Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 10 Issue 32

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 10, Issue 32 Atari Online News, Etc. August 8, 2008


Published and Copyright (c) 1999 - 2008
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1032 08/08/08

~ Olympics Ticket Scam! ~ People Are Talking! ~ Why Attack DNS?
~ We're All Vulnerable! ~ New Mac A/V Is Free! ~ Mozilla's Aurora!
~ Google Soured on AOL! ~ AOL Split Confirmed! ~ ACEC Swap Meet Nears!
~ Wii MotionPlus: Cheap! ~ Sega's 'Beijing 2008'! ~ id: New Doom Coming!

-* Hackers Convene in Las Vegas *-
-* Yahoo Election Shows Protest Vote! *-
-* Beijing Travelers Are Warned of Web Spies! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



It's the weekend again, so that means more thunder and lightning, and,
of course, more rain! We're about 5 inches above normal for the year,
and climbing. It's a good thing that I listened to the weather report
last night. I went to work, and made sure that I had my rain gear with
me. Nothing worse than getting caught out on the golf course when the
clouds open up! It happened today - it started sprinkling, so I put on
my gear, and watched the golfers. One foursome had a middle-aged woman
among them. The rains came, and her poor husband had to hold an
umbrella over her head during every shot! I heard her telling another
player that she had just got her hair done earlier in the day, and didn't
want to ruin her new hairdo!! What a riot!

Let's get on with this week's issue - it's much better than the weather
that we're experiencing right now!

Until next time...



=~=~=~=






->A-ONE User Group Notes! - Meetings, Shows, and Info!
"""""""""""""""""""""""



ACEC Swap Meet September 13, 2008


ATARI COMPUTER ENTHUSIASTS
OF COLUMBUS, OHIO
VINTAGE COMPUTER AND VIDEO GAME SWAP MEET

September 13, 2008
9:00 a.m. - 3:00 p.m. EDT
Oakland Park Community Center
980 Lenore St.

All vintage and classic computers, video games, systems, accessories,
games, and software invited!

Vendor and Flea Marketeer donation: Free!
Shoppers and onlookers donation: Free!

Further info:
chwbrown@ee.net Charles (614) 447-9789
rarenz@columbus.rr.com

http://www.angelfire.com/oh4/acec/acec.html



=~=~=~=



PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org



Hidi ho friends and neighbors. I gotta tell ya, the UseNet is getting
scary out there. It's been a good, solid month since I used UseNet
messages in the column here. To be fair, I've missed a couple of weeks
because of illness (darned stomach flu) but nonetheless, even with a
timespan quadruple the usual, there are less than 40 new messages in
the newsgroup.

That makes me kind of sad... not because it hurts this column, but
because it kind of signals the undeniable end of an era. Heck, Atari
hasn't made a computer in more than a decade, and we're seeing the
effects of that.

Intellectually, I understand the reason for the drop in messages, but
psychologically and emotionally, it's tough. Atari computers have been
a huge part of my life. If not for Atari computers, I wouldn't have met
several people who've become some of my closest friends.

But that's what we're left with, my friends. We're in a situation now
where all but a very very few Atari users have a high expertise level
that you'd normally only see in the top few percent of a group. Most of
us have been using our STs, Megas, Falcons and TTs for years and years,
and we know the ins and outs of the hardware, the OS and the software.
There isn't usually much need for most of us to ask "how to" questions.
The one exception to that is 'modding' the machines... like adding
flashcard storage in lieu of an actual hard drive or something like
that. It's very rare that we see a NEW Atari user.

Of course, there's another possibility too. If you get a chance, read
this article entitled "R.I.P Usenet: 1080-2008" at:
http://www.pcmag.com/article2/0,2817,2326848,00.asp

I think it's a bit pessimistic and overblown, but it's informative
nonetheless.

Well, let's get to the news, hints, tips and info from the dead UseNet.


From the comp.sys.atari.st NewsGroup
====================================


Have you ever noticed that the actual size of a file can be different
than the amount of space that file takes up on your hard drive? There
are reasons for that, and it's something you often have to keep in
mind. But Jo Even Skarstein tells us:

"... I'm not interested in the peculiarities of the filesystem, I
want to know the size of the files. When manipulating/copying/moving
files around, there are two things of interest:

1. The size of the files themselves.
2. The amount of available space on the destination drive/partition. "


'PPera' tells Jo Even:

"But much depends from file count too - a lot of short files will
occupy much more space on target. So, for exact prediction before
starting copy you need to know cluster size of target, and size of
each file to copy.

Then, information about how much space is allocated on drive by files,
directories may be useful too. Not by copying exactly, but in
partition Info certainly. Win XP gives both info: sums and allocated
space."


Jo Even adds:

"You can sum the numbers of full clusters used in one 32 bit integer,
and the remainder in another 32 bit integer. Unless you have an awful
amount of very small (i.e. smaller than the size of a cluster) files
this should work with very large collections of files."


Francois Le Coat asks about interest in a very special kind of
emulator... ummm... virtual machine:

"I just bought an Apple 3G iPhone, and was wondering whether someone
would be interested to port ARAnyM on this small computer hosted with
a sort of Mac OS X, and having the power of a machine from year 2000.

There's an open SDK available for it, and I'm not measuring the effort
at the moment. So if you have some experience with this kind of embedded
developments please give ones opinion, you're welcome.

ARAnyM already runs on my Linux Vaio laptop, on my 1.25GHz G4 MDD and on
my PlayStation 3 (Linux). The point is iPhone has a tactile interface."


'Eric' tells Francois:

"Last I knew Apple will not allow emulators on the iPhone platform so
any port would require a jail-broken iPhone."


Didier Merquignon adds:

"Personally I have some ideas for use another embedded processor
(Freescale MPC5121e):

http://www.mtcera.com/product/img/05.jpg

there are more Mips by Mhz (Debian Linux)."


Francois tells Didier:

"How strange ! It would be the first time a big-endian configuration
embedding a Coldfire processor would be so called a "Personal Computer".

The 3G iPhone is powered with an ARM processor, and the hosted OS is
a Berkeley Software Distribution Unix, am I wrong?

Big-endian Unices are coming back again, for everyday life customers.
That's really interesting, indeed."


Didier explains:

"Hum.. before Feescale...
MCF was Motorola ColdFire.
MPC was Motorola PowerPC.

The fastest coldfire is always the v4e at 266 MHz (PFU & MMU), 3 or 4
years old now.

Here it's not a fastest PPC, it's an e300 core clocked at 400 MHz, but
it's an SOC (System On Chip) to reduce chips on the motherboard. It's a
tri-core because there are also on the chip an ALE (32 bits core for
audio), and a 3D graphics engine. On the chip because it's a
microcontroller there are also (like the coldfire) CAN, ethernet, PSC
(programmable serial controllers), USB, SDRAM DDR controller, DMA, PCI.
But here also on the chip PATA, SATA, S/PDIF, DIU (display interface
unit), etc.. A total of 516 pins on the chip."


Guillaume Tello receives his Eternec card and posts:

"I need some help to setup an Ethernec Card:

http://pagesperso-orange.fr/gtello/ethernec.jpg

Can you, looking at the picture, tell me:
- what is the good orientation to plug it into the rom port? (A or B?)
- what is the correct orientation of the ISA card? (C or D?)

What kind of Ethernet card can be used? I have:
- an Etherlink III (3Com)
- a common ethernet with chip APX EDI 95C02

What cable must be used for a computer to computer link? (no computer to
modem)."


Lyndon Amsdon tells Guillaume:

"D looks right, I can't 100% say as I've not seen this version
before.

Use Realtek RTL8019AS and if it is jumperless, use a PC to set it up
to port 0x300.

Crossover network cable."


'Ggnkua' adds:

"From what I gather, any ISA card which is NE2000 compatible should
work."


Daniel Aqua asks about his TT030:

"I've been reading that Atari manufactures two Atari TT Models. The
early 16Mhz models and the later 32mhz editions. How can one tell the
CPU speed of the TT they are running? Also, did the later TT's have
the 1.44 MB drives or the 720KB?"


Rodolphe Czuba tells Daniel:

"The first MSTE & TT were with 720 KB units because of the TOS 2.01 and
3.01 that was not able to manage 1.44.
With TOS 2.05/2.06 & 3.05/3.06 (for TT), the floppy is ok with 1.44. But
sure you need a 1.44 unit AND to put ON the 6 th dip switch under the
HDD place on the mb.

PS : The first MSTE mb have a hardware bug with a missing trace on the
PCB AND a bug in the UA02 GAL."


Lonny Pursell adds:

"Mine arrived with the 1.44mb drive when I bought it new."


Rodolphe adds:

"Only CPU is 32 MHz on some late machines... the bus is 16 MHz on all
TT. And the ST-RAM & TT-RAM accesses are 16 MHz....on all machines....
I just heart at the moment that the last rev of the mb (rev. H) are 20%
faster....but I never get the info WHY. TT was a bad machine in 1990,
surely a good in 1988."


'Ggnkua' comes up with a concrete way to answer the original question:

"You can use a program like sysinfo to check out the cpu frequency I
guess."


Well folks, that's it for this time around. Kind of depressing that four
weeks' worth of messages boils down to still be a little light, but
hey, I'll take what I can get.

Tune in again next week, same time, same station, and be ready to listen
to what they are saying when...

PEOPLE ARE TALKING



=~=~=~=



->In This Week's Gaming Section - Wii MotionPlus Will Be Cheap!
""""""""""""""""""""""""""""" id Working on New Doom!
Sega's 'Beijing 2008'!




=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Iwata Says Wii MotionPlus Will Be Cheap


Nintendo's biggest announcement at E3 wasn't a game, but an accessory:
the Wii MotionPlus, which will plug into Wiimotes and add more accurate
motion control capabilities.

But this then raises the obvious question: How will Nintendo convince
the millions of current Wii owners to buy this doohickey and avoid
splintering their user-base? Speaking to the Wall Street Journal today
(via Kotaku), Nintendo president Satoru Iwata gave one potential answer:
the MotionPlus will be cheap.

"There will be games that will be enhanced by the Wii MotionPlus as well
as games that can only be played with it," Iwata said. "Users will need
four if they have four controllers, but we're going to try to offer it
for as little as possible. We haven't announced the price yet, but the
cost of making the Wii MotionPlus is not that much, so I think we can
make it very affordable."

Nintendo has also stated that they may build the MotionPlus technology
into new Wiimotes, ensuring that all future Wii sales will bring the
extra MotionPlus features with them. But if you're still weary of
keeping pace with the rate at which Nintendo releases new Wii
accessories, don't worry - Iwata said there are no more add-ons in the
works. "Most of the ideas for accessories that we had initially come up
with are out now. We might think up some more, and we might make them if
we do, but we don't have any plans to release a whole lot more."

In an interesting side note, Iwata was also asked about the Wii's
eventual successor. "The hardware team started work on the next thing as
soon as they were done with their previous project, but what they think
up doesn't necessarily become a product," Iwata answered. "We only turn
something into a product after it's been thoroughly vetted inside the
company. We're not at a point where we can give specifics, but of course
we're working on it."

At the rate that Wiis are still selling, though, we'd be shocked if this
vetting process ended any time soon.



Whatever They Call It, It Spells 'Doom'


Game developer id Software is kicking it up a notch. The Mesquite, Texas,
firm has begun working on the next Doom game, in addition to putting the
finishing touches on its first-person action game Rage (for the Sony
PlayStation 3, Microsoft Xbox 360 and Windows and Mac PCs). CEO Todd
Hollenshead will provide an update this weekend in Dallas at the 13th
annual QuakeCon. "We are calling it the new Doom for now," he says.
Doom 3, released in 2004, sold more than 3.5 million copies. "It may be
Doom 4 or it might not be Doom 4, or it may be Doom with a subtitle or
something descriptive of the setting," says Hollenshead, who would not
reveal any story details.

The company has many projects in the works. A free Quake Live Web-based
game is set to go public soon (quakelive.com). A Wolfenstein RPG
cellphone game is complete, while work on a new mobile Doom RPG 2 game
has begun. A reimagining of the 1991 sci-fi Nazi fighting game
Wolfenstein is in production (id is overseeing its development by Raven
Software) for the PS3, Xbox 360 and Windows PCs.



Sega Capitalizes on Olympics with 'Beijing 2008'


The Beijing Olympics are about to get under way. And thanks to NBC and
its assorted networks and Web sites, you'll be able to spend the next
two weeks pondering the intricacies of sports you never cared about
before.

Table tennis? Water polo? Badminton? I'm far more interested in watching
obscure athletes take their shot at glory than in watching Kobe Bryant
and the Redeem Team try to break the U.S. basketball jinx.

And when video games become an Olympic sport, I'll be ready. My prime
"Quake" deathmatch days will probably be long past, but maybe NBC will
invite me to provide expert commentary. Until then, I can participate in
Olympic competition the same way I've come to enjoy football, baseball
and auto racing: with a joystick in my hands.

* "Beijing 2008" (Sega, for the Xbox 360, PlayStation 3, $49.99): Sega
has the official Olympics license this year, and this is the publisher's
second crack at simulating the summer games. The lighthearted "Mario &
Sonic at the Olympic Games" was a diverting collection of Wii minigames,
but "Beijing" takes a more serious approach that may turn off casual
sports fans.

There are 38 events in this package, including track and field, aquatics
and gymnastics. The racing events all require similar technique,
requiring you to rapidly push two buttons to simulate running or
swimming. (Fans of Konami's '80s-era "Track & Field" games will feel
right at home.) Gymnastic events ask you to duplicate onscreen patterns,
like "Dance Dance Revolution" without a floor mat. And events like
discus or pole vault each have their own control schemes.

All the action is beautifully presented, which almost distracts from the
game's biggest flaw: It's very difficult. "Beijing" starts you off with
ridiculously weak characters (considering they're supposed to be
Olympic-caliber athletes), and it takes a long time to build them up to
a competitive level. That's OK if you're playing with friends and
everyone's sluggish, but the single-player mode is bound to frustrate
all but the most dedicated Olympics followers. One-and-a-half stars out
of four.

* "Big Beach Sports" (THQ, for the Wii, $29.99): You don't have to be a
world-class athlete to participate in "summer games"; when school's out
and the days are long, anything you play in the backyard or at the beach
fits the definition. "Big Beach Sports" brings six outdoor challenges -
volleyball, disc golf, cricket, bocce, soccer and football - to the Wii.

As with every other "Wii Sports" wannabe that's come out over the last
two years, the games here are a mixed bag. Disc golf is pretty good,
requiring you to develop a decent sidearm throw, and volleyball
duplicates the set-and-spike action of the real thing. Even if you're
not familiar with bocce, it makes for a fun head-to-head competition.

However, soccer and football (even two-on-two) aren't well-suited to the
Wii remote, and the inclusion of cricket in an American game is just
weird. And even the sports that work aren't likely to hold your interest
for long. "Big Beach Sports" is a passable party game, but doesn't have
the substance to satisfy a solo player. One star.

* "Summer Sports: Paradise Island" (Destineer, for the Wii, $29.99): The
games featured in this anthology - badminton, volleyball, miniature
golf, horseshoes, lawn darts, basketball and croquet - are the ones
you're more likely to see Americans playing during their summer vacations.

Unfortunately, only a few of them are well-executed enough to make you
want to stay inside and play on a hot day. Paradise Island looks like an
inviting place, but beneath the lush tropical scenery lurks some
dreadful programming. In lawn darts and horseshoes, for example, you're
supposed to mime throwing with the Wii remote, but the game doesn't seem
to register how hard you're throwing. Likewise, there's no connection
between the way you swing the remote and the animations in volleyball
and basketball.

Mini-golf and croquet are more accurate, and almost fun to play. But
when you can play all these games (except for lawn darts) for less money
in real life, why bother with the virtual versions? No stars.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Beijing Games Hit by Internet Ticket Scam


Sports fans around the world have been swindled by an international
Internet scam which offered thousands of bogus tickets for the Beijing
Games, Olympic officials said on Monday.

The International Olympic Committee (IOC) announced it was taking action
to shut down the fraudsters, but the move came too late to help the
victims find replacement seats at the Games.

Among those left out of pocket were the families of Olympic athletes in
both Australia and New Zealand, with people in the United States, Japan,
Norway, China and Britain also reportedly conned by the sophisticated sting.

"We cannot accept people paying money for tickets and not getting them,"
said Gerhard Heiberg, an IOC executive board member.

Heiberg said the issue was raised last week, with both the IOC and the
United States Olympic Committee filing a lawsuit on Friday in a district
court in California, accusing at least six websites of selling
illegitimate or nonexistent tickets.

However, a U.S. lawyer who said he had lost $12,000 in the fraud,
accused the IOC of complacency.

"They have known about these sites for months and months and did
nothing," said Jim Moriarty, the partner of a Houston-based law firm
which is looking to represent fellow victims in any subsequent legal
actions.

"They have dashed the hopes and dreams of thousands of people who have
been planning for years to go the Games, and have already paid thousands
of dollars for airfare and what they thought were legitimate tickets,"
he told Reuters.

Despite last week's IOC suit, one of the sites accused of fraud -
www.beijingticketing.com - was still operating on Monday, offering
seats for numerous events, including Friday's opening ceremony, with
prices topping $2,150.

The professional-looking site, which carries the official Beijing Games
logo, provides a London phone number, which rang dead on Monday, and a
U.S. address in Phoenix, Arizona.

Australia's Olympic Committee (AOC) offered commiserations but no
solutions to the scores of Australians left out of pocket.

"Our sympathy goes to them ... but we certainly aren't in a position to
step in, compensate or find other tickets," AOC chief John Coates said
on Monday.

"We warned folk to only deal with authorized ticket suppliers," he told
a news conference.

The press reported that some Australian nationals had been swindled out
of almost $45,000. Moriarty said one unnamed individual had lost $57,000.

"The worst thing is that some people don't even know yet that they
bought tickets that won't arrive," he said.

"Some were told they could pick up the tickets at an office in Beijing,
and they won't be there. My guess is they sold thousands of tickets that
don't exist."

Tickets for events in host city Beijing completely sold out last week,
Games organizers said, leaving only seats for competitions in co-host
cities still available.

Many tickets are still being offered on the e-Bay auction website, but
Australia's Coates urged caution.

"There may be tickets on eBay that are delivered ... but I think it is a
great risk. That would be my message," he said.



US Intelligence Alerts Travelers to Cyber Spies


A US intelligence office Friday warned Americans traveling to the
Beijing Olympics or elsewhere to expect cyber spies to surreptitiously
compromise their laptops, cellphones, and other electronic devices.

The unusual advisory issued by the National Counterintelligence
Executive (NCIX) did not single out China by name, but the head of the
office did in a press release and a television interview.

"Somebody with a wireless device in China should expect it to be
compromised while he's there," Joel Brenner, head of the NCIX, told CBS
television.

Brenner said the Chinese public security services can activate a
person's cellphone or Blackberry when he or she thinks it is off, and
use it as a microphone.

His suggestion is to remove the battery. Or better yet leave it at home.

"If you can do without the device, don't take it," his office's advisory
said.

A press release quotes Brenner as saying the security advice "applies to
travel to virtually any overseas destination, from a Mediterranean beach
to this month's Olympic Games."

The advisory said travelers should have no expectation of privacy in
Internet cafes, hotels, offices or public places, adding that phone
networks and hotel business centers are regularly monitored in many
countries.

All information sent electronically - by fax, personal digital
assistant, computer, or telephone - can be intercepted, the advisory said.

"Wireless devices are especially vulnerable," it said.

Security services and criminals can then insert malicious software
wirelessly, it warned.

"When you connect to your home server, the 'malware" can migrate to your
business, agency, or home system, can inventory your system, and send
information back to the security service or potential malicious actor,"
it said.

Malware can also be transferred through USB sticks and computer disks.

"Corporate and government officials are most at risk, but don't assume
you're too insignificant to be targeted," the advisory said.



Security Geeks, Hackers Convene in Vegas


Thousands of network security professionals are in Las Vegas for the
annual Black Hat Briefings computer security conference, which will be
immediately followed by the DEFCON hacker convention. Both events focus
on network and Internet security issues. The Black Hat conference is
held at Caesars Palace Las Vegas Hotel & Casino, while DEFCON is at the
Riviera Hotel & Casino August 8-16.

Black Hat is targeted to more mainstream professionals; for example,
security experts from the Department of Homeland Security are scheduled
to speak. Meanwhile, DEFCON has a looser, more underground reputation:
Its schedule is peppered with hacker challenges and hacking contests.
Paid delegates to the Black Hat conference can attend DEFCON for free.
Conference organizers expect between 5,000-7,000 attendees this year.

At Black Hat, the keynote speaker this year is Ian Angell, a professor
of information systems for the London School of Economics. His topic:
the mix of computer and human activity on the network spawns not only
computer security but also institutional security issues. Also slated to
appear in a keynote event is Rod Beckstrom, director of the National
Cyber Security Center for the Office of Homeland Security.

The most anticipated presentation at the show, however, will be
IOActive's Dan Kaminsky when he unveils details of the flaw he
discovered in Domain Name Service software. The flaw had been kept under
wraps in an attempt to proactively convince major network suppliers and
operators to patch the flaw before information about it was made public.
Unfortunately, the flaw was leaked to the public on a blog site, and the
race was on to patch servers before hackers could exploit the
vulnerability.

Kaminsky is expected to detail the flaw, its discovery, and what
measures have been taken to patch the vulnerability. Weeks after the
public disclosure of the flaw, some systems are reported to be still
unprotected.

Other important presentations include details on past attacks of Cisco
routers, with a live demonstration of infecting switch-operating
software with viruses, and research from HP on how malware may be able
to evade detection software.

Black Hat also offers training events for participants on topics such as
advanced Web-penetration testing and effective intrusion testing of
networks. Some training sessions are extremely intensive, multi-day
events.


Again, DEFCON is a looser event, with wild competitions and events in
store for attendees. The most novel this year is an invitation to hack
conference badges - those ubiquitous name tags everyone is forced to
wear around convention halls. According to information on the DEFCON Web
site, "The DEFCON Badge Hacking Contest awards the top 3 most ingenious,
obscure, mischievous, obscene, or technologically astounding badge
modifications created over the weekend. No longer just a boring piece of
passive material, the badge is now a full-featured, active electronic
product, and it exists for your hacking pleasure." Other "invitations to
hack" include a wireless network, Capture the Flag hack and a hardware
hacking village.

Both DEFCON and Black Hat were founded 15 years ago by Jeff Moss, former
director of the Secure Computing Corporation.



Kaminsky Provides The Why of Attacking DNS


Speaking before a packed audience, researcher Dan Kaminsky explained the
urgency in having everyone patch their systems: virtually everything we do
on the Internet involves a Domain Name System request and therefore is
vulnerable.

Expectations ran running high before Wednesday morning as Kaminsky,
director of penetration testing for IOActive, had revealed little about
his DNS vulnerability up till then. That didn't stop others from trying
to figure it out. But that actually helped Kaminsky in the end; it meant
during his speech, he was able to skip the what and go directly to the why.

Security researchers always thought it was hard to poison DNS records,
but Kaminsky said to think of the process as a race, with a good guy and
bad guy each trying to get a secret number transaction ID. "You can get
there first," he said, "but you can't cross finish line unless you have
the secret number."

The question is why would someone bother? Well, Kaminsky talked about
how deeply embedded DNS is in our lives. Kaminsky said there are three
ages in computer hacking. The first was attacking servers (for example
FTP and Telnet). The second was attacking the browsers (for example
Javascript and ActiveX). We're now about to enter the third age, where
attacking Everything Else is possible.

We know that if we type a name.com into a browser, the DNS resolves it
to its numerical address. But what we don't realize is that same process
occurs when we send e-mail or when we log onto a Web site. These also
require DNS lookup.

Kaminsky then detailed how various security methods on the Web can be
defeated if one owns the DNS. For example, if a site wants to establish
a Trust Authority Certificate with the Certificate Authorities, they use
e-mail to confirm the identity of the requester. He also said that it's
possible to poison Google Analytics and even Google AdSense, which also
rely on DNS lookup.

Prior to the patch, the bad guy had a 1 in 65,000 chance of getting it
because the transaction ID is based, in part, on the port number used.
With the patch, the chances decrease to 1 in 2,147,483,648. Kaminsky
said it's not perfect, but it's a good enough start.



New Yahoo Election Tally Reveals Big Protest Vote


Yahoo Inc on Tuesday released a recount of the vote for its board that
sharply altered the results, revealing a strong protest vote against
five of nine directors including CEO Jerry Yang.

The Internet company said revised vote tallies showed 33.7 percent of
votes withheld for Yang, the company's co-founder, with 66.3 percent in
favor of him remaining on its board.

Yang has been under pressure for months over failed attempts by
Microsoft Corp to buy the company and over questions about his
leadership, but Friday's shareholder vote had suggested the tide was
turning in his favor. The initial tally showed 85 percent of votes going
to Yang.

The stunning new twist in the saga of Yahoo came after one its largest
and most critical shareholders, Capital Research Global Investors,
called on Monday for a probe of last week's shareholder vote after
finding discrepancies in the results.

Yahoo said it had been informed by Corporate Election Services, the
company's inspector of elections, that Broadridge Financial Solutions, a
proxy voting intermediary for major investors, had made significant
errors in reporting votes at its annual shareholder meeting.

Three other directors, including Yahoo Chairman Roy Bostock, also had
strong protest votes, with nearly 40 percent of votes withheld for
Bostock, 38 percent withheld for director Ron Burkle and 32 percent
withheld for Arthur Kern.

The three are members of the company's compensation committee and have
born the brunt of criticism for the company refusing to do more to link
executive pay to performance as corporate governance critics have
demanded.

A fifth board member, Gary Wilson, the former chairman of Northwest
Airlines, had 28 percent of votes on his reelection withheld.

The remaining four board members - Vyomesh Joshi, Eric Hippeau, Robert
Kotick and Mary Wilderotter - all received strong endorsements, with
each winning more than 90 percent of votes in favor of their reelection.

Ahead of the August 1 meeting, Kotick said he planned to resign shortly
after the meeting as part of a settlement deal with proxy challenger
Carl Icahn in which Icahn and two members of a slate proposed by the
billionaire investor would join an expanded board of 11 members instead
of the previous nine.

Gordon Crawford, whose Capital Research Global Investors owned 6.2
percent of Yahoo as of early June, said in May he was "extremely angry"
at Yang over the breakdown of talks with Microsoft.

Critics of corporate voting technology have called for a system
overhaul, said the counting process was complicated and lacking in
transparency.

In a statement, Broadridge acknowledged the error, but said it was an
isolated incident and that it did not change the outcome of the election
of the company's directors.

"Upon review, it was determined that there was a truncation error in the
final printout sent to the tabulator," said Chuck Callan, Broadridge's
senior vice president of regulatory affairs. "This resulted in the
under-reporting of shares withheld for certain directors," he said.



Mozilla's Aurora Shows Concepts for Future Browsers


Like cars, buildings and airplanes, browsers can have concept models.
That's the idea behind Aurora, a new "concept browser" from the Mozilla
Foundation.

Emanating from the Mozilla Labs initiative, where users are encouraged
to offer new browser ideas, the concept is available in video
visualizations. In the videos, Aurora envisions a variety of new
interaction models that push the concepts of collaboration, real-world
interaction, and context.

For instance, weather data can be collected as a user-controllable
object, dropped onto a screen where it displays a graph, and then
dragged to a desktop. The basic thrust of this video is that two people
are finding, exchanging and examining data as they might do with
physical materials.

Another clip demonstrates a futuristic bookmark system. Folders of
bookmarks are represented by small page images in a row at the top of
the page, and all the bookmarks within that folder descend in a column
of small images when you click on the folder. Typing in a word allows
the browser to suggest some related bookmarks. When you bookmark a page,
the browser suggests the appropriate folder.

But the browser also has the intelligence to find a page according to
its work-flow context, so the user can type the day and time, and the
browser will find the page the user was on at that moment.

For mobile browsers, the idea is to more fully utilize zoomable space.
For instance, panning with your finger on a touch screen can go to the
edge of the browser. The entire screen is taken up with content, but by
panning over, the user can see browser controls that might otherwise be
hidden. This maximizes screen space for content.

The plus sign calls up a new tab. When you zoom out, you can see all
browser tabbed windows as separate miniature screens, which can then be
stacked and reorganized as if they were open documents.

The Aurora videos were created by Adaptive Path, a San Francisco-based
user experience consultancy. Mozilla said more videos will be released
that "predict the future" of browsers.

Jesse James Garrett of Adaptive Path said that in considering Aurora,
the team kept coming back to a core set of "essential, high-priority
elements." The elements, he said, were clustered around four major
themes - context awareness, in which the browser "pays attention" to
the many kinds of data that pass through it; natural interaction that
more closely resembles the real world than current interfaces;
continuity that provides the same interaction model regardless of
device; and multiuser applications, which opens up the browser to the
Web's community space.

Al Hilwa, program director at industry research firm IDC, noted that the
"browser had been a sleeper market for some years," with Microsoft's
Internet Explorer as the main player. But now, he noted, there is
renewed interest in the browser as a platform because of the rise of
rich Internet applications that can work on the desktop, the rise of
non-Microsoft-based mobile platforms, and the resurgence of Apple's Mac.



Bewkes Confirms AOL Split


Time Warner will indeed split its AOL access and media units starting
next year, CEO Jeff Bewkes confirmed in a release announcing the
company's second-quarter earnings.

It's the first time the executive has confirmed that the split will take
place soon, though it's been widely talked about for months since the
chief mentioned it speculatively earlier this year. What he hasn't said
yet - and what some are expecting may come soon - is that Time Warner will
get rid of AOL altogether, perhaps selling it to a bigger player in the
online-advertising market.

It was another tepid quarter for the online-service-turned-media-company,
which saw revenues drop 16 percent, to $1.1 billion. Its ad revenues are
up 2 percent ($8 million) - though display ad revenues on AOL-owned sites
are down - but that business still isn't big enough to offset the losses
from AOL's sputtering Internet access service.

Once a national mainstay, the provider lost 604,000 subscribers in the
second quarter alone and is down 2.8 million from the previous year,
leaving it at 8.1 million subscribers. That's a $200 million loss (29
percent drop) for the company, which had raised fees on the dial-up
service in late June.

Operating income at AOL dropped 36 percent, to $230 million.

Reports have suggested that Internet provider EarthLink may be
interested in acquiring the access business from AOL.

Meanwhile, at Time Warner Cable, which Time Warner spun off in May,
revenues are up 7 percent, seeing a decline only in television
pay-per-view revenue. An additional 214,000 people have subscribed to
its "triple play" offering of cable TV, broadband Internet, and
telephone service, CEO Glenn Britt said in a release.



Google Sours on $1 Billion AOL Investment


Google acknowledged late Thursday that it may have made a bad bet on AOL.

The search giant said in a filing with the Securities and Exchange
Commission that its $1 billion investment for a 5 percent stake in Time
Warner's Web unit "may be impaired" and that it may have to take a
charge in the future:

Based on our review, we believe our investment in AOL may be
impaired...We will continue to review this investment for impairment in
the future. There can be no assurance that impairment charges will not
be required in the future, and any such amounts may be material to our
Consolidated Statements of Income.

The December 2005 investment secured a renewal of Google's search
advertising deal with AOL, preventing its largest ad partner from
defecting to Microsoft. The deal gave AOL a valuation of $20 billion at
the time.

Google didn't estimate in its filing what AOL might be worth today, but
observers have suggested a figure closer to $10 billion.

Google's deal allows it to demand that Time Warner spin off AOL in an
initial public offering of stock or buy back its stake, which would
result in a $500 million loss for Google.

Time Warner, perhaps signaling its intention to dispose of AOL to focus
on its media business, announced Wednesday that it will split AOL's
dial-up unit from its advertising business by early 2009.



New Mac A/V Is Free (Whether You Need It or Not)


Does the Macintosh need antivirus protection?

Such a question has been asked for years, especially with the dearth of
substantive Mac-specific worms. With PC Tools' iAntivirus, you won't be
paying anything for it, at least.

iAntiVirus joins ClamXav (the OS X derivative of ClamAV) in the small
camp of free antivirus applications for Mac OS X. (The software is
currently classified as a beta; users can download a full version of the
iAntiVirus software for free, but for phone support and/or commercial
use, users must pay $29.95. PC Tools also has a support forum which
users of the free software have access to.)

The differentiating feature, according to PC Tools' executives, is that
the antivirus signature database leaves out all of the numerous viruses
that are found on the Windows platform, streamlining the program
considerably.

In fact, only 82 signatures are included, blocking up to a total of 300
variants, according to Michael Greene, PC Tools' vice president of
product strategy. Of those malware signatures, 38 percent are
keyloggers, 30 percent hacking tools, and 11 percent are back doors,
Greene said.

The smaller number of signatures means that checking viruses against
those signatures can be processed much more quickly, Greene said. PC
Tools, which also developed the free Threatfire behavioral-based
antivirus program for the PC platform, hasn't committed to releasing a
version of the software for the OS X platform, he said.

To answer the question of whether Macs could or should need antivirus
software, Greene pointed to market share data that found that Apple
ranked third in the United States in PC sales. The more Apple climbs in
the sales rankings, the bigger the target it presents for virus writers
looking to make a name for themselves, Greene said.

Apple has consistently marketed its products as more secure than Windows
machines - which, given the relatively small number of Mac-specific
viruses, they probably are. However, is there still a need for antivirus
software? When asked to comment, an Apple representative highlighted the
OS X security page, which opens with this statement: "Every Mac is
secure - right out of the box - thanks to the proven foundation of Mac
OS X. Apple engineers have designed Leopard with more security to
protect your personal data and make your online life safer."

So if a Mac is secure, do Mac owners really need antivirus software?

Greene said they do. A smaller market share means that an OS is less
prone to attack, Greene said. "If I'm going to spend time writing a
virus, do I go after the opportunity to hit 1 in 10 [users], or 9 in
10?" he said. "I think the Mac will become a victim of its own success."

Greene said that he had never met a Macintosh user who had antivirus
software running.

iAntiVirus will compete with tools from Symantec, whose Norton Antivirus
for the Mac was launched several years ago, as well as Avast! Antivirus
for the Mac, which charges for the Macintosh version. Sophos Antivirus
for the Mac OS X also offers a free trial, then charges for the full
edition.



Even Computer Security Pros Vulnerable to Scams


Computer security professionals tend to be a highly paranoid bunch,
seeing potential threats everywhere. It turns out that some aren't
cautious enough, though.

Two researchers demonstrated Thursday at the Black Hat hacking
conference how they had gotten computer security experts to let their
guard down online the same way they advise the average Internet user not
to, especially on social networking Web sites.

A relatively simple ruse persuaded dozens of prominent security analysts
to connect on their social networking Web pages with people who weren't
friends at all. They were fake profiles, purportedly of other well-known
security pros. The scam was designed to expose the trust that even some
of the most skeptical Internet users display on some of the most
insecure sites on the Web.

Some social networking sites can be dangerous because they allow people
to post programming code - used for good or evil - on other people's
pages. Even networking sites that don't allow that step carry their own
security risks, because it's relatively easy for someone to masquerade
as a "friend" who isn't actually friendly - and recommend malicious Web
sites to click on.

The ruse concocted by Shawn Moyer, chief information security officer
for Agura Digital Security, and Nathan Hamiel, senior consultant for
Idea Information Security, worked like this:

They found prominent security figures who didn't have profiles on
particular social networking Web sites.

They built up fake profiles by using information from press releases and
news articles. Then they built up the profiles' authenticity by sending
them around to people who indiscriminately add friends on those sites.

Finally, once the profiles looked legitimate, they identified groups of
security professionals on those sites and sent their friend requests to
them.

Moyer and Hamiel said they did it three times, each time impersonating a
different person. Each time they lured in more than 50 new friends
within 24 hours. Some of those people were chief security officers for
major corporations and defense industry workers, they said. They
declined to identify any of those people.

"We really were surprised at the level of trust we found - we didn't
think we'd be as successful as we were," Moyer said. "Any one of these
people would have happily clicked on a malware site or viewed our
profile with a (data-stealing) Trojan application."

Moyer and Hamiel said they even landed an interview with a journalist
who responded to one of their friend requests. But they got busted: the
reporter sent an e-mail to the target's real profile page on another
social-networking site and discovered the fraud.

Moyer and Hamiel emphasized that the talk wasn't intended to single out
any particular social networking site. Many of them have the same
security problems, and users need be cautious about verifying the people
they add as friends.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT