home *** CD-ROM | disk | FTP | other *** search
Text File | 2010-10-02 | 53.8 KB | 1,197 lines |
- Volume 12, Issue 40 Atari Online News, Etc. October 1, 2010
-
-
- Published and Copyright (c) 1999 - 2010
- All Rights Reserved
-
- Atari Online News, Etc.
- A-ONE Online Magazine
- Dana P. Jacobson, Publisher/Managing Editor
- Joseph Mirando, Managing Editor
- Rob Mahlert, Associate Editor
-
-
- Atari Online News, Etc. Staff
-
- Dana P. Jacobson -- Editor
- Joe Mirando -- "People Are Talking"
- Michael Burkley -- "Unabashed Atariophile"
- Albert Dayes -- "CC: Classic Chips"
- Rob Mahlert -- Web site
- Thomas J. Andrews -- "Keeper of the Flame"
-
-
- With Contributions by:
-
- Fred Horvat
-
-
-
- To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
- log on to our website at: www.atarinews.org
- and click on "Subscriptions".
- OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
- and your address will be added to the distribution list.
- To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
- Please make sure that you include the same address that you used to
- subscribe from.
-
- To download A-ONE, set your browser bookmarks to one of the
- following sites:
-
- http://people.delphiforums.com/dpj/a-one.htm
- Now available:
- http://www.atarinews.org
-
-
- Visit the Atari Advantage Forum on Delphi!
- http://forums.delphiforums.com/atari/
-
-
-
- =~=~=~=
-
-
-
- A-ONE #1240 10/01/10
-
- ~ Net Neutrality Shelved ~ People Are Talking! ~ Worm Hits Iran Nuke!
- ~ RIM Unveils Playbook! ~ Ease Internet Wiretaps? ~ More Gmail Control!
- ~ More Hotmail Security! ~ Another Acer 3D Laptop! ~ Google Opens Goo.gl!
- ~ No 3DS for Christmas! ~ Huge Zeus Trojan Bust! ~ Ties With Oracle Cut!
-
- -* 'Jihadi Sites' Aren't Stopped *-
- -* Cyber-Blitz Response Plan Testing! *-
- -* U.S. Cyber Command Slips Behind Schedule! *-
-
-
-
- =~=~=~=
-
-
-
- ->From the Editor's Keyboard "Saying it like it is!"
- """"""""""""""""""""""""""
-
-
-
- Here we are, the first of October, and we're taking a pounding with high
- winds and bursts of torrential downpours as a result of the remnants of
- yet another hurricane making its way past us up the east coast. The
- sounds of acorns and small tree branches hitting the house has been
- constant for more than a day now! It's been an interesting past couple
- of days!
-
- October 1st! Wow, yet again I'm wondering where this year has gone!
- Nothing much has changed other than the year on the calendar! We're
- all another year older, along with the effects that go along with adding
- to our age! Another period of political wrangling; like many of you,
- you're probably seeing typical BS campaigning in your state like we are
- here in Massachusetts. This time around we have the added attraction of
- some "Tea Party" candidates to keep things interesting. Obama's
- presidential slogan for change may come back and haunt him - especially
- in a couple of years!
-
- It's been another long week! Pretty soon, like in a week or so, I'll
- stop working at the golf course and return to my "regular" schedule at
- the grocery store. Another sign of the seasons... Not looking forward
- to that regular routine again; it's been tough on me physically, but
- bills need to be paid and food put on the table! Not too many of us have
- the luxury of taking our pick of jobs these days, if we're even lucky
- enough to find one! So, let me get the dogs out one last time for the
- evening before the skies open up again, and then put this week's issue
- to be for another week!
-
- Until next time...
-
-
-
- =~=~=~=
-
-
-
- PEOPLE ARE TALKING
- compiled by Joe Mirando
- joe@atarinews.org
-
-
-
- [Editor's note: Due to being out of sorts due to more respiratory ailments,
- there will not be a P.A.T. column this week.]
-
-
-
- =~=~=~=
-
-
-
- ->In This Week's Gaming Section - No 3DS for Christmas!!
- """"""""""""""""""""""""""""" Video Games for Surgeons!
-
-
-
-
-
- =~=~=~=
-
-
-
- ->A-ONE's Game Console Industry News - The Latest Gaming News!
- """"""""""""""""""""""""""""""""""
-
-
-
- Nintendo Cuts Profit, 3DS Not Ready for Christmas
-
-
- Nintendo slashed its earnings forecast by more than half Wednesday after
- announcing that its 3DS game machine, packed with glasses-free 3-D
- technology, won't be ready to go on sale for Christmas.
-
- Nintendo now expects 90 billion yen ($1 billion) in profit for the year
- through March 2011, down from an initial projection of 200 billion yen
- ($2.4 billion) profit.
-
- The 3DS will go on sale in February in Japan, and March in Europe and
- the U.S., missing the year-end shopping season which is a critical time
- for all game-makers to rake in profits.
-
- Kyoto-based Nintendo Co. had promised the 3DS for sometime before April
- next year, and so the announcement is not technically a delay. But its
- forecasts had assumed the machine would on be on sale sooner.
-
- Nintendo said the strong yen, which reduces profits from overseas sales
- when brought back to Japan, and the timing of the 3DS launch were behind
- its decision to lower projections for the fiscal year.
-
- For the year through March 2011, Nintendo expects to sell 23.5 million
- DS machines, including 4 million 3DS, down from its earlier forecast for
- 30 million. It sold 27 million DS machines the previous fiscal year.
-
- The latest revision shows that even Nintendo, which has stood up fairly
- well among Japanese exporters in hard times, is getting battered by the
- surging yen. Nintendo had counted dollar trading near 85 yen. The dollar
- has recently dived below 85 yen.
-
- Nintendo President Satoru Iwata said 3DS will cost 25,000 yen ($300) in
- Japan, where it will hit stores Feb. 26. Overseas prices and specific
- dates will be announced later.
-
- Hirokazu Hamamura, president of Enterbrain Inc., a major Tokyo
- game-industry publisher, said he was surprised by the release date because
- of widespread rumors the 3DS would hit stores in time for year-end and New
- Year's - a booming shopping time in Japan because children get cash gifts
- from relatives during the holidays.
-
- He said Nintendo is likely taking time to perfect the technology, as well
- as giving more time to outside software developers to come up with games.
-
- "There is an element of awe in 3-D that's really important for games.
- They are all about entertainment," Hamamura said.
-
- The portable machine looks much like the DS machines now on sale, and has
- two panels. The top panel shows 3-D imagery, giving players a relatively
- immediate illusion of virtual reality - such as a puppy licking the
- screen that appears to live inside the machine.
-
- The 3-D games don't require the special glasses that are needed for 3-D
- theater movies or 3-D home-console games like rival Sony Corp.'s
- PlayStation 3. They also don't need 3-D TV sets.
-
- Iwata said the drawback for 3-D technology was that the appeal of the
- feature can't be conveyed easily in TV or magazine ads.
-
- Fears have also been growing about the health effects of too much 3-D as
- some people have gotten sick looking at 3-D movies or playing 3-D games.
-
- "We are not taking the success of the 3DS for granted," Iwata told
- reporters at Makuhari Messe hall in this Tokyo suburb. "The value of the
- 3-D experience can be understood only by getting people to try it out."
-
- Nintendo said that several 3-D games were in the works including its
- trademark Super Mario games and "nintendogs + cats."
-
- Outside game developers were also preparing products, such as a 3DS
- "Biohazard" from Capcom Co.
-
- The 3-D handheld version of "Metal Gear Solid," from Konami Digital
- Entertainment, shown to reporters on the machine as a demonstration
- movie, but not in playable game form, presented vivid animation of
- jungle scenery, buzzing bees and a warrior's hands, all in 3-D, inside
- the tiny screen.
-
- The 3-D feature is adjustable by a button at the side so players can
- choose the amount of 3-D razzle-dazzle they want.
-
- Nintendo said that wireless technology packed in the 3DS will allow
- owners to automatically communicate with passers-by who also have 3DS,
- allowing them to trade avatar figures and combat each other in fighting
- games.
-
- Nintendo did not disclose details of the wireless technology, but Iwata
- said it was beefing up connectivity for 3DS at Japanese fast-food
- chains, train stations and other spots for social networking as well as
- gaming.
-
- Nintendo was among the earliest developers of 3-D technology. Its
- Virtual Boy, which went on sale in the 1990s, bombed, partly because of
- the bulky headgear required as well as the image being all red.
-
- Iwata acknowledged that failure but said the company had learned from
- past mistakes.
-
- "Players will be able to move freely around in virtual gaming space with
- our new 3-D," he said.
-
-
-
- Future Surgeon Prerequisite: Video Gaming
-
-
- Video gamers rejoice, your potential future career as a surgeon just got
- a little less daunting. Forget a morbidly precocious interest in Gray's
- Anatomy at some tender age, if you play video games, you're already on a
- trajectory toward a career involving advanced surgical techniques.
-
- Canadian research scientists recently found that hand-eye skills developed
- by gaming - no /great/ surprise here - train the brain for sophisticated
- visuomotor tasks, tuning skills necessary for complex surgical procedures
- involving images displayed on a video screen. Skills such as laparoscopic
- surgery, for instance.
-
- The study involved 13 males in their twenties who'd played video games a
- minimum of four hours a week for the prior three years, compared with 13
- males who hadn't. Both groups were asked to complete tricky visuomotor
- tasks, such as using a joystick to accomplish specific goals, or looking
- one way while reaching in the opposite direction.
-
- "By using high resolution brain imaging, we were able to actually measure
- which brain areas were activated at a given time during the experiment,"
- said Lauren Sergio, associate professor in the Faculty of Health at York
- University in Ontario.
-
- "We tested how the skills learned from video game experience can transfer
- over to new tasks, rather than just looking at brain activity while the
- subject plays a video game."
-
- Non-gamers tend to use their parietal cortex, which integrates spatial
- sensory information, according to the study's results, while the group
- of gamers (or those with more recent gaming experience, anyway) used
- their prefrontal cortex instead.
-
- What's the difference? The prefrontal cortex "receives highly processed
- information from all major forebrain systems, and neurophysiological
- studies suggest that it synthesizes this into representations of learned
- task contingencies, concepts and task rules," according to a 2002
- scientific paper titled "The prefrontal cortex: categories, concepts and
- cognition."
-
- "In short, the prefrontal cortex seems to underlie our internal
- representations of the 'rules of the game'. This may provide the necessary
- foundation for the complex behavior of primates, in whom this structure is
- most elaborate."
-
- The other spot of good news: The York researchers believe this could be
- a major breakthrough for Alzheimer's patients, whose visuomotor skills
- can become severely impaired as the disease progresses.
-
- The study doesn't indicate what type of games lead to prefrontal versus
- parietal brain area use, but it's something the York research group
- hopes to determine in the future, as well as whether gender plays a role.
-
-
-
- =~=~=~=
-
-
-
- A-ONE's Headline News
- The Latest in Computer Technology News
- Compiled by: Dana P. Jacobson
-
-
-
- U.S. Cyber Command Slips Behind Schedule
-
-
- U.S. Cyber Command, responsible for shielding 15,000 U.S. military networks
- and for being ready to go to war in cyberspace, has slipped behind schedule
- for becoming fully operational, the Defense Department said on Friday.
-
- The command is still putting necessary capabilities in place, said Bryan
- Whitman, a Pentagon spokesman. It had been due to be declared fully
- operational no later than this month, a deadline some had read as October 1.
-
- Cyber Command leads day-to-day protection of all U.S. defense networks
- and is designed to mount offensive strikes if ordered to do so.
-
- It began operating in May 2010, seven months later than initially
- ordered by Defense Secretary Robert Gates.
-
- Gates ordered the command's creation in June 2009 to consolidate
- far-flung units under a four-star general after determining the cyber
- threat had outgrown the military's existing structures.
-
- More than 100 foreign intelligence organizations are trying to break
- into U.S. networks, Deputy Defense Secretary William Lynn wrote in the
- latest issue of Foreign Affairs. Some "already have the capacity to
- disrupt" U.S. information infrastructure."
-
- Whitman declined to name a new target for reaching full operational
- capability. The important thing, he said, was building the capabilities,
- not an "artificial date."
-
- The department blamed the schedule slip chiefly on what Whitman called a
- seven-month delay in Senate confirmation of Army officer Keith Alexander
- as head of the new unit located at Fort Meade, Maryland. Alexander was
- confirmed on May 7.
-
- Alexander, 58, also heads the National Security Agency, the Fort
- Meade-based Defense Department arm that protects national security
- information and intercepts foreign communications.
-
- He told the House of Representatives Armed Services Committee last week
- that putting cyber defenses fully in place was urgent. At the time, he
- voiced no expectation of a delay in reaching full operating capability.
-
- "The need is great and there is no time to lose," Alexander said in an
- opening statement to the panel on September 23.
-
- He cited the emergence of new tools that could damage or destroy systems
- and "have effects approaching those of weapons of mass destruction."
-
- A Senate Armed Services Committee staff member said the delay in
- Alexander's confirmation followed what he called the Defense
- Department's "failure to provide information to the committee in a
- timely fashion."
-
- Committee Chairman Carl Levin said in opening Alexander's April 15
- confirmation hearing that the panel had moved "methodically to gain an
- understanding of what the Congress is being asked to approve and what
- the key cyberspace issues are that need to be addressed."
-
- The 24th Air Force, a Cyber Command component, was declared fully
- operational on Friday by General Robert Kehler, commander of Air Force
- Space Command, the Air Force said.
-
-
-
- U.S. Mounting First Test of Cyber-Blitz Response Plan
-
-
- The United States is launching its first test of a new plan for responding
- to an enemy cyber-blitz, including any attack aimed at vital services such
- as power, water and banks.
-
- Thousands of cyber-security personnel from across the government and
- industry are to take part in the Department of Homeland Security's Cyber
- Storm III, a three- to four-day drill starting Tuesday.
-
- The goals are to boost preparedness; examine incident response and
- enhance information-sharing among federal, state, international and
- private-sector partners.
-
- "At its core, the exercise is about resiliency - testing the nation's
- ability to cope with the loss or damage to basic aspects of modern
- life," said a release made available at DHS's National Cybersecurity and
- Communications Integration Center in Arlington.
-
- The simulation tests the newly developed National Cyber Incident
- Response Plan, a coordinated framework ordered by President Barack Obama.
-
- The plan is designed to be flexible and adaptable enough to mesh
- responders' efforts across jurisdictional lines. Refinements may be made
- after the exercise, DHS officials said.
-
- The test involves 11 states, 12 foreign countries 60 private companies.
-
- Six cabinet-level departments are taking part beside Homeland Security:
- Defense, Commerce, Energy, Justice, Treasury and Transportation, as well
- as representatives from the intelligence and law-enforcement worlds.
-
- Cyber Storm III takes place amid mounting signs that bits and bytes of
- malicious computer code could soon be as central to 21st-century
- conflict as bullets and bombs.
-
- "There is a real probability that in the future, this country will get
- hit with a destructive attack and we need to be ready for it," U.S. Army
- General Keith Alexander, the head of a new military cyber-warfare unit,
- told reporters last week, referring to computer-launched operations.
-
- Cyber Storm III involves simulated harm only, not real impact on any
- network, said Brett Lambo, the exercise director.
-
- In the drill, mock foes hijack Web security infrastructure used by
- businesses, government and consumers to verify and authenticate online
- transactions.
-
- In so doing, they upend Internet reliability and relationships before
- launching major attacks against the government, certain critical
- infrastructure, public sector enterprises and international counterparts.
-
- Officials did not spell out the scenario's details to preserve the
- surprise of exercise play.
-
- Among the industry sectors currently represented at the 24-hour watch
- and warning hub are information technology, communications, energy and
- banking and finance, said Sean McGurk, the DHS official who directs the
- hub inaugurated last October.
-
- Other participants take part from the locations where they would
- normally respond to a cyber-attack. The foreign "players" are from
- Australia, Britain, Canada, France, Germany, Hungary, Japan, Italy, the
- Netherlands, New Zealand, Sweden and Switzerland.
-
-
-
- Lawmakers Decry US Failure To Stop 'Jihadi Websites'
-
-
- US lawmakers Wednesday lamented their inability to shutter Internet
- websites set up by violent Islamist groups such as Al-Qaeda that aim to
- inspire, recruit and train would-be extremists.
-
- "Can we? Yes. Will we? No," Representative Brad Sherman told AFP after a
- House hearing that sought to pin down a US strategy for the websites,
- referring to the possibility Congress could clamp down on extremists'
- online portals.
-
- "It is more likely we will tie ourselves up in knots than we'll do anything
- useful," added Sherman, chairman of the Subcommittee on Terrorism,
- Nonproliferation and Trade, which held the hearing.
-
- He said bureaucratic wrangling and free speech advocates were the main
- obstacles to giving the US government legal tools to eliminate the sites.
-
- Sherman earlier even lashed out during the hearing at popular
- video-sharing website YouTube for allowing Yemen-based Al-Qaeda in the
- Arabian Peninsula (AQAP) to post videos with English subtitles that
- promotes a "jihadist ideology" from its own channel.
-
- "I don't know how much money YouTube makes, how much its executives make,
- but they are endangering people throughout America for their own profit,"
- he said.
-
- "And it's not about (YouTube's) loyalty to the concept of the First
- Amendment, it's about their loyalty to money," he complained, referring to
- the US Constitution which protects freedom of expression.
-
- Sherman also questioned whether US authorities should maintain the groups'
- online outlets to gather intelligence or simply eliminate them, asking if
- the United States is "going to be a polite country or safe country."
-
- He concluded the United States was "manifestly unable to take down these
- sites through cyber attack because we are restrained by our own
- politeness."
-
- Gregory McNeal, a law professor at California's Pepperdine University,
- testified before the hearing that there was "no concerted government
- effort to shut down jihadist websites" because there was no legal avenue
- that allows it.
-
- McNeal later told AFP the biggest issue preventing US legislators from
- going after such sites was "civil liberties opposition groups that would
- see this as a threat to free speech."
-
- The best way to take them down, McNeal said, was to go through blacklists
- maintained by the US Treasury and State Department for terrorist
- organizations, adding the approach would be difficult as authorities would
- have to verify the websites were maintained by those designated groups.
-
- "The Supreme Court has never spoken on crime-facilitation speech... there's
- always a challenge between drawing the line between merely informative
- speech and speech that facilitates a crime with the intent of doing so,"
- he said.
-
- "Is it surmountable? No. Because unless there's a triggering event like
- an attack that was prompted by a video (on an extremist website), it's
- easier to keep the status quo. Sadly, we often wait for an attack before
- we take action."
-
- The rise of extremist groups employing online media to attract followers
- and give tips on how to pursue jihad against Western targets was
- highlighted this year with the launch of an English-language Al-Qaeda
- magazine from AQAP - removing the language barrier for non-Arabic speakers
- to the group's ideology.
-
- The first edition of "Inspire" magazine in June ran articles such as one
- entitled "Make a Bomb in the Kitchen of Your Mom" and featured sleek
- pictures of Al-Qaeda leaders accompanied by sleek graphics.
-
- Pete Hoekstra, the top Republican on the House Intelligence Committee,
- said upon the magazine's launch that AQAP's effort was "unfortunately
- well done," and proof "Al-Qaeda and its affiliates have launched a
- direct appeal for Americans to launch small-scale attacks here at home."
-
-
-
- US Seeks To Ease Internet Wiretaps
-
-
- The Obama administration is drawing up legislation to make it easier for
- US intelligence services to eavesdrop on the Internet, including email
- exchanges and social networks, The New York Times said Monday.
-
- The White House intends to submit a bill before Congress next year that
- would require all online services that enable communications to be
- technically capable of complying with a wiretap order, including being
- able to intercept and unscramble encrypted messages, the Times reported.
-
- The services would include encrypted email transmitters like BackBerry,
- social networking websites like Facebook and peer-to-peer messaging
- software like Skype.
-
- Federal law enforcement and national security officials are seeking the
- new regulations, arguing that extremists and criminals are increasingly
- communicating online rather than using phones.
-
- "We're talking about lawfully authorized intercepts," said Federal
- Bureau of Investigation (FBI) general counsel Valerie Caproni.
-
- "We're not talking expanding authority. We're talking about preserving
- our ability to execute our existing authority in order to protect the
- public safety and national security."
-
- Officials from the White House, Justice Department, National Security
- Agency, FBI and other agencies have been meeting in recent months to
- craft the proposals, the Times said.
-
- But, citing officials familiar with the discussions, it said the
- participants had not yet agreed on important elements, such as how to
- define which entities are considered communications service providers.
-
- President Barack Obama's administration is seeking a broad mandate that
- would also apply to companies whose servers are operated abroad, such as
- Research in Motion, the Canadian maker of BlackBerry smartphones.
-
- As an example, officials told the Times that investigators discovered
- that Faisal Shahzad, the suspect from the failed Times Square bombing in
- May, had been using a communication service without prebuilt
- interception capacity.
-
- That meant that there would have been a delay before he could have been
- wiretapped, had he aroused suspicion beforehand, the officials said.
-
-
-
- Leaked Bill Aims to Create Net Neutrality Law
-
-
- Draft legislation from the U.S. Congress would create a new network
- neutrality law but would prohibit the U.S. Federal Communications
- Commission from making its own rules prohibiting broadband providers from
- selectively slowing Web traffic.
-
- The draft bill, published on NationalJournal.com, would hold mobile
- broadband providers to a less stringent net neutrality standard than wired
- carriers.
-
- The bill, authored by Democrats including House Energy and Commerce
- Committee Chairman Henry Waxman, would prohibit wired broadband providers
- from "unjustly or unreasonably" discriminating against legal Web traffic,
- but would not apply that prohibition to mobile providers. The bill would
- prohibit both wired and mobile providers from blocking consumer access to
- websites and from blocking legal websites.
-
- Mobile carriers have argued that net neutrality rules shouldn't apply to
- them because of the limited bandwidth on their networks.
-
- The legislative proposal is similar in some ways to a net neutrality plan
- released in August by Google and Verizon Communications. Like the Google
- and Verizon plan, the Waxman draft would allow the FCC to fine broadband
- providers up to US$2 million for violating net neutrality rules, but the
- Waxman proposal would not take away the rulemaking authority of the FCC.
-
- The Google and Verizon plan, criticized by many net neutrality advocates,
- would require the FCC to enforce net neutrality principles on a
- case-by-case basis.
-
- The new draft won praise from some groups that have opposed the FCC's
- efforts this year to create formal net neutrality rules. Waxman's bill
- would prohibit the FCC from reclassifying broadband as a common-carrier
- service subject to increased regulation by the agency.
-
- FCC Chairman Julius Genachowski has proposed reclassifying broadband
- from being a largely unregulated service. That move came after a U.S.
- appeals court ruled earlier this year that the agency did not have the
- authority to enforce informal net neutrality principles after Comcast
- slowed its customers' access to the BitTorrent peer-to-peer service.
-
- An FCC spokeswoman declined to comment on the draft bill, as did a
- spokesman for Public Knowledge, a digital rights group pushing for
- stronger net neutrality rules.
-
- Scott Cleland, chairman of the broadband carrier-backed NetCompetition.org,
- praised the House draft.
-
- "This House Democrat draft signals to the FCC Democrat majority loud and
- clear that House Democrats do not support the radical ... proposal to
- regulate broadband Internet networks as 1934 common carrier telephone
- networks," he said in an e-mail. "This legislation proposes a sensible
- resolution and workable alternative to this destructive polarizing issue
- that is serving no one who seeks an open Internet that works, grows and
- innovates without anti-competitive concerns."
-
- The draft includes some "positive elements," but also raises some
- concerns, added Randolph May, president of the free-market think tank,
- the Free State Foundation.
-
- The bill's December 2012 expiration date would allow Congress to focus
- on broader telecom law reform, May said. But he questioned the bill's
- prohibition on content discrimination.
-
- "If interpreted too rigidly by the FCC, this legacy common carrier-type
- restriction can inhibit development of new, differentiated services in
- response to evolving consumer demand," he said. "I think any
- discrimination prohibition should explicitly require a showing of
- consumer harm as a prerequisite to any agency remedial action."
-
-
-
- House Democrats Shelve Net Neutrality Proposal
-
-
- House Democrats have shelved a last-ditch effort to broker a compromise on
- the thorny issue of "network neutrality."
-
- The Democrats late Wednesday abandoned proposed rules meant to prevent
- phone and cable companies from playing favorites with the online traffic
- flowing over their networks.
-
- House Commerce Committee Chairman Henry Waxman, R-Calif., had led the
- effort. He gave up in the face of Republican opposition to his plan.
-
- Waxman's retreat is a setback for the nation's big phone and cable
- companies. They fear the issue could now go back to the Federal
- Communications Commission, which could impose more restrictive rules on
- the industry. The FCC has also deadlocked over the net neutrality issue.
-
- "If Congress can't act, the FCC must," Waxman said in a statement.
-
-
-
- Worm Hits Computers of Staff at Iran Nuclear Plant
-
-
- A complex computer worm capable of seizing control of industrial plants has
- affected the personal computers of staff working at Iran's first nuclear
- power station weeks before the facility is to go online, the official news
- agency reported Sunday.
-
- The project manager at the Bushehr nuclear plant, Mahmoud Jafari, said a
- team is trying to remove the malware from several affected computers,
- though it "has not caused any damage to major systems of the plant," the
- IRNA news agency reported.
-
- It was the first sign that the malicious computer code, dubbed Stuxnet,
- which has spread to many industries in Iran, has also affected equipment
- linked to the country's nuclear program, which is at the core of the
- dispute between Tehran and Western powers like the United States.
-
- Experts in Germany discovered the worm in July, and it has since shown
- up in a number of attacks - primarily in Iran, Indonesia, India and the
- U.S.
-
- The malware is capable of taking over systems that control the inner
- workings of industrial plants.
-
- In a sign of the high-level concern in Iran, experts from the country's
- nuclear agency met last week to discuss ways of fighting the worm.
-
- The infection of several computers belonging to workers at Bushehr will
- not affect plans to bring the plant online in October, Jafari was quoted
- as saying.
-
- The Russian-built plant will be internationally supervised, but world
- powers are concerned that Iran wants to use other aspects of its civil
- nuclear power program as a cover for making weapons. Of highest concern
- to world powers is Iran's main uranium enrichment facility in the city
- of Natanz.
-
- Iran, which denies having any nuclear weapons ambitions, says it only
- wants to enrich uranium to the lower levels needed for producing fuel
- for power plants. At higher levels of processing, the material can also
- be used in nuclear warheads.
-
- The destructive Stuxnet worm has surprised experts because it is the
- first one specifically created to take over industrial control systems,
- rather than just steal or manipulate data.
-
- The United States is also tracking the worm, and the Department of
- Homeland Security is building specialized teams that can respond quickly
- to cyber emergencies at industrial facilities across the country.
-
- On Saturday, Iran's semi-official ISNA news agency reported that the
- malware had spread throughout Iran, but did not name specific sites
- affected.
-
-
-
- RIM Unveils PlayBook Tablet to Compete with iPad
-
-
- Research In Motion unveiled a tablet computer on Monday that it hopes will
- leapfrog Apple's iPad with its potential for social networking, media
- publishing and corporate uses.
-
- The tablet, named BlackBerry PlayBook, has a seven-inch screen and dual
- facing cameras. It has WiFi and Bluetooth but needs to link with a
- BlackBerry smartphone to access the cellular network.
-
- Shares of RIM jumped nearly 2 percent to $49.29 in after-hours trade
- following the announcement, made at the company's annual developers'
- conference in San Francisco.
-
- "It's ultra-mobile and it's ultra-thin," co-Chief Executive Mike Lazaridis
- told the developers, who responded with intermittent applause. "PlayBook
- delivers a no-compromises web experience," he said.
-
- PlayBook can mirror a BlackBerry phone, giving users a bigger screen to
- view media and edit documents, and wipes all corporate data once the link
- between the two devices is broken.
-
- The PlayBook weighs 400 grams (14 ounces). It will launch with a dual-core,
- one gigahertz processor running a QNX kernel and operating system that can
- incorporate BlackBerry OS 6, which RIM introduced in its Torch smartphone
- in August.
-
- The market for tablets - touchscreen devices larger than a smartphone and
- smaller than a laptop - has gotten more congested since Apple launched its
- iPad in April, with Samsung and Dell showing off releases in the past two
- months and others expected from Hewlett-Packard and Toshiba.
-
- While the market's direction is relatively uncharted, most analysts agree
- success will be measured by which applications each tablet can run.
-
- "RIM has a strong story to tell to developers to say - look, however you
- want to make things for this thing, we're giving you tools and a platform
- that will allow you to do that," said Forrester Research principal analyst
- Charles Golvin.
-
- The QNX operating system uses industry standard APIs, or application
- programing interfaces, meaning developers should have little difficulty
- in making their games, software and other applications work on the device.
-
- "All the code that is out there, and there is a huge source base out there,
- (it) is completely portable to QNX," said Dan Dodge, who co-founded and led
- the company until RIM acquired QNX less than a year ago.
-
- RIM expects to ship the device to corporate customers and developers in
- October. It will become commercially available early in 2011.
-
- RIM has yet to set an exact price but says it will fall in the lower
- range of prices for consumer tablets already in the suddenly congested
- market.
-
- Asked if later versions will connect to advanced 4G networks now under
- development, RIM co-Chief Executive Jim Balsillie told Reuters: "That's
- not a question we're answering today, but it's not a hard one to guess at."
-
- The absence of a direct link to the cellular network means network carriers
- may be less eager to subsidize the device or promote it heavily. But
- corporate IT departments will likely cheer about its ability to mirror a
- company-issued BlackBerry without retaining that data when that link is
- broken.
-
- "It's compelling, certainly to an IT guy, if they can look at this tablet
- and say it's really nothing we have to lock down," said Kevin Burden from
- ABI Research. "An IT manager can look at this tablet and say we don't even
- need to put this on our asset-tracking list."
-
-
-
- Acer Tries Another 3D Laptop With Aspire AS5745DG
-
-
- Acer will make 3D part of its holiday laptop lineup with the Acer Aspire
- 5745DG, but don't accuse the computer maker of joining the bandwagon.
-
- Acer was already pushing 3D notebooks last year, before any television
- makers introduced 3D sets stateside and began hyping them as the next
- big thing in home entertainment. Last year's model, the Acer Aspire
- 5738DG, was praised in PCWorld's review for converting 2D movies
- effectively and excelling at 3D games, but faltered on weak battery life
- and a cheap-feeling touchpad.
-
- The new Acer Aspire 5745DG takes a different approach to 3D compared to
- its predecessor. Instead of using polarized glasses (the cheaper kind
- you get in movie theaters), this laptop goes full-bore with active
- shutter glasses, like the ones used with today's 3D televisions, and a
- built-in IR receiver. Acer says each eye sees a 60 Hz signal as the
- glasses alternate images between the left and right eyes, creating the
- 3D effect.
-
- For content, the Aspire 5745DG's main draw will be 3D gaming, using
- Nvidia's 3D Vision technology (here's a list of supported games, sorted by
- how well they perform in 3D). But Acer's notebook also packs a 3D Blu-ray
- player and includes a feature that converts 2D images to 3D.
-
- As for other specs, Acer's Aspire 5745DG runs on an Intel Core i5 processor
- with NVIDIA GeForce GT 420M graphics and a 500 GB hard drive, but no word
- on RAM. The laptop also includes a webcam and 802.11 a/b/g/n Wi-Fi.
-
- Can the 5745DG overcome the battery problems of last year's model? Hard
- to say, because Acer avoided giving an estimate on battery life in its
- product announcement. However, the new notebook has a 9-cell battery.
- Hopefully, that'll outlast the 6-cell battery in the 5738DG, which
- cranked for a measly 2 hours and 28 minutes in /PCWorld's/ tests.
-
- Acer isn't the only company working on a 3D laptop with active-shutter
- glasses. HP's Envy 17 is coming this holiday season. Toshiba and Sony
- have also announced 3D laptop plans. Acer's Aspire 5745DG will arrive in
- late October for a cool $1000.
-
-
-
- Microsoft Beefs Up Hotmail Security
-
-
- Microsoft is beefing up security for Hotmail in order to curtail hijacking
- and phishing scams on legitimate accounts.
-
- "These updates will help you protect your password and, in the unlikely
- event that a hijacker gains access to your account, provide a more
- secure recovery path so you will always be able to get your account back
- and kick the hijackers out," John Scarrow, Microsoft's general manager
- of safety services, wrote in a blog post.
-
- In addition to pre-existing security measures, Hotmail is adding a
- couple of password proofs to keep accounts from being infiltrated.
- Scarrow compared proofs to a set of spare keys when you've been locked
- out of your house.
-
- Previously, users locked out of their accounts were asked to provide an
- alternate e-mail address or answer a personal question to prove their
- identities. However, "only 25 percent of people with a secret question
- actually remembered their answer when needed," Scarrow wrote.
-
- As a result, Microsoft introduced two new Hotmail account recovery
- options: cell phone verification and a link to a "trusted PC." With the
- phone option, Microsoft will send a single-use password via text message
- that you can use to activate your account. With "trusted PC," meanwhile,
- you can link your account to two or more personal computers.
-
- "Then, if you ever need to regain control of your account by resetting
- your password, you simply need to be using your computer and we will
- know you are the legitimate owner," Scarrow wrote.
-
- As an added layer of security, making changes to your Hotmail account -
- like adding your cell phone number or a trusted PC - would require you
- to access an existing proof, like that second e-mail address. "This
- means that even if a hijacker steals your password, they can't lock you
- out of your account or create backdoors for themselves," Scarrow said.
-
- Microsoft also pledged to monitor the reputations of IP addresses in
- order to more readily pick up on potential threats.
-
- Microsoft rolled out an updated version of Hotmail for its 360 million
- users this year, finishing up earlier this month. It also incorporated
- Facebook chat and a partnership with professional networking site LinkedIn,
- and allowed for users to post updates simultaneously to all their
- connected networks. It also added Microsoft Exchange ActiveSync for e-mail,
- contacts, and calendar to the
- iPhone.
-
-
-
- Google Gives Gmail Users More Control Over Inboxes
-
-
- Google Inc. is addressing one of the biggest complaints about its free
- e-mail service by giving people more control over how their inboxes are
- organized.
-
- The new option announced Wednesday will allow Gmail users to choose
- whether they prefer their incoming messages stacked in chronological
- order, instead of having them threaded together as part of the same
- electronic conversation.
-
- Gmail has been automatically grouping messages by topic or senders since
- Google rolled out the service six years ago.
-
- But this so-called "conversation view" confused or frustrated many Gmail
- users who had grown accustomed to seeing all their newest messages at
- the top of the inbox followed by the older correspondence. After all,
- that's how most other e-mail programs work.
-
- The complaints grew loud enough to persuade Google to revise the Gmail
- settings so users can turn off conversation view and unravel their
- messages.
-
- "We really hoped everyone would learn to love conversation view, but we
- came to realize that it's just not right for some people," Google
- software engineer Doug Chen wrote in a Wednesday blog post.
-
- The aversion to conversation view doesn't seem to be widespread. Gmail
- ended July with nearly 186 million worldwide users, a 22 percent
- increase from the same time a year ago, according to the research firm
- comScore Inc. Both Microsoft's Windows Live Hotmail (nearly 346 million
- users) and Yahoo's e-mail (303 million users) are larger, but aren't
- growing nearly as rapidly as Gmail.
-
-
-
- Google Opens Goo.gl URL Shortening Service to the Public
-
-
- Before Twitter blew up and everyone started thinking in 140 characters,
- no one really cared about having long URLs. With Twitter users
- scrambling to solve the 140-character puzzle, URL shortening sites like
- Bit.ly, TinyURL, and Ow.ly have grown increasingly popular. Google on
- Thursday jumped into the game and announced its own URL shortening site,
- Goo.gl.
-
- The Google URL shortener was actually introduced last December as part
- of Google Toolbar and Feedburner. Since then, the service has been
- integrated into Google News, Blogger, Google Maps, Picasa Web Albums,
- and Google Moderator. But until now, there was no standalone Google site
- to shorten a URL.
-
- But why bother with Goo.gl when there are already other sites you can
- use? According to Google's Social Web Blog, "when you click a goo.gl
- shortened URL, you're protected against malware, phishing and spam using
- the same industry-leading technology we use in search and other products."
-
- Like many of the URL shortening sites, goo.gl is pretty basic. However,
- it does have some nice URL-tracking features. For example, when you sign
- into your Google account, you can see a list or URLs that you've shortened.
- You can then view public, real-time analytics data, including traffic over
- time, top referrers, traffic sources, and visitor profiles for countries,
- browsers, and platforms. Also, according to Mashable, there's a hidden
- Easter egg in Goo.gl.
-
- "Earlier today, Google engineer Matt Cutts tweeted ... add .qr to a
- shortened goo.gl URL and you'll create a QR code that, when scanned,
- will redirect to the original URL. It's a quirky additive that makes
- goo.gl all the more friendly for brands and marketers experimenting with
- QR codes. A Twitter tipster also informed us that you can add .info to
- the goo.gl URL to check out analytics," Mashable said.
-
-
-
- Microsoft Marks Anti-Malware Anniversary with Stats
-
-
- To mark the first anniversary of Microsoft Security Essentials, the company
- has released some sobering statistics it has gathered during the past year
- via the free anti-malware software.
-
- According to Microsoft, Security Essentials has been installed on 31 million
- computers worldwide. Out of that group, 27 million users reported malware
- infections during the year.
-
- The United States was the most frequently attacked country. Microsoft said
- that during the past year, more than 2 million U.S. machines were attacked
- and reported the infections to the Microsoft Malware Protection Center.
- The U.S. was followed by China, which had over 693,000 attacks reported to
- the center. Brazil and the United Kingdom took the third and fourth spots
- with over 586,000 attacks hitting Brazil and more than 212,000 attacks
- reported by U.K. users.
-
- It's worth noting that those figures are only threats reported to Microsoft.
- They do not represent all the attacks that occurred in the Windows
- ecosystem throughout the year.
-
- Overall, Microsoft Security Essentials detected nearly 400 million threats
- during the past year, Microsoft said. Security Essentials users opted to
- remove 366 million of those threats.
-
- Although those figures might highlight the issues Windows users continue to
- have staying safe from malware infections, Microsoft was quick to point out
- that it believes the past year has been a success for Security Essentials.
- In fact, Microsoft said in a blog post that the company is doing its part
- to "increase security across the Windows ecosystem."
-
- Security Essentials has enjoyed some acclaim since its release last year.
- CNET's review described the software as one of the "good set-it-and-forget-it
- security programs" and gave it four and a half out of five stars.
-
-
-
- OpenOffice.org Volunteers Cut Ties with Oracle
-
-
- LibreOffice. That's the possible new name of OpenOffice.org. The
- volunteers that develop and promote the free office software severed
- ties with Oracle on Tuesday and formed an independent group called The
- Document Foundation.
-
- OpenOffice.org successfully grew under the Sun Microsystems banner for a
- decade, but the volunteers believe a new ecosystem will generate more
- competition and choice for customers, as well as drive innovation in
- office-productivity software. The group also hopes to lower the barrier
- of adoption for users and developers. In essence, the group wasn't happy
- under Oracle.
-
- Oracle acquired the OpenOffice.org assets along with its acquisition of
- Sun. The Document Foundation has invited Oracle to become a member of
- the new foundation, and has asked the tech giant to donate the brand
- name. Until Oracle responds, the group is using the name LibreOffice.
- The break has been widely lauded by software companies large and small.
-
- Chris DiBona, open-source programs manager at Google, called The
- Document Foundation a great step forward in encouraging further
- development of open-source office suites. "Having a level playing field
- for all contributors is fundamental in creating a broad and active
- community around an open-source software project," DiBona said.
-
- Red Hat's Jan Wildeboer and Canonical's Mark Shuttleworthy, among many
- others, also offered support for the project. And Guy Lunardi, product
- management director at Novell, made a bold statement: "Viva la
- LibreOffice. Ultimately, we envision LibreOffice will do for the
- office-productivity market what Mozilla Firefox has done for browsers."
-
- The Document Foundation vowed to build on the work of OpenOffice.org.
- The founders noted that the group was created in the belief that an
- independent foundation is the best fit to the community's core values of
- openness, transparency and valuing people for their contributions.
-
- Oracle has released two stable versions of the open-source software
- since the Sun merger, but the OpenOffice.org community didn't jibe with
- Oracle's vision. Oracle couldn't immediately be reached for comment. But
- Al Hilwa, an analyst at IDC, isn't surprised that the community is
- breaking away from Oracle.
-
- "Is Oracle going to run things more tightly than Sun? No doubt. It's a
- tighter ship. They are going to make some decisions about what to
- support and what not to support, who to invest in and who not to," Hilwa
- said. "I wouldn't expect any less from them."
-
- The question is, could Oracle's decision to run a tighter ship
- ultimately become a problem with its open-source connections? There is
- already tension between Oracle and open-source communities. Hilwa said
- it could cause some issues for developers.
-
- "Oracle's DNA is to make decisions around cost and investments and tight
- control," Hilwa said. "It's not like Oracle to scatter investments and
- resources all over the place without any specific quid pro quo."
-
-
-
- Users Making the Switch to Cutting Edge Browsers
-
-
- New Web browser market share stats are out. This past month has seen a
- decline in the overall market share of the Internet Explorer franchise,
- but breaking things down by version shows that more users are adopting the
- latest generation of Web browsers whether it's Internet Explorer, Firefox,
- or Chrome.
-
- Microsoft's Internet Explorer declined again in overall market share for
- the first time in a few months. The browser as a whole lost .75 percent -
- with Internet Explorer 6 dropping .63 percent, and Internet Explorer 7
- falling half a percent. Those losses were offset, though, by yet another
- significant gain for Internet Explorer 8 - climbing 1.16 percent since the
- last month.
-
- Chrome 6 had by far the largest gain over the previous month, coupled with
- Chrome 5 taking the most precipitous plunge. Overall, Chrome is upslightly,
- but that is after a decline of 4.33 percent by Chrome 5 and a swift rise
- of 4.66 percent over the previous month for Chrome 6. Apparently the vast
- majority of Chrome users willingly embraced the latest browser and made
- the switch.
-
- Firefox users followed the same trajectory. The use of Firefox 3.5 fell
- .18 percent. However, the latest official release, Firefox 3.6, went up
- .25 percent, and Firefox 4 - which is still only in beta - went up .08
- percent.
-
- Even Internet Explorer 9 is riding the cutting edge browser popularity
- wave. It has only been two weeks since Microsoft publicly launched the
- beta of Internet Explorer 9 at a media event in San Francisco. In that
- brief period, though, the beta of Microsoft's next major update to the
- Internet Explorer Web browser has already been downloaded more than six
- million times.
-
- In an Exploring IE blog post, Microsoft's Ryan Gavin notes, "Net
- Applications' browser usage share report released today shows IE9 Beta
- usage share at 0.25 percent for the two weeks after launch. The tech
- enthusiast community is observing a notable increase in IE9 activity:
- LiveSide reported IE9 Beta users accounted for 25 percent of their reader
- base, IE9 overtook IE6 users at DownloadSquad, and Network World reported
- poll results showing 47 percent of people intend to try IE9 Beta.
- Additionally, we saw tweets from the likes of Ed Bott who noticed,
- "Halfway through Day 1 of IE9 availability, 8 percent of my ZDNet visitors
- are using the beta. Steady increase all day, higher than IE7.""
-
- Some of that upswing may be a function of the success of Windows 7 and
- an increase in PC sales. Users who have clung to outdated browsers like
- IE6 would suddenly have IE8 by default on a new Windows 7 system, and in
- the event that a user chooses not to use Internet Explorer, the
- likelihood is that they will install the latest version of whatever
- browser it is they opt to install.
-
- Regardless, of the reasons behind the numbers, new Web technologies need
- new Web browsers, so the transition to cutting edge Web browsers
- benefits developers, as well as everyone else who surfs the Web.
-
-
-
- U.S. Busts $3M 'Zeus Trojan' Cyber Crime Ring
-
-
- The Manhattan U.S. Attorney on Thursday announced charges against 37
- individuals for their roles in cyber attacks that logged keystrokes to
- help the criminal steal $3 million from dozens of U.S. bank accounts.
-
- The cyber-attacks, using malware known as the "Zeus Trojan," started in
- Eastern Europe. E-mails were sent to computers and U.S. small businesses
- and municipalities, and if opened, the malware embedded itself in the
- victims' computers and recorded their keystrokes. Those keystrokes were
- used to capture bank account numbers, passwords, and other online
- security codes.
-
- Hackers then used the personal information to take over peoples' bank
- accounts and transfer money to accounts set up by their co-conspirators.
- These accounts were set up by a "money mule organization," which
- recruited people in the U.S. on student visas to set up bank accounts
- using fake passports. Once the accounts were set up, and the money was
- transferred in from the victims' accounts, the mules forwarded the cash
- to the scammers' bank accounts - many of them overseas.
-
- All told, the scammers made off with $3 million.
-
- N.Y. Attorney General Preet Bharara said 37 defendants have been charged
- in 21 separate cases. Ten people were arrested early Thursday, while an
- additional 10 were previously arrested. Seventeen people are still being
- sought in the U.S. and abroad. The defendants charged in Manhattan
- federal court include managers of and recruiters for the money mule
- organization, an individual who obtained the false foreign passports for
- the mules, and money mules.
-
- "The digital age brings with it many benefits, but also many challenges
- for law enforcement and our financial institutions. As today's arrests
- show, the modern, high-tech bank heist does not require a gun, a mask, a
- note, or a getaway car. It requires only the Internet and ingenuity,"
- Bharara said in a statement. "And it can be accomplished in the blink of an
- eye, with just a click of the mouse. But today's coordinated operation
- demonstrates that these 21 Century bank robbers are not completely
- anonymous; they are not invulnerable. Working with our colleagues here and
- abroad, we will continue to attack this threat, and bring cyber criminals
- to justice."
-
-
-
- =~=~=~=
-
-
-
-
- Atari Online News, Etc. is a weekly publication covering the entire
- Atari community. Reprint permission is granted, unless otherwise noted
- at the beginning of any article, to Atari user groups and not for
- profit publications only under the following terms: articles must
- remain unedited and include the issue number and author at the top of
- each article reprinted. Other reprints granted upon approval of
- request. Send requests to: dpj@atarinews.org
-
- No issue of Atari Online News, Etc. may be included on any commercial
- media, nor uploaded or transmitted to any commercial online service or
- internet site, in whole or in part, by any agent or means, without
- the expressed consent or permission from the Publisher or Editor of
- Atari Online News, Etc.
-
- Opinions presented herein are those of the individual authors and do
- not necessarily reflect those of the staff, or of the publishers. All
- material herein is believed to be accurate at the time of publishing.
-