Volume 12, Issue 40 Atari Online News, Etc. October 1, 2010 Published and Copyright (c) 1999 - 2010 All Rights Reserved Atari Online News, Etc. A-ONE Online Magazine Dana P. Jacobson, Publisher/Managing Editor Joseph Mirando, Managing Editor Rob Mahlert, Associate Editor Atari Online News, Etc. Staff Dana P. Jacobson -- Editor Joe Mirando -- "People Are Talking" Michael Burkley -- "Unabashed Atariophile" Albert Dayes -- "CC: Classic Chips" Rob Mahlert -- Web site Thomas J. Andrews -- "Keeper of the Flame" With Contributions by: Fred Horvat To subscribe to A-ONE, change e-mail addresses, or unsubscribe, log on to our website at: www.atarinews.org and click on "Subscriptions". OR subscribe to A-ONE by sending a message to: dpj@atarinews.org and your address will be added to the distribution list. To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE Please make sure that you include the same address that you used to subscribe from. To download A-ONE, set your browser bookmarks to one of the following sites: http://people.delphiforums.com/dpj/a-one.htm Now available: http://www.atarinews.org Visit the Atari Advantage Forum on Delphi! http://forums.delphiforums.com/atari/ =~=~=~= A-ONE #1240 10/01/10 ~ Net Neutrality Shelved ~ People Are Talking! ~ Worm Hits Iran Nuke! ~ RIM Unveils Playbook! ~ Ease Internet Wiretaps? ~ More Gmail Control! ~ More Hotmail Security! ~ Another Acer 3D Laptop! ~ Google Opens Goo.gl! ~ No 3DS for Christmas! ~ Huge Zeus Trojan Bust! ~ Ties With Oracle Cut! -* 'Jihadi Sites' Aren't Stopped *- -* Cyber-Blitz Response Plan Testing! *- -* U.S. Cyber Command Slips Behind Schedule! *- =~=~=~= ->From the Editor's Keyboard "Saying it like it is!" """""""""""""""""""""""""" Here we are, the first of October, and we're taking a pounding with high winds and bursts of torrential downpours as a result of the remnants of yet another hurricane making its way past us up the east coast. The sounds of acorns and small tree branches hitting the house has been constant for more than a day now! It's been an interesting past couple of days! October 1st! Wow, yet again I'm wondering where this year has gone! Nothing much has changed other than the year on the calendar! We're all another year older, along with the effects that go along with adding to our age! Another period of political wrangling; like many of you, you're probably seeing typical BS campaigning in your state like we are here in Massachusetts. This time around we have the added attraction of some "Tea Party" candidates to keep things interesting. Obama's presidential slogan for change may come back and haunt him - especially in a couple of years! It's been another long week! Pretty soon, like in a week or so, I'll stop working at the golf course and return to my "regular" schedule at the grocery store. Another sign of the seasons... Not looking forward to that regular routine again; it's been tough on me physically, but bills need to be paid and food put on the table! Not too many of us have the luxury of taking our pick of jobs these days, if we're even lucky enough to find one! So, let me get the dogs out one last time for the evening before the skies open up again, and then put this week's issue to be for another week! Until next time... =~=~=~= PEOPLE ARE TALKING compiled by Joe Mirando joe@atarinews.org [Editor's note: Due to being out of sorts due to more respiratory ailments, there will not be a P.A.T. column this week.] =~=~=~= ->In This Week's Gaming Section - No 3DS for Christmas!! """"""""""""""""""""""""""""" Video Games for Surgeons! =~=~=~= ->A-ONE's Game Console Industry News - The Latest Gaming News! """""""""""""""""""""""""""""""""" Nintendo Cuts Profit, 3DS Not Ready for Christmas Nintendo slashed its earnings forecast by more than half Wednesday after announcing that its 3DS game machine, packed with glasses-free 3-D technology, won't be ready to go on sale for Christmas. Nintendo now expects 90 billion yen ($1 billion) in profit for the year through March 2011, down from an initial projection of 200 billion yen ($2.4 billion) profit. The 3DS will go on sale in February in Japan, and March in Europe and the U.S., missing the year-end shopping season which is a critical time for all game-makers to rake in profits. Kyoto-based Nintendo Co. had promised the 3DS for sometime before April next year, and so the announcement is not technically a delay. But its forecasts had assumed the machine would on be on sale sooner. Nintendo said the strong yen, which reduces profits from overseas sales when brought back to Japan, and the timing of the 3DS launch were behind its decision to lower projections for the fiscal year. For the year through March 2011, Nintendo expects to sell 23.5 million DS machines, including 4 million 3DS, down from its earlier forecast for 30 million. It sold 27 million DS machines the previous fiscal year. The latest revision shows that even Nintendo, which has stood up fairly well among Japanese exporters in hard times, is getting battered by the surging yen. Nintendo had counted dollar trading near 85 yen. The dollar has recently dived below 85 yen. Nintendo President Satoru Iwata said 3DS will cost 25,000 yen ($300) in Japan, where it will hit stores Feb. 26. Overseas prices and specific dates will be announced later. Hirokazu Hamamura, president of Enterbrain Inc., a major Tokyo game-industry publisher, said he was surprised by the release date because of widespread rumors the 3DS would hit stores in time for year-end and New Year's - a booming shopping time in Japan because children get cash gifts from relatives during the holidays. He said Nintendo is likely taking time to perfect the technology, as well as giving more time to outside software developers to come up with games. "There is an element of awe in 3-D that's really important for games. They are all about entertainment," Hamamura said. The portable machine looks much like the DS machines now on sale, and has two panels. The top panel shows 3-D imagery, giving players a relatively immediate illusion of virtual reality - such as a puppy licking the screen that appears to live inside the machine. The 3-D games don't require the special glasses that are needed for 3-D theater movies or 3-D home-console games like rival Sony Corp.'s PlayStation 3. They also don't need 3-D TV sets. Iwata said the drawback for 3-D technology was that the appeal of the feature can't be conveyed easily in TV or magazine ads. Fears have also been growing about the health effects of too much 3-D as some people have gotten sick looking at 3-D movies or playing 3-D games. "We are not taking the success of the 3DS for granted," Iwata told reporters at Makuhari Messe hall in this Tokyo suburb. "The value of the 3-D experience can be understood only by getting people to try it out." Nintendo said that several 3-D games were in the works including its trademark Super Mario games and "nintendogs + cats." Outside game developers were also preparing products, such as a 3DS "Biohazard" from Capcom Co. The 3-D handheld version of "Metal Gear Solid," from Konami Digital Entertainment, shown to reporters on the machine as a demonstration movie, but not in playable game form, presented vivid animation of jungle scenery, buzzing bees and a warrior's hands, all in 3-D, inside the tiny screen. The 3-D feature is adjustable by a button at the side so players can choose the amount of 3-D razzle-dazzle they want. Nintendo said that wireless technology packed in the 3DS will allow owners to automatically communicate with passers-by who also have 3DS, allowing them to trade avatar figures and combat each other in fighting games. Nintendo did not disclose details of the wireless technology, but Iwata said it was beefing up connectivity for 3DS at Japanese fast-food chains, train stations and other spots for social networking as well as gaming. Nintendo was among the earliest developers of 3-D technology. Its Virtual Boy, which went on sale in the 1990s, bombed, partly because of the bulky headgear required as well as the image being all red. Iwata acknowledged that failure but said the company had learned from past mistakes. "Players will be able to move freely around in virtual gaming space with our new 3-D," he said. Future Surgeon Prerequisite: Video Gaming Video gamers rejoice, your potential future career as a surgeon just got a little less daunting. Forget a morbidly precocious interest in Gray's Anatomy at some tender age, if you play video games, you're already on a trajectory toward a career involving advanced surgical techniques. Canadian research scientists recently found that hand-eye skills developed by gaming - no /great/ surprise here - train the brain for sophisticated visuomotor tasks, tuning skills necessary for complex surgical procedures involving images displayed on a video screen. Skills such as laparoscopic surgery, for instance. The study involved 13 males in their twenties who'd played video games a minimum of four hours a week for the prior three years, compared with 13 males who hadn't. Both groups were asked to complete tricky visuomotor tasks, such as using a joystick to accomplish specific goals, or looking one way while reaching in the opposite direction. "By using high resolution brain imaging, we were able to actually measure which brain areas were activated at a given time during the experiment," said Lauren Sergio, associate professor in the Faculty of Health at York University in Ontario. "We tested how the skills learned from video game experience can transfer over to new tasks, rather than just looking at brain activity while the subject plays a video game." Non-gamers tend to use their parietal cortex, which integrates spatial sensory information, according to the study's results, while the group of gamers (or those with more recent gaming experience, anyway) used their prefrontal cortex instead. What's the difference? The prefrontal cortex "receives highly processed information from all major forebrain systems, and neurophysiological studies suggest that it synthesizes this into representations of learned task contingencies, concepts and task rules," according to a 2002 scientific paper titled "The prefrontal cortex: categories, concepts and cognition." "In short, the prefrontal cortex seems to underlie our internal representations of the 'rules of the game'. This may provide the necessary foundation for the complex behavior of primates, in whom this structure is most elaborate." The other spot of good news: The York researchers believe this could be a major breakthrough for Alzheimer's patients, whose visuomotor skills can become severely impaired as the disease progresses. The study doesn't indicate what type of games lead to prefrontal versus parietal brain area use, but it's something the York research group hopes to determine in the future, as well as whether gender plays a role. =~=~=~= A-ONE's Headline News The Latest in Computer Technology News Compiled by: Dana P. Jacobson U.S. Cyber Command Slips Behind Schedule U.S. Cyber Command, responsible for shielding 15,000 U.S. military networks and for being ready to go to war in cyberspace, has slipped behind schedule for becoming fully operational, the Defense Department said on Friday. The command is still putting necessary capabilities in place, said Bryan Whitman, a Pentagon spokesman. It had been due to be declared fully operational no later than this month, a deadline some had read as October 1. Cyber Command leads day-to-day protection of all U.S. defense networks and is designed to mount offensive strikes if ordered to do so. It began operating in May 2010, seven months later than initially ordered by Defense Secretary Robert Gates. Gates ordered the command's creation in June 2009 to consolidate far-flung units under a four-star general after determining the cyber threat had outgrown the military's existing structures. More than 100 foreign intelligence organizations are trying to break into U.S. networks, Deputy Defense Secretary William Lynn wrote in the latest issue of Foreign Affairs. Some "already have the capacity to disrupt" U.S. information infrastructure." Whitman declined to name a new target for reaching full operational capability. The important thing, he said, was building the capabilities, not an "artificial date." The department blamed the schedule slip chiefly on what Whitman called a seven-month delay in Senate confirmation of Army officer Keith Alexander as head of the new unit located at Fort Meade, Maryland. Alexander was confirmed on May 7. Alexander, 58, also heads the National Security Agency, the Fort Meade-based Defense Department arm that protects national security information and intercepts foreign communications. He told the House of Representatives Armed Services Committee last week that putting cyber defenses fully in place was urgent. At the time, he voiced no expectation of a delay in reaching full operating capability. "The need is great and there is no time to lose," Alexander said in an opening statement to the panel on September 23. He cited the emergence of new tools that could damage or destroy systems and "have effects approaching those of weapons of mass destruction." A Senate Armed Services Committee staff member said the delay in Alexander's confirmation followed what he called the Defense Department's "failure to provide information to the committee in a timely fashion." Committee Chairman Carl Levin said in opening Alexander's April 15 confirmation hearing that the panel had moved "methodically to gain an understanding of what the Congress is being asked to approve and what the key cyberspace issues are that need to be addressed." The 24th Air Force, a Cyber Command component, was declared fully operational on Friday by General Robert Kehler, commander of Air Force Space Command, the Air Force said. U.S. Mounting First Test of Cyber-Blitz Response Plan The United States is launching its first test of a new plan for responding to an enemy cyber-blitz, including any attack aimed at vital services such as power, water and banks. Thousands of cyber-security personnel from across the government and industry are to take part in the Department of Homeland Security's Cyber Storm III, a three- to four-day drill starting Tuesday. The goals are to boost preparedness; examine incident response and enhance information-sharing among federal, state, international and private-sector partners. "At its core, the exercise is about resiliency - testing the nation's ability to cope with the loss or damage to basic aspects of modern life," said a release made available at DHS's National Cybersecurity and Communications Integration Center in Arlington. The simulation tests the newly developed National Cyber Incident Response Plan, a coordinated framework ordered by President Barack Obama. The plan is designed to be flexible and adaptable enough to mesh responders' efforts across jurisdictional lines. Refinements may be made after the exercise, DHS officials said. The test involves 11 states, 12 foreign countries 60 private companies. Six cabinet-level departments are taking part beside Homeland Security: Defense, Commerce, Energy, Justice, Treasury and Transportation, as well as representatives from the intelligence and law-enforcement worlds. Cyber Storm III takes place amid mounting signs that bits and bytes of malicious computer code could soon be as central to 21st-century conflict as bullets and bombs. "There is a real probability that in the future, this country will get hit with a destructive attack and we need to be ready for it," U.S. Army General Keith Alexander, the head of a new military cyber-warfare unit, told reporters last week, referring to computer-launched operations. Cyber Storm III involves simulated harm only, not real impact on any network, said Brett Lambo, the exercise director. In the drill, mock foes hijack Web security infrastructure used by businesses, government and consumers to verify and authenticate online transactions. In so doing, they upend Internet reliability and relationships before launching major attacks against the government, certain critical infrastructure, public sector enterprises and international counterparts. Officials did not spell out the scenario's details to preserve the surprise of exercise play. Among the industry sectors currently represented at the 24-hour watch and warning hub are information technology, communications, energy and banking and finance, said Sean McGurk, the DHS official who directs the hub inaugurated last October. Other participants take part from the locations where they would normally respond to a cyber-attack. The foreign "players" are from Australia, Britain, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden and Switzerland. Lawmakers Decry US Failure To Stop 'Jihadi Websites' US lawmakers Wednesday lamented their inability to shutter Internet websites set up by violent Islamist groups such as Al-Qaeda that aim to inspire, recruit and train would-be extremists. "Can we? Yes. Will we? No," Representative Brad Sherman told AFP after a House hearing that sought to pin down a US strategy for the websites, referring to the possibility Congress could clamp down on extremists' online portals. "It is more likely we will tie ourselves up in knots than we'll do anything useful," added Sherman, chairman of the Subcommittee on Terrorism, Nonproliferation and Trade, which held the hearing. He said bureaucratic wrangling and free speech advocates were the main obstacles to giving the US government legal tools to eliminate the sites. Sherman earlier even lashed out during the hearing at popular video-sharing website YouTube for allowing Yemen-based Al-Qaeda in the Arabian Peninsula (AQAP) to post videos with English subtitles that promotes a "jihadist ideology" from its own channel. "I don't know how much money YouTube makes, how much its executives make, but they are endangering people throughout America for their own profit," he said. "And it's not about (YouTube's) loyalty to the concept of the First Amendment, it's about their loyalty to money," he complained, referring to the US Constitution which protects freedom of expression. Sherman also questioned whether US authorities should maintain the groups' online outlets to gather intelligence or simply eliminate them, asking if the United States is "going to be a polite country or safe country." He concluded the United States was "manifestly unable to take down these sites through cyber attack because we are restrained by our own politeness." Gregory McNeal, a law professor at California's Pepperdine University, testified before the hearing that there was "no concerted government effort to shut down jihadist websites" because there was no legal avenue that allows it. McNeal later told AFP the biggest issue preventing US legislators from going after such sites was "civil liberties opposition groups that would see this as a threat to free speech." The best way to take them down, McNeal said, was to go through blacklists maintained by the US Treasury and State Department for terrorist organizations, adding the approach would be difficult as authorities would have to verify the websites were maintained by those designated groups. "The Supreme Court has never spoken on crime-facilitation speech... there's always a challenge between drawing the line between merely informative speech and speech that facilitates a crime with the intent of doing so," he said. "Is it surmountable? No. Because unless there's a triggering event like an attack that was prompted by a video (on an extremist website), it's easier to keep the status quo. Sadly, we often wait for an attack before we take action." The rise of extremist groups employing online media to attract followers and give tips on how to pursue jihad against Western targets was highlighted this year with the launch of an English-language Al-Qaeda magazine from AQAP - removing the language barrier for non-Arabic speakers to the group's ideology. The first edition of "Inspire" magazine in June ran articles such as one entitled "Make a Bomb in the Kitchen of Your Mom" and featured sleek pictures of Al-Qaeda leaders accompanied by sleek graphics. Pete Hoekstra, the top Republican on the House Intelligence Committee, said upon the magazine's launch that AQAP's effort was "unfortunately well done," and proof "Al-Qaeda and its affiliates have launched a direct appeal for Americans to launch small-scale attacks here at home." US Seeks To Ease Internet Wiretaps The Obama administration is drawing up legislation to make it easier for US intelligence services to eavesdrop on the Internet, including email exchanges and social networks, The New York Times said Monday. The White House intends to submit a bill before Congress next year that would require all online services that enable communications to be technically capable of complying with a wiretap order, including being able to intercept and unscramble encrypted messages, the Times reported. The services would include encrypted email transmitters like BackBerry, social networking websites like Facebook and peer-to-peer messaging software like Skype. Federal law enforcement and national security officials are seeking the new regulations, arguing that extremists and criminals are increasingly communicating online rather than using phones. "We're talking about lawfully authorized intercepts," said Federal Bureau of Investigation (FBI) general counsel Valerie Caproni. "We're not talking expanding authority. We're talking about preserving our ability to execute our existing authority in order to protect the public safety and national security." Officials from the White House, Justice Department, National Security Agency, FBI and other agencies have been meeting in recent months to craft the proposals, the Times said. But, citing officials familiar with the discussions, it said the participants had not yet agreed on important elements, such as how to define which entities are considered communications service providers. President Barack Obama's administration is seeking a broad mandate that would also apply to companies whose servers are operated abroad, such as Research in Motion, the Canadian maker of BlackBerry smartphones. As an example, officials told the Times that investigators discovered that Faisal Shahzad, the suspect from the failed Times Square bombing in May, had been using a communication service without prebuilt interception capacity. That meant that there would have been a delay before he could have been wiretapped, had he aroused suspicion beforehand, the officials said. Leaked Bill Aims to Create Net Neutrality Law Draft legislation from the U.S. Congress would create a new network neutrality law but would prohibit the U.S. Federal Communications Commission from making its own rules prohibiting broadband providers from selectively slowing Web traffic. The draft bill, published on NationalJournal.com, would hold mobile broadband providers to a less stringent net neutrality standard than wired carriers. The bill, authored by Democrats including House Energy and Commerce Committee Chairman Henry Waxman, would prohibit wired broadband providers from "unjustly or unreasonably" discriminating against legal Web traffic, but would not apply that prohibition to mobile providers. The bill would prohibit both wired and mobile providers from blocking consumer access to websites and from blocking legal websites. Mobile carriers have argued that net neutrality rules shouldn't apply to them because of the limited bandwidth on their networks. The legislative proposal is similar in some ways to a net neutrality plan released in August by Google and Verizon Communications. Like the Google and Verizon plan, the Waxman draft would allow the FCC to fine broadband providers up to US$2 million for violating net neutrality rules, but the Waxman proposal would not take away the rulemaking authority of the FCC. The Google and Verizon plan, criticized by many net neutrality advocates, would require the FCC to enforce net neutrality principles on a case-by-case basis. The new draft won praise from some groups that have opposed the FCC's efforts this year to create formal net neutrality rules. Waxman's bill would prohibit the FCC from reclassifying broadband as a common-carrier service subject to increased regulation by the agency. FCC Chairman Julius Genachowski has proposed reclassifying broadband from being a largely unregulated service. That move came after a U.S. appeals court ruled earlier this year that the agency did not have the authority to enforce informal net neutrality principles after Comcast slowed its customers' access to the BitTorrent peer-to-peer service. An FCC spokeswoman declined to comment on the draft bill, as did a spokesman for Public Knowledge, a digital rights group pushing for stronger net neutrality rules. Scott Cleland, chairman of the broadband carrier-backed NetCompetition.org, praised the House draft. "This House Democrat draft signals to the FCC Democrat majority loud and clear that House Democrats do not support the radical ... proposal to regulate broadband Internet networks as 1934 common carrier telephone networks," he said in an e-mail. "This legislation proposes a sensible resolution and workable alternative to this destructive polarizing issue that is serving no one who seeks an open Internet that works, grows and innovates without anti-competitive concerns." The draft includes some "positive elements," but also raises some concerns, added Randolph May, president of the free-market think tank, the Free State Foundation. The bill's December 2012 expiration date would allow Congress to focus on broader telecom law reform, May said. But he questioned the bill's prohibition on content discrimination. "If interpreted too rigidly by the FCC, this legacy common carrier-type restriction can inhibit development of new, differentiated services in response to evolving consumer demand," he said. "I think any discrimination prohibition should explicitly require a showing of consumer harm as a prerequisite to any agency remedial action." House Democrats Shelve Net Neutrality Proposal House Democrats have shelved a last-ditch effort to broker a compromise on the thorny issue of "network neutrality." The Democrats late Wednesday abandoned proposed rules meant to prevent phone and cable companies from playing favorites with the online traffic flowing over their networks. House Commerce Committee Chairman Henry Waxman, R-Calif., had led the effort. He gave up in the face of Republican opposition to his plan. Waxman's retreat is a setback for the nation's big phone and cable companies. They fear the issue could now go back to the Federal Communications Commission, which could impose more restrictive rules on the industry. The FCC has also deadlocked over the net neutrality issue. "If Congress can't act, the FCC must," Waxman said in a statement. Worm Hits Computers of Staff at Iran Nuclear Plant A complex computer worm capable of seizing control of industrial plants has affected the personal computers of staff working at Iran's first nuclear power station weeks before the facility is to go online, the official news agency reported Sunday. The project manager at the Bushehr nuclear plant, Mahmoud Jafari, said a team is trying to remove the malware from several affected computers, though it "has not caused any damage to major systems of the plant," the IRNA news agency reported. It was the first sign that the malicious computer code, dubbed Stuxnet, which has spread to many industries in Iran, has also affected equipment linked to the country's nuclear program, which is at the core of the dispute between Tehran and Western powers like the United States. Experts in Germany discovered the worm in July, and it has since shown up in a number of attacks - primarily in Iran, Indonesia, India and the U.S. The malware is capable of taking over systems that control the inner workings of industrial plants. In a sign of the high-level concern in Iran, experts from the country's nuclear agency met last week to discuss ways of fighting the worm. The infection of several computers belonging to workers at Bushehr will not affect plans to bring the plant online in October, Jafari was quoted as saying. The Russian-built plant will be internationally supervised, but world powers are concerned that Iran wants to use other aspects of its civil nuclear power program as a cover for making weapons. Of highest concern to world powers is Iran's main uranium enrichment facility in the city of Natanz. Iran, which denies having any nuclear weapons ambitions, says it only wants to enrich uranium to the lower levels needed for producing fuel for power plants. At higher levels of processing, the material can also be used in nuclear warheads. The destructive Stuxnet worm has surprised experts because it is the first one specifically created to take over industrial control systems, rather than just steal or manipulate data. The United States is also tracking the worm, and the Department of Homeland Security is building specialized teams that can respond quickly to cyber emergencies at industrial facilities across the country. On Saturday, Iran's semi-official ISNA news agency reported that the malware had spread throughout Iran, but did not name specific sites affected. RIM Unveils PlayBook Tablet to Compete with iPad Research In Motion unveiled a tablet computer on Monday that it hopes will leapfrog Apple's iPad with its potential for social networking, media publishing and corporate uses. The tablet, named BlackBerry PlayBook, has a seven-inch screen and dual facing cameras. It has WiFi and Bluetooth but needs to link with a BlackBerry smartphone to access the cellular network. Shares of RIM jumped nearly 2 percent to $49.29 in after-hours trade following the announcement, made at the company's annual developers' conference in San Francisco. "It's ultra-mobile and it's ultra-thin," co-Chief Executive Mike Lazaridis told the developers, who responded with intermittent applause. "PlayBook delivers a no-compromises web experience," he said. PlayBook can mirror a BlackBerry phone, giving users a bigger screen to view media and edit documents, and wipes all corporate data once the link between the two devices is broken. The PlayBook weighs 400 grams (14 ounces). It will launch with a dual-core, one gigahertz processor running a QNX kernel and operating system that can incorporate BlackBerry OS 6, which RIM introduced in its Torch smartphone in August. The market for tablets - touchscreen devices larger than a smartphone and smaller than a laptop - has gotten more congested since Apple launched its iPad in April, with Samsung and Dell showing off releases in the past two months and others expected from Hewlett-Packard and Toshiba. While the market's direction is relatively uncharted, most analysts agree success will be measured by which applications each tablet can run. "RIM has a strong story to tell to developers to say - look, however you want to make things for this thing, we're giving you tools and a platform that will allow you to do that," said Forrester Research principal analyst Charles Golvin. The QNX operating system uses industry standard APIs, or application programing interfaces, meaning developers should have little difficulty in making their games, software and other applications work on the device. "All the code that is out there, and there is a huge source base out there, (it) is completely portable to QNX," said Dan Dodge, who co-founded and led the company until RIM acquired QNX less than a year ago. RIM expects to ship the device to corporate customers and developers in October. It will become commercially available early in 2011. RIM has yet to set an exact price but says it will fall in the lower range of prices for consumer tablets already in the suddenly congested market. Asked if later versions will connect to advanced 4G networks now under development, RIM co-Chief Executive Jim Balsillie told Reuters: "That's not a question we're answering today, but it's not a hard one to guess at." The absence of a direct link to the cellular network means network carriers may be less eager to subsidize the device or promote it heavily. But corporate IT departments will likely cheer about its ability to mirror a company-issued BlackBerry without retaining that data when that link is broken. "It's compelling, certainly to an IT guy, if they can look at this tablet and say it's really nothing we have to lock down," said Kevin Burden from ABI Research. "An IT manager can look at this tablet and say we don't even need to put this on our asset-tracking list." Acer Tries Another 3D Laptop With Aspire AS5745DG Acer will make 3D part of its holiday laptop lineup with the Acer Aspire 5745DG, but don't accuse the computer maker of joining the bandwagon. Acer was already pushing 3D notebooks last year, before any television makers introduced 3D sets stateside and began hyping them as the next big thing in home entertainment. Last year's model, the Acer Aspire 5738DG, was praised in PCWorld's review for converting 2D movies effectively and excelling at 3D games, but faltered on weak battery life and a cheap-feeling touchpad. The new Acer Aspire 5745DG takes a different approach to 3D compared to its predecessor. Instead of using polarized glasses (the cheaper kind you get in movie theaters), this laptop goes full-bore with active shutter glasses, like the ones used with today's 3D televisions, and a built-in IR receiver. Acer says each eye sees a 60 Hz signal as the glasses alternate images between the left and right eyes, creating the 3D effect. For content, the Aspire 5745DG's main draw will be 3D gaming, using Nvidia's 3D Vision technology (here's a list of supported games, sorted by how well they perform in 3D). But Acer's notebook also packs a 3D Blu-ray player and includes a feature that converts 2D images to 3D. As for other specs, Acer's Aspire 5745DG runs on an Intel Core i5 processor with NVIDIA GeForce GT 420M graphics and a 500 GB hard drive, but no word on RAM. The laptop also includes a webcam and 802.11 a/b/g/n Wi-Fi. Can the 5745DG overcome the battery problems of last year's model? Hard to say, because Acer avoided giving an estimate on battery life in its product announcement. However, the new notebook has a 9-cell battery. Hopefully, that'll outlast the 6-cell battery in the 5738DG, which cranked for a measly 2 hours and 28 minutes in /PCWorld's/ tests. Acer isn't the only company working on a 3D laptop with active-shutter glasses. HP's Envy 17 is coming this holiday season. Toshiba and Sony have also announced 3D laptop plans. Acer's Aspire 5745DG will arrive in late October for a cool $1000. Microsoft Beefs Up Hotmail Security Microsoft is beefing up security for Hotmail in order to curtail hijacking and phishing scams on legitimate accounts. "These updates will help you protect your password and, in the unlikely event that a hijacker gains access to your account, provide a more secure recovery path so you will always be able to get your account back and kick the hijackers out," John Scarrow, Microsoft's general manager of safety services, wrote in a blog post. In addition to pre-existing security measures, Hotmail is adding a couple of password proofs to keep accounts from being infiltrated. Scarrow compared proofs to a set of spare keys when you've been locked out of your house. Previously, users locked out of their accounts were asked to provide an alternate e-mail address or answer a personal question to prove their identities. However, "only 25 percent of people with a secret question actually remembered their answer when needed," Scarrow wrote. As a result, Microsoft introduced two new Hotmail account recovery options: cell phone verification and a link to a "trusted PC." With the phone option, Microsoft will send a single-use password via text message that you can use to activate your account. With "trusted PC," meanwhile, you can link your account to two or more personal computers. "Then, if you ever need to regain control of your account by resetting your password, you simply need to be using your computer and we will know you are the legitimate owner," Scarrow wrote. As an added layer of security, making changes to your Hotmail account - like adding your cell phone number or a trusted PC - would require you to access an existing proof, like that second e-mail address. "This means that even if a hijacker steals your password, they can't lock you out of your account or create backdoors for themselves," Scarrow said. Microsoft also pledged to monitor the reputations of IP addresses in order to more readily pick up on potential threats. Microsoft rolled out an updated version of Hotmail for its 360 million users this year, finishing up earlier this month. It also incorporated Facebook chat and a partnership with professional networking site LinkedIn, and allowed for users to post updates simultaneously to all their connected networks. It also added Microsoft Exchange ActiveSync for e-mail, contacts, and calendar to the iPhone. Google Gives Gmail Users More Control Over Inboxes Google Inc. is addressing one of the biggest complaints about its free e-mail service by giving people more control over how their inboxes are organized. The new option announced Wednesday will allow Gmail users to choose whether they prefer their incoming messages stacked in chronological order, instead of having them threaded together as part of the same electronic conversation. Gmail has been automatically grouping messages by topic or senders since Google rolled out the service six years ago. But this so-called "conversation view" confused or frustrated many Gmail users who had grown accustomed to seeing all their newest messages at the top of the inbox followed by the older correspondence. After all, that's how most other e-mail programs work. The complaints grew loud enough to persuade Google to revise the Gmail settings so users can turn off conversation view and unravel their messages. "We really hoped everyone would learn to love conversation view, but we came to realize that it's just not right for some people," Google software engineer Doug Chen wrote in a Wednesday blog post. The aversion to conversation view doesn't seem to be widespread. Gmail ended July with nearly 186 million worldwide users, a 22 percent increase from the same time a year ago, according to the research firm comScore Inc. Both Microsoft's Windows Live Hotmail (nearly 346 million users) and Yahoo's e-mail (303 million users) are larger, but aren't growing nearly as rapidly as Gmail. Google Opens Goo.gl URL Shortening Service to the Public Before Twitter blew up and everyone started thinking in 140 characters, no one really cared about having long URLs. With Twitter users scrambling to solve the 140-character puzzle, URL shortening sites like Bit.ly, TinyURL, and Ow.ly have grown increasingly popular. Google on Thursday jumped into the game and announced its own URL shortening site, Goo.gl. The Google URL shortener was actually introduced last December as part of Google Toolbar and Feedburner. Since then, the service has been integrated into Google News, Blogger, Google Maps, Picasa Web Albums, and Google Moderator. But until now, there was no standalone Google site to shorten a URL. But why bother with Goo.gl when there are already other sites you can use? According to Google's Social Web Blog, "when you click a goo.gl shortened URL, you're protected against malware, phishing and spam using the same industry-leading technology we use in search and other products." Like many of the URL shortening sites, goo.gl is pretty basic. However, it does have some nice URL-tracking features. For example, when you sign into your Google account, you can see a list or URLs that you've shortened. You can then view public, real-time analytics data, including traffic over time, top referrers, traffic sources, and visitor profiles for countries, browsers, and platforms. Also, according to Mashable, there's a hidden Easter egg in Goo.gl. "Earlier today, Google engineer Matt Cutts tweeted ... add .qr to a shortened goo.gl URL and you'll create a QR code that, when scanned, will redirect to the original URL. It's a quirky additive that makes goo.gl all the more friendly for brands and marketers experimenting with QR codes. A Twitter tipster also informed us that you can add .info to the goo.gl URL to check out analytics," Mashable said. Microsoft Marks Anti-Malware Anniversary with Stats To mark the first anniversary of Microsoft Security Essentials, the company has released some sobering statistics it has gathered during the past year via the free anti-malware software. According to Microsoft, Security Essentials has been installed on 31 million computers worldwide. Out of that group, 27 million users reported malware infections during the year. The United States was the most frequently attacked country. Microsoft said that during the past year, more than 2 million U.S. machines were attacked and reported the infections to the Microsoft Malware Protection Center. The U.S. was followed by China, which had over 693,000 attacks reported to the center. Brazil and the United Kingdom took the third and fourth spots with over 586,000 attacks hitting Brazil and more than 212,000 attacks reported by U.K. users. It's worth noting that those figures are only threats reported to Microsoft. They do not represent all the attacks that occurred in the Windows ecosystem throughout the year. Overall, Microsoft Security Essentials detected nearly 400 million threats during the past year, Microsoft said. Security Essentials users opted to remove 366 million of those threats. Although those figures might highlight the issues Windows users continue to have staying safe from malware infections, Microsoft was quick to point out that it believes the past year has been a success for Security Essentials. In fact, Microsoft said in a blog post that the company is doing its part to "increase security across the Windows ecosystem." Security Essentials has enjoyed some acclaim since its release last year. CNET's review described the software as one of the "good set-it-and-forget-it security programs" and gave it four and a half out of five stars. OpenOffice.org Volunteers Cut Ties with Oracle LibreOffice. That's the possible new name of OpenOffice.org. The volunteers that develop and promote the free office software severed ties with Oracle on Tuesday and formed an independent group called The Document Foundation. OpenOffice.org successfully grew under the Sun Microsystems banner for a decade, but the volunteers believe a new ecosystem will generate more competition and choice for customers, as well as drive innovation in office-productivity software. The group also hopes to lower the barrier of adoption for users and developers. In essence, the group wasn't happy under Oracle. Oracle acquired the OpenOffice.org assets along with its acquisition of Sun. The Document Foundation has invited Oracle to become a member of the new foundation, and has asked the tech giant to donate the brand name. Until Oracle responds, the group is using the name LibreOffice. The break has been widely lauded by software companies large and small. Chris DiBona, open-source programs manager at Google, called The Document Foundation a great step forward in encouraging further development of open-source office suites. "Having a level playing field for all contributors is fundamental in creating a broad and active community around an open-source software project," DiBona said. Red Hat's Jan Wildeboer and Canonical's Mark Shuttleworthy, among many others, also offered support for the project. And Guy Lunardi, product management director at Novell, made a bold statement: "Viva la LibreOffice. Ultimately, we envision LibreOffice will do for the office-productivity market what Mozilla Firefox has done for browsers." The Document Foundation vowed to build on the work of OpenOffice.org. The founders noted that the group was created in the belief that an independent foundation is the best fit to the community's core values of openness, transparency and valuing people for their contributions. Oracle has released two stable versions of the open-source software since the Sun merger, but the OpenOffice.org community didn't jibe with Oracle's vision. Oracle couldn't immediately be reached for comment. But Al Hilwa, an analyst at IDC, isn't surprised that the community is breaking away from Oracle. "Is Oracle going to run things more tightly than Sun? No doubt. It's a tighter ship. They are going to make some decisions about what to support and what not to support, who to invest in and who not to," Hilwa said. "I wouldn't expect any less from them." The question is, could Oracle's decision to run a tighter ship ultimately become a problem with its open-source connections? There is already tension between Oracle and open-source communities. Hilwa said it could cause some issues for developers. "Oracle's DNA is to make decisions around cost and investments and tight control," Hilwa said. "It's not like Oracle to scatter investments and resources all over the place without any specific quid pro quo." Users Making the Switch to Cutting Edge Browsers New Web browser market share stats are out. This past month has seen a decline in the overall market share of the Internet Explorer franchise, but breaking things down by version shows that more users are adopting the latest generation of Web browsers whether it's Internet Explorer, Firefox, or Chrome. Microsoft's Internet Explorer declined again in overall market share for the first time in a few months. The browser as a whole lost .75 percent - with Internet Explorer 6 dropping .63 percent, and Internet Explorer 7 falling half a percent. Those losses were offset, though, by yet another significant gain for Internet Explorer 8 - climbing 1.16 percent since the last month. Chrome 6 had by far the largest gain over the previous month, coupled with Chrome 5 taking the most precipitous plunge. Overall, Chrome is upslightly, but that is after a decline of 4.33 percent by Chrome 5 and a swift rise of 4.66 percent over the previous month for Chrome 6. Apparently the vast majority of Chrome users willingly embraced the latest browser and made the switch. Firefox users followed the same trajectory. The use of Firefox 3.5 fell .18 percent. However, the latest official release, Firefox 3.6, went up .25 percent, and Firefox 4 - which is still only in beta - went up .08 percent. Even Internet Explorer 9 is riding the cutting edge browser popularity wave. It has only been two weeks since Microsoft publicly launched the beta of Internet Explorer 9 at a media event in San Francisco. In that brief period, though, the beta of Microsoft's next major update to the Internet Explorer Web browser has already been downloaded more than six million times. In an Exploring IE blog post, Microsoft's Ryan Gavin notes, "Net Applications' browser usage share report released today shows IE9 Beta usage share at 0.25 percent for the two weeks after launch. The tech enthusiast community is observing a notable increase in IE9 activity: LiveSide reported IE9 Beta users accounted for 25 percent of their reader base, IE9 overtook IE6 users at DownloadSquad, and Network World reported poll results showing 47 percent of people intend to try IE9 Beta. Additionally, we saw tweets from the likes of Ed Bott who noticed, "Halfway through Day 1 of IE9 availability, 8 percent of my ZDNet visitors are using the beta. Steady increase all day, higher than IE7."" Some of that upswing may be a function of the success of Windows 7 and an increase in PC sales. Users who have clung to outdated browsers like IE6 would suddenly have IE8 by default on a new Windows 7 system, and in the event that a user chooses not to use Internet Explorer, the likelihood is that they will install the latest version of whatever browser it is they opt to install. Regardless, of the reasons behind the numbers, new Web technologies need new Web browsers, so the transition to cutting edge Web browsers benefits developers, as well as everyone else who surfs the Web. U.S. Busts $3M 'Zeus Trojan' Cyber Crime Ring The Manhattan U.S. Attorney on Thursday announced charges against 37 individuals for their roles in cyber attacks that logged keystrokes to help the criminal steal $3 million from dozens of U.S. bank accounts. The cyber-attacks, using malware known as the "Zeus Trojan," started in Eastern Europe. E-mails were sent to computers and U.S. small businesses and municipalities, and if opened, the malware embedded itself in the victims' computers and recorded their keystrokes. Those keystrokes were used to capture bank account numbers, passwords, and other online security codes. Hackers then used the personal information to take over peoples' bank accounts and transfer money to accounts set up by their co-conspirators. These accounts were set up by a "money mule organization," which recruited people in the U.S. on student visas to set up bank accounts using fake passports. Once the accounts were set up, and the money was transferred in from the victims' accounts, the mules forwarded the cash to the scammers' bank accounts - many of them overseas. All told, the scammers made off with $3 million. N.Y. Attorney General Preet Bharara said 37 defendants have been charged in 21 separate cases. Ten people were arrested early Thursday, while an additional 10 were previously arrested. Seventeen people are still being sought in the U.S. and abroad. The defendants charged in Manhattan federal court include managers of and recruiters for the money mule organization, an individual who obtained the false foreign passports for the mules, and money mules. "The digital age brings with it many benefits, but also many challenges for law enforcement and our financial institutions. As today's arrests show, the modern, high-tech bank heist does not require a gun, a mask, a note, or a getaway car. It requires only the Internet and ingenuity," Bharara said in a statement. "And it can be accomplished in the blink of an eye, with just a click of the mouse. But today's coordinated operation demonstrates that these 21 Century bank robbers are not completely anonymous; they are not invulnerable. Working with our colleagues here and abroad, we will continue to attack this threat, and bring cyber criminals to justice." =~=~=~= Atari Online News, Etc. is a weekly publication covering the entire Atari community. Reprint permission is granted, unless otherwise noted at the beginning of any article, to Atari user groups and not for profit publications only under the following terms: articles must remain unedited and include the issue number and author at the top of each article reprinted. Other reprints granted upon approval of request. Send requests to: dpj@atarinews.org No issue of Atari Online News, Etc. may be included on any commercial media, nor uploaded or transmitted to any commercial online service or internet site, in whole or in part, by any agent or means, without the expressed consent or permission from the Publisher or Editor of Atari Online News, Etc. Opinions presented herein are those of the individual authors and do not necessarily reflect those of the staff, or of the publishers. All material herein is believed to be accurate at the time of publishing.