¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º Please link to the Educational CyberPlayGround http://www.edu-cyberpg.com Add your SCHOOL OR SCHOOL DISTRICT URL http://www.edu-cyberpg.com/schools/ Please Share and Add Your Song http://www.edu-cyberpg.com/ncfr/ Educational CyberPlayGround NetHappenings Mailing List ©1993 ¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º Howdy,Remember Next Tuesday is our last day of posts then we start our summer vacation!
Happy Reading for today. best, <Karen> 1) LEARN HOW TO BUILD A WEBPAGE AND LEARN THE BASICS OF DESIGN WITH FREE TOOLS http://www.edu-cyberpg.com/Internet/Interestingsites/BuildPageSite.html 2) Multiplayer Education Games FOR FREE! http://www.beeweb.org http://edutech.cs.brandeis.edu/ Spell Bee, GeograBee, MoneyBee, PatternBee 3) National Children's Folksong Repository Project http://www.edu-cyberpg.com/NCFR/ Adults and Kids are invited to participate: A public folklore project built by the citizens of the United States Call toll free 1-877-220-0262 east coast U.S. time SING OR CHANT YOUR SONG. 4) ICANN also just released an interview with Vint Cerf 2007 <http://www.edu-cyberpg.com/Internet/DOMAIN%20NAME/icann.html> where he talks about future of the organization as his chairmanship and time as a director draws to a close. And he asks for people with a "passion for the Internet" to apply for NomCom positions. 5) Two Good Spectrum Proceedings Die Quietly, but Copps and Adelstein Keep the Faith for the Future <http://www.publicknowledge.org/node/930> Several years ago, then-FCC Chairman Michael Powell attacked spectrum reform with true revolutionary zeal. Yes, Powell sought to recreate spectrum licenses as property, a move I vigorously oppose. But Powell also fought to make it easier for unlicensed spectrum users by improving the efficiency of the spectrum and facilitating spectrum sharing. Unsurprisingly, wireless incumbents fiercly resisted proposed changes that interfered with their business models. After the departure of Powell and NTIA Administrator Michael Gallagher in 2005, no one remained to champion controversial wireless proccedings. While FCC Chairman Martin has made some progress on unlicensed use, such as affirming that the OTARD rules apply to unlicensed transceivers, moving the broadcast ?white spaces? proceeding forward, and ? in the technical but highly important category ? making it easier for manufacturers to develop equipment for unlicensed use, Martin has also shown no inclination to carry on Powell?s crusade for spectrum reform where politically costly. So Martin has circulated a number of orders terminating proceedings begun by Powell that had the potential to radically transform the spectrum landscape, and which therefore attracted a great deal of industry resistance. Friday saw the termination of two such proceedings: one on ?interference temperature? and one on receiver standards. Briefly, the receiver standards proceeding would have explored ways to make receivers more resistant to interference. Generally, receivers are built as cheaply as possible and rely on the protections of licensing. Build receivers ?smarter? and more able to screen out interference and you make it possible to allow other devices to function at a low level in the same spectrum space. This improves the efficiency of wireless services and allows for ?smart? or ?cognitive? radios to use the available space (often referred to as an ?underlay?) and share the space without interfering with a licensed service. While nothing prevents the Commission from allowing the licensee to lease the newly available space via secondary markets, receiver standards were thought to give a boost to unlicensed sharing of licensed bands ? and as such were subject to frequent attacks by proponents of converting licenses into a species of property. (Property proponents argued that the licensee could impose needed standards in a more efficeint manner if licensee had financial incentive to do so. I note, however, that the Commission?s 2004 Secondary Market Order which would allow licensees to resell such spectrum rights has done nothing to prompt ?private commons? leasing arrangements.) 6) WE'RE STUCK IN THE SLOW LANE OF THE INFORMATION HIGHWAY <http://www.mercurynews.com/opinion/ci_5836382?nclick_check=1> [SOURCE: San Jose Mercury News, AUTHOR: Editorial Staff] [Commentary] When it comes to reasonably priced, high-speed Internet service, the United States is an embarrassment. Despite years of promises from politicians and technology titans, the U.S. continues to lag far behind our global competitors. Worse, much of U.S. "broadband" service is only a smidgen faster than a dial-up modem. Both government and the telecommunications industry are to blame. The technology to deliver truly high-speed Internet access is there, especially for cable subscribers. Customers need to demand better service from providers. The government needs to step in, too. The U.S. needs a national strategy to get affordable broadband to every man, woman and child by the end of the decade. The federal government's lack of leadership in this area is a disgrace. Despite a 2004 promise by President Bush to deliver "universal, affordable access to broadband technology by the year 2007," his administration has done nothing to advance that goal. 7) Local researchers offer free security service http://computerworld.co.nz/news.nsf/news/EC25C508910ADEE8CC2572D10014CB81 The free web service, PATROL (Periodic Assessment of TReasured Online Links), allows webmasters to submit their own URL to the Honeynet Project's open-source client honeypot, called Capture. Submitted URLs are monitored periodically by the client honeypot. Reports are generated on a regular basis and published on the New Zealand Honeynet Alliance website, says Seifert. The Honeynet Project also offers a service called SCOUT (Speedy Complete Online URL Test) which is more targeted at end-users, says Seifert. It allows them to submit a URL and get immediate feedback, he says. 8) Interview with Rain Forest Puppy May 1, 2007 http://www.ush.it/2007/05/01/interview-with-rain-forest-puppy/ Antonio `s4tan` Parata, software security researcher and member of the ush team interviews Rain Forest Puppy, famous bug hunter, specialized in web application assessment. It's a pleasure for us to publish the full interview, in this case talk is not cheap. Antonio "s4tan" Parata (ap): Hi Rain Forest Puppy, many thanks for this interview. You are considered one of the fathers of web security and the inventor of the SQL injection attack. Anyway in the year 2003 you decided to publicly retire from the security field (to get more infos Can you briefly sum your decision? 9) Thumb Drives Replace Malware As Top Security Concern,Study Finds http://www.informationweek.com/news/showArticle.jhtml?articleID=199300021 10) Laptop lock down http://australianit.news.com.au/articles/0,7204,21675095%5E15385%5E%5Enbv%5E,00.html In last year's AusCERT Computer Crime and Security Survey, 58 per cent of companies surveyed reported having laptops stolen, up from 53 per cent in 2005. Nine per cent of companies said handhelds had been stolen last year, up from 8 per cent in 2005. Forrester ICT consulting director Andrew Milroy says the risks are growing in line with increased usage of mobile devices. ********************************************************************* PLEASE ADD YOUR K12 SCHOOL OR SCHOOL DISTRICT TO THE MASTER DIRECTORY OF SCHOOLS ONLINE http://www.edu-cyberpg.com/schools/ The registry is organized by state and by grade level. The registry also includes sites for charter Schools, virtual schools, school districts, state and regional education organizations, state departments of education, state standards and state administrators. ********************************************************************* 11) Budget: Eye on cyber-terrorism attacks <http://www.zdnet.com.au/news/security/soa/Budget-Eye-on-cyber-terrorism-attacks/0,130061744,339276008,00.htm> The federal government has allocated more than AU$12 million over the next four years to expand the Australian Government Computer Emergency Readiness Team (GovCERT) and fight high tech crimes, including "cyber-terrorism". 12) Taiwan claims upper hand in hackers' war with rival China http://www.nwfdailynews.com/article/4709 TAIPEI, Taiwan (AP) - Taiwan's advanced computer technology helps the military fend off hacker attacks in continuing virtual skirmishes with rival China, a military official said Tuesday. 13) M&S loses personal data on 26,000 employees http://www.theinquirer.net/default.aspx?article=39473 FAVE SHOP OF THE chattering classes, Marks and Spencer has become the latest outfit to lose a laptop stuffed with empolyees' details. The shop admitted the computer contained addresses, dates of birth, national insurance and phone numbers of some 26,000 employees. It says the laptop was stolen from a printing firm that had been given the information in order to write to employees about pension changes. 14) Microsoft Patches 19 Bugs With 7 Bulletins -- All Critical http://www.informationweek.com/news/showArticle.jhtml?articleID=199400216 15) NIST puts its security guidelines in one basket http://www.gcn.com/print/26_10/44216-1.html The National Institute of Standards and Technology has released a database to help agencies collect data needed to assess information technology security programs and produce reports for action plans. 16) "Scientists Work on Encyclopedia of Life" http://www.usatoday.com/tech/science/2007-05-09-encyclopedia-of-life_N.htm"In a whale-sized project, the world's scientists plan to compile everything they
know about all of Earth's 1.8 million known species and put it all on one website, open to everyone." The Tree of Life Web Project http://www.tolweb.org an alternate, already fully functional resource. 17) Beam It Down From the Web, Scotty http://www.nytimes.com/2007/05/07/technology/07copy.html?pagewanted=print PASADENA, Calif. Sometimes a particular piece of plastic is just what you need. You have lost the battery cover to your cellphone, perhaps. Or your daughter needs to have the golden princess doll she saw on television. Now. In a few years, it will be possible to make these items yourself. You will be able to download three-dimensional plans online, then push Print. Hours later, a solid object will be ready to remove from your printer. 18) Vital US institutions left wide open to terror attack http://www.theinquirer.net/default.aspx?article=39483 WHILE THE US Department of Homeland Security has been making life miserable for those who have the misfortune of being tourists to its country, they seem to have missed a huge software security hole which could bring down their nuclear power stations. The flaw, found in Protocol Handling Vital National Infrastructure Systems which control dams, oil refineries, railroads and nuclear power plants have a vulnerability that could mean that hackers could take them over. Security boffins Neutralbit say that the flaw is remotely exploitable and can be found in SCADA which is short for supervisory control and data acquisition. The hole is in the NETxAutomation NETxEIB OPC Server which is Microsoft software designed to write GUI applications for SCADA. Neutralbit has also published five vulnerabilities having to do with OPC. 19) Forget the Nigerian spam scam; now it's a take-off on Three Kings http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9018838 A twist on the classic Nigerian e-mail scam that steals from the plot of the George Clooney movie Three Kings is hitting in-boxes, Symantec Corp. said Monday. In these e-mails, a U.S. soldier based in Iraq claims that he has found a horde of cash or gold, a plot point central to the 1999 film. The e-mail explains that the total "haul," which is often pegged at $750 million but can vary wildly from spam run to spam run, has been split among the men who found it. The soldier's take: $20 million. Unfortunately, after he was cashiered from the army and returned to Iraq to work as -- tugging at the heartstrings -- a humanitarian worker, he was injured by a roadside bomb and now is on his deathbed. "The doctors have told me point blank that I would die at any moment," the soldier writes in the spam message. 20) Hot Technology Tips Pages http://www.edu-cyberpg.com/Technology/tips.html <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<> Educational CyberPlayGround NetHappenings Mailing List ©1993 NetHappenings: the largest and oldest K12 Education Mailing List Email Preferences -- Subscribe - Unsubscribe - Digest http://www.edu-cyberpg.com/Community/NetHappenings.html Copyright FAIR USE Statements to be included when reproducing annotations from NetHappenings. The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format: EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com NetHappenings copyright <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>