home *** CD-ROM | disk | FTP | other *** search
Text File | 2004-07-23 | 50.9 KB | 1,228 lines |
- Volume 6, Issue 30 Atari Online News, Etc. July 23, 2004
-
-
- Published and Copyright (c) 1999 - 2004
- All Rights Reserved
-
- Atari Online News, Etc.
- A-ONE Online Magazine
- Dana P. Jacobson, Publisher/Managing Editor
- Joseph Mirando, Managing Editor
- Rob Mahlert, Associate Editor
-
-
- Atari Online News, Etc. Staff
-
- Dana P. Jacobson -- Editor
- Joe Mirando -- "People Are Talking"
- Michael Burkley -- "Unabashed Atariophile"
- Albert Dayes -- "CC: Classic Chips"
- Rob Mahlert -- Web site
- Thomas J. Andrews -- "Keeper of the Flame"
-
-
- With Contributions by:
-
- Kevin Savetz
-
-
-
- To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
- log on to our website at: www.atarinews.org
- and click on "Subscriptions".
- OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
- and your address will be added to the distribution list.
- To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
- Please make sure that you include the same address that you used to
- subscribe from.
-
- To download A-ONE, set your browser bookmarks to one of the
- following sites:
-
- http://people.delphiforums.com/dpj/a-one.htm
- http://www.icwhen.com/aone/
- http://a1mag.atari.org
- Now available:
- http://www.atarinews.org
-
-
- Visit the Atari Advantage Forum on Delphi!
- http://forums.delphiforums.com/atari/
-
-
-
- =~=~=~=
-
-
-
- A-ONE #0630 07/23/04
-
- ~ MS, Lindows Settle! ~ People Are Talking! ~ MiNT On Coldfire!
- ~ Dell Launches Help Site ~ UK Bans PS 'Chipping'! ~ New MyAES Release!
- ~ Unlimited Web Sites? ~ Data Theft Hacker Bust ~ More Worms Surface!
- ~ SCO Suffers Setback! ~ MS Takes On Phishers! ~ ASMA 2.8 Released!
-
- -* Open Source Gaming Galore! *-
- -* NY Settles E-Mail Marketer Lawsuit! *-
- -* Technology To Widen Reach of Amber Alerts! *-
-
-
-
- =~=~=~=
-
-
-
- ->From the Editor's Keyboard "Saying it like it is!"
- """"""""""""""""""""""""""
-
-
-
- This past weekend, I happened to be checking the news and weather reports
- for the upcoming week (this past week) to see what I might be missing had I
- scheduled my recent vacation for different weeks. I was kind of elated to
- see that rain was forecast for most of the week! Well, that forecast didn't
- hold up! The rain held off, and we've had some really oppressive weather
- this past week - at least compared to what we've been having up to now! The
- only down side was that had I been on vacation this past week, I would have
- had more of an opportunity to enjoy the comforts of our pool. Otherwise,
- this weather is for the birds!
-
- Returning to work after a vacation is no picnic! Not only do you feel a
- little down that the vacation is over (okay, a lot down!), but just walking
- into the job to see two weeks of work piled up is downright inhumane! I've
- been back a week, and I still can't see the top of my desk yet! And as I'm
- trying to clean up the work from when I was gone, new stuff gets added
- daily! Yes, it's a fair trade-off as far as I'm concerned! I'm sure that
- Joe will have similar sentiments.
-
- I know that Joe has been drilling into people's brains lately about
- registering to vote, and then actually getting out to vote come election
- time. I couldn't agree more. And, I really hate politics, for the most
- part. Yet, it's my right to do so - people fought and died to give us that
- right. Don't ever give it up! Speaking of elections, the Democratic
- National Convention is being held in Boston next week. In and of itself, it
- sounds like an incredible event, and an important coup for Boston to play
- host. But, in this post-9/11 time, I think this event is going to cause
- more hassle than it's worth. The security measures are going to be
- unbelievable! Getting in and out of the city next week is going to be
- incredibly difficult, if possible at all. Thankfully, I moved out of Boston
- a few years ago and won't be directly impacted. I guess it all has to be
- done, but the cost may be too high. It's almost humorous in a way. The
- local news station that I watch on television has a daily update for the DNC
- called "The DNC Survival Guide". During this news segment, they provide
- daily updates to the new security decisions, what roads and services will
- be closed, and other things that will impact "routine" life in and around
- the city. I think people are going to be glad when this event is over! All
- for a week's worth of politicking (that reads P-A-R-T-Y!) and to listen to a
- presidential candidate's nomination acceptance speech to the delegates.
-
- Until next time...
-
-
-
- =~=~=~=
-
-
-
- MiNT on Coldfire
-
-
- Anders Eriksson has announced:
-
- I just want to let you know that the MiNT kernel runs now also on the
- Coldfire. I wrote a detailed description of how I ported the kernel to this
- platform. You can read it at:
-
- http://acp.atari.org/articles/mcf5407eval/mcf5407eval.html
-
- There is also a summary about the TOS-dependencies of MiNT (at least the
- needed things for the startup), I stumbled across.
-
- All in all, I must say that I liked the fact that MiNT leaves the hardware
- initialization for timers, keyboard etc. to TOS. This enabled me to perform
- these initializations in a Coldfire-specific way in advance and then
- calling the MiNT kernel. (very much like a PC BIOS, that sets the system to
- a well defined state)
-
- Frank told me that he wants to make MiNT take over the whole system and
- kick out all dependencies to the underlying TOS. This means, to include all
- drivers that are needed for MiNT's startup (keyboard, screen, timers etc.)
- into the MiNT kernel. I would like to keep MiNT behaving like it does now.
- The great advantage for now is, that MiNT makes no assumptions about any
- devices except the CPU.
-
- My current execution environment for the MiNT kernel is very small (ca. 600
- lines of code). It supports character output and keyboard input (over a
- serial connection). There is no block device support yet.
-
- Thank you all for your great achievements with MiNT!
-
- Greetings,
- Norman
-
- http://acp.atari.org/articles/mcf5407eval/mcf5407eval.html
-
-
-
- Open Source Gaming Galore!
-
-
- Anders Eriksson has announced:
-
- Gildor, who brought you the Yeti3D engine port to Atari continues his
- porting frenzy. We've gotten no less than four complete games ported from
- other platforms to the Atari. Ok ok, which ones? Here goes..
-
- * Wolfenstein 3D
-
- Ported from the original, so everything's there as it should be. Demo
- levels included in the archive.
-
- * Spear of Destiny
-
- A Wolfenstein 3D spin-off, very similar but different levels and some
- new stuff (textures with transparency for instance).
-
- * LTris
-
- Well the name says it all really. You need a 25MHz bus for this one,
- or a SuperVidel; it needs 640x480 16bit hi-colour graphics.
-
- * Moonlander
-
- A remake of an old Atari classic game. This one also needs 25MHz bus
- or a SuperVidel, same reasons as above.
-
- * Yeti3D
-
- Well as a little bonus, an updated version of the Yeti3D engine, now
- with better low res mode (centered graphics etc).
-
- These portings are all using the latest SDL versions, so they should be
- using the fast C2P routines from Mikael Kalms/TBL. Gildor also tells us
- that the games runs _much_ better in MiNT than TOS (MagiC untested).
-
- Wolfenstein 3D: http://files.dhs.nu/files_game/wolf3d.zip
- Spear of Destiny: http://files.dhs.nu/files_game/spear.zip
- Moonlander: http://files.dhs.nu/files_game/lander.zip
- LTris: http://files.dhs.nu/files_game/ltris.zip
- Yeti3D: http://files.dhs.nu/files_game/yeti3d.zip
-
-
-
- ASMA 2.8 Released
-
-
- Another update to the famous 8-bit music collection called Atari SAP Music
- Archive has been released. It adds 70 new songs and now the whole
- collection has exceeded 10 MBytes! Get 1840 POKEY tunes and players at the
- ASMA homepage.
-
- URL: http://asma.atari.org/
-
-
-
- New MyAES Release
-
-
- The multitasking AES for (Free)MiNT called MyAES has been upgraded with new
- features.
-
- Highlights from the new release includes:
-
- * 256-colour icon support
- * Loadable keymaps (compatible with MagiC)
- * Window resize from all window borders
- * Real-time scrolling
-
- http://myaes.free.fr/
-
-
-
- =~=~=~=
-
-
-
- PEOPLE ARE TALKING
- compiled by Joe Mirando
- joe@atarinews.org
-
-
-
- Hidi ho friends and neighbors. Remember that thing I was talking about
- where the number of posts goes down as the temperature goes up? Well, it
- must be hot as all get-out SOMEWHERE. <g>
-
- The number of posts is incredibly small this week, so it's going to be a
- short column. I guess that the outdoor activities and vacations and such
- are taking their toll again. Although I feel it now much more than in
- years past.
-
- Oh, one thing I'd like to mention before we get into the posts from the
- UseNEt. I'd like to thank Fred Horvat for his short article last week
- about the weekly Atari chat. It's nice to know that there are those who
- look forward to something as simple as a weekly chat with some old (or
- new) Atari buddies.
-
- Again, if you want to join the chat on Tuesday evenings, just point your
- telnet or ssh client to atarinews.org and use bbs as both the login name
- and password to get in. From there, if you haven't already done so,
- create an account for yourself and then hit "T" for talk and then "C"
- for chat. After that, all you need to do is supply a 'handle' and you'll
- be in the chatroom with the rest of us. Chats are held every Tuesday
- night at 9:00 eastern / 6:00 pacific time. Be there or be square!
-
- Now let's get to the STuff from the UseNet.
-
-
- From the comp.sys.atari.st NewsGroup
- ====================================
-
-
- Mikael Holm asks for help in locating an old disk:
-
- "I just got hold of a book called "Introducing Atari ST Machine Code"
- by R. Pearson and S Hodgson, published by zzSoft (ISBN 1 873423 01 2)
-
- It is supposed to be accompanied by a disk containing an assembler,
- editor, some sample programs etc...
-
- Does anybody out there have this disk? If so can I have it? Or a copy
- or image file of it?"
-
-
- John Oakes tells Mikael:
-
- "I have the original disk if you want a copy. It small
- enough to download if you wish."
-
-
- Coda also gets involved:
-
- "I also have this book, and wouldn't mind the disk if anyone has it...."
-
-
- Sam F. looks around for a new keyboard:
-
- "Anybody got a working TT030/Mega/MegaSTE keyboard laying around which they
- don't need and are willing to let go of it for a reasonable price?"
-
-
- Mark Duckworth tells Sam:
-
- "I should have at least one good MSTe/TT keyboard that works. I have Mega
- ST keyboards but they're all flaky.. Mystery mouse movements and that
- sort of thing."
-
-
- Sam asks Mark:
-
- "So, if that keyboard is for sale, how much do you want for it? And would
- it be practical on a re-cased Falcon mb in a tower case?"
-
-
- Mark replies:
-
- "Indeed it's practical. My setup is a falcon style to mega ste style
- keyboard adapter (home made, but they are selling them on ebay for $1.00
- or so). Then I bought a very long 6 wire RJ-11 telephone cable from radio
- shack. Cut the wire right down the center, flip it on one side and
- resolder (not sure why the keyboard cable is like this, but if you DON'T
- do this you will fry the keyboard controller and kill the keyboard). And
- resolder everything then and tape it up. Then you can put your computer
- wherever you want and have a long cable. As far as the one I have, I have
- to first have the motivation to find it and test it. Then I can decide on
- a price based on condition. Some of them are discolored and have
- cigarette burns from their prior owner. What condition are you interested
- in?"
-
-
- Sam now asks about his Falcon re-casing project:
-
- "After fooling around a bit, I can maneuver the falcon mb onto the
- backplane without having to remove the backplane.
-
- My question now is, I drilled a practice hole on the mainboard and tried to
- screw in a standoff but...I nearly had to force it in and the threads on
- the standoff got a bit mashed.
-
- Is there a special way the holes for the standoffs need to be drilled?"
-
-
- Steve Sweet rushes in and tells Sam:
-
- "No!!! Stop, DO NOT DRILL THE MOTHERBOARD (Shouting intentional)
-
-
- Sam calms Steve:
-
- "Sorry for the confusion....what I meant to say was that I drilled a
- practice hole in the backplane....ha ha ha ha!! :)
-
- Sheesh, I'm not that stupid, though some would argue otherwise!!"
-
-
- Mark Duckworth tells Sam:
-
- "I drilled larger than the standoffs and then found the proper nuts for the
- back of the standoff at home depot and bolted them in so that there was no
- chance of them coming back out. If your standoffs have good depth you can
- even throw a washer in there for good measure."
-
-
- Sam tells Mark:
-
- "That sounds like a great idea. Now, where can I purchase standoffs and
- the screws that go with them? I've got 7 standoffs but not the screws. I
- guess Home Depot would be a good start eh?
-
- Thanks a bunch Mark!!!!"
-
-
- Well folks, that's it for this week. See? I told you it was going to be a
- short column. Make sure you tune in again next week, same time, same
- station, and be ready to listen to what they are saying when...
-
-
- PEOPLE ARE TALKING
-
-
-
- =~=~=~=
-
-
-
- ->In This Week's Gaming Section - 'Missing' Game Is Unnerving!
- """"""""""""""""""""""""""""" 'Pure Pinball' Coming to Xbox!
- 'The Guy Game'! "Chipping" Banned!
-
-
-
-
- =~=~=~=
-
-
-
- ->A-ONE's Game Console Industry News - The Latest Gaming News!
- """"""""""""""""""""""""""""""""""
-
-
-
- 'Missing' Game Is Unnerving, Captivating
-
-
- Three years ago, Electronic Arts combined phone messages, e-mail, faxes,
- streaming video, Web sites and AOL Instant Messenger to create a conspiracy
- game known as "Majestic."
-
- It was intriguing. It was ambitious. It was unique. But for a variety of
- reasons, it didn't last.
-
- Now Lexis Numerique has scaled down the concept to create "Missing: Since
- January," which also tries to give players a sense that they're solving a
- real-life mystery.
-
- There are no faxes, phone calls or AOL messages.
-
- But "Missing: Since January," which was released in Europe about six months
- ago as "In Memoriam" and is distributed in North America by the Adventure
- Co., does give you a sense that you're communicating on the Internet with a
- disturbed computer genius.
-
- You'll have to do some real-life exploration of the Web to get the
- solutions to several puzzles. And to help you in your quest, you will
- receive e-mail, purportedly from a television production company and people
- who are trying to find a missing reporter and his girlfriend.
-
- You can sample the plot on the Web site for the fictional production
- company (http://www.skl-network.com). There you'll see information about
- 40-year-old reporter Jack Lorski, read some stories he was working on, and
- inspect his desk as he left it when he disappeared with Karen Gijman, a
- 32-year-old independent illustrator.
-
- The $20 game comes with a black CD-ROM that, according to the story, was
- sent to the network by someone who calls himself (or herself) "The Phoenix"
- and claims to be holding Lorski and Gijman hostage.
-
- Obviously the Phoenix knows his way around computers. Once you load up the
- disk, he begins communicating with you, taunting you and, quite literally,
- playing with you.
-
- He keeps unveiling a series of puzzles and mini-games that must be solved
- in order to get more information about the Lorski case. Some are pretty
- rudimentary, requiring nothing more than clicking on objects that dart
- around the screen. Some are pretty challenging. Some are very disturbing.
- ("Missing" is rated for mature audiences.)
-
- One puzzle includes a movie showing the girlfriend's face underwater. She's
- struggling. Someone is obviously trying to drown her.
-
- In fact, the whole game radiates the aura of a disturbed mind, with
- haunting, unsettling sound effects that will make you want to keep the
- lights on if you play at night.
-
- Some challenges involve real detective work, using a combination of real
- Web sites and those created just for the game.
-
- In one case, you must search the Internet to find the identities of six men
- shown in an old photograph. Fortunately, the names are so unusual that a
- search engine like Google quickly tracks down the picture.
-
- Another puzzle requires players to piece together portions of film showing
- an assassination. You'll also have to find the name of a girl with the
- tattoo of a snake on her belly.
-
- The more puzzles you solve, the more the Phoenix reveals.
-
- You learn that the reporter had stumbled onto an old Super 8 mm movie
- camera. The film, once developed, shows two men carrying out a murder. The
- owner of the camera was apparently killed when the murderers spotted him.
-
- Lorski had become obsessed with finding out where the pictures were taken,
- who was murdered, and who the killers were.
-
- As you progress through the game, you see video footage taken by Lorski and
- Gijman, who has her own link to the case.
-
- If you get stuck, you won't be alone in your quest. E-mails sent to you
- from the ersatz production company and other people supposedly trying to
- help you find the missing couple will give you hints or tell you where to
- find tools to help analyze the evidence.
-
- "Majestic" failed because it was an open-ended subscription-based game
- where signing up was so complicated that nine out of 10 players who started
- to register never completed the process. And the streaming video could be
- very choppy.
-
- "Missing: Since January" is a one-shot, self-contained game where signing
- up consists of choosing a log-in name and giving your e-mail address. The
- game instantly mails you a password, and you're ready to play.
-
- And because all the videos are on a CD-ROM, they run smoothly.
-
- Whether "Missing" succeeds in North America will depend on how many
- computer owners would rather solve mysteries and puzzles than pick up
- animated guns and blast everything in sight.
-
-
-
- Pure Pinball Coming for the Xbox
-
-
- Iridon Interactive and XS Games LLC have announced an agreement that will
- see XS Games publish Pure Pinball for the Xbox throughout North America,
- with distribution handled by Take 2 Interactive.
-
- Featuring photo-realistic 3D graphics, Pure Pinball will test player's
- pinball skills across more than 30 challenges and missions, spread across
- four table layouts inspired by authentic American pinball designs. Each
- table layout provides a distinct challenge, and the mission structure will
- test the skills of even the best of players.
-
- "The Xbox delivers the power we need to provide the most realistic pinball
- experience on any platform", said Iridon CEO Bjorn Larsson. "Pure Pinball
- is the closest you'll get to owning a real pinball machine without actually
- buying one."
-
- "We're proud to being able to bring Pure Pinball to the Xbox", said XS
- Games CEO Steve Grossman. "The realism of the game brings the fun and
- enjoyment of the pinball genre to the Xbox for the first time ever, and
- pinball fans will not be disappointed."
-
- Players can also share their high scores on Xbox Live with other players
- from around the world, competing in a next generation flipper fest to see
- who can prove themselves a true pinball wizard.
-
- Pure Pinball for the Xbox is scheduled for release across North America in
- early August 2004 at an estimated retail price of $20 USD.
-
- Features
-
- * Complete more than 30 challenges and missions across 4 tables based
- on authentic American pinball table architecture.
- * Photo-realistic 3D graphics create lifelike pinball machines, with
- each table created from more than 150,000 polygons, all rendered in
- real time.
- * Making use of Xbox Live, players can compete for world dominance by
- sharing high scores with other players from all over the world.
- * The Xbox Controller vibration functions allows for trigger sensitive
- flippers, allowing players to feel the ball, offering a level of
- realism missing from other pinball titles.
- * Making use of a next generation physics engine, with more than 1,500
- calculations per second, the game provides unparalleled ball movement
- and collision detection within the 3D environment of the table.
- * Multiple camera setups are possible using the real-time 3D graphics
- engine, allowing you to view the pinball table in a complete
- overview, close-up on the ball, traditional scrolling style, or even
- following the ball using the 'ball-cam'.
- * Advanced transform & lighting technology makes for amazing special
- effects, including real-time light flares, metallic and glass
- reflections and decorative backlights.
-
- Tables
-
- * Feel the adrenaline in the Excessive Speed table, winning race
- missions to prove your handling ability.
- * Fight the good fight with the World War table, completing mission
- assignments to win the war.
- * Ride the rails of the Pony Express in the Old West with the Runaway
- Train table.
- * Explore the universe, taking the controls of the Hyper Space table.
-
-
-
- The Guy Game Announced
- Hottie Hi-Jinks Coming to PlayStation 2 and Xbox
-
- Combining spring break excitement with an engaging trivia challenge
- TOPHEAVY Studios and Gathering, a publishing label of Take-Two Interactive
- Software, Inc. today announced The Guy Game, a new video game based around
- the insanity that is Spring Break. Available in August for the PlayStation2
- computer entertainment system and the Xbox video game system from
- Microsoft, The Guy Game (ESRB Rating: M) was shot live on location on South
- Padre Island during Spring Break, and challenges players to match wits with
- over 60 attractive co-eds, all of whom are set on showing off their best
- "assets."
-
- "I feel innovation is incredibly important in the video game industry. With
- The Guy Game we set out to do something completely different than what had
- been done before," said Jeff Spangenberg, CEO of TOPHEAVY Studios. "We feel
- that guys will be extremely pleased with the final result."
-
- Features of The Guy Game include:
-
- * 20 outrageous episodes featuring interviews, stunts and challenges
- with over 60 attractive college babes;
- * Hosted by funnyman Matt Sadler, as seen on MTV and winner of HBO's
- National Talent Search;
- * Smackdown with up to four players. Top scorer becomes "President" and
- makes the rules; low scorer loses influence and respect;
- * Over 1000 popular trivia questions from the worlds of sports, movies,
- TV and more;
- * Choose one of eight sexy babes to be a personal cheerleader;
- * Find out who has the biggest Ballz in high-speed action mini-games
- such as Ballz Out, Ballz In and Ballz Shotz;
- * Features the world famous Hottie Challenge.
-
- The Guy Game is rated 'M' by the ESRB and is scheduled for release in
- August.
-
-
-
- UK Bans PlayStation 'Chipping'
-
-
- The selling of "mod chips" for Sony PlayStation 2 game consoles has been
- ruled illegal by a UK high court.
-
- A PlayStation 2 with a modified chip installed can play imported or pirated
- copies of the console's video games.
-
- Mr Justice Laddie backed Sony's legal argument that its intellectual
- property was being infringed by people selling the chips to console owners.
-
- The ruling is thought to be one of the first brought under a controversial
- European Union directive on copyright.
-
- Sony brought its case against a man called David Ball who was accused of
- selling about 1,500 "Messiah" mod chips.
-
- In the High Court, Mr Justice Laddie ruled that Mr Ball was acting
- illegally in selling the chips which get around the built-in copy
- protection system on Sony's console.
-
- As well as declaring the sale of the mod chips illegal, Mr Laddie said that
- the use, advertising or possession of them for commercial purposes should
- be considered illegal too.
-
- Sony brought the case under the EU Copyright Directive which was enacted in
- the UK in October 2003.
-
- Under that directive, it is illegal to circumvent copy protection systems.
- But some cyber-liberties advocates claim that such laws only enshrine
- existing monopolies.
-
- They say that neither professional criminals nor technically savvy users
- will be deterred by such legislation.
-
- The ruling is not the first victory Sony has won against makers of mod
- chips. In Belgium it also won a similar case against another mod chip
- seller.
-
- However, in Italy a judge threw out Sony's case saying it was up to owners
- of a console what they did with it.
-
- Similarly in Spain, mod chips are seen as legal despite the EU copyright
- legislation.
-
-
-
- =~=~=~=
-
-
-
- A-ONE's Headline News
- The Latest in Computer Technology News
- Compiled by: Dana P. Jacobson
-
-
-
- Technology to Widen Reach of Amber Alerts
-
-
- A new technology debuting in 12 states will significantly extend Amber
- alerts, reaching cell phones, e-mail and handheld computers, and could also
- be used to transmit weather and terrorism alerts.
-
- "It might not be the all-alert system, but the backbone is going to be
- there," said Chris Warner, president of E2C in Scottsdale, Ariz., which led
- the system's development. "Homeland Security could take it right over."
-
- Police officers in Arizona and Washington, starting Monday, were able to
- send Amber alerts - notifications of a child abduction - from a highly
- encrypted system in their cars then update them with photos and more
- detailed descriptions, Warner said. Ten other states are expected to launch
- the expanded alerts this summer.
-
- "The goal of this is to make it so pervasive, no one will be stupid enough
- to take a child," said Warner.
-
- The system will use a simple broadcast technology that takes the
- information into a Web portal and reconfigures it for different types of
- broadcast. A state department of transportation, for instance, might
- receive one format for its road signs and another for its information
- number.
-
- Using the new system, people with cell phones can sign up for Amber alerts
- in with county or state authorities. The text of an alert can be shot
- immediately to local TV news programs' Web sites, with automatic updates.
-
- "What we've done is create a fairly simple publishing and broadcasting
- tool," said Stuart McKee, who worked on the system when he was chief
- information officer for Washington state and is now the U.S. national
- technology officer for Microsoft Corp.
-
- The system also represents a next generation of public warning.
-
- Many state emergency managers have clamored for a system that would
- instantly dispatch disaster information, including evacuation maps, on cell
- phones, the Internet and hand-held devices.
-
- Gov. Brad Henry of Oklahoma has said he hopes the technology could
- eventually be used to warn residents about severe weather, said Phil
- Bacharach, a state spokesman.
-
- The idea came about after McKee saw Warner give a presentation on another
- information-sharing network he had developed, Earth911, an Internet
- clearinghouse with local information about recycling different types of
- trash.
-
- State agencies and companies including Hewlett-Packard Co., Intel Corp. and
- Symantec Corp. worked together for 18 months to develop the system.
- Symantec said in May it is providing the external security monitoring of
- the host site and backup locations. The companies donated a total of $4
- million in development time, Warner said.
-
- The system will help police in part because they can spend much of the 24
- hours after an Amber alert is issued answering phone calls from people
- looking for more information, McKee said.
-
- Amber alerts were created after the 1997 kidnapping and murder of
- 9-year-old Amber Hagerman, who was abducted while riding her bicycle in
- Arlington, Texas.
-
-
-
- New Technology Heralds Unlimited Web Sites - ICANN
-
-
- ICANN, the U.S. body overseeing Web site allocations globally, has launched
- a new technology that will allow virtually unlimited Internet addresses,
- its chairman told Reuters on Tuesday.
-
- Vinton Cerf of the Internet Corp. for Assigned Names and Numbers (ICANN)
- said the next-generation protocol, IPv6, had been added to its root server
- systems, making it possible for every person or device to have an Internet
- protocol address.
-
- Rapid growth in the use of the World Wide Web has in recent times prompted
- concerns about future scarcity of domain addresses, with demand threatening
- to overload the existing system, the IPv4.
-
- "This is a big, big step," Cerf said, speaking on sidelines of ICANN's
- annual conference held in the Malaysian capital.
-
- Los Angeles-based ICANN was given the job of overseeing the Internet's
- naming and numbering system globally by the U.S. government.
-
- Cerf said about two-thirds of the 4.3 billion Internet addresses currently
- available were used up, adding that IPv6 could magnify capacity by some
- "25,000 trillion trillion times."
-
- He said the IPv6 system would run parallel to IPv4 for about 20 years to
- ensure that any bugs or system errors were weeded out.
-
-
-
- Microsoft Settles Lawsuit Against Lindows
-
-
- Microsoft Corp. settled all its trademark infringement suits against
- Lindows Inc. with a $20 million payment to the Linux operating system
- upstart, which agreed to change its name to Linspire.
-
- Details of the settlement, reached Friday, were disclosed in documents
- Lindows filed Monday with the Securities and Exchange Commission as part of
- plans for an initial public offering.
-
- In a statement, the companies said the settlement ends a spate of
- litigation in the United States and abroad.
-
- "We are pleased that Lindows will now compete in the market place with a
- name distinctly its own," said Tom Burt, Microsoft's deputy general
- counsel.
-
- Lindows chief executive Michael Robertson said the terms "make business
- sense for all parties."
-
- Microsoft, based in Redmond, Wash., sued San Diego-based Lindows in 2001
- in U.S. District Court here, alleging the name infringed on its trademark
- for the ubiquitous Windows operating system. Microsoft then filed similar
- complaints in Europe and Canada. It won preliminary injunctions in the
- Netherlands, Finland and Sweden, before quietly settling the Dutch case.
-
- In addition to the U.S. litigation, cases were pending in France, Spain
- and Canada.
-
- In April, Lindows changed the name of its products to Linspire after U.S.
- District Judge John Coughenour refused to halt the trademark infringement
- cases outside the United States.
-
- But the company had until now stuck with Lindows as a corporate name.
-
- Lindows makes a computer operating system that competes with Windows but is
- based on the Linux operating system.
-
- Proponents of Linux and other open-source technology say it is cheaper and
- can be more secure, in part because the underlying software blueprints and
- any improvements are freely shared.
-
- Microsoft tightly guards the proprietary blueprints for Windows.
-
- Under the settlement, Lindows has 60 days to stop using the Lindows name on
- its products.
-
- Microsoft will pay Lindows $15 million in the next 30 days. The remaining
- $5 million will paid out once Lindows transfers control of most of
- Lindows-related Web site names over to Microsoft. That must be done by
- Jan. 25.
-
- Lindows has four years to continue using two of its Web addresses -
- www.lindows.com and www.lindowsinc.com - but only to redirect visitors to
- its new Web sites. After the four years have passed, those sites will also
- be transferred to Microsoft.
-
- The San Diego company said the cash settlement and the public offering
- could help eliminate concerns that it will not be able to stay afloat, but
- it noted that it still expects to have significant losses over the next
- several years.
-
-
-
- SCO Suffers Legal Setback
-
-
- The SCO Group took a hit Wednesday when a circuit court judge in Michigan
- dismissed the Unix software provider's claim that automaker DaimlerChrysler
- violated its software agreement by refusing to provide certification of
- compliance with the provisions of that agreement.
-
- SCO spokesperson Blake Stowell told NewsFactor that Judge Ray Lee Chabot
- tossed aside all but one of the company's motions in the case, essentially
- granting DaimlerChrysler's motion for dismissal of the lawsuit. The
- remaining sticking point is whether the auto giant took too long to certify
- compliance with the Unix software agreement, he said.
-
- "Their lawyer argued that DaimlerChrysler did offer certification
- compliance, but they did that after the suit was filed," Stowell said. "We
- are satisfied that DaimlerChrysler has certified its compliance with the
- agreement, and the purposes of our litigation have been fulfilled."
-
- The suit was initially filed in March, along with another action against
- AutoZone that alleges software-copyright violations. That suit charges
- AutoZone with violating SCO's Unix copyrights by running versions of the
- Linux (news - web sites) operating system that contain code from SCO's
- proprietary Unix System V software.
-
- That case is on hold, with SCO recently given more time to collect
- information, through discovery and depositions, before proceeding with a
- preliminary injunction.
-
- SCO also has suits pending against IBM and Novell, charging copyright
- infringement. In response, Linux vendors Red Hat, HP and Novell are
- offering various types of indemnification to their customers. SCO's amended
- suit against IBM includes nine allegations of copyright and contractual
- violations, with SCO seeking US$5 billion in damages.
-
- Stowell said the Michigan ruling would not impact the other cases, pointing
- out that they involve software distribution and title issues.
-
- Yankee Group analyst Laura DiDio told NewsFactor that the case against
- DaimlerChrysler was a long shot, and that the ruling came as no surprise.
- "They may have been overreaching when they took on a multinational
- corporation like this," she said. "This certainly puts a damper on any
- additional lawsuits by SCO."
-
- SCO sent letters to thousands of Unix licensees in December, requiring that
- they offer proof of compliance with their contracts within 30 days.
-
-
-
- Virus Purporting Bin Laden Suicide Hits Web
-
-
- A virus purporting to show images of Osama Bin Laden's suicide popped up on
- the Internet on Friday, designed to entice recipients to open a file that
- unleashes malicious software code, security experts said.
-
- The virus was attached to a message that was posted on over 30,000 usenet
- newsgroups and is not being spread via e-mail, said Web security vendor
- Sophos.
-
- The U.S. government has been hunting for Bin Laden since 2001, holding him
- responsible for masterminding the attacks on the World Trade Center and
- Pentagon on Sept. 11, 2001, but he has not yet been found.
-
- Chris Kraft, senior security analyst at Sophos, said the message and virus
- was designed to lure unsuspecting readers into opening a file, similar to
- the Anna Kournikova virus that enticed readers to open a file that
- unleashed malicious software code.
-
- "If you don't know the person or the origin of a message, you shouldn't be
- opening it," Kraft said.
-
- The fake Bin Laden suicide file, when opened, unleashes a program called a
- Trojan horse that makes it possible for attackers to take over infected
- personal computers running Microsoft Corp.'s Windows operating system.
-
- Kraft said the virus itself had already appeared on the Internet before,
- but the virus writer had apparently repackaged it by saying it contained
- Bin Laden's suicide photos.
-
-
-
- More Worms Inch Across the Internet
-
-
- New versions of the Bagle and MyDoom worms surfaced on the Internet this
- week, and appear to be spreading.
-
- Bagle.AI and MyDoom.N are both so-called "mass mailing" worms that use a
- built-in SMTP engine that sends e-mail messages carrying worm-infected file
- attachments from computer to computer on the Internet, both using faked (or
- "spoofed") sender addresses, antivirus companies say.
-
- The new worm variants are just the latest in a string of virus releases in
- recent days that have antivirus software companies scrambling to keep their
- customers protected.
-
- W32.Bagle.AI first appeared Monday and is rated a "medium" threat by
- McAfee's Antivirus Research Team, citing reports of the virus from
- customers. McAfee rates MyDoom.N a "low" threat, whereas Computer
- Associates International notes the prevalence and destructiveness of the
- worm.
-
- Similar to earlier versions of Bagle, the AI variant spreads through shared
- file folders and in e-mail messages carrying the worm file as an
- attachment, according to advisories from Sophos and McAfee.
-
- E-mail messages generated by the worm used forged (or "spoofed") sender
- addresses and the subject line "Re:" Worm-infected file attachments might
- be in.zip,.exe,.scr,.com, or.cpl and also have nonspecific names like
- "Moreinfo," "Details," or "Readme," antivirus companies say.
-
- Infected file attachments use one of a short list of names including "MP3,"
- "Doll," and "Cat."
-
- The worm can also send copies of itself as a password-protected compressed
- file with a.zip extension. The password needed to unzip the.zip file is
- contained in a second file with a.txt,.ini,.doc, or other extensions,
- McAfee says.
-
- The MyDoom.N worm uses spoofed sender addresses such as "postmaster," "Post
- Office," and "MAILER-DAEMON" that make the e-mail resemble a rejected
- message.
-
- MyDoom.N messages also have nondescript Subject lines such as "hello,"
- "hi," and "delivery failed." Virus file attachments have names like
- "readme," "mail," "text," and "attachment." File extensions include .cmd,
- .bat, .com, .exe, and .zip, McAfee says.
-
- Antivirus companies issued updated virus definitions that can detect the
- new Bagle and MyDoom variants and recommended that customers update their
- antivirus software.
-
-
-
- N.Y. Settles E-Mail Marketer Lawsuit
-
-
- New York authorities on Monday settled a lawsuit filed against a
- Colorado-based electronic mail marketer for allegedly sending unsolicited
- and deceptive "spam" messages on behalf of clients.
-
- New York Attorney General Eliot Spitzer said the marketer, Scott Richter,
- and his company, OptInRealBig.com, paid $40,000 in penalties and $10,000
- in investigative costs under the agreement, which was signed before state
- Supreme Court Justice Eileen Bransten in Manhattan. The company also agreed
- to provide Spitzer's office with customer information and all
- advertisements it sends as well as promising to use proper identifying
- information when registering domain names.
-
- "This settlement holds Richter and his company to a new standard of
- accountability in their delivery of e-mails," Spitzer said. "If he does not
- fulfill these standards, he will find himself back in court, facing greater
- penalties."
-
- When Spitzer filed the civil suit against Richter, OptInRealBig.com and
- some of the company's clients and other individuals in December 2003, the
- attorney general said he was seeking $20 million in penalties.
-
- Steve Richter, father and lawyer of Scott Richter, said Monday the
- settlement basically involved a "no harm, no foul" situation from Richter's
- standpoint. The fact the attorney general settled for $50,000 while
- initially talking about $20 million in damages "speaks for itself," Steve
- Richter said.
-
- Richter said he and his son were also angered by a news release Monday from
- Spitzer in which Scott Richter was referred to as a "deceptive spammer."
-
- "We vigorously and strongly dispute that claim because there is no finding
- by anyone that OptInRealBig.com or Scott Richter is a deceptive spammer,"
- Steve Richter said. "That misrepresents the settlement."
-
- OptInRealBig.com said in a statement Monday that as part of the settlement
- with Spitzer, it agreed to abide by the terms of the 2003 federal Can Spam
- Act. The Westminster, Colo.-based company said it's been complying with the
- act all along anyway.
-
- Spitzer spokesman Brad Maione said neither Scott Richter nor
- OptInRealBig.com admitted any wrongdoing in the settlement.
-
- When announcing his suit, Spitzer said special Hotmail e-mail accounts set
- up by his investigators found thousands of e-mails in May and June 2003
- that carried bogus "from" and "subject" lines, often indicating that the
- messages were part of ongoing conversations instead of being unsolicited
- commercial lures.
-
- A lawsuit Microsoft Corp. filed against Richter in Washington state was not
- affected by New York's settlement.
-
-
-
- Hacker Indicted In One of Biggest Case of Online Data Theft
-
-
- A 45-year-old man was indicted on charges of hacking into the computers of
- a marketing company with one of the world's largest databases of personal,
- financial and company information, officials said.
-
- The indictment unsealed in Arkansas charges Florida resident Scott Levine
- with conspiracy, unauthorized access of a protected computer, access device
- fraud, money laundering and obstruction of justice.
-
- "The charges stem from an alleged scheme to steal vast amounts of personal
- information from a company database and represent what may be the largest
- cases of intrusion of personal data to date," the Justice Department said
- in a statement.
-
- Officials said Levine controlled a company called Snipermail, which sent
- out vast amounts of e-mail ads on behalf of advertisers or their brokers.
-
- The indictment said Levine and other Snipermail employees broke into a
- computer database owned by Arkansas-based Acxiom Corporation, one of the
- world's largest companies managing personal, financial, and corporate data.
- He then sold e-mail addresses to other marketing firms.
-
- Officials did not say how much personal data may have been stolen. But the
- indictment charges 139 counts of illegal access, and said Levine downloaded
- some 8.2 gigabytes of data from the Acxiom server from April 2002 to August
- 2003.
-
- "The protection of personal information stored on our nation's computer
- systems is critical to public trust in those networks and to the health of
- our economy," said Assistant Attorney General Christopher Wray.
-
- "We will aggressively pursue those who steal private information from
- computer networks and make it clear that there are serious consequences
- for such crimes."
-
- Six other individuals associated with Snipermail have agreed to cooperate
- in the investigation, officials said.
-
-
-
- Microsoft Takes on the Phishers
-
-
- Microsoft is donating close to $50,000 worth of software to an anti-crime
- agency to help stamp out phishing and other online fraud activities.
-
- The donation, which comes with the services of a full-time analyst from
- Microsoft's Internet Safety Enforcement group, goes to the National
- Cyber-Forensics & Training Alliance, an anti-crime organization run by the
- FBI (news - web sites), the National White Collar Crime Center, Carnegie
- Mellon University and West Virginia University.
-
- The analyst will help the unit interpret the data as it relates to the
- Can-Span Act and what is known about phishers. He or she will also help the
- unit design training programs for enforcement agencies.
-
- "The tactics of spammers, hackers and other online con artists are becoming
- increasingly sophisticated, and as a company, Microsoft is dedicating
- resources to help law enforcement find those responsible for harming
- consumers," Nancy Anderson, deputy general counsel for the company, said in
- a statement.
-
- The donation is part of Microsoft' bigger push to root out virus writers
- that target its applications and operating system. For all the gripes -
- legitimate and not - about security flaws in Microsoft's software, few
- would charge that Microsoft is not leveraging its greatest asset: its bank
- account. Many credit the increase in leads and arrests with Microsoft's
- proffered bounty.
-
- "I doubt we would have ever caught the Netsky author if it hadn't been for
- that," Carole Theriault, Security Consultant with Sophos, tells
- NewsFactor.
-
- "People are getting caught because they talk, and their friends turn them
- in because of the reward," Panda Software CTO Patrick Hinojosa agrees.
-
- Now, Microsoft is working to curtail phishing activity. While these scams
- do not always make headlines the way a new virus does, they are a related
- concern. Indeed, many of these e-mails piggyback on viruses written
- specifically for this purpose.
-
- Growing Numbers Phishing, while not directly traced to Microsoft's security
- flaws, is having as great an impact on online users as the viruses are.
- Phishing employs e-mail lures to "fish" for identity information, such as
- passwords and financial data. Armed with this personal data information,
- scammers commit identity theft and fraud, explains Dan Meyer, director of
- communications for the Anti-Phishing Working Group and director of product
- marketing at Tumbleweed, a corporate anti-spam vendor. "We've seen a pretty
- significant growth trend over a number of months, and there is nothing that
- is going to change that in the near future," says Meyer.
-
-
-
- Dell Launches Site To Fight Spyware, Viruses
-
-
- Dell Inc. on Tuesday launched a site to help consumers battle the growing
- number of computer problems related to spyware, viruses and other online
- security threats.
-
- In debuting the site, Dell, based in Round Rock, Texas, joined Yahoo Inc.,
- Microsoft Corp. and a growing list of other companies offering services to
- help consumers battle the increasing number of malicious applications
- floating around the network.
-
- Dell's and the others' motives are not only altruistic. Virus attacks and
- spyware have prompted an increasing number of customers to contact
- computer, software and services vendors, placing a heavy burden on customer
- service operations.
-
- "Spyware is the root cause of many of the performance problems our
- customers face," Mike George, vice president and general manager of the
- computer maker's consumer business, said in a statement.
-
- Up to 20 percent of the calls received by Dell's consumer-desktop technical
- support workers are for spyware and virus-related issues, far surpassing
- any other performance issue, George said.
-
- The new PC Security site includes how-to information on identifying
- spyware, viruses and other Internet threats; tips for protecting PCs; and
- information and promotions on firewall, anti-virus and anti-spyware
- products.
-
- Phone support for troubleshooting and removing malicious software is
- available to Dell customers for $39 per incident.
-
-
-
- Users Sidestep Required Logins For Content Sites
-
-
- Readers fed up with entering personal information in exchange for accessing
- Web site content can circumvent the process using BugMeNot.com to generate
- login names and passwords for sites requiring registration
-
- Many content Web sites, particularly newspapers, oblige readers to login to
- view content. Content providers offer readers access free of charge in
- exchange for demographic information - most commonly gender, birth year,
- and ZIP code. The site then uses the demographic information for
- advertising purposes.
-
- Newspapers have long claimed that they need to demographic information to
- maintain advertising revenue. However, there has been widespread
- speculation that registration information fuels spam. Web users are
- generally reluctant to provide personal information and many readers are
- known to enter false information.
-
- To use BugMeNot, users enter the URL of the registration page for a site
- that requires login on the BugMeNot site. The site then provides bogus
- account information that allows users to access the site without providing
- their own demographic information. If the site has not already been
- "liberated" by BugMeNot, users receive instructions for creating a login.
-
- According to their Web site, Australia-based BugMeNot.com has liberated
- almost 16,000 sites from what they term "registration bondage." The most
- actively requested site on BugMeNot.com are:
-
- 1. www.nytimes.com
- 2. www.washingtonpost.com
- 3. www.latimes.com
- 4. www.ajc.com
- 5. www.chicagotribune.com
-
- BugMeNot works with Mozilla and Internet Explorer. The site also offers a
- toolbar that users can install by dragging to their browser. The site also
- offers a plug-in for Mozilla written by Eric Hamiter and a Dean
- Wilson-authored plug-in for IE.
-
- Another free service, specifically for the New York Times, is New York
- Times Link Generator. Created by Stanford-bound teenager, and
- self-proclaimed hacker, Aaron Swartz, this site creates Web-log-safe links.
- Web-loggers can then place these links on their Web logs to direct users to
- New York Times content, bypassing the login.
-
- The BugMeNot site is decidedly anti-commercial, including a manifesto
- against required logins, providing instructions for linking to the site,
- and even requests donations for the cause. The site also promotes both
- Mailinator and Spamgourment to users for creation of pseudo e-mail
- addresses that can be used for registration.
-
-
-
-
- =~=~=~=
-
-
- Atari Online News, Etc. is a weekly publication covering the entire
- Atari community. Reprint permission is granted, unless otherwise noted
- at the beginning of any article, to Atari user groups and not for
- profit publications only under the following terms: articles must
- remain unedited and include the issue number and author at the top of
- each article reprinted. Other reprints granted upon approval of
- request. Send requests to: dpj@atarinews.org
-
- No issue of Atari Online News, Etc. may be included on any commercial
- media, nor uploaded or transmitted to any commercial online service or
- internet site, in whole or in part, by any agent or means, without
- the expressed consent or permission from the Publisher or Editor of
- Atari Online News, Etc.
-
- Opinions presented herein are those of the individual authors and do
- not necessarily reflect those of the staff, or of the publishers. All
- material herein is believed to be accurate at the time of publishing.
-