-=PCTechTalk=- Interesting articles

  • From: "Bashful Bob" <Bashfulbob@xxxxxxx>
  • To: "PCTT" <pctechtalk@xxxxxxxxxxxxx>
  • Date: Fri, 3 Jun 2005 11:45:57 -0500

Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
http://www.technewsworld.com/story/commentary/43413.html

=20

The Most Powerful Labor Union in the World: Linux?

TechNewsWorld

05/30/05 5:10 AM PT=20

This is power that Microsoft, Oracle, IBM and many governments could =
only dream of having. The power to control the press and the skills =
contained in this organization are likely capable of disrupting travel, =
power grids and other broad national infrastructure systems if their =
demands are not met.

=20

For several years a number of us have been anticipating the emergence of =
a Software Labor Union. The argument has not been whether it will emerge =
but what form it will take. The conditions for forming technology unions =
have never been better.

************************************************************

http://www.ciphertrust.com/resources/articles/articles/jaynes.php

=20

Spammer in the Slammer: Jeremy Jaynes=20

Sentenced to Nine Years

Will other spammers take heed? Don't count on it.

May 2, 2005

Jeremy Jaynes was on top of the world. By age 28, he owned a =
million-dollar home, a high-class restaurant, a chain of gyms and =
countless other toys. Yet those were only the spoils of his main line of =
business, which was swindling innocent people out of their money through =
email scams.=20

=20

>From an unassuming house serving as his company's headquarters in =
Raleigh, NC, Jaynes sent an estimated ten million messages a day =
pitching products most recipients didn't want, amassing an estimated $24 =
million fortune in the process. Using aliases such as Jeremy James and =
Gaven Stubberfield, Jaynes spammed his way up to the #8 position on =
Spamhaus' Register Of Known Spam Operations (ROKSO) and grossed as much =
as $750,000 a month, allowing him to live like a king (but not the Spam =
King).=20

=20

Last week, though, Jaynes ran head-on into an information superhighway =
road block when a Virginia judge sentenced him to nine years in prison =
for his November conviction on felony charges of using false IP =
addresses to send mass email advertisements (some just call it =
spamming). The conviction was a landmark decision, as Jaynes became the =
first person in the United States convicted of felony spam charges. =
Though his operation was based in North Carolina, Jaynes was tried in =
Virginia because it's home to a large number of the routers that control =
all Internet traffic (it's also the home of AOL and a government =
building or two).=20

****************************************************************

Story URL: =
http://networks.silicon.com/webwatch/0,39024667,39130830,00.htm=20



Europe home to majority of zombies

Dan Ilett

silicon.com

May 31, 2005

Europe was home to more hacker-controlled (zombie) computers in May than =
anywhere else in the world, according to vendor research.

Zombie computers are typically infected with viruses and used to send =
spam and perform denial of service attacks

Using a tool that can track zombie machines, CipherTrust found that 26 =
per cent of them were hosted in European countries, with most of them in =
Germany (six per cent), France (five per cent) and the UK (three per =
cent).

*****************************************

=20

http://www.ciphertrust.com/resources/statistics/zombie.php

=20

CipherTrust's ZombieMeterSM tracks worldwide zombie activity in =
real-time. With more than 1,500 enterprise customers, CipherTrust has a =
very broad, unique view of the Internet and potential threats as they =
happen across the globe. By monitoring global messaging activity and =
identifying behavioral patterns, CipherTrust can continue to provide =
predictive protection against threats before they emerge.

=20

Through data received from the Company's global network of IronMail=AE =
appliances, which protect more than 10 million enterprise e-mail =
inboxes, the ZombieMeterSM tracks the number of new, completely unique =
zombies per hour, every hour. Visitors can view real-time updates =
regarding new zombie activity across the world, including the =
origination of messages and the number of machines affected by zombie =
activity.

***************************************************************

http://www.ftc.gov/bcp/conline/edcams/spam/zombie/

=20

Spammers use home computers to send bulk emails by the millions. They =
take advantage of security weaknesses to install hidden software that =
turns consumer computers into mail or proxy servers. They route bulk =
email through these "spam zombies," obscuring its true origin.=20

=20

As part of a worldwide effort to prevent these abuses, the FTC announces =
"Operation Spam Zombies." In partnership with 20 members of the London =
Action Plan and 16 additional government agencies from around the world, =
the Commission is sending letters to more than 3000 Internet service =
providers (ISPs) internationally, encouraging them to take the following =
zombie-prevention measures:

***************************************************************

=20

http://geeks.com/pix/techtips-110404.htm

=20

5 ways to backup your data...

The data on your hard drive is the most critical item inside your =
computer, and the only item which can not be replaced. It may be an =
unwanted hassle and expense to replace a defective memory module, =
monitor, or processor, but there is no replacing data once lost.

=20

In addition to the possibility of a simple hard drive failure, the =
threat of internet borne worms and viruses has become an increasing risk =
to data loss or corruption. Although you may not be able to provide =
absolute protection to your hard drive, there are various ways that you =
can ensure that the data on your hard drive is protected. Five methods =
of backing up your data are summarized below.=20

*******************************************

http://geeks.com/pix/techtips-19MAY05.htm

=20

CPU Socket Basics, Part 1=20

Intel:Although there are currently only two main players in the CPU =
market, AMD and Intel, the number of choices is still enough to make the =
typical consumer's head spin. Each manufacturer has a few different =
models to promote, and many of these models can be found in a few =
different form factors (namely, the "sockets" to which they connect) =
that exclude interchangeability.

=20

This two-part series of Tech Tips will look at a few details of each of =
the currently-supported CPU (Central Processing Unit) sockets and how =
they are all similar and different from one to another. First up, we =
will take a look at the CPU sockets supporting modern Intel processors.

*******************************************

http://yahoo.businessweek.com/magazine/content/05_22/b3935001_mz001.htm

=20

Hacker Hunters=20

An elite force takes on the dark side of computing=20

=20

In an unmarked building in downtown Washington, Brian K. Nagel and 15 =
other Secret Service agents manned a high-tech command center, poised =
for the largest-ever roundup of a cybercrime gang. A huge map of the =
U.S., spread across 12 digital screens, gave them a view of their prey, =
from Arizona to New Jersey. It was Tuesday, Oct. 26, 2004, and Operation =
Firewall was about to be unleashed. The target: the ShadowCrew, a gang =
whose members were schooled in identity theft, bank account pillage, and =
the fencing of ill-gotten wares on the Web, police say. For months, =
agents had been watching their every move through a clandestine gateway =
into their Web site, shadowcrew.com. To ensure the suspects were at =
home, a gang member-turned-informant had pressed his pals to go online =
for a group meeting

*************************************************
Life is what happens in between plans.

Virus free email by Norton's
This message is intended for the sole use of the individual and/or =
entity to which it is addressed, and may contain information that is =
privileged, confidential, and exempt from disclosure under applicable =
law. If you are not the addressee, or authorized to receive this on =
behalf of the addressee, you are hereby notified that you may not use, =
copy, disclose, or distribute to anyone this message or any part =
thereof. If you have received this in error, please immediately advise =
the sender by e-mail and delete this information. Thank you



--
<Please delete this line and everything below.>

To unsub or change your email settings:
//www.freelists.org/webpage/pctechtalk

To access our Archives:
http://groups.yahoo.com/group/PCTechTalk/messages/
//www.freelists.org/archives/pctechtalk/


Other related posts: