Volume 10, Issue 33 Atari Online News, Etc. August 15, 2008 Published and Copyright (c) 1999 - 2008 All Rights Reserved Atari Online News, Etc. A-ONE Online Magazine Dana P. Jacobson, Publisher/Managing Editor Joseph Mirando, Managing Editor Rob Mahlert, Associate Editor Atari Online News, Etc. Staff Dana P. Jacobson -- Editor Joe Mirando -- "People Are Talking" Michael Burkley -- "Unabashed Atariophile" Albert Dayes -- "CC: Classic Chips" Rob Mahlert -- Web site Thomas J. Andrews -- "Keeper of the Flame" With Contributions by: Djordje Vukovic To subscribe to A-ONE, change e-mail addresses, or unsubscribe, log on to our website at: www.atarinews.org and click on "Subscriptions". OR subscribe to A-ONE by sending a message to: dpj@atarinews.org and your address will be added to the distribution list. To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE Please make sure that you include the same address that you used to subscribe from. To download A-ONE, set your browser bookmarks to one of the following sites: http://people.delphiforums.com/dpj/a-one.htm Now available: http://www.atarinews.org Visit the Atari Advantage Forum on Delphi! http://forums.delphiforums.com/atari/ =~=~=~= A-ONE #1033 08/15/08 ~ DefCon Hackers Hacked! ~ People Are Talking! ~ Cyberbullying Bill? ~ Gmail Access Is Fixed! ~ US Internet Speeds #15 ~ New PCs Can Wake Up! ~ New Teradesk Released! ~ Fire Eagle Draws Fire! ~ Seeking IE8 Testers ~ Stix: Motion Control! ~ Nintendo Leads Gaming! ~ US Not Prepared! -* Copyrights for Open-Source! *- -* Some Sites Still Blocked in Beijing *- -* US Fails To Prosecute Internet Fraud Cases *- =~=~=~= ->From the Editor's Keyboard "Saying it like it is!" """""""""""""""""""""""""" Weather-wise, this has been the worst summer in about 10 years! I recently saw some graphics on the local news that showed a calendar of the month of August. On it, there were mostly colored squares that reflected the days of the month. There were only three squares that were not colored, reflecting those days in which we've had no rain. This is August, the down side of the peak of summer! Fortunately, all of these days were not washouts! I don't know about you, but there are a lot of the Summer Olympics that I enjoy watching. Sure, I've seen a little bit of the swimming events, but mostly to see Michael Phelps shatter Mark Spitz's records. I've seen a little bit of the women's gymnastics routines, and I'm amazed. And I really enjoyed the women's beach volleyball matches! Otherwise, I haven't seen too much else - just not the best time of the day for viewing. And it was funny to learn of the Chinese's version of the Milli Vanilli lip-synching scandal! Poor kid... On a more serious and somber note, I had a phone message early in the week. Now, most phone messages I get are usually people soliciting money for a worthwhile organization, but mostly some telemarketing garbage. But this call had been one of a personal nature. I've been using Atari computers for over 20 years now, but not so much in the recent past. I've met a lot of people who have shared my enthusiasm for Atari computing - through local user groups, bulletin boards, online services, dealers, and Atari shows. One of my closest Atari friends, Harry Steele, passed away last week. Now, some of you long-time Atari users may have known Harry. He ran the Boston Computer Society's Atari BBS for many years. In fact, Harry was very active in the local Boston area Atari BBS community. He spent countless hours helping me to set up my own Atari BBS - Toad Hall EBBS back in the late 80's. He also helped me a LOT when I had computer problems. And, Harry was the one to convince me to attend my first Atari fest: WAACE, in 1990. It was that year that Harry decided to take the lead to bring an Atari fest to the Boston area. The Boston Computer Society (BCS) was the premier computing organization around the country, and it had sponsored numerous shows for other computer platforms over the years. So, why not an Atari show? I joined that organizing group, and getting that show set up was a lot of fun. And, we managed to pull it off, scheduled a couple of weeks after that year's WAACE show - the New England AtariFest '90 was a huge success! During those years after that show, I had become one of many vocal people online complaining about Atari's lackluster performance. Most of my vocalizations were online in the Atari Roundtables on GEnie, in the Atari SIGs on CompuServe, and in the ST Advantage area of Delphi. Additionally, I had a lot to say in my columns during my many-year stint as the Atari editor of STReport. I didn't make a lot of friends at Atari during those years, and it almost came back to haunt me. The BCS, staying with the Harry Steele factor, had also played major roles hosting annual meetings where new top-notch equipment made their debut. Again, Harry wanted to see the Atari segment of the BCS back in the forefront with a focus on new Atari technology. By then, I had also joined the BCS due to years of Harry's prodding. We all knew that Atari was working on their new power machine, the Atari Falcon! What a better place to introduce it to the world than at the annual BCS meeting. Harry, along with a few of us in the BCS Atari group started a campaign to get Sam Tramiel to come to Boston to introduce the Falcon. With Harry's lead in this, we pulled it off - the new Atari Falcon was introduced in the heart of Boston! While this was a huge success for the New England Atari community, there was an interesting side note to this event. You see, by that time, my affiliation with STReport had made me not one of Atari's favorite people. When Atari's director of communications, Bob Brodie, learned that I was part of the group helping out with the Falcon meeting, things started to sour. Under no circumstances, Sam Tramiel, through Brodie, would allow me to be involved with this showing. But Harry Steele was a long-time friend, and fellow BCS member. This was a BCS-sponsored occasion, and Harry let Brodie know, in no certain terms, that I had been a strong proponent of Atari computing - regardless of my opinions of the company and some of its staff. Through Harry's insistence, I remained on the organizing staff, helped with the set-up and breakdown of the meeting, and even attended the after-show dining festivities (and sat at Brodie's table!)! Over the years, even as Atari's existence was fading (okay, dying), Harry and I would still talk about Atari things. But Harry's enthusiasm for Atari computing faded, like many before him. We would go golfing about a half dozen times a year, but that started to decline also. We'd meet over the years, for a beer and pizza, an occasional round of golf, or even just to chit-chat and reminisce. We still exchanged cards over the holidays, but other than that, I haven't seen or talked to Harry in about 3-4 years. So, when I got the call from his daughter-in-law, I was surprised. Part of the message stated that Harry had left specific instructions to call a small list of people to let them know upon his death. And I appreciate being among those on that list, even if it meant hearing that Harry was gone. Harry, you were always a character! Although I've said it many times over the years, I appreciated all of the help and support you provided me in all things Atari. And, I'm grateful for the opportunity to be, and have you as, a friend. RIP. Until next time... =~=~=~= TeraDesk 3.97 Released Version 3.97 of TeraDesk open-source desktop for the 16-bit and 32-bit lines of Atari computers is available at: http://solair.eunet.yu/~vdjole/teradesk.htm This release brings fixes to some not-very-critical problems that have been detected, and also a couple of small cosmetic improvements. Work on some other fixes and improvements is in progress. See the development history file for details. Have fun. =~=~=~= PEOPLE ARE TALKING compiled by Joe Mirando joe@atarinews.org Hidi ho friends and neighbors. Well, I'm sure your not surprised, but there aren't enough messages on the UseNet to make up a good column. I'll put 'em aside to go with next week's. So I guess you're going to have to put up with my ranting and raving about whatever comes to mind. Have you been watching the Olympics? I don't know about you, but I'm just blown away by some of the people competing this time around. Look at Michael Phelps. He's a damned machine. He's just going nuts out there, grabbing up all the medals and most of the limelight. Well, I'll tell ya what. He deserves it. I'll let you in on a little secret... Phelps ticks me off. Who the heck does he think he is, standing there poolside yelling and shouting like a shirtless fool? Ha! He's the guy who's won more gold medals at one Olympics than any other American, that's who. After his years of training and discipline, he's allowed. [grin] While it's true that he's trained hard and been smart about everything that he's done (diet, equipment, etc.), perhaps the biggest asset the man has is his overall physical attributes: He's 6'4" tall with more torso than leg, which makes him more 'stable' in the water, he's got big feet and hands to grab as much water as possible, he's got double-jointed shoulders and elbows to allow him to hyper-extend to get those baseball mitts of his as big a stroke as possible, and he's focused enough and disciplined enough to stick to an exercise regimen that would cripple most of us. It's because of his training and particular physical attributes that he can give his all in each and every race without losing as much of his edge as the rest of us would. Heck, the kid's body (and he's 23 years old... he IS a kid) is in perpetual overdrive. He consumes somewhere around 12,000 calories a day as opposed to the 2,000 calories the rest of us burn. Between that and the fact that his heart pumps twice as much blood as ours do when he's pushing his body to the limit, he seems to be able to minimize the incredible strain on his system. As much as I hate to admit it, the guy deserves every accolade he's getting. I've got a couple of other favorites too... of course, being a red-blooded American male, they're women. Dara Torres. Now THERE'S a story. When qualifying for the Olympics, she broke a record that had stood for almost 25 years. Now, there's nothing so amazing about that, right? I mean, records are meant to be broken. Well friends and neighbors, what IS amazing is that it's a record that SHE set. Yeah, she set the record when she was fifteen years old... TWENTY-FIVE YEARS AGO! I don't know about you, but I find that amazing. I saw a quick story on her workout regimen and, to be honest, I don't know if it'd all be worth it to me. The workouts, the grinding stretches and the electric-shock-type of stimulation that she goes through before and after the actual exercise must add up to a fairly painful warmup and cool-down. She's a shining example of what you can do if you've got the drive, the support and the talent. My hat's off to her. There's been a lot said about the physics of the pool (designed to minimize resistance) and the uniforms (the skin-tight outfits that many of the swimmers are wearing these days) and how it's changing their sport. But the fact is that all the little fine-tuning touches to the pool and swimsuits only add up to fractions of a second difference. It's not like I can don the new Speedo (oh gawd, even _I'M_ grossed out by that thought) and jump into the pool in the Water Cube and give any of these guys a run for their money. But I'm still not at all sure that the suits don't constitute what some have called "equipment doping", since the suits are expensive (around $500.00 per), and at this point 9 out of 10 swimming records that have been broken at this Olympics have been broken by swimmers wearing them. But these people ARE the best of the best of the best, and I don't know if things would have been any different without the suits. There are plenty of other sports that I'll be watching... track and field, the martial arts-related events (Judo, Taekwondo, Fencing, Boxing, Wrestling, etc.) and a bunch of others that I can't recall right at the moment, but I've got to admit that the one that catches my interest the most is gymnastics. Now, guys in gymnastics is okay... the strength and agility they display is awe-inspiring, and the dedication that it takes to be that good at ANYTHING really blows my mind. But I've got to admit that everything else is a far-distant second to the women's gymnastics teams. It seems that all I can ever say while watching them is "wow!" I'm not talking about just the Americans here, but every team I've seen... they're simply amazing. It's one thing to be able to do a tumble or whatever, but there's so much more than that going on, whether it's on the mat or parallel bars or pommel horse or rings. What they do, what the really good ones do, is about as close as you can get to physical poetry. I have a niece who was 'into gymnastics' big-time. There was even talk of a run at the Olympics. She was one of those kids who practiced because she wanted to, and she was incredibly good at it. But, because she was my niece, I got very nervous watching her on the parallel bars or high beam. I just kept thinking, "one wrong step or hand placement, and she's looking at a cast and lots of therapy". I just couldn't understand why someone would do the things that I saw her doing. Things that seemed to defy both gravity and common sense. I finally asked her about it one day, after watching her do a series of awe-inspiring moves on the beam. Why? Why would anyone actually want to jump and spin and twirl and roll on a four inch wide piece of wood four feet in the air? "Because" she told me through a huge dreamy smile, "when I'm there, I'm flying!" Ah. NOW I understand. I guess the only way to describe it is that feeling you get when you dream that you can fly... not those annoying ones where you're suspended in mid-air and are limited to jerky, uncertain, clumsy moves with the continual feeling that any second you're going to plummet and hit the ground like a lawn dart, but the times when you swoop and dive and drift easily and everything seems right with the world... like there's nothing you can't do and everything is just perfect. Ahhhh, those times are few and far between, even in dreams. It's no wonder then that my niece is so 'addicted' to gymnastics. I can't imagine ANYTHING that I could do while awake that could give me that feeling. She's blessed enough with talent to be able to do that when she steps up to the mat or the parallel bars or the beam and let her talent, practice and concentration take over. There seem to be painfully few talents that can lead to the type of rapture you can see on the faces of some of these 'kids'. Most things that difficult require concentration, and you can see it in the practitioner's face... The determination, the drive, the concentration on form and detail. But when you see a gymnast... a real, honest-to-goodness, natural born gymnast, there's a different look on their face. Yeah, it's that look you have in your dreams when you can fly. Well, up, up and away, folks! That's it for this time around. Tune in again next week, same time, same station, and be ready to listen to what they are saying when... PEOPLE ARE TALKING =~=~=~= ->In This Week's Gaming Section - Stix: Motion-Control PC Games! """"""""""""""""""""""""""""" Nintendo Continues To Lead! =~=~=~= ->A-ONE's Game Console Industry News - The Latest Gaming News! """""""""""""""""""""""""""""""""" Stix Takes A Stab at Motion-Controlled PC Games Looking at its size, shape, white wrist strap and B-button on the bottom, it's easy to compare the Stix with the Wiimote, the wireless controller for the popular Nintendo gaming console. Except the Stix is for your PC. The Stix comes from Playhut Inc., a toy company that also makes cute little indoor tents for kids. The Stix 200 remote, which began selling for $49.99 at Target, Costco and other retailers this week, promises to "redefine the PC and online gaming experience" with the motion-sensing controller. A stab at some of the 2D casual games available on Sphere, the game portal of Playhut subsidiary GoLive2, offers a bit of novelty and fun, though nothing as exciting as scoring that first strike in Wii bowling. For those who feel constrained by 2D games and want to do more than shake their Stix left and right, the company plans to release the Stix 400 for $59.99 in October (though it's already on sale on Amazon.com for a higher price.) The Stix 400 is compatible with 3D games and sounds more promising. "Wowbotz Bomb Battle," a "Pong"-like game but with shields and bombs, is as simple as the 1970s arcade classic, with players moving their Stix up and down in front of the monitor to hit a bomb back and forth with their opponent. "Kuttiez Wishing Well" lets your little witch character move left and right as well as up and down as you fall down a seemingly endless well. The object is to light up Jack-o-lanterns as you fall while avoiding flying ghosts. Stix can work with any Web-based game, so long as either the player or the folks at GoLive2 map out the controls to translate them from the keyboard to the Stix remote. But it doesn't always work the other way around: To play "Bomb Battle," for example, you'll need Stix. The Wii it isn't, but for the price of a tank of gas for an SUV it might give your wrists a welcome break from playing keyboard-and-mouse computer games. Of course, if you already have a Wii you can always sync your Wiimote to your PC through Bluetooth and be done with it. Nintendo Continues To Lead Game-Console Sales U.S. sales of video-game consoles and software jumped 28 percent last month compared to last year, according to market researcher NPD Group. Nintendo's DS portable and Wii remained the most popular systems. For hardware, that means nearly $450 million in July purchases, a 17 percent increase compared to the same time last year. The top-selling DS moved about 608,000 units, with the Wii second at about 555,000. The next four places showed small differences, with third-place Sony's PlayStation 3 at 225,000, its PlayStation Portable in fourth with 222,000, and Microsoft's Xbox 360 fifth with 205,000. The PlayStation 2, now entering late middle age eight years after its release, still sold about 155,000 for sixth place. In total sales, the Wii is in first place, with about 13.5 million sold in North America and about 31 million worldwide. The Xbox 360 is in second place, with 12 million U.S. sales and 20 million worldwide, and the PS3 takes third with 5.5 million U.S. and 15 million worldwide. Game software sales in the U.S. totaled $591 million, an increase of 41 percent over last year. The top two games were Electronic Arts' NCAA Football 09 for the Xbox, with 397,000 sold, and Nintendo's Wii Fit, with about 370,000. Guitar Hero: On Tour for the DS sold 309,000 for third place, and Wii Play was fourth with 284,000. The remaining games in the top 10 were, in order, NCAA Football for the PS3, Soulcalibur IV for the Xbox 360, Mario Kart for the Wii, Rock Band Special Edition Bundle for the Wii, Soulcalibur IV for the PS3, and Sid Meier's Civilization Revolution for the Xbox 360. Mike Goodman, an analyst with industry research firm Yankee Group, said it is "pretty safe to assume that Nintendo will continue to lead the way for the foreseeable future." The more interesting development, he added, is the continuing monthly battle between the PS3 and the Xbox 360, which in the U.S. is "still very close." In the latest U.S. figures, he noted, "Sony has managed to inch ahead of Microsoft," but the Xbox 360 still leads in total sales since launch. "At this pace," Goodman said, "it will take Sony years to catch up with Microsoft." Goodman said the PS3's built-in Blu-ray high-definition DVD player is "nice to have," but probably "not a must-have" that would sway buyers. The inclusion of Blu-ray in the PS3 delayed the release of the console, but became a possible asset after the recent Blu-ray triumph in the high-definition format war with HD DVD. Goodman noted the monthly competition might be in for a shake-up if a rumored big price-cut for the Xbox 360 takes place this fall. If, he said, Microsoft were to drop $100 from the console price, the dynamic of the monthly sales race could dramatically shift once again. =~=~=~= A-ONE's Headline News The Latest in Computer Technology News Compiled by: Dana P. Jacobson Some Web Sites Remain Blocked at Beijing Olympics Some Web sites remained inaccessible to reporters as competition got under way Saturday at the Beijing Olympics. China's communist government routinely filters its citizens' access to the Internet, but in the runup to the Olympics Chinese officials and officials with the International Olympic Committee vowed there would be no censorship of the Internet for accredited journalists covering the games. Some sites were unblocked 10 days ago after reporters arriving to cover the games found them blocked and complained to the IOC, but others remain inaccessible, including sites related to the Tiananmen Square protests, Tibet, Taiwan and the Dalai Lama. While searches for these keywords turned up long lists of Web sites, attempts to open some of them resulted in a message saying the page could not be displayed. A search for information about the outlawed Falun Gong spiritual movement not only drew that error message but froze the search engine and prohibited further searches for several minutes. Sites that host thousands of blogs appeared to be open, but specific blogs remained blocked. A statement by Chinese officials indicated they had gone as far as they intend to go. "Yes, we promised to provide free access to the Internet - except for a few that would jeopardize our national security and would not be good for the healthy growth of our young people," said Wang Wei, executive vice president of BOCOG, the Olympic organizing committee. "As in any other country, there are some kinds of limitations," Wang added. "However, I think we are going to provide sufficient access for the media to cover the games." IOC spokeswoman Giselle Davies suggested reporters should keep pushing the Chinese. "Sites that you need to have for your job, it's important that you raise them for BOCOG's awareness," Davies said. "It's ongoing work." Rebecca MacKinnon, who studies Internet censorship in mainland China, said none of the changes have affected Chinese-language sites. "The censorship situation for those Web sites has not loosened at all," said MacKinnon, who teaches journalism at the University of Hong Kong. "From what I understand they have even tightened." U.S. Fails To Prosecute Internet Fraud Cases While Web users drown in spam and fend off scams aimed at stealing their money, U.S. federal and state law enforcement authorities are doing little to resolve what has become a multi-billion-dollar problem, a think tank said on Monday. In the 20 states that give a number for consumer complaints, there were roughly 20,000 Internet-related complaints in 2007, said the group, which surveyed officials in all 50 states but received widely varying amounts of data. Eight states put Internet-related complaints among their top-three consumer headaches in 2007 while 24 states had some form of online fraud in their top 10 complaints, according to the Center for American Progress (CAP), which worked with the Center for Democracy and Technology. And the complaints are not unfounded; spyware, viruses and phishing cost consumers $7.1 billion in 2007, up from $2 billion the previous year, the report said. Phishing is using e-mail to try to fraudulently get information like passwords or credit card numbers. Spyware is software installed on a computer without the owner's consent. It can be used to monitor computer use, or take over the computer. Paula Selis, senior counsel for the office of Washington state's attorney general, warned that crime associated with the Internet could damage online commerce. "There must be a recognition that online fraud is a huge threat," she told reporters. Despite the large number of complaints, the group found few prosecutions of online fraud. "It's clear ... that state attorneys general are not doing a whole lot about Internet consumer protection," Reece Rushing, CAP's director of regulatory and information policy, said at a news conference. "They haven't made it a priority. In the states that have made it a priority they've been able to win settlements." The National Association of Attorneys General's bimonthly Cybercrime Newsletter for 2006 and 2007 mentioned just 55 prosecutions of Internet fraud, 26 related to online sales or services, 15 related to data security or identity theft and 14 involving spyware, spam or phishing. In 2007, Washington state sued Consumer Digital Services, accusing it of promising free goods in exchange for personal information. As a result, more than 13,000 Washington state consumers were charged $14.95 on their phone bills for Internet services they did not want. Under the settlement, the money is to be refunded and the company to pay penalties and fees that could total $1 million, the report said. U.S. Not Ready for Georgia-Style Computer Attacks While Internet attacks continue in Georgia, security experts say the U.S. is not prepared for similar attacks that could steal confidential data and wreak havoc on U.S. computer systems. National intelligence officials earlier this year told a Senate committee that unlike the U.S. military, the federal government and private sector are not prepared for cyber attacks and pointed to China and Russia as threats to consider. It wasn't the first time government officials cited China as a threat. A 2007 Department of Defense report said the Chinese government sees cyber war as part of its first strike. Also last year, General James Cartwright, vice chairman of the Joint Chiefs of Staff, said China is carrying out widespread reconnaissance of America's networks. Earlier this year, Chinese hackers attempted to take out CNN's Web site, according to CNN. Scott Borg, director of the independent U.S. Cyber Consequences Unit, has blamed Russia for taking down about 20 Georgian government, banking and media sites. Borg said the U.S. is ready for physical attacks, but not from computer systems. China and Russia "are the biggest single countries that provide a challenge to the U.S.," said Jose Nezario, a senior security researcher with Arbor Networks. "I would say they are closely matched in terms of capability and programming to be able to induce an attack against the U.S. through the Internet." Russia is well equipped, according to Nezario. Arbor Networks has tracked Russian criminal groups attacking Web sites, files and other groups, netting millions of dollars. And there have been Web posts teaching residents of Russia ways to support the cause by initiating their own attacks. In fact, Nezario watched the attack of a media outlet in Georgia during our interview from his office in Michigan. Nezario said no one is immune to these types of attacks. Nezario and his colleagues began tracking a series of attacks in Georgia going back to mid-July, before military attacks began. Nezario said he noticed a stream of data directed at Georgian government sites containing the message win+love+in+Russia last month. Georgia's presidential Web site is still inaccessible, possibly firewalled to thwart attacks or possibly still under attack by additional botnets, Nezario recently wrote in his blog. Botnets are compromised computers running software usually installed using worms, Trojan Horses, or backdoors. Nezario has been trying to discover who the attacker is. "This has been a very, very powerful insight and we are learning who the botnets are and who are being told to attack and where those servers are and who is behind it," he said. It's likely that Georgia, which has only 4.7 million people, does not have the hardware, tools or staff to defend against such attacks. "I think because we have more people who are able to utilize more equipment, more operations, more connectivity, we are less vulnerable to this kind of attack - but we are not immune," Nezario said. Both the frequency and size of the attacks has grown substantially. The largest attacks are between 20GB and 40GB per second, enough to disrupt any Internet service provider, according to Arbor Networks. Google Resolves Gmail Access Problems Google Inc said on Monday it has resolved an issue with its contacts system that caused many users of its Gmail service to have trouble accessing their online e-mail. The problems began at about 5 p.m. EDT and an announcement on the company's Gmail "Help Center" site said the issue is now resolved. Google said an outage in the contacts system used by Gmail prevented the e-mail system from loading properly. The company also said that there may be minor delays in deliveries even though all mail is safe. Users across the United States, Canada and India reported problems with Gmail and a Google employee also reported that the company's own corporate e-mail account was down. Microsoft Calls for More IE8 Beta Testers As Microsoft readies another beta release of Internet Explorer (IE) 8, the company has made a call for more beta testers via a company blog. On the IEBlog this week, Microsoft Program Manager Allison Burnett said the company is expanding the IE 8 beta-testing program. Currently, the only way to directly file a bug with the IE team is if someone is a part of the IE 8 technical beta program on Microsoft Connect. Now, if people want to contribute IE8 bug reports, they can e-mail Microsoft at IESO@microsoft.com, Burnett wrote. She also requested that people sending e-mails explain why they would be a "great beta tester." Microsoft is expected to release another beta of IE8, the next version of its browser software, this month. Microsoft released the first beta of IE8 in March at its MIX 08 conference. The company plans to add more support for industry standard protocols, such as CSS (Cascading Style Sheets), in the browser and has responded to developer feedback that it needs to bring them in to test IE8 as much as possible so they can prepare Web sites for these changes. Microsoft made IE 7, the current version of its browser, more standards compliant when it was released in October 2006. However, many Web sites that had been developed to work with older versions of IE that did not support open standards did not work on IE7 and had to be recoded. Microsoft hopes to avoid a similar problem with IE8. Microsoft plans to release the final code for IE8 before the end of the year. Hackers Hacked at Infamous DefCon Gathering In the end, it was hackers at DefCon that got hacked. After three days of software cracking duels and hacking seminars, self-described computer ninjas at the infamous gathering in Las Vegas found out Sunday that their online activities were hijacked without them catching on. A standing-room crowd cheered admiringly as Tony Kapela and Alex Pilosov showed them how they were "pwned" by a simple technique that could be used to "steal the Internet." "Pwned" is popular computer and video game culture slang playing off the word "owned" and is used to describe someone being totally dominated or humiliated online or in-game. "It's a nearly invisible exploitation," Kapela said while revealing a hack that exploits fundamental Internet routing procedure to hijack online traffic unnoticed. "A level of invisibility that is unparalled." The beauty of the technique presented by Alex Pilosov and Kapela is that hackers don't need to break into websites or plant malicious computer code to control and tamper with data travelling the Internet, the presentation showed. Instead, the Internet is duped into sending people's data to hackers. "Someone can passively intercept traffic," Kapela explained. "We can store, drop, filter, mutilate, grope, or modify data heading to you." The tens of thousands of networks handling traffic on the Internet are programmed to trust each other for the best routes for data. The choice of optimal routes is made instantly; decided by a network claiming the longest numerical Internet addresses for data destination. A hacker can hijack traffic to and from websites of choice by adding enough numbers to computer addresses to have his or her network automatically deemed the best path for the data. "We construct the man-in-the-middle attack on the Internet," Kapela said, referring to a classic hack in which someone gets between a computer user and their online destination. "Internet routing is inherently trust based. We told the route that we know the best way to an address. A hacker could blast a lot of spam or launch a lot of phishing attacks." Kapela and Pilosov proved their point by displaying for the rapt audience email, online searches and other online activity conducted that afternoon on the Internet connection used by DefCon attendees. Hackers could use the attack to block access to websites or send traffic to bogus Web pages crafted to look like legitimate websites such as Twitter or Google, according to Kapela. "Imagine all the wonderful stuff you could insert," Kapela said. "You can hijack stuff from China or the opposite. It may already be happening. Who could tell?" The presentation capped a DefCon gathering attended by more than 8,000 people. Hackers shared ways to crack everything from mobile telephones, computer games and social networking websites to electronic hospital records and high security locks used at the White House. One seminar included a way to remotely turn off pacemakers regulating people's heartbeats. A cavernous room was devoted to a non-stop "capture the flag" contest in which players hunched over laptop computers battled to seize and keep control of a network set up for the game. Nightly "Hacker Jeopardy" drinking games required teams of players to correctly answer geeky computer questions with those giving wrong responses punished by having to guzzle beer. Another contest challenged hackers to slip malicious software code past increasingly sophisticated anti-virus programs. Hackers also faced off in lock picking contests; Guitar Hero video game competitions, and computer simulated shooting used by police for firearms training. Hackers also competed in making spy balloons that floated above the casinos. Court Says Copyrights Apply Even for Free Software In a crucial win for the free software movement, a federal appeals court has ruled that even software developers who give away the programming code for their works can sue for copyright infringement if someone misappropriates that material. The decision by the U.S. Court of Appeals for the Federal Circuit in Washington, D.C., helps clarify a murky area of the law concerning how much control programmers can exert over their intellectual property once it's been released for free into the so-called "open source" software community. People are free to use that material in their own products, but they must credit the original authors of the programming code and release their modifications into the wild as well, a cycle that's critical for free software to continue improving. Because the code was given away for free, thorny questions emerge when a violation has been discovered and someone is found to have shoved the code into their own for-profit products without giving anything back, in the form of attribution and disclosure of the alterations they made. In the latest case, which involved a computer application that model-train enthusiasts use to program the chips that control their trains, the U.S. District Court in San Francisco ruled that the plaintiff could sue for breach of contract but not copyright infringement. The distinction is important because it's easier to recover monetary damages in a copyright-infringement case. Robert Jacobsen, who manages an open source software group that created an application he claims was infringed, sought an injunction against KAM Industries, which makes a competing product. The lower court denied Jacobsen's motion. The appeals court vacated that ruling Wednesday and returned the case to the district court. "Traditionally, copyright owners sold their copyrighted material in exchange for money," the court said. "The lack of money changing hands in open source licensing should not be presumed to mean that there is no economic consideration, however." Yahoo's Fire Eagle Draws Fire From Privacy Advocates Yahoo's recently launched Fire Eagle has privacy advocates burning up about the new open platform that allows users to show their location on the Web and also allows developers access to users' locations. Yahoo officials insisted control is in the hands of the users. Users may decide how much they want to expose about their location, including the country, state, city and even street address. "Location presents some unique challenges, and people inherently feel creepy when content is targeted to where they are and your actual physical location is being tracked," said Alison Cooper, chief computer scientist at the Center for Democracy and Technology. "If people know this is being shared, then people will react more strongly and protect themselves." While Fire Eagle users control information about their location, privacy advocates say privacy policies for third-party developers may differ from Yahoo's, leaving users confused and open to privacy breeches. Ted Morgan, founder and CEO of Skyhook Wireless and the brain behind Loki, one of the 50 third-party developers using Fire Eagle, agrees that there is room for user confusion. But he said companies are adopting a general approach to privacy and offer similar policies. If users opt out of Fire Eagle, previously collected information can be kept by the developers offering the service through their applications. Morgan said Loki offers users a delete-history option and Fire Eagle users also have the option to hide their location and delete all their data from the databases. "It's great that application providers are informing people and have robust controls, but its important for people to realize if they turn it off for one application, they are not turning off their whole device," Cooper said. Companies, especially those that have spent decades building their brand, are not going to risk losing the trust of customers and risk hurting their brand, Morgan said. "Everyone has a vested interest in protecting privacy because the second consumers have any negative concerns about this, they'll shut all of this off," Morgan said. "I would argue that the industry is going over the top in privacy and in offering controls because everyone is so concerned that if someone's location is used against them in a bad way, they'll lose people's trust." Yahoo officials say third-party developers must disclose to users how they will use the location data, and Yahoo has the ability to shut down applications misusing the service. "Yahoo has always taken the security and privacy of our users as a paramount concern," said Andrew Schmitt, a Yahoo spokesperson. "In this regard, Fire Eagle is revolutionary in its treatment of user data, hoping to extend and lead industry standards regarding the users' control of their information ... should a user report a problem with a particular application, we reserve the right to alert our users and disable the application across our user base." Cooper said users signing on to location social-network sites need to be aware and do some digging. The devices we carry around with us can easily be used to find us because of GPS, Wi-Fi and cell phones that can be triangulated, she said. "With the proliferation of these services, it is good for people to look at what carriers offer and devices offer," Cooper added. Although the first generation of applications focused on social networking or the family location space, as more people view more content on mobile phones and other devices, interest in location-based advertising is expected to grow. Morgan said Loki and Fire Eagle will help provide more targeted choices for individuals. "If you are doing a search for something, it can show you ads from destinations around you rather than retailers in other parts of the country," he said. "Knowing someone's location also tells you a bit abut their demographics, income levels, and books they may be interested in." "It's certainly viewed as a treasure trove for the market, and marketers are already looking at that, but the value has not yet been proven," Cooper said. California Lawmakers Consider Cyberbullying Bill School bullies who use the Internet or text messaging to harass fellow students could be kicked out of school under a bill being considered by the California Legislature. Assembly Bill 86, introduced by Assemblyman Ted Lieu of Torrance, passed the Senate on Monday by a 21-11 vote and now heads back to the Assembly for consideration of Senate amendments, according to an Associated Press report. If the Assembly approves the Senate amendments, the bill will be sent to Gov. Arnold Schwarzenegger. Lieu's bill would allow students to be suspended or expelled from school for bullying that occurs via electronic communication, including cell phones, computers, or pagers. Experts say the biggest obstacle to combating cyberbullying is that children are unlikely to report it. Unlike real-life bullying, there is often no witness or physical scar to alert parents or teachers to a cyberbullying situation. The issue came to national focus last year when a newspaper reported the details a cyberbullying incident in which a teenage girl committed suicide. Megan Meier, who had a history of depression, hanged herself in 2006 after a falling out with someone named "Josh" whom she thought was a 16-year-old boy on MySpace. As it turns out, "Josh" didn't exist; the persona was allegedly created by a woman named Lori Drew, the mother of one of Meier's former friends, to harass the girl. In November, Meier's hometown of Dardenne Prairie, Mo., passed a law banning online harassment. Offenders can face up to 90 days in jail, a $500 fine, or both. U.S. Internet Speeds Drop to 15th Worldwide The U.S. may be winning world speed records in swimming at the Olympics, but not in average Internet speeds. According to a new report, the country that invented the Internet has now sunk to 15th worldwide in the percentage of the population subscribing to broadband. According to the recently released Second Annual Speed Matters report from the Communications Workers of America (CWA), the U.S. has "not made significant improvements in the speeds at which residents connect to the Internet" over the past year, and continues to fall behind other countries. The report said about 230,000 people in all 50 states, plus the District of Columbia and Puerto Rico, went to the speedmatters.org site to take an Internet speed test, and those results were used to determine the average speeds overall. The results indicated that the median download speed in the U.S. was 2.3 megabits per second. Japan was 30 times faster, with a median download speed of 63 Mpbs. Other countries ahead of the U.S. include South Korea at 49 Mbps, Finland at 21 Mbps, France at 17 Mbps, and Canada at 7.6 Mbps. The reports notes that the average Japanese can download an entire movie in about two minutes, but it can take two hours or more here. The access cost in both countries, according to the Speed Matters report, is the same. But the speed issue affects more than just how fast you can download movies, the report says. Innovations in telemedicine, education, public safety, and home-based businesses can be hindered by the lack of widespread high-speed connections. The U.S. median upload speed was only 435 kilobits per second, the CWA said, "far too slow for patient monitoring or to transmit large files such as medical records." The growth rate of average download speeds is slow, the report said. The increase beween the 2007 report and this year's was only four-tenths of a megabit per second, from 1.9 Mbps average to 2.3. "At this rate," the report said, "it will take the United States more than 100 years to catch up with current Internet speeds in Japan." If anything, the CWA said, the report overestimated the average U.S. speed. Most of the survey takers, it said, used DSL, a cable modem, or a fiber connection, since it would take too long for dial-up users to take the test, so the results may have been skewed upward. A key bottleneck is the geographical distribution of high-speed connections. The report found that 57 percent of urban households and 60 percent of suburban households subscribe to broadband, but only 38 percent of rural households. The division is also economic, with 85 percent of American families earning $100,000 or more having broadband access and 49 percent of families earning $30,000 to $40,000. But only 25 percent of households making less than $20,000 annually have high-speed connections. The CWA, noting that the U.S. is the only industrialized country without a national policy to promote high-speed access, suggests eight steps. These include establishing a national policy goal for enough capacity to handle 10 Mbps down and one Mbps up by 2010, developing state and national maps of broadband infrastructure, creating public-private partnerships, reforming universal phone service subsidies to include the Internet, and preserving an open Internet. New PCs Can Wake Up When They Get Phone Calls Intel Corp. is unveiling new technology that will let computers wake up from their power-saving sleep state when they receive a phone call over the Internet. Current computers have to be fully on to receive a call, making them impractical and energy-wasters as replacements for the telephone. The new component Intel is announcing Thursday will let computers automatically return to a normal, full-powered state when a call comes in. The computer can activate its microphone and loudspeaker to alert the user, then connect the call. "This certainly helps the PC become a much better center of communications in the home," said Trevor Healy, chief executive of Jajah, which will be the first Internet telephone company to utilize the feature. The first Intel motherboards with the Remote Wake capability will be shipping in the next month, said Joe Van De Water, director of consumer product marketing for Intel. These components, which are at the heart of every computer, will most likely be used by smaller computer manufacturers. Bigger names like Dell Inc. and Hewlett-Packard Co. use their own motherboard solutions, but Intel is working to supply them with the technology as well. The four initial Remote Wake motherboards will be for desktop computers and will need an Internet connection via Ethernet cable, as Wi-Fi doesn't work in sleep mode. Van De Water said the computer will know to wake up only for calls from services to which the user has subscribed, so computer-waking prank calls should be impossible. Mountain View, Calif.-based Jajah is setting itself up as a link between Web companies and the phone system. In April, it signed a deal to become the phone service provider for Yahoo Inc.'s Messenger. Jajah intends to offer the ability to wake up computers to other instant-messaging and Internet voice services, like Google Inc.'s Talk and Microsoft Corp.'s Windows Live Messenger, Healy said. It will be able to wake up subscriber computers both for calls dialed with a number and for those that are directed at a user name. A fully on desktop PC usually consumes more than 60 watts of power, with many models ranging into the hundreds of watts. In the so-called S3 sleep state, they consume around 10 watts. =~=~=~= Atari Online News, Etc. is a weekly publication covering the entire Atari community. Reprint permission is granted, unless otherwise noted at the beginning of any article, to Atari user groups and not for profit publications only under the following terms: articles must remain unedited and include the issue number and author at the top of each article reprinted. Other reprints granted upon approval of request. Send requests to: dpj@atarinews.org No issue of Atari Online News, Etc. may be included on any commercial media, nor uploaded or transmitted to any commercial online service or internet site, in whole or in part, by any agent or means, without the expressed consent or permission from the Publisher or Editor of Atari Online News, Etc. Opinions presented herein are those of the individual authors and do not necessarily reflect those of the staff, or of the publishers. All material herein is believed to be accurate at the time of publishing.