Home Blog Page 9038

XFce 3.8.8 released

Author: JT Smith

Posted at LWN.net: “This new release fixes some focus problem (the routines in charge of focus in
xfwm have been deeply modified) and includes an entirely rewritten sound module
(xfsound) that can now take advantage of audiolib and aRts (optionnaly, support
for aRts must be specified at ./configure time)”

News tops ‘sex’ in cybersearches

Author: JT Smith

From MSNBC: “Osama bin Laden has displaced
Pamela Lee Anderson in cyberspace and people looking for
information about the American flag outnumbered those
curious about Britney Spears. For the first time in the short
history of the Internet, popular search engines report that ‘sex’
dropped off their lists of top 10 search terms in the days
following the attacks on the World Trade Center and Pentagon.”

FirstLinux-based DSP solution for streaming video multimedia devices

Author: JT Smith

From PRNewswire: Driving the development
of emerging Linux-based digital media applications, Texas Instruments
Incorporated (NYSE: TXN) (TI), Ingenient Technologies, Inc. and RidgeRun, Inc.
today announced the availability of an embedded Linux(TM) operating system for
TI’s imaging digital signal processor (DSP) solution, enabling faster and
easier development of streaming video multimedia devices. RidgeRun will
provide its DSPLinux(TM) operating system and Board Support Package (BSP) for
the innovative TI imaging platform, and Ingenient will integrate its MPEG-4
technology, a premier streaming media standard.

Virus damage estimated at US$2.6-billion

Author: JT Smith

That’s the estimate from the National Post on the damage done by the Nimda worm.

Category:

  • Linux

MS: You don’t trust us? OK, we’ll ‘open’ Passport, Hailstorm

Author: JT Smith

From ZDNet Anchordesk: “Microsoft says it wants Passport and Hailstorm, its foundation services for Web-based
applications, to play well with others. So in a shocking move, the company is announcing today
that Passport will be changed to use an Internet-standard security model and Hailstorm won’t be
the only place for users to store their personal information.”

Crusoe-based tablet PC to enter mass production

Author: JT Smith

IDG News Service reports that a Tiawan company is close to mass-producing a
tablet PC using Transmeta’s Cruose processor. The PC will run Linux or Windows CE.

Category:

  • Unix

Compaq cluster makes Top 10 benchmark

Author: JT Smith

The Register: “A Compaq Proliant server cluster is capable of running up a billion transactions a day – apparently a
first in TPC-C (Transaction Processing Council) validated benchmark.

In real life, this is equivalent to the requirements of “more than triple the transactions handled daily,
worldwide, by a large consumer credit card payment processing system”, Q helpfully points out.”

Category:

  • Unix

Wireless MP3 delivery system launched

Author: JT Smith

Anonymous Reader writes: “Sensate Inc has launched a system that will deliver streaming MP3 music to wireless devices. Called 2nR-Musiker, the wireless media server for Real Jukebox was released today as a beta.

http://www.mp3newswire.net/stories/2001/sensate.ht ml

Microsoft deflects charges of worm woes

Author: JT Smith

CNET: “Microsoft refuted claims Wednesday that the main Web site for its FrontPage software had been infected by the
Nimda virus, despite the antivirus software alarms set off by viewing the site.

On Wednesday, several security experts believed that the software giant–which has often put the responsibility on
customers to patch software holes–had apparently failed to patch at least one major server.

However, Christopher Budd, security program manager for Microsoft’s security response center, said that wasn’t the
case.

“No one is being infected,” he said. “There
is no code to infect people.”

According to Budd, a third-party content
provider that apparently created the
elements for the FrontPage site had been
infected by Nimda.”

GNU-Darwin: Using encryption is your patriotic duty

Author: JT Smith

By Grant Gross

As some U.S. lawmakers contemplate outlawing some forms of encryption, the leader of the GNU-Darwin project is arguing that it’s the patriotic duty of U.S. citizens to use some encryption tools.

In his article, GNU-Darwin authentication and encryption position paper for the US, Michael L. Love says the “open-signing” form of encryption that’s available with encryption programs such as PGP and GnuPG would keep would-be terrorists from hijacking other people’s email to send their messages. Under open signing, the text of the email is open for all to read, but the identify of the sender is authenticated.

Love writes: “All US citizens should immediately start open-signing their email messages as a voluntary act of patriotic duty. In addition, any information
which would assist our terrorist enemies should be encrypted as a matter of course. Let’s use this powerful software to help us win the war against terrorism.”

Love released the paper late last week, after the terrorist attacks on New York and the Pentagon, but he updated it this week to suggest that encryption could’ve limited the damage of the Nimda worm that’s been attacking Windows servers this week.

He writes: “Email worms can be thwarted by an authentication system, because your email must be signed with your passphrase before it is sent. If someone receives email from you that is improperly signed, then they automatically know that something went wrong. PGP could have prevented Nimda worm attacks via email.”

Love argues that the proposal by U.S. Senator Judd Gregg to ban encryption products without backdoors that government agents could exploit would open up all kinds of secure systems that Americans take for granted.

“We are arguing that internet authentication must be based
on strong encryption without back doors, or else the infrastructure
will be weakened,” Love tells NewsForge. “In our group we are thinking about .NET and
about avoiding bad encryption legislation, but this new email worm is
an example that most people can relate to right now.

“The majority of the public still thinks that back doors are a good
thing, because they don’t know any better. I feel that it is important
to get counter-examples like this into the open, because Congress could
still add an encryption amendment to one of the existing funding or
national defense bills that are being considered right now. That would
disastrous, IMHO.”

In the paper, Love gives examples of ATM machines and online purchasing systems as trusted services that could be compromised if encryption backdoors are required. “Nearly everyone who has ever made a purchase on the web has used encryption, and if you live in the US, it was certainly strong encryption,” he writes. “If you made an online donation to help the people of New York City, then you certainly used encryption, even though you may not have realized it. Such encryption capabilities are vital,
because we do not want sensitive information such as credit card numbers to fall into the hands of criminals or terrorists.”

Category:

  • Programming