Return-Path: <sentto-279987-4190-1010069169-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 03 Jan 2002 06:47:07 -0800 (PST) Received: (qmail 14704 invoked by uid 510); 3 Jan 2002 14:46:30 -0000 Received: from n34.groups.yahoo.com (216.115.96.84) by all.net with SMTP; 3 Jan 2002 14:46:30 -0000 X-eGroups-Return: sentto-279987-4190-1010069169-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.166] by n34.groups.yahoo.com with NNFMP; 03 Jan 2002 14:46:09 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 3 Jan 2002 14:46:08 -0000 Received: (qmail 73861 invoked from network); 3 Jan 2002 14:46:08 -0000 Received: from unknown (216.115.97.171) by m12.grp.snv.yahoo.com with QMQP; 3 Jan 2002 14:46:08 -0000 Received: from unknown (HELO red.all.net) (12.232.125.69) by mta3.grp.snv.yahoo.com with SMTP; 3 Jan 2002 14:46:08 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g03EkHh21002 for iwar@onelist.com; Thu, 3 Jan 2002 06:46:17 -0800 Message-Id: <200201031446.g03EkHh21002@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 3 Jan 2002 06:46:17 -0800 (PST) Subject: [iwar] [NewsBits] NewsBits - 01/02/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit January 2, 2002 New York strengthens Internet privacy New York Gov. George E. Pataki signed into law a bill that requires state agencies to develop policies to enhance online privacy. The Internet Privacy Policy Act requires the state=92s Office for Technology to develop a model online privacy notice for state Web sites. The legislation bars state agencies from collecting or disclosing users=92 personal information without their consent. http://www.gcn.com/vol1_no1/daily-updates/17664-1.html Bush lifts speed limits on computer exports President Bush on Wednesday allowed U.S. technology firms to sell high-speed computers to Russia, China, India and countries in the Middle East, easing a Cold War-era ban designed to halt the spread of nuclear arms. Computer manufacturers may now export computers capable of complex three-dimensional modeling, calculating fluid dynamics, and other advanced applications to Pakistan, Vietnam and other so-called ``Tier 3'' countries without specific permission from the government. http://www.siliconvalley.com/docs/news/reuters_wire/1720700l.htm 'Storm Chasers' Collide In Domain-Name Dispute A speedy arbitration process to settle disputes over the ownership of Internet domain names isn't the kind of whirlwind Warren Faidley is used to. But the Tucson, Ariz., photographer known for his dramatic images of bad weather has wrested the address WarrenFaidley.com from a fellow "storm chaser" who became a cybersquatter. http://www.newsbytes.com/news/01/173300.html Tech companies develop innovative security solutions Computer whizzes at a small Eagan firm say their cutting-edge software can identify a person within seconds of retrieving data from a finger scan. In the frenzied search for new ways to combat terrorism, BIO-key International's system has captured the imagination of federal agencies - and even a former Israeli prime minister. http://www.nandotimes.com/technology/story/208401p-2010006c.html CIA-backed software looks for terror connections Data analysis software backed by the CIA and used by some casinos to catch gambling cheats is now being tested for its potential to detect suspected terrorists and their associates when they make airline, hotel or rental-car reservations. http://www.usatoday.com/life/cyber/tech/cw2.htm Scientists: Liars betrayed by their faces A heat-sensing camera trained on people's faces was able to detect liars in a study that hints at a way of spotting terrorists at airports. In six of eight people who lied, the high-resolution thermal imaging camera detected a faint blushing around their eyes that Mayo Clinic researchers said is evidence of deception. http://www.cnn.com/2002/TECH/science/01/02/liars.faces.ap/index.html http://www.nandotimes.com/technology/story/209357p-2020364c.html 'Win-XP hole' mis-represented by FBI, press, Gibson Everyone from the FBI to the LA Times has something scary to say about the new XP vulnerability. Here's why they all have it wrong. The creation of marketing niches from Microsoft technologies is a model of perpetual motion. Redmond develops the products, and we get paid to implement, install, configure, customize, upgrade, secure, and to even break and exploit them. http://www.theregister.co.uk/content/4/23517.html Cyber security In the real world, we worry about anthrax or smallpox. These bacteria and viruses potentially can kill millions of people and it's difficult to defend against them. In the cyberworld of computers and the Internet, there also are infectious agents that can cause great harm and that are difficult to defend against. Last year, according to a research firm in California, Computer Economics, worms and viruses cost us more than $17 billion. http://www.nandotimes.com/technology/story/208112p-2007755c.html Toward More Cybersecurity in 2002 Here's a list of resolutions that, if put into action, would help make the Net a much safer place. Call 2001 The Year of Living Dangerously. Router attacks brought down major Microsoft sites, followed by the Code Red worm over the summer. Then came the Nimda worm-virus in the fall. A sinister-sounding program called AirSnort allowed roaming cybersnoops to hack vulnerable wireless networks using only a Linux laptop and some free software. And Visa U.S.A. launched a policy mandating merchants that accept online credit cards to take basic security steps or lose their charging privileges. http://www.securityfocus.com/news/302 Popular hangout for teens have recent problems with violence. Cyber cafes in this Orange County city are attracting an unruly crowd and city officials are worried about the safety of children after a murder over the weekend. Cyber cafes are one of the fastest growing businesses in Orange County, where teens and young adults frequently can be found logging onto the Internet and playing video games. Some locations stay open as late as 4 a.m. http://www.siliconvalley.com/docs/news/tech/085372.htm ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:02 PST