Volume 12, Issue 47 Atari Online News, Etc. November 19, 2010 Published and Copyright (c) 1999 - 2010 All Rights Reserved Atari Online News, Etc. A-ONE Online Magazine Dana P. Jacobson, Publisher/Managing Editor Joseph Mirando, Managing Editor Rob Mahlert, Associate Editor Atari Online News, Etc. Staff Dana P. Jacobson -- Editor Joe Mirando -- "People Are Talking" Michael Burkley -- "Unabashed Atariophile" Albert Dayes -- "CC: Classic Chips" Rob Mahlert -- Web site Thomas J. Andrews -- "Keeper of the Flame" With Contributions by: Fred Horvat To subscribe to A-ONE, change e-mail addresses, or unsubscribe, log on to our website at: www.atarinews.org and click on "Subscriptions". OR subscribe to A-ONE by sending a message to: dpj@atarinews.org and your address will be added to the distribution list. To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE Please make sure that you include the same address that you used to subscribe from. To download A-ONE, set your browser bookmarks to one of the following sites: http://people.delphiforums.com/dpj/a-one.htm Now available: http://www.atarinews.org Visit the Atari Advantage Forum on Delphi! http://forums.delphiforums.com/atari/ =~=~=~= A-ONE #1247 11/19/10 ~ Holiday Phishing Scam! ~ People Are Talking! ~ Facebook's Messaging! ~ AOL's Project Phoenix! ~ 'Path' Social Network! ~ GeekBuddy Instant Help ~ Malware At Record High ~ Yars' Revenge Is Back! ~ Pirate Sites, Beware! ~ MySpace Syncs Facebook ~ Re-tweet Costs Woman! ~ "at" Is So much More! -* Pentagon Aware of Re-routing *- -* Majority In Favor of Video Game Laws *- -* U.S. Sees "Huge" Cyber Threat in the Future *- =~=~=~= ->From the Editor's Keyboard "Saying it like it is!" """""""""""""""""""""""""" It's been another one of those long and arduous weeks around here - plenty of work either on the job or working at home. But, as most of you know all too well, it's stuff that has to be done. And at this time of the year, it's leaves and more leaves! The trees, after some good rainstorms and days with gusty winds, are almost bare. Hopefully it will only take one or two more days out there cleaning them up; and then I'll be finished for another fall season. We'll see. As is typical for Joe this time of the year, I'm sure that in his column this week, he'll mention a reminder to you all about making a donation of food to a local food pantry or something comparable. It's a reminder that needs to be made on occasion. My wife and I did something this week that, now that I think about it, is an act similar to helping the needy. As you might recall, we're avid dog lovers. Over the years, we've rescued three dogs from area shelters; and they've become loved members of our family. A couple of years ago, we lost one of them, and then adopted a "cast-off" greyhound a few months later. Every once in awhile my wife or I take a look at the shelter's web site to see what kinds of dogs are waiting to be adopted. We jokingly comment how we'd like to adopt a bunch more, but we also realize that to do so wouldn't be the best thing to do, for us. Facts are, taking care of dogs, while an amazing source of enjoyment and affection, requires a lot of work. It wouldn't be fair to have a house full of dogs and not be able to give them all the attention that they deserve. However, that doesn't stop us from looking! Earlier in the week, I happened to look at the shelter site again. There were a lot of great-looking dogs - all types and sizes. Personally, I enjoy the "real" dogs - larger breeds, the active types. But, there was one dog shown on the site that attracted my attention - not so much for the type of dog, but the write-up that accompanied the picture. This was a 6-year old female chihuahua. Yes, a small dog. But what got me intrigued was learning that this dog, "Precious", has Cushing's Disease, a terminal disease. Just knowing that with the couple of dozen of dogs available, it was likely going to be a slim chance that this small dog was going to garner much attention. Seriously, most people are interested in puppies, or healthy "older" dogs. What are the chances someone is going to take a second look at a dog that may only live another year or so? No, it's not cruel, but it's realistic. But somehow, something in me made me realize that this dog was facing a questionable future. It just didn't seem fair that she should be faced with the possibility of spending her last days in a shelter. Sure, she'd be given the best care, but what she really needed was a caring home. So, I mentioned it to my wife and suggested that we should look into possibly adopting this dog. But, I wanted to check into Cushing's Disease, and find out the financial needs to care for the dog - medication and other treatment. We went to the shelter the next day, bringing our two dogs to see how they interacted. The three dogs seemed to get along, at least negative behavior! We sat down and talked to one of the shelter counselors, and expressed interest. Our concern over medications and some treatments were quickly negated when we learned that the shelter would take care of the costs of medication and quarterly blood-testing. Routine check-ups and annual treatments were something that we figured was manageable, or we wouldn't even consider another dog. And, of course another positive factor was that Precious seemed to take to us! So, my wife and I looked at each other, and we both knew that this was something the wanted, and needed to do. We wanted this dog to spend whatever remaining time it had left to be in a good home. And now she is! So, I guess it's fairly appropriate for this time of the year, with Thanksgiving less than a week away. for us to be able to find a "different" way to give thanks, as well as help "someone" else. Enjoy your Thanksgiving holiday, and try to remember how this holiday came about and why we celebrate it. Sure, there's turkey and all the fixin's, football games, and more. Family is another important part of it. A good reason to give thanks is the all-important reason, however. Until next time... =~=~=~= PEOPLE ARE TALKING compiled by Joe Mirando joe@atarinews.org Hidi ho friends and neighbors. If you read Dana's editorial last week, then you know that I finally found one of those "job" things. I'm in the process of settling in and getting accustomed to my new 'situation', as they used to call it. It's a tough job, but a pretty good one, and I'm finding that I like the job and the people. I'm quality assurance manager at a small-ish manufacturer. Lots of stuff to do, lots of stuff to learn. I'm hanging in there... and so are they. [grin] But switching subjects here, I want to talk a little bit about one of my pet interests: High energy physics. No, I'm not educated in particle physics or anything, but it's always interested me, and I can grasp some of the simpler concepts involved... sometimes. Well, this past week scientists at the Large Hadron Collider (LHC) were actually able to create... wait for it... antimatter! Yes, that's right, trekkies. Real, honest to goodness antimatter. It's been done before, actually, antimatter electrons, or positrons, have been made in the lab for quite a while now. But what's different this time is that the scientists at CERN were able to create antiprotons along with the antielectrons and 'mate' them so to speak to make anti-hydrogen. This is a fairly big achievement, to put it lightly, since antimatter is so difficult to deal with. As you might know, antimatter and matter annihilate each other when they come into contact with each other, releasing large amounts of energy... incredible amounts, actually. So creating antimatter... any antimatter... is a big deal. There are certain radioactive elements that decay and shed antiparticles, by the way. The PET scans that are often used in medical scans. Yep, PET stands for Positron Emission Tomography. Basically (and this is a very simplified version), they inject a radioactive substance bonded to sugar molecules into you, give it a little time to circulate through your body and for your tissues to grab onto the sugar to use as food. The radioactive substance, being bonded to the sugar, is drawn in too. Over a short amount of time, the stuff decays and emits, among its various byproducts, positrons. When the positrons meet up with electrons, they annihilate one another and produce gamma rays (if I remember correctly). Each annihilation results in 2 gamma rays, heading in different directions. Sensors pick up the 'matched pairs' and they're traced back to their point of origin. Active muscle (and cancer cells) 'eat' a lot of sugar for energy, so the more gamma rays that are traced back to a particular area, the more energy they're using. This is a good way to see 'soft tissue', since they use more energy than bone does. But creating antimatter this way isn't useful for physics research. To be useful for scientific research, there's got to be another way. Slamming stuff together at very high speeds (approaching the speed of light) and capturing the resulting anti-particles requires that a lot of things be taken into account. There's the need for those huge superconducting magnets to contain and speed the stream of particles, a vacuum to keep the antiparticles from meeting up with their mirror counterparts and, maybe most importantly, a way to contain any antimatter you're lucky enough to make. Think about it; how do you contain something that will not only explode when it comes into contact with normal matter, but causes whatever it comes into contact with to blow up too? As some of you may know, the answer is a sort of "magnetic bottle" or trap. Think of it as a Thermos, but with magnetic fields instead of that silvery glass. Inside the trap is mostly vacuum. Otherwise the newly created and trapped antimatter would come into contact with its counterpart and both would be instantly converted from matter to energy. The energies involved are equally incredible. Positrons are created by, basically, slamming things together. Think of it as firing a stream of very hot, very fast 'stuff' like a bullet fired at a target and then 'catching' the fragments that come flying off. That's what those big superconducting magnets we've all heard about are for. It takes such a strong magnetic field to contain this stream or, in my analogy up above, "the bullet", that whizzes around the large tunnel... 17 miles of it... going faster and faster, spurred on by those superconducting magnets, slamming into another stream of particles going just as fast in the opposite direction and, to use a physics term... BLAMMO! Now comes the fun part. Not only do you have to keep these new anti-particles from touching their twins, you have to slow them down. They're incredibly hot and, therefore, incredibly energetic and traveling at a large percentage of the speed of light. If you're going to keep them safe and sound, you've got to slow them down. The best way so far to do that is with lasers; 'cooling' them with light. So let's pretend for a moment that we understand how all of that is done. From there, you have to keep these puppies from wandering around and banging into anything with 'normal matter'. THAT is why antihydrogen is interesting. You see, if all you have is, say, positrons (aka anti-electrons), they all have the same charge (positive) and repel each other. They ricochet here and there and bounce around until they hit something and... boom. But antihydrogen is a bit different. Since hydrogen is neutral, so is anti-hydrogen. That means that individual atoms of antihydrogen won't repel each other; they just kind of exist side by side. Now you have antimatter that doesn't fight itself, only its matter counterpart. Under the right circumstances, you can compress it into a gas, or maybe even a liquid. And maybe, just maybe, if you can cool and compress it enough, hydrogen ice. From there, if you can control how you handle it, you can actually control the flow of it and let meet up with regular hydrogen and actually create energy. Huge amounts of energy. That's why the starships in Star Trek used antimatter. The energy produced when matter and antimatter meet is far, far beyond what we're used to with our petroleum based engines. This latest experiment proved that we (or at least they) can create, trap and release in a controlled manner, antihydrogen. So is the age of energy from antimatter right around the corner? Unfortunately, no. For one thing, it's incredibly expensive, for another, it's incredibly difficult. And perhaps most importantly, we create incredibly little of it. The CERN experiment, at a cost of millions upon millions of dollars, created and trapped 38 antihydrogen atoms. Yes, that's right. Thirty eight. More were created (although I'm not sure of how many more), but 38 of them were trapped and released in a 'controlled' manner. By comparison, a single grain of salt is composed of somewhere around 10000000000000000 atoms. And when physicists talk about time, they don't quite have the same scale as we do. When they say they captured and released these atoms, they're talking about one sixth of a second. Yep. Millions upon millions of dollars, 38 atoms and 172 milliseconds. And ya know what? It's worth every penny. So what exactly is this whole thing good for? Well, for one thing, we can study it. You see, according to current theory, when the Universe began, almost 14 billion years ago, there SHOULD have been equal amounts of matter and antimatter created. So where did it go? IS there a difference that we're not seeing? Are there things about antimatter and, by extension, physics itself that we don't understand yet? Are there galaxies out there somewhere composed entirely of antimatter? Did matter and antimatter go in different directions when the Universe was born, driven by fundamental forces that no longer exist or that changed a billionth of a second after things started? We don't know. But it'd be cool to find out, wouldn't it? Oh, one last thing. It's totally unrelated to antimatter, but this coming week is Thanksgiving. When you go shopping this weekend, pick up a couple of extra things... cans of food, bags of this and that, maybe... if you're doing well enough for yourself, a turkey... and drop it off at the local shelter or food share. You know what I'm talking about. Things are still tough out there, and if you can swing it, do a little to help someone else out. Heck, make it a family thing and take the kids with you and let them pick out a couple of things. If YOUR kids pick them out, you can pretty much bet that someone else's kids would like it. And you'll not only be helping someone out, you'll be making yourself a little more thankful, believe me. But over and above that, you can show your kids what they (and you) have to be thankful for. And I guarantee you, you'll see in your children's' eyes the reflection of what you always wanted to be. Give it a shot. What have you got to lose; a couple of cans of cranberry sauce? Have a happy, healthy and save holiday. Enjoy yourself, enjoy those around you. And come on back next week, safe and sound, and be ready to listen to what they are saying when... PEOPLE ARE TALKING =~=~=~= ->In This Week's Gaming Section - Majority Want Video Game Laws! """"""""""""""""""""""""""""" Atari's Yars' Revenge Is Back! =~=~=~= ->A-ONE's Game Console Industry News - The Latest Gaming News! """""""""""""""""""""""""""""""""" Atari's Classic Arcade Shooter Yars' Revenge Is Back With New Cinematic Gaming Experience 30 years ago Yars' Revenge took the gaming world by storm as one of the first arcade shooters and became the best-selling original title for the Atari 2600. Now three decades later, gamers will once again get the chance to avenge the annihilated race of the Yar. Atari, one of the world's most recognized publishers and producers of interactive entertainment will unleash Yars' Revenge onto Xbox LIVE Arcade for the Xbox 360 video game and entertainment system from Microsoft, PlayStationNetwork and Windows PC Download in Q1 2011. Yars' Revenge brings the legendary title to new artistic heights with an anime inspired art style and captivating narrative that expands upon the original story. The game also features local co-op gameplay, multiple endings, intense battles, and visually striking landscapes designed to appeal to both casual and hardcore gamers. In Yars', players will take on the role of a nameless Yar, who has been brainwashed by the evil Qotile empire to do their bidding. After being shot down and rescued by the ancient and mysterious Bar Yargler, she sets off on a ferociously focused mission, to seek revenge on her former master and his deadly squad of assassins. The bio-technological nightmare of the Qotile home world provides stunning backdrops for players to fly through in aerial combat with their enemy. "Yars' Revenge is one of the most popular Atari games of all time, leaving fans eager to experience the next chapter," says Jim Wilson, President and CEO of Atari, Inc. "The new Yars' Revenge updates this classic with anime inspired art direction, intense aerial battles and local co-op gameplay." Developed by Killspace Entertainment, Yars' Revenge will be available in early 2011. Majority in Favor of Video Game Laws, Poll Says Although most Americans are concerned about the level of violence in video games, those with children are slightly less worried than those without, according to a recent study. In the latest Rasmussen poll, 70 percent of child-less adults surveyed said they were either "very concerned" or "somewhat concerned," about levels of violence in video games, compared to 65 percent of parents. Furthermore, parents were far more likely to assume the chief role of limiting a child's exposure to in-game sex and violence. Still, 54 percent of those polled thought video games led to violent behavior. Unsurprisingly, the concern increases by age and skews towards women above 40. Despite the fact that the Supreme Court is debating the merits of an age requirement for violent video games, parents believe they, not the government, should play a chief role in limiting a child's exposure to violent video games. Seventy-one percent of those surveyed believed parents should have the most responsibility. Only 5 percent thought it was up to the government. The survey of 1,000 adults nationwide was conducted on November 8-9, 2010. =~=~=~= A-ONE's Headline News The Latest in Computer Technology News Compiled by: Dana P. Jacobson U.S. Sees "Huge" Cyber Threat in the Future The United States faces a major threat in the future from cyber technologies that will require civil-military coordination to shield networks from attack, Defense Secretary Robert Gates said on Tuesday. "I think there is a huge future threat. And there is a considerable current threat," Gates told The Wall Street Journal CEO Council. "And that's just the reality that we all face." The U.S. Defense Department estimates that over 100 foreign intelligence organizations have attempted to break into U.S. networks. Every year, hackers also steal enough data from U.S. government agencies, businesses and universities to fill the U.S. Library of Congress many times over, officials say. The Pentagon's biggest suppliers - including Lockheed Martin Corp, Boeing Co and Northrop Grumman Corp - are investing in the growing market for cyber technology, estimated at up to $140 billion a year worldwide. Gates said the U.S. military had made considerable progress protecting its own sites and was working with its private-sector partners "to bring them under that umbrella." But how to allow Pentagon know-how to be applied to protecting domestic infrastructure can be tricky for legal reasons, including fear of violating civil liberties. "The key is the only defense that the United States has against nation-states and other potential threats in the cyber-world is the National Security Agency," Gates said, referring to the super-secretive Defense Department arm that shields national security information and networks, and intercepts foreign communications. "You cannot replicate the National Security Agency for domestic affairs. There isn't enough money. There isn't enough time. And there isn't enough human talent." Last month, President Barack Obama's administration announced steps to allow greater cooperation between the NSA and the Department of Homeland Security. That includes stationing the DHS' privacy, civil liberties and legal personnel at the NSA. "So you have the domestic security agency, DHS, being able to reach into NSA in a real-time way to get the kind of protection we need," Gates said. "And my hope is that over time that will lead to better protections for both '.gov' and '.com.'" McAfee Reports Malware at All-Time High McAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is valuable for IT admins - enabling them to keep a finger on the pulse of malware, and to stay in touch with emerging attack techniques and trends. With the holiday shopping season upon us, cyber criminals will be pulling out all the stops and shifting into high gear to capitalize on the spike in online transactions and part naive or gullible users from both their personal information and their money. Businesses and consumers both need to be on high alert and take a more proactive stance to guard against attacks. McAfee press release about the McAfee Threat Report states, "average daily malware growth has reached its highest levels, with an average of 60,000 new pieces of malware identified per day, almost quadrupling since 2007," adding, "At the same time, spam levels decreased in volume this quarter, both globally and in local geographies. Spam hit a two year low this quarter while malware continued to soar." McAfee warns that, "Most recently, cybercriminals unleashed a Zeus botnet that is aimed at mobile devices and designed to intercept SMS messages to validate transactions. As a result, the criminal can perform all bank transactions, stealing funds from unsuspecting victims. McAfee also saw an increase in email campaigns attempting to deliver the Zeus botnet, under the disguise of the following recognized organization names: eFAX, FedEx, Internal Revenue Service, Social Security Administration, United States Postal Service and Western Union." This report looks in-depth at the Stuxnet worm, which appears to have been crafted specifically to target the nuclear facility capabilities of Iran. More relevant to most IT admins, though, are the findings and analysis of social engineering attacks, and the potential risks associated with social networking. "Our Q3 Threat report shows that cyber criminals are not only becoming more savvy, but attacks are becoming increasingly more severe," said Mike Gallagher, senior vice president and chief technology officer of Global Threat Intelligence for McAfee. "Cyber criminals are doing their homework, and are aware of what's popular, and what's insecure. They are attacking mobile devices and social networking sites, so education about user activity online, as well as incorporating the proper security technologies are of utmost importance." As a security vendor, it could be argued that McAfee has a vested interest in alarming IT managers and the general public regarding computer security issues. It would be a sort of self-serving, and self-fulfilling prophecy to create a panic that drives sales of computer and network security tools. I have never bought into the conspiracy theory that security vendors incite fear to boost sales. It would be a thinly-veiled con, and the short term gain would damage the reputation of the vendor and lead to irreparable long term harm. McAfee has nothing to gain - at least not long term - from "crying wolf". The other way of looking at reports such as this is that McAfee - by virtue of being a major security vendor with an army of security researchers and customers scattered around the globe - is in a unique position to collect and study relevant data in order to provide expert analysis to identify trends and work more proactively to develop more effective security measures. Pentagon Says "Aware" of China Internet Rerouting The Defense Department is aware that Internet traffic was rerouted briefly through China earlier this year, a Pentagon spokesman said on Friday, referring to what a congressionally appointed panel has described as a hijack. The U.S.-China Economic and Security Review Commission charged in its annual report on Wednesday that state-owned China Telecom advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers during an 18-minute stretch on April 8. Marine Colonel David Lapan, a Defense Department spokesman, told reporters, "We're aware that on the 8th of April ... Internet traffic was rerouted through China." He added at one point that he did not know if "we've determined whether that particular incident ... was done with some malicious intent or not." Moments later, he said there was no evidence that anything malicious had occurred, a position he repeated when pressed about the discrepancy in his remarks. The U.S.-China Commission in its 2010 report said the incident affected traffic to and from U.S. government and military sites, including those for Secretary of Defense Robert Gates' office, the armed forces and some commercial websites. In Beijing, China's Foreign Ministry on Friday condemned the commission's report on China's military capabilities and economic policies, saying it distorted reality and was symptomatic of Cold War thinking. China Telecom separately has denied the charge that it "hijacked" U.S. Internet traffic by sending false notifications that prompted other servers to route traffic through China on the assumption that it was the most efficient path. The commission said the evidence did not clearly show whether the incident was perpetrated intentionally "and, if so, to what ends. However, computer security researchers have noted that the capability could enable severe malicious activities," the report said. Commissioner Larry Wortzel, a retired U.S. Army colonel who served two tours as a military attache in China, told reporters that the incident could have let someone mine email addresses and then send authentic-looking messages bearing attachments with malicious code or other harmful software. "When I see things like this happen, I ask: 'Who might be interested in all the communication from the entire Department of Defense and the federal government? It's probably not a graduate student from Shanghai University,'" Wortzel said on Wednesday. Lapan, the Pentagon spokesman, said the Defense Department's internal networks would not have been affected by any improper rerouting of traffic through Chinese servers. "We do have tools to protect any of the traffic that goes outside" the internal networks, he added, referring to encryption and devices that warn when Internet traffic is being rerouted. Senator Sheldon Whitehouse, who led a Senate Intelligence Committee cyber task force that submitted a classified report to the panel in July on cyber threats, said on Wednesday that certain threats cannot be countered without the U.S. government's unique "authorities and capabilities." In a Senate floor speech, the Rhode Island Democrat reiterated a proposal to create a "dot.secure" domain to protect crucial U.S. services such as power grids, financial networks, transportation and communications hubs. "We simply cannot leave that core infrastructure on which the life and death of Americans depends without better security," Whitehouse said. The U.S.-China Economic and Security Review Commission was set up in 2000 to examine the security implications of growing economic ties with China. Dean Cheng, an expert on Chinese security issues at the conservative Heritage Foundation, said the alleged Internet hijacking appeared to be part of what he described as a disturbing pattern of aggressive Chinese cyber activities. "All of this suggests that, from China's view, a global conflict is already underway - in the virtual world of cyberspace," he wrote. "The ability to redirect vast amounts of data constitutes a threat, not only to national security, but also to private companies and individuals, as their information, too, has now been put at risk." Facebook Takes On Google and Yahoo in Web Messages Facebook rolled out an all-in-one messaging service that for the first time allows its half-billion members to communicate with people outside the social network, intensifying a battle with Google Inc and Yahoo Inc. for users' Internet time. Addressing speculation the world's largest social networking site was planning a "Gmail-killer," Facebook Chief Executive Officer Mark Zuckerberg said the new system will let users own "@facebook.com" addresses, but stressed it went beyond mere email. The new feature - to be rolled out over coming months - lets users send and receive instant and text messages in addition to standard email and Facebook notes. "This is not an email killer. This is a messaging system that includes email as one part of it," Zuckerberg told reporters at the St. Regis hotel in San Francisco. Zuckerberg, who said more than 350 million of Facebook's half-billion users now actively send and receive messages on his website, did not expect people to stop using traditional email tomorrow. But he hoped more and more will shift to an integrated, cross-platform mode of communications over the longer term, such as the service he debuted Monday. Analysts say that email users are particularly valuable to Web portals like Yahoo, which seek to funnel the traffic into their other online services. Facebook and Google's intensifying rivalry is expected to play a crucial role in shaping the future of the Internet. The industry is closely watching their pitched struggle for Web surfers' time online, advertising dollars, and increasingly costly Silicon Valley talent. Forrester Research analyst Augie Ray said the new messaging service will help Facebook in its quest for user-engagement. "What this allows is Facebook to become more central to people's communications, and with that they have more (of people's) time, they have more page views, and with that they have the opportunity to serve more ads," Ray said. More than 4 billion messages get sent everyday through Facebook, whose backers include Digital Sky Technologies, Microsoft, Hong Kong tycoon Li Ka-shing and venture capital firms Accel Partners, Greylock Partners and Meritech Capital. Its new product will automatically route messages from a person's most frequently-contacted acquaintances into a main inbox, with messages from other contacts pooled in a separate inbox. It also does away with some traditional email customs, such as the "subject" line. Instead, all the messages between two people are threaded together into one long-running conversation. Users will also be able to view Microsoft Word, Excel and PowerPoint documents as attachments to their messages, without having to download or pay for the software. Licensed users can create and send such documents as attachments. Should all of Facebook's active users adopt the new service, the social network would begin to approach the number of users now on Microsoft Corp's hotmail, the most popular Internet email service. Google, which controls roughly two-thirds of the global search market, offers the third-most popular Web email service, behind second-placed Yahoo, according to Web analytics firm comScore. Last week, Google began blocking Facebook from importing user contact data from its Gmail email service - until Facebook reciprocates with its own trove of personal data. In terms of potential privacy concerns, Zuckerberg stressed that the new service may actually be less intrusive than others'. For instance, it would not automatically scan the contents of people's email to display ads based on similar keywords, as is done by many of today's popular Web-based email products like Gmail, he argued. "Email is still really important to a lot of people. And we just think that this simpler kind of messaging is going to be how a lot more people shift a lot of their communications," Zuckerberg said. AOL Cracks Open Door to New Project Phoenix E-mail You've still got mail - but AOL is redesigning it from the ground up to be faster and easier to use. AOL Inc. is opening the doors to its new Web-based e-mail program, code-named Project Phoenix, for a limited number of users. Starting next year, anyone will be able to sign up for access to a beta test site. The Project Phoenix inbox page was designed to make it easier to fire off a quick e-mail, text or instant message with just a few clicks on a "quick bar" at the top of the page. People can also send short replies right from the inbox page, without having to click on a message first. The new design displays thumbnails of recent photo attachments at a glance, and lets people toggle between several open e-mails at a time. When someone is reading an e-mail with pictures attached, the photos will also show up as thumbnails next to the message. Addresses in the body of the e-mail will trigger the system to display a map from AOL's Mapquest on the right-hand side, with the option to click for directions. Like Yahoo and other competitors, AOL is trying to become the one-stop shop for reading messages from other providers. Project Phoenix lets people link up their e-mail accounts on services from Microsoft Corp., Yahoo Inc. and Google Inc. In future versions, AOL plans to pull in Twitter, Facebook and LinkedIn messages, too. The early beta felt sluggish when a reporter tried it out recently, but AOL said its tests show that the Phoenix inbox page loads about twice as fast as Google's Gmail inbox. Markedly absent from the new design: advertising. Fletcher Jones, the project lead for Phoenix, said AOL is working on other ways to make money from the free e-mail service because the old model - at least one towering, animated ad dominating the right-hand side of the screen - isn't very user-friendly. Jones would not say exactly what AOL's plan is, but one tactic is placing links to top AOL stories inside the inbox. AOL's content sites are more ad-heavy. "We're a different company than we were a year ago," Jones said in an interview. "The prior administration had priorities on revenue versus audience growth. Our priorities are on audience growth." About two weeks ago, the New York-based company overhauled the main AOL.com home page with more white space, hipper logo art, bolder photos and icons and a stronger focus on content from its network of websites and blogs. AOL Mail, which accounts for about 45 percent of AOL's total page views, is an important way to help users find all this new content. After all, Jones said, no matter what else is going on, people check their e-mail every day. But AOL is juggling the need to attract new traffic with the fact that many of its users have been around since the days of dial-up Internet access. The company plans to give existing customers the option to use the Project Phoenix system, and is providing live chat and other 24-hour customer service to support the transition. AOL doesn't have a firm plan for switching everyone over to the new design. As people are invited into the Project Phoenix beta, they'll also have a chance to sign up for a new AOL e-mail address - a gift for folks who have come to regret their early aol.com screen name choices. 'Path' Social Network Limits Users to 50 Friends Most people on Facebook have several hundred "friends," so it's safe to assume that the average person does not divulge their most private thoughts on the site. A new social network from a former Facebook executive, however, aims to tighten your personal network to just 50 people so you can feel more comfortable sharing details of your life. The Personal Network, or Path, is a photo-based service that lets you upload photos and share that moment with your closest family and friends. It launched Monday as an iPhone app, but a Web-based version is also available. Path is the brainchild of Dave Morin, a former senior platform manager at Facebook who will serve as Path's chief executive. "Path allows you to capture your life's most personal moments and share them with the 50 close friends and family in your life who matter most," Morin wrote in a blog post. "Because your personal network is limited to your 50 closest friends and family, you can always trust that you can post any moment, no matter how personal. Path is a place where you can be yourself." Path is available as a free app in the App Store. Once downloaded, snap a photo with your iPhone or iPod touch and tag it as people, places, or things. "Think of it as a place for the memories along your path through life," he said. When you upload a photo, you will be able to "See" who else shared in that moment. "The idea is that understanding enables trust and storytelling amongst close friends and family," Morin wrote. To keep things organized, you can view certain moments via a map of the world. Why 50? "We chose 50 based on the research of Oxford Professor of Evolutionary Psychology Robin Dunbar, who has long suggested that 150 is the maximum number of social relationships that the human brain can sustain at any given time," he said. "Dunbar's research also shows that personal relationships tend to expand in factors of roughly three. So while we may have five people whom we consider to be our closest friends, and 20 whom we maintain regular contact with, 50 is roughly the outer boundary of our personal networks." There is no friending or following on the service, the company said, "just sharing with the people who matter most." Those without an iPhone can register their username via the Path Web site. The company's jobs site also says they are looking for Android and BlackBerry engineers, so versions for those platforms are likely forthcoming. Walmart to Sell Sub-$200 Laptop Walmart plans to sell a fully equipped laptop with a 15.6-inch screen for US$198 on Black Friday as part of a promotional offering, one of the few times the $200 price barrier has been cracked. The laptop will be on sale for a few hours in the retailer's stores on Nov. 26, which is one of the most active shopping days in the U.S. Made by eMachines, the laptop includes features that could make it good for basic computing and day-to-day activities like Web surfing or word processing. It will come with an Intel Celeron processor running at 2.2GHz, a 250GB hard drive and 2GB of memory. Further details about the laptop configuration were not immediately available. Walmart did not immediately respond to requests for comment. Laptop prices have hovered over $399 most of the year, and the $198 price represents one of the few times a laptops has been priced under $200. Last year, Walmart offered an HP Compaq Presario for $298 during the July back-to-school shopping season, and that prompted a pricing war with rival Best Buy, which started offering a Toshiba Satellite laptop at the same price. Laptops offered at low prices typically lack some components. For example, the $298 Compaq Presario sold through Walmart last year lacked a webcam. Consumers in the past have also expressed concerns about the Celeron processor, which sits on the lower rung of Intel's processor family ladder. Laptops with Celeron chips are not designed for high-end gaming or multimedia activities. Faster processors - like Intel's Core chips - are more expensive. Walmart is also selling other consumer electronics such as Blu-ray players at low prices, according to the Walmart's Black Friday Web page. Laptops are among the top technology products on holiday shopping lists in the U.S., topped only by tablets, according to a study released by Retrevo on Wednesday. Once-Mighty MySpace Deepens Facebook Integration In a sign of the companies' divergent fortunes, MySpace said Thursday it will let its users log in to their Facebook accounts through their MySpace page. Doing so will port the likes and interests they have listed on their Facebook profiles to MySpace, where they will get a stream of entertainment content based on these interests. MySpace users have already been able to sync their status updates to their Facebook profiles. Thursday's announcement is a deeper integration of Facebook's technology into MySpace. It doesn't involve any financial transactions. The integration of Facebook Connect into MySpace's home page will be followed by the addition of Facebook's "Like" buttons across MySpace, the company said. Once a mighty rival, MySpace has conceded that it is no longer a social network but a social entertainment destination - think MTV for the Web 2.0 generation. To this end, the company recently overhauled its website to give its mostly young audience more ways to consume music, videos and celebrity gossip. CEO Mike Jones said in a conference call Thursday that the users' initial response to the redesign is "very, very positive." Facebook, meanwhile, is working to become the social overlay of the Web. Dan Rose, a Facebook vice president, called the integration with MySpace a "powerful demonstration of the Facebook platform." Rupert Murdoch's News Corp. bought MySpace for $580 million in 2005. After a promising start, the site began to lose its luster. Users and advertisers flocked to Facebook. In its most recent quarter, which ended Sept. 30, News Corp. said its "other" business segment, which includes MySpace and the rest of the Digital Media Group, reported an operating loss of $156 million, $30 million greater than a year earlier. The main reason for this was lower search and advertising revenues at MySpace. PayPal Users Beware of Holiday Phishing Scam With Black Friday quickly approaching, and retailers racing to outdo each other with earlier and earlier deals, it is safe to say that the holiday shopping season has begun. If you're shopping online, though, and paying with PayPal - be warned. There is a phishing attack targeted just for you. The holidays come with a dramatic spike in shopping, and nobody appreciates the increase in online commerce more than cyber criminals. While you're preparing for a Thanksgiving celebration of beer and watching the Detroit Lions make a mockery of professional football... Hey, don't judge. You try supporting a team that has been consistently sad for 60 years and see if you aren't a little bitter. Fine. While you're preparing for a traditional Thanksgiving feast and plotting your Black Friday shopping strategy, malware developers are hard at work finding ways to capitalize on the shopping season. PayPal is established as a leading method of online payments. It is an integral part of eBay purchasing--a very popular way to acquire gifts during the holiday season, and it is widely accepted as a method of payment by online retailers of all sorts. It makes sense that cyber criminals would try to capitalize on the spike in PayPal transactions to catch naive or unsuspecting users off guard. AppRiver's Troy Gill has uncovered just such a scam. "Since so many people use PayPal in conjunction with the impending holiday shopping spree, scammers are looking to take full advantage of unwary consumers. The latest PayPal related scam targets PayPal users via email. Unlike most of the PayPal scams that we have seen in the past that included a link in the body of the message, these have an attached HTML. When the attachment is clicked a Java Script will produce a Phishing page that mimics a legitimate PayPal page. The input information is then sent off to another domain that will make it available for the cybercriminals." As Gill notes, this attack attempts to dupe victims by using an attachment as opposed to a link. Granted, users should be conditioned to avoid both links and file attachments in suspicious or questionable e-mails, but just switching things up from the normal malicious URL might be enough to snare some unwary users. Once the attackers have the PayPal credentials entered on the spoofed PayPal page, they can transfer the funds out of the PayPal account, make purchases using the money in the PayPal account, request funds to be sent to the PayPal account, or anything else the legitimate account holder is normally able to do with a PayPal account. Most avid PayPal customers hopefully know better than to fall for such a thing, but with the holidays and the spike in online shopping comes a deluge of newbies who know enough to use PayPal to make purchases, but aren't seasoned in how to protect it. Gill warns, "During the next few months you should be aware that you will be a broader target for scammers looking to take advantage of your increased purchasing activity. Since most people will be making a far greater number of purchases on their credit cards around the holidays they would be less likely to notice fraudulent activity on their cards." Just remember the mantra that common sense and cautious skepticism will prevent almost all attacks. Happy Holidays! Pirate-Slaying Censorship Bill Gets Unanimous Support The Combating Online Infringement and Counterfeits Act (COICA) sets up a system through which the US government can blacklist a pirate website from the Domain Name System, ban credit card companies from processing US payments to the site, and forbid online ad networks from working with the site. This morning, COICA unanimously passed the Senate Judiciary Committee. "We are disappointed that the Senate Judiciary Committee this morning chose to disregard the concerns of public-interest groups, Internet engineers, Internet companies, human-rights groups and law professors in approving a bill that could do great harm to the public and to the Internet," said Public Knowledge president Gigi Sohn, who pledged to craft a "more narrowly tailored bill" next year to deal with "rogue websites." But the content industries don't mind the current version. Bob Pisano, who runs the MPAA, trotted out the "2.4 million hard working, middle-class jobs in all 50 states" that his industry creates. "For these workers and their families, digital theft means declining incomes, lost jobs and reduced health and retirement benefits," he said. "Unfortunately, this means nothing to the operators of rogue websites who seek to benefit illegally from the hard work of others." The industry is well aware that "censorship" doesn't go down well with many Americans, so it has been playing up the "free speech protections" in the bill lately. RIAA CEO Mitch Bainwol made sure to stress the point again this morning. "With this first vote, Congress has begun to strike at the lifeline of foreign scam sites, while protecting free speech and boosting the legal online marketplace," he said. "Those seeking to thwart this bipartisan bill are protecting online thieves and those who gain pleasure and profit from de-valuing American property." That last jibe is the sort of comment made by those who can't understand why, say, people accused of horrific crimes still get defense lawyers. ("Why do you want murderers to go free?") It's sad to see Bainwol resort to it. As we noted earlier this week, we have concerns about this approach that are premised in large part on the content industries' almost comically misguided attempts to lock down or shutter innovative technologies and websites that turn out in fact to be legal and hugely useful - like the VCR, HD radio, MP3 players, HDTV, DAT, and YouTube. Giving that industry a special process, one that doesn't apply to sites that traffic in other sorts of illegal-in-the-US-activity, raises concerns that have nothing to do with a love of widespread piracy. COICA could censor even sites that "enable or facilitate a violation" of copyright, it mucks about with DNS, and it actually requires the US Attorney General to keep a list of "naughty" sites even though no action has been taken against them. There has to be a more careful approach. Chinese Woman Sent to Labor Camp for Retweeting China has sentenced a woman to a year in a labor camp for "disrupting social order" by retweeting a satirical message urging Chinese protesters to smash the Japan pavilion at the Shanghai Expo, an international rights group said. Cheng Jianping, 46, re-posted a message from the social networking site Twitter last month hinting that Chinese protesters should smash the Japan pavilion at the Shanghai Expo and adding on the message "Angry youth, charge!" according to Amnesty International, which condemned the sentence in a statement late Thursday. Amnesty and Cheng's fiance said her retweet was meant as satire, mocking anti-Japanese protesters who had grown in number since tensions between the countries increased after a dispute erupted in September over islands claimed by both Japan and China. "Sentencing someone to a year in a labor camp, without trial, for simply repeating another person's clearly satirical observation on Twitter demonstrates the level of China's repression of online expression," Amnesty International's Asia-Pacific Director Sam Zarifi said in a statement. Cheng's fiance, Hua Chunhui, said he thought the government reacted the way it did to the tweet was because they are activists. The two had planned to get their marriage license Oct. 28, the same day Cheng was detained. "My personal opinion is that this sentencing wasn't about this one statement. The government wants to make an example of us activists," said Hua, who lives in Wuxi in China's eastern province of Jiangsu. "The government doesn't like what we do. We actively communicate with other Chinese activists and celebrated on Twitter Liu Xiaobo's Nobel prize." Hua told The Associated Press that he posted the original tweet because he was mad at all the anti-Japanese protests. "So I posted that message on Twitter, satirically saying that if they really want to do something big, they should just get on a plane and attack the Japan pavilion at the expo. Of course, that is not possible." The Shanghai Expo was a major event treated with great sensitivity by China and any threats against it would have been taken seriously by the government. Authorities pulled out all the stops to make sure it was a success and imposed heavy security to ensure there were no disruptions. More than 70 million people visited it before it closed at the end of October after its six-month run. Government officials could not immediately be reached for comment. Twitter is blocked in China, but some human rights activists use it by bypassing government controls. Hua said his fiance arrived at a labor re-education center in central China's Henan Province on Wednesday evening. He said he is not allowed to visit her. Cheng's sentencing comes as China is under fire for its hardline reaction to the Liu's winning of the Nobel Peace Prize. A Nobel official said Thursday that the award and prize may not be able to be handed out this year because China is not likely to let anyone from Liu's family attend the ceremony. Outraged by the award, Beijing has reportedly clamped down on Liu's relatives and pressured other countries not to send representatives to the Dec. 10 award ceremony in Oslo. The prestigious 10 million kronor ($1.4 million) award can only be collected by the laureate or close family members. Liu, a Chinese dissident, is serving an 11-year sentence for subversion after co-authoring an appeal calling for reforms to China's one-party political system. His wife, Liu Xia, has been under house arrest and subject to police escort since the award was announced last month. E-mail's Lowly `at' So Much More Around the World The squiggly little "at" symbol that makes our e-mail go is more colorful in translation. It's an elephant's trunk in Sweden. A monkey in Serbia - and a more, ahem, delicate part of the monkey in Holland. It's a snail in Korea, a little mouse in Taiwan. In any language, it's come a long way since it was plucked from obscurity by e-mail godfather Ray Tomlinson back in computer-heady 1971. At the time, the character was used almost exclusively by grocers and accountants. Its use made good sense to an English speaker, shifting definitions from a rate or amount of something to a location. "It's the only preposition on the keyboard," Tomlinson said from Cambridge, Mass., where he works as he has for decades at Raytheon BBN Technologies. But the connection was lost in other languages, and more visual references to food, animals and body parts sprang up, many based on the at's swirling shape. The symbol is still so unfamiliar that some newspaper and web systems can't print it in this story. "It's sort of like a Rorschach test. The language would sort of see in the at sign something notable from the culture. What people are familiar with is just so varied, so all these crazy things came out of it," said Karen Steffen Chung, an associate professor of linguistics, English and phonetics at National Taiwan University in Taipei. The symbol is a strudel in Israel and a "rollmop" - for rolled pickled herring fillet - in Czech. It's "sobachka" for doggie in Russian, was dubbed an "alpha curl" in Norway and sometimes goes by "kanelbulle," a type of traditional cinnamon bun, in Swedish. Sweden can't seem to make up its mind with the longest list of monikers, including elephant's trunk, elephant's ear, monkey's tail, cat foot, cat's tail and pretzel. Chung was so intrigued that she reached out to fellow linguists around the world in (what else) e-mail for their insights. Among the things she discovered was a variety of terms in Serbian. The word "majmun" is one. It means monkey, appears to have been borrowed from Turkish and was used in "majmunski rep" (monkey tail) and "majmunsko-a" (monkey-ish a). The Serbs also invented "ludo-a" (crazy a) for the symbol none of us can escape. Some countries have "official" terms for the at. The Swedish Language Board deemed it "snabel-a" (trunk-a), meaning "a" with an elephant's trunk. Elsewhere, English prevails, including in Finland, South Africa and India. The spin on "at" in Holland is English, too, but "apeklootje" (little monkey's testicle) was once in play during the sign's rapid rise to stardom. In Sri Lanka, the government agency responsible for promoting information technology on the island nation has no specific word for the symbol in Sinhala, referring to it simply as the "at symbol." Local pronunciations of the English where other languages dominate include "et" for "a" in Serbian and "ah-te" (think Ted without the d) in mainland China. Mandarin Chinese hasn't come up with a character for the revolutionary sign. Japanese, known for borrowing from other languages with a distinctive local pronunciation, usually go for "atto maaku," meaning the English "at," while Greek turned the squiggle into a "little duck" and Hungarian a "little worm." Arab speakers sometimes translate the English "at" to its equivalent, "fi," though others see it as an "ear" instead when providing their e-mail addresses. In Taiwan, where Chung lives, the local meaning is "little mouse," a lot livelier than Korean's snail. The preferred word in Spanish is "arroba," which is also a unit of weight, though in Spain at can transform into a swirly pastry from Majorca, "ensaimada." To some in Latin America, the at has grown linguistic muscle to stand in as a gender-neutral indication of both male and female (nin(at)s means you're talking about both ninos and ninas). Slovenian speakers prefer "afna," possibly borrowed from German, where the at is called, among other things, "affenschwanz" (monkey's tail). A similar word in Slovenian means "a woman who overdresses, applies too much makeup etc.," Chung learned. Tomlinson didn't have the world's many "ats" on his mind when he developed his e-mail protocol using a nearly forgotten key on a Model 33 Teletype machine for use on ARPANET, one of the networks that became the global Internet. It was Tomlinson who decided to append the at sign and the host name to a user's login identity. Not only did it make sense as a preposition, but it was unlikely to be confused for any other part of a user's e-mail address, a term that hadn't yet surfaced. The succinctness of the at sign, he thinks, played into the imagery in other languages. "They certainly all tend to be taking something that's more familiar than some dry piece of commercial signage," Tomlinson said. "It's a simple symbol and it's been adopted and sort of been made into a fan icon for anything to do with computers." The Museum of Modern Art is a fan. It "acquired" the symbol for its collection earlier this year. At 69, the low-key Tomlinson is still working as a programmer on projects unrelated to e-mail. Have his two grown daughters made full use of bragging rights over dad's e-mail claim to fame? "They try to be cooler than that," Tomlinson said. Comodo's GeekBuddy Offers Instant Help Comodo recently received the Parent Tested Parent Approved (PTPA Seal of Approval for its GeekBuddy computer help service. Products receive this recognition after testing by a group of families selected from 40,000 volunteers belonging to the PTPA. They may be onto something. Like LiveTech from CyberDefender, GeekBuddy offers 24/7 help for all kinds of computer problems including, but not limited to antivirus help, PC performance tuneup, third-party software installation and general PC troubleshooting. But where the LiveTech service starts at $239/year, GeekBuddy costs $49.95/year. There are differences between the two services. LiveTech focuses on phone-based support supplied by a team based in the United States while GeekBuddy helps users via live chat and remote control. Don't worry; if the computer is too screwed up to permit live chat GeekBuddy does have 24/7 phone support available - it's just not their primary mode of communication. CyberDefender quite reasonably touts the virtue of having LiveTech support agents all in one secure facility with policies in place to protect subscribers' private data. LiveTech supports both Windows and Mac and also offers support for other tech devices such as mobile phones. Comodo's MCSE-certified agents specifically support Windows and third-party peripherals and software. Comodo's Internet Security Complete, normally $69.99, comes as a free bonus for GeekBuddy subscribers. This package includes Comodo Antivirus 5.0 as well as a full-scale firewall, a utility to secure WiFi connections, and 10 GB of online backup. And customers get to keep this package even if they end their GeekBuddy subscription. Access to the service is as simple as clicking the GeekBuddy desktop icon, but Comodo's geeks don't just wait to be called. The service will periodically offer to perform PC maintenance tasks including checking all drivers to make sure they're current and running performance tune-ups. LiveTech users do get an initial diagnostic and tune-up call but thereafter must ask for help when needed. Both services offer unlimited help requests during the subscription period. LiveTech admittedly aims for the less-technical user, so phone-based support definitely makes sense for them. Comodo's chat-based system requires at least a minimal level of familiarity with technology. At the moment Comodo is offering 60 days of GeekBuddy support for free. That's hard to beat. =~=~=~= Atari Online News, Etc. is a weekly publication covering the entire Atari community. Reprint permission is granted, unless otherwise noted at the beginning of any article, to Atari user groups and not for profit publications only under the following terms: articles must remain unedited and include the issue number and author at the top of each article reprinted. Other reprints granted upon approval of request. Send requests to: dpj@atarinews.org No issue of Atari Online News, Etc. may be included on any commercial media, nor uploaded or transmitted to any commercial online service or internet site, in whole or in part, by any agent or means, without the expressed consent or permission from the Publisher or Editor of Atari Online News, Etc. Opinions presented herein are those of the individual authors and do not necessarily reflect those of the staff, or of the publishers. All material herein is believed to be accurate at the time of publishing.