Volume 12, Issue 08        Atari Online News, Etc.       February 19, 2010   
                                                                           
                                                                              
                  Published and Copyright (c) 1999 - 2010
                            All Rights Reserved

                          Atari Online News, Etc.
                           A-ONE Online Magazine
                Dana P. Jacobson, Publisher/Managing Editor
                      Joseph Mirando, Managing Editor
                       Rob Mahlert, Associate Editor


                       Atari Online News, Etc. Staff

                        Dana P. Jacobson  --  Editor
                   Joe Mirando  --  "People Are Talking"
                Michael Burkley  --  "Unabashed Atariophile"
                   Albert Dayes  --  "CC: Classic Chips"
                         Rob Mahlert  --  Web site
                Thomas J. Andrews  --  "Keeper of the Flame"


                           With Contributions by:

                                Fred Horvat



      To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
                log on to our website at: www.atarinews.org
                       and click on "Subscriptions".
      OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
          and your address will be added to the distribution list.
      To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
    Please make sure that you include the same address that you used to
                              subscribe from.

        To download A-ONE, set your browser bookmarks to one of the
                              following sites:

                http://people.delphiforums.com/dpj/a-one.htm
                               Now available:
                          http://www.atarinews.org


                 Visit the Atari Advantage Forum on Delphi!
                   http://forums.delphiforums.com/atari/



                                  =~=~=~=



A-ONE #1208                                                 02/19/10

   ~ Cyberattack Simulation ~ People Are Talking!    ~ Spying on Students!
   ~ Global Net Neutrality! ~ High Speed for Masses! ~ Cyber-Jihad Threat!
   ~ Atari's New Star Trek! ~ Google Buzz Complaint! ~ Atari Party in Mach!
   ~ MS Outlook Goes Social ~ Old NES Sells for $13K ~ Nintendo's DS2?      

                  -* Botnets in Government Systems *-
               -* Google Hackers from Chinese Schools *-
           -* Join the Vintage Digital Music Revolution! *-



                                  =~=~=~=



->From the Editor's Keyboard              "Saying it like it is!"
  """"""""""""""""""""""""""



Our luck held for a few weeks, but we finally got some payback this week
with a fresh blanket of 7 inches of snow.  Hey, it's New England - this
stuff happens here.  On the plus side, the temps have been in the upper
30's and lower 40's, so the stuff is disappearing rapidly.  Unlike what's
happening to our brethren down in the mid-Atlantic areas!

A story that appears in this week's issue really struck a nerve with me.
Imagine this...  A high school - a good one, mind you - gives all of its
students laptop computers for school work.  What a great gesture, and I
applaud things like this for schools to do.

Now, imagine yourself, as a parent, getting a phone call from the school.
The principal tells you that your child has been acting inappropriately.
As a parent, I'm sure that this is something that you'd appreciate hearing
about.  Oh, did we neglect to mention that this inappropriate behavior
was found to have occurred at home?!

You see (wait for it!), these laptops all have webcams included.  Nothing
strange about that, you say.  The systems are also equipped with a security
feature to aid in locating the machine should it become lost or stolen.
Again, nothing too strange here.  However, that security feature can be
activated at any time - it turns the webcams on and can see everything.
Seems like school officials activated these systems to spy on their
students, and catching some in embarrassing situations!

Can you imagine learning about something like this??  Schools have absolutely
no right to know what a student is doing outside of school (barring the fact
that it may be a school-sponsored activity), and especially what a student
does at home.  Once a student leaves the school for the day, he's no longer
"a student", but a private citizen.  It's an incredible breach of privacy!
How ironic that many students had recently finished reading George Orwell's
"1984"!!  Big Brother, indeed!

So, if your child had a school-sponsored computer for home use, with a 
webcam installed, you may want to place some tape over it when it's not
being used, just in case!  I hope that the families of some of these
students sue the school system for this totally unethical violation of
privacy!

Until next time...



                                  =~=~=~=



               Join the Vintage Digital Music Revolution!
                       Feature Your Music on AMN


The Atari Music Network is inviting you to join the Vintage Digital Music
Revolution! If you're an 8-bit chip musician or vintage MIDI synthesist,
you can promote your music here for FREE with a professionally designed
profile page!  This is your chance to get your music noticed as AMN embarks
on a mass marketing campaign to various e-zines, record labels, concert
promoters, blogs and websites.  So bust out those 0s and 1s and get your
Atari inspired music into the spotlight - this could be your big break!

Visit this link for more information:
http://www.atarimusic.net/index.php/component/content/article/37-fp-r...

(MAIN SITE) http://www.atarimusic.net



                            Atari Party
                         Davis, California
                            March 14th


Hi comp.sys.atari.st folks!  For anyone near Sacramento, California
(or SF Bay Area, and willing to drive one or two hours), we'll have
at least one Atari ST at the following event...

Atari video game aficionados from near and far will host the second
annual Atari Party in Davis, California on Sunday, March 14th.

Atari Party invites the whole family to a day of games, prizes, and
even a little bit of learning. Test your skill with 300 video games on
30 game systems dating as far back as 1975, plus get a chance to win
prizes in a free raffle, learn about the golden age of Atari with a
screening of the documentary film "Once Upon Atari", and experience
the first major motion picture to extensively use computer graphics
with a screening of the 1982 Disney film, "Tron."

Admission is free and children are welcome. Raffle prizes include
retro-style USB joysticks from Legacy Engineering, books from O'Reilly
Media, gift certificates for ThinkGeek.com, and classic Atari computer
systems.

Atari Party is March 14th from 12pm to 8pm at the
Redwood Park Community Building, 1001 Anderson Road in Davis, California.

For more information, visit
http://www.newbreedsoftware.com/atariparty/



                                  =~=~=~=



                             PEOPLE ARE TALKING
                          compiled by Joe Mirando
                             joe@atarinews.org



Hidi ho friends and neighbors. Well, I neglected to mention it last week,
but the Olympics are in full swing right now. I still love the old tried
and true events like downhill and slalom skiing, but I've got to admit
that I'm transfixed by the snowboarding events... while most of the moves
and "tricks" seem like recklessness to me, I've got to admit that they
must take a huge amount of physical strength and coordination and skill.

While watching the gymnastics of the summer games has always left me
speechless (quite a feat in itself), snowboarding leaves me even more so.
I've never set foot on a snowboard, so I can't say for sure, but I'm
guessing that there's nothing closer to flying than that. That's what I
used to say about the ring and uneven parallel bar competitions in
gymnastics... the grace and agility and sheer control needed to make
these things look so graceful... to even make them possible... leaves me
in awe. And while snowboarding isn't quite the same, the sheer physical
strength and control that must be needed leaves me watching and mouthing
the words, "That's just so cool!"

And there are, of course, the media darlings of the Olympics too. I'm
guessing that each country has them, but here in the United States, the
ones getting press seem to be Lindsey Vonn and Shaun White.

Vonn is the skier that announced just before the Olympics that she'd
sprained her shin or ankle or something... jeez, this is one
accident-prone young lady. What amazes me is that, no matter what it is,
she's out there practicing or exercising whatever injury it happens to be
instead of backing off and letting it get the best of her.

Shaun White has got to be the nickname king of this Olympics, being known
as the Flying Tomato, Red Zeppelin, and Animal among other things... He's
exactly the kind of show-off punk kid I hate...

Except that you can't hate this guy! He's just so... him. He loves what
he's doing and he's blessed enough with the talent to be good at it.
You just cannot watch him snowboarding and not say "wow!" or "Oh
cool!" or even "I'll be damned!" and smiling at the sheer talent and
grace required. AND he seems to actually be a nice guy too. Oh well, I
guess I can let ONE slip by, right? [grin]

On a somber note, this Olympics has been touched by sadness too. Nodar
Kumaritashvili, Georgian luger (pronounced "loo-jer", not like the
handgun manufacturer), died when he slammed into a beam after leaving the
track during a training run. Some international committee 'decided' that
the accident was his fault, and not that of the track or its designers...
I have no idea how they came to that conclusion or how valid it is, so I'm
not going to say anything rude about them, but 'cmon, the guy DIED... and
not in an easy way either. He slammed into that beam at a high rate of
speed (estimated at 89 miles/143 kilometers per hour) and died shortly
thereafter.

89 miles an hour?? I'm sorry, but there is no way you'd ever get me to
travel at 89 miles an hour, on my back, inches from an ice-covered
track.. I don't even like WALKING on ice!

It was a terrible, terrible accident, but what bothers me even more than
the controversy over why it happened (its a 'fast' track, with top speed
clocked at 95 miles an hour, and some say that THAT was the cause of the
accident, not a mistake on Kumaritashvili's part) is the fact that
network television showed the crash over and over... Come on, execs; put
your foot down and say, "No, that's not right... stop the playback before
the impact". It sickened me the first time I saw it, and it only got
worse each time I saw it after that. If people (viewers and network execs
both) want bloodsport, let's just bring back gladiators and dog fights.

Well, let's get to the news, hints, tips and info available from the
UseNet, shall we?


From the comp.sys.atari.st NewsGroup
====================================


'Zorro' posts this about zWeather:

"Thanks to MiKRO, zWeather 1.2 is available. No new features but a couple
of bugs have been fixed and, the most important, now zWeather should get
again the datas from weather.com."


'Falcon060' asks Zorro:

"This is great news!!! But when I tried it it does not seem to
load. I have put the Gemsys folder on C drive and let it replace the
files. Just to let you know the old zwether was only about 248,000
bytes and this new one was 545000 bytes is that correct? If that is
not correct then I may have to dig out my old CD's and get LZH
unpacker rather than using the PC to unpack the archive and moving it
over by floppy. Any thoughts on this one?"


MiKRO of Mystic Bytes tells Falcon060:

"Yes, this is it, no need to do anything more (than putting the Gemsys
folder on drive C). What do you mean "does not seem to load" ? It hangs?
Return to desktop? What environment / desktop? Loading time with this
version is quite long, esp. on 030 machines, it has to load and depack ~50
PNG icons. If you can, test it in aranym with network, it should works out
of the box. And remember, all Zorro's code is compiled for 030+ and (!)
FPU.

Yes, the size is correct. All code (incl. libraries) was recompiled with
gcc4 (it produces a little bit bigger binaries in aggressive optimization
modes) plus libxml was updated to the latest version (possible code
increase). zWeather binary itself is stripped and upx-ed, so the
smallest possible size is achieved."


Falcon060 replies:

"It does not seem to be loading. I am running the latest Magic (6.2 I
believe) with Jinnee 2.5 desktop. I am using this on a CT60'ed Falcon
running at 95 mhz. It would seem load time would not be that long. A
couple of other things noticed, Whenever I open one of my partitions
(Hard Drive or CD drive) when I try to move the window it just moves a
like an 1/8 of an inch then you have to re-grab the window to move it
just another 1/8 of an inch. So you can see that would become very
annoying.  When I hit CONTROL-ALT-ESCAPE to bring up the processes
running I notice that zweather is running but is taking up tremendous
amounts of ram. I have 512 mb of RAM and it seems to be taking up
most of that. Not sure why. I will look into the CT60 memory usage
CPX and see what it reports as used and free ram.

Again this should not be a problem for a 060 running at 95 mhz and
built in FPU and PMMU.

OK it seems that maybe I have everything right.  But will have to play
around with it some more and see what I can get it to do.  In the mean
time let me know if you have any questions or comments on what could
be causing this.  I am using an EtherNEC with the 68060 driver from
Didier, or at least the CT60 package.

Apparently I had a corrupt file when transferring from my PC to my
Falcon060. So I have to test my 3.5 inch floppy to find out which is
defective. I ended up downloading all HIGHWIRE, Zweather and
MagicXNet files I needed and burnt them to a CD and all was well.
Zweather works once again!!!! It is great to have this little piece
of wonderful software working once again!!!"


Jo Even Skarstein asks:

"Wouldn't it be possible to cache the converted icons instead of
converting them each time the application is started?"


Falcon060 agrees:

"I wondered the same thing. But, if your running a CT60 at 90+ mhz.
I doubt it takes very long. Once I am at my desktop, it is less than
5 seconds and Zweather is up and running. But I could see where
slower atari computers would be an issue. By the way, how are you
doing? Not sure if you remember me? I was the one that gave you all
the MagicXNet files I believe to look at and see if we could figure
something out for the EtherNAT."


MiKRO replies:

"Ah, glad to see you have sorted it out. It's true I haven't tested it
on MagiC but it would be very strange if it didn't work.

About the loading time: in Zorro's latest sources you can find very
similar thing -- all images are bundled in one PNG and stored as MFDB
(Atari native) format internally. But hard to say anything about
release date, it's up to him or anyone else who is going to continue
the development (https://sourceforge.net/projects/z-tools)"


Falcon060 tells MiKRO:

"Maybe sometime this year I will take a look at the sources and try
doing some compiling of my own.  Then figure out the PNG loading
process and see if there is a better way or not.  But honestly, it
only takes less than 5 seconds from the time the desktop appears till
Zweather is up and running.  Not sure that it has any benefit other
than for much slower computers with not much ram.  Even a Falcon030
stock with 14 mb of Ram should do ok at loading this in at bootup
time.  Anyone have any thoughts on this?  Does anyone actually run
Zweather on a stock Atari computer.  If so, what are your OS, system
specs and how long does it take to bring Zweather up and running?
Would really tell me if its worth the time to take on a project like
this."


Ben Smith asks about hard drive capacities:

"What is the maximum capacity for SCSI-2 ST Hard Drives Running with ICD
Pro, Link Host or ADSCSI Plus and TOS v.1.2! I'm not interested in
switching away from ICD PRO Host Software! What Determines if a SCSI Hard
Drive has too much capacity? I use a Seagate Fast SCSI 2 ST11200N Hard
Drives!"


Dave Wade tells Ben:

"If you insist on sticking with ICD Pro then you are stuck with its
limitations. As an IT Pro I see so many tender documents which specify a
particular version of software and then ask for work arounds for its
limitations. WHY CHOOSE IT IF IT DOES NOT DO WHAT YOU WANT!
I have a pile of Seagate SCSI drives that will only format on my TT-030
with HDDRIVER. The time its saved me has more than covered the cost of
purchase. So whilst it doesn't get round all problems it does allow me to
use a load of drives that I can't get working with any other program. Its
actively supported so if you do have a problem you can e-mail the author
(unlike hi -wire!) and get a response."

Ben tells Dave:

"I'm Happy with it's limitations, I just need to know which drives I can
use with the ICD Pro? What determines that? Is it capacity?

It does do what I want! I need to know which Drives I can use with it!
What parameters? Is their a maximum capacity?

I have HDDRIVER and I will not use it! I like ICD Pro!"


Jo Even Skarstein adds:

"Any SCSI-drive where parity can be disabled by a jumper. Size doesn't
matter, but there might be some limitation the SCSI-adapter. It's quite
likely that you can't access sectors beyond 1Gb with these adapters."


'PP' adds:

"It is not clear what adapters can access over 1GB on ICD site:
http://www.icd.com/atari/index.html#adscsiplus

You need to Google little around to get proper answer. TOS 1.02 has
limits: 256MB max partition size and max 14 partitions. So, it is 7GB.
That is more than enough for all SW you can imagine... Too much capacity? 
It will not prevent any adapter to access first 1GB on drive.

So, answer is:  there is no maximum capacity in fact (limits are far
beyond than current manufactured consumer drives, not to mention older
ones, what are only interesting). You may have only maximum accessible
size on disks, that is usually 1GB with Atari ST ACSI/SCSI adapters.

In any case, you may try, and will see .... (if can not find what ICD
model can accessing over 1GB) .

Another option is (only if can over 1GB) to use DOS partitioning -
then may have partitions of max. 2GB. However, it is not recommended -
you need program BigDOS then, what is not compatible with all Atari
SW, and I remember that there were some problems with it on TOS 1.02 ,
while under 1.04 and 2.06 worked good.

Really don't see the point with such large partitions when SW needs not
so much space. Only maybe recommended if want to attach same disk
sometimes on PC, for data transfer. But even then, there are some better
drivers, which have TOS/DOS compatible partitions."


Well folks, that's about it for this week. Tune in again next week, same
time, same station, and be ready to listen to what they are saying when...

PEOPLE ARE TALKING



                                  =~=~=~=



->In This Week's Gaming Section  - Atari Beams Up New Star Trek Game!
  """""""""""""""""""""""""""""    Nintendo Wins Game-Copying Suit!
                                   Old Nintendo Sells for $13,000!
                                   And more!


        
                                  =~=~=~=



->A-ONE's Game Console Industry News   -  The Latest Gaming News!
  """"""""""""""""""""""""""""""""""



               Atari Beams Up with New Star Trek Online Game


Hollywood director J.J. Abrams has gone where man has gone before, with his
2009 "Star Trek" movie blasting the sci-fi franchise back into the spotlight
and online, uniting new and older generation fans.

Videogame publisher Atari and developer Cryptic Studios hope to
capitalize on the $385 million global box office that the Paramount
Pictures movie raked in last year with the first massively multiplayer
online (MMO) game set in Gene Roddenberry's science fiction universe
that dates back to 1966.

"Star Trek Online" was recently released for PCs, allowing fans from the
original TV series as well as the moviegoers who enjoyed Abrams' reboot,
to create a virtual character and explore space, the final frontier.

"I think this game has an opportunity to unify the 'Star Trek' fans,
many of whom really are serious gaming fans, with those who aren't,"
said Zachary Quinto, who played Spock in Abrams' movie and voices a
hologram medical doctor in the game.

"I think it's great to unify these two groups and give people the
opportunity to engage each other and play with each other online and
have the experience of the game together."

While Quinto's character guides players through a tutorial that covers
the game, the original Spock, Leonard Nimoy, narrates the online game.

"There are a lot of young people who never saw 'Star Trek' before who
went to see this movie who are now interested in 'Star Trek,'" said Nimoy.

"I think there will be a number of them who will be interested in a
video game and a number of them who will be going back to the original
episodes to take a look to see what the roots of all this is all about."

According to Michael Pachter, videogame analyst for Wedbush Securities,
"Star Trek Online" should attract one million paying subscribers
initially but he forecast this number could double.

"I've been so excited to see how younger generations have taken to the
'Star Trek' brand following the movie reboot," said Rod Roddenberry, CEO
of Roddenberry Productions.

"'Star Trek' has always been about exploring the future of technology,
so it's fitting that the next generations of games would live in the
online space."

For its part, Cryptic Studios, which previously created comic book MMO
games "City of Heroes" and "Champions Online," has been sculpting a huge
universe set in 2409 based on the original "Star Trek" history but the
story takes place well after the original crew has passed away.

To satisfy both classic and new fans, the game's character customization
includes uniforms from the original show and films as well as the
reboot, while the starships and weapons have been upgraded and borrow
heavily from Abrams' recent movie.

"We have two distinct gameplay types, including the away team adventures
on the ground, which is more fast-paced action involving fights with
aliens, and there's the more strategic and tactical space combat with
the starships," explained Andy Velasquez, producer of "Star Trek Online"
at Cryptic Studios.

With the social emphasis of the MMO game genre, "Star Trek Online" has
been designed to allow players to congregate in locations like Earth
Space Dock to trade goods, meet up for a new mission, and even dance at
the night club.

Velasquez said away team missions have been designed for up to five
players to beam down for an adventure together on any of the game's
planets.

The game includes a Genesis engine which allows stories to be created
each time a group of players beam down to a planet surface for a new
mission. As many as 20 players can join up as captains of starships to
fight against enemies like the Borg and the Klingons in large-scale ship
combat.

While Trekkers will have to wait until June 29, 2012, for "Star Trek II"
to hit the big screen, Cryptic Studios is already adding new content to
the online game so that fans can live long and prosper in a never-ending
virtual Trek universe.



              Are Apple and Nintendo Headed for Mortal Combat?


Will the sequel to Nintendo's DS handheld video game system include a
tilt sensor to one-up Apple's iPhone? Signs point to yes, says an inside
source at a developer who claims he's laid hands on one of Nintendo's
super-secret 'DS2' development kits, and that he's extremely impressed.

According to CVG, an insider at Nintendo affiliate The Pokemon Company
(responsible for the eponymous franchise, including the games, films, and
TV shows) had a chance to fiddle with prototype DS2 hardware.

His preliminary verdict? "Genuinely the best thing [he's]...ever worked
with."

"I can tell you that it's got a 'tilt' function that's not dissimilar to
iPhone, but does a lot more," he said, though he cautioned that Nintendo
told him it was still early days for the product.

The iPhone uses a basic accelerometer that's capable of tilt-sensing but
little else. Could Nintendo's DS2 add more sophisticated stuff like
shock and vibration detection? Pedometer-like capabilities for
sport-related activities? Image stability to let you snap crisper
pictures? Gesture or tap recognition through light clothing to let you
perform simple tasks like switch out music? Process multiple axes (like
Sony's SIXAXIS gamepad) for higher-fidelity controls in racing or flying
games? Employ dual accelerometers--one in each screen--that let the
screens themselves somehow interact in new ways?

Moreover, doesn't this sort of technology place Apple and Nintendo on a
collision course? Nintendo's fond of reminding us it makes devices to
play games expressly, while Apple's quick to bracket its technology in
terms of "lifestyle solutions," where games are just one of several
blips on the company's mobile radar.

But as motion-sensing and touch-based functionality in these devices
overlaps and the desire for device consolidation grows, locking horns
seems more like a "when" than an "if." Whether Nintendo steps up with
iPhone-like functionality or Apple simply rebrands its iPhone and iPod
Touch as 'DS-killers' and markets to a younger demographic, I think
we're on the verge of a showdown instigated by natural market convergence.

As for Nintendo's so-called 'DS2' with tilt sensor and Nvidia Tegra
graphics chip, don't look for a GDC 2010 reveal, or even an announcement by
E3 this summer. Not if whatever developers are presently fiddling with is
just a first-phase prototype.

Besides, Nintendo's in no hurry to retire its economically bulletproof
DS. Apple's upcoming iPhone refresh probably won't add any groundbreaking
new game-related features, and the iPhone's worldwide install base remains
a fraction of the Nintendo DS's 125 million-plus.



          Nintendo Wins Australia Payout over Game-Copying Device


Gaming giant Nintendo said Friday it had won 556,500 US dollars'
compensation from an Australian firm for selling illegal game-copying
devices.

Nintendo said it won a Federal Court case against online console and
accessory seller GadgetGear over the gadgets, known as R4 cards, which
pirate games for its handheld DS system.

"GadgetGear and its directors have now acknowledged that game copying
devices infringe both Nintendo's copyright and Nintendo's trademarks and
that they are illegal circumvention devices," the Japanese company said.

"As a result, GadgetGear and the directors have agreed to permanently
refrain from importing, offering for sale and/or selling game copier
devices."

GadgetGear and directors Patrick and James Li were ordered to pay
Nintendo 620,000 Australian dollars (556,500 US dollars) in damages and
hand over all its stock of copiers for destruction.

Nintendo said it was mulling further action against other Australian
sellers of pirating gadgets, and would use "all means available to it
under the law".

This month, an Australian man agreed to pay Nintendo 1.3 million US
dollars in an out-of-court settlement after illegally uploading New
Super Mario Bros. to the Internet six days before its global release.



                       Old Nintendo Sells for $13,000


An eBay user thought she was putting an everyday Nintendo system up for
auction but may not have expected a final selling price of thousands.

Everyday folk discovering colossally valuable collectors' items amid
everyday junk has been the lifeblood of antiques shows for years, but it's
not every day you see a real-life gold-in-the-attic tale play out on eBay.

The woman, from the US, placed the 1980s Nintendo Entertainment System
(together with five games) up on the popular auction site.

Less than an hour after the first bid, the price was over $US6000.

When the auction closed, the final selling price topped $US13,105.

The value was not in the console itself but one of the games bundled with
it. The deeply obscure 1987 release called Stadium Events, a highly
sought-after collectors' item.

However, it was not the game itself that was worth the bulk of the money,
it was the original cardboard box, which collectors value at a
breathtaking $US10,000.

Fewer than 10 complete copies of the game are thought to exist and retro
gaming aficionados consider it one of the hardest-to-find Nintendo games
ever made.



                                  =~=~=~=



                           A-ONE's Headline News
                   The Latest in Computer Technology News
                       Compiled by: Dana P. Jacobson



                 Hackers Attacked Google from China Schools


The Internet attacks that may end up driving Google Inc. out of China
originated from two prominent schools in the country, according to a story
published late Thursday.

The New York Times reported security investigators have traced the
hacking to computers at Shanghai Jiaotong University and Lanxiang
Vocational School in China. The newspaper attributed the information to
unnamed people involved in the investigation.

Google didn't immediately respond to requests for comment.

The company revealed on Jan. 12 that digital thieves had stolen some of
its computer code and tried to break into the accounts of human rights
activists opposed to China's policies. The sophisticated theft also
targeted the computers of more than 30 other companies, according to
security experts. A security weakness in Microsoft Corp.'s Internet
Explorer Web browser is believed to have created an opening for the
hackers.

The digital assault was serious enough to prompt Google to confront
China's government about censorship rules that weed out politically and
culturally sensitive topics from search results in the country. Google
says it's prepared to shut down its China-based search engine and
possibly shut down all of its offices in the country unless the ruling
party loosens its restrictions on free speech.

Google and the government are still discussing a possible compromise.

The threat to leave China triggered speculation that Google suspected
the country's government might have been involved in the computer
attacks. Google has only said it believes the attack originated from
within China.

China's government has denied any involvement while continuing to insist
publicly that Google must obey its restrictions against showing links
deemed to be subversive or pornographic.

The National Security Agency and other specialists in digital forensics
have been trying to identify the source of the attacks against Google
and the other companies for weeks. The inquiry led to computers at the
two schools, with some evidence suggesting the attacks may have started
10 months ago, the Times reported.

Jiaotong University boasts one of China's top computer science programs,
according to the Times' story. Lanxiang is a large vocational school
that trains some computer scientists for the Chinese military, the Times
said.

Spokesmen for the two schools told the Times that they hadn't heard U.S.
investigators had implicated them in the attacks.



                 Former US Officials in Cyberattack Simulation


Former top US intelligence officials will become cyberwarriors on Tuesday
in a simulation of how the US government would respond to a massive
cyberattack on the United States.

"The scenario itself is secret," said Eileen McMenamin, vice president of
communications for the Bipartisan Policy Center (BPC), which is hosting the
event dubbed "Cyber ShockWave."

"The participants don't even know what it is," McMenamin told AFP. "None
of them know what's going to transpire."

For Cyber ShockWave, a room at the Mandarin Hotel here is being transformed
into the White House Situation Room, where the president and his top
advisers typically meet to address national emergencies.

"We'll have all of these different screens with different information
coming in," McMenamin said. "The members of the cabinet are going to have
to react in real time as they would in real life."

"We'll see how they coordinate with the private sector as well," she said,
as they sift through intelligence and news reports to mount a response to
the "large-scale cyber crisis" and provide advise to the chief executive.

The Cyber ShockWave simulation has been drawn up by Michael Hayden, a former
director of the Central Intelligence Agency, and members of the BPC's
National Security Preparedness Group.

Former president George W. Bush's Homeland Security chief Michael Chertoff
will play the role of National Security Advisor to the president while
former Director of National Intelligence John Negroponte will be Secretary
of State.

Fran Townsend, George W. Bush's Homeland Security advisor, will be promoted
to Homeland Security secretary while former deputy CIA director John
McLaughlin will be bumped up to Director of National Intelligence.

Joe Lockhart, former president Bill Clinton's press secretary, will serve
as a counselor to the president.

Other participants include retired general Charles Wald, the former deputy
commander of US European Command, who will be Secretary of Defense, and
former deputy attorney general Jamie Gorelick who will move up to Attorney
General.

"It's a great group of people," McMenamin said. "They'll be playing
different roles than they actually played in government."

She said Cyber ShockWave, which will be open to the media and will be
filmed and broadcast by the CNN television news network at a later date,
was intended to "educate the public about our vulnerabilities" to
cyberattack.

"It's a problem that every person with a laptop and a cellphone should
worry about," she said.

"Google and China are on the front pages of the papers," McMenamin noted in
a reference to a recent wave of cyberattacks on US companies which the
Internet giant said originated in China.

"Things like this are happening like this every day," she said. "People
really need to be aware of what's going on."

Cyber ShockWave, which will last for three hours, from 10:00 am to 1:00 pm
on Tuesday, is being sponsored by General Dynamics Advanced Information
Systems, SMobile Systems, Southern Co., Georgetown University and PayPal.

Three years ago, the BPC and Securing America's Future Energy (SAFE) staged
another simulation, "Oil ShockWave," which examined US dependence on foreign
oil as a national security threat.

The non-profit BPC was founded in 2007 by four former Senate Majority
leaders - Democrats George Mitchell and Tom Daschle and Republicans Howard
Baker and Bob Dole.



              Botnets Found in Government and Business Systems


A new Zeus botnet has been discovered affecting 75,000 systems in 2,500
organizations around the world. Both corporate and government networks
have become victims of the severe cyberattack dubbed the Kneber attack,
named after the username linked with the attack.

The attack was first discovered in January while a security analyst at
Hernon, Va.-based NetWitness was installing a monitoring system for a
client. In investigating the discovery, the company found Kneber had
compromised 68,000 corporate log-ins; access to various e-mail systems,
including Yahoo and Hotmail; access to online banking sites; and access
to social-networking sites, including Facebook. All of this was done in
a four-week period.

Kneber has been identified as a botnet, where compromised computers run
software remotely.

"Systems compromised by this botnet provide the attackers not only user
credentials and confidential information, but remote access inside the
compromised networks," said Amit Yoran, CEO of NetWitness and former
director of the National Cyber Security Division.

The Kneber botnet is not stopped by traditional malware protection or
other intrusion-detection systems, and NetWitness analysts fear
organizations will not see the damage from this attack until it has
already occurred.

More than half the infected machines were also infected with a
peer-to-peer botnet dubbed Waledac, a worm that is capable of collecting
and forwarding password information. It's also capable of receiving
commands from a remote server, including to upgrade malware components
or send information from the infected computer.

Used together, the botnets have the potential to enable hackers to
collaborate in what NetWitness said may be a "criminal underground."

"On a microlevel, there are new versions of Trojans and viruses that
come out all the time and some gain traction while others do not," said
Matthew Prince, cocreator of Project Honey Pot, a spam tracking network.
"On the macrolevel it is really scary."

The Zeus line of credential-stealing viruses is like a whole new disease
that has emerged in the cyber infection space, according to Prince. The
bad guys are taking technology that has emerged through the Zeus virus
and leveraged it into newer attacks such as Kneber.

"The revolution that has happened and the supply chain of criminal
enterprises that has been built up by the Zeus virus has allowed them to
do damage in a way that was not before possible," Prince said.

, "These large-scale compromises of enterprise networks have reached
epidemic levels," NetWitness's Yoran said. "Cybercriminal elements like
the Kneber crew quietly and diligently target and compromise thousands
of government and commercial organizations across the globe."

Zeus attacks infect a victims' computer and watch for the user to log in
to a particular banking site or a site which has value. In some
variations it even triggered itself to open a connection. Once a
connection is made, it begins transmitting credentials back to the bad
guys. Once the hackers were armed with the information, they were able
to log in and steal from people's bank accounts.

"What is more troublesome is these new viruses are specifically targeted
to do everything they can to suck as much money out as they possibly
can," Prince said. "Victims go from being relatively minor victims like
someone whose credit-card information is stolen to very large attacks
targeting business institutions and stealing in the hundreds of
thousands of dollars."

So how are individual computer users, small business owners, and large
companies such as Juniper Networks and Merck to prevent becoming victims?

The standard advice still applies, according to experts. Individuals and
companies need to keep their systems updated with antivirus protection,
and users are discouraged from clicking on links from strangers.

Individual accounts are typically covered by a bank's insurance. But
small and large businesses need to be sure their financial institution
will cover any losses.

"The scarier side is for businesses where most of its banks are not
insured against loss coming from these attacks because there is a waiver
of liability if the business network becomes infected," Prince said.
"There are cases of a half-million dollars walking out the door through
these attacks and banks say 'Sorry, not our problem.'"



                  Experts Highlight Growing Cyber-Jihad Threat


An Al-Qaeda cyber-offensive is a real and growing threat, even though Osama
bin Laden's shadowy group has yet to show a true capability, experts said.

"A co-ordinated cyber-attack made in Al-Qaeda? This has not happened
yet, but it is not just fantasy," Dominique Thomas, a specialist in
Islamic networks at Paris's School for Advanced Studies in the Social
Sciences, told AFP.

"We can envisage it: they have the brains, and the advantage is they
don't have to be many to be effective", Thomas added.

Al-Qaeda has so far stuck to classic, if spectacular, attack methods - the
hijackings in the September 11, 2001 attacks and machine gun and bombs.

But on Tuesday top US officials participated in the "Cyber ShockWave"
exercise testing responses to a coordinated attack on the Internet,
transport, telephone and electricity networks.

And this month US Director of National Intelligence Dennis Blair told
the US Senate "terrorist groups and their sympathisers have expressed
interest in using cyber means to target the United States and its
citizens".

The US defence establishment is also discussing when a cyber-attack on
facilities such as the American electricity grid could be considered an
act of war.

Online offensives against official websites have already been recorded,
including in Saudi Arabia, and the necessary expertise is available on
some forums.

"On jihadist websites there are all sorts of manuals explaining how to
make an e-bomb, how to create a virus, how to use encryption
techniques", Thomas said. "They are very up to date. The Saudis
especially are very strong."

Among militants indicted for terrorist acts, there are more students
from pure sciences such as mathematics or information technology than
there are from the social sciences, according to numerous studies.

Nigerian, Umar Farouk Abdulmutallab, who is accused of trying to blow up
a US bound jet on December 25 studied mechanical engineering at a top
London university.

James Lewis from the Center for Strategic and International Studies who
co-authored the "Security in cyberspace in the 44th presidency", said a
cyber-attack was only a matter of time.

"Al-Qaeda doesn't yet have the kind of capabilities to pull off the kind
of big disruptive attack that they really want," he said.

"But over the next few years, they will develop these capabilities."

"We have to expect something big to happen within a decade", he said.

Richard Hunter, a specialist in computer security based in New York and
author of "World Without Secrets", stressed that "IT is the ultimate
asymmetrical force."

"The power one exerts through IT is very much a function of one's
intelligence and skills," he told AFP.

It was less about funding or the number of people he argued. "The
ultimate resource is one clever individual. You find one of those
everywhere."

"If they don't have the expertise, and we know they made that a
priority, they could certainly develop it", Hunter said.

"It is well known to all working IT professionals that the technology
turns over every five years. Meaning that anyone who enters at a given
point can be an expert within 5 years."



                        Net Neutrality Debate Goes Global


With the Federal Communications Commission currently considering official
rules regarding net neutrality, the issue has been a hot topic in the
United States. But that interest also extends across the pond.

At a panel on networking management at Mobile World Congress here,
European executives acknowledged the need for guidance on net
neutrality, but said that network operators are taking a more mature
approach to the issue now, and view fair network management as good
business.

"As a European company, we see the variance of regulation across the
industry, and - we can see that in less regulated markets, it's
certainly possible to bring a pretty heavy hammer to various protocols
and behaviors which the operator does not like," said Joe Hogan, chief
technology officer for Dublin-based Openet, which provides event
processing and transaction management solutions. "But we do see a more
mature perspective being taken by the operators in that it's less to do
with targeting the particular network traffic and locking various
protocols and more to do with focusing on the business perspective."

Net neutrality is the theory that everyone should have equal access to
the Internet. For example, a major retailer should not be able to pay
their Internet service provider for the right to have their Web site
load faster than a mom-and-pop online store. Most are in agreement that
the theory is a good one - the disagreement is over whether the
government should step in and regulate it or if the industry should
self-regulate.

Hogan said as the industry moves toward a better understanding of
accurate network management and as the FCC provides clearer guidance,
the two will likely meet in the middle. He speculated that businesses
might respond to some sort of incentive program - an Energy Star program
for network management of sorts. Companies can use it as a marketing
tool ("Gold star in network management for 5 years running!"), and
"extract more value" from their customers, Hogan said.

Thierry Maupil, head of strategy and business development for mobile
Internet technology at Cisco Systems, said "there is no doubt" that this
is an issue which network operators will have to address.

One of the more pressing issues, he said, is availability of spectrum.

"I think we have to recognize on one side that no matter what, if you're
in a wireless connectivity environment, this is going to a limited
resource at some time," he said. "We have not yet launched LTE and the
number one item that operators are talking about is, 'I need spectrum. I
need more spectrum.'"

Regardless of your approach, "you cannot accept a model where you have
to discriminate against one subscriber versus another," Maupil said.

A recent study from Cisco found that by 2014, about 60 percent of
traffic on wireless networks will be video. "You can imagine what kind
of dynamic that will create," he said. "It's early days. Whatever is the
outcome, those rules will need to be defined and clear, and then people
are going to act accordingly."

Susie Kim Riley, founder and chief technology officer of
Massachusetts-based Camiant, said she met with FCC Commissioner Meredith
Attwell Baker recently, and found that "one of the big things that [the
FCC is] after is this aspect of transparency and openness and making
sure that when you sell a service to a subscriber that they understand
service that is being sold."

"The subscriber doesn't care if service is over an IP network or
dedicated circuit-based network. They just expect the quality to be
good," Riley said. "And so from that perspective, the regulators
understand that you do have to have policy on the network for some of
these services."



                FCC Wants High-Speed Internet for the Masses


The chairman of the Federal Communications Commission has shared some
details about the upcoming National Broadband Plan that will be sent to
Congress in March, including plans to bring 100 M bps (bits per second)
high-speed internet service to 100 million homes across the United States.

In a speech at the National Association of Regulatory Utility Commissioners
(NARUC) Conference on Tuesday, Chairman Julius Genachowski likened
broadband to electricity - a "general purpose technology" that will enable
a wide array of innovations and yield "hundreds of thousands of new jobs."
According to Genachowski, wider access to high-speed internet will mean
better access to education and resources for children in rural and urban
areas, growth for small businesses, and improved healthcare.

Genachowski did not go into details about how the FCC planned on
implementing its "100 Squared" plan, but rather pointed to Google's
recent announcement of plans to build a 1 GB bps fiber network that will
bring ultra high-speed broadband internet (at speeds "more than 100 times
faster than what most Americans have access to today") to between 50,000
and 500,000 Americans. Genachowski mentioned that more innovators such as
Google are needed to drive competition "to invent the future," and that
the ultimate goal should "stretch beyond 100 megabits."

Genachowski pointed out that there is currently a broadband adoption
rate of "roughly 65 percent of U.S. households, compared with 88 percent
adoption in Singapore, and 95 percent adoption in South Korea."    

A recent study released by the National Telecommunications and Information
Administration (NTIA) confirms that in October 2009, approximately 63.5
percent of U.S.households have high-speed broadband internet access - a
25 percent increase from two years ago in October 2007, when just 50.8
percent of U.S. households reported high-speed broadband internet access.
The United States is currently ranked twentieth in household broadband
percentages.

The "100 Squared" plan is not the only thing we can expect in the
upcoming broadband plan - other recommendations will include improvement
of the E-Rate program (a program designed to bring telecommunications and
internet access to schools and libraries), lowering the cost of broadband
(both wired and wireless) through use of government rights of way and
conduits, and modernization of the FCC's rural telemedicine program (by
connecting thousands of clinics).

With an internet speed of 100M bps, it would take approximately 80
seconds to transfer a 1GB file - much faster than the 35 minutes it takes
to transfer that file over the current average U.S. connection speed of
3.9M bps.

The FCC's "100M bps for 100 million homes" sounds promising, but
Genachowski's speech leaves room for many questions. The FCC has given
no details on how they expect to implement such a lofty plan, on how it
will be made affordable to the potential 100 million (considering there
is a strong suggestion that one of the factors holding people back from
broadband is price), and on whether the 100 million will actually put such
fast internet to use.



               Privacy Group Files FTC Complaint on Google Buzz


A privacy watchdog group complained to federal regulators on Tuesday about
Google's new Buzz social networking service, saying it violates federal
consumer protection law.

The Electronic Privacy Information Center filed its complaint with the
Federal Trade Commission just days after Google Inc. altered the service
to address mounting privacy concerns.

Since launching Google Buzz as part of Gmail a week ago, the search
company has come under fire for automatically creating public circles of
friends for users based on their most frequent Gmail contacts. Over the
weekend, Google altered the service to merely suggest contacts for its
users' social networks.

Despite the changes, EPIC argues that privacy violations remain because
Google automatically signs up Gmail users for Buzz, rather than waiting
for them to do so themselves, or "opt in" for the service. EPIC wants
the FTC to require Google to make Buzz a "fully opt-in" service. It also
wants the company barred from using Gmail address book contacts to
compile social networking lists.

"This is a significant breach of consumers' expectations of privacy,"
EPIC Executive Director Marc Rotenberg said in a statement. "Google
should not be allowed to push users' personal information into a social
network they never requested."

But Google insists that it gives users control because, even though it
adds a "Buzz" link to all Gmail accounts, users must click on the link
and agree to activate the service. Google also gives users the option to
disable Buzz.

In response to the EPIC complaint, Google said it has already made some
changes to Buzz based on user feedback and has "more improvements in the
works."

"We look forward to hearing more suggestions and will continue to
improve the Buzz experience with user transparency and control top of
mind," the company said.



               Microsoft To Pull Facebook, MySpace into Outlook


Microsoft Corp. is taking another step toward turning Outlook, its desktop
e-mail program, into a hub for information from popular social networking
sites such as Facebook and MySpace.

Microsoft's "beta" test version of the Outlook Social Connector, an
add-on for Outlook, was first discussed last November. When a user
clicks to read an e-mail message, a new pane on the main e-mail reading
screen fills with the sender's most recent social-networking activities.
That could be that sender's new Facebook status update or a newly added
professional contact on the business networking site LinkedIn.

On Wednesday, Microsoft updated the Social Connector software, and
LinkedIn released the first outside plug-in for the feature.

Microsoft has a mixed record when it comes to Web trends. The company's
free Hotmail and Windows Live Messenger programs are widely used, but
its Windows Live blog and social network didn't pick up much steam in
the face of competition from Facebook. In this case, a small startup
called Xobni has already built an Outlook add-on that combines inbox
search with content from Facebook, LinkedIn and others.

Microsoft's software also treats Outlook itself as a social network. If
the e-mail sender and recipient are jointly working on a document stored
on a company's Sharepoint server, both will see updates if one logs on
to make edits.

For now, the software doesn't let people use Outlook to push information
back up to LinkedIn, Facebook or other sites.

People using Office 2003, 2007 and beta versions of Office 2010 can
download the updated Outlook Social Connector beta from Microsoft and
then visit LinkedIn for the add-on software.

Microsoft said the Facebook and MySpace plug-ins will be ready for
download by the time Office 2010 goes on sale in June.

Will Kennedy, a corporate vice president for the Office group, said some
of Microsoft's business customers have expressed concern that employees
will become less productive if they have all this extra information at
their fingertips.

But Kennedy sees business-friendly uses for the Social Connector. He
thinks it could speed up processes that require approval from a string
of people, because each person in that chain could see when it's time
for him or her to weigh in.

"We don't want this to sort of be the next great time waster in the
workplace," he said.



             Pennsylvania School Used Webcams To Spy on Students


A suburban Philadelphia school district used the webcams in school-issued
laptops to spy on students at home, potentially catching them and their
families in compromising situations, a family claims in a federal lawsuit.

Lower Merion School District officials said the laptops "contain a
security feature intended to track lost, stolen and missing laptops,"
and that the feature was deactivated Thursday. Angry students had
already responded by putting tape on their laptop cameras and microphones.

Sophomore Tom Halpern described students as "pretty disgusted," and
noted that his class recently read "1984," the George Orwell classic
that coined the term "Big Brother."

"This is just bogus," said Halpern, 15, of Wynnewood, as he left
Harriton High School on Thursday with his taped-up computer. "I just
think it's really despicable that they have the ability to just watch me
all the time."

The school district can activate the webcams without students' knowledge
or permission, the suit said. Plaintiffs Michael and Holly Robbins
suspect the cameras captured students and family members as they
undressed and in other embarrassing situations, according to the suit.

Such actions would amount to potentially illegal electronic wiretapping,
said Witold J. Walczak, legal director of the American Civil Liberties
Union of Pennsylvania, which is not involved in the case.

"School officials cannot, any more than police, enter into the home
either electronically or physically without an invitation or a warrant,"
Walczak said.

A school district statement released late Thursday said the tracking
feature would not be reactivated "without express written notification
to all students and families."

"We can categorically state that we are and have always been committed
to protecting the privacy of our students," said the spokesman, Doug Young.

The affluent district prides itself on its technology initiatives, which
include giving Apple laptops to each of the approximately 2,300 students
at its two high schools.

"It is no accident that we arrived ahead of the curve; in Lower Merion,
our responsibility is to lead," Superintendent Christopher W. McGinley
wrote on the district Web site. McGinley did not immediately return
messages left Thursday by The Associated Press.

The Robbinses said they learned of the alleged webcam images when Lindy
Matsko, an assistant principal at Harriton High School, told their son
Blake that school officials thought he had engaged in improper behavior
at home. The behavior was not specified in the suit.

"(Matsko) cited as evidence a photograph from the webcam embedded in
minor plaintiff's personal laptop issued by the school district," the
suit states. The behavior was not specified in the suit, which did not
make clear whether the family had seen any photographs captured by
school officials.

Matsko later confirmed to Michael Robbins that the school had the
ability to activate the webcams remotely, according to the suit, which
was filed Tuesday and which seeks class-action status.

The Robbinses declined to speak with an Associated Press reporter at
their home Thursday. Their lawyer, Mark S. Haltzman, did not return
messages.

The U.S. Supreme Court reaffirmed the privacy of the home when it ruled
in 2001 that police could not, without a warrant, use thermal imaging
equipment outside a home to see if heat lamps were being used inside to
grow marijuana. Technology or no, Supreme Court precedents draw "a firm
line at the entrance to the house," Justice Antonin Scalia wrote,
quoting an earlier case.

"This isn't just them spying on the kids, this is them intruding on the
parents' home. Who knows what they are seeing?" Walczak said. "The
courts for 80 years have said there's no greater sanctuary than a
person's own home."

The lawsuit's allegations raise new concerns about school-issued
laptops, said an Electronic Freedom Foundation lawyer.

"I've never heard of anything this egregious," said Kevin Bankston, a
senior staff attorney at the San Francisco-based group. "Nobody would
have imagined that schools would peer into students private homes and
even bedrooms without any kind of justification.

Students like Halpern say they mostly keep their computers in their
bedrooms - and rarely turn them off.

"School ends at the end of the school property, so they shouldn't really
be in our business at home," Halpern said.



                                =~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.
