¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º Please link to the Educational CyberPlayGround http://www.edu-cyberpg.com Add your SCHOOL OR SCHOOL DISTRICT URL http://www.edu-cyberpg.com/schools/ Please Share and Add Your Song http://www.edu-cyberpg.com/ncfr/ Educational CyberPlayGround NetHappenings Mailing List ©1993 ¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º Howdy Everyone, Happy Reading for today. best, <Karen> 1) More professional Internet hackers fueling thriving underground economy http://english.people.com.cn/200703/20/eng20070320_359160.html Online hacking continued its two-year trend toward criminalization in the last half of 2006, with data theft fueling a thriving underground economy, according to an Internet security report released on Monday. The semi-annual report by computer security services firm Symantec found that people could pay for as little as 14 U.S. dollars online to buy a new identity, and complete with working U. S. bank account, credit card with security code, date of birth and government-issued social security number. 2) Internet crime pays http://www.theregister.co.uk/2007/03/19/fbi_crime_report_2006/ Cyber-crime is alive and kicking in the USA, and playfully swimming through its riches like Scrooge McDuck in a money vault, the FBI's Internet Crime Complaint Center annual report [1] reveals today. In 2006 US consumers filed 207,492 complaints about internet crime and reported record losses of $198.4m. Online auction fraud, such as receiving a different item than expected, topped the list, accounting for 44.9 per cent of complaints. Undelivered merchandise and payments were next in line, accounting for 19 per cent. Greedy fools are still falling for the 419 scam (which the FBI calls "Nigerian Letter Fraud"). On average, victims last year lost $5,100 a pop to the countless princes of Nigeria, by sensibly moving their Majesties' assets to the US. 3) Microsoft guidelines give the bottom line on security settings http://www.gcn.com/online/vol1_no1/43347-1.html Microsoft Corp. has produced a set of security guidelines [1] for Windows Vista, providing a checklist of security settings and configurations for two levels of enhanced security in the new operating system. ********************************************************************* PLEASE ADD YOUR K12 SCHOOL OR SCHOOL DISTRICT TO THE MASTER DIRECTORY OF SCHOOLS ONLINE http://www.edu-cyberpg.com/schools/ The registry is organized by state and by grade level. The registry also includes sites for charter Schools, virtual schools, school districts, state and regional education organizations, state departments of education, state standards and state administrators. ********************************************************************* 4) Are secure connections really that secure? http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9013640 The little lock icon that appears on a Web browser window frame when a secure connection exists between a browser and a Web server may be lulling users into a false sense of security. "There are misconceptions that technologies such as SSL indicate that a Web site is safe when, in fact, it is not," 5) Denso's management of classified data lax http://www.yomiuri.co.jp/dy/editorial/20070320TDY04005.htm National interest at risk Denso enjoys a high global reputation for its technologies and products. The downloaded blueprints are for commercial products, but they could be converted to build military hardware. Vast amounts of such data may already have been passed to China. The case must be thoroughly investigated to determine whether the data was stolen for commercial or military purposes. 6) GoDaddy, Get a Backbone and Protect Your Users' Rights http://www.eff.org/deeplinks/archives/005168.php A few weeks back, we wrote [1] about how domain name registrar GoDaddy took offline Seclists.org based merely on an informal request and without providing any meaningful notice to the site's operator. Unfortunately, this isn't the only instance in which GoDaddy has carelessly ignored its users' rights. 7) Tools Fight Forensics http://www.darkreading.com/document.asp?doc_id=119806 A breadth of anti-forensics tools -- most of them free -- is making it easier for the bad guys to cover their tracks in malware and data theft attacks. 8) IT illiteracy undermines productivity http://www.pcw.co.uk/itweek/analysis/2185783/illiteracy-undermines While UK politicians and business leaders continue to voice concerns over the current shortage of skilled IT professionals far less attention has been granted to the equally serious problem posed by a deficiency of basic IT skills amongst the general workforce. 9) Action Jackson <http://www.stltoday.com/stltoday/news/stories.nsf/sciencemedicine/story/26A8D24E8F39FA1C862572A3000B966C?OpenDocument> Robot makes drip paintings like Jackson Pollock's Mechanical engineering student Topher McFarland flipped a switch in a Washington University lab and a robot began sucking white paint through a tube. With another command, McFarland sent the robot into a spastic dance, spurting paint onto cardboard scavenged from Best Buy. 10) First Regional Cyber Security & Research Center Opens at Chandigarh http://www.itnewsonline.com/showstory.php?storyid=9064 NASSCOM, the premier trade body and "voice" of the IT software and services industry, in association with Chandigarh Administration has opened the Regional Cyber Security and Research Center (RCSRC) at Chandigarh. 11) TJX sued by shareholder over records http://www.businessweek.com/ap/financialnews/D8O05AT80.htm A big shareholder of TJX Cos. has filed a lawsuit to obtain records showing how the retailer handled computer problems that exposed customer information to hackers. Arkansas Carpenters Pension Fund, which owns 4,500 shares of TJX stock, said the company rebuffed its request to see documents detailing the safeguards on the company's computer systems and how the company responded to the theft of customer data. The suit was filed Monday afternoon in Delaware's Court of Chancery, under a law that allows shareholders to sue to get access to corporate documents for certain purposes. TJX stolen data used in Florida crime spree http://www.infoworld.com/article/07/03/21/HNtjxarrests_1.html Law enforcement officials in Florida have arrested six individuals suspected of carrying out a fraud scheme built around the misuse of credit card data stolen from retailer TJX Companies. In partnership with the Gainesville Police Department, officials from the Florida Department of Law Enforcement said they have taken six of 10 suspects into custody for allegedly using the TJX customer data to purchase large quantities of gift cards from discount chains Wal-Mart and Sam's Club. 12) RIM chief: Wireless security must be top priority <http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9013802> Wireless security must be the top priority for providers doing business with the U.S. government, Research In Motion Ltd.'s (RIM's) president and co-CEO said Tuesday. 13) New NSA Security Guidelines for Mac OS X Published http://www.macobserver.com/article/2007/03/20.8.shtml The National Security Agency (NSA) has published version 2 of its security guidelines for Mac OS X. The security documents are available in PDF format on their OS Guides page [1] for Mac OS X. These documents for Mac OS X and Mac OS X Server represent best practices for securing the OS and are widely used by the industry as internal standards for configuring Mac OS X. The document is actually written by experts at Apple and endorsed by the NSA which says on its Website," It is our belief that these guides establish the latest best practices for securing the products and recommend that traditional customers of our security recommendations use the Apple guides when securing Macintosh OS X 10.4.x and Macintosh OS X Server 10.4.x." 14) Net Censorship http://www.edu-cyberpg.com/Technology/censor.html Great Firewall of China Checks addresses against Chinese government Internet censorship protocols to find if a site is blocked in China. 15. U.S. Nuclear Plants in the 21st Century: The Risk of a Lifetimehttp://www.ucsusa.org/clean_energy/nuclear_safety/us-nuclear-plants-in-the-21st-century.html
Executive summary and full text of a 2004 report that discusses the safety of nuclear power plants "during the three stages of plant lifetime: the break-in phase, middle life phase, and wear-out phase." The report notes that several nuclear plant disasters, including Three Mile Island and Chernobyl, have occurred during the "break-in" phase when there have been "unexpected safety problems." Also considers the need for continued regulation. From the Union of Concerned Scientists (UCS). 16. Communist Party USA Gives Its History to N.Y.U. http://www.edu-cyberpg.com/Music/woodieguthrie.html 17. 2006 Interent Crime Report http://www.fbi.gov/page2/march07/ic3031607.htm 18. Admins, Parents & Teachers Learn How to Keep Your Child Safe on the Interent -- Trouble Areas for Kids http://www.edu-cyberpg.com/morestuff4.html Find out what your kids have put up online, their names, address, pictures, what they think. This needs to be supervised and you won't be able to keep up with what is going on here. Chat Rooms, Blogs, Instant Messaging, IRC, Newsgroups - they don't understand that they have gone public and have lost their privacy. 19. Emergency Communication Disaster Plan Check List Get Your Personal Disaster Plan http://www.edu-cyberpg.com/Technology/disaster.html Is your State Prepared? Does your school have a plan? Do you have a plan? Have we learned anything yet? 20. "Standing In The Shadows Of Motown" Funk Brothers WEQUEST http://www.edu-cyberpg.com/culdesac/Stars/funkbrothers.html Chosen Best Documentary Non Fiction Category -- New York Film Critics Circle 12/16/02 2 Grammy nominee - Best Movie Soundtrack 1/7/02 2x Grammy Winner 2003 Try the Funk Brothers Empty Nest Webquest 21. Judge Throws Out Internet Blocking Law http://biz.yahoo.com/ap/070322/internet_blocking.html?.v=3 Judge Tosses Law That Makes It a Crime for Web Sites to Let Kids Access 'Harmful' Material PHILADELPHIA (AP) -- A federal judge on Thursday threw out a 1998 law that makes it a crime for commercial Web site operators to let children access "harmful" material. In the ruling, the judge said parents can protect their children through software filters and other means that do not limit the rights of others to free speech. <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<> Educational CyberPlayGround NetHappenings Mailing List ©1993NetHappenings: the largest and oldest K12 Education Mailing List Email Preferences -- Subscribe - Unsubscribe - Digest
http://www.edu-cyberpg.com/Community/NetHappenings.html Copyright FAIR USE Statements to be included when reproducing annotations from NetHappenings. The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format: EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com NetHappenings copyright <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>