Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 11 Issue 08

eZine's profile picture
Published in 
Atari Online News Etc
 · 22 Aug 2019

  

Volume 11, Issue 08 Atari Online News, Etc. February 20, 2009


Published and Copyright (c) 1999 - 2008
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:





To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1108 02/20/09

~ Apple's Tiger on Prowl ~ People Are Talking! ~ DSi Due in April!
~ More US Cyberattacks! ~ Tango Email Protests! ~ Data Retention!
~ Conficker's Evil Twin! ~ IE7 Flaw Vulnerable! ~ Game Ban Repealed!
~ 5500 Sex Offenders Out ~ Yellow Star Re-Named! ~ G.I. Joe Deployed!

-* Bids for .com Rivals Delayed *-
-* Electronic Evidence Firm Faces Irony *-
-* NY Governor Proposes Web Tax on Downloads! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Of course it couldn't last; we had a couple of more snowstorms this week,
but fortunately neither amounted to too much snow. Just your typical
"nuisance" storms that we get on occasion. It's been another one of those
long and cold weeks, though. Baseball's "Rite of Spring" has started, and
I can surely keep wishing that Spring was days away, rather than weeks!

It's been exactly two months since the passing of our "son" Butkus. It's
hard to believe that it's been that long already; we still miss him and
think of him daily. There's always something that triggers a comment about
him every day. Our "daughter" also misses her big brother; and we can tell
how much of a toll it's taken on her. She's been lethargic lately, and
doesn't eat like she once did. More and more we have been considering
finding a companion for her, especially with my being gone more and more
due to the "new" job. My hours are fairly sporadic, so there are numerous
times when she could be alone for a half day or more. That's something
that she's never experienced before - they were always together.

For the past few weeks, my wife and I have been browsing various animal
shelter and dog rescue sites on the web, just to see what types of dogs
were available for adoption. While neither of us was looking to "replace"
our son, we were concerned about our daughter's well-being. There is only
so much that we can do for her to fill the void ourselves. Sure, we've
given her more attention now that it doesn't have to be shared like it
once was, but that didn't seem to be the total answer. We kept returning
to the web site of the shelter where we had adopted Butkus over 11 years
ago.

My wife and I have always been advocates for homeless animals - both of
our kids were abandoned at a young age. Unwanted animals need a good home,
and many face uncertain death. The shelter we visited is a "no-kill" one,
which means that the animal remains there until adopted; they're not put
down after a certain amount of time like many shelters or animal control
facilities do. While it's true that shelters like this one occasionally
have animals that have emotional or behavioral issues due to abuse or
other factors, not all of the animals have such issues.

Anyway, we were looking at this particular shelter's site more regularly,
and were discussing the possibilities. We've been going back and forth
the idea of adopting. It's a difficult thing to decide; would adopting
mean that we were replacing our loved one? Did we want to go through a
training process all over again? How would Buffy feel about another
sibling? And other possible issues. We decided to consider doing it,
but made some decisions on what we would seek as candidates. Buffy is
close to 12 years old, so we wanted to consider an older dog, not a puppy.
We also wanted a dog that was not high-energy. A dog that would be a good
companion, but not one that would be pestering her all day long wanting to
play, etc.

One of the dogs that we saw on the web site was a greyhound, cut loose from
a race track somewhere. He was 2 1/2 years old. Personally, I've never
considered a greyhound to be "pet material" because many are usually bred
for racing and not for families. This one had been at the shelter since
early November, and my wife felt sorry for him being there so long - no one
wanted him. There were a few other dogs that were older, but only a couple
of them seemed to be less energetic and suitable for Buffy's temperament.

So, we put the two dogs together and they barely acknowledged each other's
presence. We were disappointed that they didn't hit it off, but noticed
that they didn't fight or growl at each other. Still, we weren't sure that
this was going to be a good mix. The shelter's counselor sensed our
hesitation, and suggested a temporary adoption to see if the two would warm
up to each other. End result, we're planning to head back to the shelter
this weekend and finalize the adoption. The two "kids" aren't the best of
pals just yet, but they seem to be warming up to each other. And there's
also no way that we could bring Sam back to the shelter - he's been through
a lot, and he feels right at home here.

Okay, so I've gone on about dogs, er, canine children. Well, as I said,
earlier, I have a soft spot for animals - especially those who have been
abused and/or abandoned. Sound familiar? In comparison, all of us reading
A-ONE have similar attachments - Atari computing. Did we give up on an
abandoned computer platform? Are we as fond (or almost) of the Atari
"species"? Sure, animals will most likely be more affectionate and stick
around a lot longer, but the sentiment is similar. I will have to say,
though, that dogs provide a lot more enjoyment and love - unconditionally.

Until next time...



=~=~=~=



PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org



Hidi ho friends and neighbors. Another week has come and gone, and I'm
just aching to rant some more about politics... but I won't. Yeah, yeah,
I hear you letting out that heavy sign of relief. [grin]

On a purely personal note, I'm now closer to a job than I've been in the
last six months, and I'm hopeful that it pans out. It's a good job with
a good company, working with good people for a good salary... and it's
something I think I could do well. What more could you ask for, right?
Well, I've got one final interview coming up, and then I'll find out if
I get the job. The job market is a scary place right now, and anyone who
finds one is damned lucky right now. Keep your fingers crossed for me,
will ya? Thanks. I knew that you would. [chuckle]

There isn't a heck of a lot on the UseNet this week, but let's give it a
shot anyway, okay? Here we go...


From the comp.sys.atari.st NewsGroup
====================================


'GoliaTT' writes to tell us about a new website dedicated to the Atari
TT030:

"A new site about Atari TT has came to being. All interested people are
invited. We aim at gathering informations (as much as we can find)
about 32-bit Ataris and also we want to contact TT-users with those
who still make various extensions to TTs. You can join the online list
and help us with developing the site. We also look for someone who can
help with making German version of it.

The link to the site is: http://www.ataritt030.info "


Guillaume Tello tells GoliaTT:

"Really cool and useful data base that (I hope) will grow!

I liked the Atarians list (I joined!) and the links that everyone can
add. I will add a link to your site from mine."


On the subject of replacing the clock/NVRAM chip in the Falcon030, Mark
Bedingfield posts:

"The best solution is desolder and fit a socket, then fit a new chip."


'DarkLord' replies:

"Because I'm a klutz at soldering anything so fine as what seems to be
on the Falcons motherboard, and I didn't want to ruin anything, I had
this done by Alex Yu at ATY Computers, here in the US. Parts came from
Brad Coda at Best Electronics.

Now, if the clock goes dead on my Falcon again, I can replace it
myself."


'AtariNut' jumps in and says:

"So the net result then, as I understand this discussion, is that we
will be able to replace our dead battery with the same type of battery
that is used in windows boxes?"


Ronald Hall tells AtariNut:

"Hi. Not sure about that part - I don't know if the replacement battery
is PC compatible or not. Maybe someone else can shed some light on
that..."


Mark answers that it...

"Depends on the voltage. My understanding from a quick look at the cct
is that it disables the chips ability to recharge. If its 3.3v then the
answer is yes."


'Umberto' asks for help with his Falcon:

"My Falcon wont access any drives, but will boot up tos, any ideas?"


Mark Bedingfield tells him:

"Power supply maybe? Any icons on the desktop? Could just be a
dead/dying hard drive."


Edward Baiz posts this about taking his Falcon wireless!

"I bought a Linksys Wireless modem so that I could run my two Xboxs. It
all worked fine, so I decided to see if it would work with the Falcon. I
was very happy that it did. I used a Linksys-B Gaming Adapter. It just
plugs into any computer/gaming console that has an EtherNet connector. I
just plugged the adapter into the NEC2000 and it worked. Nice to
know..."


Ronald Hall asks Edward:

"So theoretically, I could take the LinkSys-B Gaming Adaptor,
plug it into my EtherNEC, then into my STacy, and have a portable
wireless Atari? That would be way cool."


Way cool is right! The STacy is a twenty year old machine! That rocks!
Lonny Pursell adds:

"Yup. Also the D-Link DWL 810 will do the same. My TT is wireless.
Same deal, its plugged into the EtherNEC. The only catch is you might
have to configure these devices on a mac or such since the internal web
setup utility requires a java script enabled browser."


Ronald replies:

"Okay, thanks for the info. My workplace runs a wireless "guest"
network, looks like I'll be seeing if I can access that.

If I can, I'll be telling the IT director there his network is so
antiquated that I can access it with a 20 year old Atari laptop... <evil
laugh> (its okay - we're friends)..."


Well folks, that's it for this time around. Tune in again next week,
same time, same station, and be ready to listen to what they are saying
when...

PEOPLE ARE TALKING


=~=~=~=



->In This Week's Gaming Section - Nintendo DSi Due in April!
""""""""""""""""""""""""""""" GTA IV: Lost and Damned!
GI Joe Gets Deployed!
And more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Nintendo's Handheld Game Player Due April 5 in US


Nintendo Co. will launch the latest version of its portable video game
system in the United States on April 5, adding two digital cameras and the
ability to play with sound recordings.

The DSi, which is already available in Nintendo's home country of Japan,
will cost $170 and come in two colors, black and blue. This is the third
iteration of the world's most popular handheld gaming system. The DS
Lite, its predecessor, costs $130.

The new handheld is slimmer than the DS Lite, sports bigger screens and
includes two digital cameras - one facing outward and one pointing at
the user when the device is flipped open. Nintendo likened them to a set
of eyes.

"If the touch screen gave Nintendo DS a sense of feel and the microphone
allowed it to hear, the two cameras give Nintendo DSi the sense of
sight," the company said in a statement.

Using the DSi, players can manipulate photos, mix images and share them
with friends.

The launch comes as millions of people are turning to mobile games - on
the DS and on smart phones like Apple's iPhone - to pass their time.

The DSi also includes a memory card slot for users to store photos,
music and games, which players will be able to purchase and download
through the device's Wi-Fi wireless connection. A stereo headphone
output on the outside of the DSi lets users listen to music even when
the system is flipped shut.



Grand Theft Auto IV Gets "Lost and Damned"


Take Rockstar's Grand Theft Auto IV too seriously and you'll probably miss
most of what it's up to. It's a game, of course, but it's also a biting,
unremitting satire. Juvenile-seeming to some, sure, with its lewd and
frequently misogynist humor, but no less a scathing sendup of American
culture when you strip the top layers away. It's a mirror, but one held up
to our silly instead of our serious side. A parody of parodies. A
bad-boy-burlesque. That it even offends other satirists (who take special
pleasure in calling it sophomoric) simply proves its point.

And now there's a sequel of sorts called "The Lost and Damned," or a
parallel narrative expansion if you want to get technical about it. But
with anywhere from 15 to 40 hours of play time for just 1600 Microsoft
Points ($20) it packs more to-dos than you'll find in most standalone $60
games.

It's a bold move on Rockstar's part, an experiment of sorts but also
something of risk, since it's arriving as both Xbox 360-exclusive and in
downloadable-only form. You can still buy the game at retail in the form
of a key card, but I'd wager most gamers will circumvent the middleman.
What's to benefit you tripping all the way to the mall for a glorified
piece of media-less plastic?

Oh right, the Xbox 360-exclusive bit. Sorry PlayStation 3 owners,
Microsoft ponied up $50 million for exclusive rights to host the
expansion. I guess that's more or less what the "potential compromised PS3
sales" tally came to once the numbers were properly projected and
crunched. Some have speculated it might hop platforms once Microsoft's
exclusivity deal expires, but that assumes there's in fact an expiry date.

As for the game itself, think in thirds, as in one-third the story
missions of the original. Nico Bellic is out, replaced by Johnny Klebitz,
a 34-year-old leader in a biker gang. If you played the original, Klebitz
is the guy that helps Niko watch over a heroin deal, and who later chips
in on a mission involving conflict diamonds. Did I say Niko was out? Not
entirely. Since Johnny and Nico's stories overlap, Nico's in for a cameo
here.

In "The Lost and Damned," Klebitz is subbing for his gang leader who's
in rehab, and trying to make nice with the competition. When his
shoot-first-compromise-never boss gets out, however, management styles
clash, leading to all sorts of familial mayhem.

Game-wise, Rockstar's added several new multiplayer modes, like "Cops
vs. Bikers" (bikers try to take out a bus protected by cops) and
"Chopper vs. Chopper" (helicopter vs. bike...and no, I'm not joshing).
You also get a few new weapons like grenade launchers and sawed-off
shotguns, and when Johnny's sitting a bike, it'll handle much more
responsively than vehicles as operated by Niko. The biggest change?
Mission checkpoints, which eliminate all that extra driving to and from
the scene of the crime if you're offed prematurely. (Sadly, though, it's
not retroactive to the main game.)

Will the "The Lost and Damned" succeed as a 360 exclusive? Probably.
It's Grand Theft Auto IV, isn't it? You're looking at over 16 million
Xbox 360s in the U.S. alone, with over 4 million copies sold stateside,
and per my last chat with Microsoft about subscriber numbers, over
two-thirds have Xbox Live Gold accounts. Potential br and new sales
aside, if only half that 4 million download the expansion, it's still as
many transactions as copies purchased of the U.S. PlayStation 3 original.



G.I. Joe Deployed in Videogame for First Time


Classic soldier doll G.I. Joe is reporting for duty in videogame consoles
and handheld devices.

Electronic Arts (EA) said the videogame will debut in August with the
release of "G.I. Joe: The Rise of COBRA," a live action film starring a
hero based on the Hasbro toy.

The movie is from Paramount Pictures and Spyglass Entertainment. EA
provided an early glimpse of the G.I. Joe videogame at a Toy Fair that
ended Tuesday in New York City.

"EA is excited to play a major role in bringing this icon of pop culture
history to a new generation of enthusiasts through interactive gaming,"
said EA Hasbro general manager Chip Lange.

"G.I. Joe offers exceptionally rich storylines and a cast of characters
that lends itself incredibly well to creating an over-the-top action
adventure videogame that will thrill gamers as well as G.I. Joe fans."

The videogame storyline will pick up where the film ends and let players
re-enact scenes from the movie, according to EA. The game is being
tailored for Microsoft, Sony and Nintendo videogame consoles as well as
mobile devices.

"G.I. Joe has been an icon of action for 45 years," said Mark Blecher,
general manager of digital gaming and media at Hasbro.

"EA has tapped the legacy of the G.I. Joe vs. COBRA saga to create an
amazing interactive experience inspired by the movie, comic books,
animated series and iconography."

G.I. Joe is a veteran action figure introduced in 1964. Twenty years
later the toy line was expanded to include characters from a nefarious
COBRA organization.



Court Strikes Down California Video Game Law


A federal appeals court on Friday struck down a California law that sought
to ban the sale or rental of violent video games to minors.

The 9th U.S. Circuit Court of Appeals ruled that the 2005 law violates
minors' rights under the Constitution's First and 14th amendments. The
three-judge panel's unanimous ruling upholds an earlier ruling in U.S.
District Court.

The law would have prohibited the sale or rental of violent games to
anyone under 18. It also would have created strict labeling requirements
for video game manufacturers.

In a written opinion, Judge Consuelo Callahan said there were less
restrictive ways to protect children from "unquestionably violent" video
games. For example, the justices said the industry has a voluntary
rating system and that parents can block certain games on video consoles.

The law's author, state Sen. Leland Yee, D-San Francisco, said he wanted
Attorney General Jerry Brown to appeal the decision to the U.S. Supreme
Court.

"We need to help empower parents with the ultimate decision over whether
or not their children play in a world of violence and murder," Yee, a
child psychologist, said in a statement.

A spokesman for Brown could not immediately say whether California would
appeal to the Supreme Court.

California lawmakers had approved the law, in part, by relying on
studies suggesting violent games can be linked to aggression,
anti-social behavior and desensitization to violence. The justices
dismissed that research.

"None of the research establishes or suggests a causal link between
minors playing violent video games and actual psychological or
neurological harm, and inferences to that effect would not be
reasonable," Callahan said in her ruling.

The law never took effect and was challenged shortly after it was signed
by Gov. Arnold Schwarzenegger. A U.S. District Court blocked it after
the industry sued California over constitutional concerns.

Schwarzenegger spokeswoman Camille Anderson said the governor was
reviewing Friday's ruling.

"The governor believes strongly we have a responsibility to our children
and our communities to protect against the effects of video games
depicting ultra-violent actions," she said.

The Encino-based Video Software Dealers Association, now known as the
Entertainment Merchants Association following a merger, and the
Washington, D.C.-based Entertainment Software Association argued that
California's restrictions could open the door for states to limit
minors' access to other material under the guise of protecting children.

The court agreed, saying California was "asking us to boldly go where no
court has gone before."

"The state, in essence, asks us to create a new category of
non-protected material based on its depiction of violence," Callahan
wrote in the 30-page ruling.

Michael D. Gallagher, president of the Entertainment Software
Association, said the ruling underscores that parents, with help from
the industry, are the ones who should control what games their children
play.

"This is a clear signal that in California and across the country, the
reckless pursuit of anti-video game legislation like this is an exercise
in wasting taxpayer money, government time and state resources,"
Gallagher said in a statement.

Courts in several other states have struck down similar laws.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Apple's Tiger Begins To Prowl, Set for Release Friday


Apple has kicked its flagship operating system into a higher gear,
temporarily stealing the thunder from arch-rival Microsoft by unleashing
Tiger with some 200 enhancements to the Mac platform that already has a
strong, cult-like following.

Among the new features is Spotlight, enabling faster, more efficient
desktop searches, and a Dashboard comprising mini-applications called
widgets that are programmed to deliver to the desktop continuous updates
on information, such as flight schedules, stock quotes and weather
forecasts.

With spotlight, users can search the entire system, including the
metadata inside files such as the type of content, the author, edit
history, format and size. Results are continuously updated as files
change, and can be stored in smart folders or smart mailboxes.

The Automator feature allows users to automate certain, repetitive
tasks, while the latest iChat application provides video conferencing
capabilities along with instant messaging.

Tiger also adds the high-definition QuickTime 7 video format and a new
version of the Safari Web browser with support for Really Simple
Syndication (RSS) data feeds.

Built on a Unix foundation, Mac OS X Tiger supports both 64-bit and
32-bit applications. Compatibility with Windows has been improved as
well, Apple announced. The cost is US$129 per user, or $199 for a Family
Pack. The official launch will be held Friday.

The much-anticipated software upgrade is touted by Apple as the answer
to Microsoft's Longhorn, a test version of which was launched by
Microsoft earlier this week. Longhorn will include similar versions of
the search and content organization features of Tiger, but Longhorn
won't be available until the end of next year.

Apple made a concerted effort to unleash Tiger before Longhorn, much to
the delight of its committed user base, but the company is fighting a
decidedly uphill battle against Microsoft, said Yankee Group analyst
Laura DiDio.

"Mac users are clamoring for this, but the question is whether Apple
will build on its core constituency," she said, noting that the company
holds a 4 percent share of the desktop OS market.

Still, in talking with I.T. administrators, DiDio said she heard from
those in the media and marketing industries, especially, that Mac is
making comeback. "The technology is user-friendly and reliable, and
those using them are pressing for Apple upgrades."

Spotlight is particularly compelling, the analyst said, describing it as
both fast and elegant, and as an alternative to Longhorn's
search-by-category features.

DiDio suggested that while Apple sees Microsoft as its prime target, the
Mac could make inroads on the Linux user base because of its Unix-based
OS. "It's proprietary software, so there is indemnification protection,
and Unix may be seen as a more reliable platform than Windows."



New York Governor Proposes Internet Tax on Downloads


New York Governor David Paterson has proposed a tax on Internet downloads,
a spokesman said Monday, in a move that has raised eyebrows because it
could apply to everything from software to pornography.

The four percent tax would apply to downloads of music, software, books,
videos and other Internet content, a spokesman for Paterson said.

"It is a general proposal, not focused on the content, so it would apply
to any download, regardless of the content," said Errol Cockfield.

The governor has floated the idea as a way of closing the state's 15
billion dollar budget deficit, but critics say the proposal would likely
apply to the hugely lucrative Internet pornography industry and could
even drive business away from the state.

"By taxing it you're legitimizing it," New York Conservative Party
Chairman Michael Long told the New York Daily News.

Around 20 US states have begun to apply a tax to downloads such as music
on iTunes, and similar measures are being mulled in Mississippi, North
Dakota and Wisconsin.



US Faces Growing Cyberattacks


The number of reported cyberattacks on US government computer networks
rose by more than 40 percent last year, USA Today reported on Tuesday.

The newspaper, citing data obtained from the US Computer Emergency
Readiness Team (US-CERT), said there were 5,488 tracked incidents of
unauthorized access to US government computers and installations of
hostile programs in 2008.

There were a combined 3,928 such incidents in 2007, USA Today said, and
2,172 in 2006.

"Government systems are under constant attack," the newspaper quoted
Joel Brenner, counterintelligence chief in the Office of the Director of
National Intelligence, as saying.

"We're seeing ... a dramatic, consistent increase in cyber crime (and)
intelligence activities," Brenner added.

USA Today said more infiltrators were trying to plant malicious software
on US government computer systems in a bid to control or steal sensitive
data.

The newspaper also said the data obtained from US-CERT may represent
only a "small sampling" of the total number of incidents because "just
one percent of federal agencies have fully developed tracking systems."

At the same time, some of the increase may reflect better reporting, it
quoted Mischel Kwon, who heads US-CERT at the Department of Homeland
Security, as saying.

US President Barack Obama last week ordered a sweeping review of US
cybersecurity to protect the government's information technology systems
from security and economic threats.

The 60-day review is to be overseen by Melissa Hathaway, a former
official in George W. Bush's administration who coordinated cyber
monitoring for the director of national intelligence.

During the election campaign, Obama equated cyber risks to the threat of
nuclear or biological attack and promised a high-level review if he
became president.

A congressional panel warned in November that China had developed a
sophisticated cyber warfare program and stepped up its capacity to
penetrate US computer networks to extract sensitive information.

And a December report by the Commission on Cybersecurity for the 44th
Presidency told the new leader that cybersecurity was "among the most
serious economic and national security challenges we will face in the
21st century."



Conficker Worm Gets an Evil Twin


The criminals behind the widespread Conficker worm have released a new
version of the malware that could signal a major shift in the way the
worm operates.

The new variant, dubbed Conficker B++, was spotted three days ago by SRI
International researchers, who published details of the new code on
Thursday. To the untrained eye, the new variant looks almost identical to
the previous version of the worm, Conficker B. But the B++ variant uses
new techniques to download software, giving its creators more flexibility
in what they can do with infected machines.

Conficker-infected machines could be used for nasty stuff - sending
spam, logging keystrokes, or launching denial of service (DoS) attacks,
but an ad hoc group calling itself the Conficker Cabal has largely
prevented this from happening. They've kept Conficker under control by
cracking the algorithm the software uses to find one of thousands of
rendezvous points on the Internet where it can look for new code. These
rendezvous points use unique domain names, such as pwulrrog.org, that the
Conficker Cabal has worked hard to register and keep out of the hands of
the criminals.

The new B++ variant uses the same algorithm to look for rendezvous
points, but it also gives the creators two new techniques that skip them
altogether. That means that the Cabal's most successful technique could
be bypassed.

Conficker underwent a major rewrite in December, when the B variant was
released. But this latest B++ version includes more subtle changes,
according to Phil Porras, a program director with SRI. "This is a more
surgical set of changes that they've made," he said.

To put things in perspective: There were 297 subroutines in Conficker B;
39 new routines were added in B++ and three existing subroutines were
modified, SRI wrote in a report on the new variant. B++ suggests "the
malware authors may be seeking new ways to obviate the need for Internet
rendezvous points altogether," the report states.

Porras could not say how long Conficker B++ has been in circulation, but
it first appeared on Feb. 6, according to a researcher using the
pseudonym Jart Armin, who works on the Hostexploit.com Web site, which has
tracked Conficker.

Though he does not know whether B++ was created in response to the
Cabal's work, "it does make the botnet more robust and it does mitigate
some of the Cabal's work," Support Intelligence CEO Rick Wesson said in
an e-mail interview.

Also known as Downadup, Conficker spreads using a variety of techniques.
It exploits a dangerous Windows bug to attack computers on a local area
network, and it can also spread via USB devices such as cameras or storage
devices. All variants of Conficker have now infected about 10.5 million
computers, according to SRI.



New Attacks Target IE7 Flaw


Internet attack trackers and antivirus companies warn that a flaw in
Internet Explorer 7 (but not earlier versions) that Microsoft just
patched last week is under attack in the wild. The attacks appear to be
targeted and small-scale right now, but will likely grow.

Trend Micro describes a somewhat roundabout attack that starts with an
e-mailed .doc file that, when opened, exploits the MS09-002 vulnerability
to download and install remote-control backdoor malware.

Trend writes that this approach is likely part of a targeted attack.
Such assaults typically involve more legwork on the part of crooks to
construct a realistic spam message that may appear to come from a
co-worker, for instance, and have a poisoned .doc or other file attached.

But the Internet Storm Center warns that while antivirus vendors currently
only report .doc-using attacks, "there is absolutely nothing preventing
attackers from using the exploit in a drive-by attack." And they expect
that to happen very soon.

The good news is that to protect yourself, you only need to make sure
you've closed the hole by applying last week's patch. It was distributed
via Automatic Updates, so you can double-check that you got it by
running Windows Update. Or head to the Microsoft security bulletin.



Howls of Protest Greet Tango Email


An email promoting a tango concert set off howls of protest in offices
across Washington on Tuesday as recipients seeking to unsubscribe were hit
by a flood of further unsolicited messages.

It started innocuously enough with an email from the Pan Am Symphony
Orchestra to a list of email addresses in the Washington area announcing
a March 1 concert of tango music.

As with many promotional emails, appended to the bottom of the message
was the option to "unsubscribe" from the list.

As user after user, however, asked that they be removed from the Pan Am
Symphony email list, their request was sent to all of the other
recipients on the list.

It was not immediately clear if this was because they were also hitting
the "reply to all" button or if the unsubscribe request was looping the
email back to all of the members of the list.

Lawyers, lobbyists, journalists, defense contractors and think-tank
members were among those demanding with increasing indignation that they
be removed from the list.

"This is a US government agency - remove this address from your
records," said one message from a Federal Trade Commission attorney.

"It would be great if these unsubscribe messages did not copy every one
else on the distribution," wrote another recipient.

An Agence France-Presse reporter received more than 100 unsubscribe
messages from other users over the course of a few hours.

One recipient had a proposal for their new "friends."

"This has been great. Do you guys all want to get together for a drink?"



eBay Renames 'Yellow Star' After 'Nazi' Complaint


Internet auction house eBay has temporarily renamed the yellow stars it
uses to evaluate sellers on its French site after a complaint that the
symbol had anti-semitic connotations.

The move came after French eBay user Dominique Bellamy wrote to the
company earlier this month to point out that during World War II the
Nazis made Jews wear a yellow star on their clothes as a discriminatory
mark.

His wife Francoise Bellamy told AFP Thursday that her husband "refused
to be be given a yellow star, even a virtual one.

"It brought back bad memories of the occupation" of France by Germany
during World War II, she said.

eBay's star system is used to show how many positive ratings a buyer or
seller has received from the site's users. The yellow star is the lowest
of the 12-point scale, and a silver shooting star is the top score.

On the company's French site the lowest rating was shown Thursday as a
yellow star, but was listed as a "first star" (in French, "premiere
etoile").

But on English language versions the lowest rank was still called the
yellow star.

eBay said in an email to AFP that "the yellow star is part of a series
of achievement stars that eBay users get. This system is used worldwide
on all eBay sites."

It said that "no definitive change has been decided yet" on future use
in France of the yeollow star, and that "there have been no such
complaints in other countries."



Electronic Evidence Firm Grilled Over Absent Memos


Guidance Software Inc. bills itself as the leading provider of technology
that helps companies dig up old e-mails and other electronic documents
that might be evidence in a lawsuit. Yet when Guidance itself had to face
a judge, it was accused of bumbling its internal digital search.

Whether Guidance intentionally hid documents or just couldn't find them
is a matter of dispute. The company said it did all that was required.
But its inability to cough up certain e-mails, even over several months,
led an arbitrator to accuse it of gross negligence and proceeding in bad
faith.

At the very least, the case shows how thorny electronic evidence
searches can be, even for a specialist.

The mountains of digital information piling up on hard drives and backup
tapes have made discovery - the exchange of information between parties
at the start of a lawsuit - increasingly complex. "E-discovery" software
and services boomed from a $40 million business in 1999 to nearly $2.8
billion in 2007, according to George Socha and Tom Gelbmann, directors
of the industry group Electronic Discovery Resource Model.

Pasadena, Calif.-based Guidance Software is one of the largest software
specialists, with sales of $89 million over the last four quarters. The
company began in 1997 making tools to help criminal investigators search
computer hard drives. In recent years Guidance added new programs for
scouring corporate networks for digital evidence.

Guidance needed to turn that expertise on itself in a case involving its
former marketing director, Cassondra Todd.

Todd believed Guidance's chairman pressured her manager to fire her, in
part because she is a woman. After she got a scathing performance review
in 2007, she asked for an investigation.

"I was quite confident that whatever information was produced would wipe
clean what was going on," Todd said in an interview. "That's what we did
for a living."

But Guidance told Todd it found no evidence of discrimination. It
apologized for the harshness of the review but wouldn't delete it from
her file.

Todd responded by hiring Arnold Peter, an attorney with Los
Angeles-based Raskin Peter Rubin & Simon. A few weeks later, she was
laid off.

Todd filed a wrongful-termination claim, and both sides were required to
perform discovery, a hunt for documents that might matter to the case.

The results of Guidance's initial run of e-discovery seemed scant to Todd.
She expected to see far more e-mails from her days in the company. But she
couldn't argue Guidance was holding back - intentionally or not - until
she got a break a few months later.

Tim Leehealey, Todd's first manager at Guidance and now the head of a
rival company, had printed and saved some memos from the time of Todd's
bad performance review. When Todd reviewed his stash, she found e-mails
about her that Guidance hadn't turned over. In one, Leehealey questioned
whether someone in the company was setting Todd up to be fired.

"Other than (Guidance Chairman Shawn McCreight's) hatred of her, she was
a good employee and produced for me," he wrote to Victor Limongelli, now
Guidance's chief executive.

Whether Guidance didn't find Leehealey's memos or whether it chose not
to hand them over, "either one was extremely damning," Leehealey said in
an interview.

"Those documents were on people's hard drives for sure, and they didn't
produce them," said Leehealey, whose company, AccessData Inc., tried to
buy Guidance last year but was turned down.

The arbitrator handling Todd's case, a retired judge, ordered Guidance
to do a more thorough round of e-discovery. The company came back
empty-handed - except for news that one of its e-mail backup tapes had
been corrupted. The arbitrator lost patience.

"I want this game-playing stopped," the arbitrator, William McDonald,
told Guidance's attorney, according to a court transcript.

McDonald stopped short of saying Guidance was sitting on a smoking gun.
But he was disturbed that Todd kept identifying documents the company
hadn't unearthed. When he learned the corrupted backup tape had
purportedly gone unnoticed for nearly a year, he had harsh words for the
company.

"These are routine things in this business. And it wasn't done until
pulling and screaming and kicking and facing the ultimate sanction,"
McDonald said, referring to his option to end the case in Todd's favor.
"We're looking at people who should be very sophisticated in this area,
given Guidance's business."

As punishment, McDonald ordered the company to pay for Todd's expert
witnesses and her travel costs, plus the cost of rescheduling the trial.
He also forced Guidance to search the backups, despite its arguments
that it would take weeks, amounting to a task Guidance would charge
customers $100,000 to perform.

In an interview, Limongelli said he didn't know in detail why Guidance
didn't initially find many of the files Todd identified as missing,
though he blamed a lost laptop for one oversight. Guidance executives
also say the company was not legally required to search its backup tapes
at first, given the expense of reading them.

"It wasn't an attempt to hide any information," Limongelli said. "We
think we followed what is a quite normal course."

Some experts not involved with the case said there is support for
Guidance's argument about the backup tapes. Under federal rules, all
electronically stored information is potentially discoverable. But the
rules distinguish between "reasonably accessible" files and ones that
are too expensive to tackle, at least in initial e-discovery. Backup
tapes often count as overly burdensome, said Scott Carlson, co-chair of
e-discovery for the law firm Seyfarth Shaw.

Outside experts hired by Todd gave the arbitrator more critical
assessments of Guidance's actions.

Brett Harrison, a director in FTI Consulting Inc.'s electronic evidence
consulting group, wrote that the way Guidance saved documents once it
knew of Todd's legal actions "was not performed to commonly accepted
standards within the e-discovery field and in great part did not occur
at all."

A second expert, William Moylan of Aon Consulting Inc., questioned why
Guidance asked that deleted files be ignored during discovery because
hunting for them would be a burden.

"Recovery and searching of deleted files is at the very heart of
computer forensics," he wrote.

Ultimately, the arbitrator found enough information to decide in Todd's
favor. He awarded her more than $300,000, about twice her annual
compensation. A federal court is also set to consider whether Todd
should receive damages under separate laws that prohibit discrimination.
With most of the facts of Todd's dismissal already established, her
attorney plans to focus on whether Guidance attempted to thwart
e-discovery during arbitration.

Guidance was "egregiously in violation of everything they report to be
best practices," Todd says. "They had every resource at their disposal.
They didn't want to take it seriously."



ISP Bill Would Lengthen Data-Retention Requirements


Two leading Republican lawmakers from Texas, Sen. John Cornyn and Rep.
Lamar Smith, have filed identical legislation in their houses of
Congress that would require a broad range of Internet service providers
to maintain logs of user data for up to two years.

The bills, known as the Internet Stopping Adults Facilitating the
Exploitation of Today's Youth Act (or Internet SAFETY Act), are designed
to enhance the federal government's fight against the producers and
distributors of child pornography. In addition to the data-retention
policies, the act would establish new penalties of 10 years for people
who set up Web servers to distribute child pornography and 20 years for
those who fund such activities. The act would also double the funds for
the FBI's anti-child pornography initiative, Innocent Images.

At a press conference with Smith and law-enforcement agents, Cornyn
urged support for the legislation. "While the Internet has generated
many positive changes in the way we communicate and do business," Cornyn
said, "its limitless nature offers anonymity that has opened the door to
criminals looking to harm innocent children. Keeping our children safe
requires cooperation on the local, state, federal and family level."

But critics are already raising concerns about the bill's broad
language, particularly with respect to the definition of Internet
service provider. The bill applies to any "provider of an electronic
communication service or remote computing service," which could
conceivably be interpreted to include everyone from the largest ISP down
to an individual who has set up a Wi-Fi network at home.

While most national or regional ISPs have the capability to collect and
store IP address information associated with specific users, such
record-keeping may be beyond the capability of smaller access providers,
like coffee shops with free Wi-Fi. Homeowners might have an even more
difficult time complying.

In an op-ed piece in the Dallas Morning News on Thursday, however, Smith
compared IP address logs to the logs of telephone numbers that phone
companies are required to maintain. "If we require phone companies to
retain this same type of information," Smith said, "there is no reason
why the law should not be updated to include ISPs."

"Law-enforcement officials should have the tools they need to fight
crime, whether committed over the phone, through the mail, or online."

But as numerous privacy advocates have pointed out, the information
stored by the typical ISP in its IP address log is often far more
revealing than mere phone numbers. For instance, it's not uncommon for
the log files to include search terms or e-mail addresses in addition to
IP addresses visited by each user. That makes IP log files potentially
far more intrusive than phone-number registers, which merely contain the
numbers called or received.

There is also the issue of who might have access to the information and
under what circumstances. A number of major music and video copyright
holders, including Time Warner, Sony Pictures, Walt Disney and EMI, have
long been on record as supporting longer IP address retention
requirements. The increased availability of such data would be a big
help in copyright-enforcement actions against online file sharers.



Facebook Has Removed 5,500 Sex Offenders Since May


Facebook has removed more than 5,500 convicted sex offenders from its
social networking Web site since May, Connecticut's attorney general
said Thursday.

Richard Blumenthal said the world's largest social networking site,
which claims to have more than 175 million active members, reported to
his office that 5,585 convicted sex offenders were found on the Web site
and removed between May 1, 2008, and Jan. 31, 2009.

"The message in this number is Facebook has an equal stake in solving
this problem of protecting children," said Blumenthal, who along with
North Carolina Attorney General Roy Cooper has led an effort remove sex
offenders from the social networking Web sites.

"They have an equal stake in the predator problem and its solution."

Earlier this month, rival networking site MySpace announced it had
removed 90,000 sex offenders in a two-year period.

Last year, the attorneys general got both sites to implement dozens of
safeguards, including finding better ways to verify users' ages and
putting limits on older users' ability to search the profiles of members
under 18.

Chris Kelly, Facebook's chief privacy officer, said the convicted sexual
offenders on the site were found through user reports, working with
local law enforcement agencies and using the national sex offender
registry.

He said Facebook's focus on members using their real names and
identities helps discourage sex offenders, and even more is being
planned to prevent them from registering. Earlier this month, Facebook
officials said policy dictated that no convicted sex offender be allowed
to keep a Facebook page.

Kelly said the company has pitched a proposal to attorneys general
around the country to develop a real-time system cross-checking
available outlets and "block any registration from the get-go."

"Our policy has been to remove convicted sex offenders when they are
reported or identified through any means," Kelly said.



Delay Expected in Bids for New Internet Addresses


Bids for new Internet addresses to rival ".com" and other suffixes will
likely be delayed until the end of the year as a key oversight agency
grapples with trademark and security issues.

Draft guidelines for the new suffixes generated so much comment that the
Internet Corporation for Assigned Names and Numbers, or ICANN, needs
more time to sort out what it terms "overarching issues."

Those include whether trademark owners could wind up having to register
thousands of new domain names simply to protect their
intellectual-property rights. For instance, the $185,000 application fee
would likely deter casual bidders from seeking, say, a ".disney" Web
suffix, but the Walt Disney Co. might feel pressured to register
"disney.nyc," "disney.bank" and scores of others under each of the new
names, simply to keep them away from others.

Other concerns include whether new suffixes could encourage more scams
involving fake Web sites that look legitimate, and whether new suffixes
would even get much use.

Some of the forthcoming discussions should address concerns raised by
the U.S. Commerce Department, which has significant sway because ICANN
gets its powers through a government contract. ICANN cannot add any
domain names without approval from the department's National
Telecommunications and Information Administration.

ICANN had wanted to start taking applications for new names early this
year, but the timetable proved too ambitious given the extent of the
feedback. ICANN now expects to open bids around December.

"It is very important to take the time to resolve these overarching
issues," said Paul Twomey, ICANN's chief executive.

ICANN plans to post a new draft by Thursday clarifying and expanding on
some of the proposed guidelines. Among the changes, a new foundation
would be set up to collect any money raised through auctions that are
planned for resolving conflicts when more than one applicant seeks the
same domain name. The foundation would support research and other tasks
related to running the domain name system.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT