¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º Please link to the Educational CyberPlayGround http://www.edu-cyberpg.com Add your SCHOOL OR SCHOOL DISTRICT URL http://www.edu-cyberpg.com/schools/ Please Share and Add Your Song http://www.edu-cyberpg.com/ncfr/ Educational CyberPlayGround NetHappenings Mailing List ©1993 ¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º Greetings, Enjoy todays reading. Hat's off to Fran Allan!! <Karen> 1) Vista security overhaul questioned http://tinyurl.com/28rj6a Security researchers have taken issue with Microsoft's implementation of a security feature in Vista that is designed to stop users from routinely running systems in admin mode. Users of Windows XP and older Microsoft operating systems habitually ran PCs in admin mode, which gives unrestricted access to the system. As a result, malware attacks carried the ability to take over compromised systems which wouldn't normally be possible if a machine was running in user mode. The User Account Control (UAC) security functionality of Windows Vista is designed to address this problem by obliging users to run their Vista PCs via a normal user account by default. Users are asked to switch modes and enter login credentials when they request a task requiring admin credentials. White hat hacker Joanna Rutkowska discovered that users attempting to run an installation file need to do so in admin mode. That means users are confronted with the all-or-nothing choice of granting an installed program complete system privileges or abandoning an installation altogether. More Computer Wonder Women and White Hat Hackers http://tinyurl.com/232ufk I am happy to announce Fran Allen First Women To Win A.M. Touring Award !!! YES http://tinyurl.com/24oksq 2) New Online: Learn English - with audio and transliterations http://www.learn-english.co.il Learn English is a free, on-line, educational resource helping ESL and EFL students to learn English words. The flash site incorporates 40 topics, along with over 1,500 English words and phrases. When you click on a word or phrase you can hear it spoken. The high quality audio was created in a sound studio. 3) I-Team Investigation: DMV Security Risk http://tinyurl.com/ywdlgl Anyone who wants a driver's license must hand over their personal information as a requirement at the Department of Motor Vehicles. And when you hand over your personal information to the DMV, you expect it to be safe and secure. But an audit conducted by the state shows that DMV computer systems have serious flaws that could jeopardize your privacy. The I-Team has been looking into the problem and found many of these problems are not new, some go back as far as 2002. The state audit is highly critical of the DMV's computer security, saying even the most basic security steps have not been taken. For its part, the DMV says it is taking quick action to fix the flaws. 4) K-12 Filters used in Schools and Libraries http://tinyurl.com/2bbzcz How they still go to anything they want. 5) DNS attack puts Web security in perspective http://tinyurl.com/22wo57 A few years ago, I had the privilege of seeing some root DNS servers in action at VeriSign's main headquarters. It's something I had wanted to do for over a decade, and I was literally slightly shaking with excitement (yes, I am that big of a geek). Physical security was high. It took three-factor authentication to get me past the two mantraps and the bomb-blast protected walls. My escort had to use handprint geometry, a PIN, a smart card, and a retinal scan to get me into the inner sanctum. Turns out VeriSign's DNS root servers at this location are composed of two physically separate, 10-high stacked, 1U pizza-box-style IBM eServers (VeriSign said they tested many different servers, and IBM's gave them the best performance per dollar), running Solaris and Red Hat Linux. Not surprisingly, they don't run BIND and keep things intentionally diverse to protect against a platform-specific attack. 6) How to Integrate Technology Into The Classroom http://tinyurl.com/yyd3mg 7) Pakistan gears up to counter cyber terrorism http://tinyurl.com/2g49va 8) Hackers fake Howard heart attack http://tinyurl.com/yqqsqt EMAIL hackers are using a fake news alert claiming Prime Minister John Howard suffered a heart attack in an attempt to steal personal information from Australian PC users. The email features a news report falsely claiming to come from The Australian newspaper's online edition and which includes links to malicious websites. 9) Sweden to ban website attacks http://tinyurl.com/2gq63j Disabling websites through programming computers to automatically click on the same page thousands of times so-called denial of service attacks will be made a criminal offence in Sweden from 1st June. 10) Higher Education Podcasts hosted http://www.Ed-Cast.org Free Education on the Net http://tinyurl.com/f6old Applications and Tutorials http://tinyurl.com/2akcws 11) Korea Becomes Haven for Hackers http://tinyurl.com/yrqcfn 12) Snort is buggy http://tinyurl.com/29lutd A flaw in Snort, the popular open-source intrusion detection system, could be used by attackers to run malicious code on vulnerable machines, several security organizations reported yesterday. 13) Cyber Czar Interview http://tinyurl.com/2x8u9n The top U.S. cybersecurity official wants Congress to come up with ways to promote adoption of security technologies, and he sees a tax break as one possible incentive. 14) Hip-Hop Outlaw (Industry Version) - Samantha M. Shapiro NYT Worth reading http://tinyurl.com/2rk5b7 K12 Music Education http://tinyurl.com/3x85ny Music Law - Copyright, Contracts and Deals http://tinyurl.com/lugsw 15) The Do's and Don't re: Corporate Blogging http://tinyurl.com/2s5d4k 16) Air Force Explores the Next Frontier http://tinyurl.com/39waxz As cyberwarfare grows in importance, the Air Forces new Cyber Command could become a magnet for funding, resources and capabilities. 17) 30 States looking into the hacking of retailers http://tinyurl.com/32egu7 A posse of 30 attorneys general, including Florida's, is looking into how hackers wormed their way into a customer database holding personal information on customers of Marshalls, TJ Maxx http://tinyurl.com/34zjcg and HomeGoods. The thieves didn't just make off with credit card information of patrons of the popular retailers, which are owned by a Massachusetts-based public company. The illicit bounty included personal checks, debit cards and possibly driver licenses. 18) PHP Group accused of security incompetence http://tinyurl.com/2lugel PHP developer Stefan Esser has said he will go ahead with plans to disclose dozens of security flaws in PHP in March, hitting back at criticism that the "Month of PHP bugs" project is nothing more than dangerous, self-serving publicity. 19) New Weapon in Web War Over Piracy http://tinyurl.com/38f527 gives a good summary of activities in the content control fingerprinting technology arena. Efforts to control content in this manner will push offending material to sites that are not controlled. 20) MPAA Steals Code, Violates Linkware License http://tinyurl.com/2ykgan According to Patrick, it isn't something new to find his blogging software being used like this. What he finds really odd is that an organisation whose goal is to "protect" copyrighted creative works has no qualms in, essentially, stealing other people's work. The MPAA still haven't replied to a letter he sent them about the illegal use of his blogging software. 21) Java creator named to Order of Canada http://tinyurl.com/2mmh9x The man credited with inventing the Java programming language commonly used on the World Wide Web has been appointed to the Order of Canada. <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<> Educational CyberPlayGround NetHappenings Mailing List ©1993NetHappenings: the largest and oldest K12 Education Mailing List Email Preferences -- Subscribe - Unsubscribe - Digest
http://www.edu-cyberpg.com/Community/NetHappenings.html Copyright FAIR USE Statements to be included when reproducing annotations from NetHappenings. The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format: EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com NetHappenings copyright <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>