Volume 7, Issue 33 Atari Online News, Etc. August 12, 2005 Published and Copyright (c) 1999 - 2005 All Rights Reserved Atari Online News, Etc. A-ONE Online Magazine Dana P. Jacobson, Publisher/Managing Editor Joseph Mirando, Managing Editor Rob Mahlert, Associate Editor Atari Online News, Etc. Staff Dana P. Jacobson -- Editor Joe Mirando -- "People Are Talking" Michael Burkley -- "Unabashed Atariophile" Albert Dayes -- "CC: Classic Chips" Rob Mahlert -- Web site Thomas J. Andrews -- "Keeper of the Flame" With Contributions by: To subscribe to A-ONE, change e-mail addresses, or unsubscribe, log on to our website at: www.atarinews.org and click on "Subscriptions". OR subscribe to A-ONE by sending a message to: dpj@atarinews.org and your address will be added to the distribution list. To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE Please make sure that you include the same address that you used to subscribe from. To download A-ONE, set your browser bookmarks to one of the following sites: http://people.delphiforums.com/dpj/a-one.htm http://www.icwhen.com/aone/ http://a1mag.atari.org Now available: http://www.atarinews.org Visit the Atari Advantage Forum on Delphi! http://forums.delphiforums.com/atari/ =~=~=~= A-ONE #0733 08/12/05 ~ Nigerian Scammers ~ People Are Talking! ~ Students Charged! ~ New GFA Basic Editor! ~ Golden Penguin Bowl! ~ New Zview Available! ~ U.S. Recruits Hackers! ~ ID Theft Ring Found! ~ Firefox Update! ~ Blog Visitors Growing! ~ Spam Assets Seized! ~ MS Wins Spam Case! -* Columbus Atari Swapmeet Near *- -* U.S. Passes the Buck on ID Theft! *- -* Internet Scammers Keep Working in Nigeria! *- =~=~=~= ->From the Editor's Keyboard "Saying it like it is!" """""""""""""""""""""""""" I'm not usually a name-dropper, but the weather this week reminds me of that famous line in "The Wizard of OZ," lamented by that Wicked Witch of the East as she encountered a bucket of water: "I'm Melting, I'm melting...!" It has been sweltering here in the northeast this past week. The heat and humidity was simply unbearable. I don't have much on my mind to speak about this week, and this weather is not helping with brain energy! So, let's move right along and get to this week's issue. Until next time... =~=~=~= Zview BETA 6 Hi all, Zview BETA 6 is available. I'm grateful to every beta-testers and would especially like to thank Sascha Uhlig for his great work on the documentation ( which is better that the software itself :) and for the desktop icon. Well, the most important news features are: - PDF support - Godpaint read and write - Animated Gif - Zoom function Due at a G++ bug, only the FPU version are available this time :/ ZcodecLib and Zweather are also updated to match with the new codecs format. Ciao, Zorro -- Webpage: http://zorro.arcadia-crew.com Blog: http://zorro-arcadia.blogspot.com GFA-Basic Editor v1.20 Released The most important new feature in this release is the direct support for RUN! Software's new RUN!Only interpreter. The instant satisfaction you got from hitting the 'Run' button is back. Related links if you wish to download the RUN!Only interpreter. http://www.run-software.de/ http://www.run-software.de/runonly.htm Many other new features and corrections, too many to list here. Please see the documentation for both programs for details. See the URL in my signature to download the updated editor. Enjoy. -- FreeMiNT http://sparemint.atariforge.net/sparemint/ [Free your mind...] Atari Team http://setiathome.berkeley.edu/team_display.php?teamid=30472 L. Pursell http://www.bright.net/~gfabasic/ [AtarIRC, GFA-Basic, Hades060] =~=~=~= ->A-ONE User Group Notes! - Meetings, Shows, and Info! """"""""""""""""""""""" Atari Swapmeet To Be September 10 Here are details for the annual swapmeet to be held next month by the Columbus Atari club: DATE: Saturday, September 10, 2005. TIMES: 9 am to 3 pm. ADMISSION: $4. (For vendors, including table: $6.) PLACE: Oakland Park Community Building, 980 Lenore Avenue, Columbus, Ohio. MORE INFO AT: http://www.angelfire.com/oh4/acec/acec.html CONTACT: R. Wayne Arenz (rarenz at columbus dot rr dot com) =~=~=~= PEOPLE ARE TALKING compiled by Joe Mirando joe@atarinews.org Hidi ho friends and neighbors. Another week has come and gone, and Mother Nature is still feeling the need to supply the northeast with plenty of heat and humidity. Well, that's kind of to be expected this time of the year, so I'm not really complaining. For those of you who read my column last week, I did get to watch one of my other favorite movies... FORBIDDEN PLANET. If you've never seen the movie, think about renting it sometime. There's lots of good stuff throughout the movie to get you thinking, or to get you running to the computer to check on whether or not that's... "really that guy" or if Robby is really the same robot that appeared in . I've been a Sci-Fi fan for as long as I can remember. The reason I got interested in computers in the first place was Star Trek's Mr. Spock. Even back then, I realized that I'd never get to go zooming out among the stars, but computers might... just might, mind you... become a reality in my lifetime. Ten years later, there they were, and I got bitten by the bug early on. No, they weren't the thinking/speaking machines of Star Trek and various other science fiction movies or series, but they were the ember that just might burst into a flame if technology moved the way that experts estimated it would. I can remember my Computer Science professor telling us that music on a computer would never be possible because digital waveforms didn't lend themselves to natural sounding sounds. A brief diagram of a sinewave-like analog wave next to the blocky, stair-step looking 'digital' sound wave briefly convinced me that he was correct. Of course, the state-of-the-art machine at the time was an Apple ][ with a 9" monochrome monitor and cassette tape drive. Not many of us back then envisioned multi-gigahertz, multi-gigabyte broadband-enabled computers, but I guess we should have. Now, as we near the limits of what you can etch into a piece of silicon, I wonder what new twist or turn of technology will surface to keep our computers going faster and faster. Gallium Arsenide? X-Ray etching? Optical circuits? Who knows, but whatever it is, it'll make for some interesting machines. I guess all we can do is wait and see.... Unless, of course, you have the knowledge and funding to CREATE the future. In that case, just drop me an email and let me know what to invest my money in, huh? Well, let's get to the news, hints, tips and info available from the UseNet. From the comp.sys.atari.st NewsGroup ==================================== Phil Graham asks about his MegaSTE's ailing hard drive: "I own a 4mb Mega STe running 2.06 TOS. However my hard drive (a Seagate ST32155N 2.1gb) connected to the ASCI port fails to boot now. The drive was formatted with HDDriver v8.0. The drive does 'whir' up on power up but does not boot. The HDDriver software finds the ASCI device but no Hard Drive. Firstly.. is the hard drive beyond saving? Secondly is there anyway of recovering the data using a PC?" Coda tells Phil: "You didn't say which SCSI interface you're using. Maybe its this which is dead and not the drive? Have you any other SCSI devices you can put on the bus to see if they work/recognize?" Dr. Uwe Seimet, author of HD Driver, asks Phil: "It finds the device, but no drive? Can you elaborate? Do you mean that something like "ACSI 0.0" is reported, but the drive name is missing? Do I understand it correctly that this drive worked before, and even though you did not change anything regarding your hardware setup it does not work anymore? If this is the case it sounds bad. But maybe it's just a broken cable. If the device is recognized, but the name (only a few bytes) cannot be transferred a broken cable can easily cause that. I doubt that you'll be able to recover data using a PC. Actually, my experience is that it is even more difficult to recover anything with a PC because the more low level access is required the less you can do it with a PC. If a device does not report its name anymore there is something fundamentally wrong. But nevertheless it's worth a try: A PC running Linux should be able to access the TOS-compatible partitions of this drive if they can be accessed at all. Ensure that under no circumstance anything is written to this drive. If data are garbled while being transferred trying to write something will make things even worse." Phil answers: "I'm using the ACSI interface which is inside my Mega STE. When I click on Device check it says "Bus 0: Atari ACSI". But if I try Format it doesn't list any devices. The drive worked until yesterday. I then installed a new Power Supply Unit (Atari's own) into my MSTe. As I mentioned, the drive does power up ok." Uwe tells Phil: "[Since it worked recently] it simply must have something to do with changing the power supply. Either the new power supply does not work correctly or something was broken when installing it." Phil replies: "For the past 6 hrs I thought i'd lost everything!! Anyway I found the problem.... a jumper had fallen off my HD (parity disabled) whilst I was installing my PSU... dohh!" 'Phantom' takes to opportunity to post this: "While on the subject of Mega STE Internal Hard Drive, I've a few questions. I have a Mega STE TOS 2.06, 4megs High Density Floppy Drive and Internal Hard Drive using the Factory hard drive hardware. Actually, due to lack of space at the moment, I've not used it that much and is in storage. But I plan on setting it up as I move stuff around. My questions are these: Will the internal Factory Hard drive hardware support more than one SCSI hard drive, if I can make room inside the case? Using HD Driver? If so, what starting version would be ok to run it like this? (Reason I ask, my original new version of HD Driver seems to be damaged) (I've never used it or installed it before) Going to check it on another system to make sure that it isn't my floppy drive. And, can I run 2 scsi drives on the Factory hardware and also use a few more drives like another SCSI, CDROM/CDRW using a ICD Link II or a Link 97? (I have both devices.) on the DMA port? Since I have a Vortex 386SX board installed, I'd like to use it with DOS on a small SCSI on the Factory hardware. And have another SCSI drive just for TOS stuff. Possibly choosing which drive to boot from on start up if possible. If not, it isn't a big problem. I've the manual to guide me on setup. I want to experiment with Terminal Programs on the 386SX such as Net-Tamer and a few others, and since the MegaSTE has 2-3 modem ports it will be fun for me to see what I can get running on those ports. I have a CD here called (So Much Modem Madness 2) with over 6000 programs, mostly in DOS stuff. I've had it for along time and would like to see what I can find that will work. However, I have wondered if HD Driver does increase the size of the DOS Boot partition, and DOS partitions with PC hardware emulators like the Vortex 386SX and the FalconSpeed 286 board. As the boot partitions are a bit small. However, with FalconSpeed you can access fairly large partitions even Tos ones if memory serves me correctly. But I've not much experience with the 386SX Vortex yet. Another question thats probably be asked a lot, but I can't remember the answer. On A MegaSTE with Factory High Density Floppy Drive, If I connect a second floppy drive, whether it is a DS/DD or a 1.44 High Density Drive. Will the MegaSTE setup for the right drive, or do I need to change a setting in either software or inside with a switch? Can I just plug in any drive such as a 5 1/4 Floppy 720K IB Drive, DS/DD or High Density and the MegaSTE will know what's connected? (I hope this is the way it works). I know HD Driver is Good. However I have the original English MegaSTE system Disk and Atari Advanced Hard Drive software for the MegaSTE. I have heard that the internal hard drive hardware can be touchy. So should I use the Atari hard drive software thats was for the MegaSTE hard drive or go with a version of HD Driver? Another question, Is the MegaSTE limited to 19200 Baud or can one use HSMODEM7 to get better speed out of all the modem/serial ports? And if HSMODEM will work, is this only program available to gain those extra speeds? It has been awhile since I setup a good Atari from scratch. So I need a little refresher on these things. Any help is most appreciated. BTW, Any one have a very clean working MEGA STE keyboard for trade? My MSTE looks like new, but the keyboard is a bit yellowed. Contact me if ya do." Uwe tells Phantom: "No, the internal host adaptor won't handle more than one drive. You need another host adapter for this. Registered users of HD Driver of course get a free replacement by email if their binaries are damaged. You can use up to 7 devices with the Link97, but you have to ensure that the cables are short if you actually want to connect so many. The HDDRIVER manual contains information on how to boot from different partitions. With HDDRIVER the TOS (!) boot partition may be as big as any other partition, but HDDRIVER cannot lift any restrictions your PC emulation may have. There are search machines for newsgroup searches. Actually a lot of the questions asked here have been asked and answered many times in the past. The internal drive is a hard disk drive like any other. There's nothing special with it." David Moeser tells posts this about the Columbus Atari Club's annual swapmeet: " DATE: Saturday, September 10, 2005. TIMES: 9 am to 3 pm. ADMISSION: $4. (For vendors, including table: $6.) PLACE: Oakland Park Community Building, 980 Lenore Avenue, Columbus, Ohio. MORE INFO AT: http://www.angelfire.com/oh4/acec/acec.html CONTACT: R. Wayne Arenz (rarenz at columbus dot rr dot com)" Someone anonymous (let's call them 'Tia', because that's how they signed their posts... TIA. ) asks for help with a confused hard drive: "I have no idea how but my main drive (C) has become write protected. Does anyone know how I can remove this???" Edward Baiz tells Tia simply: "If you have HDDdriver you can remove it." Tia replies: "I have HDDriver 8+ but that only protects the root and boot sectors and it won't even do that because it's saying that drive C is write protected. Can't find any other setting to fix the problem. I'm on an STe with TOS 2.06 and 4mb ram." Steve Sweet tells Tia: I'd have thought there'd be a driver /ancillary application setting to fix that. Boot using a floppy based driver and look for switches." Mark Duckworth adds: "I think this can happen due to disk errors. It depends if the disk has the S.M.A.R.T stuff or not. Someone else might be able to confirm it. I know if Linux (I know, a bit higher level) detects errors it immediately remounts the filesystem read-only. What's to stop disk manufacturers from doing this low level on critical errors, in order to protect the integrity of the data." Uwe Seimet interjects: "I have never heard of drives that write protect themselves in case of an error. That does not mean that such drives do not exist, but I would expect to have heard of them." Phantom asks Tia: "Have you tried running Diamond Edge or some other good Hard Drive utility program that will look for corrupted files and fragmentation? If not, try and see if how the Data on Drive C looks. The drive may need De-Fragmented or errors corrected. Also, not sure if this has anything to do with your problem. But the Cartridge Port's default letter is Drive C. And I would think it would be write protected since its the cartridge port. Are you sure your Hard Drive C is booting up online?" Derryck Croker corrects Phantom: "If I remember correctly, that would be a lower-case "c" for the cartridge port, by the way." Jean-Luc Ceccoli asks about transfer speeds on his CT60: "On my FalCT60 100/20 MHz, with an IDE HD capable of 100 MB/s transfer rate and a CD burner capable of 7.2 MB/s, with HD-Driver 8.13, the actual transfer rate is only of 2.5 MB/s, though the rate displayed during boot is 6.3 MB/s (CT60 utility rev. 1.03a from march 2005). Is my Falcon faulty, or do they all behave the same way?" Mark Duckworth tells Jean-Luc: "I think mine does something similar to this. I tested real write operation with filesystem overhead and everything and it too was somewhere around 2.5MB/sec. Perhaps there's a bottleneck inside freemint or TOS? I'd love faster disk throughput. A real 15-20MB/sec would be a dream." Stephane Perez adds: "IMHO the bottleneck is called Videl. I have a 30 GB IDE disk (a Maxtor that was running in UDMA 66 mode in an old PC) and I made some tests on my FalconCT60 100/16 (no motherboard boost). It can reach 2.9 MB/s with Freemint when the Videl is switched off, it can easily be done with a program called Turbo Veille: you press on some keys simultaneously and the screen becomes black, giving to the 68060 (or 68030) all the machine time. Before using Turbo Veille the transfer rate was only 2.5 MB/s. You can download this program here: http://www.geocities.com/SiliconValley/Vista/6443/t_veille.zip " 'Peter' adds his own thoughts: "While the Videl certainly slows things down, the biggest (smallest?) bottleneck is the 16 bit, 16/25Mhz bus. No way around that. Have a look at the benchmarks (ST-RAM speeds) at the URL below. http://www.czuba-tech.com/CT60/english/benchs_eng.htm On top of that, the IDE communication itself adds some overhead." Robert Schaffner adds a bit of a reality check: "You will not find Falcons that do it faster. The hardware is from 1998." Janez Valant tells Robert: "It is also worth mentioning that we only need to load files 10 times smaller than "modern" machines, so it evens out." Well folks, that's it for this week. Tune in again next week, same time, same station, and be ready to listen to what they are saying when... PEOPLE ARE TALKING =~=~=~= ->In This Week's Gaming Section - GameSpot Creates Gaming Arena! """"""""""""""""""""""""""""" Gamer Dies After 50 Hours! Madden NFL 06 Out! And more! =~=~=~= ->A-ONE's Game Console Industry News - The Latest Gaming News! """""""""""""""""""""""""""""""""" Scarface Sequel To Come In Video Game Actor Al Pacino's portrayal of Tony Montana in the 1983 cult classic crime film "Scarface" that helped make him one of the world's most beloved screen gangsters will be resurrected next year for video game enthusiasts. Vancouver-based Radical Entertainment is developing a video game based on Montana's rags to riches story for its parent company Vivendi Universal dubbed "Scarface: The World is Yours" for PC, Playstation 2 and Xbox consoles. "Tony Montana has a huge following. He's become a part of popular culture. His likeness is sold by street painters, Scarface posters are everywhere, people often list the movie as among their top 10 favorites and several rappers have said that he's an inspiration (for their music)," said game producer Cam Weber. The game starts where screenwriter Oliver Stone and director Brian De Palma's remake of the original 1932 film ends - Montana, a penniless Cuban refugee who became one of the most feared drug lords in the United States, greets assassins in his Miami mansion with a big gun and the now famous line "Say hello to my little friend." But, instead of dying in a blaze of bullets, he escapes and returns several months later to kill again. Pacino lends his likeness to the game, but not his voice. Another actor "who's a dead ringer for Pacino" assumed the role of Montana in the game, Weber said. Other actors from the 1983 film, including Steven Bauer, who played Montana's sidekick Manny Ribera, Robert Loggia (played Frank Lopez) and Miriam Colon (as Mama Montana) return. The game is due out in mid-2006. EA's Madden NFL 06 Hits Store Shelves Electronic Arts announced that Madden NFL 06, the newest iteration of the EA SPORTS best-selling football franchise with the exclusive videogame license of the NFL and PLAYERS INC, is on store shelves today. Reflecting the focus on the passing game in the NFL, Madden NFL 06 has changed passing for the first time in ten years with the all-new QB Vision Control and QB Precision Placement and introduces the all new NFL Superstar mode, where you can live the life of an NFL Superstar. Madden NFL 06 continues to be at the forefront of innovation and gameplay with all new features this year. Madden NFL 2005? since the launch has sold over six million copies, and was the #1 selling sports videogame of 2005 in North America. Madden NFL 06 has already started a fan frenzy with pre-sell reservations outpacing last year?s and numerous midnight store openings around the country to ensure all fans receive their copy as early as possible. Adding to early demand is the fourth annual EA SPORTS Madden Challenge, played exclusively this year on the Xbox video game system from Microsoft, kicks off August 27th in Las Vegas with a $100,000 grand prize check for the Finals winner. Tournament runs on published dates in each city. For additional details and Tournament Official Rules see http://www.maddenchallenge.com. For the first time in 10 years, the Madden NFL Football franchise has revolutionized its passing game, giving Madden NFL 06 the most groundbreaking and innovative offensive arsenal ever created. The new QB Vision Control lets you scan the field, look off defenders, and make perfect throws within your quarterback?s unique field of vision. QB Precision Placement lets you put the ball exactly where you want it. Plus, all new Truck Stick Control delivers the big hits on offense to break tackles, pancake defenders, and clear your path to the end zone. NFL Superstar is an entirely new single-player mode allowing you to experience the life of an NFL player by earning one of more than 60 Personas ranging from MVP to Movie Star. Features include choosing your parents, hiring an agent, getting drafted into the NFL, visiting tattoo parlors, choosing different movie roles, and even getting the chance to play in the coveted EA SPORTS Madden Bowl. Madden NFL 06 is the only video game to offer fantasy capabilities featuring EA SPORTS Fantasy Football integration for the first time. You are now able to check your fantasy scores, get trade notifications and earn trophies in Madden NFL 06. This year?s game continues to have unprecedented depth and upgrades with more robust online features including sharing files via your EA Locker, allowing more online players to these files with friends or backup those crucial files you don't want erased. It is essentially an online memory card that that you can make accessible to friends. Madden NFL 06 comes to the PSP on September 20 with a unique version of the game, allowing consumers to take the biggest sports franchise ever on the go with the PSP (PlayStation Portable) entertainment system. In its 16th year and with more than 43 million copies sold, Madden NFL Football continues to stand out as the most popular football videogame franchise of all time with a combination of innovative new features and the most authentic football gameplay. Developed in Orlando, FL by EA Tiburon Madden NFL 06 is now on the PlayStation 2 computer entertainment system, the Xbox video game system from Microsoft, Nintendo GameCube, Nintendo DS, and Game Boy Advance. PC will be available August 17 and PSP launches on September 20. Madden NFL 06 is rated 'E' (Everyone) by the ESRB and has an MSRP of $49.99 for the PlayStation 2 console , Xbox, Nintendo GameCube and PSP, $39.99 for PC and Nintendo DS, $29.99 for Game Boy Advance. New Pay Service Creates Online Gaming Arena GameSpot, one of the most popular Web sites for video game enthusiasts, has started a new subscription online service where hard-core gamers can battle each other in the most popular online computer games. Dubbed a "premium gaming service," GameSpot Game Center will offer $9.99-a-month subscriptions to gamers who will be able to play at the highest speed connections in online games such as Electronic Arts' "Battlefield 2." It will offer discussion groups, voice chat services and tournaments as well. GameSpot is owned by online portal CNet Networks. The object is to create a cool gaming experience with fast game play and connections with like-minded gamers. Services like this have failed in the past, but largely because they involved spending a lot of money on computer servers. GameSpot has found a way to reduce that expense by leasing them from a third party. It remains to be seen if gamers will pay to play online games that they can play for free via the Internet. But GameCenter product manager Sam Parker says GameCenter removes a lot of the hassles from online gaming. GameCenter will allow players to host their own online games. That means it will allow them to configure a Battlefield 2 game and customize it to their tastes so that as many as 64 players can fight it out without annoying hiccups in broadband service that slow down a game and make it all but impossible to play. About 11 games are available through GameCenter now. GameCenter will be able to offer server hosting because it is leasing computing power from Super Computer International, an Atlanta Internet hosting company. GameCenter will be able to tap data centers on both the East Coast and West Coast to provide plenty of high-speed service, or bandwidth, to gamers. GameSpot already offers game-downloading services and extended news coverage of games for $6.95 a month via a service called GameSpot Complete. Those subscribers can upgrade to the GameCenter subscriptions. GameSpot has no plans to publish its own online games now. Rather, it plans to partner with game publishers who may not want to operate their own paid online-gaming services. "We can become the distribution partner for the game publishers," said Henk Van Neikerk, vice president of paid services at GameSpot. GameSpot competes with other game portals such as Ign.com, and it draws about 20 million gamers a month to its Web site. Man Dies After 50 Hours of Computer Games A South Korean man who played computer games for 50 hours almost non-stop died of heart failure minutes after finishing his mammoth session in an Internet cafe, authorities said on Tuesday. The 28-year-old man, identified only by his family name Lee, had been playing online battle simulation games at the cybercafe in the southeastern city of Taegu, police said. Lee had planted himself in front of a computer monitor to play online games on Aug. 3. He only left the spot over the next three days to go to the toilet and take brief naps on a makeshift bed, they said. "We presume the cause of death was heart failure stemming from exhaustion," a Taegu provincial police official said by telephone. Lee had recently quit his job to spend more time playing games, the daily JoongAng Ilbo reported after interviewing former work colleagues and staff at the Internet cafe. After he failed to return home, Lee's mother asked his former colleagues to find him. When they reached the cafe, Lee said he would finish the game and then go home, the paper reported. He died a few minutes later, it said. South Korea, one of the most wired countries in the world, has a large and highly developed game industry. =~=~=~= A-ONE's Headline News The Latest in Computer Technology News Compiled by: Dana P. Jacobson Internet Scammers Keep Working in Nigeria In Festac Town, an entire community of scammers overnights on the Internet. By day they flaunt their smart clothes and cars and hang around the Internet cafes, trading stories about successful cons and near misses, and hatching new plots. Festac Town is where communication specialists operating underground sell foreign telephone lines over which a scammer can purport to be calling from any city in the world. Here lurk master forgers and purveyors of such software as "e-mail extractors," which can harvest e-mail addresses by the million. Now, however, a 3-year-old crackdown is yielding results, Nigerian authorities say. Nuhu Ribadu, head of the Economic and Financial Crimes Commission, says cash and assets worth more than $700 million were recovered from suspects between May 2003 and June 2004. More than 500 suspects have been arrested, more than 100 cases are before the courts and 500 others are under investigation, he said. The agency won its first big court victory in May when Mike Amadi was sentenced to 16 years in prison for setting up a Web site that offered juicy but phoney procurement contracts. Amadi cheekily posed as Ribadu himself and used the agency's name. He was caught by an undercover agent posing as an Italian businessman. This month the biggest international scam of all - though not one involving the Internet - ended in court convictions. Amaka Anajemba was sentenced to 2 1/2 years in prison and ordered to return $25.5 million of the $242 million she helped to steal from a Brazilian bank. The trial of four co-defendants is to start in September. Day in, day out, a strapping, amiable 24-year-old who calls himself Kele B. heads to an Internet cafe, hunkers down at a computer and casts his net upon the cyber-waters. Blithely oblivious to signs on the walls and desks warning of the penalties for Internet fraud, he has sent out tens of thousands of e-mails telling recipients they have won about $6.4 million in a bogus British government "Internet lottery." "Congratulation! You Are Our Lucky Winner!" it says. So far, Kele says, he has had only one response. But he claims it paid off handsomely. An American took the bait, he says, and coughed up "fees" and "taxes" of more than $5,000, never to hear from Kele again. Festac Town, a district of Lagos where the scammers ply their schemes, has become notorious for "419 scams," named for the section of the Nigerian penal code that outlaws them. Why Nigeria? There are many theories. The nation of 130 million, Africa's most populous, is well educated, and English, the lingua franca of the scam industry, is the official language. Nigeria bursts with talent, from former NBA star Hakeem Olajuwon to Nobel literature laureate Wole Soyinka. But with World Bank studies showing a quarter of urban college graduates are unemployed, crime offers tempting career opportunities - in drug dealing, immigrant-trafficking, oil-smuggling, and Internet fraud. The scammers thrived during oil-rich Nigeria's 15 years of brutal and corrupt military rule, and democracy was restored only six years ago. "We reached a point when law enforcement and regulatory agencies seemed nonexistent. But the stance of the present administration has started changing that," said Ribadu, the scam-busting chief. President Olusegun Obasanjo is winning U.S. praise for his crackdown. Interpol, the FBI and other Western law enforcement agencies have stepped in to help, says police spokesman Emmanuel Ighodalo, and Nigerian police have received equipment and Western training in combating Internet crime and money-laundering. Experts say Nigerian scams continue to flood e-mail systems, though many are being blocked by spam filters that get smarter and more aggressive. America Online Inc. Nicholas Graham says Nigerian messages lack the telltale signs of other spam - such as embedded Web links - but its filters are able to be alert to suspect mail coming from a specific range of Internet addresses. Also, the scams have a limited shelf life. In the con that Internet users are probably most familiar with, the e-mailer poses as a corrupt official looking for help in smuggling a fortune to a foreign bank account. E-mail or fax recipients are told that if they provide their banking and personal details and deposit certain sums of money, they'll get a cut of the loot. But there are other scams, like the fake lotteries. Kele B., who won't give his surname, says he couldn't find work after finishing high school in 2000 in the southeastern city of Owerri, so he drifted with friends to Lagos, where he tried his hand at boxing. Then he discovered the Web. Now he spends his mornings in Internet cafes on secondhand computers with aged screens, waiting "to see if my trap caught something," he says. Elekwa, a chubby-faced 28-year-old who also keeps his surname to himself, shows up in Festac Town driving a Lexus and telling how he was jobless for two years despite having a diploma in computer science. His break came four years ago when the chief of a fraud gang saw him solve what seemed like "a complex computer problem" at a business center in the southeastern city of Umuahia and lured him to Lagos. He won't talk about his scams, only about their fruits: "Now I have three cars, I have two houses and I'm not looking for a job anymore." U.S. Passes the Buck on Identity Theft One year ago, President George W. Bush signed into law the Identity Theft Penalty Enhancement Act in response to the growing proliferation of Internet scams, such as phishing, pharming and other ploys aimed at stealing consumers' private information electronically. One year later, however, the evidence suggests that this new law has done nothing to reduce identity theft or fraud. Rather, the number of publicly known identity theft cases has increased dramatically over the past year. Since January of 2005, there have been over 63 data-security breaches exposing nearly 50 million identities. And there will be more, according to industry insiders. ChoicePoint, LexisNexis, Wells Fargo, Bank of America and CardSystems are just a few examples of recent security breaches that led to the loss of sensitive consumer information. Some security experts - albeit mostly in the software industry - believe that laws such as the Identity Theft Penalty Enhancement Act and the CAN-SPAM Act of 2003 have proven to be ineffective in the fight against Internet crime. Instead, they say companies must take responsibility for implementing new protective technologies that address these vulnerabilities head on. Others argue that the federal government has to fix what does not yet work in its ID theft legislation. The Identity Theft Penalty Enhancement Act (ITPEA) establishes penalties for identity theft committed in connection with the commission of a felony. From a legal standpoint, the new law merely updates existing penalties and brings identity theft into the electronic age. Perhaps its most stringent scare tactic is to prescribe a two-year jail term for anyone convicted of using somebody else's identity in connection with a felony. In essence, it doubled the incarceration penalty. The law connects identity theft to violations of various sections of the Social Security Act and the false acquisition of others' Social Security and veterans' benefits. The law also makes it more difficult for judges to issue more lenient penalties. Because some courts do not consider the totals from all counts for the purpose of imposing sentences, the change in the new law results in longer prison sentences by those courts. Also, the law prevents judges from placing any person convicted of such a violation on probation. According to Marc Hubbard of the Texas law firm of Munsch Hardt Kopf & Harr, the ITPEA and the CAN-SPAM Act were primarily intended to make for easier prosecution and punishment of the perpetrators, once caught. "But no law will deter all bad acts, and this one is not likely to have much deterrent effect, given that many of the perpetrators are outside the U.S.," Hubbard wrote in an e-mail exchange. "It may take prosecution of a number of cases before any deterrent effect within the U.S. kicks in." R. "Doc" Vaidhyanathan, vice president of product marketing and corporate development for security firm Arcot Systems, does not see much impact coming from the new federal laws. He wants to see more effort made by government to make it easier for law enforcement officials to get convictions. "From what we can see, things aren't changing a lot," said Vaidhyanathan. "On one had we see an increase in the reporting of losses from ID scams. In reality, the higher numbers might just reflect better monitoring." Kris Lovejoy, the CTO of Consul Risk Management, also does not see much good coming from the one-year-old federal law. It lacks both provisions for funding and the creation of standards to regulate what happens with electronic data. "Statistics are not yet released from the Federal Trade Commission (FTC). But I have to assume the ID theft trend is increasing," said Lovejoy. She sees part of the problem falling on the logistics of law enforcement. Because most offenders are prosecuted on the state levels, the new federal law has not yet had a chance to get results. To change that, Lovejoy wants to see the federal government get more proactive. "Both the federal government and private industry need to do more," she said. Some in the computing industry think that the new federal legislation is reaping benefits even if it isn't curtailing identity theft. For instance, the law is prompting a greater awareness about identity-theft safety in consumers. "It carries a sense of safety with it," said Terrence DeFranco, CEO of Edentify, a company that offers software products that screen databases for names that are at high risk for being incidences of identity fraud. "No one wants to deliberately place personal information at risk." Still, DeFranco does not see much change coming from the year-old law. He believes that education and increased safety measures by consumers will make more of a difference in cutting down on identity theft than ITPEA will. That legislation does not address the nature of today's data, said DeFranco. Information handling has changed over the last decade. Ten years ago, even the news media had trouble getting public records. Now, reporters and consumers can find everything they want to know about anybody on the Internet. "Personal information gets into the public domain very quickly. We get nearly instant credit applications," DeFranco said about how easily consumers' personal information is shared. According to Arco's President and CEO, Ram Varadarajan, the federal identity theft law is not effective because it only addresses one part of the problem and identity theft can take many forms. Friendly theft, for instance, refers to theft by family and associates. For example, an ex-spouse or partner can use known information to execute financial transactions. The defrauded person is not likely to press charges in these cases, and increasing the penalty makes it even less likely that charges would be filed. Lost data is another type of identity theft that is not always clear cut. For example, a list of credit card numbers, by itself, is not a big security risk. It is only when these numbers are combined with other personal information - like date of birth, home phone number and other such "permanent" information - that the loss becomes significant. The law does not penalize an organization that lost the data, only the fraudsters who use the data. A final category, which some call malicious theft, is the only one targeted by the existing laws. Malicious theft pertains to phishers and fraudsters who circulate viruses and Trojan programs that are designed to extract consumers' personal information and transmit it to the fraudster. Critics of the federal legislation cite its largely unenforceable nature as the primary reason it will not work. The higher penalty is of little value, they say, if the identity thief cannot be caught. These malicious thefts often are committed by faceless criminals who are well hidden and distributed worldwide, said Varadarajan. As such, there is no one single corporate entity that prosecutors can go after. Instead, prosecutors have to chase a trail of false-name fronts and sift through large volumes of data to track individuals who are involved in this kind of crime. The effort required to deliver the level of proof necessary for a conviction is large, burdensome and often beyond the ability of law enforcement teams working with limited budgets. "In this light, those committing phishing, virus, Trojan and other forms of malicious attack programs operate knowing that there is a very low probability of being caught and even a lower probability of being found guilty," Varadarajan said. "As such, increasing the penalty in this context does not help. Laws should help increase the probability of being convicted in the first place." Attorney Hubbard believes that legislators have to write laws that hold information handlers more accountable. Obviously, the law is not a substitute but is rather a complement to effective technical measures, caution and common sense by consumers, he said. The next step, from a legal point of view, might be laws directed at increasing the liability of those who fail to implement available technical countermeasures. "Businesses very likely would strongly oppose any shifting responsibility to them," said Hubbard. "The mere possibility of such laws may, however, embolden them to make more radical changes in their payment systems." What Hubbard alludes to is new federal-level laws patterned after California's mandatory disclosure and notification act. That law, one of the toughest in the nation, requires companies whose consumer data is stolen to notify consumers of the potential identity theft. Consul Risk Management's Lovejoy wants to see things go even a bit further. She wants tougher state laws along with a hardened federal approach. "If we take the concept of ITPEA, which is too lenient anyway, and apply it on the state level, we may have some effect on those who commit identity thefts," said Lovejoy. On the other hand, Edentify's DeFranco says the approach pushed by Lovejoy and others is vilifying the wrong people. He firmly believes that companies handling consumer data do not deliberately let their guard down to have consumer information stolen. "The bad guy is the one doing the crime, not the company that has the information stolen," DeFranco said. Students Charged With Computer Trespass They're being called the Kutztown 13 - a group of high schoolers charged with felonies for bypassing security with school-issued laptops, downloading forbidden Internet goodies and using monitoring software to spy on district administrators. The students, their families and outraged supporters say authorities are overreacting, punishing the kids not for any heinous behavior - no malicious acts are alleged - but rather because they outsmarted the district's technology workers. The Kutztown Area School District begs to differ. It says it reported the students to police only after detentions, suspensions and other punishments failed to deter them from breaking school rules governing computer usage. In Pennsylvania alone, more than a dozen school districts have reported student misuse of computers to police, and in some cases students have been expelled, according to Jeffrey Tucker, a lawyer for the district. The students "fully knew it was wrong and they kept doing it," Tucker said. "Parents thought we should reward them for being creative. We don't accept that." A hearing is set for Aug. 24 in Berks County juvenile court, where the 13 have been charged with computer trespass, an offense state law defines as altering computer data, programs or software without permission. The youths could face a wide range of sanctions, including juvenile detention, probation and community service. As school districts across the nation struggle to keep networks secure from mischievous students who are often more adept at computers than their elders, technology professionals say the case offers multiple lessons. School districts often don't secure their computer networks well and students need to be better taught right from wrong on such networks, said Internet expert Jean Armour Polly, author of "Net-mom's Internet Kids & Family Yellow Pages." "The kids basically stumbled through an open rabbit hole and found Wonderland," Polly, a library technology administrator, said of the Kutztown 13. The trouble began last fall after the district issued some 600 Apple iBook laptops to every student at the high school about 50 miles northwest of Philadelphia. The computers were loaded with a filtering program that limited Internet access. They also had software that let administrators see what students were viewing on their screens. But those barriers proved easily surmountable: The administrative password that allowed students to reconfigure computers and obtain unrestricted Internet access was easy to obtain. A shortened version of the school's street address, the password was taped to the backs of the computers. The password got passed around and students began downloading such forbidden programs as the popular iChat instant-messaging tool. At least one student viewed pornography. Some students also turned off the remote monitoring function and turned the tables on their elders_ using it to view administrators' own computer screens. The administrative password on some laptops was subsequently changed but some students got hold of that one, too, and decrypted it with a password-cracking program they found on the Internet. "This does not surprise me at all," said Pradeep Khosla, dean of Carnegie Mellon University's engineering department and director of the school's cybersecurity program. IT staff at schools are often poorly trained, making it easy for students with even modest computer skills to get around security, he said. Fifteen-year-old John Shrawder, one of the Kutztown 13, complained that the charges don't fit the offense. He fears a felony conviction could hurt his college and job prospects. "There are a lot of adults who go 10 miles over the speed limit or don't come to a complete stop at a stop sign. They know it's not right, but they expect a fine" not a felony offense, he said. Shrawder's uncle, James Shrawder, has set up a Web site that tells the students' side of the story. "As parents, we don't want our kid breaking in to the Defense Department or stealing credit card numbers," said the elder Shrawder, a businessman. "But downloading iChat and chatting with their friends? They are not hurting anybody. They're just curious." The site, http://www.cutusabreak.org, has been visited tens of thousands of times and sells T-shirts and bumper stickers, including one that says: "Arrest me, I know the password!" The district isn't backing down, however. It points out that students and parents were required to sign a code of conduct and acceptable use policy, which contained warnings of legal action. The 13 students charged violated that policy, said Kutztown Police Chief Theodore Cole, insisting the school district had exhausted all options short of expulsion before seeking the charges. Cole said, however, that there is no evidence the students attacked or disabled the school's computer network, altered grades or did anything else that could be deemed malicious. An association of professional computer educators, The International Society for Technology in Education, believes in a less restrictive approach to computer usage. The more security barriers a district puts in place, the more students will be tempted to break them down, it believes. "No matter how many ways you can think to protect something, the truth is that someone can hack their way around it," said Leslie Conery, the society's deputy CEO. "The gauntlet is thrown down if you have tighter control." Spyware Researchers Discover ID Theft Ring Spyware researchers picking apart one of the more notorious spyware programs have stumbled upon what appears to be a massive identity theft ring hijacking confidential data from millions of infected computers. Sunbelt Software Inc., makers of the enterprise-grade CounterSpy spyware protection product, made the discovery during an audit of "CoolWebSearch," a program that routinely hijacks Web searchers, browser home pages and other Internet Explorer settings. During the research, Sunbelt researcher Patrick Jordan deliberately installed the "CoolWebSearch application on a machine and immediately noticed that the infected system became a spam zombie that was placing callbacks to a remote server. When Jordan visited the remote server, he was shocked to find that it was being used to distribute sensitive personal information from millions of PC users infected by the spyware application. "We found the keylogger transcript files that are being uploaded to the servers. We're talking real spyware stuff-chat sessions, usernames, passwords, bank account information, full names, addresses," said Sunbelt president Alex Eckelberry. Read more here about the many faces of spyware. In an interview with Ziff Davis Internet News, Eckelberry said the sophistication of the operation suggests it's the work of a "massive identity theft ring" that used keystroke loggers to grab confidential information that could be used to create fake online identities. "I'm not being dramatic. This is the most repulsive thing I've ever seen. It's very painful to see what's in these log files that are being uploaded in real time. We're seeing a lot of bank information and usernames and passwords to get in," Eckelberry said. He said the log files included logins to one business bank account with more than $350,000 and another small company in California with over $11,000, readily accessible. "There are lots of eBay account information and names and addresses of the people owning those accounts. Names, passwords, all matched up," Eckelberry added. He said the server, which is hosted out of a data center in Texas, was effectively a "massive repository of stolen data" that was being replenished in real time. "As the [log] file gets to a certain size, it gets taken down and a new file starts generating. This goes on nonstop. We've been watching it for a few days while trying to get to the FBI, and it just keeps growing and growing." While the site is being hosted in the United States, Eckelberry said the domain name is registered to an offshore company. Eckelberry said the huge size of the log files is a clear indication that thousands of machines are pinging back daily. In some cases, where users appeared to be at immediate risk of losing a considerable amount of money, Sunbelt has contacted the affected individuals. Eckelberry said the "CoolWebSearch" payload included a typical adware download that immediately scanned the infected machine for e-mails to use for spam runs. It then sets up a "very intelligent keylogger" that looks for very specific information. "This won't get caught by a typical anti-spyware application," he said, noting that the keystroke logger was able to pick up identity-related data for delivery to the remote server. Microsoft Receives $7 Million in Spam Settlement Microsoft Corp. has won a $7 million settlement from a man once billed as one of the world's most prolific spammers. The software maker heralded the deal as a coup in the ongoing fight against unsolicited commercial e-mails, known as spam. Microsoft said the money from Scott Richter and his company, OptInRealBig.com, will be used to boost efforts to combat spam and other computer misuse. "People engage in spam to make money," Brad Smith, Microsoft's chief counsel, told The Associated Press on Tuesday. "We have now proven that we can take one of the most profitable spammers in the world and separate him from his money. And I think that sends a powerful message to other people who might be tempted to engage in illegal spam." The deal is the second stemming from joint lawsuits Microsoft and New York state Attorney General Eliot Spitzer filed in December 2003 after Microsoft set "spam traps" that netted some 8,000 messages containing 40,000 fraudulent statements. The lawsuits sought as much as $20 million in fines against members of a sprawling spam ring. In the settlement announced Tuesday, Richter and his company agreed to comply with federal and state laws, including CAN-SPAM, the federal Controlling the Assault of Non-Solicited Pornography and Marketing Act. He pledged not to send spam to anyone who has not confirmed a willingness to receive it. He also agreed to let authorities monitor the business for three years to make sure it does not send any illegal spam. Attorneys for Richter and OptInRealBig.com, an Internet marketing company based in Westminster, Colo., did not immediately return calls for comment. In a statement released by Microsoft, Richter said he has changed the way he does business. "In response to Microsoft's and the New York attorney general's lawsuits, we made significant changes to OptInRealBig.com's e-mailing practices and have paid a heavy price. I am committed to sending e-mail only to those who have requested it and to complying fully with all federal and state anti-spam laws." Richter was once ranked as the world's third-most prolific spammer. Microsoft said his business sent an estimated 38 million spam messages a year. Richter and OptInRealBig.com denied allegations they sent misleading e-mails using forged sender names, false subject lines, fake server names and Internet domain names and addresses registered using pseudonyms and aliases. However, in a separate settlement announced last month, Richter and OptInRealBig.com agreed to pay New York State $50,000 in penalties and investigative costs and to use proper identifying information when registering Internet domain names. Last month, Richter was removed from the Register of Known Spam Operators maintained by the Spamhaus Project, an anti-spam and consumer advocacy group. Since then, Smith said Spamhaus has reported "a massive drop in spam levels." Stephen Kline, Spitzer's assistant attorney general who handled the case, hailed the settlements as "a step in the right direction." "Will there be others who step in and take some of the business he was doing? Sure," Kline said. "But no one is stepping in that had quite the volume he did." Tuesday's settlement is conditional on the dismissal of bankruptcy petitions Richter and OptInRealBig.com have pending in U.S. Bankruptcy Court in Denver. Microsoft has filed more than 135 anti-spam lawsuits worldwide in recent years, about 100 of them in the United States. All told, the company said it has won $838 million in judgments against spammers. AOL, MSN Seize Spam Assets America Online and Microsoft are hitting spammers where it hurts most: They are confiscating their assets and giving them away. AOL, the world's largest Internet service provider, is awarding $20,000 in gold bars, a 2003 Hummer H2 and $75,000 in cash it seized from a major spammer as part of a legal settlement last year. It will hold a sweepstakes on its Web site starting Wednesday. Meanwhile, Microsoft on Tuesday said Scott Richter, once considered one of the world's top spammers, and his company, OptInRealBig.com, agreed to pay $7 million under a legal settlement. Microsoft is donating $1 million to a New York program to provide computer gear to community centers. It will spend $5 million more on anti-spam efforts. "We think it's justice," says Curtis Lu, AOL deputy general counsel. "We're taking the ill-gotten bounty these spammers have earned off the backs of our customers and handing it back to customers." The unusual actions illustrate how far AOL and Microsoft are willing to go to discourage spammers, who for years have hounded popular Internet services with unwanted commercial e-mail, and to appease harried users. The largest spammers charge clients up to $50,000 a month to e-mail ads. It is the second time AOL has given away assets accumulated by spammers. Last year, AOL awarded a $45,000 Porsche Boxster. This year's drawing signifies the effectiveness of the federal Can-Spam Act, Lu says. AOL collected the gold, truck and cash after suing a spammer under the stricter law last year. The lawsuit was one of a dozen AOL filed since the law went into effect Jan. 1, 2004. It "has struck fear into spammers," Lu says. The flurry of recent lawsuits has made an appreciable dent in the spam pouring into AOL's and Microsoft's online services, the companies say. Spam is down 85% at AOL, based on member complaints. Still, spam remains a thorny issue for U.S. consumers and businesses despite high-profile legislation and lawsuits. About 72% of e-mail is spam, up from 68% a year ago, says IronPort Systems, an e-mail security vendor. It says many spammers are shifting targets, from AOL and MSN to businesses and broadband users with less security and fewer legal resources. Some spammers are adding viruses to steal personal data, computer-security experts say. "We shouldn't declare victory, but we are turning the tide," says Brad Smith, Microsoft general counsel. Steve Richter, Scott's father and attorney, said his son has agreed to comply with the federal anti-spam law, and his company is "making every effort to be a model for the best Internet marketing practices." US Officials Go To Hackers' Convention To Recruit Attention hackers: Uncle Sam wants you. As scam artists, organized-crime rings and other miscreants find a home on the Internet, top federal officials are trolling hacker conferences to scout talent and talk up the glories of a career on the front lines of the information wars. "If you want to work on cutting-edge problems, if you want to be part of the truly great issues of our time ... we invite you to work with us," Assistant Secretary of Defense Linton Wells told hackers at a recent conference in Las Vegas. Wells and other "feds" didn't exactly blend in at Defcon, an annual gathering of computer-security experts and teen-age troublemakers that celebrates the cutting edge of security research. The buttoned-down world of Washington seems a continent away at Defcon, which was named as a spoof on the Pentagon's code for military readiness derived from "defense condition." Graffiti covers the bathroom walls, DJs spin electronic music by the pool until dawn and hackers who "out" undercover government employees win free T-shirts. At a "Meet the Feds" panel designed to bridge the cultural divide, a young man waved a pages-long manifesto and demanded, "I would like to know why the federal government, especially some of the law enforcement agencies, are destroying this country." Despite appearances, hackers and the government have long enjoyed a symbiotic relationship. Federal research dollars funded development of the Internet and many other cutting-edge technologies, and many hackers first learn the ins and outs of computer security through military service before moving on to private-sector jobs. College students in computer-security programs can have their tuition picked up by the government if they agree to work there when they graduate. The Pentagon is rumored to employ hackers to attack foreign networks. A Pentagon spokesman was not available for comment. Feds have been a key part of the Defcon audience since its inception in 1992, though they are required to stay at off-site hotels to avoid some of the wilder goings-on. Along with recruiting, the conference gives federal officials a chance to develop sources and keep up with new research. "I'm learning while I'm here but I'm also getting the names of people I can maybe call on later so we have a better understanding as cases go along," said Don Blumenthal, who oversees the Internet lab for investigators at the Federal Trade Commission. Tensions between feds and hackers ran high in 2001 when the FBI arrested Russian programmer Dmitri Skylarov at the conference for writing a program that could break copy protection on electronic books. The relationship between the two sides has turned less adversarial in recent years, according to long-time attendees, and government employees now account for nearly half of the audience. Some Defcon staffers even hold down day jobs with the National Security Agency and other government shops. "You can't be deceived by the uniforms," said technology commentator Richard Thieme. "I talked at the Pentagon, and one-third of the people in the audience I already knew from Defcon." That's not to say that Defcon has gone straight. The ability to break into computer systems is prized above all, and conference attendees whose computers fell prey to their colleagues' attacks are displayed on a "wall of sheep." Some hackers spent the weekend in their hotel rooms cooking up a new way to take control of the Cisco Systems Inc. routers that underpin much of the Internet. Many defend this "black hat" approach, arguing that attacks that cause damage in the short term raise awareness of online threats and thus improve the security picture as a whole. Lynn and other feds made clear that they are not interested in working with those who break into computer systems without permission. "We're looking for people who haven't crossed that line yet," said Jim Christy, director of the Pentagon's Cyber Crime Institute. "You've got to get folks with the right morals." The FTC's Blumenthal said that while he was impressed with the honesty of the people he had met, he would double-check the information he receives from them as he does with other sources. "I have to feel confident that what I'm getting is a straight story," he said. "I find out if I have a curve thrown at me." Techies Face Off at Golden Penguin Bowl Pencil pushers and programmers from Microsoft Corp. and Google Inc. faced off this week for the greatest of geek glories: the Golden Penguin Bowl. Techies from both companies - rivals in the emerging search engine wars - matched wits Tuesday over questions about everything from old computer operating systems to the name of the mining spacecraft in the movie "Alien." The quiz competition's announcer dubbed the matchup a battle of "good versus evil," alluding to Google's famous creed of avoiding evil deeds. But officially, this was a battle of Microsoft employees comprising the "Nerd" team against Google's "Geek" squad. Microsoft's Rob Curran provided a wealth of science fiction knowledge, buzzing in quickly to answer questions about the TV series "Star Trek" and correctly naming the ore mining ship from "Alien" - the Nostromo. Curran took the stage wearing full Darth Vader regalia, while his teammates donned Stormtrooper costumes. But the Microsoft team bumbled the year their employer released Windows 1.0 (1985). Google's team correctly answered that the "Debian" Linux distribution was named after Ian Murdock and his then-girlfriend Debra. Buzzers went silent, though, after a question about science reality. What was NASA's name for the mission designed to explore the comet Tempel 1? (Correct answer: Deep Impact.) For the record, Google won the contest. The event took place at the LinuxWorld Conference & Expo, which focuses on the Linux operating system and open source software solutions. Get Ready for Firefox 1.5 The next version of the popular Firefox Web browser has undergone a name change to 1.5 and will be released for beta testing in September. The Mozilla Foundation plans to release the full version by the end of this year. Some analysts credit the growing popularity of the Firefox browser with Microsoft's move to speed up the deployment of its long-overdue upgrade of Internet Explorer. Industry experts say Firefox has siphoned off about 10 percent of Internet Explorer's market share. Various posts on Mozilla's Web site report that the decision to jump to version 1.5 from the current version of Firefox, now at 1.0.6, resulted from an unrealistic time frame associated with shipping the next update, originally planned for August. According to Mozilla Europe President Tristan Nitot, the next major version of Firefox will contain more new features than the organization originally estimated. "What we have been doing is better than initially planned, so instead of calling it 1.1, we think it deserves the name of 1.5," he wrote. Nitot said the organization has tweaked Firefox's core programming over the past 16 months. Simply issuing a version update named Firefox 1.1 would be misleading to product users, he explained. The new features planned for Firefox 1.5 include better overall functionality and an improved extensions system. Firefox uses extensions - free add-on programs contributed by third-parties - to add customized features to the Web browser. A major new feature in Firefox 1.5 is support for Scalable Vector Graphics (SVG), a specification for rendering two-dimensional graphics in browser interfaces. SVG works much like Macromedia's proprietary Flash technology but is an open standard. Much of the popularity of Firefox has been because of consumers. Businesses have been slow to adopt the alternative browser because of worries about compatibility issues. "Firefox is not making a big impact yet in the corporate world," said Nate L. Root, vice president and research director of customer service for Forrester Research. But Root noted that recent moves by Mozilla developers to form a for-profit corporation will bring Firefox one step closer to being something CIOs can consider. "Right now it is largely viewed as an experimental product - and rightly so - and is not yet ready for prime time," said Root. Yahoo Buys Into Chinese Online Company Yahoo Inc. is paying $1 billion in cash for a 40 percent stake in China's biggest online commerce firm, Alibaba.com, strengthening the ties that international companies are forging in the world's second-largest Internet market. Yahoo said it will merge its China subsidiaries into Alibaba as part of Thursday's deal, the biggest in a flurry of investments by foreign Internet firms eager for access to China's soaring number of Web users, now pegged at 100 million. "This is Yahoo getting much bigger in China," Daniel Rosensweig, Yahoo's chief operating officer, said at a news conference in Beijing with Alibaba founder Jack Ma. Alibaba runs a Web site that matches foreign buyers with Chinese wholesale suppliers, plus the popular consumer auction site Taobao.com, which competes with the Chinese subsidiary run by eBay Inc., the world's top online auction company. Rosensweig said the alliance creates an entity with assets to compete across the full range of Internet businesses - online commerce, e-mail and search engines. He expects China to become the world's biggest Internet market within five years. The deal extends Sunnyvale, Calif.-based Yahoo's strategy of breaking into Asian markets by connecting with strong local partners. Yahoo and its Asian partners are now major forces in online auctions in China, Japan, Taiwan and Hong Kong, said Porter Erisman, Alibaba's vice president for international relations. "This is really probably the knockout blow for eBay in China," he said. "This is going to make it hard for eBay to win in Asia." EBay, which bought the Chinese auction portal Eachnet for $180 million in 2003, rejected suggestions that the Yahoo-Alibaba tie-up was a threat. EBay's share of China's auction market is 65 percent, according to Shanghai iResearch. TaoBao had 29 percent in 2004. "It's business as usual for us," said eBay spokesman Hani Durzy in San Jose, Calif. That sounded like careful posturing to Hoefer and Arnett analyst Martin Pyykkonen. He noted that eBay CEO Meg Whitman has predicted that China will become the company's biggest market in five years, so the Yahoo-Alibaba alliance signifies "more than just a casual threat," he said. China is expected to be a significant profit center for eBay this year or next, but eBay needs to start capitalizing on its investments in the country in 2007 and 2008 to propel earnings growth, he said. EBay is expected to invest about $100 million in China this year, Pyykkonen estimated. The new Yahoo-Alibaba combination will include 3721.com, a Chinese-language search engine that Yahoo acquired last year for $120 million. That will put it in competition with China's most popular search engine, Baidu.com, whose initial stock offering in the United States last week set off a buying frenzy. Its share price soared more than 350 percent in its first day of trading before declining this week. And the second-most popular Chinese search site is operated by a familiar rival, Google Inc. Google ramped up its China operations this week by authorizing three Chinese companies as resellers of advertisements for its China site. Google also owns 2.6 percent of Baidu. The Chinese government says the country has 103 million people online, second only to the United States. But online commerce is still small, held back by low consumer spending in a country where urban incomes average just $1,000 a year. Consumer-to-consumer online auctions in China totaled about $500 million last year, while business-to-consumer sales were about $1 billion, according to Joe Tsai, Alibaba's chief financial officer. He said only about 4 million people in China have used online commerce. But Tsai said online sales are expected to grow 80 percent annually over the next three years. With its 40 percent stake valued at $1 billion, Yahoo clearly expects huge growth from Alibaba, whose revenue was $68 million last year. Advertisers and companies pay $5,000 to $10,000 per year for membership in its commercial online auction service. It does not charge fees for individual auction listings as eBay does. Yahoo said its investment will make it the biggest shareholder in Alibaba, which has 2,300 employees and is based in the eastern Chinese city of Hangzhou, southwest of Shanghai. Yahoo will have 35 percent voting rights. The new entity will have a four-member board led by Ma as chairman, with a second seat held by Alibaba and the others held by Yahoo co-founder Jerry Yang and a representative of Softbank Corp., the Japanese firm that is a big Yahoo shareholder. Pykkonnen called that a departure for Yahoo and CEO Terry Semel, because the company usually takes control of a partner's operations when it spends this kind of money. The arrangement could lead to some friction, he predicted. "Ma has a reputation for being a bit of a cowboy," Pykkonnen said. "Terry Semel won't be able to rein him in as easily." Alfred Tolle, head of Internet rival Lycos Inc., which recently opened an office in Shanghai and launched a social networking site in China, said he believes Yahoo overpaid for a 40 percent stake. Tolle said he isn't interested in making an acquisition in the country, and added that the recent fascination with Chinese Internet companies reminds him of the dot-com boom in the United States a few years ago. "It's getting a little overheated in China," he said, "a bit like 1999 or 2000." GPL Upgrade Due in 2007 The planned upgrade to the GNU General Public License (GPL) will be ready by 2007, according to an industry official involved with the project. Presenting at the LinuxWorld conference on Wednesday, Eben Moglen, president and executive director of the Software Freedom Law Center and a key participant in the planned Version 3.0 of GPL, cited issues expected to be covered in the upgrade. These include resolving patent conflicts, accommodating Web services, and resolving incompatibilities with other licenses. Dealing with wikis in the GPL also has been pondered. The Free Software Foundation, which has jurisdiction over the GPL, seeks compatibility with the Apache Software license, said Moglen, who serves on the foundation's board of directors. "We will take some steps to increase the compatibility of the GPL with some non-GPL licenses whenever possible, without adversely affecting freedom," Moglen said. Lately, companies such as Sun Microsystems, with its Common Development and Distribution License (CDDL), have developed their own brands of open source licenses. Moglen did not mince words when speaking on what the foundation thinks about patents. "Its position is that the application of patent law to software is dangerous and unproductive," he said. "All we're saying is the disastrous, 15-year American experiment with patenting software ought to be terminated." Patent conflicts have clouded open source development, with developers and others fearing that the open source code they distribute may unknowingly be subject to someone else's patent and attendant royalties. "Everybody understands the patent problem is deeply serious," Moglen said. Version 3.0 is not about fixing or repairing the GPL but bringing it up to date after a long life for GPL 2, he added. "We have been using GPL 2 for quite a while and 15 years is probably long enough. It's about time for a change." However, he also stressed, "we will do nothing [to change the GPL] that we have not studied exhaustively." Foundation president Richard Stallman will ultimately make judgments on what transpires with the new GPL, Moglen said.A A draft of GPL 3.0 is expected in late-2005 or early-2006, followed by a full calendar year of discussions, revisions, and other input, Moglen said. The move to the new GPL will likely take place in the first few days of 2007. Some 150,000 individuals around the world are expected to comment, with Version 3.0 expected to be the largest, non-governmental act of legislation in the history of the world. A global conference on translation of the GPL is likely to be held in Europe, with possibly a follow-up event to occur in Asia. The upgrade of the GPL will be international and involve advisory committees. Moglen expects deliberations to be civil, with no flame wars likely. He also anticipates that users will quickly migrate to Version 3.0. "When this process is over, I think the number of Version 2 holdouts is going to be infinitesimal," he said. Changes are also likely with the GPL sister license, the GNU LGPL (Lesser GPL). Also at LinuxWorld on Wednesday, IBM Senior Vice President Steve Mills stressed the desktop as the next frontier for Linux. Having had vast success in server environments, the Linux client environment is "the next frontier," Mills said. Canada-based Pioneer Petroleums has been leveraging Linux on the client, using Linux from Red Hat and IBM's Workplace messaging software, according to IBM. The Linux desktop market will have a compound annual growth rate of 37 percent from 2003 to 2007, based on research that Mills presented. Nearly A Third Of Online Americans Have Visited Blogs The number of people in the United States who visited web logs in the first quarter of the year reached 50 million, and each of the top four hosting services for blogs on the Internet topped 5 million visitors, a web metrics firm said Monday. The number of Americans visiting blogs amounted to 30 percent of the total online U.S. population, an increase of 45 percent over the same period last year, ComScore Networks said. Other key findings in the report were that the top four hosting services for blogs had more than 5 million unique visitors. Those sites in order, starting with the largest, were Blogspot.com, Livejournal.com, Typepad.com and Xanga.com. Blogspot.com's 19 million unique visitors amounted to more visitors than the NYTimes.com, USAToday.com and WashingtonPost.com. The numbers were "clear evidence that consumer-generated media can draw audience on par with traditional online publishers," the report said. Five individual blogs had more than a million unique visitors. In order, starting with the largest, were FreeRepublic.com, DrudgeReport.com, Fleshbot.com, Gawker.com and Fark.com. In general, political blogs were the most popular, followed by "hipster" lifestyle blogs, tech blogs and blogs authored by women. Compared to the average Internet user, blog readers tended to be significantly more likely to live in wealthier households, be younger and connect to the web on high-speed connections. Blog readers also visited nearly twice as many web pages as the average Internet user, and were much more likely to shop online. "The fact that we found 30 percent of the online population to have visited blogs clearly underscores the commercial importance of consumer generated and driven media," Dan Hess, senior vice president of ComScore, said in a statement. "It's noteworthy that while the blog audience is already quite large and growing, its demographic composition relative to the total population will appeal to many marketers." The study was sponsored in part by blog-hosting service Six Apart and by Gawker Media. =~=~=~= Atari Online News, Etc. is a weekly publication covering the entire Atari community. Reprint permission is granted, unless otherwise noted at the beginning of any article, to Atari user groups and not for profit publications only under the following terms: articles must remain unedited and include the issue number and author at the top of each article reprinted. Other reprints granted upon approval of request. Send requests to: dpj@atarinews.org No issue of Atari Online News, Etc. may be included on any commercial media, nor uploaded or transmitted to any commercial online service or internet site, in whole or in part, by any agent or means, without the expressed consent or permission from the Publisher or Editor of Atari Online News, Etc. Opinions presented herein are those of the individual authors and do not necessarily reflect those of the staff, or of the publishers. All material herein is believed to be accurate at the time of publishing.