Volume 11, Issue 12 Atari Online News, Etc. March 20, 2009 Published and Copyright (c) 1999 - 2008 All Rights Reserved Atari Online News, Etc. A-ONE Online Magazine Dana P. Jacobson, Publisher/Managing Editor Joseph Mirando, Managing Editor Rob Mahlert, Associate Editor Atari Online News, Etc. Staff Dana P. Jacobson -- Editor Joe Mirando -- "People Are Talking" Michael Burkley -- "Unabashed Atariophile" Albert Dayes -- "CC: Classic Chips" Rob Mahlert -- Web site Thomas J. Andrews -- "Keeper of the Flame" With Contributions by: To subscribe to A-ONE, change e-mail addresses, or unsubscribe, log on to our website at: www.atarinews.org and click on "Subscriptions". OR subscribe to A-ONE by sending a message to: dpj@atarinews.org and your address will be added to the distribution list. To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE Please make sure that you include the same address that you used to subscribe from. To download A-ONE, set your browser bookmarks to one of the following sites: http://people.delphiforums.com/dpj/a-one.htm Now available: http://www.atarinews.org Visit the Atari Advantage Forum on Delphi! http://forums.delphiforums.com/atari/ =~=~=~= A-ONE #1112 03/20/09 ~ MS Is Still Interested ~ People Are Talking! ~ IBM To Buy Sun? ~ Australian Blacklist! ~ Is Your PC Infected? ~ PS3 Price Cut? ~ Hackers Go After Macs! ~ Browsers Fall to Hacks ~ IE 8 Released! ~ Geek Replaces Finger! ~ Psystar: What Lawsuit? ~ What If You Die? -* Web Founder Fears "Snooping" *- -* Dell Unveils World's Thinnest Laptop *- -* Gmail's 'Send Undo' Zaps "Oh Crap" Emails! *- =~=~=~= ->From the Editor's Keyboard "Saying it like it is!" """""""""""""""""""""""""" Well, I was planning to skip talking about politics, like the economy and stuff like that. I'. going to renege on that thought, but just very briefly. Yes, we're all really ticked off about the AIG bonuses. Bail out the company, and what do they do with some of that money - give exorbitant bonuses! Yes, it's a slap in the face to all of us, and not just some ordinary slap! AIG says that these bonus payments were put together in contracts designed before the bailout. So who do I blame, other than AIG? I place part of the blame on those who approved helping out AIG. Not that I disapprove of the aid, but I do see a problem with ANY bailout not being provided without detailed plans on how the money is to be used. And there should be provisions that disallows bonuses or any other type of "reward" payout to employees of these companies! Shame on us and AIG for allowing this to happen! End of story! So...Spring is here, at least the calendar says it's so! It's still cold, but most of the snow has disappeared around here. My lawn is a mess from the winter, and going to require a lot of work to get it back into shape. No problem, an annual project that I've become accustomed to facing. Now I'm just waiting for some warmer temperatures to be able to get outside and spend some time getting things ready. Until next time... =~=~=~= PEOPLE ARE TALKING compiled by Joe Mirando joe@atarinews.org Hidi ho friends and neighbors. Well, another week has come and gone, and just when we figured that we couldn't get any more screwed over, this thing about AIG bonuses comes out. I, like you, am pretty steamed about it. I mean, here we are paying billions in taxpayer dollars to a company that is.. too big to fail. So far, AIG has drawn a total of 122.8 BILLION dollars from the bailout fund. BILLION with a "B"! Think about it.. that's almost $400.00 from every man, woman and child in the country! And yet we can't allow this company to go under. "big" isn't the reason we can't afford that. The reason is that they insure so many other companies against loss and have dealt these 'derivatives'... bundles of mortgages all tied up in a bow... so deeply into the business world that, if they go under, the lion's share of the economy is going to follow them. Now, I hear one guy sitting back saying, "Yeah, right. How much worse could it get?" The answer is 'PLENTY'. A failure like that would bring the economy to a dead halt. It would be WORSE than the Great Depression, and last longer and be much more expensive too. Yes, even more expensive than bailing out AIG and CitiBank and GM. The problem, as I've been saying for years, is that your mortgage is no longer a mortgage as far as the bank is concerned. It's just a number in a column on a ledger that adds to their balance to make their stock look good, or a commodity to be sold as part of a 'grab bag package' to investors. They're betting that you won't default on your mortgage and, just in case you do, they've taken out insurance against the financial loss. Care to guess who they get that insurance from? Anyone? Anybody at all? You, you in the back there with your hand raised?... Yes, that's right... American International Group... AIG. And as foreclosure rates rose, they had to pay out. And as the housing market slowed and real estate values fell, they couldn't keep bringing in the revenue to pay off their customers. Their revenues plummeted as their payouts went sky-high. You don't have to be a business major to see what happens then. But on the other side of the fence, regular small-town banks are having trouble getting capital to offer mortgages and loans. Their interest rates are still fairly high, and anyone with any sense is very careful about lending money right now. There are, of course, those institutions who've taken bailout money and not put it onto circulation. That way they get to make their balance sheets look good and get themselves "cheaper money". Well that's just plain wrong. You got that money to help out the economy, not to make yourself an attractive buy-out target. I expect to see these institutions loosen up and start lending money in another month or two, once they see that competition for GOOD mortgages is heating up. Now, we've also got this issue of bonuses. Yeah, it ticks me off that one company could put out 165 million dollars not in salaries, but in BONUSES, while having just accepted BILLIONS of dollars in bail-out money. But the bonuses were assured before the bailout was even envisioned. There isn't much we can do about that other than to specify that the company must document where every dime of bailout money goes. And this new law to tax bonuses at 90% or 100%? It's just wrong. That's abusing the system. The Constitution says two things that apply here: First, that you can't make a law against something and then charge someone who did that thing before the law was passed. Second, you can't make a law to fit just one person or situation. Getting that bonus money back by taxing it away from them is just not what we're about. It's using the law and the legal system as a weapon. And the law should be a shield, not a sword. So what do we, as 80% shareholders in AIG, do? Well, the only thing we really can do now is to look to the future; make sure that things like that don't happen again. There should also be management shake-ups. Not that 'Liddy' guy.. he's actually trying to make things better.. but a lot of these executives who look at a situation only to figure out how to wring the most money out of it should have to go. We should superglue bells to their necks so that everyone would know who and what they were. [grin] Now, in a lot of ways, GM has the same problems as AIG. They counted on unsustainable growth and made little provision for things like a tough economy or the gas crisis or a credit crunch. GM forgot that their product was automobiles and concentrated more on making their stock look good. Their product became their stock, not their autos. Cars and trucks and SUVs became just a necessary step toward their ultimate goal. When that happens, bad things follow. I'm also tired of hearing people (some people, especially fat, drug-addicted deaf radio talkshow hosts and producer-seducing phone-sex freak television 'newscaster' types) blame the new administration. Yeah, the worst of this situation is going to come during this administration... and I don't think we've quite seen the worst of it yet. But imagine an airplane going along out over the ocean. All of a sudden, the pilot puts the plane into a vertical dive.. nose-dives the plane right toward the water. 1,000 feet from impact he leans back and takes his hands off the wheel, looks at the copilot and says, "here, it's all yours"... who are you going to blame for the crash? Well, I've bored you enough with my ramblings. Let's take a look at what's going on in the NewsGroup. From the comp.sys.atari.st NewsGroup ==================================== Robert Bernardo posts this about a new online forum: "Paul Quirk has created a new web forum for users of classic computers. Go to http://retro-link.com to see the opening message or to http://retro-link.com/smf/ to browse. To sign up, send an e-mail to paul(at)retro-link.com According to Paul, Retro-link.com will be different. This is what he says -- "There will be a new site for enthusiasts of retro computers... It will include other retro computer systems, as demand warrants. That site will be called retro-link. The domain, which has been registered, is at retro-link.com. I intend to have it ready and open to the public this weekend. The theme will be a mature, friendly, harassment-free place where people can contribute as much or as little as they wish. It will be a positive place where people can post questions that have been asked a hundred times without being insulted for doing so. It will be less of a repository of information, and more of a social place to gather and discuss... The forum seems to be all-encompassing in its eight categories -- General, 8-bit Commodores, Amiga, Atari, Apple, Tandy/TRS-80, Vintage PC, and Others." Jim DeClercq posts this question about networking Atari machines: "Somebody has done this before, probably, so I though I would ask first. I want to run a serial link between a TT030 and a Stacy, and both of them run some sort of TCP/IP link. The complication here is that a TT030 has five serial ports, while other things have just one. How does one set that up, using MiNTnet on the TT030 and STiNG on the Stacy? If I figure this out before I am handed a working solution, I will of course post it here, but I am hoping for the least work way of doing what I need to do." 'Phantom' tells Jim: "I'm in the processing of doing something similar myself. Using a STacy, MSTE, Falcon. I had some success with the MIDI ports. The Midi software I was using was a older shareware program and all you need is MIDI cables. I forget the name at the moment as I was trying a bunch of MIDI software out at the time. But I think it on the UMICH site. MidiNet, MidiCom, something like that. I had no trouble with transferring text in real time. But ran into a problem with file transfer, I couldn't access the drive partitions on one machine from the other. I think I know what I did wrong, and will test it before I will go into it. But I think it was a simple mistake. The program I used Runs as a ACC. and there is only 2 or 3 files in all. If I understand what you are trying to do, it may work to use the MIDI ports for a link between the computers and then use STing to connect to the Net. The problem with doing it all with Serial ports would be getting the TT to use two serial ports at the same time. If you want it all working at the same time. I've a MSTE so it's somewhat similar situation as the TT. I use STing on all my Ataris, except for STalker for BBS related. One option may be to use a null modem link between the STacy and the TT using something like STalker while connected to the Net with STing on the TT with another port. I've not tried this myself yet, but headed that way. The thing about MIDI however is that you can in theory connect around 250+ Ataris together at the same time. But may be to slow for your needs. Some say MIDI transfer is about like a floppy drive. However I have read that it's faster than that, so I really don't know about how fast it is with file transfer. I would think drive speed would come into play in either case. I've not fully explored what STing can do, there is a STing Server. And STing has drivers for all the ports if I'm not mistaken. STing may actually be able to do what you want all by it's self. I've never gotten into using it with 2-3 ataris yet. Another project to look into. If you get good results, do let me know and I'll do the same soon as I have time to work on it. Been doing some hardware work lately." Henk Robbers posts this about his AHCC compiler: "There is a new version of AHCC available. (see sig) Changes: AHCC now detects and inhibits infinite recursions during macro expansion. (v3.b1 crashed) Fixes in relative path handling. More flexible handling of shel_find result. Built in macro __FILE__ changes '\' to '\\'. Have fun." Then he posts: "For those who already downloaded the last AHCC. Please do it again. There is a last minute fix and I forgot a few files. Apologies for the inconvenience." Francois Le Coat tells Henk: "Thanks for your work. I'll probably have a few remarks to tell you about building my own software, if it's not disturbing your quietness. I'm always so worried about miss-commenting the hard work of another ATARI developer, because I'm one for so long. For 12 years now with my Hades 60. I tested AHCC with for the moment. Thanks for your good comments about it, and for ARAnyM. Anyway, at first sight it look like a really good job, indeed. Be sure I won't let the devels down, thanks to your support." Henk replies: "Hm, I am not sure what to think of this. I am aware of the fact that compiler writing is a delicate job. So I am prepared for the worst. [wink]" Jo Even Skarstein adds: "I'm in the process of rebuilding my Milan. When it's done, you can expect some bug-reports from me as well ;-) I have lots of code developed with PureC that I can test." Henke adds this tidbit: "It might be encouraging to know that I used AHCC for compiling the Algol 68 interpreter of Marcel van der Veer http://www.xs4all.nl/~jmvdveer/algol.html resulting in a 600Kb binary that correctly ran a few small Algol 68 programs. So it shouldn't be that bad." Well folks, that's it for this week. Tune in again next week, same time, same station, and be ready to listen to what they are saying when... PEOPLE ARE TALKING =~=~=~= ->In This Week's Gaming Section - The PS3 Price Cut That Wasn't! """"""""""""""""""""""""""""" =~=~=~= ->A-ONE's Game Console Industry News - The Latest Gaming News! """""""""""""""""""""""""""""""""" The PlayStation 3 Price Cut That Wasn't Will they or won't they, the old saw predictable as death and taxes. The PlayStation 3 costs $400 in a U.S. retail economy that's still plummeting as unemployment pushes past 8.1 percent. Not an enviable position to be in, especially not when your competition (Nintendo as much as Microsoft, whatever the executive bigwigs claim) is priced so dramatically below you. In late February an analyst with Janco Partners claimed a price drop announcement from Sony was due "in the next couple days." Nearly a month later, no word on so much as a sales snip. What's more, GamePro writes that Sony senior vice president of marketing Peter Dille says "there are still no immediate plans to cut the prices of the PS3 consoles." Janco's Mike Hickey recently repeated his claim that Sony's going to drop the PS3's price "by next month." But Sony's still losing about $50 per PS3, according to Business Week, which pegged Sony's costs at $448.73 per system as recently as December 2008. If Sony dropped the retail price of the PS3 by $100, they'd increase their per unit losses by nearly a quarter, from 11 to 33 percent. The internal business cosmology of economic indices that ultimately dictate when Sony drops the PS3's price - and by how much - are impossible to estimate in a planning capacity. At some point Sony's manufacturing costs will drop sufficiently and the internal bean counter fiscal financial minimums will align with some executive's "tolerable losses" formula, thus setting the cogs and wheels cranking on a price "event" announcement. Speaking of events, GDC 2009 is next week in San Francisco (we'll be covering it here through Game On). Could GDC be the event Janco's hinting at? Or will Sony wait until E3 2009 in June? =~=~=~= A-ONE's Headline News The Latest in Computer Technology News Compiled by: Dana P. Jacobson Web Founder Fears 'Snooping' on the Internet Tim Berners-Lee, one of the founders of the World Wide Web, said Friday that he was concerned about the emergence of user profiling on the Internet and "snooping." "The fact that when information travels across the web it isn't interfered with, snooped or molested, is very important," said Berners-Lee at an event here to mark the 20th anniversary of the first proposal to create the web. Berners-Lee, who is director of the World Wide Web Consortium (W3C), that guides its technological development, pointed to new systems that can automatically detail a person's online habits and build up their profile. "That sort of snooping is really important to avoid," he added. The British computer science professor and guru underlined that one of the biggest challenges is to ensure that information available online is used transparently for the specific purpose that its owner intended or consented to, avoiding privacy pitfalls. "Technologies are also coming that will be able to distinguish the appropriate use of data," he explained, underlining that the Internet "is a cloud." US computer technology giant Google on Wednesday launched a test version of a new "interest-based advertising" system for its network of websites including YouTube, the company said in a statement. The new system is designed to record the interests of users based on the pages they view and Internet searches they conduct, offering tailor-made advertising offers to match which can then be further refined by the user. Berners-Lee did not refer to Google directly. A growing number of Internet firms encourage people to rely on applications offered online as services "in the cloud" instead of buying software then installing and maintaining it on their own machines. While the trend toward cloud services is growing, some still worry about the privacy of data kept online and whether it is shrewd to rely on the Internet for access to information and applications. There are also concerns about the degree of government surveillance of the online world and the potential for misuse. Australian Internet `Blacklist' Prompts Concern A whistle-blower organization claims a secret list of Web sites that Australian authorities are proposing to ban includes such innocuous destinations as a dentist's office. Australia's government denied that the list - published by renegade Web site Wikileaks.org - was the same as a blacklist run by the Australian Communications and Media Authority, or ACMA. However, a manager at the dentist's office said the ACMA had confirmed her site's inclusion on the ban list. Wikileaks' publication of the list this week reignited a debate over whether a government proposal to impose an Internet filter for all Australians could have unintended consequences for innocent businesses. The list in question is provided to the creators of Internet filtering software that people can opt to install on their computers. But Communications Minister Stephen Conroy has proposed mandating that Australian Internet service providers implement the list, which would make Australia one of the strictest Internet regulators among democratic countries. Several Internet providers are conducting trials of the filter through June. The authority says the list largely contains the addresses of Web sites promoting child pornography and sexual violence, but it has refused to release its contents publicly. The proposal has prompted protests across the country, with critics slamming it as censorship. Internet providers argued that a filter could slow browsing speeds, and pointed out that illegal material such as child pornography can be traded on peer-to-peer networks or chats, which would not be covered by the filter. On its site, Wikileaks accused Australia of "acting like a democratic backwater," and said "Australian democracy must not be permitted to sleep with this loaded gun." The site - which casts itself as an outlet for "untraceable mass document leaking and analysis," with a focus on exposing oppressive regimes and unethical behavior - did not explain how it obtained the purported blacklist. The list published on Wikileaks contains around 2,400 Internet addresses, many of which are clearly for child pornography. But the list also includes a dental office, online poker parlors, a kennel and a school-cafeteria consultancy firm. Kelly Wilson, a manager at Dental Distinction in the Australian state of Queensland, said she had no idea her office's site had been blacklisted until a newspaper reporter informed her Thursday. Wilson contacted the ACMA, which she said confirmed the site was on the authority's blacklist. She said she was offered no explanation why. The site was hacked more than a year ago, and visitors were temporarily redirected to an adult Web site. The office quickly switched to a different Internet provider and hasn't had a problem since, she said. "We're a little annoyed that we're on there," Wilson said. "It's a great Web site." Jocelyn Ashcroft, owner of Tuckshop and Canteen Management Consultants in Queensland, whose apparently innocent site was also included on the Wikileaks list, worried that her business could be hurt. Ashcroft said she contacted the ACMA after learning of the Wikileaks list and was told her site was not on the authority's blacklist. But since the blacklist is secret, she was unsure what to believe. Australia's government and the ACMA slammed the publication of the Wikileaks list as irresponsible and denied it was the same as the official blacklist. In separate statements, the ACMA and Conroy, the communications minister, acknowledged that the official blacklist and the version published by Wikileaks contained sites common to both lists. But Conroy said several addresses on the published list have never appeared on the official blacklist. While the published list contains about 2,400 Internet addresses as of Aug. 6, 2008, the official blacklist for the same date contained around 1,000, the ACMA said. The ACMA said its blacklist has never contained 2,400 sites. Conroy said the ACMA was investigating the publication of the list and was considering handing the case to the Australian Federal Police. Jim Wallace, managing director of the Australian Christian Lobby, which supports the Internet filter, said the questions surrounding the published list had done nothing to change his opinion. "It's going to take time to develop any system and the processes that surround it. We don't know at what stage of investigation these names on the blacklist were," he said. "It's a real shame that people can - through illegal means - challenge something which is purely and simply aimed at giving children a safer experience on the Internet." IBM in Talks To Buy Sun Microsystems IBM Corp. is in talks to buy Sun Microsystems Inc. for at least $6.5 billion in cash, a deal that would shake up Silicon Valley and the corporate computing market, The Associated Press has learned. A person familiar with the situation told the AP of the negotiations, confirming an earlier report Wednesday in The Wall Street Journal. This person spoke on condition of anonymity because the talks are ongoing. The Journal cited unnamed people familiar with the matter and said the deal could occur as early as this week. The report sent Sun shares soaring $3.92, up 78.9 percent, to close at $8.89 Wednesday. IBM shares fell 96 cents, or 1 percent, to $91.95. Armonk, N.Y.-based IBM and Santa Clara, Calif.-based Sun both make computer systems for corporate customers. A purchase of Sun could help IBM in the finance and telecommunications markets as it tries to expand its role in digitizing key pieces of infrastructure, from electric utilities to water supplies. While some of their technologies and customers overlap, IBM and Sun have been heading in different directions for most of the past decade. Sun, a darling of the dot-com era, has been struggling since the tech bust of 2001 to find its place. The company has cut thousands of jobs and tried to refocus on open-source software besides the proprietary systems it built much of its wealth on. IBM, after an enormous restructuring in the 1990s, has proven one of the technology industry's most reliable earners. It has gobbled up dozens of companies in recent years. But a $6.5 billion deal would be its biggest to date. It would represent a big premium for Sun, which closed trading Tuesday with a market capitalization of less than $4 billion. However, Sun's last quarterly report shows it with more than $2.6 billion in cash and securities that could be readily converted to cash. Dell Unveils World's Thinnest Laptop Dell Inc unveiled its "luxury" Adamo laptop on Tuesday, calling it the world's thinnest notebook as it seeks to compete in the high-end ultraportable market defined by Apple Inc's MacBook Air. The sleek, aluminum-encased notebook is 0.65-inches thick and comes with a 13.4-inch screen and a 128-gigabyte solid-state drive. Shipping begins on Tuesday. Starting at $1,999, the Adamo is positioned as Dell's new high-end brand. Another configuration will sell for $2,699. The device comes packed in a clear case along with an optional branded sleeve or tote bag from designer luggage and handbag label Tumi. The Adamo is meant "to make a design statement, to surprise people that this is a Dell," said marketing executive John New. "This is for the customer that has that discerning taste, and is willing to pay a little more for that." Dell has been working to generate buzz for Adamo, Latin for "to fall in love with." Word of the PC began to leak late last year, and the company hosted an event in January in Las Vegas where it provided a fleeting glimpse of the laptop as it was held aloft by a model. Apple helped launch the so-called ultraportable category last year with MacBook Air which, at 0.76 inches, previously laid claim to the title of world's thinnest. The Adamo at 4 pounds is heavier than the Air, which weighs 3 pounds and is priced from $1,799. Most PC makers, including Lenovo Group, Hewlett Packard Co and Sony Corp also sell ultraportables. Dell has been trying to reinvigorate its consumer brand amid efforts to diversify its revenue base. Business customers make up around 80 percent of Dell's revenue, while PCs account for roughly 60 percent. Last week, Dell launched the $799 Studio One 19, a touchscreen all-in-one PC meant for family use in the kitchen or the living room. The Studio One 19 will be available first in Japan and then in other countries later in the spring. Dell shares have slid 13 percent since the start of 2009, while Apple's have jumped 12 percent. Dell, however, has outperformed Hewlett-Packard, whose stock has dropped 20 percent since the year began. Microsoft Releases Internet Explorer 8 Microsoft is set to publicly launch Internet Explorer 8 early on Thursday, the latest version of its market-dominating Web browser. The application, an integral part of Microsoft's eagerly awaited Windows 7 operating system, can be downloaded from Microsoft's website from 9 a.m. Pacific time, free for people using licensed Microsoft operating systems. IE8, as it is commonly referred to, has been in public beta testing for about a year, but Thursday's launch marks its full public rollout. Microsoft, the world's largest software company, said IE8 will run with Windows Vista, its latest operating system, and also Windows XP, the previous version which some users still prefer over Vista. The application replaces IE7, which has a lock on the browser market. According to a recent survey by IT consultants Janco Associates, Internet explorer has a 72.2 percent market share, ahead of the Mozilla Foundation's Firefox browser with 17.2 percent. Google's new Chrome browser has only 2.8 percent of the market, while Apple's Safari has less than 1 percent. Microsoft has run afoul of U.S. and European antitrust regulators for bundling its browser with its operating system, which competitors say is an attempt to drive them out of the market. Last month, Google joined Mozilla and Norway's Opera in protesting Microsoft's dominance in the browser market. In January, European regulators brought formal charges against Microsoft for abusing its dominant market position by bundling its Internet Explorer Web browser with its Windows operating system, which is used in 95 percent of the world's personal computers. Microsoft has already announced that users of Windows 7 - expected later this year or early next year - will be able to turn key programs like Internet Explorer off, making it easier to use other browsers. New features in IE8 include right-clicking on addresses or other Web features to go straight to a map or put into a blog or other website, which Microsoft calls an "accelerator". Users will also be able to put in keywords in the address bar to recall sites visited related to that word. The new browser also has enhanced security protection, for example warning users if they are about to download something from a site known to be a source of malicious software, or "malware". Ballmer Reiterates Interest in Yahoo Talks Microsoft Corp. Chief Executive Steve Ballmer is still signaling an interest in a deal to buy part of Yahoo Inc. Ballmer said at a technology and media summit Thursday in New York that a deal would help improve Microsoft's Web search business by expanding the base of users. More people using the search engine means more advertisers. And, Ballmer says, a larger pool of advertisers will allow for more tailored ads next to search queries. Ballmer said he has had only one conversation with Carol Bartz since she became Yahoo's chief executive in January. Ballmer said he congratulated her and said he'd like to chat at some point about a possible deal. Bartz's predecessor as Yahoo CEO, Jerry Yang, rebuffed a $47.5 billion takeover offer from Microsoft last year. Since then Microsoft has said several times it would be open to a deal involving the companies' search engines. Meanwhile, Microsoft has continued to develop its own search technology as it struggles to catch up with Google Inc. and Yahoo. The internal name for one of Microsoft's new search concepts is Kumo, which has prompted some quizzical comments and sneers since it was leaked in a staff memo. It probably will not be known as Kumo when it goes public, Ballmer indicated Thursday. "We need a name," he said. IE8, Safari, and Firefox All Fall in Hacking Test Day One of the CanSecWest Pwn2Own hacking contest finished Wednesday, with fully-patched copies of IE8, Safari, and Firefox all falling to hacker "Nils". IE8 and Firefox took longer than Safari, which fell in seconds, according to reports from CanSecWest where the Pwn2Own contest is held. Earlier today we reported on the agenda and final rules for the contest. Pwn2Own is a live hacking contest at which many of the best security researchers in the world attempt to crack the products you run every day live for cash prizes. Actually, in this case some of the versions of products are a little ahead of what you run, just to make it as challenging as possible. On a Sony Vaio running Windows 7 the following browsers will be attacked: IE8, Firefox, Chrome, followed by the Safari and Firefox browser running on a Mac. On day 1 of the contest, hackers must attack a default installation with no added plugins. On day 2 Flash, Java, .Net, and QuickTime are added and the "attack surface" is much greater. On day 3 popular apps such as Acrobat Reader are added. For these browser tests, success means code execution within context of the application. Success is defined as either "loss of information (user data)" or "incur financial cost". For his exploits Nils won a cash prize and the Sony Vaio used in the contest. A Hacking Tool Gets Updated for the Mac Two well-known Mac hackers are updating a widely used hacking toolkit, making it easier to take control of a Macintosh computer. Over the past few days, the researchers have been quietly adding new software to the Metasploit toolkit, used by security researchers and criminals alike. Metasploit already supported Mac attacks, but until recently the Mac code hadn't been as good as Metasploit's Windows and Linux tools, said Dino Dai Zovi, an independent security researcher who talked about the new tools with his collaborator Charlie Miller at the CanSecWest conference Friday. "Our goal was to make Mac OS X a first-class target for Metasploit." Metasploit is an open-source toolkit that makes it easy for hackers to launch a barrage of attacks against a computer system. Miller and Dai Zovi earned fame in previous years for hacking Macintosh computers at CanSecWest's annual Pwn2Own hacking contest. On Wednesday, Miller, a researcher with Independent Security Evaluators, won US$5,000 and a Mac laptop by using a previously unknown Safari vulnerability to hack into a Mac system. The hack was done before contest organizers. In an interview, Miller said he had hoped to demonstrate it before an audience at CanSecWest, but was prevented from doing so because of Pwn2Own contest rules, which prohibit public discussion of bugs exploited in the contest. Miller and Dai Zovi say their work is designed to bring attention to serious security problems in the Mac platform, which has largely avoided the wide-scale attacks that have plagued Windows for years. Dai Zovi said he considers the Mac safe, but not secure. "There's a difference between safety and security," he said. "It's like leaving your door unlocked. ... Leaving your door unlocked is always insecure, but it may or may not be safe." At the show, the researchers demonstrated several payload programs they have developed for Metasploit, including one called "Pic the Vic," which can be used to snap a photograph of a Mac user who has been hacked, using the computer's camera. They have also ported a Windows tool, called Meterpreter, to the Mac. Meterpreter is a stealth tool that can be used to gain information from and import more software onto a hacked computer. In the next few days they plan to add exploit code to Metasploit for a handful of previously patched Mac software bugs. Exploit code must be used to first hack into the computer before any payload software can be installed. Although there are still many more exploits available for Windows software than for Macs, the new payload code means there is now "more or less the same functionality if you want to target a Mac box or a Windows box," Miller said. What Lawsuit? Psystar Offers Third-Gen Mac Clone Seemingly unfazed by Apple's lawsuit against it, Psystar on Tuesday pushed forward with its latest Mac clone. Psystar has phased out its minitower for a smaller form factor with more powerful processor options. The third-generation Open Computer, called the Open(3), uses Intel's E7400 Core2Duo running at 2.8 GHz as the default processor. That makes the new Mac clone more than 50 percent faster than previous generations. Michael Gartenberg, a vice president at Interpret, questioned the wisdom of purchasing a Mac clone instead of a genuine Mac. "You are not getting something significantly cheaper or something that is going to significantly perform better," he said. "You are likely buying something that is going to be incompatible with anything Apple does in the future. And you are going to be depending on a company that really hasn't been around very long for technical support." It's not clear how many Mac clones Psystar has sold, but it's clear that the company seems intent on producing the machines until a court makes it stop. It keeps developing new and improved models. An Intel Core2Quad option for the Open(3) aims to enhance performance in computationally intense applications such as 3-D rendering and movie editing. Rudy Pedraza, president of Psystar, said a quad-core in a desktop that is less than four inches thick is the direct result of feedback the company has received from the public. At 47 percent smaller, the company said the new chassis improves space efficiency and versatility by using either a standard PC pedestal or horizontal placement. "We are making the Open Computer a better fit for our users' environments in more ways than one," Pedraza said. "The smaller size will definitely make it easier to place in a home or small office, but, at the same time, the increased performance will allow it to easily take the place of traditionally sized machines." Beyond the chassis and processor, the Open(3) also revamps the hard drive and memory. The standard configuration now has a 500GB SATA hard drive and a GeForce 8400GS video card with 256MB of dedicated video memory. Buyers can choose to add an 802.11n wireless adapter, a Firewire card, and an all-in-one card reader that reads popular removable media such as SD cards, CompactFlash and Sony's Memory Stick. Psystar said it also refreshed the OpenPro offering with the most-requested custom options, including a Rackmount chassis and bootable RAID support. The standard configuration now includes a 1TB SATA hard drive, 8GB of system memory, and a dual-DVI GeForce 9500 video card with 512MB of video memory. The new computers use Apple's Mac OS X. Prices start at $599 for the Open(3) and $1,154 for the OpenPro exclusively from Psystar's online store. Psystar says it has a right to make the Mac clones, accusing Apple of running a monopoly. Psystar accused Apple of forcing a tie between the Mac OS X operating system and Apple's hardware in the end-user licensing agreement. Psystar argued that Apple's EULA unlawfully restrained trade by barring users from installing its operating system on non-Apple hardware. Judge William Alsup ruled that Apple didn't violate federal and state antitrust laws and dismissed those charges last November. Apple sued Psystar in July after the company started selling Mac clones. Apple's suit seeks to shut down the company, and Alsup's ruling puts Apple in a stronger position as that case progresses. How To Tell, What To Do If Computer Is Infected Computer-virus infections don't cause your machine to crash anymore. Nowadays, the criminals behind the infections usually want your computer operating in top form so you don't know something's wrong. That way, they can log your keystrokes and steal any passwords or credit-card numbers you enter at Web sites, or they can link your infected computer with others to send out spam. Here are some signs your computer is infected, tapped to serve as part of "botnet" armies run by criminals: * You experience new, prolonged slowdowns. This can be a sign that a malicious program is running in the background. * You continually get pop-up ads that you can't make go away. This is a sure sign you have "adware," and possibly more, on your machine. * You're being directed to sites you didn't intend to visit, or your search results are coming back funky. This is another sign that hackers have gotten to your machine. So what do you do? * Having anti-virus software here is hugely helpful. For one, it can identify known malicious programs and disable them. If the virus that has infected your machine isn't detected, many anti-virus vendors offer a service in which they can remotely take over your computer and delete the malware for a fee. * Some anti-virus vendors also offer free, online virus-scanning services. * You may have to reinstall your operating system if your computer is still experiencing problems. It's a good idea even if you believe you've cleaned up the mess because malware can still be hidden on your machine. You will need to back up your files before you do this. How do I know what information has been taken? * It's very hard to tell what's been taken. Not every infection steals your data. Some just serve unwanted ads. Others poison your search result or steer you to Web sites you don't want to see. Others log your every keystroke. The anti-virus vendors have extensive databases about what the known infections do and don't do. Comparing the results from your virus scans to those entries will give you a good idea about what criminals may have snatched up. Gmail's 'Send Undo' Zaps Those 'Oh Crap!' Emails Have you ever drunkenly emailed your ex- at 3 AM, professing your love? Maybe you've quickly replied to an obnoxious colleague, just a teensy bit too sarcastically? Regret can be as quick as a hastily pushed "send" button. But, according to a new feature from Gmail Labs, sent emails can quickly be undone. "Turn on Undo Send in Gmail Labs under Settings, and you'll see a new "Undo" link on every sent mail confirmation," Michael Leggett, a Google user experience designer, wrote in a blog post late Thursday. "Click 'Undo,' and we'll grab the message before it's sent and take you right back to compose." Remember, the Labs icon is the little Erlenmeyer flask icon right to the right of your username, in the upper right-hand corner. What this does, apparently, is delay the transmission of an email for about five seconds, giving you the chance to recall it. As Google notes, this doesn't /recall/ an email; it actually pulls it back, meaning that your embarrassing profession of love will actually never be seen. Just be quick! Geek Replaces Lost Finger With 2GB USB Finger You've heard of USB thumb drives, but you likely have not considered the real thing - a lost digit replaced by a USB Flash drive. A Finnish programmer who lost his finger in a motorcycle accident has now replaced it with a prosthetic finger that has a USB drive built in. Jerry Jalava can now peel back his "nail" and reveal a 2GB "finger drive" for storing photos, movies and software. Jalava had his left ring finger amputated last summer after crashing into a deer with his motorbike near the Finnish capital Helsinky. Given his profession as a computer programmer, the doctors treating him joked that he should have a USB "finger drive" and Jalava went for the idea. Jerry Jalava's 2GB USB finger looks like a normal finger, but it's detachable and he leaves it inside his computer's slot while using it. The Finnish programmer plans to "upgrade" his finger in the future with one that has a removable fingertip, an RFID tag and more storage space. This time, Jalava's USB finger is not a hoax, unlike the story of the guy who surgically altered his thumbs two years ago for better use of his phone keyboard. To refresh your memory, that guy whittled his thumbs several times so that he could type faster on his Blackberry and then iPhone - and it proved to be just a PR stunt (or more of a Flat Earth News worthy tale). Death Leaves Online Lives in Limbo When Jerald Spangenberg collapsed and died in the middle of a quest in an online game, his daughter embarked on a quest of her own: to let her father's gaming friends know that he hadn't just decided to desert them. It wasn't easy, because she didn't have her father's "World of Warcraft" password and the game's publisher couldn't help her. Eventually, Melissa Allen Spangenberg reached her father's friends by asking around online for the "guild" he belonged to. One of them, Chuck Pagoria in Morgantown, Ky., heard about Spangenberg's death three weeks later. Pagoria had put his absence down to an argument among the gamers that night. "I figured he probably just needed some time to cool off," Pagoria said. "I was kind of extremely shocked and blown away when I heard the reason that he hadn't been back. Nobody had any way of finding this out." With online social networks becoming ever more important in our lives, they're also becoming an important element in our deaths. Spangenberg, who died suddenly from an abdominal aneurysm at 57, was unprepared, but others are leaving detailed instructions. There's even a tiny industry that has sprung up to help people wrap up their online contacts after their deaths. When Robert Bryant's father died last year, he left his son a little black USB flash drive in a drawer in his home office in Lawton, Okla. It was underneath a cup his son had once given him for his birthday. The drive contained a list of contacts for his son to notify, including the administrator of an online group he had been in. "It was kind of creepy because I was telling all these people that my dad was dead," Bryant said. "It did help me out quite a bit, though, because it allowed me to clear up a lot of that stuff and I had time to help my mom with whatever she needed." David Eagleman, a neuroscientist at the Baylor College of Medicine in Houston, has had plenty of time to think about the issue. "I work in the world's largest medical center, and what you see here every day is people showing up in ambulances who didn't expect that just five minutes earlier," he said. "If you suddenly die or go into a coma, there can be a lot of things that are only in your head in terms of where things are stored, where your passwords are." He set up a site called Deathswitch, where people can set up e-mails that will be sent out automatically if they don't check in at intervals they specify, like once a week. For $20 per year, members can create up to 30 e-mails with attachments like video files. It's not really a profit-making venture, and Eagleman isn't sure about how many members it has - "probably close to a thousand." Nor does he know what's in the e-mails that have been created. Until they're sent out, they're encrypted so that only their creators can read them. If Deathswitch sounds morbid, there's an alternative site: Slightly Morbid. It also sends e-mail when a member dies, but doesn't rely on them logging in periodically while they're alive. Instead, members have to give trusted friends or family the information needed to log in to the site and start the notification process if something should happen. The site was created by Mike and Pamela Potter in Colorado Springs, Colo. They also run a business that makes software for online games. Pamela said they realized the need for a service like this when one of their online friends, who had volunteered a lot of time helping their customers on a Web message board, suddenly disappeared. He wasn't dead: Three months later, he came back from his summer vacation, which he'd spent without Internet access. By then, the Potters had already had Slightlymorbid.com up and running for two weeks. A third site with a similar concept plans to launch in April. Legacy Locker will charge $30 per year. It will require a copy of a death certificate before releasing information. Peter Vogel, in Tampa, Fla., was never able to reach all of his stepson Nathan's online friends after the boy died last year at age 13 during an epileptic seizure. A few years earlier, someone had hacked into one of the boy's accounts, so Vogel, a computer administrator, taught Nathan to choose passwords that couldn't be easily guessed. He also taught the boy not to write passwords down, so Nathan left no trail to follow. Vogel himself has a trusted friend who knows all his important login information. As he points out, having access to a person's e-mail account is the most important thing, because many Web site passwords can be retrieved through e-mail. Vogel joked that he hoped the only reason his friend would be called on to use his access within "the next hundred years or so" would be if Vogel forgets his own passwords. But, he said, "as Nathan has proven, anything can happen any time, even if you're only 13." =~=~=~= Atari Online News, Etc. is a weekly publication covering the entire Atari community. Reprint permission is granted, unless otherwise noted at the beginning of any article, to Atari user groups and not for profit publications only under the following terms: articles must remain unedited and include the issue number and author at the top of each article reprinted. Other reprints granted upon approval of request. Send requests to: dpj@atarinews.org No issue of Atari Online News, Etc. may be included on any commercial media, nor uploaded or transmitted to any commercial online service or internet site, in whole or in part, by any agent or means, without the expressed consent or permission from the Publisher or Editor of Atari Online News, Etc. Opinions presented herein are those of the individual authors and do not necessarily reflect those of the staff, or of the publishers. All material herein is believed to be accurate at the time of publishing.