[ECP] Educational CyberPlayGround NetHappenings Headlines and Resources

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Thu, 10 May 2007 09:46:12 -0400

¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º

Please link to the Educational CyberPlayGround
http://www.edu-cyberpg.com

Add your SCHOOL OR SCHOOL DISTRICT URL
http://www.edu-cyberpg.com/schools/

Please Share and Add Your Song
http://www.edu-cyberpg.com/ncfr/

Educational CyberPlayGround NetHappenings Mailing List ©1993

¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º


Howdy,

Remember Next Tuesday is our last day of posts then we start our summer vacation!

Happy Reading for today.


best,
<Karen>



1)
LEARN HOW TO BUILD A WEBPAGE AND LEARN
THE BASICS OF DESIGN WITH FREE TOOLS
http://www.edu-cyberpg.com/Internet/Interestingsites/BuildPageSite.html

2)
Multiplayer Education Games  FOR FREE!
http://www.beeweb.org
http://edutech.cs.brandeis.edu/
Spell Bee, GeograBee, MoneyBee, PatternBee

3)

National Children's Folksong Repository Project
http://www.edu-cyberpg.com/NCFR/
Adults and Kids are invited to participate:
A public folklore project built by the citizens of the United States
Call toll free 1-877-220-0262 east coast U.S. time
SING OR CHANT YOUR SONG.


4)
ICANN also just released an interview with Vint Cerf 2007
<http://www.edu-cyberpg.com/Internet/DOMAIN%20NAME/icann.html>
where he talks about future of the organization as his
chairmanship and time as a director draws to a close.
And he asks for people with a "passion for the Internet"
to apply for NomCom positions.

5)
Two Good Spectrum Proceedings Die Quietly, but Copps and Adelstein
Keep the Faith for the Future
<http://www.publicknowledge.org/node/930>
Several years ago, then-FCC Chairman Michael Powell attacked spectrum
reform with true revolutionary zeal. Yes, Powell sought to recreate
spectrum licenses as property, a move I vigorously oppose. But Powell
also fought to make it easier for unlicensed spectrum users by
improving the efficiency of the spectrum and facilitating spectrum
sharing. Unsurprisingly, wireless incumbents fiercly resisted
proposed changes that interfered with their business models.
After the departure of Powell and NTIA Administrator Michael
Gallagher in 2005, no one remained to champion controversial wireless
proccedings. While FCC Chairman Martin has made some progress on
unlicensed use, such as affirming that the OTARD rules apply to
unlicensed transceivers, moving the broadcast ?white spaces?
proceeding forward, and ? in the technical but highly important
category ? making it easier for manufacturers to develop equipment
for unlicensed use, Martin has also shown no inclination to carry on
Powell?s crusade for spectrum reform where politically costly.
So Martin has circulated a number of orders terminating proceedings
begun by Powell that had the potential to radically transform the
spectrum landscape, and which therefore attracted a great deal of
industry resistance. Friday saw the termination of two such
proceedings: one on ?interference temperature? and one on receiver
standards. Briefly, the receiver standards proceeding would have
explored ways to make receivers more resistant to interference.
Generally, receivers are built as cheaply as possible and rely on the
protections of licensing. Build receivers ?smarter? and more able to
screen out interference and you make it possible to allow other
devices to function at a low level in the same spectrum space. This
improves the efficiency of wireless services and allows for ?smart?
or ?cognitive? radios to use the available space (often referred to
as an ?underlay?) and share the space without interfering with a
licensed service. While nothing prevents the Commission from allowing
the licensee to lease the newly available space via secondary
markets, receiver standards were thought to give a boost to
unlicensed sharing of licensed bands ? and as such were subject to
frequent attacks by proponents of converting licenses into a species
of property. (Property proponents argued that the licensee could
impose needed standards in a more efficeint manner if licensee had
financial incentive to do so. I note, however, that the Commission?s
2004 Secondary Market Order which would allow licensees to resell
such spectrum rights has done nothing to prompt ?private commons?
leasing arrangements.)

6)
WE'RE STUCK IN THE SLOW LANE OF THE INFORMATION HIGHWAY
<http://www.mercurynews.com/opinion/ci_5836382?nclick_check=1>
[SOURCE: San Jose Mercury News, AUTHOR: Editorial Staff]
[Commentary] When it comes to reasonably priced, high-speed Internet
service, the United States is an embarrassment. Despite years of
promises from politicians and technology titans, the U.S. continues
to lag far behind our global competitors. Worse, much of U.S.
"broadband" service is only a smidgen faster than a dial-up modem.
Both government and the telecommunications industry are to blame. The
technology to deliver truly high-speed Internet access is there,
especially for cable subscribers. Customers need to demand better
service from providers. The government needs to step in, too. The
U.S. needs a national strategy to get affordable broadband to every
man, woman and child by the end of the decade. The federal
government's lack of leadership in this area is a disgrace. Despite a
2004 promise by President Bush to deliver "universal, affordable
access to broadband technology by the year 2007," his administration
has done nothing to advance that goal.

7)
Local researchers offer free security service
http://computerworld.co.nz/news.nsf/news/EC25C508910ADEE8CC2572D10014CB81
The free web service, PATROL (Periodic Assessment of TReasured Online
Links), allows webmasters to submit their own URL to the Honeynet
Project's open-source client honeypot, called Capture. Submitted URLs
are monitored periodically by the client honeypot. Reports are generated
on a regular basis and published on the New Zealand Honeynet Alliance
website, says Seifert.
The Honeynet Project also offers a service called SCOUT (Speedy Complete
Online URL Test) which is more targeted at end-users, says Seifert. It
allows them to submit a URL and get immediate feedback, he says.

8)
Interview with Rain Forest Puppy May 1, 2007
http://www.ush.it/2007/05/01/interview-with-rain-forest-puppy/
Antonio `s4tan` Parata, software security researcher and member of the
ush team interviews Rain Forest Puppy, famous bug hunter, specialized in
web application assessment. It's a pleasure for us to publish the full
interview, in this case talk is not cheap.
Antonio "s4tan" Parata (ap): Hi Rain Forest Puppy, many thanks for this
interview. You are considered one of the fathers of web security and the
inventor of the SQL injection attack. Anyway in the year 2003 you
decided to publicly retire from the security field (to get more infos
Can you briefly sum your decision?

9)
Thumb Drives Replace Malware As Top Security Concern,Study Finds
http://www.informationweek.com/news/showArticle.jhtml?articleID=199300021


10)
Laptop lock down
http://australianit.news.com.au/articles/0,7204,21675095%5E15385%5E%5Enbv%5E,00.html
In last year's AusCERT Computer Crime and Security Survey, 58 per cent
of companies surveyed reported having laptops stolen, up from 53 per
cent in 2005.
Nine per cent of companies said handhelds had been stolen last year, up
from 8 per cent in 2005.
Forrester ICT consulting director Andrew Milroy says the risks are
growing in line with increased usage of mobile devices.

*********************************************************************
PLEASE ADD YOUR K12 SCHOOL OR SCHOOL DISTRICT
TO THE  MASTER DIRECTORY OF SCHOOLS ONLINE
http://www.edu-cyberpg.com/schools/

The registry is organized by state and by grade level.
The registry also includes sites for charter Schools, virtual schools,
school districts, state and regional education organizations, state
departments of education, state standards and state administrators.
*********************************************************************

11)
Budget: Eye on cyber-terrorism attacks
<http://www.zdnet.com.au/news/security/soa/Budget-Eye-on-cyber-terrorism-attacks/0,130061744,339276008,00.htm>
The federal government has allocated more than AU$12 million over the
next four years to expand the Australian Government Computer Emergency
Readiness Team (GovCERT) and fight high tech crimes, including
"cyber-terrorism".

12)
Taiwan claims upper hand in hackers' war with rival China
http://www.nwfdailynews.com/article/4709
TAIPEI, Taiwan (AP) - Taiwan's advanced computer technology helps the
military fend off hacker attacks in continuing virtual skirmishes with
rival China, a military official said Tuesday.

13)
M&S loses personal data on 26,000 employees
http://www.theinquirer.net/default.aspx?article=39473
FAVE SHOP OF THE chattering classes, Marks and Spencer has become the
latest outfit to lose a laptop stuffed with empolyees' details.
The shop admitted the computer contained addresses, dates of birth,
national insurance and phone numbers of some 26,000 employees. It says
the laptop was stolen from a printing firm that had been given the
information in order to write to employees about pension changes.

14)
Microsoft Patches 19 Bugs With 7 Bulletins -- All Critical
http://www.informationweek.com/news/showArticle.jhtml?articleID=199400216

15)
NIST puts its security guidelines in one basket
http://www.gcn.com/print/26_10/44216-1.html
The National Institute of Standards and Technology has released a
database to help agencies collect data needed to assess information
technology security programs and produce reports for action plans.

16)
"Scientists Work on Encyclopedia of Life"
http://www.usatoday.com/tech/science/2007-05-09-encyclopedia-of-life_N.htm
"In a whale-sized project, the world's scientists plan to compile everything they
know about all of Earth's 1.8 million known species and put it all on
one website, open to everyone."
The Tree of Life Web Project
 http://www.tolweb.org an alternate, already fully functional resource.

17)
Beam It Down From the Web, Scotty
http://www.nytimes.com/2007/05/07/technology/07copy.html?pagewanted=print
PASADENA, Calif. Sometimes a particular piece of plastic is just
what you need. You have lost the battery cover to your cellphone,
perhaps. Or your daughter needs to have the golden princess doll she
saw on television. Now.
In a few years, it will be possible to make these items yourself.
You will be able to download three-dimensional plans online, then
push Print. Hours later, a solid object will be ready to remove from
your printer.


18)
Vital US institutions left wide open to terror attack
http://www.theinquirer.net/default.aspx?article=39483
WHILE THE US Department of Homeland Security has been making life
miserable for those who have the misfortune of being tourists to its
country, they seem to have missed a huge software security hole which
could bring down their nuclear power stations.
The flaw, found in Protocol Handling Vital National Infrastructure
Systems which control dams, oil refineries, railroads and nuclear power
plants have a vulnerability that could mean that hackers could take them
over.
Security boffins Neutralbit say that the flaw is remotely exploitable
and can be found in SCADA which is short for supervisory control and
data acquisition.
The hole is in the NETxAutomation NETxEIB OPC Server which is Microsoft
software designed to write GUI applications for SCADA. Neutralbit has
also published five vulnerabilities having to do with OPC.

19)
Forget the Nigerian spam scam; now it's a take-off on Three Kings
http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9018838
A twist on the classic Nigerian e-mail scam that steals from the plot of
the George Clooney movie Three Kings is hitting in-boxes, Symantec Corp.
said Monday.
In these e-mails, a U.S. soldier based in Iraq claims that he has found
a horde of cash or gold, a plot point central to the 1999 film. The
e-mail explains that the total "haul," which is often pegged at $750
million but can vary wildly from spam run to spam run, has been split
among the men who found it. The soldier's take: $20 million.
Unfortunately, after he was cashiered from the army and returned to Iraq
to work as -- tugging at the heartstrings -- a humanitarian worker, he
was injured by a roadside bomb and now is on his deathbed.
"The doctors have told me point blank that I would die at any moment,"
the soldier writes in the spam message.

20)
Hot Technology Tips Pages
http://www.edu-cyberpg.com/Technology/tips.html

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Educational CyberPlayGround NetHappenings Mailing List ©1993
NetHappenings: the largest and oldest K12 Education Mailing List
Email Preferences -- Subscribe - Unsubscribe - Digest
http://www.edu-cyberpg.com/Community/NetHappenings.html

Copyright FAIR USE Statements to be included when reproducing
annotations from NetHappenings.

The single phrase below is the copyright notice to be used when
reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts: