Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 13 Issue 22

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 13, Issue 22 Atari Online News, Etc. June 3, 2011


Published and Copyright (c) 1999 - 2011
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1322 06/03/11

~ Jobs To Deliver Keynote ~ People Are Talking! ~ Microsoft Demos Win8!
~ Syrian Networks Cut Off ~ Jag Robinson's Requiem ~ Victim Catches Thief!
~ Apple Updates Mac OS X! ~ AMD Unveils HD Tablet! ~ PSN Restored in U.S.!
~ Rep Weiner Hires Lawyer ~ Sony Gets Hacked Again ~ What To Expect at E3!

-* Pentagon: All Options on Table *-
-* Boy Regrets Selling Kidney for iPad *-
-* Web Users Worry About Snooping Businesses! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



The closest one was about 60 miles away, and the warnings were all over the
news. Earlier in the week, Massachusetts was hit with at least three
tornadoes in which at least four people were killed or died. Seeing these
storms via videos from the public was unbelievable. Many homes and
businesses were totally destroyed, and people's lives have been changed
forever.

My wife and I were mesmerized and glued to the television watching all of the
reports, weather maps, and pictures from the affected areas. Seeing a
tornado rip houses apart and throwing cars around like they were toys was
hard to comprehend. This was too close to home, in an area that rarely
has tornadoes - much less one so devastating.

The stories of survival were also amazing. There were too many to recount
here, but they were the tales you read about or see in movies. We're used
to hearing about tornadoes in the Midwest because that area has been prone
to such storms over the years, but in New England, rarely. Hopefully we
won't incur such wrath of nature anytime again soon.

Until next time...



=~=~=~=



->In This Week's Gaming Section - Activision Bets on Online Play!
""""""""""""""""""""""""""""" PSN Restored in US & Europe!
What To Expect at E3 2011!
And much more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Activision Bets on Online Play for 'Call of Duty'


Activision knows it's more fun to blast on-screen enemies into oblivion
with friends, so this fall it's launching an online service for its "Call
of Duty" games that's part Facebook, part player matchmaker and part
organized sports.

It's the logical next step for Activision Blizzard Inc., whose "Call of
Duty" franchise has enjoyed unprecedented success. The latest title,
"Black Ops," has sold 22 million copies worldwide since its November
launch. More than 7 million people play every day online.

The service officially launches on Nov. 8 with the next "Call of Duty"
installment, Activision said Tuesday. A test version will be available
before that, but Activision isn't saying when.

Two years in the making by a specially-created game studio called
Beachhead, the service, "Call of Duty: Elite," lets players form groups,
compete by skill level or interest, share statistics like baseball fans,
and create video clips of their best "Call of Duty" moments, among other
things.

"Elite" will be accessible from game consoles, computers and
smartphones. It's as if "social networks and organized sports had a baby
and they gave that baby a flamethrower," as Activision puts it.

Eric Hirshberg, CEO of Activision Publishing, calls it a response to the
rise of social networking.

"A way to think about this - the NFL used to be something you could only
interact with on Sunday. Then, things like fantasy football and ESPN
started surrounding it," Hirshberg said.

Online services are also the next step for the broader video game
industry, which must figure out how to offer players experiences that go
beyond the $60 video game discs that, "Call of Duty" aside, have seen
bumpy sales as people flock to cheaper games from "Angry Birds" to
"FarmVille."

Activision is not saying what it plans to charge for access to "Elite,"
though it's likely to be in the form of monthly or yearly subscriptions
possibly combined with the sale of virtual items and extra content for
the games. Hirshberg stressed that the company won't start charging for
anything currently available to "Call of Duty" players for free, such as
the ability to play multiplayer games.

Activision, whose Blizzard arm publishes the "World of Warcraft" online
game series, is betting that the future of video games lies beyond discs
in so-called "digital content." That includes everything from
downloadable chapters (called "map packs") in "Call of Duty" to monthly
"World of Warcraft" subscriptions, along with games on Facebook and
mobile devices. While sales of physical video games are on the decline
save the biggest blockbusters, more people than ever are playing games
in some form, especially online and on mobile devices.

"Call of Duty" has a single-player component, but that pales in
comparison with the enjoyment gamers like Dave Strand, 28, get out of
playing the game's multiplayer feature, which can extend the playtime of
"Call of Duty" by days, weeks or even months. More than 30 million
people play "Call of Duty" online, proof that video games are no longer
a solitary pastime.

"It's always better to play with someone you know, have one friendly
voice." said Strand, who works for a telecommunications company in
Chicago. "As opposed to random kids who when they die they just scream
in profanity."

Strand said he plays a couple of days a week, with a group of
like-minded gamers, found through an online video game forum, who like
to practice "good sportsmanship, win or lose."

As for a digital platform for "Call of Duty," Strand said if it was
"like a buck or two a month, I'd think about it." He already pays for
the Xbox Live online service which now costs $60 a year, and shells out
$15 for each new "Call of Duty" map pack.



Sony PlayStation Network Restored in US, Europe


Sony Corp. is fully restoring its PlayStation Network in the U.S., Europe
and parts of Asia on Thursday after hackers stole customer data and sent
services offline in April.

The Tokyo-based company said in a statement that services are set to
resume in the U.S., Europe and Asia, excluding Japan, Hong Kong and
South Korea.

Customers will also be able to download music again on their
PlayStation3 consoles and PCs through Sony's Qriocity music service.

Sony shut down the network after a massive security breach that affected
more than 100 million online accounts and embarrassed the tech giant.

Sony said last week that credit card companies have not reported any
rise in fraudulent credit card transactions as a result of the attack.

The network serves both the PlayStation video game machines and Sony's
Qriocity movie and music services. The system links gamers worldwide in
live play, and also allows users to upgrade and download games and other
content.

The company says it has added "considerable" security enhancements to
protect customer data. It created a new "Chief Information Security
Officer" position amid criticism that the company hadn't been vigilant
enough about online security.

The attack cost Sony 14 billion yen ($173 million), used to cover new
identity theft insurance for customers, improvements to infrastructure,
customer support and the investigation into the hacking.

Sony is also hoping to entice customers with a "Welcome Back" package of
free game downloads and premium services.

The company began partially restoring the PlayStation Network in the
U.S. and Europe on May 15, enabling online game play and account
management.

Full restoration includes access to the PlayStation Store and in-game
commerce, Sony said.

Sony did not specify a timeline for Japan, Hong Kong and South Korea,
where local authorities continue to assess the company's security measures.



Spotlight Falls on Sony's Troubled Cybersecurity


Another massive data breach at Sony has left hackers exulting, customers
steaming and security experts questioning why basic fixes haven't been
made to the company's stricken cybersecurity program.

Hackers say they managed to steal a massive trove of personal
information from Sony Pictures' website using a basic technique which
they claim shows how poorly the company guards its users' secrets.
Security experts agreed Friday, saying that the company's security was
bypassed by a well-known attack method by which rogue commands are used
to extract sensitive data from poorly-constructed websites.

"Any website worth its salt these days should be built to withstand such
attacks," said Graham Cluley, of Web security firm Sophos. Coming on the
heels of a massive security breach that compromised more than 100
million user accounts associated with Sony's PlayStation and online
entertainment networks, Cluley said the latest attack suggested that
hackers were lining up to give the company a kicking.

"They are becoming the whipping boy of the computer underground," he said.

Culver City, California-based Sony Pictures has so far declined to comment
beyond saying that it is looking into the reported attack - which saw many
users' names, home addresses, phone numbers, emails, and passwords posted
on the Web.

It wasn't clear how many people were affected. The hackers, who call
themselves Lulz Security - a reference to the Internetspeak for "laugh
out loud" - boasted of compromising more than 1 million users' personal
information - although it said that a lack of resources meant it could
only leak a selection on the Web. Their claim could not be independently
verified, but several people whose details were posted online confirmed
their identities to The Associated Press.

Lulz Security ridiculed Sony for the ease with which it stole the data,
saying that the company stored peoples' passwords in a simple text file
- something it called "disgraceful and insecure."

Several emails sent to accounts associated with the hackers as well as
messages posted to the microblogging site Twitter were not returned, but
in one of its tweets Lulz Security expressed no remorse.

"Hey innocent people whose data we leaked: blame Sony," it said.

Sony's customers - many of whom had given the company their information
for sweepstakes draws - appeared to agree.

Tim Rillahan, a 39-year-old computer instructor in Ohio, said he was
extremely upset to find email address and password posted online for
"the whole world to see."

"I have since been changing my passwords on every site that uses a
login," he said in an email Friday. "Sony stored our passwords in plain
text instead of encrypting the information. It shows little respect to
us, their customers."

He and others complained that they had yet to hear from the company
about the breach, news of which is nearly a day old.

John Bumgarner, the chief technology officer for the U.S. Cyber
Consequences Unit - a research group devoted to monitoring Internet
threats - was emphatic when asked whether users' passwords could be left
unencrypted.

"Never, never, never," he said. "Passwords should always be hashed. Some
kind of encryption should be used."

Bumgarner, who's been critical of Sony's security in the past, said the
company needed to take a hard look at how it safeguards its data.

"It's time for Sony to press reset button on their cybersecurity program
before another incident occurs," he said.



What to Expect at E3 2011


This year's Electronic Entertainment Expo is shaping up to be a big one,
with major hardware announcements expected from at least two of the
three big names in console gaming and a ton of high-profile titles
scheduled for the summer, fall, and holiday seasons.

First, there's the sure thing on the hardware front: Nintendo and its
upcoming successor to the Wii. This is confirmed: Nintendo will be
announcing a new home console at E3. This isn't confirmed: any and all
details about the new home console at E3. Big N has kept the world
successfully in the dark about the Wii 2 (or Wii HD, or Project Café,
depending on who you read), to the point that the system could literally
be anything. We don't know if it will be high-def, if it will have a new
online service, if its controllers will have high-def touch screens (an
actual rumor), nothing. OF course, that's why we'll be at Nintendo's
press conference at the start of the show to report exactly what the
company is launching as soon as the curtains are pulled.

Besides the new home console, Nintendo will be putting a lot of effort
into building up enthusiasm for the 3DS. The 3D handheld launched last
month, and so far it's seen only a small collection of 3DS games and
little to no online services. Kid Icarus: Uprising, The Legend of Zelda:
Ocarina of Time 3D, the upcoming, unnamed Super Mario Bros. game, and
the 3DS eStore will all likely be shown off at the show.

Sony will almost certainly reveal more details surrounding its upcoming
handheld system, codenamed the Next Generation Portable, or NGP. We
already know it's going to be a fast, bright, shiny handheld that looks
vaguely like the PlayStation Portable. It will have a 5-inch OLED touch
screen, built-in 3G, and basically serve as a small gaming tablet with
buttons. However, official price and availability aren't set in stone
yet, nor are launch titles or upcoming major games for the system. Those
details will likely get sorted out at E3.

On the home console front, Sony likely won't offer anything new. While
the PlayStation 3 is as old as the Wii, its much more advanced graphics
have kept it from experiencing much in the way of aging. Current PS3
titles look great, and Sony probably won't announce a replacement for
the system for at least another year. The company has always been
conservative with new console iterations, letting the previous
generation go on as long as possible, even after new hardware launches,
and there's plenty of life left in the PS3 yet.

That brings us to Microsoft, which doesn't have a handheld system in the
market and whose home console is the oldest (six years, as of November
22) of the current generation. The Xbox 360 still makes a valiant effort
at gaming and is a very solid competitor to the PS3 even now. However,
the system has been around for some time, and with Nintendo presenting a
new system already, it stands to gain much from getting in on the next
generation of hardware. Just as the Xbox 360 launched a full year before
the Wii and PlayStation 3, the Xbox 3/720/Next-Gen could come out a year
before Sony. That year head-start the Xbox 360 enjoyed helped seal major
market share for several years, and Microsoft might try to get that
advantage once again, while it still has the chance.

Of course, hardware won't be the only highlight of E3. Expect plenty of
news and previews about upcoming games planned all the way through next
year. From Nintendo, series favorites Mario and Link will return in two
yet-unnamed Mario Bros. projects and The Legend of Zelda: Skyward Sword
on the Wii. The company will also show off the long-awaited return of
"Kid Icarus" himself, Pit, in Kid Icarus: Uprising for the 3DS. We might
also see a new Metroid game, either 3D and on the Wii or either 2D or 3D
on the DS/3DS. After the poorly received Metroid: Other M, bounty hunter
Samus Aran lost a lot of respect, and it will be interesting to see if
Nintendo will attempt a mea culpa for the latest chapter.

Sega could stand out as the dark horse in the software field at E3.
Sonic the Hedgehog has had a very, very bad time over the last decade,
with the company trying repeatedly to rekindle the magic the blue
speedster held in the 90's. With Sonic Generations on the 3DS, Sega
might (emphasis on might) just do that. Fortunately, Sega doesn't pin
all its hope on its old mascot; a new Shinobi game is in the works for
the 3DS, and while the Thor video game was criticized heavily by most
critics as a mediocre cash-in, Captain America: Super Soldier might be a
surprise winner, like X-Men Origins: Wolverine was in 2009.

EA, as always, will be big at E3, with plenty of games across all genres
on the way. The biggest titles are Battlefield 3 and Mass Effect 3.
Battlefield 3 is the fifth (or 18th; the series is numbered oddly) in
EA's series of multiplayer shooters, and is the only current contender
to stand up against Activision's Modern Warfare 3 in the online modern
combat arena. Mass Effect 3 is the final chapter in the critically
acclaimed Mass Effect trilogy, and will involve series hero Commander
Shepherd directly combating the timeless, massive threat of the Reapers
and their crusade to cleanse the galaxy of all life. Besides those two
big titles, keep an eye out for Alice: Madness Returns, the sequel to
2000's American McGee's Alice, racing game Need for Speed: The Run, and
perennial blockbuster Madden NFL 12.

Speaking of Activision, Modern Warfare 3 will be the company's biggest
title at E3, but it won't be the only game there. Adorable dragon Spyro
returns in Spyro Adventures, and Spider-Man: Edge of Time takes Marvel's
web-slinging mascot and partners him with his counterpart from the year
2099, Miguel O'Hara. Don't expect much World of Warcraft, Starcraft 2,
or Diablo 3 news from E3; Blizzard-Activision saves the Blizzard
announcements for Blizzcon.

Among French publisher Ubisoft's games at E3, Assassin's Creed:
Revelations is the standout title. While not specifically Assassin's
Creed III (that game is expected within the next year or two), AC:R will
tie up the loose ends of series protagonists Altair and Ezio's lives in
a multigenerational adventure through Constantinople, presumably to make
room for a new protagonist in a new age (after the 11th century of
Altair and 15th century of Ezio) in Assassin's Creed III. New Tom Clancy
games, including news about the upcoming, Kinect-enabled Tom Clancy's
Ghost Recon: Future Soldier, are expected to be shown off, along with
upcoming western crime game Call of Juarez: The Cartel.

Is that going to be it? Of course not! E3 will have dozens and dozens of
publishers, developers, and manufacturers, all vying for press and
consumer attention. Somewhere, tucked in a tiny booth in the Los Angeles
Convention Center, could be the next super-smash
puzzle-action-RPG-racing game hit to take the gaming world by storm.
These are just the big shots and what we can be pretty sure will be at
the expo. There's plenty more to come



GameStop to Honor Duke Nukem: Forever Pre-Orders From 15 Years Ago


You did remember to save that receipt, right? Perhaps one of the
industry’s longest punchlines, Duke Nukem: Forever‘s constant delays
certainly have become legendary over the last decade and a half. Now on the
verge of June’s arrival, Duke Nukem is finally going to see the light of
store shelving.

So, were you one of the few who actually went to your local electronics
store and put down the shiny $5.00 for a pre-order on Duke Nukem: Forever
so long ago? Well, if you answered yes and you still have that receipt,
we can agree that either you’re a very meticulous person or you’re just
plain lucky.

GameStop announced late yesterday eve that it would honor pre-order
receipts from 15 years ago, provided you still have that little slip of
paper. The only stipulation is that you walk through those doors with that
receipt before the game releases on June 14th. Doing so will still give
you the "Duke’s Big Package" deal, where you get an in-game EGO boost, a
t-shirt, and the Big Head Mode.

Supposedly in two weeks, we’ll see The Duke explode his way onto store
shelves. Knowing you, you’ve probably already found that receipt and are
on your way out the door.

Right?



=~=~=~=



->A-ONE Gaming Online - Online Users Growl & Purr!
"""""""""""""""""""



Robinson's Requiem Now Available for The Atari Jaguar


For immediate release:

ROCHESTER, MN - Songbird Productions is proud to announce the immediate
availability of Robinson's Requiem for the Atari Jaguar. In this
enthralling 3D adventure, you play the part of a Robinson. The action
unfolds in the middle of the twenty-second century, at a time when the
Earth and some of its colonized planets are already over-populated.
Robinson is the nickname given to members of AWE - Alien World
Exploration - a military body whose task it is to explore totally unknown
planets. Your last mission takes you to an uncharted planet where
something goes horribly wrong. Now you must survive the harsh environment
and somehow make your way... home.

Robinson's Requiem features a fully explorable 3D environment encompassing
three square miles of landscape, rendered and live-action video sequences,
and Memory Track support for saved games. There are dozens of items to
collect, use, and build as you ward off predators, illness, and adversaries.
Your Sesame mini-computer tracks your health vitals and maps the area
around you while you struggle to survive.

The end of a journey is just the beginning in Robinson's Requiem! The
professionally glass-mastered disc comes in a poly-wrapped Amaray case and
includes a glossy 16-page manual. Order your copy today at
http://songbird-productions.com.

Songbird Productions is a premier game developer and publisher for the
Atari Lynx and Jaguar. To keep up to date with the latest news at Songbird
Productions, be sure to visit the company web site at
http://songbird-productions.com.

Order your copy today at http://songbird-productions.com! Special
discounted price of $49.95 is only available through June 3rd, 2011, so help
spread the word to other Jaguar fans! Post on Twitter, Facebook,
VideoGameGeek.com, Atari.net, or other video game sites and share your
support on the official thread at
http://www.atariage.com/forums/topic/182663-robinsons-requiem-now-available-for-the-jaguar-cd.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Pentagon: All Options on Table in Cyber-Attack


The Pentagon said Tuesday that it would consider all options if the United
States were hit by a cyber-attack as it develops the first military
guidelines for the age of Internet warfare.

President Barack Obama's administration has been formalizing rules on
cyberspace amid growing concern about the reach of hackers. Major
defense contractor Lockheed Martin said it repelled a major
cyber-assault a week ago.

The White House on May 16 unveiled an international strategy on
cyber-security which said the United States "will respond to hostile
acts in cyberspace as we would to any other threat to our country."

"We reserve the right to use all necessary means - diplomatic,
informational, military, and economic - as appropriate and consistent
with applicable international law, in order to defend our nation, our
allies, our partners and our interests," the strategy said.

Pentagon spokesman Colonel Dave Lapan said Tuesday that the White House
policy did not rule out a military response to a cyber-attack.

"A response to a cyber incident or attack on the US would not
necessarily be a cyber response," Lapan told reporters. "All appropriate
options would be on the table if we were attacked, be it cyber."

Lapan said that the Pentagon was drawing up an accompanying cyber
defense strategy which would be ready in two to three weeks.

The Wall Street Journal, citing three officials who said they had seen
the document, reported Tuesday that the strategy would classify major
cyber-attacks as acts of war, paving the way for possible military
retaliation.

The newspaper said that the strategy was intended in part as a warning
to foes that may try to sabotage the US electricity grid, subways or
pipelines.

"If you shut down our power grid, maybe we will put a missile down one
of your smokestacks," it quoted a military official as saying.

The newspaper said the Pentagon would likely decide whether to respond
militarily to cyber-attacks based on the notion of "equivalence" -
whether the attack was comparable in damage to a conventional military
strike.

Such a decision would also depend on whether the precise source of the
attack could be determined.

The US military suffered its worst cyber-attack in 2008. Deputy Secretary
of Defense William Lynn said that a malicious flash drive - likely from a
foreign spy agency - spread and commandeered computers at US Central
Command, which runs the war in Afghanistan.

The attack served as a wakeup call, with the Pentagon setting up a Cyber
Command and worked on guidelines for a new type of conflict.

In cyber-warfare, aggressors are often mysterious and hence would not
fear immediate retaliation - a key theoretical framework in traditional
warfare.

Wesley Clark, the retired US general who led NATO's campaign in Kosovo,
said the announcement of guidelines for cyber-conflict would serve as a
deterrent to those who would consider such an attack.

"It may be that the best response is not to use force, but what this
policy will say is that an attack is an attack and could be met by
force. It is a matter first of deterrence," Clark told CNN.

While stepping up defenses, some believe the United States may also be
pursuing cyber war. Iran has accused the United States and Israel of
last year launching Stuxnet, a worm that reportedly wreaked havoc on
computers in the Islamic republic's controversial nuclear program.

The United States and Israel both declined to comment on Stuxnet.



Pentagon Doesn't Rule Out Military Force Against Cyberattacks


The Pentagon is formulating a new strategy on how to respond to
cyberattacks that would include using military force, a spokesman
confirmed late Tuesday.

Col. David Lapan said if the attack is serious enough, "a response to a
cyberincident or attack on the U.S. would not necessarily be a cyber
response, so as I said all appropriate options would be on the table."

The final public portion of the "Defense Strategy for Operating in
Cyberspace" is expected to be released in two or three weeks.

But much of it has already been discussed for months by numerous
administration officials, including the White House and Deputy Secretary
of Defense William Lynn.

In May, the White House released the International Strategy for
Cyberspace. It said in part, "We reserve the right to use all necessary
means - diplomatic, informational, military, and economic - as
appropriate and consistent with applicable international law, in order
to defend our Nation, our allies, our partners, and our interests."

The White House hopes this policy will act to discourage cyberattackers.
"There is certainly the deterrent effect of letting our adversaries know
how we would consider those actions and what steps we might take," Lapan
said.

The Defense Department's appreciation of the serious threat posed by
cyberattacks grew substantially after an incident in 2008. That's when
someone inserted an infected flash drive (what some call thumb drives)
into a U.S. military laptop on a base in the Middle East.

"The flash drive's malicious computer code, placed there by a foreign
intelligence agency, uploaded itself onto a network run by the U.S.
Central Command. That code spread undetected on both classified and
unclassified systems," Lynn wrote last fall in Foreign Policy magazine.
"This previously classified incident was the most significant breach of
U.S. military computers ever, and it served as an important wake-up call."

According to Lynn's article, the code on that flash drive "spread
undetected on both classified and unclassified systems, establishing
what amounted to a digital beachhead, from which data could be
transferred to servers under foreign control."

But Lynn admits one of the more difficult hurdles facing anyone trying
to respond to cyberattacks is figuring out who the attacker is.

"Whereas a missile comes with a return address, a computer virus
generally does not. The forensic work necessary to identify an attacker
may take months, if identification is possible at all," Lynn wrote. "And
even when the attacker is identified, if it is a nonstate actor, such as
a terrorist group, it may have no assets against which the United States
can retaliate."

The Pentagon policy is part of the larger White House plan, but it will
not include specifics as to what responses might be triggered by certain
levels of cyberattacks.

"We're not going to necessarily lay out if this happens we will do this,
because again the point is, if we are attacked we reserve the right to
do any number of things in response just like we do now with kinetic
attack," Lapan said. "So it makes the idea that attacks in cyber would
be viewed in a way that attacks in a kinetic form are now, the military
option is always a resort."



Syrian Networks Cut Off from Internet


Two-thirds of the networks in protest-wracked Syria were cut off from the
Internet on Friday, an Internet monitoring firm said.

James Cowie of Renesys, a New Hampshire-based company that monitors
Internet routing data in real-time, said in a blog post that beginning
at 0335 GMT the routes to 40 of 59 networks became unreachable over the
course of half an hour.

"The networks that are not reachable include, substantially, all of the
prefixes reserved for SyriaTel's 3G mobile data networks, and smaller
downstream ISPs (Internet Service Providers) including Sawa, INET, and
Runnet," he said.

Cowie said the network prefixes that remain reachable include those
belonging to the Syrian government "although many government websites
are slow to respond or down."

"The Oil Ministry is up, for example, and Syrian Telecom's official
page, but the Ministry of Education is down, as is the Damascus city
government page, and the Syrian Customs website," he said.

A website maintained by Google, meanwhile, that monitors traffic to its
popular services around the world showed traffic levels in Syria well
below normal.

Cowie said the Internet in Syria basically depends on one domestic
provider, state-owned SyriaTel, but "we don't know yet how the outage
was coordinated, or what specific regions or cities may be affected more
than others."

In Syria, residents said the Internet was down in Damascus and the
coastal city of Latakia on Friday.

According to the London-based Syrian Observatory for Human Rights,
Syrian security forces shot dead at least 34 demonstrators in the city
of Hama on Friday as they dispersed an anti-regime rally of more than
50,000 people.

During anti-government protests in Egypt in January, the Egyptian
authorities cut off access to the Internet in a move which Renesys
described at the time as unprecedented. Service was restored several
days later.



NY Rep. Weiner Hires Lawyer After Alleged Twitter Hacking


Democratic Representative Anthony Weiner has hired an attorney to
investigate the hacking of his Twitter account after a lewd photo was sent
to one of his followers, his office said on Tuesday.

"Look, this is a prank, not a terribly creative one and it's a
distraction," Weiner said on NY1 TV.

His office confirmed to Reuters that the New York congressman, who has a
high profile as an advocate of liberal causes, has hired an attorney to
advise him on whether or not he could press criminal charges as a result
of the alleged hack of his Twitter account.

Weiner said his account was hacked when a lewd photo of a man in bulging
boxer briefs was tweeted to a 21-year-old female college student in
Washington state over the weekend.

The posting was quickly deleted and Weiner made light of the incident on
his Twitter page.

"More Weiner Jokes for all my guests!" he tweeted with the hashtag
"Hacked!"

The student, Gennette Cordova, issued a statement to the New York Daily
News that denied she personally knew Weiner but said, "I am a fan."

She denounced rumors she was intimately involved with Weiner, who is
married to Huma Abedin, a longtime aide to Secretary of State Hillary
Clinton.

"All of this is so outlandish that I don't know whether to be pissed off
or amused, quite frankly," Cordova said in the statement.



Steve Jobs To Deliver Apple Keynote Next Week


Apple Inc. CEO Steve Jobs will take a break from medical leave to deliver
the keynote speech at next week's Apple conference, the company said
Tuesday.

The keynote will feature a new "iCloud" service, the company said. It
didn't explain what the service will do, but Apple has been in talks
with all four major recording companies on allowing users to store their
songs on Apple-run servers rather than on their home PCs, according to a
person familiar with the matter.

The person was not authorized to speak publicly on the deals and spoke
recently on condition of anonymity.

Jobs went on medical leave in January for unspecified reasons, handing
over day-to-day control to chief operating officer Tim Cook. Investors
were rattled because Jobs is seen as the creative force behind the
company, crucial to shaping hit products like the iPod, iPhone and iPad.

Even while on leave, Jobs has remained involved in larger decisions at
the company, and demonstrated the new iPad model at a news conference in
March.

Apple's annual Worldwide Developers Conference kicks off Monday in San
Francisco.

Jobs decision to appear at the conference indicates he believes iCloud
will be another breakthrough service for Apple.

ICloud could give users a wide array of music for their iPhones, iPads
and Wi-Fi-capable iPods, without having to connect them to their home
PCs to transfer songs. Google Inc. and Amazon.com Inc. have recently
launched similar services.

The Wall Street Journal reported Tuesday, citing unnamed sources
familiar with the matter, that iCloud would allow users to scan their
home music collections and have it duplicated in the "cloud" of
Apple-run computers. That would remove the time-consuming hassle of
having to upload every song to the online storage locker.

Eliminating that hurdle would give iCloud a leg up over the comparable
services from Google and Amazon.com, which requires uploads of existing
song collections. Neither Google nor Amazon has secured deals with the
recording companies.

It's unclear how Apple intends to make money from the iCloud service,
although a subscription plan seems likely.

Apple's statement also said the keynote speech will feature Apple's new
Mac software, Lion, and the next version of Apple's iPhone and iPad
software.

The June developers' conference has in years past been the opportunity
for Apple to reveal the year's new iPhone model, ahead of a retail
launch a few weeks later. But this year, analysts are speculating that
the new iPhone won't arrive until the fall. Apple launched a version of
the iPhone 4 for Verizon's network in February, and a June-July release
of a new model could disappoint new owners of that phone.

Tuesday's brief statement did not mention any new hardware.



AMD Unveils Windows-Powered HD Tablet Platform


Advanced Micro Devices unveiled a new semiconductor platform for
Windows-based tablets Wednesday. Like its larger rival Intel, which
announced its own Windows tablet platform Tuesday, AMD is pinning its
hopes on Microsoft being able to make a comeback on the operating-system
side of the tablet space currently dominated by Apple's iOS platform for
the iPad, iPhone and iPod touch.

Though Windows-based tablets were unveiled at the Consumer Electronics
Show last January, those first-generation products were unable to gain
market traction. Nevertheless, AMD and Intel believe the full Windows
ecosystem will eventually give Microsoft the leverage it needs to make a
winning tablet play.

The reality is that even the fast market responses with tablets using
Google's Android have so far left the iPad unchallenged, noted Al Hilwa,
director of applications development software at IDC. "There is probably
nobody more experienced in building large hardware and software
ecosystems today than Microsoft," Hilwa said. "So I have to believe that
they will be successful in the long run at evolving the PC into new areas."

Featuring support for HTML5, Adobe Flash 10.2, and external monitors,
AMD's new Windows-powered 2011 HD tablet platform is based on AMD's
latest Z-series application processor. Code-named Desna, the new Fusion
chip is equipped with dual one-gigahertz cores.

AMD's platform will give mobile workers full access to view, edit and
collaborate on documents created in Microsoft Office and other
business-related applications. What's more, it will support Microsoft
Office across multiple devices via Windows Live. And to enable IT
departments to safely offer tablets to their mobile workforces, AMD's
offering also integrates enterprise-level security.

AMD's 2011 HD tablet platform also features full compatibility with the
iPhone, Windows Phone 7, BlackBerry and other leading mobile devices.
"By compatibility, we're referring to the fact that you can sync with
these devices the way you can with your PC," said AMD spokesperson Phil
Hughes.

Right now, AMD's strategy is to support Windows-based tablets, Hughes
noted. "However, we are working with a company called BlueStacks that
enables users to use some of their Android applications on a Windows
tablet," he added. And as the tablet market matures, AMD said it will
continue to expand its options.

Given the big bite that tablet sales took out of PC shipments in the
first quarter, launching a successful tablet OS is a critical strategic
move for Microsoft. Still, Microsoft is staying focused on Mango, the
code name for the software giant's forthcoming update for Windows Phone 7.

More developers than ever are interested in creating apps for
Microsoft's mobile platform now that smartphone giant Nokia plans to
introduce a series of Windows Phone 7-powered devices, Hilwa said.
Meanwhile, Microsoft is working to ensure that when it unveils Windows 8
later this year it includes capabilities to make it an attractive tablet
alternative to Apple's iOS. "It's important for Microsoft to get its
formula right," Hilwa said.

The big question Microsoft faces is how to best engage the hardware
ecosystem to get high-quality products to market quickly - and with an
entirely new software model that has to excite new developers and ISVs,
Hilwa observed.

"If anything, the extra time has only made it clearer to the large body
of professional developers - which IDC counts at about 15 million
worldwide - [that they need] to come to terms with the transforming
software models we are now facing," Hilwa said.



Microsoft Demos New Windows '8' for Tablets, PCs


Microsoft Corp. demonstrated its new operating system at the D: All Things
Digital conference on Wednesday, a full version of Windows that will operate
on tablets and personal computers.

For now, it's called "Windows 8." Executives said that as mobile devices
have gotten more powerful, they are able to run the full version of Windows.

The operating system is "touch first," which means it responds to finger
swipes like other tablets, but will also respond to keyboards and mouses
if they are attached. The home screen consists of various blocks of
applications and looks like the Windows Phone interface.

Executives said more details would be unveiled at its developers
conference in September. They did not give a release date, but said the
operating system would not be released this fall.



Windows 8 Will Work With Existing PCs


Microsoft says Windows 7 users won't need bigger and better hardware to
run the freshly unveiled Windows 8.

The PC system requirements will be the same if not less than what's
needed to run Windows 7, although the new operating system definitely
appears tailored for the touch-screen interfaces of tablets.

Speaking at a press event at Computex in Taiwan yesterday, Microsoft's
Michael Angiulo said, "Windows 8 will be able to run on a wide range of
machines because it will have the same system requirements or lower" as
Windows 7. Microsoft Windows President Steven Sinofsky reiterated the
approach at the All Things D conference in California.

While current PC owners won't need to upgrade, Windows 8 appears to be
heavily skewed toward tablets and their touch screens. As evident in
PCMag's walk-through of Windows 8 , the interface borrows from
Microsoft's Windows Phone 7 OS for smartphones, with tiles and apps
optimized for touch. If you're using a regular desktop or laptop,
however, you'll still be able to navigate with a mouse and arrow keys
rather than swipes and pinches.

In addition to having the same requirements as Windows 7, Windows 8 will
run legacy Windows 7 applications. Clearly, Microsoft has learned the
lessons of the troubled life of Windows Vista, which was had
compatibility issues with existing systems when it was released. Many
businesses never upgraded to Vista because of its troubles, preferring
to stick with Windows XP. By ensuring that current PCs will run Windows
8, it should speed adoption of the new OS when it's released to the
public.

With Windows 8, Microsoft appears to have crafted a single OS that can
run on both PCs and tablets and their respective Intel-x86 and ARM chip
architectures. Whether such an approach is more successful than creating
completely different OSes for tablets - as Apple and Google have done -
won't be known until 2012, the tentative release date for Windows 8.



Apple Updates Mac OS X To Battle Malware Threats


Responding to a widespread fake antivirus program targeted at Macs,
Apple released Tuesday an update that will warn users and remove the
threat. The update is available for Macs running Snow Leopard Mac OS X
10.6, as well as Mac OS X Server 10.6.

In its Security Update 2011-003, Apple said the update, available via
Software Update or from Apple Downloads, refreshes the malware
definition on File Quarantine to include MAC Defender, the fake
antivirus malware, and provides for automatic, daily updating of known
definitions. Automatic updating can be disabled by the user. The update
also removes MAC Defender and known variants if the malware has already
been installed, and an alert will notify the user of that action.

Reports on the web Wednesday indicated that malware makers have already
circumvented Apple's update by changing the name of the malware file to
mdinstall.pkg. The move could be short-lived if Apple adds the file name
to its new daily update of malware definitions.

Apple said files downloaded via Safari, iChat or Mail are checked
against a list of known malware that includes viruses, worms, Trojan
horses, and other malicious software. If a file is found to be on the
list, the Mac OS X update displays a dialog prompting the user to move
it to the trash. The list is stored on the computer and, with the
update, refreshed daily.

For years, Macs have enjoyed the reputation that they weren't
susceptible to the many kinds of malicious software that have plagued
Windows machines, because of the inherent strength of Mac OS X. Many
observers have also argued that, because the installed base of Macs was
so small, it wasn't worth the effort for a self-respecting hacker.

Chris Christensen, an analyst with IDC, said the myth of the Mac's
invulnerability to hacking attacks "still largely stands in public
perception," although they were "never technically invulnerable."
Rather, he said, it was because their installed base was too small, but
now the Mac's usage, transactional functions, and larger installed base
present a tempting target to attackers.

Christensen added that he has to "give Apple credit" for its quick
response to this vulnerability.

According to Mac security firm Intego, MAC Defender targets Mac users
primarily through "SEO poisoning attacks," in which web sites with
malicious code use search-optimization tricks to rank at the top of
search results. A user who clicks on a malicious search result is sent
to a web site that shows a fake screen and a fake malware scan, after
which it tells the user that the computer is infected.

JavaScript on the page automatically downloads a compressed ZIP file. If
the user has been using Safari and the "open safe after downloading"
option in Safari is enabled, the file is unzipped and the user is
presented with an installer window for which the user's administrative
password is required.

If the user proceeds with installation, MAC Defender launches. Intego
describes the application as "very well designed," with a professional
look, a number of different screens, attractive buttons, and correct
spelling.

Once installed, MAC Defender indicates the computer is infected and
opens web pages for pornographic sites every few minutes. To counter the
"virus," the user is prompted to buy MAC Defender's "antivirus"
protection service.

After a credit-card number has been entered into a license-purchasing
page, the virus warnings stop. But there is no service, and the user has
just given the malware authors his or her credit-card information.

Intego recommends not installing the application to begin with, of
course, and to uncheck the "open safe" option in Safari or other browsers.

A variant of MAC Defender, called MacGuard, has also been reported. It's
placed in a user's Applications folder - which doesn't require an
administrator's password - instead of the normal location in the
system-level folder.

If a user has set Safari to automatically launch downloaded files - the
"open safe after downloading" option - the malware's installer will
launch. If not, users will see a downloaded ZIP archive and may
double-click on it to find what's in it, which leads to the installer.



Web Users Worry About Snooping Businesses


It's not Big Brother, but "big business" that Internet users are more
worried about.

A new survey found that nearly half of Internet-connected Americans age
16 and older worry about businesses checking what they do online. By
comparison, 38 percent worry about the government doing so.

Not that those concerns are stopping people from using the Internet for
shopping, social networking and a smattering of other activities.

The latest study from the Center for the Digital Future at the
University of Southern California found that 82 percent of Americans use
the Internet, the same as in 2009.

On average, they spend more than 18 hours a week online - for browsing
the Web (79 percent), for banking (47 percent) and for social networking
and video-sharing (46 percent).

In the decade that the Digital Future researchers have been tracking
Americans' Internet use, social networks were born, and many of them all
but died (anyone remember Friendster?). People have gotten used to
migrating more of their activities online and accessing the Internet
from more devices than ever.

"When we started our work 11 years ago, the Internet was almost
completely PC-based. We used to compare it with TV," said Jeffrey Cole,
director of the Center for the Digital Future.

People would use the Internet - dial-up service, back then - the way
they watched TV: sitting down in front of the screen for 30, 60 minutes
at a time.

Not any more.

"We think PCs are slowly going away" except for the heaviest users, such
as those using it for computer-assisted design, editing or heavy
writing, Cole said. "Wireless, mobile Internet is becoming the Internet
for most people."

Among other findings in the survey, conducted from April 27 to Aug. 30,
2010:

* Of the 18 percent of Americans who are not using the Internet, 7
percent cited cost as a reason. A quarter said they don't go online
because they don't find it useful or have no interest. And 37 percent
said they didn't have a computer or Internet connection.

* 21 percent of non-users said they were excluded from communications
among their friends and disadvantaged in obtaining information for work,
studies or hobbies as a result of not going online. Still, 66 percent of
them said they are not likely to go online within the next year.

* 68 percent of adult Internet users go shopping online. Books and gifts
are the most popular categories, followed by clothes and travel.

* People are still worried about privacy when shopping online, though
fewer respondents said they were very concerned or extremely concerned
than the year before: 48 percent compared with 54 percent in 2009.

* Email is still nearly universal. Even the texting generation uses this
somewhat antiquated method of communication: 98 percent of Internet
users under 17 said they email, compared with 95 percent of those aged
18 to 24. The lowest level of email usage, 94 percent, was among 45 to
54-year-olds.

The latest survey of 1,926 people aged 12 and older has a margin of
error of plus or minus 2.2 percentage points.

A separate survey, from the Pew Internet & American Life Project, found
recently that 13 percent of adult Internet users have used Twitter, up
from 8 percent in November 2010. A higher percentage of African
Americans and Latinos use Twitter than white people - 25 percent, 19
percent and 9 percent, respectively.

The Pew survey was conducted April 26 to May 22 among 2,277 adults and
had a margin of error of plus or minus 3.7 percentage points.



Burglary Victim Remotely Controls His Stolen Laptop To Photograph
Thief - and Then Hands Image to Police Who Arrest Him


A designer who had his laptop stolen helped police by using a spy camera
programme to take pictures and catch the thief red-handed.

Joshua Kaufman thought he had lost his Apple MacBook when a thief broke
into his apartment and stole the computer in March.

And with police giving his burglary report a low priority, he was
resigned to never recovering the expensive laptop until he remembered
the software he had installed on his MacBook.

Using 'Hidden' software, he remotely took pictures of the thief using
his stolen computer - before handing the evidence to police to make an
arrest.

Mr Kaufman captured the thief in a variety of bizarre locations -
including using the stolen MacBook in bed, and in his car.

'Hidden' also provided him with location information, which police in
Oakland, California, used to identify the thief as a taxi driver.

Officers then caught the thief by arranging for a 'pick up' from his car
firm and arresting the man when he appeared in person.

Mr Kaufman said he started using the software once he realised his
laptop had been stolen when the thief got into his apartment through an
open window on Monday, March 21.

He also lost a Kindle and some jewellery stuffed into a computer bag.

A few days after activating the program he started receiving pictures
revealing the hapless thief in action.

Mr Kaufman said: 'The following Thursday I started getting images and
location information.

'I was amazed. I was, like, this thing actually works!'

The thief was captured using Mr Kaufman's computer to browse Middle
Eastern music videos, changing the laptop's account information and even
typing a password to get on Facebook.

Joshua Kaufman was able to track down his stolen MacBook thanks to a
security application called Hidden.

Hidden is a theft tracking application for the Mac operating system

After installing the Hidden software, it lies dormant on the computer
until the user goes to the Hidden website to report it stolen,
activating the tracking software.

It can not only take pictures of the thief using the built-in webcam,
but also send screenshots of the computer in use, internet history and
the machine's location plotted on Google maps.

Hidden's makers boast that their software works worldwide, so whether
the computer is stolen in London, New York or Buenos Aires, its owner
can track it down and get it back.

To get the most out of hidden, the developers recommend setting up and
enabling a separate password-free guest account.

This runs contrary to the usual computer security advice, but it makes
sense with Hidden. The thief must actually be able to use the computer
so the software can gather the information it needs to track it.

With all the information captured, all that remains to be done is to
call in the police.

But his one-man investigation hit an obstacle when police told him they
didn't have the resources to follow up his complaint - despite him
telling officers exactly where the thief was.

It was only when he created a blog - 'This Guy Has My MacBook' - which
generated support from thousands on the internet, that police were
forced to revisit the case and eventually catch the thief.

Mr Kaufmanadded: 'I was excited, honestly - it feels like the power of
the Internet is on my side.

'They (Oakland Police department) said, we're really sorry you fell
through the cracks.'

Mr Kaufmansaid he was told by Holly Joshi, OPD's director of public
relations: 'We have about 2,400 theft reports that come in per month,
and three theft investigators.'

After two months of ignoring Mr Kaufman's information, Oakland Police
finally nabbed the thief on Tuesday night after he was caught on camera.

Hetweeted shortly after: 'ARRESTED! An Oakland police officer just
called me to let me know that they arrested the guy in my photos! BOOYA!'

Later, he tweeted: 'This just in: MacBook acquired by the OPD! The
officer was so kind on the phone: "It's these kinds of partnerships that
make things happen".'



Boy Regrets Selling His Kidney To Buy iPad


A 17-year-old student in Anhui Province sold one of his kidneys for 20,000
yuan only to buy an iPad 2. Now, with his health getting worse, the boy is
feeling regret but it is too late, the Global Times reported today.

"I wanted to buy an iPad 2 but could not afford it," said the boy surnamed
Zheng in Huaishan City. "A broker contacted me on the Internet and said he
could help me sell one kidney for 20,000 yuan."

On April 28 Zheng went to Chenzhou City in neighboring Hunan Province for
the kidney removal surgery arranged by the broker. His parents knew
nothing about it, Zheng said. He was paid 22,000 yuan after his right
kidney was taken out at the Chenzhou No. 198 Hospital.

When he returned home, his mother found out and reported to the police
immediately. But they could not locate the broker whose cell phone was
always powered off, the report said.

It turned out that the Chenzhou No. 198 Hospital was not qualified to
perform organ transplant. The hospital claimed they had no idea about
Zheng's surgery because the department that did the surgery had been
contracted to a Fujian businessman.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT