, the FBI also identified, for the first time, the three
individuals arrested in connection with the case in Spain: Florencio Carro
Ruiz, known as "Netkairo;" Jonathan Pazos Rivera, known as "Jonyloleante;"
and Juan Jose Bellido Rios, known as "Ostiator.
They are being prosecuted for computer crimes. Officials said the Mariposa
botnet from Spain was the largest and most notorious.
In Ljubljana, Keder said "other suspects" were detained and interrogated
along with the chief suspect, but offered no further details until a
news conference planned for Friday.
Slovenian media have linked three former students of the Maribor Faculty
of Computing and IT to the case, reporting that they were recently
detained and interrogated by police and FBI officials, who confiscated
their computer equipment.
The FBI's Troy said more arrests are expected and are likely to extend
beyond Spain and Slovenia, targeting additional operators who allegedly
bought the malware from Iserdo.
Mariposa is the Spanish word for "butterfly." Iserdo, read backwards,
means "salvation" in Slovenian.
RIMs Rumored 'BlackPad' Tablet Due in November?
Rumors of a BlackBerry tablet are heating up by the day, with Bloomberg
now claiming that the BlackPad - yes, the BlackPad - will arrive in
November, complete with an iPad-size screen and the ability to connect
to the Internet via either Wi-Fi or your Bluetooth-connected BlackBerry.
Citing a pair of anonymous sources "familiar with the companys plans,"
Bloomberg says the tablet will indeed be called the BlackPad (which would
presumably explain BlackBerry-maker RIMs recent acquisition of
"BlackPad.com") and would boast a display thats "roughly" the same size
as the iPads 9.7-inch screen.
Rather than having its own, embedded 3G radio, the BlackPad would rely on
Wi-Fi or Bluetooth tethering to your BlackBerry to connect to the Internet,
Bloombergs tipsters claim - a nifty trick. I sure wish I could tether the
iPad to my iPhone for 3G data.
The article doesnt go into detail about what kind of processor would
power the rumored BlackPad, or whether it would run on the revamped
BlackBerry OS 6 (which seems likely). It did note, however, that the
BlackPads pricing would be "in line" with that of the iPad, which
starts at $499 for the 16GB Wi-Fi-only version.
Several details of the Bloomberg story are at odds with what we heard
from one wireless analyst earlier this month, who predicted that the
BlackBerry tablet would come with built-in Wi-Fi and a smaller, 7-inch
display.
Rodman & Renshaw analyst Ashok Kumar (who, it must be said, has thrown
some wild pitches lately when it comes to tech predictions) also thinks
the BlackBerry slate will arrive with a 1GHz processor and dual cameras,
including a front-facing lens for video chat.
The Bloomberg story caps months of rumors and speculation about a
BlackBerry tablet, which stretch back as early as April and gained
traction in June after the Wall Street Journal threw its own anonymously
sourced log on
the fire.
The latest rumors also come just days before BlackBerrys planned press
event next week. Expected among the surprises: a new touchscreen QWERTY
slider powered by the revamped, touch-friendly BlackBerry OS 6.
I admit to being pretty skeptical about the BlackBerry tablet rumors in
the early months, but based on the steady buzz, its starting to look
like the BlackPad - or whatever it ends up being called - could indeed be
for real, although RIM still refuses to confirm or deny its existance. If
the tablet is real, though, the ability to tether with a BlackBerry for
3G data would be a major selling point.
7-Inch, $150 Android Tablet Set To Go on Sale
Rather not spend $500 on an iPad or $550 on Dells 5-inch Android tablet?
Is Archoss $200 Android slate still a tad too rich for your blood? Then
try this on for size: a 7-inch, $150 Android tablet, coming soon to a
K-Mart near you.
Set to go on sale this week, according to Kmart circulars spotted by
Engadget, Augens GenTouch78 makes for one of the cheapest full-on tablet
devices Ive seen yet (well, except maybe for this one, and according to
the manufacturers spec sheet, its got some pretty solid features to go
along with the bargain price tag.
Running on version 2.1 of the Android OS (slightly behind Android 2.2,
which is starting to roll out on the latest Android smartphones), the
GenTouch sports a 7-inch, 800-by-480 TFT touch display, plus an 800MHz
processoor under the hood, 256MB of RAM, 2GB of internal storage, an
SD/MMC memory card slot (good for expanding the tablets storage capacity
by another 16GB), and - naturally - Wi-Fi support.
The GenTouchs media player can handle video files up to 720p (which would
have to be downscaled for the WVGA display) and supports e-books in text,
PDF, ePub, and HTML formats. Even better, the GenTouch product page claims
that youll be able to download apps from the Android Marketplace onto the
tablet - although Id like to see this in person, given that Google has
supposedly restricted Android Marketplace access on "non-smartphones"
like Archoss Android tablet.
The GenTouch78 will join such existing Android tablets as the $550 (or
$299 with a two-year AT&T contract) Dell Streak, which comes with a GSM
radio for voice calls (making it either a big smartphone or a smallish
tablet, take your pick) and a speedy 1GHz Snapdragon processor, and
Archoss 8GB, $200 Home 7 Tablet, which runs an older version of Android
- 1.6, to be exact - and runs on a middle-of-the-road 600MHz ARM 9
processor. Were also expecting more Android tablets from Dell, Samsung,
and perhaps even Motorola in the coming months.
An Android 2.1 tablet powered by a 1GHz processor sounds like a pretty
good deal for just $150, but buyer beware; I havent seen the GenTouch
in person yet, nor have I spotted any reviews, so make sure to give it a
test drive before impulsively snatching it up at your local K-Mart.
So, what do you think: Does the GenTouch 78 sound like the Android tablet
bargain youve been looking for? Waiting for a bigger Android tablet from
a name brand?
Ballmer: Tablet Coming 'As Soon As We Can'
Microsoft will compete with Apple's iPad, but it isn't saying when.
Microsoft Corp. CEO Steve Ballmer says the company is working with Intel
Corp. and computer makers to perfect tablet touch-screen computers.
Analysts attending an annual meeting at Microsoft headquarters on
Thursday got few concrete details. Ballmer did say Windows tablets will
use Intel processors for the foreseeable future.
Ballmer said, "We'll be in market as soon as we can."
But he added that whether it's "really, really soon, or just really,
pretty soon, I'm going to wait until I have a device I want to hand you
and tell you to go use."
Ballmer says Apple Inc. has "done an interesting job" with the iPad, and
says Apple has sold more of the devices than he would like.
Goodbye Mouse: Apple's 'Magic Trackpad' Goes on Sale
Apple on Tuesday unveiled the "Magic Trackpad," a touchpad which allows a
user to operate a desktop computer with finger gestures, eliminating the
need for a mouse.
The Magic Trackpad costs 69 dollars in the online Apple Store.
The battery-powered device, which looks a bit like a notepad made out of
glass and aluminium, connects to Apple's Mac desktop computers using
Bluetooth wireless technology.
It allows users to operate their machines using the tapping, swiping and
pinching finger gestures well known to owners of iPhones or iPads.
Apple said it works from as far as 33 feet (10 meters) away from the
computer.
The touchpad technology has already featured in Apple's MacBook Pro
notebook computers.
Apple on Tuesday also unveiled new iMac desktop computers featuring more
powerful processors, 21.5-inch and 27-inch screens and price tags of
1,199 dollars to 1,999 dollars.
Safari 5.0.1 Released with Extensions Gallery, Bug Fixes
On the heels of an iMac refresh, Apple on Wednesday released the next
version of its web browser. As promised, Safari 5.0.1 comes complete
with extensions and a Safari Extensions Gallery. In June, Apple rolled
out extensions support to help developers create extensions using HTML5,
CSS3 and JavaScript. The result is a growing gallery currently at 100
extensions.
The gallery lets Apple fans find extensions that add new features to the
browser, such as toolbars that display live web feeds and sophisticated
programs that filter web content. Safari 5.0.1 users can download and
install extensions from the gallery or directly from a developer's web
site.
"The Safari Extensions Gallery puts Safari right up there with Chrome or
Firefox with its ability to add functionality to the browser," said
Michael Gartenberg, a partner at Altimeter Group. "It looks like they've
got a good collection of extensions already up in the gallery. What's
interesting is that once again there is a Bing extension built in. Other
than the extensions, this is a minor release."
Apple is getting kudos from some of its heavy-hitting technology
colleagues (and competitors), including Microsoft, Twitter and
Amazon.com. Gianna Puerini, vice president of worldwide design and
community at Amazon, pointed to how the browser helps its customers
build wish lists.
"With Safari 5, we were able to quickly build the Add to Amazon Wish
List extension that lets customers add items from any web site to their
Amazon wish list with the click of a button,"
Puerini said.
Jeff Henshaw, general manager of Microsoft's Bing User Experience, said
the software giant is excited about working closely with Apple to bring
"visually compelling Bing experiences to Safari."
"The Bing Extension for Safari brings Bing search intelligence to
everyday browsing with Safari," Henshaw said. "When a user selects text
in Safari, Bing instantly recognizes what they might need and pops up
helpful, informative tips, from real-time maps and driving directions to
real-time translations to direct web search results."
Jason Goldman, vice president of product at Twitter, said creating the
Twitter extension in Safari was easy. "By providing features like the
ability to tweet about a page and view trending topics," he said, "we've
created a simple way to deliver relevant, interesting content to people
regardless of where they are on the web."
In other Safari news, Apple patched some holes in the web browser less
than a day before the Black Hat security conference kicks off. In all,
Apple patched 15 vulnerabilities, including a flaw in how Safari
auto-populates forms with a user's information. Jeremiah Grossman, CTO
of WhiteHat Security, made that bug public on July 21.
Microsoft's IE9 Beta Arrives in September
Addressing an audience at the company's annual Financial Analyst Meeting
in Redmond, Microsoft's COO, Kevin Turner, announced that a beta for
Internet Explorer 9, the latest version of its popular browser, will be
available fore download this September.
"The most beautiful thing about our browser story is the message is
getting out with IE8, the safest most secure browser in the
marketplace," Turner said. "We're really excited about IE9 which will be
beta and coming out in September."
Microsoft released its third platform preview of its new browser in June,
after its second platform preview about six weeks earlier, in May.
Turner didn't reveal much in the way of features for the upcoming
release, but noted that IE9 will focus on the HTML5 standard. Also key,
as expected, are speed, security, and safety.
The executive added that he was hopeful for the future of the browser,
still the dominate product in the space, despite marketshare gains from
the likes of Firefox and Chrome. "[I]n May and June," Turner told the
crowd, "we grew share in the browser space for the first time in a very
long time. So, the momentum on that has turned and it's a whole new day."
Ask.com Augments Search Engine with People
Ask.com, the Internet search engine owned by IAC/InterActive Corp, is
seeking some human help answering web surfers' questions.
The company has begun testing a new service that lets users of its search
engine submit questions to other Ask.com visitors, tapping into the
powerful social networking trends that are increasingly gaining popularity
on the Web.
The new service represents a striking shift for the company, which like
most Internet search engines has long sought to distinguish itself based
on the brawn of its computer algorithms.
But with only 3.6 percent share of the U.S. search market in June
according to analytics firm comScore, Ask.com is looking for ways to
differentiate itself from rivals Google Inc, Yahoo Inc and Microsoft Corp.
Google had a 62.6 percent share of the U.S. search market in June, while
Yahoo and Microsoft had market shares of 18.9 percent and 12.7 percent
respectively.
The new "Ask the Community" feature means the company will be able to
provide specific answers to a greater portion of the search queries it
receives, instead of simply displaying links to relevant web pages,
explained Doug Leeds, President of Ask.com U.S., while demonstrating the
new service to Reuters last week.
The service routs questions to other Ask.com users with expertise on
various subjects and is particularly useful for subjective search
queries which Leeds said can stymie traditional, algorithm-based search
engines.
Currently available by invitation only, Ask.com's service follows the
roll-out of similar social search and question-and-answer services like
Quora, a Palo Alto, California start-up founded by former Facebook
executives.
In February, search giant Google acquired Aardvark, which also offers a
social search service, for an undisclosed sum.
But Ask.com is the first major search engine to integrate an online
question-and-answer service directly into its flagship search product.
Leeds acknowledged that the new question-and-answer service might not
provide the same immediate money-making opportunity as traditional,
computer-generated Web searches, in which Ask.com sells special
search-based advertisements alongside search results.
But he said he expected that the new service will increase overall
searching on Ask.com, as people turn to its traditional search engine to
find more information about products and other items that are
recommended by people through the Q&A service.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.