Home Blog Page 9606

Women are geeky people, too

Author: JT Smith

Wired: “Joan Korenman, one of this year’s celebrated Women on the Web, says girls must ignore the boy-dominated tech culture and press forward. “Women are in danger of becoming the new illiterates,” she says.”

Category:

  • Linux

MS says it can stop MP3 trading with watermarks

Author: JT Smith

Wired: “Microsoft has developed a prototype system that limits unauthorized playback of music by embedding a
watermark that remains permanently attached to audio files.

During a security workshop on Friday, a Microsoft Research scientist demonstrated how the hidden copyright fingerprint is so
securely affixed to the audio that it remains intact even if a jazz song is played aloud on speakers in a noisy room and then
re-recorded.”

Age bias seen by over-45 techies, says survey

Author: JT Smith

PCWorld: “More than two-thirds of tech industry professionals over the age of 45 say age
discrimination is a “significant problem” in the industry, according to a survey
by IT industry jobs Web site Techies.com.”

Category:

  • Linux

Free rides skidding to halt on Internet

Author: JT Smith

Dallas News: “There never was such a thing as a free lunch on the Internet. But for a while a determined freeloader could find a Web site that would pick up the tab for all sorts of goods and services, from computer keyboards to photo developing, in return for looking at a few ads. No more.”

Mythical creatures behind KDE: Konqi

Author: JT Smith

At the Dot: “Just over two years ago (end of April 1999), Konqi the dragon decided to join the
brave crew of the KDE ship in an endeavor to conquer your desktop. His help in
promotional activities (as well as his intimidating flaming breath) has been invaluable to
KDE’s success.”

Category:

  • Open Source

MS bug of the day: Crashing with Netscape Communicator 4.77

Author: JT Smith

MSNBC tells us: “Netscape Communicator 4.77 installs the
Beatnik add-in, which is used at Web sites with
embedded RMF content by default. If a
computer does not have a sound card and visits
one of these sites, the computer may crash.
Netscape says to avoid this by removing
Beatnik from the computer.”

First MSN messenger virus

Author: JT Smith

The Register: “The first known virus that spreads by MSN’s Messenger Service
application has been discovered.

W32/Hello, an Internet worm that affects Windows machines,
arrives via MSN Messenger as a file called Hello.exe.”

Category:

  • Linux

Reports of death of email viruses greatly exaggerated?

Author: JT Smith

The Register: “The UK Ministry of Defence (MoD) has come under fire over the capabilities of a product designed to protect business from the effects of email viruses, such as the Love Bug.”

Category:

  • Linux

Update on teeny weeny Linux SBCs

Author: JT Smith

ZDNET: “After attending the recent Embedded
Systems Conference in San Francisco,
Rick Lehrbaum put together this article
(including photos) about some tiny
single board computers that you can
take advantage of to simplify the task of
embedding Linux in your next creation.”

Category:

  • Linux

Cylant announces “0wn this box” challenge

Author: JT Smith

Scott Wimer writes: “Cylant Technology announces its “0wn
this box” challenge. As a demonstration of its behavioral analysis
approach to the field of security, Cylant invites hackers and
crackers alike to attempt a root compromise of victim.cylant.com.
The first person to successfully “0wn” victim will have the server
shipped to them.

Victim is configured to represent the worst possible system
configuration from a security standpoint. It is running several
services that have known vulnerabilities. However, victim is only
supposed to be a web server. Victim has been calibrated as a web
server using CylantSecure. CylantSecure is victim’s first, last
and only line of defense.

“Victim is our way of saying that you don’t have to have your systems
vulnerable to the latest and greatest attack”, says Scott Wimer,
VP of Business Development at Cylant. “Nearly all software has
vulnerabilities; most of them just happen to be unknown. Victim
simply has more than most administrators would feel comfortable
with”, he says.

The web site
victim.cylant.com lists the various services
running on victim, since “doorknob attacks” are highly unlikely
to succeed. Details of the challenge are also available there.

About Cylant Technology
Cylant Technology is a software measurement company creating enabling
tools and technologies for the development of high availability
software. Their static and dynamic software measurement technologies
are directly applicable to the areas of security, reliability,
maintainability, testability, and survivability. Founded by Dr. John
C. Munson in 1999, Cylant has done projects for Sun Microsystems,
JPL, DARPA, and other organizations. For further information please
consult
www.cylant.com, or contact Scott Wimer
scottw@cylant.com
(541) 322-5656.”