Volume 2, Issue 7 Atari Online News, Etc. February 18, 2000 Published and Copyright (c) 2000 All Rights Reserved Atari Online News, Etc. A-ONE Online Magazine Dana P. Jacobson, Publisher/Managing Editor Joseph Mirando, Managing Editor Atari Online News, Etc. Staff Dana P. Jacobson -- Editor Joe Mirando -- "People Are Talking" Michael Burkley -- "Unabashed Atariophile" Albert Dayes -- CC: Classic Chips With Contributions by: John Hardie To subscribe to A-ONE, send a message to: dpj@delphi.com and your address will be added to the distribution list. To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE Please make sure that you include the same address that you used to subscribe from. To download A-ONE, set your browser bookmarks to one of the following sites: http://people.delphi.com/dpj/a-one.htm http://www.icwhen.com/aone/ http://a1mag.atari.org Visit the Atari Advantage Forum on Delphi! http://forums.delphi.com/m/main.asp?sigdir=atari =~=~=~= A-ONE #0207 02/18/00 ~ People Are Talking! ~ Classic Gaming Expo 2K ~ New Apple i-Book ~ Dreamcast Digital Cam! ~ Windows 2000 Released! ~ 'Window Washer'! ~ More DoubleClick Woes! ~ Building Better Games! ~ 3DO Pipeline! ~ FBI Caseload Quadruples ~ Connectix Ruling Turned ~ Close To Hackers? -* 63,000 Bugs In Windows 2000! *- -* Classic Computer And Gaming Fair 2K *- -* Secret Microsoft Negotiations Springs Leak *- =~=~=~= ->From the Editor's Keyboard "Saying it like it is!" """""""""""""""""""""""""" This is one of those weeks in which there's a lot that I'd probably like to say, but in one of those moods that tend to sap motivation. It's an external influence that seems to have drained my creativity this week. I'm sure that all of us come across this type of "energy" loss from time to time. I do want to briefly comment on the current internet hacking stuff that's been all over the news the past couple of weeks. While I have some doubts that these hackers will all be caught, perhaps this kind of "net terrorism" will be the impetus for tighter net security. Consumers - all of us using the web - need to be assured that our rights of privacy and our personal security is maintained by those who operate various sites. Be they online retailers, banking, stocks, search engines, or whatever - all need to safeguard against these individuals who somehow feel compelled to pull these stupid stunts. The more that it's publicized that various areas on the internet are less secure that we're led to believe, the more likely the end users will be to use them. See, I kept it brief! Thankfully, the weekend is upon us and I have an opportunity to re-charge! And if we're lucky up here in the Northeast, the storm that is approaching moves north up into the mountains, or goes south and out to sea. I'm really not looking to spend my weekend shoveling out lots of snow! Until next time... =~=~=~= ->A-ONE User Group Notes! - Meetings, Shows, and Info! """"""""""""""""""""""" CCAG '2000 Classic Computer And Gaming Fair 2000 Date: June 10 2000 Location: National Guard Armory Route 57, Lorain, Ohio, USA (Just 25 minutes West of Cleveland) Cost: FREE! For both vendors and spectators! Setup: June 9, 2000 4PM-10PM For Inside Vendors and User Groups only Fair: June 10, 2000 9AM-6PM "Flea Market" Vendors can start setup at 7AM Systems: All Classic computer or gaming system: Atari, Intellivision, Magnavox, Commodore, TI, Amiga, Timex, ADAM, Nintendo, Sega, etc. We will try to accommodate all late comers, but the deadline for inside table reservations is May 9, 2000 one month before the CCAG. Donations will be gladly accepted to help cover expenses. Remember, this CCAG is free to both the spectators and vendors. We are located close to several fast-food restaurant, no refreshments will be served at the CCAG. Please stay tuned a URL will be made available shortly with a map, lodging information and more. For further info please contact: CCAG 2000 P.O. Box 493 Chesterland OH 44024-0493 USA Phone 440-979-9295 ask for Jim Jr. fmh@netzero.net or jwkrych@n2net.net =~=~=~= PEOPLE ARE TALKING compiled by Joe Mirando jmirando@portone.com Hidi ho friends and neighbors. As I write this, we're preparing for a winter storm. I guess that I can't complain too much since this has been a fairly uneventful winter. I just keep telling myself that, come July, I'll be looking back at this storm with fond memories. Yeah, yeah, I know... that's a load of bunk but, hey, I've got to tell myself SOMETHING to keep from going nuts. On the PC Linux front, I finally got my modem card working. It took a while, but I'm proud to be able to tell you that I did it all by myself. It turned out to be an IRQ problem. Geez, I got interested in Linux mainly because I was tired of dealing with things like IRQ conflicts under Microsoft's offerings. All in all, it was a useful experience because I did actually learn some things about Linux while searching for the cause of the problem. Remember the first time someone handed you that tired old line about learning more from your mistakes than from your successes? I thought it was foolish too. But the more I mess around with computers the more I find that it's true. Sometimes the only way to actually get acquainted with something is to have to dig down into the guts of it, pull 'em out, and rebuild it so that it works. In the process you get to actually see how and why things work. Of course, not everyone is cut out for that kind of thing. And that's... okay. What's important is that you're comfortable with what you're doing. People who use computers simply as tools need only understand the merest basics to be able to do what they need to do. But for people like us, to whom computers are a hobby unto themselves, want and need to know what's going on "under the hood". To me, that's the coolest part of using a computer. If that's not your cup of tea, that's cool too. As long as you're comfortable, you're in your "happy place". Well, let's get on with the news, hints, tips, and info available on the UseNet. From the comp.sys.atari.st NewsGroup ==================================== Tim Conrardy asks for info on RAM: "My 4 meg 1040Ste's power supply just went out, so I got out my spare 520ST that I was using for games. Most of my Midi stuff works on it (including Notator!) It is a 1 meg machine. I was wondering if I can use the memory chips in my 1040STe and put them in the 520 for the extra memory" Nicholas Bales tells Tim: "A 520 ST has 512K, not 1Mb as standard. Therefore, if you are sure that the machine has 1Mb, then there is probably a RAM expansion board inside. Open it up or use sysinfo to find out for sure: http://bales.online.fr/atari/files/sysinfo.zip If you are using it for games, there is no point in going beyond 1Mb. If there is a RAM expansion board inside, then there were several sorts. Some had fixed RAM just to upgrade a 520 to 1040, others had SIMM sockets. The only way to be sure is to open it up. Wouldn't it be better to use the power supply from the ST inside the STE ?" Tim tells Nick: "This 520St has an EXTERNAL power Supply, so I wish it was that easy. I called Best Electronics, and Brad said they are not interchangeable, but he 's got'em for $75.00 and I can install it myself. I might do that, even though it is a little pricy.I could use the extra memory especially on Notator. However I might open it up and see what's there any way now that you got me curious!" Nick replies: "Well, remove the STE PSU, drill a hole in the STE case, build a connector to the external PSU (not sure what the pinouts are, but this can probably be deducted). Then you have some extra space inside for a 3.5" IDE drive!!!" Greg Goodwin asks for help "slaving" his ST to his 8-bit: "Realizing this program is quite old, I'm hoping someone out there still has knowledge of this. I'm trying to get my ST to act as my hard drive for my Atari 8-bit computer. The program I have found is "800XL DeeJay" which is a cute little program that allows an 8-bit to access the ST via an SIO2PC cable. I've got the cable, the two computers, and I've tried various configurations, but still the 8-bit does not recognize the ST as a disk drive with the 800XL DeeJay program running. What are some things to keep in mind when trying to get this to work?" Andreas Magenheimer tells Greg: "Check out the Com-Port, in which you plug in the SIO2PC cable. Some ST computers (and especially Falcon computers !!) have to be modified to work properly with XLDeejay and SIO2PC. Since I do not own any ST/STE/TT/Falcon computers, I do not know which sort of modification has to be made... but wait, there was a TT user asking for a good XL emulator, maybe you can give him the XLDeejay... And finally I hope there is anybody who can help with the XLDeejay problem (and modification) soon." Daniel Guldkrans asks about his new STE: "Since I have never owned a Ste, only a STfm in various ram sizes I have one simple question: Are all STe SIMM card upgradable? I heard that some STe have SIPP (or something like that!?) card instead. Does this matter if I just replace the ones in the SIMM slot with four 1 Mb SIMM cards to get 4 Mb STe. I upgraded my STfm with a Frontier ram upgrade board to get 1 Mb and it works beautiful. Oh, one more thing: Does all the STe have a RF modulated video outlet (I'm unsure if it's the right word?) like the STfm have? It really doesn't matter since I can connect it to a scart TV instead from the monitor outlet." Steve Stupple tells Daniel: "Yep! just replace the memory in your 1 meg machine with 4 x 1 meg SIMM's or SIPP's (if it doesn't take simms). All STE's have a RF modulator to connect to a TV." Nick Bales jumps in and adds: "Yes, some of the older STEs use SIPP sockets instead of SIMM. SIPP and SIMM are compatible, but the connections are different. SIPP modules have pins soldered on their edges which are inserted into holes, whereas SIMM have edge connectors. There are SIPP to SIMM adapters. If in doubt just open up the machine to check. It's better to get a machine with SIMM sockets, because SIMMs are more easily available." Steve Taylor asks about using a removable hard drive with his Falcon: "Has anyone used an Iomega ZIP 250 with their Falcon or ST? My Syquest 270MB SCSI drive is starting to die, so I am looking to buy another SCSI removable media drive. I thought since the ZIP 100 drive works, the 250 should also. I am using the AHDI driver." Dr. Uwe Seimet tells Steve: "Don't know about AHDI but HDDRIVER will work, including the use of special ZIP features like password protection, auto-sloop, auto-park." Steve comes back and asks: "After reading the previous comment about the ZIP drives, I asked the guy at the computer store about the Orb. He said he hooked one up to his computer and it was *really* fast. Uwe, will HD Driver handle this product? What about the 2.2 GB cartridges? Will I have to partition them, or will HDD let me use the whole thing?" Dr. Seimet tells Steve: "Basically HDDRIVER supports any SCSI/IDE/ATAPI drive. So I don't expect any problems. For HDDRIVER it's sufficient if the drive supports one of these standards. As far as partitioning is concerned, this is not a question concerning HDDRIVER but it has to be asked with respect to TOS and the file systems used. The usual limitations apply for any kind of media. Standard FAT partitions are size-limited by TOS, e. g. 1 GByte on the Falcon, 512 GByte on the TT. If you want a larger partition you have to create a FAT32 or EXT2FS partition and run MagiC and/or MiNT. HDDRIVER supports all these alternatives." Mike Freeman cuts loose and posts: "Ok, so I just got absolutely frustrated with CAB tonite. Are we ever going to have a web browser that actually works for modern internet purposes?!?!?! I love my Falcon, but honestly, it sucks as an Internet machine. My wife and I got information in the mail about renewing financial aid for school. Unfortunately, instead of the usual forms, everything is being done online now. Well, CAB doesn't work for it at all. First, it requires a secure browser, meaning that unless you're a rocket scientist who can understand the inner workings of MintNet, you're stuck there. Second, the buttons on their form site don't go anywhere under CAB. The button appears dark, but CAB doesn't even attempt to go anywhere. So we'll have to find a PC somewhere... The University also does everything online now. At its web site, you can choose either text or graphics based page. The graphics-based link doesn't redirect correctly, bringing up a file not found error. The text based link brings up a dialog box. On PC's, it gives you some information that you must enter into it: "Please enter your student-id followed by the following number:xxxxx" CAB however (at least with the current CAB.OVL's) displays its own pre-written dialog, meaning that you aren't given the number, therefore you can't enter it. Once again, have to find a PC somewhere... This happens on nearly every serious site that we need to go to. It either requires Javascript or needs some other feature CAB apparently doesn't have. So are we ever going to get a good browser with everything the web needs, or are we stuck with archaic browsers that PC browsers outdated years ago? I'm really tired of this crap. I'm not about to give up on my Atari, but I don't have room on my desk (or desire) to get a PC. I hope someone gets their butt in gear and develops a working modern browser soon. I just can't spend the time required hunting down available computer labs on campus. Sorry for the venting. Anyone willing to get going on a browser project instead of just talking and arguing about it? Any suggestions welcome, also." Charles Silver tells Mike: "All may not be lost yet . Please give me the Uni's URL and I'll see if I can find a work around so that at least you can get the graphics or text page working. CAB some times inserts an extra letter into the URL links which will give you the file not found error. If Alex had developed CAB as well as he did iCAB, well, we wouldn't be having this discussion." Our good friend TJ Andrews asks about adding a hard drive to his Mega: "I have a Mega ST4 with a Toadfile 44 hard drive, a gift from a longtime friend. The drive was purchased in 1990 and used heavily for about 5 years, then lightly for two, then not at all until a little over a year ago, when I got it. I've used it fairly heavily while I've had it, and now I'm beginning to worry about it. After all, components age, lubricants dry up, and bearings wear out eventually. Another friend has given me an external Syquest 200Mb Removable drive originally designed for use with a Mac which he says is also able to read/write 44 and 88 Mb carts, but can't format them. This is a SCSI drive, with internal SCSI termination and two external Centronics-type 50-connector SCSI ports. I'd like to add this to my Mega system. I've always understood you can connect up to 8 SCSI devices to a single host adapter, so I'd like to use the ICD ADSCI Plus adapter (The one with the clock) that's within the Toadfile. However, when I opened up the Toadfile, I saw but a single 50-connector ribbon cable between the host adapter and the HD, with no unused connectors. I also saw a knockout in the back that looks like just the right size for an external SCSI connector. I'm assuming I need a different SCSI cable inside the Toadfile, a panel mount adapter to some sort of external connector, and an external SCSI cable for the "new" drive. Could anyone give me an idea of precisely what to look for, and a good place to look? Also, since I have an empty slot for an internal device in my Toadfile case, would it be a good idea to buy a cable now that could be used with that slot in the future? And if so, would I need to terminate the (for now) unused cable?" Greg Goodwin tells TJ: "From the ICD adapter, run an internal 50 ribbon SCSI 1 cable to the HD and back out. This cable should be easy to obtain at a electronics supply shop and basically looks like the cable you have, only with a third connector midway. Keep your cabling as short as possible. Then an internal to centronics 50 (external) adapter attaches to the case (your knockout, er, knocks out). A SCSI 50/50 external cable then runs to your "other" drive. If you cannot find an electronics store, a place that deals with SCSI (like older Macs) should be able to help. I don't know if I'd modify things to use your other space in the Toadfile case. Your power supply might not be able to handle it, particularly due to its age. As a final note, only terminate the first and final drive on a SCSI chain (though there are exceptions). I've done quite a bit of SCSI work on both Ataris and Macs in the last couple years, so post if you have problems." Now TJ asks about using an IGS file with NEWSie: "I've been trying to append a cutesy signature to some of my email using Newsie 0.94, and so far it's been a total failure. I put a signature file together with Edit Plus 3.12 and saved it. Then, I configured Newsie to find it using the "Signature Preferences" item of the Preferences menu, and saved it as the default. When I look at the Signature Preference I see the proper path and filename, and the first few lines of my signature file, so I assume that part's incorrect. When I sent me email, I X'ed the box marked "Append Signature." Nothing. I tried X'ing the box both before and after editing the email--neither way worked. What am I doing wrong? I'm using Edit Plus 3.12 as the external editor, and other features work just fine with it. I really don't think that's the problem. I can live just fine without the ability to append cutesy signatures to my email. In fact, I expected to soon get tired of it and go back to dull and boring after a while. It's just that it galls me to not be able to figure out something that looks so simple to do. I just know I'm gonna feel stupid when this gets solved." John Garone tells TJ: "Although there's no problem here using Newsie94/Everest with regard to Sig files, have you tried another editor? Also, once in a while I re-load a Newsie back-up of needed files (in case a glitch got added somewhere)." TJ finds that reducing the number of lines in the SIG file to five or less solves the problem and posts: "I just read my posts from the 14th, and it certainly does appear to have worked. I wrote the post before this one offline last night, but didn't send it until I logged on tonight, before I read the posts from the 14th. I wrote those posts offline, too, and I looked at them in the "Offline Postbox" before sending them. I didn't think it worked, because the signatures didn't appear when I read from the "Postbox." It seems the signature isn't added until the message is actually sent, something I didn't realize until tonight. I think the turning point was Xing the "Append Signature" box in the "Message Options" dialog. I hadn't done that before, relying on the box in the "Send" dialog alone. I apologize for the mess of my last few posts, and for the irritation I allowed into them. I'll try to avoid such things in the future. I don't know if I'll keep a signature file or not. Most probably, I'll get tired of it very quickly. Until then, though, I shall be... TJ - Keeper of the Flame Atari Computer Enthusiast of Syracuse" Now, do you remember what I said before about having to "dig" to figure things out? That's what TJ did, and now he's happy as a clam that he beat it. It's a great feeling, ain't it? Well, that's it for this week. Tune in again next week, same time, same station, and be ready to listen to what they are saying when... PEOPLE ARE TALKING =~=~=~= ->In This Week's Gaming Section - Court Reverses Connectix Injunction! """"""""""""""""""""""""""""" Digital Camera For Dreamcast! Classic Gaming Expo 2000 News! 'Alone In The Dark'! SaGa Frontier 2! And much more! =~=~=~= ->A-ONE's Game Console Industry News - The Latest Gaming News! """""""""""""""""""""""""""""""""" Sony Dealt PlayStation Setback In Ruling Game industry giant Sony suffered a setback in its legal battle to kill a software program that allows Macs to run games designed for the PlayStation. Earlier, the San Francisco Federal District Court issued a preliminary injunction in favor of Sony that restricted Connectix from shipping a product called Connectix Virtual Game Station. Virtual Game Station essentially lets Apple owners run games designed for Sony's PlayStation on their systems. The court said that Connectix's software infringed Sony's intellectual property. This week, however, The Ninth Circuit Court of Appeals handed down a decision to "reverse and remand" the preliminary injunction. Sony will continue to pursue its case, but the ruling means that, for now, the San Mateo, CA-based Connectix can resume sales of the Macintosh version of the software. A Windows version will ship shortly, the company said. The $30 program allows Macintosh users to play Sony PlayStation games on their computers instead of through Sony's game console. The product was received enthusiastically by Macintosh users last year but few were able to actually receive the product. Shortly after Connectix released the Virtual Game Station in January 1999, the company was hit by a lawsuit from Sony Computer Entertainment of America alleging trademark and patent infringement. Connectix developed its software after studying the PlayStation BIOS, although the company says that the application contains no Sony code. The Appeals Court, in its ruling, reversed the lower court's findings, saying that its examination of the BIOS was protected by fair use and that the resulting program did not appear to violate Sony's rights. "Intermediate copies made and used by Connectix during the course of its reverse engineering of the Sony BIOS were protected fair use, necessary to permit Connectix to make its non-infringing Virtual Game Station function with PlayStation games," the court wrote. Being able to sell the software doesn't mean Connectix' fight is over. Sony is considering whether or not it will seek relief from the ruling, and a trial date is still pending. "This decision seems to eliminate copyright protection for software that's embedded in machines," James Gilliland, lawyer for Sony Computer Entertainment, told Associated Press. Gilliland said Sony invested a significant amount of money in the PlayStation. "They'll have to think twice before doing that again if emulator folks can come along with a very minor investment and create competitors this way," he said. "We believe this landmark decision will have broad ramifications throughout the software and other media industries," said Roy McDonald, CEO of Connectix in a statement. "This ruling supports the clear goal of U.S. copyright law to allow fair use of prior works to create new intellectual property which broadens consumer choice." Sony's suit against Connectix is tentatively scheduled to go to trial in June before the same judge who issued the injunction against Connectix last year. Infogrames North America, Inc. Reveals Details On the Spine-Tingling Thriller, Alone in the Dark Good vs. Evil; Dark vs. Light; Sacred vs. Sinister; All is not right with the world when you are Alone in the Dark! Infogrames North America, Inc. officially announced today the return of the notorious supernatural detective, Edward Carnby in a new frightening chapter of Alone in the Dark. Based on the popular and revolutionary Alone in the Dark (AITD) series, this new rendition (subtitle soon to be revealed) will bring terrifying thrills and adventures to gamers this fall on the Sony PlayStation, Sega Dreamcast, PC and Game Boy Color. The original survival-horror franchise continues with a pure blend of intense action and suspenseful adventure. Alone in the Dark immerses the player into a dark and strange atmosphere where conventional rules do not apply. The player must overcome his natural fear of the dark unknown and control Edward Carnby through a deep and highly detailed storyline. Armed with a flashlight and a pistol, Carnby must find the necessary items to survive as well as the clues to help him escape his ultimate nightmare. ``Infogrames is pulling out all the stops for Alone in the Dark," said David Riley, marketing director for Infogrames North America Inc.'s action/strategy label. ``As the originator of the survival-horror genre, the Alone in the Dark series is known for its bone-chilling suspense and excitement -- adding the latest technology and ingenuity to AITD will bring the genre and the series to a whole new level in the new millennium." The story begins with a murder mystery. Charles Fiske, Carnby's best friend, has been found dead on a mysterious island off the coast of Maine, Shadow Island. Carnby's instinct tells him that foul play was involved and goes to Shadow Island to find the killer and avenge Fiske's death. From his first steps on Shadow Island in the cold winter night, Carnby is immediately confronted by terrifying, evil creatures that are determined to halt his progress. Throughout the course of Carnby's investigation, every step he takes, every corner he turns, he is met with suspense, intrigue and a sense of impending doom. Relying only on his instincts and limited resources, Carnby must destroy this sinister evil and uncover the truth. Who or what is hidden on this somber island? What invaluable secrets are buried beneath its depths? When will Carnby end this horrible nightmare? Developed by Darkworks, the new Alone in the Dark will combine amazing technologically rich graphics with a deep, robust plot. Incredibly detailed backgrounds, high-resolution cinematics, intense lighting effects and eerily mysterious music and sound will bring this game to life. Alone in the Dark will be available this fall at most major retail outlets. For up-to-date news, information and artwork on AITD visit http://www.alone-inthedark.com UFO Interactive Infiltrates Sega Dreamcast Game System with New Spy Role Playing Adventure 'Industrial-Spy Operation Espionage' First Spy Role Playing Game for Sega Dreamcast UFO Interactive is accepting a mission to publish a new video game for the Sega Dreamcast platform, ``Industrial-Spy Operation Espionage," scheduled for release April 2000. The game will be distributed in the United States by Tommo. The first spy role playing game for the Dreamcast challenges players to scrupulously pit a team of the world's most agile agents against the world's fiercest forces in industrial espionage. The gamer's objective is to carry out the assignments of various top-secret clients ... some good, some evil, directing a team of talented spy agents. Each agent possesses special skills and talents, ranging from hacking computers to hypnotizing subjects. ``We are thrilled to be bringing gamers looking for a challenge, an adventure filled with hair-raising espionage exploits on one of the hottest, new game systems," said Nelson Kwok, chief executive officer of UFO Interactive. ``What makes 'Industrial-Spy Operation Espionage' so exhilarating is that players must learn how to manage a team of diverse, talented and sometimes unpredictable agents in a series of deadly missions that take them all over the world." Players first choose from eight intriguing agents: Boy Wonder ``Gabriel Ernest Archangel," The Acrobat ``Ling Ring-Hua," The Giant ``Gursyn Vlagimir," Female Bombshell ``Sarah 'Rocket' Luria," Jack of All Trades ``Jeffrey K. Saunders," The Hypnotist ``Kleopatra," The Chemical Maniac ``Charles Falloux" and The Team Leader ``Lemmy Evans." Next, they must conduct preliminary investigations to gather information about their mission. Once players have all discovered all the data they need, they act as ``Boss," directing each agent on a number of assignments. But the player must be perceptive and be able to anticipate danger. The success of each mission depends on it. ``Industrial-Spy Operation Espionage" contains 10 challenging levels and an unprecedented amount of character interaction and team play. The more game savvy a gamer becomes in utilizing his team of eight spy members in a mission, the higher his scoring levels become. ``Industrial-Spy Operation Espionage," developed by Hunex, is memory card compatible and will be available for a suggested retail price of $49.99. Square Ships SaGa Frontier 2 for the PlayStation Square Electronic Arts(SM) L.L.C. (Square Electronic Arts) Tuesday announced the release of SaGa Frontier 2 for the PlayStation game console. The latest adventure role-playing game (RPG) from the makers of the FINAL FANTASY series allows players to play the game from start to finish as any one of several characters, increasing the replay value of the game. The new title also touts a multitude of weapons and a variety of magical powers. The game is set in the 13th century against a lush backdrop of vibrant watercolor environments, where Gustave XII rules the kingdom of Finney. Characters in this land use a magical power called ``Anima" to conjure up spells, and when Gustave XII discovers that his son, Gustave XIII, doesn't have Anima powers, Gustave XIII and his mother are exiled from Finney. Gustave XIII becomes the hero of those who do not possess the power of Anima, and he and his followers develop battle skills using machines and natural resources. Gustave XIII's nation becomes a threat to other nations including his homeland of Finney, resulting in a century-long conflict known as The Gustave War. Unlike traditional role-playing games, SaGa Frontier 2 offers a multi-level scenario system where players select from two different scenarios to commence the game. One scenario follows Gustave XIII; a young prince who is forced into exile when he is found incapable of wielding a magical power called ``Anima." The other scenario traces the life experiences of William Knights, a treasure hunter in search of the truth behind his parents' mortality. Although each scenario carries its own individual storyline, the outcome of one scenario opens up a multiple of different paths that will eventually effect the events in the second scenario. With this unique system, SaGa Frontier 2 ultimately translates into more than 60 hours of thrilling interactive entertainment gameplay. There are three distinct battle modes -- ``Duel", ``Team" and ``Strategic" -- which allow the player to tactically fight his or her way through the adventures. In the ``Duel" battle mode, the player chooses a character to represent the entire team to engage in a battle against a representative from the enemy group. The ``Team" battle mode allows the player to use the collective power of the entire team to perform massive combo attacks in a turn-based style of combat. In the ``Strategic" battle mode, the player commands and strategically maneuvers several units to fight in intense battles on a large battlefield. Square has injected some fierce battle features into SaGa Frontier 2. For instance, a player will need to master detailed battle commands and learn how to swing his sword horizontally and vertically in order to conquer his enemy. Square has also enhanced the battle system by incorporating ``Roles" and various Weapon and Spell Arts. Specifically, a ``Role" is a distinct task assigned to a character to accentuate their skills during battle. For example, a character with the role of ``Getaway" can better the chance of the team ending a battle with a fierce monster by utilizing the character's negotiation skills. Complementing this feature during battle are the Weapon and Spell Arts. Weapon Arts rely on the weapon used to perform physical attacks. There are six different weapons to choose from. Depending on the weapon used, the character can perform close range attacks such as slashing with a sword or distance attacks by launching an arrow using a bow. Spell Arts, on the other hand, uses the ``Anima" power that exists in various forms to create powerful attacks. A ``Beast" Art, for example, uses the ``Anima" that exists in beasts to create a massive attack called the ``Howling Heaven." Ultimately, by utilizing these various battle features, battles are no longer just random attacks. Players have the ability to execute hundreds of combination attacks at will, thus allowing more control during battle sequences. SaGa Frontier 2 is compatible with the DUALSHOCK analog controller and is priced at (US)$40. The game carries an ESRB rating of ``T" (Teen). Sega Sports NHL 2K for Sega Dreamcast Heats Up the Ice With Unprecedented Detail and Realism In what is now their tradition of creating genre-defining sports titles, Sega Sports has set a new standard in hockey games with ``Sega Sports NHL 2K" for the 128-bit, Internet-ready Sega Dreamcast videogame console. ``Incorporating an unsurpassed level of detail throughout the game, "Sega Sports NHL 2K`` shows reflections on both the glass and ice, there's powder spray as players pull up to shoot and fully animated crowds, coaches and skaters -- and that's just the tip of the iceberg. Gamers can embrace the true spirit of the sport with realistic physical actions and emotional reactions, as well as the detailed fight mode. "Sega Sports NHL 2K`` also features authentic replicas of all NHL arenas, accurately modeled NHL players, professional play-by-play commentary and up to four-player support. "Sega Sports NHL 2K`` is now available at retailers nationwide for $49.95. Developed by Black Box Games for Sega Sports, ``Sega Sports NHL 2K" is brimming with innovative hockey game firsts. Featuring nearly 1,000 motion captured moves with 100 different goalie animations, the result a wide array of realistic body checks, passes and fluid maneuvers. Other firsts include animated players' heads moving to follow the puck throughout the game, coaches yelling over a bad call and benches reacting to gameplay. With the jaw-dropping TV-evoking replay feature, players can zoom-in on facial expressions after a play. Instant replays show every detail from any angle -- gamers can even see the writing on the puck as it flies past the goalie and slams into the net! ``The goal with all Sega Sports' titles, including `NHL 2K,' is to redefine the sports gaming experience. We've definitely achieved that goal with this game, thanks to the incredible detail and realistic gameplay," said Greg Thomas, vice president of product development, Sega of America. ```Sega Sports NHL 2K' doesn't compete or compare with other sports games. It competes with real-life TV broadcasts that's how far Sega Sports has elevated this genre on Sega Dreamcast." In ``Sega Sports NHL 2K" authenticity is key. The game features all 28 teams, with every current NHL player competing in architecturally accurate arenas, with additional customizing options to update rosters with rookies, trades, or personalized players. Familiar details can be found everywhere in the game -- championship banners hang from rafters, ice spray flies off the players skates during a hard turn or stop and goalies play three different `styles' according to their real life counterparts. Players appear with an assortment of gloves, sticks, skates, helmets, team specific pucks and heritage jerseys. Gamers, however, are able to select different jerseys, including old uniforms and those from teams that have moved. The core of the realism in ``Sega Sports NHL 2K" is found in the actual players. The game features more than 900 unique player faces, each resembling their real life counterparts. Every player and coach has facial expressions, so when a player is not happy at being sent to the penalty box, gamers will know it! To ensure a life-like look, Sega Sports motion-captured real hockey players of various sizes and in full pads to accurately recreate their movements on ice. Each player is comprised of more than 1,400 polygons and individual 3D player models were used to differentiate NHL player positions. Gameplay also reflects true-to-life physics, as smaller players are less apt to make an impact by hitting the big guys and dodging a defender takes time to muscle past them. Gameplay in ``Sega Sports NHL 2K" boasts highly advanced artificial intelligence. Players in the game will adjust their positioning and aggressiveness based on the coaching strategy that the user selects. Fluid movement in players is apparent as every shot, check and fall looks natural on the ice. Players who pass well in real-life excel at passing in this game and those who are good shooters from long-range will be deadly from the point. Shooting requires some serious aim and there are no ``money" plays. Players can also perform other actual on-ice moves such as wrist shots, slap shots, behind the goal dish passes, breakouts, cross checks and many more. The gameplay is as true to life as it gets. Not only are the teams and gameplay accurately rendered, so is the atmosphere. Gamers will feel like they're at a real game, as animated crowds drink soda and cheer, while the digital coaches move about and react to gameplay. There are more than 16,000 unique sound files included in the game, from the buzzers down to the sounds of skates on ice. Playing ``Sega Sports NHL 2K" is similar to controlling an actual NHL broadcast. The play-by-play commentary by Hall of Famer Bob Cole and Color Commentary by ex-NHL coach Harry Neale cement the realism of the game. All these factors help make ``Sega Sports NHL 2K" an experience rather than just a videogame. According to Glenn Horine, Group Director, NHLE, ``The NHL is pleased to add Sega Sports NHL 2K to our exciting line of fast-paced videogame products. NHL 2K sets a new benchmark for all action/simulation based games with their advanced technology and game features." Adding to the replay value, ``Sega Sports NHL 2K" features a variety of playing modes. In Exhibition Mode, gamers can play with any two teams in the league including the two All-Star teams. Season Mode allows gamers to take their team through a full season, while tracking the player and team stats, complete with an All-Star game. For the truly competitive, the game features a fiery and heated Playoff mode. Pushing the boundaries of innovative gameplay, ``Sega Sports NHL 2K" has an extensive Custom player feature. This allows gamers to create customized teams based on rosters, trading, line-ups or with imported information from a friend's Visual Memory Unit (VMU). Gamers can also create their own goalie or player with enhanced characteristics, creating an abnormally small or large team member. ``Sega Sports NHL 2K" is officially licensed by the National Hockey League and endorsed by Detroit Red Wings hockey great Brendan Shanahan, who is also a Sega Sports spokesperson. The game is now available at retailers nationwide and at www.sega.com. Activision Takes Nintendo Gamers Into The Jungle Swing into action as Activision, Inc., in collaboration with Disney Interactive, Inc., releases Disney's Tarzan on the Nintendo 64. Set deep in the African jungle, the 3D adventure game is available in North American retail outlets the week of February 14, 2000 and carries a suggested retail price of $49.95. The game has been given an ``E" rating by the ESRB. Based on Edgar Rice Burroughs' classic tale, Disney's Tarzan for the Nintendo 64 brings the animated feature film to life in a fun-filled, action-packed adventure. The game challenges players to adapt to the dangerous jungle surroundings by becoming stronger and more agile as Tarzan grows from childhood to adulthood. Gamers will also have the opportunity to play as Jane and Tarzan's ape friend, Terk, as the journey progresses. Developed by Eurocom Developments Ltd., Disney's Tarzan features 13 levels, plus 12 bonus levels where players can swim with crocodiles, swing on vines and surf through trees to survive the perils of the jungle. As the immersive story unfolds, players encounter an angry leopard, an elephant stampede and a baboon attack as they attempt to save Tarzan's ape family from the evil hunter, Clayton. Electronic Arts Announces SSX - Snowboard SuperX, Its First Entertainment Title for the PlayStation 2 Electronic Arts Thursday unveiled its first entertainment title developed exclusively for the PlayStation 2 game console. SSX/Snowboard SuperX -- centered on the unique and exciting new sport of boardercross will be on display at the Sony Festival in Japan on February 18-20 as SSX/Snowboard SuperCross. Electronic Arts, the world's largest producer of interactive entertainment is the only North American publisher invited by Sony to show software at the festival. Crisper, cleaner and a whole lot more fun, SSX and other EA titles developed specifically for Playstation 2 will set a new standard for interactive entertainment. Just a decade old, boardercross combines high-speed snowboard racing with the intense competition of a Supercross event on a demanding snow covered motocross track. The track includes jumps, steep turns, tunnels, and mogul piste sections that pit eight racers against each other. To deliver the best PlayStation 2 experience, Electronic Arts grounded SSX in real snowboarding physics with a true-to-life feel and sense of control, but pumped it up for arcade fun. The artificial intelligence of SSX convincingly brings to life the experience of zooming down adventurous snow-covered way-over-the-top mountain tracks at break-neck speeds, pulling off mind-blowing aerial maneuvers while trying to dodge seven challengers. The game features five distinct modes of gameplay. A sampling of the exciting action offered in SSX includes World Circuit -- a season-long dual against the world's top boarders. However to access this mode, riders must obtain a Circuit License, which earned by completing all the training lessons. From there rookies enter a field of 32 boarders featuring the world's best riders, and must run through a series of five different events. A high overall ranking following these events earn riders the big prize; entrance to the Professional World Championship Invitational Event. This event separates the best from the rest. There is also an adventure mode in which a player must find and collect a multitude of 3D snowflakes placed in obvious and not so obvious parts of huge rideable areas. Additionally, the Show Off mode challenges players to practice their slickest tricks against some pretty stiff competition. Players can choose to be one of eight distinct international boarder characters, each with his or her unique personality and skill set. Mac is the youngest rider at 15; Kaori has boundless energy and a sunny disposition; JP epitomizes the term `style over substance;' Zoe is a street-savvy mountain biker who is making a name for herself in snowboarding; Moby is fearless and attacks courses like a buzz saw; Jurgen is know as `the Giant' to his competitors; Elisa uses her good looks as a mask for her shrewd and dangerous mind; and Hiro, who wouldn't be caught without the latest and greatest in high tech racing gear. In addition to the different game modes and characters to choose from, SSX also features over eight mind-boggling courses, each with its own quality and style. The Tokyo Megaplex features a pinball machine like course in which players must navigate their way through a barrage of moving ramps, opening and closing doors and even pinball flippers. Another called the Aloha Ice Jam is centered on an iceberg that has been towed into a tropical Pacific Ocean port for the explicit purpose of being ridden. Be careful though, one wrong turn and you could end up in the ocean, swimming for your life. Sony Computer Entertainment will be hosting the Sony Festival this coming weekend in Tokyo to provide game enthusiasts their first hands-on preview to the PlayStation 2 console. The Sony Festival opens Friday, February 18 for press and distributors, and will then be open to the public on February 19 and 20. Sony expects to accommodate more than 50,000 visitors during the two public days of the festival. The PlayStation 2 will go on sale in Japan in March 2000 with a fall launch in North America. SSX/Snowboard SuperX was developed at Electronic Arts Canada and will be available in North America soon after the PlayStation 2 launches in the U.S. and Canada. Sega Unveils Digital Camera For Dreamcast In a sign that gaming consoles are gaining momentum as PC alternatives, Sega today unveiled a new digital camera for its Dreamcast gaming system. Sega's Dreamcast machine has been at the forefront of the market for Internet devices, as the console offers both gaming capabilities and Internet access. Sega has painted the machine as the centerpiece of its digital entertainment and home networking strategy. With today's release of the digital camera, called the Dreameye, Sega is acting on its digital entertainment strategy. Digital cameras may just be the tip of the iceberg. Dreamcast-like television-based Net appliances are already proving among the most popular ways for non-PC users to access the Web, according to a recent report from International Data Corp. Although many homes still don't have a PC, most have a television that can be used as an alternate medium to access the Net, analysts have said. Although Sega reported strong sales of its console in the United States, the Dreamcast wasn't well received in Japan. Analysts have said that the company needs to expand its sales beyond its core "early adopter" market. Analysts have also questioned Sega's staying power in the competitive gaming market. Sega's rivals--Sony and Nintendo--have also pushed similar strategies for their own gaming systems. Sony's Playstation 2, scheduled to be released in March, will act as a platform for everything from home shopping to banking to watching movies over the Internet, the company has said. "Right now we're just getting started," said Kevin Hause, an analyst at IDC, referring to the market for Internet-connected gaming consoles, handheld devices, and other Internet appliances. "The growth (of information appliances) will accelerate over the next couple of years, and will be one of the fastest growing categories around." The market for Net devices, including TV set-top boxes, handheld computers and gaming consoles, is set to grow from 11 million units shipped in 1999 to 89 million units in 2004, according to studies. The Dreameye, unveiled in Tokyo today, will use photo editing software developed by Picture IQ. Using the Dreameye, Dreamcast users will be able to capture digital images and edit them using the software. Users can also send pictures to friends or family via the Internet. "Sega is committed to providing people with the power to do more with the Dreamcast system," said Kideki Sato, corporate senior vice president at Sega, in a statement. "We want people to have more fun through the network, be more creative and communicate with more people." ReleaseNow.com and The 3DO Company Partner to Launch '3DO Pipeline,' An Internet Site for Game Enthusiasts ReleaseNow.com, a provider of outsourced e-commerce solutions, and The 3DO Company, Tuesday announced that The 3DO Company's catalog games and Internet-only games are now available for purchase and immediate download from a new Web site called 3DO Pipeline ( http://store.3do.com/pipeline/index.html ). 3DO Pipeline is launching with six games, including Arcomage, a fast-paced fantasy card game, and the classic games in the best-selling Might and MagicŪ role-playing series. 3DO Pipeline is seamlessly integrated with The 3DO Company's online store at www.3DO.com. Customers may purchase games and download them directly to their computers. As The 3DO Company's e-commerce partner, ReleaseNow.com developed and is hosting and managing 3DO Pipeline. In addition, ReleaseNow.com is providing targeted integrated e-marketing services to The 3DO Company to publicize the launch of the site to gaming enthusiasts. ``Our customers are tech-savvy by nature and enjoy the immediate gratification provided by digital downloads," said Trip Hawkins, chairman and chief executive officer of The 3DO Company. ``Offering our most popular games directly from our Web site was a no-brainer decision. ReleaseNow.com made it easy for us to do this quickly and reliably." Hawkins added: ``We expect our library of direct download games to expand as more consumers get faster access to the Internet." ``We are pleased to be working with The 3DO Company to market, sell and deliver their products online. Their targeted e-marketing efforts will provide a superior customer experience," said Michael Maulick, chief executive officer and president, ReleaseNow.com. ``The 3DO Company has long been an innovator in the industry and continues to be on the leading edge with its e-commerce strategy." Games available now for immediate purchase and download include: * Might and Magic: The Secret of the Inner Sanctum * Might and Magic II: Gates to Another World * Might and Magic III: Isles of Terra * Might and Magic IV: Clouds of Xeen * Might and Magic V: Darkside of Xeen * Arcomage The Might and Magic series, developed by New World Computing, is one of the most long-running, successful electronic gaming franchises in history. Its creator, Jon Van Caneghem, programmed and sold the first game out of his apartment in 1986. Since then, the series has branched out beyond its classic role-playing roots into strategy and action genres and has garnered numerous awards. To date, there have been well over 4 million units sold worldwide in the Might and Magic universe, and the series has been translated into more than 12 languages. Arcomage is a fast-paced, single- or two-player fantasy card game in which players strive to crush their opponents using magic, creatures and building resources. Striving to Build a Better Computer Game They can take you to worlds beyond your imagination. They can spark an adrenaline rush. They can keep you transfixed for hours. But at last week's conference on ``Computer and Video Games Come of Age" at the Massachusetts Institute of Technology, game designers acknowledged that they still have a long way to go to make computer games as compelling and realistic as a good book or movie. That may explain why the games continue to occupy a niche -- albeit, a rapidly growing niche -- in the entertainment field. Speakers at the seminar on The Future of Games suggested that the technology and the programming skills are going to have to evolve before the games become a mature, mass-market medium. ``You have to make games so accessible, people will go home and ask, 'Shall I watch a video, watch cable, or play a computer game?"' said Peter Molyneux of Lionhead Studios, who helped create the ``God game" genre with the release of ``Populous" a decade ago. ``There have to be games invented that simply don't exist today," he said. ``They have to entertain people, not just hobbyists and dedicated gamers. To do that, you've got to make games incredibly, incredibly deep. You've got to use the technology better." Some interesting technological improvements are on the horizon. One is designed to overcome the seemingly endless configurations of video cards and processors. ``We are limited in our game design because we don't know which computer the game is going to be played on," said David Perry, founder of Shiny Entertainment. The answer may be scalable technology, where the game constantly monitors the performance of a player's computer. ``When it sees your machine starting to choke, it eases back on the pressure it's putting on your hardware by removing polygons on the scene that you're not going to notice," Perry explained. ``We know that your machine is going to run at 100 percent of its potential 100 percent of the time." In fact, players with top-of-the-line machines ``will see visuals in the game that we, the developers, never saw." Another potential innovation is to create games that alter themselves based on the wishes of the player. ``The games should be personal," Molyneux said. ``Why should a computer game be the same for everybody? Why shouldn't a game be able to look at the person who is playing it and change itself to cater to that one single person?" That potential already exists, said Perry. ``The programmer can see you through his machine, the programmer can tell if you're frustrated because you're pushing the keys rapidly, trying to open a door. We know if you keep walking around the room that you may be lost, so we can keep an eye on you a bit longer and then we'll give you some help," if you need it. Mark Pesce of the University of Southern California said the trend toward multi-player games will grow even stronger. ``It adds so much life to a game when, after you've had the initial experience, to go play your friend." Personally, Pesce said, he's bored by contemporary multi-player games because they don't take advantage of a program's artificial intelligence. ``The characters are just standing around waiting to be executed. Players happily execute thousands of them. They go room to room to room. But it's not a compelling world to get into." That could change, he said, if individual computers involved in a multi-player game could be taught to share the software's processing tasks. ``And the more people you add, the more processing power you can add" to increase the realism. Perry said another problem is that the artificial intelligence that drives today's games isn't all that intelligent. ``In 90 percent of the video games, the AI is pretty bad," he commented. ``I think that's why it's fun to shoot things. The AI is so bad and the characters are so annoying." Even with the growing sophistication of games, humans are not simulated well. In real life, for example, people nod at each other when they meet. ``In video games, characters don't nod. Instead, they walk into walls" or refuse to duck for low-hanging beams, trying to walk anyway, said Perry. Molyneux described one example that cropped up when he and his colleagues began developing ``Black & White," a game where you play a deity who, among other things, controls a loyal pet known as ``the creature." ``The first thing we got the creature to learn was to think about what to eat," Molyneux recalled. ``The first time we got him visually up, he was standing there looking down at himself and just reaching down. We couldn't understand what he was doing. ``Then we debugged him and, sure enough, he was looking around for something to eat and the most tasty thing he could find to eat was his own leg," said Molyneux. ``So we had to give him the rule: you can eat anything but don't eat yourself." That illustrates the challenge of creating virtual humans, said Perry. ``To teach them to interact with the real world and not eat their leg, you have to physically teach them common sense. The problem is, when we make a video game we only fix what we see. So if we see the character eat his leg, we put in something that says 'Don't eat your leg.' That's common sense. But basic common sense has millions of parameters. It's going to be a long time before you really believe this thing is alive." =~=~=~= ->A-ONE Gaming Online - Online Users Growl & Purr! """"""""""""""""""" For Immediate Release Contact John Hardie, Sean Kelly, and Keita Iida info@cgexpo.com 516-568-9768 http://www.cgexpo.com CLASSIC GAMING EXPO 2000 SHOW DATES ANNOUNCED; "FATHER OF VIDEOGAMES" FIRST TO SIGN ON VALLEY STREAM, NY (February 15, 2000) -- The organizers of Classic Gaming Expo have announced the dates of the 2000 show to take place at Jackie Gaughan's Plaza Hotel. On Saturday, July 29, and Sunday, July 30, the computer and gaming industry's most innovative pioneers will gather in Las Vegas to attend Classic Gaming Expo 2000. Dubbed CGE2K, the third annual event is inspired by a strong, continued commitment to classic game updates and re-releases by such major publishers as Hasbro, Midway, Activision, Konami, Capcom, and others. Heading up this years line-up of industry pioneers is none other than the "Father of Videogames" himself, Ralph Baer. "Mr. Baer was one of THE major highlights at last year's event and we're thrilled that he has decided to join us again for CGE 2000," said Sean Kelly, co-promoter of Classic Gaming Expo. Last year, Baer thrilled audiences by allowing some members to play with his prototype "Brown Box", which eventually became the Magnavox Odyssey. In addition to the Odyssey, Baer was the mastermind behind the Coleco Telstar Arcade and Gemini systems, Milton Bradley's Simon, and the Coleco Kid Vid peripheral for the Atari 2600. Mr. Baer has created many other products and currently has over 150 patents in his name worldwide. "I'm proud to have had a hand in shaping the videogame hobby as we know it today," said Mr. Baer. "It was a thrill to meet so many of the attendees at last year's show as well as some of my old friends. I'm looking forward to the opportunity to share more of my experiences and to again show the 'Brown Box' prototype at CGE 2000." The "Brown Box" prototype is just one of the technological wonders that will be on display at CGE 2000. Aside from the keynote speeches by various industry legends, Classic Gaming Expo also hosts the largest public display of classic game hardware, software, and memorabilia around. Some of the countless items to be displayed at the CGE 2000 museum include numerous hardware and software prototypes as well as many unreleased items and loads of videogame memorabilia. "What makes the Classic Gaming Expo Museum so special is the fact that it's comprised of items belonging to at least two dozen different individuals," stated co-promoter John Hardie. "This is not just a single person's collection but rather a grouping of items on loan from enthusiasts as well as many of our distinguished guests." Among the other activities planned, CGE 2000 will play host to a large number of classic videogame vendors and exhibitors. While many of them will be selling mint-condition hardware and software from the days of old, others will be presenting new products for sale for systems such as the Vectrex, Odyssey 2, Colecovision, Intellivision, Atari 2600, Lynx, and Jaguar. Other show highlights include various classic console game stations, tournaments, raffles, door prizes, and an incredible number of classic coin-operated videogames, all set on free play for the attendees. "I'm delighted to see the growing commitment from the major videogame publishers to this market segment. It is becoming clear that classic gaming is a pastime enjoyed by more and more people," points out Mr. Donald A. Thomas, Jr., Curator of ICWhen.com. Thomas worked as Atari's Consumer Services Marketing Director in its later years. He currently works as a licensing director in the high-tech industry. Now in its third year, Classic Gaming Expo remains the industry's only annual event that is dedicated to celebrating the roots of electronic entertainment; bringing together industry pioneers, gaming enthusiasts, and the media for the ultimate experience in learning, game-playing and networking. Classic Gaming Expo is a production of CGE Services, Corp. (www.cgexpo.com) =~=~=~= A-ONE's Headline News The Latest in Computer Technology News Compiled by: Dana P. Jacobson Links in Computer Attacks Traced Experts investigating recent attacks against major commercial Web sites say a computer and an Internet device used by vandals as weapons have been traced to two California universities. The vandals used a desktop computer at the University of California, Santa Barbara, and an Internet router - a device that can amplify data traffic - from Stanford University, officials at both schools acknowledged Friday. There was no indication that anyone at either university was directly involved, only that their equipment was used. Experts believe dozens of computers nationwide were hacked and had electronic attack software secretly installed. ``They've attacked us in a way that hurts what we do as a university, and hurts all universities," said Robert Sugar, chairman of the information technology board in Santa Barbara. The school's computer was believed used in the attack against CNN's Web site Tuesday. Stanford said one of its routers located at a remote wildlife preserve was used to transmit some of the data aimed against the Web site of auction operator eBay for about 30 minutes before engineers blocked hackers from using it. ``It's really out in the middle of nowhere," said Dave Brumley, assistant computer security officer at the university. He said engineers have checked Stanford's other routers to prevent their similar misuse. Meanwhile, investigators suggested that the vandals in Monday's attack against the Yahoo! Web site - the first to be shut down for hours - may have been far more sophisticated than originally believed. Ronald Dick, a senior official with the FBI's National Infrastructure Protection Center, said earlier this week that automated hacker tools widely available on the Internet mean that ``a 15-year-old kid could launch these attacks." ``This is not something that it takes a great deal of sophistication to do," Dick said. But e-mail from engineers for search engine Yahoo! describing the attack in detail said the vandals apparently ``knew about our topology and planned this large-scale attack in advance," and that other companies hit this week also were targeted ``where it hurts the most." This e-mail, sent as a warning to some Internet providers and obtained by The Associated Press, also described the Yahoo! attackers as ``smart and above your average script-kiddie," a derisive term for an unskilled hacker. It said the vandals ``probably know both Unix and networking ... pretty well and learn about site topology to find weak spots." An executive at GlobalCenter Inc., which provides Yahoo!'s Internet connection, also said Friday that engineers there were surprised during the attack, which flooded Yahoo! with more data each second than some major Web sites receive under normal conditions in a week. ``About an hour into the initial attack, they were already commenting about what appeared to be some level of sophistication," said Laurie Priddy, the company's executive vice president. ``These (vandals) seemed pretty smart who were doing it." ``Denial of service tools are widely available and do not require great sophistication to use," said a federal law enforcement official who requested anonymity. ``But what we've seen already does seem to be a somewhat sophisticated attack." At the White House, President Clinton said the Internet offers new opportunities for people ``just mischievous and people who have far darker motives." But he also held out hope that America will ``develop better defenses and better defenders." ``If you go back from the beginning of time, where things of value are stored, people with bad motives will try to get to those things," Clinton said. ``Now vast things of values are stored in our computers and transactions of great values occur on the Internet." Also Friday, Excite.Com - a popular search engine for the Web - said its site also was targeted earlier this week by attackers. A flood of data disrupted service for about half its customers for about one hour Wednesday night until the attack suddenly ended without warning, spokeswoman Kelly Distefano said. In these attacks, called ``distributed denials of service," hackers secretly install software tools on dozens or hundreds of powerful but insecure computers - usually those of corporations or universities - then remotely direct crippling floods of electronic data at target Web sites. FBI's Internet Cases Quadruple The number of newly opened FBI computer investigations has quadrupled since the first electronic commerce sites were attacked last week. Investigators theorize copycats may have emerged to attack additional, but less well-known Internet sites. Attacks have continued into this week, and no one knows if they have ended, FBI spokeswoman Debbie Weierman said Thursday. Two days after the first attack overwhelmed Yahoo! on Feb. 7, the FBI had opened four new investigations of these so-called distributed denial of service attacks. Now the total is ``more than 17 new investigations, including more than 13 where the victim suffered a distributed denial of service attack," Weierman said Thursday. Only eight of the more than 13 have been publicly identified. Four investigations are into the placing of denial of service tools, known as daemons, on middleman computers that can later be remotely ordered to attack a victim site, Weierman said. Hiding these daemons on unwitting host computers is a key step in mounting a distributed denial of service attack. ``The possibility of copycats is out there, as are other theories, with these piggyback incidents," she said. At first, the coincidence of timing suggested the attacks were launched by the same people. As the attacks continued, investigators began actively looking into the copycat theory, according to other federal law enforcement officials, who requested anonymity. Investigators won't reveal the patterns they have found in the logs of target and middleman computers that lead them to suspect some copycats are at work since such large, frequently-used electronic commerce sites like eBay and Amazon.com were attacked last week. But one factor that contributes to the theory is the use of more than one type of tool to mount the attacks. Without saying where or when they have been employed, FBI Director Louis Freeh has identified three such tools: TFN for Tribal Flood Net, trinoo and stracel draht. Some can be downloaded free from Internet sites. The coordinated denial of service attacks are known to have overwhelmed eight Web sites - those run by Yahoo!, eBay, Amazon.com, CNN, ZDNet, Buy.Com, ETrade and Excite. There are more than five other victims whose identities are not public. And those whose attacks were not noticed by large portions of the public. The FBI opens an investigation after a victim complains and bureau agents find some evidence of crime in a preliminary analysis. Weierman said the bureau would not disclose the identities of all the victims ``to preserve the integrity of the investigation." Other federal law enforcement officials said some victims companies want their names withheld to protect their reputations or for fear of losing the confidence of the public or seeing their stock price drop. The Feb. 7 attack on Yahoo! was acknowledged by the company hours later - after reporters inquired whether the site had been brought down by attacks. Many of the other victim Web sites were originally identified as suffering attacks by Keynote Systems Inc., which monitors the performance of major e-commerce sites. Excite, which was hit the night of Feb. 9, didn't disclose it until Feb. 11. Investigators say that dozens, even hundreds, of middlemen computers, known as zombie computers, have been unwittingly used in past distributed denial of service attacks. So far, only three are known to have been used in the current round of attacks, a computer at the University of California at Santa Barbara, a router at Stanford University and a home business computer in the Portland, Ore., area. Attorney General Janet Reno said Thursday that ``to date, there has been such good cooperation between the private sector, other federal agencies and the FBI. And I am very pleased with that." Hacker Victims or Accomplices? The overwhelming attacks this week against some of the Internet's biggest companies required dozens of powerful ``zombie" computers collectively aiming a crippling tide of data at target Web sites. Experts believe the hackers earlier had infiltrated and secretly installed their attack software on these computers, setting them up as unwitting accomplices in a crime-in-the-making. Were the operators of these computers merely victims of these unprecedented assaults, or were they partly to blame? It's a question with enormous consequences for the Internet, the sprawling worldwide network that has few rules and where security can range from ironclad to nonexistent. As the Internet's importance grows as an engine for America's economy, some experts wonder whether unsafe computers can continue to be tolerated, or whether there is any alternative. ``There are a lot of devices out there that are misconfigured, wide open, totally available to anyone who wants to use them," said Russ Cooper, who runs the NTBugtraq Internet discussion group about computer security. ``That's very, very true and it shouldn't be. Why do we accept this?" The FBI suggested this week that owners of the hacked computers used in the high-profile attacks may indirectly share some of the responsibility for the moves against Web sites run by Yahoo!, eBay, Amazon and eTrade. ``Even more embarrassing than for Yahoo! and eBay is when we find out where these attacks originated from," said Wyatt Starnes, chief executive at Tripwire Inc., an Internet security firm. A senior official at the FBI's National Infrastructure Protection Center, Ronald Dick, said the affected computer administrators ``probably are unwitting people" whose systems previously were invaded by hackers and who didn't know that attack tools had been installed. Agents still are tracing those hacked computers and won't identify them. But Dick chided: ``Your security ... or the lack thereof can cause harm to others. The key to this is implementing appropriate security measures such that you do not allow your system to be used in some of these attacks." The popular shopping Web site Buy.Com was among those attacked this week, shut down for hours by a flood of data from these compromised computers. Its chief executive, Greg Hawkins, said he doesn't directly blame operators who failed to secure their own machines against hackers but added, ``we all have a responsibility." The technology officer at one Internet security company, Mike Wittig of CyberGuard Corp., compared running an unsecure computer on the Internet to carelessly storing a loaded gun. A hacked computer can be used to bring down other Web sites, transmit unwanted e-mail to tens of thousands of people and even cover a hacker's digital footprints committing other electronic crimes. Computer operators ``have a tremendous responsibility in ensuring they're not used to do any harm," Wittig said. ``There definitely should be a moral responsibility to prevent your site from being utilized in such an attack." Experts believe most of the hacked computers used in this week's attacks likely were run by companies or universities, and Buy.Com said its attack was traced to computers in Boston, New York and Chicago. Those machines - rather than a consumer's home computer with a dial-up Internet account - are much more attractive to attackers because of their high-speed connections. ``If you're going to flood someone, it's easier to hit them with 50 fire hoses than garden hoses," said Patrick Taylor, an executive with Internet Security Systems Inc. Reasons for light security vary. A computer at Oregon State University was hacked in November and illicitly used again in December by the hacker who claimed to have stolen 300,000 credit card numbers from the CD Universe Web site. There is no evidence that computer was used in this week's attacks against Yahoo!, eBay, Amazon and others. The Oregon State computer, kept locked in a closet in the school's Department of Bioresource Engineering, was never made fully secure, partly because it didn't contain any information deemed sensitive, said John Bolte, who runs the department's biosystems analysis group. Other experts insist no one should be held responsible for an attack against an organization's Web site - except the hackers. ``At the end of the day, it's still ultimately your responsibility to protect your property," said Harris Miller, president of the Information Technology Association of America. ``You can't blame someone else." Others disagree, predicting a bevy of lawsuits. ``It's really no different than if you left dangerous materials around and somebody used it to hurt somebody else," said Geoff Allen, who runs Willis Media, an insurance and risk-consulting firm. ``You'll see claims start to go at some point, possibly see suits against these servers that had been compromised. ``The question is, did the owner of the server take adequate precautions." Secret Microsoft Negotiations Suffer From Leak A published report said Wednesday that Microsoft Corp. is prepared to make concessions to achieve a settlement in its antitrust case, although the mediator had warned both sides against leaking to the press. The negotiations before an appellate court judge in Chicago, acting in a private capacity, are running on a parallel track with the trial itself. Early on in the negotiations, Appellate Judge Richard Posner told both sides in the strongest possible terms not to speak to the press about the talks. Nonetheless, there was one earlier leak, which gave a broad -- and apparently somewhat erroneous -- outline of the government's position. Commentators said at the time the leak had hurt the talks. The trial itself resumes on Tuesday in Washington with arguments before District Judge Thomas Penfield Jackson on whether Microsoft broke the nation's antitrust laws. Jackson has already found that Microsoft abused monopoly power to the detriment of consumers, rivals and other companies. The trial has been in recess since before the negotiations began in Chicago late last year before Posner. Posner warned both sides against talking with the press. The first exposition of Microsoft's stance in the talks appeared in a piece in Wednesday's Wall Street Journal. The report said that Microsoft ``initially argued it hadn't violated the law ... But more recently, it put on the table a series of conduct restrictions..." The report cited people close to the case. Microsoft was willing to agree to greater disclosure of the inner workings of Windows, an end to restrictive contracts and measures to give personal computer makers more freedom, the story said. At the same time, the story characterized the government's stance as insisting on more stringent measures, including a proposal to break the firm into two companies, one for consumers and another for businesses. A government official said Microsoft had leaked the information. ``It is most unfortunate that Microsoft is violating the confidentiality of the mediation process," the official said, when asked about the story. A Microsoft spokesman denied that his firm had leaked the information, even though it cast his company in a favorable light for a willingness to make concessions. ``We have not talked about mediation," the spokesman said. "We're not going to comment." In the past few days, Microsoft has also sent an e-mail to a broad array of House and Senate members declaring its intent to seek a ``common sense settlement" to the case. Without describing what such a settlement might entail, Microsoft said in the e-mail that it was ``concerned -- even dismayed -- that the Department of Justice, according to several press reports, is insisting on breaking up the company." Several members of Congress, after receiving inquiries, endorsed the negotiations. For example, Senate Minority Leader Tom Daschle, a South Dakota Democrat, said that the ``current mediation process provides both parties a unique opportunity to resolve this dispute..." It is unclear how long the talks may last. Judge Posner made it clear he does not want the talks to go on forever. Judge Jackson, in describing Posner's views when he announced the negotiations said: ``I don't think that he is going to be prepared to waste a whole lot of time if it looks from the outset" that the talks would not be promising. DoubleClick Faces New Legal Action DoubleClick Inc., the leading online advertising firm that has become a lightning rod for fears about privacy on the Web, came under a new legal attack on Thursday, sending its shares falling 15 percent. The Michigan attorney general's office said it began legal proceedings on Thursday against the New York-based firm, which collects increasingly personal data on Internet users, and then sends advertising targeted to the user. Shares in DoubleClick closed down 15-3/4 to 90-3/4 on Thursday, making it one of the top losers on Nasdaq. The company is also facing five other similar lawsuits as well as government inquiries out of Washington and New York. The company filed an annual report with the Securities and Exchange Commission on Thursday, saying it would need to expend significant resources due to the lawsuits and inquiries. ``We may need to spend significant amounts on our legal defense," the company said. ``Senior management may be required to divert their attention from other portions of our business, new product launches may be deferred or canceled as a result of these proceedings." DoubleClick has amassed 80 to 100 million detailed individual profiles, according to the Michigan attorney general. DoubleClick delivered about 30 billion ads in December 1999 alone, through alliance with 1800 of the most prominent Web publishers and over 11,000 sites worldwide. The company, which is the subject of five other similar lawsuits, defended its policies on Thursday, saying it does not use ``sensitive" personal details in the background data it compiles on Web surfers. ``DoubleClick has never and will never use sensitive online data in our profiles," said Kevin Ryan, president of DoubleClick. Sensitive information would include information related to health, finance, children or sexually explicit data, according to DoubleClick Washington lobbyist Josh Isay. ``We don't use information if you go to a children's site, and DoubleClick doesn't use personal information from children," he said. Isay acknowledged that a child surfing other sites would be subject to anonymous data collection since there is no way to distinguish a user's age. DoubleClick profiles include information about Web sites visited; for how long; user's language; and what Web browser they use. This information was anonymous until recent months, when the company began to set up partnerships with certain Web sites that ask users for their names, addresses and e-mail addresses. In November, DoubleClick bought Abacus Direct, a direct marketing research firm, giving it access to a large database of offline customer information. Privacy advocates are alarmed at the prospect of a database formed from its online tracking, offline data about buying habits and volunteered user information. DoubleClick has asserted that it only collects Web data if individuals are informed of its efforts and volunteer their identities. ``It is DoubleClick's policy to only merge personally identifiable information with non-personally identifiable information for profiling, after providing clear notice and choice," said Ryan. DoubleClick maintains that anyone can opt out of the tracking system, but privacy advocates said more of the burden should be on the company. They said tracking should only be permitted after someone explicitly agrees first. ``I think we've gotten to the point now it is getting too difficult for consumers to discern," said Gary Clayton, president of Privacy Council, a Dallas-based privacy consultancy. ``I think there needs to be a default that the information isn't used unless a consumer opts in." The Federal Trade Commission's Bureau of Consumer Protection late on Wednesday said it has initiated a routine inquiry to determine if DoubleClick has engaged in unfair or deceptive practices in violation of the Federal Trade Commission Act. The New York Attorney General's office is also conducting an informal inquiry into DoubleClick. DoubleClick has said it is cooperating with the FTC probe and the N.Y. inquiry. Analysts downplayed any long-term threat to DoubleClick's business, pointing out that traditional marketers buy and sell personal data constantly. ``The issue at hand is whether to have an opt-in, or an opt-out policy," said Janney Montgomery Scott Inc. analyst Tomas Isakowitz. ``The privacy advocates are asking for an opt-in policy, and if that happens it would have a negative impact on DoubleClick and a lot of other Internet companies." ``But I don't see that happening in the U.S.," he said. "We are a marketing society." CS First Boston analyst Richard Peterson said the odds were small that the company would be stopped from connecting the Abacus database to its online information. ``If they cannot connect their offline and online data, then they cannot make as much use of Abacus data they saw initially, and that takes 20 percent of their business," he said. ``But given the very small, maybe one percent, chance of this happening, the drop in share price is a big overreaction, and a buying opportunity for the long term." Networks, Studios Fight Net Pirating Heavyweights in the entertainment and sports industries brought their power to bear against a Canadian Internet startup site, winning the first rounds and shutting it down. But the fight isn't over yet. Ten motion picture studios, four TV networks, the NFL and the NBA banded together to get an injunction last week keeping iCraveTV from rebroadcasting their shows into America. It remains to be seen if that will stop other Web sites from going ahead. "iCraveTV was the hole in the dike," said Michael Shamos, who worked with the plaintiffs and is co-director of the Institute for eCommerce at Carnegie Mellon. "Pirating will become a bigger business." That prediction has industry leaders worried they could lose control over copyrighted materials, potentially cheapening them - and compromising the deals they make with advertisers and local stations. Somebody Call An Exterminator! Can Microsoft squash 63,000 bugs in Windows 2000? Not everyone will be having fun at Microsoft this week. While the software giant and its partners celebrate the arrival of Windows 2000 on Feb. 17, hundreds of members of the Windows development team will be busy cleaning up the mess. Not the launch-party mess. The code mess. According to an internal Microsoft memo viewed by Sm@rt Reseller, the company needs to fix tens of thousands of bugs contained in the final Win2000 release code. Fixing these bugs is the top-priority assignment for Microsoft group VP Jim Allchin's Windows team. "Our customers do not want us to sell them products with over 63,000 potential known defects. They want these defects corrected," stated one of Microsoft's Windows development leaders, Marc Lucovsky, in the memo. "How many of you would spend $500 on a piece of software with over 63,000 potential known defects?" It's a question that solutions providers will surely weigh as they kick Win2000's tires. According to the Microsoft memo, the Windows 2000 source-code base contains: * More than 21,000 "postponed" bugs, an indeterminate number of which Microsoft is characterizing as "real problems." Others are requests for new functionality, and others "plain confusion as to how something is supposed to work." * More than 27,000 "BugBug" comments. These are usually notes to developers to make something work better or more efficiently. According to Microsoft, they tend to represent "unfinished work" or "long-forgotten problems." * Overall, there are more than 65,000 "potential issues" that could emerge as problems, as discovered by Microsoft's Prefix tool. Microsoft is estimating that 28,000 of these are likely to be "real" problems. "Our goal for the next release of Windows 2000 is to have zero bugs. The only way this happens is if you take it upon yourselves to fix the bugs that should be fixed, and close the bugs that should be closed," continued Lucovsky in his note to the development team. He added that no new code for future Windows releases, such as Whistler and Blackcomb, will be allowed to be "checked in" until the development team has fixed the existing Windows 2000 bugs. A spokeswoman for Microsoft strongly defends Windows 2000's quality. She says: "Bugs are inherent in computer science. All software ships with issues. The difference is, no software in the history of Microsoft development has ever been through the incredible, rigorous internal and external testing that Windows 2000 has been through." The spokeswoman notes that 750,000 testers received each beta version of Windows 2000. She says "hundreds of companies have signed off on the incredibly high quality and reliability of Windows 2000." The result, she says, is that hundreds of companies are deploying Windows 2000 before general availability. One developer, informed of Microsoft's bug estimates, says that all new software ships with lots of bugs, but that few software vendors are willing to acknowledge this reality. "The fact that Microsoft found that many bugs indicates to me just how thorough their testing processes are," says the Windows developer, who requested anonymity. But others aren't so sure. Market researchers have repeated warnings to their clients against upgrading immediately to Win2000. Several outfits have advised customers to wait until Microsoft issues its first or second service pack before deploying Win2000. And research outfits made these suggestions before the exact bug tallies came to light. Despite these bugs, Microsoft has made Windows 2000's reliability a key focus and part of its marketing message for the product for months. At COMDEX/Fall last year, Allchin detailed at length the two-year-old reliability initiative upon which Microsoft had embarked to insure Win2000 would be more stable and reliable than NT 4.0 or its predecessors. Allchin said Microsoft spent 500 person years and $162 million on people and tools specifically oriented toward improving reliability of the product. In more recent weeks, Microsoft has plastered ads on buses, billboards and phone booths in a number of major cities. "Windows 2000 is coming. Online or off, a standard in reliability," reads the text. Windows 2000 is hardly Microsoft's only worry in the coming months. Another big hurdle is application support for the operating system. Microsoft's been working on a slew of Windows 2000/Active Directory-optimized applications, which ultimately will ship as some type of BackOffice 2000 or BackOffice 5.0 package. The first BackOffice 2000 beta isn't expected until some time in the second half of this year. But the first BackOffice 2000 app upgrade, Exchange 2000, is expected to arrive around midyear. Other BackOffice Server updates--the next releases of SQL Server, Proxy Server, SNA Server and Systems Management Server--also are in the development pipeline. But exactly how far along they are is unclear. At the same time, Microsoft is developing several BackOffice add-ons. Microsoft preannounced some of these add-ons, such as its BizTalk Server, Commerce Server and AppCenter Server, a full year ago. But first betas of these point products have yet to appear. The company doesn't plan to move any of these new point products into the BackOffice SKU, says Russ Stockdale, director of server applications marketing with Microsoft's Business Productivity Group. Stockdale says Microsoft's plan is to continue to offer current and future BackOffice SKUs to branch-office customers and midsize organizations. Stockdale acknowledges that BackOffice 2000 will have little appeal to e-commerce and dot-com customers--even though Microsoft is pitching its anchor, Windows 2000, as an e-commerce-optimized operating system. Microsoft Launches 2000 With Help From Dell Software giant Microsoft Corp. on Tuesday kicked off a gala launch event for Windows 2000, with a key ally, Dell Computer Corp. and corporate customers giving the new operating system high marks. Delivering the opening keynote for the three-day event, which will culminate on Thursday with the official unveiling of Windows 2000 by Microsoft Chairman Bill Gates, Dell Chief Executive Michael Dell said he thought adoption of the software would be ``strong." His comments came in response to worries by analysts and investors that customers might be slow to upgrade to Windows 2000, to be launched Thursday. The next-generation operating system will run business networks and the powerful servers that underpin the Internet. ``I believe the adoption rate will be strong," Dell told a news briefing after his speech. ``We see a lot of interest in Windows 2000, and our Dell technical consulting practice has seen a lot demand." Microsoft has bet $1 billion and more than three years of effort that Windows 2000, the successor to its NT networking platform, will allow it to capture the lion's share of the booming market for servers and business computers. But the Redmond, Wash.-based software giant has faced increasing competition from rivals such as the upstart Linux operating system and perennial foe Sun Microsystems Inc. The company's stock has been rocked the past few days, including a 5 percent-drop last Friday, after a report by research firm The Gartner Group forecast Windows 2000 adoption would be slow and that companies switching to it this year would experience compatibility problems with existing software. Comments by Dell last week that Linux was gaining strength and that he didn't see ``a massive, immediate acceleration" in business driven by Windows 2000 upgrades, also rattled investors. Dell on Tuesday distanced himself from those words, saying the remarks were inappropriately linked to the Gartner report. Other analysts have since said that a slower roll-out for Windows 2000 was expected because of the cost and effort needed to upgrade sprawling business networks. Dell said his company, the No. 1 direct seller of personal computers that relies heavily on the Internet, had flipped the switch and jumped to a Windows 2000-based system last Wednesday. He touted the reliability and flexibility of Windows 2000, the release of which Microsoft had repeatedly delayed as it continually massaged the software's more than 30 million lines of code. ``This is a huge and very important leap forward in terms of what customers want from their PCs and the related products that go around it," Dell said. Dell also took a shot at rival Sun, saying a Dell-brand server powered by Intel Corp.'s Pentium III chips and running Windows 2000 offered twice the performance, took up half the space and was one-third the price of a comparable Sun system. Sun is one of Microsoft's most vocal critics, and has pushed its Java and Jini programming technologies as open and Internet-friendly alternatives to Windows systems. Sun Chief Executive Scott McNealy has publicly called on the industry not to support Windows 2000, saying it is too bulky and clunky to be of practical value in a world that is moving toward ``anywhere, anytime" computing on a range of non-PC devices. But Dell said his company was working with such high-profile customers as Wall Street brokerage firm Merrill Lynch, American Express, TWA airlines and leading job Web site Monster.com to deploy Windows 2000. Ford Motor Co. also gave the platform a thumbs-up, with its Chief Information Officer Jim Yost saying the American car giant planned to complete a total Windows 2000 make-over by early 2001. ``Windows 2000 was chosen for both its scalability and reliability, which are needed to support our high-volume needs," Yost said. ``We need to have a very robust infrastructure." Dell's keynote was to be followed by one from Michael Capellas, chief executive of Compaq Computer Corp., the world's second biggest computer company, later on Tuesday. Apple Unveils Souped-Up Notebook Apple Computer announced the launch of a souped-up i-Book notebook computer on Wednesday with double the memory and hard-drive size of the previous model. Apple Inc. Chief Executive Steve Jobs told a trade show in Tokyo that the new i-Book laptop would be launched in Japan on Friday at a price of 198,000 yen ($1,822), the same as the previous i-Book. It will be $1,599 in the United States. Apple officials said the computer was being marketed starting Wednesday in the United States and would be available worldwide. It also unveiled a new PowerBook portable computer with processors up to 500 MHz. Jobs' announcement on the i-Book, aimed at Mac fans in Japan, where the Internet population is rapidly growing, came just a day before arch rival Microsoft Corp's long-awaited launch of its new business operating system, Windows 2000. Jobs said the i-Book will have 64 megabytes of random-access memory (RAM) and a six gigabyte hard disk. ``We are going to double the memory, and double the disk size, and keep the price exactly the same," Jobs said. He said Apple would introduce a new graphite-colored i-Book Special Edition, adding to the existing Blueberry and Tangerine versions. The graphite iBook will sell for 218,000 yen and have a 366 MHz Power PC G3 processor, compared with 300 MHz for the blueberry and tangerine models. Jobs said two new PowerBook models will be launched in Japan on Friday, one priced at 298,000 yen with 64 megabytes of RAM, a six gigabyte hard disk and a 400 MHz processor. The other, with 128 megabytes of memory, a 12-gigabyte hard drive and a 500 MHz processor, will be 398,000 yen. He added Apple would launch a new line of Power Mac G4 desktop models with faster processors running at 400, 450 and 500 MHz for Japanese customers on Friday. The three advanced models would be priced at 198,000 yen, 298,000 yen and 428,000 yen, respectively, in Japan, and $1,599, $2,499 and $3,499 in the United States. New i-Book models, PowerBook models and Power Mac G4 models are all available in the United States immediately. Personal computer sales in Japan jumped 31 percent to hit a record 9.22 million last year, a sign of Japan transforming into one of the world's most Internet-savvy countries. Jobs said Apple held the fourth-biggest market share for PCs in Japan at 7.8 percent in the last quarter of 1999, reflecting the popularity of its i-Book and i-Mac PCs. He gave no comparison with Apple's market share in previous quarters. "We would like to see the share go even further. We know we have the strongest product line Apple has ever had," Jobs said. He also said the new Macintosh operating system to be launched this summer will be capable of operating in all key languages, meaning there will be no delay in its release from country to country. Apple shares have jumped on Wall Street in recent days amid speculation that Jobs would unveil more new products, possibly a new PowerBook, or perhaps a new appliance-class device -- a stripped-down device designed just to access the Internet. Window Washer Wipes Your Web Slate Most of the time, software reviewing is like reaching into your Christmas stocking every day, only to discover a lump of coal. But every now and then, you pull out a diamond. The latest diamond is Window Washer (the Mac version is called MacWasher), from Webroot.com, of Boulder, Colo. It's a very nifty utility that addresses two important issues that arise when you are on the Internet: privacy and disk space. Traces of where you've been on the Net can appear in your browser cache, cookies, history and Windows document menus, recycle bin and temp directories. You can dispose of it yourself, of course, but it can take some time. And you can miss something. So, if you would rather not share with a spouse your dogged pursuit of late-night studies in comparative anatomy, or with your boss your visits to employment sites, Window Washer is worth considering. And for a system shared by multiple users, it would seem to be a must. The issue of disk space might at first seem to be a non-issue. How much space can a few cookies and temp files take? It turns out that on both the home and office systems where Window Washer was tested, about 4 megabytes of space was recovered on the first run. And subsequent sessions routinely turned up saves of 50 to 100 kilobytes. The software has a few bells and whistles, including automatic timed cleanings and the ability to assign files and folders to be cleaned. For the truly paranoid, the software can ``bleach" removed files to Department of Defense standards by overwriting files with random characters up to 10 times, making the erased data unrecoverable. Installation, from a single floppy disk, was simple and smooth. The user interface is pleasant and easy to understand. If, for some reason, you tire of the product, it includes an uninstall module. Window Washer and MacWasher are available on the Web at www.webroot.com. You can download either for a free 30-day trial, after which the software just stops working. Or you can have a registered copy for $29.95, with software upgrades free for one year from date of purchase. Webroot will mail you a diskette for an additional $5 charge for shipping and handling. The Web site is nicely done and doesn't assume the user has a doctorate in electrical engineering. Window Washer wants to see 16 megabytes of RAM and 5 megabytes of hard disk space for Windows 95, 98, 2000 and NT 4.0. MacWasher wants to see Mac OS 8.0 or higher. Colleges Complain Of Software Kinks When students at Northwestern University wanted to register for winter classes last November, it was supposed to be as easy as point and click. The university was one of many that spent millions of dollars installing new software by Pleasanton, Calif.-based PeopleSoft so, among other things, students could register online instead of on campus. But as hundreds of students tried to register from their rooms, point and click turned into crash and burn. Officials at PeopleSoft, one of the world's top business management software-makers, say that the problems were to be expected, especially as large universities scrambled to ready their systems for the year 2000. =~=~=~= Atari Online News, Etc.is a weekly publication covering the entire Atari community. Reprint permission is granted, unless otherwise noted at the beginning of any article, to Atari user groups and not for profit publications only under the following terms: articles must remain unedited and include the issue number and author at the top of each article reprinted. Other reprints granted upon approval of request. Send requests to: dpj@delphi.com No issue of Atari Online News, Etc. may be included on any commercial media, nor uploaded or transmitted to any commercial online service or internet site, in whole or in part, by any agent or means, without the expressed consent or permission from the Publisher or Editor of Atari Online News, Etc. Opinions presented herein are those of the individual authors and do not necessarily reflect those of the staff, or of the publishers. All material herein is believed to be accurate at the time of publishing.