[ECP] Educational CyberPlayGround NetHappenings Resources and Headlines

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Thu, 22 Feb 2007 11:31:11 -0500

¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º

Please link to the Educational CyberPlayGround
http://www.edu-cyberpg.com

Add your SCHOOL OR SCHOOL DISTRICT URL
http://www.edu-cyberpg.com/schools/

Please Share and Add Your Song
http://www.edu-cyberpg.com/ncfr/

Educational CyberPlayGround NetHappenings Mailing List ©1993

¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º


Greetings,

Enjoy todays reading.

Hat's off to Fran Allan!!

<Karen>



1)
Vista security overhaul questioned
http://tinyurl.com/28rj6a
Security researchers have taken issue with Microsoft's implementation of
a security feature in Vista that is designed to stop users from
routinely running systems in admin mode.
Users of Windows XP and older Microsoft operating systems habitually ran
PCs in admin mode, which gives unrestricted access to the system. As a
result, malware attacks carried the ability to take over compromised
systems which wouldn't normally be possible if a machine was running in
user mode.
The User Account Control (UAC) security functionality of Windows Vista
is designed to address this problem by obliging users to run their Vista
PCs via a normal user account by default. Users are asked to switch
modes and enter login credentials when they request a task requiring
admin credentials.
White hat hacker Joanna Rutkowska discovered that users attempting to
run an installation file need to do so in admin mode. That means users
are confronted with the all-or-nothing choice of granting an installed
program complete system privileges or abandoning an installation
altogether.

More Computer Wonder Women and White Hat Hackers
http://tinyurl.com/232ufk

I am happy to announce Fran Allen First Women To Win A.M. Touring Award !!! YES
http://tinyurl.com/24oksq


2)
New Online: Learn English - with audio and transliterations
http://www.learn-english.co.il
Learn English is a free, on-line, educational resource helping
ESL and EFL students to learn English words. The flash site
incorporates 40 topics, along with over 1,500 English words
and phrases. When you click on a word or phrase you can
hear it spoken. The high quality audio was created
in a sound studio.


3)
I-Team Investigation: DMV Security Risk
http://tinyurl.com/ywdlgl
Anyone who wants a driver's license must hand over their personal
information as a requirement at the Department of Motor Vehicles. And
when you hand over your personal information to the DMV, you expect it
to be safe and secure.
But an audit conducted by the state shows that DMV computer systems have
serious flaws that could jeopardize your privacy. The I-Team has been
looking into the problem and found many of these problems are not new,
some go back as far as 2002.
The state audit is highly critical of the DMV's computer security,
saying even the most basic security steps have not been taken. For its
part, the DMV says it is taking quick action to fix the flaws.


4)
K-12 Filters used in Schools and Libraries
http://tinyurl.com/2bbzcz
How they still go to anything they want.


5)
DNS attack puts Web security in perspective
http://tinyurl.com/22wo57
A few years ago, I had the privilege of seeing some root DNS servers in
action at VeriSign's main headquarters. It's something I had wanted to
do for over a decade, and I was literally slightly shaking with
excitement (yes, I am that big of a geek).
Physical security was high. It took three-factor authentication to get
me past the two mantraps and the bomb-blast protected walls. My escort
had to use handprint geometry, a PIN, a smart card, and a retinal scan
to get me into the inner sanctum.
Turns out VeriSign's DNS root servers at this location are composed of
two physically separate, 10-high stacked, 1U pizza-box-style IBM
eServers (VeriSign said they tested many different servers, and IBM's
gave them the best performance per dollar), running Solaris and Red Hat
Linux. Not surprisingly, they don't run BIND and keep things
intentionally diverse to protect against a platform-specific attack.

6)
How to Integrate Technology Into The Classroom
http://tinyurl.com/yyd3mg

7)
Pakistan gears up to counter cyber terrorism
http://tinyurl.com/2g49va

8)
Hackers fake Howard heart attack
http://tinyurl.com/yqqsqt
EMAIL hackers are using a fake news alert claiming Prime Minister John
Howard suffered a heart attack in an attempt to steal personal
information from Australian PC users.
The email features a news report falsely claiming to come from The
Australian newspaper's online edition and which includes links to
malicious websites.

9)
Sweden to ban website attacks
http://tinyurl.com/2gq63j
Disabling websites through programming computers to automatically click
on the same page thousands of times so-called denial of service attacks
will be made a criminal offence in Sweden from 1st June.

10)
Higher Education Podcasts hosted
http://www.Ed-Cast.org

Free Education on the Net
http://tinyurl.com/f6old

Applications and Tutorials
http://tinyurl.com/2akcws


11)
Korea Becomes Haven for Hackers
http://tinyurl.com/yrqcfn

12)
Snort is buggy
http://tinyurl.com/29lutd
A flaw in Snort, the popular open-source intrusion detection system,
could be used by attackers to run malicious code on vulnerable machines,
several security organizations reported yesterday.

13)
Cyber Czar Interview
http://tinyurl.com/2x8u9n
The top U.S. cybersecurity official wants Congress to come up
with ways to promote adoption of security technologies, and he sees a
tax break as one possible incentive.

14)
Hip-Hop Outlaw (Industry Version) - Samantha M. Shapiro NYT
Worth reading
http://tinyurl.com/2rk5b7

K12 Music Education
http://tinyurl.com/3x85ny

Music Law - Copyright, Contracts and Deals
http://tinyurl.com/lugsw

15)
The Do's and Don't re: Corporate Blogging
http://tinyurl.com/2s5d4k

16)
Air Force Explores the Next Frontier
http://tinyurl.com/39waxz
As cyberwarfare grows in importance, the Air Forces new Cyber Command
could become a magnet for funding, resources and capabilities.

17)
30 States looking into the hacking of retailers
http://tinyurl.com/32egu7
A posse of 30 attorneys general, including Florida's, is looking into
how hackers wormed their way into a customer database holding
personal information on customers of Marshalls,
TJ Maxx http://tinyurl.com/34zjcg
and HomeGoods.
The thieves didn't just make off with credit card information of patrons
of the popular retailers, which are owned by a Massachusetts-based
public company. The illicit bounty included personal checks,
debit cards and possibly driver licenses.

18)
PHP Group accused of security incompetence
http://tinyurl.com/2lugel
PHP developer Stefan Esser has said he will go ahead with plans to
disclose dozens of security flaws in PHP in March, hitting back at
criticism that the "Month of PHP bugs" project is nothing more than
dangerous, self-serving publicity.

19)
New Weapon in Web War Over Piracy
http://tinyurl.com/38f527
gives a good summary of activities in the content control
fingerprinting technology arena.
Efforts to control content in this manner will push offending
material to sites that are not controlled.

20)
MPAA Steals Code, Violates Linkware License
http://tinyurl.com/2ykgan
According to Patrick, it isn't something new to find his blogging
software being used like this. What he finds really odd is that an
organisation whose goal is to "protect" copyrighted creative works has
no qualms in, essentially, stealing other people's work. The MPAA still
haven't replied to a letter he sent them about the illegal use of his
blogging software.

21)
Java creator named to Order of Canada
http://tinyurl.com/2mmh9x
The man credited with inventing the Java programming language
commonly used on the World Wide Web has been appointed to the Order of Canada.


<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Educational CyberPlayGround NetHappenings Mailing List ©1993
NetHappenings: the largest and oldest K12 Education Mailing List Email Preferences -- Subscribe - Unsubscribe - Digest
http://www.edu-cyberpg.com/Community/NetHappenings.html

Copyright FAIR USE Statements to be included when reproducing
annotations from NetHappenings.

The single phrase below is the copyright notice to be used when
reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts: