Home Blog Page 9416

Intel: Pentium 4 to clock up 1.8GHz

Author: JT Smith

ZDNET: “The chipmaker will release 1.8GHz and 1.6GHz Pentium 4 processors in early July, sources
said.

But instead of trumpeting that it has the fastest PC processor lineup, Intel appears to be plotting
to use the new chips to fill gaps in its Pentium 4 lineup as it prepares to launch its 2GHz Pentium
4 chip in a few months.”

Category:

  • Unix

Microsoft security flaw threatens Web

Author: JT Smith

CNET: “The flaw occurs in a component of Microsoft’s Internet Information Service (IIS) software that is
installed on Web servers by default, said Marc Maiffret, chief hacking officer with eEye Digital
Security, the company that found the flaw.

“Pretty much any Web server (using Microsoft software) is basically left vulnerable to attack,” he
said. “Any hacker can basically get system-level access, which is the highest level of access on
the computer,” by using a program that exploits the problem.”

Category:

  • Linux

People behind KDE: Sirtaj Singh Kang

Author: JT Smith

The Dot: “Sirtaj Singh Kang is one of the app-producing machines that helped propel Unix into the
desktop arena way back in the legendary days of the KDE genesis. His native tongue is Perl
and his boot-up sequence involves a quirky coffee-shower combination. We also look
forward to Taj’s soon-to be-released mysterious Python application that will allegedly forever change the
way we open the doors of luxurious buildings. Or something.”

Category:

  • Open Source

The push to push women higher

Author: JT Smith

Wired: “The glass ceiling is usually associated with stodgy, old-economy firms. But women in the new economy say they also face a silicon ceiling. This year’s annual Women in Technology summit will try and draw more women to the frontlines.”

Category:

  • Open Source

Online group to develop Web privacy symbols

Author: JT Smith

CNET: “A technology industry group plans to develop a set of symbols that would
summarize online privacy policies, enabling Internet users to quickly assess the data
practices of Web sites they visit.

Internet privacy-compliance program Truste will announce the program Tuesday with the hopes
that it will effectively summarize the often lengthy, legalese-choked documents many Web sites
post to explain what they do with the names, addresses and other data they collect from visitors.”

Category:

  • Programming

Netscape denies browser escape

Author: JT Smith

Wired: “Is Netscape really getting out of the browser business? The company says no, and releases the first beta of its new 6.1 browser. Well, it’s an improvement over 6.0 but will it prove to be enough?”

Networks promise unfettered file swapping

Author: JT Smith

CNET: “While the first generation of file-trading technologies fights over Napster’s leavings, more radical
Net programmers are still committed to building a wholly anonymous, virtually untraceable way of
communicating and trading files online. Chief among these is Freenet, an open-source project
viewed by many as the ultimate inheritor to Napster’s original promise of free online file swapping.”

Microsoft, AOL can’t agree on Windows XP deal

Author: JT Smith

IDG.com.au: “Microsoft and AOL Time Warner on Saturday abandoned talks over whether to include a link to AOL’s Internet service with Microsoft’s newest operating system, Windows XP. The talks collapsed after the two companies failed to come to terms over a number of issues, including support for competing media players.”

People behind KDE: Kurt Granroth

Author: JT Smith

The Dot: “Choice “Kurt Granroth” quotes, for addition to the dot fortune cookie file. Suggest your favorite out-of-context or foot-in-the-mouth or
now-that’s-just-plain-smart quote for eternal preservation and glorification as a dot fortune.”

Category:

  • Open Source

Web vigilantes counter-attack ‘hackers’

Author: JT Smith

PCWorld: “As security breaches explode and law enforcement struggles to keep up, some organizations are taking the law into their own
hands and punishing hackers themselves.

Striking back at hackers with, for example, denial of service attacks is a sensitive subject, since doing so is illegal in most
countries. The process involves bombarding a server with so much traffic that it crashes. However, security experts say the U.S.
Department of Defense has done it. Also, private companies use special firewalls and other counteroffensive programs to
automatically strike back at hackers, says U.K. Internet security consultant and ex-hacker Mathew Bevan and others.

California ISP Conxion acknowledges having reversed a denial of service attack on a group of hackers.”

Category:

  • Linux