Saturday, January 28, 2006
Academics To Take On Spyware
RIAA Says Merely Making Files Available Is Illegal
Competing Lawsuits Are A Go
Court Says Google Cache Is Fair Use
Follow The Money To Predict The Spread Of Disease
Pontiac Puts Its Faith In Google Results
Emoticons? Patented! :(
Identity Thieves Going After The Sucker Born A Minute Ago
Why Is Congress Getting Involved Over The Chinese Search Engine Censorship Story
Google Admits Video Launch Was A Mistake
MP3 Players The Big Security Risk... Again
ChoicePoint To Pay Up For Data Leaks And Keep On Going
Another Video Game Blamed In Car Crash
Comforting Or Not, Sony Getting Out Of The Robotic Dog Business
Seven More Face Jailtime For Helping To Promote Star Wars
Talking Seriously About Mobile Porn
German ISPs Can't Retain Data Europe Says They Must Retain?
Satellite Radio Latest Target Of Biased Surveys
Canadian Record Label To Pay For Teen's Lawsuit Against The RIAA
Dude, You Just Got Pwned By My Mom
Spam Is What I Say Is Spam
BPI Wins Suits Against UK File-Sharers
Los Angeles Says Misleading Sex Scenes Are Bad... In A Video Game
Amazon Looking At Download To DVD Plan
Maybe Bill Gates Should Stop Making Predictions
Consumer Group Complains About iTunes... In Norway
Maryland Court Says All Your Spam Are Belong To Us
Now, Mobile Phones Are Good For Hospitals
Will The Government Now Fine Itself For Leaking Credit Card Data?
Wednesday, January 25, 2006
Blame It On The Internet
Music Execs Confuse "Choice" With Making You Pay Over And Over Again
That is, of course, flat out wrong. You could do pretty much all of those things without any form of content protection. It would appear, however, that what Kennedy really means is that these new options are simply more ways for the industry to get you to pay again for what you already paid for. To make this even more amusing, another questions asks about why people should be forced to buy the same song multiple times... and he blames the tech industry: "I agree with you we'd like nothing more than for you to be able to download or transfer music securely between your phone, your home and work PC, a couple of your players and your home Hi-Fi system, for example. But we don't make the technology, we create the music. It's the technology companies that hold the key to achieving this." Of course, maybe if he didn't insist on putting copy protection on everything, then it would work just fine.
Google Lets Chinese Government Censor Results
E3 Gaming Conference Says No More Booth Babes
Monday, January 23, 2006
Disney board set to meet about Pixar merger
The Wall Street Journal reported on Thursday that Disney proposed to buy Pixar in a stock transaction worth more than $6.7 billion, making Pixar CEO Jobs its largest individual shareholder and possibly giving the man who also co-founded Apple Computer a seat on Disney's board.
Disney, for decades the pre-eminent maker of such hand-drawn animated films as "Cinderella" and "Lion King," has struggled in recent years to maintain its position in an industry that has embraced computer-generated (CG) films.
The two companies were in the midst of renegotiating their distribution agreement, which expires in June with the release of Pixar's "Cars," when rumors of the purchase surfaced.
Media industry watchers have speculated that the merger talk was driven by Disney's lack of confidence in its upcoming slate of animated films.
Disney's first CG release, "Chicken Little," released Nov. 4, has performed respectably, with worldwide box office sales of $279 million, but less than Pixar's lowest-grossing film, "A Bug's Life," which reaped $363 million worldwide.
Link
Adobe Acrobat enters third dimension
The company is expected to release Acrobat 3D, which allows a person to create a PDF (Portable Document Format) with embedded images from computer-aided design (CAD) applications. Recipients of Acrobat 3D files need a point upgrade to the current Acrobat reader version 7 to view the documents.
Adobe developed the 3D product specifically for manufacturing customers who regularly exchange CAD files in the design process, said Rak Bhalla, senior marketing manager. Car manufacturers, for example, share their product descriptions and designs with their suppliers to get bids for component parts.
Typically, design engineers today create a two-dimensional image and send them via e-mail. Having an embedded 3D image, which people can rotate to view and append with notes, will speed up the design collaboration process and reduce errors.Link
Google, the defiant one
The Bush administration asked a federal judge to force Google to comply with a subpoena for the information, which would reveal the search terms of a broad swath of the search engine's visitors. Prosecutors are requesting a "random sampling" of 1 million Internet addresses accessible through Google's popular search engine, and a random sampling of 1 million search queries submitted to Google over a one-week period.
The Bush administration's request is part of its attempts to defend the 1998 Child Online Protection Act, which is being challenged in court by the American Civil Liberties Union. The ACLU says Web sites cannot realistically comply with COPA and that the law violates the right to freedom of speech mandated by the First Amendment.
An attorney for the ACLU said Microsoft, Yahoo and AOL received identical subpoenas and chose to comply with them rather than fight the request in court.
Google said in a statement sent to CNET News.com that it will resist the request "vigorously."
"You'll let Google read your email to send you advertisements but the government can't request a random non-identifying sample of data to evaluate the effectiveness of its laws?" wrote David Arbogast in News.com's TalkBack Forum.
Other readers championed Google for its actions.
"Slowly we sit here while parents leave parenting to the government and the government seems to think it knows best what is good for me," Tom Eldred wrote. "Here's to Google for resisting."
On one level, the situation involves a straightforward question of whether the department's demands are too onerous and therefore not permitted under federal law. On another, the dispute raises novel questions about search engines' privacy protections and the relationship that four tech giants have with the federal government.
Sundance becoming a blog fest
Blogging is one of them. Personal blogs, millions of them, are spreading on the Internet like kudzu, from LiveJournal.com to MySpace.com. A professional blog such as Gawker Media's gossipy Defamer.com can draw as many as 270,000 page views per day.
As blogs become more successful, they're challenging traditional media, and this year's Sundance marks a fascinating juncture as newly powerful blogs like Cinematical.com take on the likes of The Los Angeles Times and The New York Times.
"Blogs are becoming a vital part of an independent film scene that relies on word-of-mouth and alternative media to truly thrive," says Eugene Hernandez, editor of the pioneering indie film site IndieWire.com, which hosts some two dozen blogs and this year has asked 12 filmmakers from Sundance and the concurrent Slamdance to blog about their experiences.
Sundance founder Robert Redford may lament all the buzz surrounding Sundance, but with all the blogs in attendance, that buzz will be louder than ever.Link
Ten thoughts on the new Intel iMac
This is one striking machine. As for the Intel iMac, there is little to distinguish it from its predecessor. Indeed, the one physical characteristic that is different in an iMac with built-in iSight is a mini-DVI port on the back, which allows a second display to extend the desktop rather than simply mirror it. By the way, the built-in display is beautiful: crisp letters, not a dead pixel that I could find, and bright enough to make you reach for the SPF30.
Memory
The Intel iMacs ship with 512MB of memory, which is enough to use the machine right out of the box, but probably not enough to judge the iMac's performance fairly.Of course, upgrading RAM is practically a requirement for any new PC. The problem here is that the Intel iMac RAM is hard to find and more expensive than memory for PowerPC iMacs. Apple's own Web sells 1GB of Intel iMac memory (PC2-5300 SO-DIMM) for $300, which is $100 more than the same amount for the non-Intel iMac (PC2-4200 DIMM). Many Web sites sell the memory for less, but most listed it as unavailable.
Cracking the case
Before Apple upgraded the flat-panel iMacs to include items like a built-in iSight camera, the company was praised for allowing people to easily open the case to do things like swap out the hard drive.
Not so with the new Intel and PowerPC iMacs: Apple has made opening the case much more of a hassle. That's worth noting if you are considering whether to get the 17-inch model, which has a 160GB hard drive, or the 20-inch, with 250GB. (Memory is easily added through an access door on the bottom that requires only a screwdriver to open.)
Noise
This iMac is remarkably quiet. I don't know how it stacks up against the PowerPC version, but it's significantly quieter than the G4 iMac it replaced or my Cube before it (which sounded like a biplane whenever I left a disc in the drive).
The speakers are small, but they sound quite good. They are not sufficient if you want room or house-filling tunes--that's what the "digital audio out" plug is for. But for listening to some music while working or cruising the Web, they sound great. Because they are located at the bottom of the case, facing down, it could be the way the sound bounces off the desk on the way to the ear.
Front Row
If you haven't used this remote control and multimedia feature yet, go to an Apple store and check it out. It is the future. You can see somewhere down the road that an Apple computer will be able to send all sorts of digital content throughout your home using an interface/software/hardware mashup that only Apple seems capable of getting right. The addition of a high-definition digital video recorder would be a big step in making this happen sooner, and of course the Mac rumor sites have been predicting such capability will be added. The sooner the better.
(Apple added an interesting design note to the iMac by allowing the Front Row remote to attach magnetically to the side of the machine.)
When starting up the iMac for the first time, you are asked if you want to import data, applications and settings from your old machine. After connecting the FireWire cord and starting up the old machine in "target" mode, the process went flawlessly. The old machine was essentially replicated on the new iMac--e-mail, photo galleries, music playlists, applications, desktop pictures, and so on. Certain items such as VPN set-up information did not transfer, possibly for security reasons. The process took a couple hours but was painless and startlingly effective
Parental controls
They work very well for limiting what children can do with a computer. Again, the process was very simple and it seems foolproof, at least for a while.
Applications
The iLife '06 applications that are now shipping with new Macs were written to be "universal," meaning they run on the PowerPC and Intel processors without the need for the Rosetta translation software. And that means they run faster on the Intel iMac than software that has does not have universal code
Does it do Windows?
There's been a lot of speculation about the ability to load Microsoft Windows on the Intel-powered Macs. The salesman at my local Apple store said XP would not run but Vista, the new Windows version due this year, "might." It's comes down to differences in BIOS and EFI
Bottom line: $1,700 for a PC is not cheap. But considering the size and beauty of the display, the included software (which likely will account for 80 percent or more of the usage on the machine) and extra hardware doodads like the video/audio outputs, remote and built-in Web cam, and the clearly superior GUI, it almost feels like a bargain
Link
Microsoft releases key Vista developer technologies
Microsoft on Wednesday gave developers access to a key piece of Windows Vista, months ahead of the operating system's release.
The company posted near-final versions of two software development technologies that are part of WinFX, the underlying programming model being introduced with Vista, which is slated to ship late this year.
WinFX combines Microsoft's existing .Net programming model with new tools for more easily linking software over the Internet, displaying data and creating business systems, Microsoft said. It will be shipped with Vista and also made available in versions for Microsoft's current client and server operating systems, Windows XP and Windows Server 2003, Ari Bixhorn, director of Web services strategy at Microsoft said.
The programming model includes the application programming interfaces used by millions of developers to build software that runs on Windows. Microsoft's goal in certifying parts of WinFX for production use--ahead of Vista's launch--is to entice developers to create new programs tied to the new development model, thus driving demand for Vista.
The two new technologies released on Wednesday are Windows Communication Foundation, developed under the code name Indigo, and Windows Workflow Foundation. WCF links server-based systems using Web services, while WWF is used to map business processes to networked applications.
Both are being made available under what Microsoft terms a "go live" license, meaning that the code can be used in production settings.
Microsoft demonstrated Vista, developed under the code name Longhorn, in 2003 and planned to release the operating system in 2004, but the company has since scaled back its initial plans for the release.
Making parts of WinFX backward-compatible with current Windows releases means that developers can get started before Vista arrives and new programs will work on existing PCs, Bixhorn said.
Sony rootkit - Update
Dan Kaminsky released the information at the Shmoocon 2006 hacker conference in Washington last week. Florida seems to have the highest number, with 12,588 networks detected that are hosting computers with the digital rights management software installed, according to his research. California and Massachusetts also exhibit high rates of infection, although the numbers are only an estimate, as each network could host any number of computers with the Sony software installed.
The DRM software is automatically installed by some Sony BMG music CDs and is hidden using a rootkit, which can be exploited by a particular type of Trojan horse and hence constitutes a significant security risk.
The XCP copy protection software, created by U.K.-based First 4 Internet, is included on a limited number of Sony BMG titles, including recent releases from My Morning Jacket and Southern rockers Van Zant. When the discs are played on a computer, the listener is asked to click through a consent form and install the copy-protection software.
The problems with Sony's DRM are not limited to U.S. customers, according to Kaminsky's research. He found that infected PCs are located in many places across the world, including many European countries.
Link
Symantec closes off hiding place for hackers
In the PC-tuning application, a feature called the Norton Protected Recycle Bin creates a hidden directory on Windows systems. The feature is meant to help people restore modified or deleted files, but the hidden folder might not be scanned during scheduled or manual virus scans, Symantec said in an advisory released Tuesday.
"This could potentially provide a location for an attacker to hide a malicious file on a computer," Symantec said. The Cupertino, Calif., security provider is not aware of any attempts by hackers to conceal malicious code in the folder. "This update is provided proactively to eliminate the possibility of that type of activity," it said.
When the recovery feature was first introduced, hiding the directory helped ensure that a user would not accidentally delete the files in it, Symantec said.
"In light of current techniques used by malicious attackers, Symantec has re-evaluated the value of hiding this directory," the company said in its advisory.
The Norton update will display the previously hidden "NProtect" directory in the Windows interface, which will allow it to be scanned by antivirus products, Symantec said. The new version is available through the Symantec LiveUpdate service. Installing the software will require a system reboot.
Sunday, January 22, 2006
Macworld: Intel-based Macs built for speed
10:15
Jobs unveiled the first Intel-based Mac, an updated iMac. The machine will come in the same sizes as its Power PC-based predecessor and will cost the same, but Jobs said it will be two to three times faster because it uses Intel's dual-core Duo chip.
10:10
Jobs moved on to discuss the transition to Intel chips.
"We announced that by June of this year, we would be shipping Intel-based Macs."
Then Intel CEO Paul Otellini came onstage in a bunny suit. "Steve, I want to report that Intel is ready," Otellini said, handing over a silicon wafer.
"Well, I can report to you that Apple is ready, too," Jobs said.
LinkMicrosoft?
A look at Vista
Among the new graphics abilities in Vista that Microsoft showed off was Flip 3D, a tool for easily shifting among multiple open windows and the Windows Vista Sidebar, which runs in the corner of the screen and includes RSS feeds, sports scores and other small applications. Microsoft showed Sidebar in the first preview of Longhorn (Vista's code name), but the feature had disappeared from Microsoft's feature list before reappearing more recently.
Microsoft's photo-editing program--Photo Gallery--allows users to do basic editing, as well as sort photos by date, keyword and other information. The program, which will be built into Vista, appears to be similar to Apple Computer's iPhoto.
Like iPhoto, the Photo Gallery software keeps a separate copy of the photo so users can make changes to their images without losing their original. A new slideshow feature allows users to mix video images and still photos.
Microsoft also showed off a forthcoming update to the classic Microsoft program Flight Simulator to highlight the graphics and gaming power of Vista. The demo included helicopters and flying birds, among other realistic details.
Xbox marks the spot
Along with Vista, Gates is also made his case for HD DVD--one of two competing formats for next-generation DVDs. Gates said Microsoft would offer an external HD DVD drive that can connect to the recently released Xbox 360 game console.
By offering the drive as an Xbox add-on, Microsoft is hoping to win over consumers with a cheaper option than buying an all-new device to play next-generation Blu-ray or HD DVD discs.
A new tune
Beyond the PC, Microsoft is also attempting to catch up in the portable music and video markets, which have been dominated by Apple Computer. Gates was joined on stage by pop superstar Justin Timberlake and MTV Music Group President Van Toffler to talk up the MTV-created Urge music service, which will use Microsoft's technology as well as show off a new crop of portable video devices, known as portable media centers.
Experts question Windows win in flaw tally
The report, Cyber Security Bulletin 2005, was released last week. It claimed that out of 5,198 reported flaws, 812 were found in Microsoft's Windows operating system, 2,328 were found in open-source Unix/Linux systems. The rest were declared to be multiple operating-system vulnerabilities.
The report has attracted criticism from some in the open-source community. Linux vendor Red Hat said the vulnerabilities had been wrongly tagged, and so could not be used to compare the relative security of Windows and Linux/Unix platforms.
"The study is confusing and misleading. When you look at the list, the vulnerabilities are miscategorized," Mark Cox, a consulting software engineer at Red Hat, said. "For example, Firefox is categorized as a Unix/Linux operating-system flaw, but it runs just as well on a Windows platform. Apache and PHP also run just as well on both platforms. There are methodological flaws in the statistics."
Secunia thought that the nature of the reported vulnerabilities also made it difficult to compare security on the platforms, as Linux/Unix researchers concentrate on vulnerabilities in local privilege separation, while Windows researchers look at possible remote vulnerabilities."Generally, many of the vulnerabilities in Linux/Unix based products are classified as local vulnerabilities, including privilege escalation, local denial of service and local exposure of sensitive data. These kind of vulnerabilities are not regarded as particularly critical, but Linux/Unix researchers tend to focus quite a lot on this category, probably because of Unix's long history of proper privilege separation. This has only recently become more relevant in Windows (NT, 2000, and XP), but many Windows researchers still focus more on remote issues," Secunia said.
In Newsforge, the Linux and open-source online publication, Joe Brockmeier and Joe Barr cast doubt on the vulnerability totals.
"The two figures are not representative of today's two major operating-system platforms. One figure represents the vulnerabilities found in Windows operating systems: XP, NT, 98, and so on. The other represents a total figure not just for Solaris, AIX, HP-UX, the BSDs, and Linux, but for a hundred different versions of Linux," the article said.
Red Hat's Cox said Linux operating systems were more secure for businesses than Windows platforms, as fewer vulnerabilities were critical and patches were brought out more quickly.
"There is also the issue of timing," he said. "With Linux products, critical updates are available within a day. If you look at Red Hat Enterprise Linux 3, the average patch time is under a day. With the recent critical WMF (Windows Meta File) vulnerability, it took Microsoft seven days," he said
New open-source license targets DRM, Hollywood
Moglen said that DRM technology, which places limits on how consumers can play movies, music or other digital content, is "fundamentally incompatible" with the principles of the Free Software Foundation. Moglen and Free Software Foundation founder Richard Stallman are co-authors of the GPL version 3.
"Mr. Stallman made perfectly clear that his point of view is: It's enough. It's enough that the world has to pay attention to that (DRM) problem the way the world needed to pay attention to the patent problem 10 years ago," Moglen saidThe planned anti-DRM changes to the GPL are significant because the entertainment industry regularly uses Linux-powered computers in the production process, notably for special effects and animation. In general, movie studios support DRM technology to prevent piracy.
Moglen and Stallman have voiced concern specifically with TiVo, which uses Linux, because the company collects information on consumers' actions. Moglen said TiVo complied with version 2 of the GPL "by the skin of its teeth" and said the company will find more difficulty complying with GPL version 3's anti-DRM provisions.
"Having a personal video recorder which reports every button you push to headquarters when you use the remote control--and which won't run software if you modify the box so it snoops on you a little less--is not user-respecting conduct," he said.
"What TiVo needs to do--what everybody needs to do who makes electronic devices--is to stop injuring users to help movie companies. We don't want our software used in a way which batters the head of the user to please somebody else. Our goal is the protection of users' rights, not movies' rights," Moglen said.
He said Hollywood studios that use free software, namely Linux, to create animated movies yet deny users' freedoms are "flat unfair."
Defender of the GPL
The Columbia Law School professor and attorney representing the Free Software Foundation has the new role of explaining and overseeing the update to the General Public License (GPL). That document, being revised for the first time in 15 years, is not only the embodiment of the free software movement's principles but also the legal foundation for thousands of open-source software programs from Linux to MySQL.
The draft of version 3 of the GPL doesn't change that fundamental mechanism, but it does take a more aggressive stance when it comes to patent law. Unlike 1991's version 2, the update explicitly tackles the issue of software patents. It also takes a stand against digital rights management technology--which the FSF dubs "digital restrictions management"--that encrypts or locks software or content to govern its use.
Moglen: Patents, unlike copyright, are said to control ideas rather than expressions. The soul of the free software movement is the re-implementation of neat stuff we thought up, no matter how we learned it or where we came by it; and in the world of copyright, there's nothing wrong with that. You can re-implement or redescribe or re-express anything you want however you please. When you write a newspaper story or a Web site story tomorrow, the question isn't: Are you reporting news somebody else owns? The question is: Did you write your own story? Imagine a world in which news was owned in such a way that once one guy reported it nobody else could report it for 20 years because the first guy to report it owned it. That's the problem that the patent law proposes to software.