The Champaign-Urbana Computer Users Group

The Status Register - April, 2007


This newsletter will never appear on CUCUG.ORG before the monthly CUCUG meeting it is intended to announce. This is in deference to actual CUCUG members. They get each edition hot off the presses. If you'd like to join our group, you can get the pertinent facts by looking in the "Information About CUCUG" page. If you'd care to look at prior editions of the newsletter, they may be found via the Status Register Newsletter page.
News     Humor     Common     PC     Linux     Mac     CUCUG

April 2007


To move quickly to an article of your choice, use the search feature of your reader or the hypertext directory above. Enjoy.

April News:

The April Meeting

The next CUCUG meeting will be held on our regular third Thursday of the month: Thursday, April 19th, at 7:00 pm, at the First Baptist Church of Champaign in Savoy. The Linux SIG convenes, of course, 45 minutes earlier, at 6:15 pm. Directions to the FBC-CS are at the end of this newsletter.

The April 19 gathering will be one of our split SIG meetings. Keith Peregrine has installed Vista Home Premium Edition on his MacBook Pro and will be showing the Macintosh SIG his set up and relate some of his trials and tribulations in getting it functioning to his liking. PC SIGs is open for anything anyone wants to bring in.

And just a word about this newsletter. I know it's huge. It has a ton of information in it. Some will interest, some will challenge, some will entertain, some are aimed at known member interests. Hopefully these articles will have a little something for everyone. My apologies for the size, but not really. There was just too much good stuff to pass up. Enjoy.

ToC

Welcome Renewing Members

We'd like to welcome back renewing members Wayne Hamilton, Russell Gillen, Jim Huls and Tom Purl.

We welcome any kind of input or feedback from members. Run across an interesting item or tidbit on the net? Just send the link to the editor. Have an article or review you'd like to submit? Send it in. Have a comment? Email any officer you like. Involvement is the driving force of any user group. Welcome to the group.

ToC

Computer/Electronics Recycling Day

This Saturday, 4-21-07, 8 am - 3:30 pm,Champaign County is sponsoring a Computer/Electronics Recycling Day in the parking lot of Solo Cup North. The details for this event can be found at:

<http://www.co.champaign.il.us/newsrel/rpc070421.htm#pr>

ToC

Insight selling cable system

By Don Dodson
The News-Gazette.com
Monday April 2, 2007
URL: http://www.news-gazette.com/news/2007/04/02/insight_selling_cable_system

CHAMPAIGN - Insight Communications has agreed to sell its cable system in Champaign-Urbana and surrounding areas to Comcast Corp., the companies announced today.

No details were available immediately on what the sale might mean for local customers in terms of prices and programming. Comcast spokesman Rich Ruggiero said it was "way too early" to discuss products and services.

The agreement also calls for Comcast to acquire Insight Midwest cable systems in Springfield, Rockford/Dixon and Quincy/Macomb and the Indiana communities of Bloomington, Anderson and Lafayette/Kokomo.

The transaction's closing is subject to certain conditions, including regulatory approval. The deal is expected to be completed by the end of the year, the companies said.

"We are pleased to be receiving such well-managed systems from Insight," Comcast Chief Operating Officer Stephen B. Burke stated in a press release.

Currently, Insight and a Comcast subsidiary each holds a 50 percent interest in the Insight Midwest partnership. By dividing the partnership, which Comcast inherited when it acquired AT&T Broadband, Comcast will be able to convert its interest in the joint venture from passive investment to direct ownership.

"This has been a great partnership, and we look forward to adding these new customers to Comcast and to begin introducing them to our suite of products and services," he said.

Comcast's cable properties in Illinois are concentrated in the greater Chicago region, serving about 1.3 million customers in the Chicago suburbs and northwest and north central Indiana, Ruggiero said. Comcast has two small franchises downstate in Olney and DuQuoin, he added.

Under the deal, Comcast will gain seven markets in Illinois and Indiana with 1.2 million customers.

Insight will continue to serve - and will own 100 percent of - the cable systems serving the Kentucky markets of Louisville, Lexington, Bowling Green and Covington, plus the markets in Evansville, Ind., and Columbus, Ohio. Those systems serve about 1.3 million homes.

"We have worked closely with Comcast to arrive at this agreement, which both parties agree is a fair and equitable one," Insight Chief Executive Officer Michael Willner said in the press release. "This is a logical split for both companies," he continued. "Comcast already has significant properties in Indiana and Illinois, so it makes sense for them to assume control over the systems in these states.

"Insight will operate a very efficient cluster in Kentucky, where it will continue to be the largest operator in the state, and in neighboring southern Indiana and in Columbus, Ohio," he added.

Insight said it would have no further comment, and calls placed to Comcast were not immediately returned.

Nationally, Comcast has 24.2 million cable customers, 11.5 million high-speed Internet customers and 2.5 million voice (phone service) customers.

The company's networks and investments include E! Entertainment Television, Style Network, The Golf Channel, PBS KIDS Sprout and four regional Comcast SportsNets.

Insight Communications is the ninth-largest cable operator in the United States, serving about 1.3 million customers in Illinois, Kentucky, Indiana and Ohio. It has served the Champaign-Urbana area since 2001, when AT&T Broadband transferred the local franchise to it.

Insight's Champaign district serves more than 54,000 customers in Champaign, Urbana, Savoy, Bondville, Homer, Ogden, Philo, Sidney, St. Joseph, Danville, Oakwood, Fairmount, Fithian, Muncie, Olivet, Indianola, Chrisman and Ridge Farm, as well as a few communities in western Indiana.

Under the agreement, Comcast will be responsible for $1.335 billion of the partnership's debt, while Insight will be responsible for $1.26 billion of the debt.

Comcast expects the new systems to generate about $290 million in operating cash flow.

ToC

Comcast, Insight Communications, to end partnership

Philadelphia Business Journal - 10:49 AM EDT Monday, April 2, 2007

Comcast Corp. and Insight Communications Co. Inc. said Monday that they would split up a partnership that runs cable systems in the Midwest.

The companies will split the 50-50 partnership geographically, with Comcast taking full ownership of systems in Illinois and Indiana and Insight getting systems in Indiana, Kentucky and Ohio, the companies said.

Through the deal, "Comcast will be able to convert its interest in the joint venture from a passive investment to a direct ownership in cash-flow generating cable systems," the companies said in a joint statement.

Comcast is getting systems that serve 684,000 basic video customers, 296,000 digital video customers and 300,000 high-speed Internet customers and that pass 1.2 million homes.

Insight is getting systems that serve 639,000 basic video customers, 325,000 digital customers and 308,000 high-speed Internet customers and pass 1.3 million homes.

"This is a logical split for both companies," Insight CEO Michael Wilner said. "Comcast already has significant properties in Indiana and Illinois, so it makes sense for them to assume control over the systems in these states. Insight will operate a very efficient cluster in Kentucky, where it will continue to be the largest operator in the state, and in neighboring southern Indiana and in Columbus, Ohio."

The companies said Comcast will be responsible for $1.335 billion and Insight will be responsible for $1.26 billion of the partnership's debt.

The split is subject to government and other approvals. The companies think it will be final by the end of the year.

Comcast, the largest cable company, is based in Philadelphia. Insight, the ninth-largest, is based in New York.

ToC

A Message From Insight CEO Michael Willner

2007-04-06
URL: http://www.dslreports.com/forum/remark,18126409

Earlier this week, we announced that the Insight Midwest partnership, which is owned 50% by Insight Communications and 50% by Comcast, would be divided. You may be wondering why this is occurring and how that will affect your cable services.

First, some history - Comcast, the nation's largest cable provider, acquired AT&T Broadband in 2002. AT&T owned a 50% interest in Insight Midwest which was included in that acquisition. AT&T Broadband had a number of passive investments in other cable companies and Comcast said publicly that these partnerships were not aligned with their longer-term strategy. As a result, Comcast and their various partners have been discussing how to divide their joint assets and our announcement was simply one of a number of these transactions. Indeed, Comcast and Time Warner split up a similar partnership by dividing the assets in a joint venture which served Houston, Kansas City and southwest Texas.

We have been talking with Comcast for quite some time about how to achieve their goal with as little disruption to customers as possible. Comcast expressed their desire to divide the cable systems. Based on their existing operations, they had a preference to own the systems that were geographically close to theirs - specifically those in northern and central Indiana and in Illinois. It was a logical division so we agreed to proceed on that basis.

We expect that the actual transition will occur no later than the end of this year. Until then we will be working closely with Comcast to ensure a smooth transition from our operations to theirs. Comcast is very experienced at transitioning newly acquired cable customers seamlessly and we expect that the transition will be very smooth and non-disruptive to you.

Before you post a lot of questions, please understand that I am posting this strictly for informational purposes because I want to keep you as informed about what is happening as possible. I cannot answer specific questions nor can I comment on the types of services Comcast will be offering in their systems when this transition is completed. However, they are an excellent cable operator with vast experience and I'm sure you will continue to enjoy your services from them.

As for Insight, I have read a few posts questioning our viability as a stand alone entity with half the customers. We will own a very compact, interconnected group of systems with great operating efficiencies. Indeed, today Insight is the 9th largest cable operator in the United States and after the split it will be the 11th largest operator. There are many, many successful cable companies serving far fewer customers than the number we will retain. We have stated publicly that we are content to continue to operate our half of the company and, in due course, will consider all of our options.

We have enjoyed serving all of our customers and I have especially valued my experience with all of you. The BBR community has been extremely informative even if it is sometimes quite challenging. Most importantly, your feedback has helped us make Insight Broadband a great choice for Internet connectivity. Sure we've had our bumps along the way, but to give credit where credit is due, your suggestions and comments have contributed to our improvements and success.

Finally, allow me to say that we have served all of our customers with the same care and dedication for many years. Between now and the transition of the systems going to Comcast, we will remain equally dedicated to all of you. I look forward to continuing to keep a watchful eye on your posts and making sure we're doing the best we can for you! Thank you for your continued business.

ToC

University of Illinois joins the RIAA and MPAA against Piracy

This is a mass email to All Faculty & All Academic Professionals & All Civil Service Staff & All Undergrad Students & All Grad Students. This was sent *March 31, 2007 at 1:07 AM

As you may have read in the popular press, the Motion Picture Association of America (MPAA) and the Recording Industry Association of America (RIAA) among others are increasing their copyright enforcement activities. As part of this increased effort, the RIAA has begun to target college students specifically, which means that students who engage in unlawful peer-to-peer file sharing are more likely than ever to be identified and sued by the RIAA.

We think that these increased enforcement activities warrant taking a moment to discuss the relevant policies and practices at the Urbana- Champaign campus of the University of Illinois.

The University does not condone the use of peer-to-peer software for illegal file sharing. Those who engage in it violate U.S. Copyright laws as well as the campus's own policies, including the Student Code and Policy on the Appropriate Use of the Computer Network. Additionally the University bears significant costs associated with responding to DMCA violation notices and the network capacity absorbed by file sharing reduces its availability for general research, teaching, and administrative purposes. For additional information of University related copyright issues, see http://www.cio.uiuc.edu/policies/copyright/copyright.html.

Often the software used for the purposes of illegal file sharing comes bundled with 'spyware' and other software that maliciously captures personal information that contributes to identity theft. You can learn more about protecting yourself from identity theft by reviewing the information at http://www.cites.uiuc.edu/security/index.html. Further, some file sharing programs, even when used for legitimate purposes, will use your computer to transfer illegally obtained material between other users. I strongly encourage you to remove software used for file sharing as well as to immediately remove any illegally obtained material such as music or movies.

Students who are found to have illegally obtained copyrighted material through the campus network will have their computers immediately removed from the network and will not be allowed access to the network until they have undergone a disciplinary process with the Dean of Students Office.

With the announcement by RIAA, MPAA, and others of the intent to target college students with law suits, it should be noted that many of the students sued have settled out of court for amounts on the order of $4- 5000.

In addition to information on our own security website, both the University of Michigan and Chicago provide excellent information on disabling peer to peer programs, see

http://www.cites.uiuc.edu/security/filesharing/index.html
http://security.uchicago.edu/guidelines/peer-to-peer
http://www.copyright.umich.edu

We are both legally and ethically obligated to respond to every notification of copyright violation we receive. I fully believe members of the UIUC campus community will recognize the seriousness of this situation and respond accordingly.

ToC

Student Loan Database Used for Marketing Data

URL: http://www.democracynow.org/article.pl?sid=07/04/16/1333255

In privacy news, the Education Department is considering shutting down a national database of student borrowers following the disclosure several lending companies may have improperly used it for marketing information. The database contains more than sixty-million records including social security numbers, e-mail addresses, phone numbers and mailing addresses.

ToC

Sony Copy Protection Flummoxes DVD Players

Posted by David Becker 11:48:09 AM, Monday, April 16, 2007
URL: http://blog.wired.com/gadgets/2007/04/sony_copy_prote.html

Reports are starting to pile up of unhappy encounters with a new copy-protection system that Sony is baking into commercial DVD release and which renders certain discs useless on older DVD players.

Suspect titles include regular (not Blu-ray) releases of "Casino Royale,' "Stranger Than Fiction" and "The Holiday," all of which render nothing more than a brief title screen on certain DVD players (including some Sony models).

DRM snoops say it's the return of ARccOS, a somewhat discredited anti-copying system Sony toyed with a year ago. The technology was quickly subverted by makers of DVD-copying software, but is robust enough to flummox some DVD players made by RCA, Toshiba, Philips and others.

One irked customer was told by Sony that it's up to the manufacturers of the DVD players to update their firmware to accommodate the new DRM.

Sony really sucks at DRM [ZD Net]
- http://blogs.zdnet.com/hardware/?p=357

Sony Pictures DVD's have a new a copy protection that makes the movies unplayable on some Sony (& other makes) DVD players! [Sony Strikes Again]
- http://sonystrikesagain.wordpress.com/

[Editor's Note: My thanks to Kevin Hisel for submitting this piece for the newsletter.]

ToC

Google updates N.O. map images - Katrina damage made visible again

Tuesday, April 03, 2007
By Bruce Alpert
New Orleans Times Picayune
URL: http://www.nola.com/timespic/stories/index.ssf?/base/news-8/11755818719050.xml&coll=1

WASHINGTON - To those who Google, New Orleans returned Monday to its post-Katrina state but not its up-to-date self.

Six months ago the giant Internet search engine began using maps for dozens of cities worldwide that the company says provided clearer imagery.

The higher resolution content for New Orleans was produced before Hurricane Katrina, leading some, including a key member of Congress, to wonder whether the company either was trying to pretend Katrina never occurred or that the city had magically recovered from the 2005 hurricane.

<http://www.cnn.com/2007/TECH/03/31/katrina.google.maps.ap/index.html>

After the Associated Press reported the pre-Katrina maps on Google's search engine and satellite images on Google Earth, which allow Internet users to focus on individual streets and neighborhoods, the company Monday switched to 2006 maps and images.

An online viewer will see plenty of blue roofs and damaged houses, not necessarily a replica of how the city looks today. One New Orleans resident noticed that a neighbor's house that was demolished several months ago was still standing on Google.

Last week, in response to the pre-Katrina maps and images, Rep. Brad Miller, D-N.C., wrote to Google Chairman Eric Schmidt to ask why the company had switched to pre-Katrina maps and imagery.

"Google's use of old imagery appears to be doing the victims of Hurricane Katrina a great injustice by airbrushing history," said Miller, chairman of the Investigations and Oversight Subcommittee of the House Science and Technology Committee.

Google denies any conspiracy to pretend Katrina never occurred or that the Crescent City is back to normal. Even when it put up its new imagery for pre-Katrina New Orleans as part of an effort to improve the pictures for dozens of cities worldwide, spokeswoman Megan Quinn said, the company kept Katrina imagery available at a special Web site: http:earth.google.com/katrina.html.

"In response to thoughtful user feedback, we have accelerated our New Orleans imagery processing and are today making available submeter high resolution imagery of the region from 2006 in both Google Maps and Earth," Quinn said.

ToC

Google to buy DoubleClick for $3.1 billion

Posted by Elinor Mills
April 13, 2007 2:32 PM PDT
URL: http://news.com.com/2061-10812_3-6176010.html?tag=nl.e498

Just in. Google says it has agreed to buy online advertising company DoubleClick for $3.1 billion in cash. The acquisition will give Google the ability to sell online ads that appear on Web sites other than those in its network. The deal will mean that Web site publishers will get access to new advertisers, and agencies and advertisers will be able to manage search and display ads in one centralized spot, Google says.

Google is buying DoubleClick from San Francisco-based private equity firm Hellman & Friedman, which acquired DoubleClick in July 2005, and JMI Equity and Management.

"It has been our vision to make Internet advertising better--less intrusive, more effective and more useful," Sergey Brin, Google co-founder and president of technology, said in a statement. "Together with DoubleClick, Google will make the Internet more efficient for end users, advertisers and publishers."

Microsoft had been in discussions to buy DoubleClick, according to reports in The Wall Street Journal. In addition to Microsoft, Yahoo and AOL were reportedly in talks with the company. The deal is expected to close by the end of the year.

More to follow as this story develops.

[Editor's Note: My thanks to Kevin Hisel for submitting this piece for the newsletter.]

ToC

The Humor Section:

The PC vs Mac ads return - now from the PC's perspective!

February 5th, 2007

We've all seen the PC vs Mac ads by Apple, there are plenty of them. But now it's time for the PC to counterattack, with the help of director Laurie McGuinness, who created four small hilarious clips, with the same character personalities (the PC being older, "boring", and the Mac being younger and cooler), but this time the Mac doesn't get the spotlight. What I liked about the clips is that they're not made in order to harm the Mac, and they don't deny the qualities portrayed in the Mac ads, but they observe the PC's own qualities, without denying the Mac's. So, without more description, here are the clips:

<http://www.our-picks.com/archives/2007/02/05/the-pc-vs-mac-ads-return-now-from-the-pcs-perspective/>

[Editor's Note: My thanks to Jon Bjerke for submitting this piece for the newsletter.]

ToC

Five million e-mails

'Countdown with Keith Olbermann' for April 13
from the transcript to the Friday show
Updated: 11:48 a.m. CT April 16, 2007
URL: http://www.msnbc.msn.com/id/18136711/

OLBERMANN: Five million e-mails. Five million e-mails. The White House says it can't rule out that as many as 5 million e-mails, many relevant to the fired U.S. attorneys scandal, are lost. But the Republican National Committee insists it disabled Karl Rove's ability to delete his e-mails in 2005.

You know, give me a good hammer, and I can delete any e-mail.

What to do, what to do? The Senate says subpoena. The House says subpoena. The deputy press secretary says wish real hard.

(BEGIN VIDEO CLIP)

DANA PERINO, WHITE HOUSE DEPUTY PRESS SECRETARY: "Missing" is a word that-maybe misplaced or not necessarily lost forever. I think, you know, there are backup tapes, there are different ways in order to go back and find e-mails.

(END VIDEO CLIP)

OLBERMANN: Ever the pragmatists, we will try to help the White House out. It's the COUNTDOWN IT Help Desk to the rescue.

Good evening from New York.

Some of the president's e-mails are missing, like 5 million of them.

Our fifth story on the COUNTDOWN, imagine deleting every e-mail you had written, possibly as soon as you had written it, over the course of more than four years in your job as, say, the top political adviser to the president of the United States. If your name was Karl Rove, chances are you would not have to imagine all that hard.

It turns out that the man called Turd Blossom by the president has not only been using a Republican Party e-mail account for apparently governmental business, the party had to take away his access to delete files in 2005, raising the possibility, reports "The Washington Post," that Rove himself, quote, "personally deleted more than four years' worth of his own e-mails, all of them now missing."

Some of those messages, of course, relate to the firing of those eight federal prosecutors at the Justice Department. As for the latest e-mails we do have on that, thousands of new pages released today in another document dump. Quite a lot appears to be missing from them as well, portions redacted, redacted so much as to be virtually useless, including, it seems, most e-mail addresses. Hint to the administration, that secret is already out.

As well as most of this memo from the attorney general's former chief of staff, Kyle Sampson, to the president's former White House counsel, Harriet Miers. Or this page that seems to have been painted in its entirely with White-out (ph). I made a family of snowmen today.

Here's an e-mail Mr. Gonzales might wish had been redacted by the time he testifies before the Senate this coming Tuesday. Former Justice Department official Monica Goodling, writing in a memo to Sampson and another colleague, quote, "This is the chart that the AG requested." That's a disclosure that could potentially raise problems for the AG, Mr. Gonzales, regarding what he didn't know and when he didn't know it, the possibility of a chart that ranks U.S. attorneys based on their political compliancy.

Last but not least, there is the administration's attempt to spin, if not suppress, the true reason for the dismissal of those eight attorneys. On the eve of testimony from six of them on Capitol Hill, a Justice Department spokeswoman wrote to Bush counselor Dan Bartlett and Cheney aide Cathy (ph) Martin. Quoting, "Right now the coverage will be dominated by how qualified these folks were and their theories for their dismissals. We are trying to muddy the coverage up a bit by trying to put the focus on the process in which they were told."

Keep in mind, these are only the e-mails the administration wanted us to see, and only portions of them at that.

As for those potentially millions more that the administration has lost if not routinely destroyed, the Democrats on Capitol Hill now trying to subpoena or access to the RNC's e-mail servers directly, White House counsel Fred Fielding trying to block them in turn, his claim, executive privilege, even though White House officials say they were using the addresses for political exchanges, not official government business, at the White House today, spokeswoman Dana Perino saying that her sources tell her nobody did anything wrong.

(BEGIN VIDEO CLIP)

PERINO: I feel pretty confident in the source that I talked to, that we are able to say that there is no basis to say that anyone was improperly or intentionally misusing one of the accounts that they were provided to (INAUDIBLE) to avoid violating the Hatch Act. There's just no-there's no indication of that.

(END VIDEO CLIP)

OLBERMANN: You might call it "COUNTDOWN on Your Side." First, we blew the lid off the claim that President Bush nearly blew himself up with a hybrid car. And now, in our fourth story tonight, we're here to help the White House yet again.

Lost e-mails, not a problem. Look harder. There's just no need for the White House to nearly blow itself up politically over potentially millions of e-mails sent on the accounts of the Republican Party, e-mails that might not be lost after all.

Joining me now, the managing director of Straw Streeberg (ph), which specializes in commuter forensics, Ken Mendelson.

Thank you for your time tonight, Mr. Mendelson.

MENDELSON: Oh, it's good to be here.

OLBERMANN: Senator Leahy, the chairman of the Judiciary Committee, scoffed loudly at the notion that the e-mails are really lost in the permanent sense of the word. He has said things like, "I've got a teenage kid in my neighborhood that can go get them for them." Even if that is an exaggeration, was the senator right yesterday when he said that a deleted e-mail may actually be far from deleted?

MENDELSON: Oh, absolutely, absolutely. People have the misconception that e-mail is like a letter. When you send a letter, after it goes in the mailbox, it reaches the other person, and that other person has it, and it's a one-to-one communication. E-mail is more like a bullhorn in a crowded square. All you have to do, basically, is find all the people who were there to hear it and ask the right questions.

OLBERMANN: What about a system, as the RNC has said it had before 2005, in which deleted e-mails were actually purged from servers? What does that mean in layman's terms, and is that the end of it?

MENDELSON: Well, it isn't the end of it, because they may not be on the servers themselves, but there could be several other places where those e-mails could be. There could be backup tapes that were created for either disaster recovery or business continuity purposes. The e-mails could be on the individual workstations, in files that are maintained by the people who were using those e-mail accounts.

OLBERMANN: If the amount of information is massive-I mean, we're talking-the White House said today potentially-they couldn't, couldn't rule out that it might be 5 million e-mails over a four-year period-does that make it harder to get the older messages, the ones that could have actually been written over on the hard drives?

MENDELSON: Well, intuitively, you would think that the older it is, the harder it is to get it back. That may or may not be the case, depending upon where the e-mails are on the particular computer. In the case of servers, yes, that is probably true, where the older the information, if it had been deleted, you probably won't get it back. But on computer workstations, the data is there until it's overwritten by new data.

So given the size of modern computer hard drives, e-mails from, you know, two, three years ago could still exist on the computer, if you know how to find them.

OLBERMANN: The senator, Senator Leahy, also said, with regard to this the lost quality of the e-mails, that's like saying the dog ate my homework. Is there no small amount of irony in this fiasco about e-mail, in the sense that using additional accounts doesn't hide communication, it actually multiplies the number of places you can eventually find the communication?

MENDELSON: Well, certainly. If you have multiple e-mail accounts, you're going to have multiple places where that e-mail is going to reside. Remember, when you send an e-mail, you keep it, and the person who you sent it to has it as well. And then they may forward it and so on and so on. So the more e-mail accounts you have, in all likelihood, the more places there will be to look for them.

OLBERMANN: So what ultimately are the circumstances under which anybody could lose permanently 5 million e-mails in four years? How is it - how would it be possible?

MENDELSON: To lose 5 million? That's a great question. And whether you can you could actually lose 5 million e-mails altogether is-that's one for the books. I'm not really sure. I can say that if there are 5 million e-mails that were sent and received, there's a very strong likelihood that some substantial portion of them can be located.

OLBERMANN: Do you have any idea, from your experience in dealing with people who don't understand the permanent nature of computers and e-mail in particular, what percentage of the population doesn't realize that an e-mail, you know, a bad haircut is temporary, a photograph is forever, an e-mail is even longer than that, right?

MENDELSON: Oh, I would say the vast, vast majority of people don't understand that. And they may believe they've deleted the e-mail, they may believe that it's gone forever, but I think they're simply misinformed.

OLBERMANN: And, of course, also it can become public at any time, as others of us have found out.

Ken Mendelson, computer forensics expert with Straw Streeberg, great thanks for your time. Have a good weekend.

MENDELSON: It's good to be with you. Thank you.

ToC

Common Ground:

Media Minutes: April 6, 2007 & March 23, 2007

Written and produced by John Anderson (mediaminutes@freepress.net)
Audio: http://www.freepress.net/mediaminutes/archive/mm040607.mp3
Text: http://www.freepress.net/mediaminutes/transcripts/mm040607.pdf

Re-purposing a Third Pipe for Wi-Fi

As part of broadcast television's transition from analog to digital, TV stations are required to give back the analog spectrum they've been using, which the Federal Communications Commission then plans to re-purpose. Analog TV spectrum is especially useful for wireless broadband technology - signals in the 700 megahertz band especially can travel great distances and penetrate buildings very easily, unlike traditional wi-fi. This is a huge opportunity to create a nationwide "third pipe" for broadband, with the added advantage that mobile connectivity would be effortless.

But whether or not the next generation of wireless broadband will even get off the ground is really up to the FCC, and how it goes about auctioning off this spectrum. The Save Our Spectrum Coalition, comprised of the Consumer Federation of America, Consumers Union, Free Press, Media Access Project, New America Foundation, and Public Knowledge, have petitioned the FCC to carefully consider the rules under which it conducts this auction.

Free Press policy director Ben Scott says the Coalition would like to see at least half of this new wireless broadband spectrum devoted to wholesale broadband provision, whereby companies that win the rights to the spectrum would then sell access to it to any Internet service provider. Such a move would bring some much-needed competition to a marketplace where currently 96% of all broadband connectivity in the United States comes through either DSL or cable modem lines provided by the phone or cable company.

Ben Scott: "That open access condition is one of these key moments where we can put a principle of public interest and competition into fundamental spectrum policy that changes the way the broadband market works for the foreseeable future."

Another important condition the coalition would like to see the FCC impose on those who bid for the new wireless broadband spectrum is that all players in this new market abide by the principle of network neutrality. There's a very good chance the agency may move quickly to lay the ground rules for this auction - possibly within the next month or so - but Mark Cooper, research director at the Consumer Federation of America, says a prudent FCC would seriously consider open access and net neutrality as core principles of the next generation of wireless broadband.

Mark Cooper: "These are decisions that tend to get embedded very deeply in the fabric of communications. And a couple months' delay, in order to get this kind of really elemental and fundamental decision correct, should not be something that responsible public policymakers shy away from."

It'll still be some time before long-distance, mobile wireless broadband becomes a reality, though: TV stations are not required to turn off their analog signals until February 17th, 2009.

ToC

Death Watch for Webcasters

Webcasters may get a reprieve from having to pay exorbitant fees for streaming music online. Last month, the U.S. Copyright Royalty Board adopted a new fee structure for streaming radio stations, which would result in them having to pay stiff charges for every song they stream to every listener.

Now, the CRB has agreed to review appeals to the new rate structure from a wide range of parties, including independent webcasters, National Public Radio, and Clear Channel Communications. But the Board stopped short of completely reopening the rate issue for full reconsideration. When the Recording Industry Association of America first tried to strangle webcasters with high royalty rates in 2002, Congress stepped in and forced the CRB to revamp its rules. Though at least one Capitol Hill hearing has touched on the pending threat to Internet radio, no legislation has been introduced yet to tackle the problem.

ToC

Not worth the paper it's written on?

Media Minutes: March 23, 2007
Audio: http://freepress.net/mediaminutes/archive/mm032307.mp3
Text: http://freepress.net/mediaminutes/transcripts/mm032307.pdf

Major telephone and cable companies say that regulation to ensure the principle of network neutrality is a solution in search of a problem. But the actions of phone and cable companies speak louder than their words. While they claim they would never, quote, "block, impair or degrade" their customers' ability to connect to whomever, wherever, they're doing just that.

Example one: Comcast broadband customers who do a lot of downloading have discovered that the company has an unofficial cap on the amount of bandwidth they can use in any given month. When people sign up for a broadband connection, they're not told that they can only use a certain amount of broadband a month - the terms of your use are capped by the speed of the connection you pay for, not the amount of data you upload or download. Yet this has not stopped a growing number of customers from receiving calls from Comcast's mysterious "Network Abuse and Policy Observance" office, threatening disconnection unless they stop using the connection they otherwise legitimately paid for.

Example two: AT&T and Comcast are putting the muscle on Yahoo and Google, respectively, to renegotiate deals involving co-branded services. For example, AT&T and Yahoo have sold co-branded DSL service for years, but now AT&T wants to use its control of network infrastructure to take a bigger slice of the broadband subscription base the two have worked to build.

But example three is the most unnerving of the bunch: this month, AT&T, Qwest, and Sprint began blocking some customers' access to certain providers of free conference call services. Everyone involved in the use of a free conference call service already pays the freight to make the call - over a landline that's a long-distance rate, over wireless phones it's the airtime for the call - yet the companies claim these free services unfairly undercut their own conference-call offerings.

It's a disturbing development because it represents the first attempt by phone companies to discriminate between content outside of the broadband arena. Blocking or degrading web sites is one matter, but the wholesale blocking of phone numbers adds a dangerous new dimension to the threat your freedom to connect.

Related Links:


Feds Agree to Rethink Internet Radio Royalties

Hot Spectrum Draws Cash, and Ideals

Save Our Spectrum Coalition Asks FCC to Create Wireless Broadband Competition

Who Owns Your Local Media Outlets? It's Private



Rescue Internet Radio

NPR Protests Webcaster Fee Hikes

RIAA Moves to Squash Internet Radio by Charging High Rates

Save Our Internet Radio

Save the Streams



Comcast's Comcastic Invisible Cap: Another Reason to Support Net Neutrality

Broadband Providers Looking for Sweeter Deals?

AT&T Blocks Calls to Competing Conference Call Service

The Cingular-AT&T Blocks: Networks and Their Content

ToC

Former Wal-Mart Worker Blows Whistle on Company Surveillance Operation, Spying of Critics

Friday, April 6th, 2007
URL: http://www.democracynow.org/article.pl?sid=07/04/06/142238

[Editor's Note: After the revelations of spying on the Hewlett-Parkard board and AT&T assisting in the vacuuming of Internet traffic, this story is just one more step down the road.

http://www.cucug.org/sr/sr0609.html#NEWS.4
http://www.cucug.org/sr/sr0610.html#NEWS.9

http://www.cucug.org/sr/sr0604.html#NEWS.3
http://www.cucug.org/sr/sr0702.html#NEWS.6
http://www.crooksandliars.com/2007/03/07/nsa-blocked-domestic-spying-whistleblower-and-pressured-la-times-to-kill-story/
http://www.democracynow.org/article.pl?sid=07/03/07/1436219

As citizens, these are issues you need to be aware of. This story originated in the Wall Street Journal.]

AMY GOODMAN: Watching the watchdogs. A former worker at Wal-Mart is claiming the retail giant is running a sophisticated surveillance operation that targets employees, journalists, stockholders and critics. Bruce Gabbard was fired last month for intercepting and recording phone calls to and from a /New York Times/ reporter. Gabbard told the /Wall Street Journal/ he was part of a broader surveillance operation run out of Wal-Mart's Arkansas headquarters. Employees reportedly nicknamed their work area "the Bat Cave."

Gabbard also revealed Wal-Mart infiltrated the group Up Against the Wal last year by sending a long-haired employee wearing a wireless microphone to one of the group's meetings. A Wal-Mart surveillance van was stationed outside the meeting in order to listen in to what was happening. Wal-Mart also reportedly closely monitored the internet and phone usage of employees at work. Managers received a list of email addresses and phone numbers with which their employees have communicated and a list of websites visited. Wal-Mart also developed a system to read the personal emails of workers sent or received from private accounts, such as Hotmail or Gmail.

After the /Wall Street Journal/ story ran, Wal-Mart issued an apology, but only to shareholders that were monitored under the surveillance operation.

In a few minutes, we're going to speak with an activist who was targeted by the surveillance, but first we're joined by one of the two reporters who broke the story. Gary McWilliams is a reporter for the /Wall Street Journal/. He joins us from a studio in Houston. Welcome to /Democracy Now!/, Gary.

GARY McWILLIAMS: Good morning, Amy.

AMY GOODMAN: Well, why don't you lay out the story? First, how did you discover what Wal-Mart was doing?

GARY McWILLIAMS: Well, it was about five weeks ago. The company announced they had fired a technician for recording conversations with a /New York Times/ reporter and recording pager messages sent over its internal network. We started looking into it then, and what we found was a very sophisticated, very extensive operation run by former FBI agents, headed by a former CIA agent in his Bentonville headquarters.

Mr. Gabbard spoke with us, described the operation in quite detail and helped draw a picture, really, of a company that had an executive security program, global security, threat protection, information security. A quite extensive operation.

AMY GOODMAN: Talk about the man who became the whistleblower.

GARY McWILLIAMS: You know, Mr. Gabbard is a former Marine. He was a reserve deputy sheriff in Benton County, outside of -- that encompasses Bentonville. But, you know, the interesting part, this goes back to post-9/11. What he described to us was, at that time some FBI had set up a program asking US corporations to look for terrorist cells, using their phone systems to record calls from places like Syria, Iran, North Korea. And Mr. Gabbard helped set that system up. And in the wake, several years later, that same system was used to record calls from a reporter.

AMY GOODMAN: Explain the first part. How did he monitor these calls to these other countries?

GARY McWILLIAMS: Well, they set up a system with their PBX internal telephone system that would look for phone numbers coming from rogue countries, essentially, to them, and then record those calls looking for sleeper cells, perhaps, within their workforce or for terrorists calling in.

And now, this sort of security operation took on a second wind about two or three years ago, when embarrassing memos started appearing on Wal-Mart Watch's website. And those sort of triggered a new round of looking for information leakers inside the company, and they used, again, a very sophisticated email snooping system to look for key words in messages going outside the company.

AMY GOODMAN: You write in the piece in the /Wall Street Journal/ that Mr. Gabbard says he was directed by two former FBI agents working for Wal-Mart who set up this system to monitor foreign calls originally?

GARY McWILLIAMS: Right. Like a lot of companies after 9/11, Wal-Mart took a look at its security systems and decided it needed to sort of beef them up. And what we saw from them was a very sophisticated ramp up of people and equipment.

AMY GOODMAN: And where did Pentagon technology fit into this story?

GARY McWILLIAMS: It's very interesting. You know, a lot of corporations have systems that filter emails, that look for keywords that suggest wrongdoing. What Wal-Mart did was acquire a system used primarily in the past by the Defense Department that was much more sophisticated. It could do things such as tell the degree of flesh tone on an image that was viewed. It could look at all content going over its corporate network. And where typical email monitoring systems would look at the corporate email system -- you know, your internal network -- what this system was able to do was look at any content passing, so if you accessed a Gmail system, for instance, it could see what you're seeing.

AMY GOODMAN: And you write the whole issue of flesh tones has to also do with whether people are viewing pornography?

GARY McWILLIAMS: Correct. You know, most companies have a system to prevent harassment and prevent wrongdoing by employees, but this is fairly advanced. We spoke with a head of an information security network that said it was quite above what most companies have.

AMY GOODMAN: You also write that Wal-Mart helped the Pentagon develop technology.

GARY McWILLIAMS: Well, exactly. This system was not helping the Pentagon. What it was was it was helping a software developer perfect the system. We mentioned the system was used primarily by the Defense Department. Wal-Mart was helping develop a commercial version.

AMY GOODMAN: Oakley Networks, what is this company?

GARY McWILLIAMS: It's a Utah software company that provides a software package called CoreView that looks at information going over a network, and it's so sophisticated, it allows you essentially to replay later exactly what an employee would have seen on his screen or done with his computer. They describe it as sort of a TiVo-like a replay.

AMY GOODMAN: Monitoring keystrokes.

GARY McWILLIAMS: At one level, yes. But, again, it's -- think of it as a TiVo player, where you can replay activities, you know, done in the past. This is quite the same way. They can replay your computer screen to show exactly what you were seeing and changes you were making to it.

AMY GOODMAN: The well-known multinational company McKinsey, where does it play in here?

GARY McWILLIAMS: Well, at one point -- now, one of these embarrassing memos that Wal-Mart felt had been leaked from internally, McKinsey had helped work on that memo. It was their Susan Chambers healthcare memo, if you recall it. Subsequent to that --

AMY GOODMAN: Explain what the Susan Chambers memo was.

GARY McWILLIAMS: It was an internal document sent to the board of directors proposing ways to reduce their healthcare costs. Among those, you know, was requiring employees to do more physical chores to essentially weed out those that were sickly, unhealthy, and therefore cut their healthcare costs.

AMY GOODMAN: So go on with your point.

GARY McWILLIAMS: What the -- you know, the company was embarrassed by this, obviously. And there was a stream of other memos that started leaking out after 2005. And Mr. Gabbard tells us, you know, part of -- he was approached by the head of security to help stop those leaks, and he used the Oakley system essentially to monitor internet access by McKinsey consultants doing a later project.

AMY GOODMAN: We're talking to Gary McWilliams, one of the two /Wall Street Journal/ reporters who broke the story on -- well, the headline: "Inside Wal-Mart's 'Threat Research Operation.'" So tell us what happened to Mr. Gabbard, to the whistleblower who worked for some nineteen years, how exactly this whole thing unraveled and came to be known?

GARY McWILLIAMS: Mr. Gabbard was fired a little more than a month ago as a result of another employee, I guess, going forward and saying that he felt there was something wrong here in taping the /New York Times/ reporter's calls into the company.

AMY GOODMAN: That was Michael Barbaro, the /New York Times/ reporter?

GARY McWILLIAMS: Correct. And as a result of that, they did a month-long investigation of the activities, and he was dismissed thereafter. Now, we spoke with Mr. Gabbard, because he felt the company had misportrayed his activities. You know, they portrayed him as a rogue employee, when, in fact, he felt quite a bit of what he was doing was sanctioned by higher-ups and, in fact, he was pressured into looking -- you know, stopping those leaks by higher-ups in the company.

AMY GOODMAN: In a moment, we're going to be speaking with Nu Wexler, who is a spokesperson for Wal-Mart Watch, a group that is critical of Wal-Mart. But tell us his story.

GARY McWILLIAMS: Mr. Wexler, I think, was attempting to visit with reporters attending a Wal-Mart media event a couple years ago, and what Mr. Gabbard tells us was the security group was looking for ways of identifying him if he showed up at that meeting. And so, Mr. Gabbard went out on the web searching for information on Mr. Wexler and found a blog he had written for the South Carolina Democratic Party, rummaged through that South Carolina computer and found a folder containing Mr. Wexler's vacation photos. And he used those to access and to provide them to Wal-Mart corporate security to identify Mr. Wexler when he showed up.

AMY GOODMAN: A Wal-Mart spokesperson declined our request for an interview, but did issue a statement in response to Gabbard's accusations. Wal-Mart says, "This group is no longer operating in the same manner that it did prior to the discovery of the unauthorized recording of telephone conversations. There have been changes in leadership, and we have strengthened our practices and protocols in this area. Mr. Gabbard and another associate were terminated for their actions of unauthorized recordings of telephone conversations and interception of text messages, and the company self-reported the incident after learning of the phone recordings and interception of text messages situation. Like most major corporations, it is our corporate responsibility to have systems in place, including software systems, to monitor threats to our network, intellectual property and our people. These situations are limited to cases which are high risk to the company or our associates, such as criminal, fraud or security issues." Can you respond to this, Gary McWilliams?

GARY McWILLIAMS: Well, no. I mean, Wal-Mart issued that statement, I think, recently after our story appeared, and they issued a statement a month ago when Mr. Gabbard was terminated. But, essentially, you know, their original statement said that he had violated common practice at the company. Mr. Gabbard maintains there was no policy that prevented him from recording those calls and, in fact, he had been urged post-9/11 to record calls and look for keywords. So I'll leave it to Wal-Mart to decide.

AMY GOODMAN: You also talk about Wal-Mart monitoring shareholders. Explain.

GARY McWILLIAMS: Yeah, you know, it was a fairly uncommon practice, from what we've seen, to look at shareholders who submitted resolutions for the annual meeting. And in this year, what we saw was that the company took those list of shareholders who presented petitions and sent it to their security group to do a "threat assessment" of these people for their potential to disrupt the annual meeting if their petitions were refused. And, you know, we spoke with Dr. Sydney Kay, an 85-year-old retired science teacher, you know, who was among those looked at. And Mr. Kay says, "I'm a nobody. Why would they want to look at me?"

AMY GOODMAN: Overall, you did talk to corporate practices people. How common is this behavior on the part of a corporation?

GARY McWILLIAMS: For some things are very common. I think most Americans are told, if you're using your corporate email system, you know, the law has upheld the right of the company to look at that email. And there are just dozens of software packages that do things like filtering, web filtering, to look at what you're looking at over the internet, tracking the URL address, for instance. And companies are allowed to look at your email used on the corporate system. Typically what they don't do, though, is, you know, track your access to, say, Yahoo mail or Hotmail or Gmail.

AMY GOODMAN: And finally, the issue of Wal-Mart infiltrating an anti-Wal-Mart group, Up Against the Wall -- that's W-A-L -- what did you learn about that?

GARY McWILLIAMS: What Mr. Gabbard had told us was, you know, the company had become concerned that that group had protested at one of its managers' meetings, and it had read on internet sites that it was planning on going to its shareholder meeting last year, and potentially going with ACORN. And that concerned them. They wanted to find out about that, and so they ended up sending an employee to a protest group to find out what might be going on, whether ACORN and Up Against the Wal were joining forces. But it was fairly sophisticated. Again, you know, the employee had a wireless microphone. Mr. Gabbard said he rode around in the company's surveillance van to listen to what was going on and make sure the employee was protected. And then they used the information later to alert the local police department about the protesters' plans.

AMY GOODMAN: And so, the infiltrator, the long-haired infiltrator, went into a meeting, and the van was outside monitoring, because the infiltrator was wearing a microphone?

GARY McWILLIAMS: Essentially, yeah. It was outdoors. I mean, I think they actually recorded a protest group in Fayetteville, Arkansas, and the employee ended up joining the protest march down the street.

AMY GOODMAN: You know, it strikes me that years ago Ralph Nader really began his PIRGs with money that he got from General Motors, because it was exposed that they were monitoring and surveiling him.

GARY McWILLIAMS: I'm not familiar with that. But, you know, you have to understand that anytime you're in a public place, anyone can monitor you. They can take your picture. They can follow you, as long as it doesn't cross a line to harassment. And the same thing with -- we talked about the courts have upheld the legality of a company looking at email on a corporate network.

Wal-Mart has quite strict policies. I'll just go on. You know, they tell their employees any use of company computers or phones could be monitored. They also limit what their employees can look at on the internet. They're fairly restrictive in that regard.

AMY GOODMAN: Well, Gary McWilliams, I want to thank you very much for joining us, /Wall Street Journal/ reporter, joining us from Houston, broke the story, "Inside Wal-Mart's 'Threat Research Operation.'"

ToC

Watching the Watchdogs: Wal-Mart Critic Monitored by Retail Giant

Friday, April 6th, 2007
URL: http://www.democracynow.org/article.pl?sid=07/04/06/142242

AMY GOODMAN: As we continue to look at Wal-Mart's newly exposed surveillance operation, my next guest is a Wal-Mart critic who ended up on Wal-Mart's watch list. Nu Wexler is a spokesperson [Communications Director] for the group Wal-Mart Watch <http://walmartwatch.com>. According to the /Wall Street Journal/ expose, Wal-Mart used pictures found on the internet to track Nu's plans to attend Wal-Mart's annual meeting. Nu Wexler joins us now from Washington, D.C. Welcome, Nu.

NU WEXLER: Hi. Thanks for having me on today, Amy.

AMY GOODMAN: So tell us what you learned about, well, yourself, through Wal-Mart's eyes.

NU WEXLER: Well, I mean, it was -- I, as Gary mentioned earlier on the show, I had attended a Wal-Mart media conference in Arkansas. It was last spring. And it was a public event that Wal-Mart held at the Embassy Suites Hotel, not too far from their corporate headquarters in Bentonville. It was -- some events were closed. Some events were closed to the public, open to media only, and we had no intentions of going into those events, certainly didn't intend to disrupt anything. We were just there because a lot of reporters that we work with every day were attending the event, and it was an opportunity to meet with them firsthand. All of the meetings we did were actually in the hotel lobby in plain view of the company, their many PR reps that were at the event. And, honestly, it was pretty harmless. There wasn't anything threatening, and I don't think it placed Wal-Mart in any danger at all.

AMY GOODMAN: And so, what did you learn about their monitoring of you?

NU WEXLER: Well, it was pretty spooky. I wasn't aware that they were monitoring anything, until I had heard from Gary McWilliams from the /Wall Street Journal/, who, you know, calls one day and is looking for a reaction to Wal-Mart's -- to a file that Wal-Mart had been collecting and the fact that Wal-Mart had my personal vacation photos from a couple years ago that I had buried, you know, just deep on a website. They were harmless, nothing -- I think I actually -- you may have a couple of them, yourself. But these pictures, there was nothing incriminating about them, but it is a little eerie to know that Wal-Mart had a copy of them.

AMY GOODMAN: Now, these were on a website online, your photographs of your holiday?

NU WEXLER: They were. I mean, they were buried deep on a website. It was actually a place I had -- I had actually -- I came back from a trip two years ago to Vietnam and the Philippines, and I came back and had a fairly large photo file. It was a slideshow. And actually, the reason they were on this website was because my family wanted to view them, and they were too big to email, so I just had been doing some -- where I had maintained the site for my employer and created just a folder -- we had plenty of space -- created a folder that was not publicly accessible -- there were no public links to it -- but just created a folder and sent a link around to some friends and family, saying, "Here are my vacation photos. Check them out when you can." So they had been there. They were up there for a little while. Again, there was nothing incriminating about them, so I'm not terribly -- I wasn't terribly worried that they were there. But it's pretty spooky to know that Wal-Mart is interested in them and collecting them.

AMY GOODMAN: Nu Wexler, can you talk about what Wal-Mart Watch does?

NU WEXLER: Sure. We're a nonprofit organization based in Washington, D.C. We're a coalition of labor, religious and environmental organizations that are working to try to challenge Wal-Mart to change some of its business practices. You know, ironically, one of the things that we're pushing for is increased transparency for the company. And events like this make it -- you know, sort of underscore the need for more transparency.

You know, we're pushing Wal-Mart to, among other things, provide better healthcare for their employees, making their -- their employee plan just simply isn't affordable, and many of their employees are forced to go on state Medicaid plans to get coverage for themselves and their family. And Wal-Mart's response has always been, you know, "We're operating on small margins. We're retail. We can't afford to do that." But at the same time, you know, they're spending millions of dollars each year on these sophisticated threat research surveillance operations and are spending at least $10 million a year on a PR firm in D.C. to handle damage control for events like this. So it's inconsistent on their part, and we would challenge them. We hope that they would spend the money more on their employee healthcare system, rather than spying and damage control.

AMY GOODMAN: I wanted to read an editorial that was posted by Barbara Ehrenreich on the AlterNet website <http://alternet.org/workplace/50058/>: "Wal-Mart and Target Spy on Their Employees."

It says, "It reads like a cold war thriller: The spy follows the suspects through several countries, ending up in Guatemala City, where he takes a room across the hall from his quarry. Finally, after four days of surveillance, including some patient ear-to-the-keyhole work, he is able to report back to headquarters that he has the goods on them. They're guilty!

"But this isn't a John Le Carre novel, and the powerful institution pulling the strings wasn't the USSR or the CIA. It was Wal-Mart, and the two suspects weren't carrying plans for a shoulder-launched H-bomb. Their crime was 'fraternization.' One of them, James W. Lynn, a Wal-Mart factory inspection manager, was traveling with a female subordinate, with whom he allegedly enjoyed some intimate moments behind closed doors. At least the company spy reported hearing 'moans and sighs' within the woman's room.

"Now you may wonder why a company so famously cheap that it requires its same-sex teams to share hotel rooms while on the road would invest in international espionage to ferret out mixed-sex fraternizers. Unless, as Lynn argues, they were really after him for what is a far worse crime in Wal-Mart's books: Openly criticizing the conditions he found in Central American factories supplying Wal-Mart stores."

What do you know about this, Nu Wexler of Wal-Mart Watch?

NU WEXLER: Well, the Jim Lynn example is particularly scary. I mean, this was a Wal-Mart factory inspector that at the time was writing up a lot of Wal-Mart factories for unsafe working conditions and violations, and at the same time he was doing that or soon after he started doing that, you know, Wal-Mart sent this team down there to monitor him and promptly fired him after he started writing up some of these factories.

There are other examples. There was another employee, Jared Bowen, who worked for an executive that was fired for, among other things, embezzling corporate funds. Wal-Mart wanted to clean house and get rid of all of these folks. They fired Jared Bowen, one of their employees, who then sued them, and Wal-Mart said, "Oh, we didn't fire you for having anything to do with that scandal. We fired you for lying about your college transcripts," and promptly posted his college transcripts on their website.

You know, there are other instances of Wal-Mart monitoring personal emails between employees that aren't on their corporate system. And then this story in the /Wall Street Journal/ sort of blows the lid off of the entire threat research operation, this idea that -- Wal-Mart's program to spy on reporters, shareholders, you know, company critics. They're taking it a little far. I mean, it goes above and beyond reasonable expectations of corporate security.

AMY GOODMAN: And Barbra Ehrenreich goes on to show that link with the /New York Times/, because it says, "In fact, the cold war thriller analogy is not entirely fanciful. /New York Times/ reporter Michael Barbaro, who related the story of Wal-Mart's stalking of Lynn and his colleague, also reports that the company's security department is staffed by former top officials of the CIA and the FBI. Along the same lines, Jeffrey Goldberg provides a chilling account [?] in the [?] /New Yorker/. Although instructed not to write down anything he saw, he found a 'dark, threadbare room,'" when he provides this chilling account of his visit to Wal-Mart's Bentonville "war room." He says, "he found a 'dark, threadbare room... its walls painted battleship gray,' where only two out of five of the occupants will even meet his eyes. In general, he found the Bentonville fortress 'not unlike the headquarters of the National Security Agency.'"

Nu Wexler, who are the FBI and CIA officials who work for Wal-Mart?

NU WEXLER: Well, I mean, the head of Wal-Mart's corporate security operation is a man by the name of Ken Senser, who ran internal investigations at the CIA for over ten years. There are other former FBI and CIA agents that they've hired up. You know, I mean, it's sort of -- at the time the first /New York Times/ eavesdropping scandal broke a couple of months ago, Wal-Mart said, "Oh, this is one rogue employee, operating on his own, using his own personal equipment," and I think that smelled funny to a lot of reporters and certainly to us, as well.

You know, the equipment that was required to do this was very expensive. Some estimates peg the cost at about a half a million dollars, and some security experts said that it just wasn't possible for somebody to be doing this just on their own. Hobbyists don't do that. They don't go out and pull text messages and phone conversations off of cell phones out of the air just for fun. And what the /Journal/ story reveals is that it was part of a much larger operation, that now a US attorney in Arkansas is actually looking into to try to figure out what exactly they were doing and whether it was legal for Wal-Mart to eavesdrop on private citizens.

AMY GOODMAN: Now, Nu Wexler, we weren't able to reach the group Up Against the Wal, another Wal-Mart critic organization. But this issue of infiltrating the group, what do you know about that? Do you have any evidence of that in your group? And what are you demanding right now?

NU WEXLER: Well, I mean, we don't have any specific evidence of Wal-Mart infiltrating Wal-Mart Watch. We certainly look, you know, when we're interviewing potential job applicants or talking to whistleblowers, I mean, are aware of that and certainly trying to be careful, you know, in that respect.

But, you know, one of the things -- we sent Wal-Mart CEO Lee Scott a letter yesterday, asking him whether they had eavesdropped on our organization, whether if we went to Bentonville in subsequent visits, you know, to Arkansas, whether we would be monitored. We'll probably have a presence at the shareholders meeting in June. We are shareholders. We do have proxy slips for admission. Certainly not with the intent --

AMY GOODMAN: Where is that meeting?

NU WEXLER: Wal-Mart holds it every year not too far from their corporate headquarters in Bentonville. They hold it in the basketball arena at the University of Arkansas, down the road, in Fayetteville, Arkansas.

AMY GOODMAN: Are you going to sue?

NU WEXLER: We haven't decided just yet. We've sent a letter to Wal-Mart CEO Lee Scott, asking them what other information they've collected, and we hope they answer. We hope they let us know.

AMY GOODMAN: Nu Wexler, I want to thank you for joining us, communications director for Wal-Mart Watch, that's based in Washington, D.C.

ToC

Ex-Worker Ordered Not to Discuss Wal-Mart's Spy Operations

URL: http://www.democracynow.org/article.pl?sid=07/04/17/1326249

In business news, Wal-Mart has reclaimed its position as the largest corporation in the United States edging out Exxon Mobil. Meanwhile Wal-Mart has succeeded in winning a gag order to stop a fired security operative from speaking out about the company's spy operations. Earlier this month Bruce Gabbard told the Wall Street Journal that Wal-Mart is running a sophisticated surveillance operation that targets employees, journalists, stockholders and critics of the company. Gabbard also revealed that the company had infiltrated an anti-Wal-Mart group. In addition to the gag order, a judge has order Gabbard to name every person whom he has discussed Wal-Mart with over the past three months. Wal-Mart alleges that Gabbard has violated trade secrets law by revealing confidential information about Wal-Mart security systems and operations.

ToC

NASA backs quantum-computing claim

Ben Ames
URL: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9012743

March 09, 2007 (IDG News Service) The National Aeronautics and Space Administration confirmed Thursday that it built a special chip used in a disputed demonstration of quantum computing in February.

NASA engineers used their experience with submicrometer dimensions and ultralow temperatures to build a quantum processor for Canadian start-up D-Wave Systems Inc., said Alan Kleinsasser, principal investigator in the quantum chip program at NASA's Jet Propulsion Laboratory in Pasadena, Calif.

D-Wave claimed to demonstrate a prototype quantum computer during a news conference Feb. 13 at the Computer History Museum in Mountain View, Calif. But industry experts became skeptical when D-Wave revealed it had left the computer at its Vancouver office, then conducted the demonstration over a Web link.

"You could characterize our announcement as being met with enthusiasm from industry and skepticism from academia," D-Wave CEO Ed Martin said in an interview Feb. 27. But he said the event served as proof of concept of the technology, and that D-Wave's potential customers are businesses that don't care how the technology works as long as it can solve their complex models. He plans to start renting time on the machine to customers in 2008.

"Businesses aren't too fascinated about the details of quantum mechanics, but academics have their own axes to grind. I can assure you that our VCs look at us a lot closer than the government looks at the academics who win research grants," Martin said.

He described D-Wave's computer as a hybrid, running applications on a traditional, digital computer and using a single quantum processor as an accelerator or co-processor. Martin said the back end is a rack-mounted PC with an off-the-shelf processor, but wouldn't cite the specific brand.

The crucial part is the quantum chip, which is a processor built from the superconducting materials aluminum and niobium, then chilled in a tank of liquid helium. It achieves supercomputing speeds because its basic data units -- called qubits -- can hold both the values 0 and 1 simultaneously, and instantly share those values among all the qubits. A standard digital processor assigns a specific value to each data bit, and handles them one at a time.

D-Wave designed the quantum chip and then contracted with NASA to build it. The request was nothing new for engineers at the Microdevices Laboratory (MDL), a unit of the Jet Propulsion Laboratory. Scientists in this group were accustomed to building superconducting circuits for clients, such as Hypres Inc. in Elmsford, N.Y., and for instruments used aboard spacecraft, such as the European Space Agency's Herschel mission.

"There has been activity in MDL in quantum technology, including quantum computing, for around 10 years," Kleinsasser said. "Superconducting quantum computing technology requires devices and ultralow [millikelvin] temperatures that are also required in much of our sensor work. A couple of years ago, D-Wave recognized that JPL is capable of producing the chips it wished to design. There is no [private] industry that can deliver such superconducting devices. So, we worked out a collaboration that produced the chips that D-Wave is currently using."

The computer that D-Wave used for the Feb. 13 demonstration had a chip capable of running at 16 qubits, Martin said. The company plans to scale its machine much larger in the next 18 months, reaching 32 qubits by the end of 2007, then 512 qubits and 1,024 qubits by the end of 2008.

Still, D-Wave will surprise a lot of experts if it can reach its goals. Many analysts said quantum computing is feasible, but that a working system is still a decade or more away.

"Given the kind of upheaval a working quantum system would bring, especially to the financial system where cryptography would become vulnerable, it would be major technology breakthrough," said Martin Kariithi, an analyst at Technology Business Research Inc.

"I don't think a small company like D-Wave would pull it off; they are likely to get absorbed by a tech heavyweight like Intel or IBM as they get within five to eight years of a solution," he said.

ToC

Microsoft Windows Vista OS rated as 'Most Secure' by Symantec

posted by Bhola Meena @ 11:39 PM, Saturday, March 24, 2007
URL: http://desktop-tools.blogspot.com/2007/03/microsoft-windows-vista-os-rated-as.html

Microsoft, the software giant has frequently been criticized for releasing insecure products, with security holes and vulnerabilities galore. However, Symantec, the world's leading security company thinks otherwise, and has said so in a forthright manner in its latest research report.

In Symantec's 11th Internet Security Threat report, the company said that when it comes to widely-used operating systems, Microsoft has being doing better overall when compared to its leading commercial competitors. This report was released this week itself, and covers a vast range of security and vulnerability issues over the last six months of 2006.

The Symantec report found that Microsoft Windows had the fewest number of patches and the shortest average patch development time when compared with the five operating systems that the security giant had monitored in the second half of 2006.

During this period, 39 vulnerabilities, 12 of which were ranked high priority or severe, were found in Microsoft Windows. However, Microsoft took an average of 21 days to fix them all.

The next best performer was Red Hat Linux, which required an average of 58 days to address a total of 208 vulnerabilities. However, this was a significant increase in both problems and fix time over the first half of 2006, when there were 42 vulnerabilities in Red Hat with an average fix time of 13 days.

Next up was Mac OS X, and if you read further you will realize that Apple has absolutely nothing to boast about. Symantec found 43 vulnerabilities in Mac OS X and a 66 day turnaround on fixes. Fortunately, only one was high priority. Like the others, this is also an increase over the first half of the year. For the first half of 2006, 21 vulnerabilities were found in Mac OS X and Apple took on average 37 days to fix them.

In the rear, was HP-UX from Hewlett Packard and Solaris from Sun. HP-UX had 98 vulnerabilities in the second half of 2006 and took 101 days to fix them. Sun, which had 63 vulnerabilities, took an average of 122 days to fix them. The company didn't do any better in the first half of 2006 either, as Sun took 89 days to fix 16 vulnerabilities.

According to Alfred Huger, vice president of engineering for Symantec Security Center, the real problem is with Web applications, where two-thirds of all vulnerabilities are found. Operating systems are fairly minor, and despite the long time periods, the vendors are doing "an ok job, just not stellar."


[Editor's Note: My thanks to Jon Bjerke for submitting this piece for the newsletter.]

ToC

Apple and EMI Offer DRM-Free Music via iTunes

by Adam C. Engst <ace@tidbits.com>
TidBITS#873/02-Apr-07
article link: <http://db.tidbits.com/article/8937>

In a press conference today in London, Apple and EMI Music announced that starting in May 2007, EMI Music's entire digital catalog of music will be available for purchase in DRM-free versions from the iTunes Store worldwide. Removing Apple's FairPlay digital rights management system from the tracks comes with a price, though. DRM-free tracks will cost $1.29 rather than $0.99, although they will also feature higher quality 256 Kbps AAC encoding, which Apple claims makes them indistinguishable from the original recording. 128 Kbps versions with Apple's FairPlay DRM will remain available for $0.99, giving users the choice of which track to purchase.

<http://www.apple.com/pr/library/2007/04/02itunes.html>

All EMI music videos will also be available without DRM, with no change in price. iTunes will provide a one-click option for customers to upgrade previously purchased EMI songs for 30 cents per song.

Commenting on the announcement, Apple CEO Steve Jobs said, "We are going to give iTunes customers a choice - the current versions of our songs for the same 99 cent price, or new DRM-free versions of the same songs with even higher audio quality and the security of interoperability for just 30 cents more." The move comes a mere two months after Jobs posted his widely read open letter about the ills of DRM and Apple's opinions about it (see "Steve Jobs Blasts DRM," 2007-02-12).

<http://www.apple.com/hotnews/thoughtsonmusic/>
<http://db.tidbits.com/article/8856>

The removal of DRM from EMI's content sold through the iTunes Store is a significant event in the short history of online music sales, given the iTunes Store's leading position in the market. Customers purchasing DRM-free songs will be able to play them on any digital music player that supports unprotected AAC (and you can bet that the capability will be added soon to any that currently don't), thus eliminating much of the complaint about how Apple required the use of the iPod to play iTunes Store purchases. Other usage restrictions that disappear for EMI songs include the capability to play purchased songs on more than five computers and to burn playlists containing purchased songs more than seven times. Needless to say, the removal of DRM does not mean that it's legitimate to copy music in ways that violate copyright law, but that's not new.

The increased price presumably helps EMI feel better about the possibility of increased copying, and I wouldn't be at all surprised if Apple and EMI will be tracking the number of songs from the iTunes Store that appear on the peer-to-peer file sharing services. More important, increasing the price to $1.29 while keeping the DRM-protected versions available for $0.99 creates additional revenue, which the music labels had been pushing for, while letting Apple hold fast to $0.99 as the base price.

From the research perspective of determining consumer attitudes to DRM, it's a little unfortunate that Apple increased the encoding rate for the DRM-free versions of EMI's songs. Had DRM removal been the only change, it would have provided a clear-cut answer to the question of how customers value the legally granted rights that DRM restricts. Of course, since quality has never been a significantly limiting factor in working with digital music for most people, the popularity of DRM-free music will still offer worthwhile insight into consumer attitudes. Personally, I plan to pony up the additional 30 cents per track for all the EMI music I've purchased from the iTunes Store.

It's unsurprising that the first chink in the iTunes DRM armor comes from EMI, since EMI has been dabbling with DRM-free music since late 2006, selling a few songs without DRM via Yahoo Music. The question is, will EMI's move to the anti-DRM camp convince other major labels to follow? Jobs said that Apple expects to have more than half of the five million songs on iTunes available in DRM-free versions by the end of 2007, so the implication is that Apple is negotiating with the other major labels as well. Even so, the terms - FairPlay DRM or an additional 30 cents per track - seem quite set now, since I can't see Apple offering music from different labels for different prices.

<http://news.digitaltrends.com/article11874.html>

Despite the removal of DRM from EMI's music videos, Jobs made no comment on whether Apple would be negotiating with the TV and movie studios to remove DRM from other music videos, the 350 TV shows, and the 400 movies currently available through the iTunes Store. (And for anyone following the numbers, Apple says it has sold over 2 billion songs, 50 million TV shows, and 1.3 million movies from the iTunes Store so far.)


Staff Roundtable

[Glenn Fleishman] Adam's research curiosity aside, I'm especially happy Apple and EMI coupled an increase in audio quality with the increase in price and removal of DRM. For me, this makes the decision to upgrade my EMI content even easier. At 256 Kbps, according to several audiophile sites I checked, an AAC should be indistinguishable from the data encoded in a typical audio CD. I suspect the quality will be even higher, though, because preprocessing - optimizing audio or video quality for a particular compression algorithm - from the original digital masters could produce even better results. Apple and EMI haven't said anything on this front.

The other question for me is whether EMI and Apple will digitally watermark the non-DRM audio files. Digital watermarking subtly modifies the media data to overlay encrypted or in-the-clear information that can be retrieved. The idea is that the watermark can't be removed without also affecting the overall quality of the music encoded in the file. One attempt by the record industry at watermarking was definitively defeated by Princeton professor Ed Felten, a notable critic of DRM and other schemes.

<http://www.wired.com/wired/archive/9.07/mustread.html?pg=2>

[Jeff Carlson] Glenn points to the potential for dramatically higher-quality recordings, but so far we don't know whether Apple or EMI are using masters to create the files. It wouldn't surprise me if there are three interns grabbing CDs from the archives and ripping them in iTunes (I doubt that's the case, but it wouldn't surprise me). The first movie I purchased from the iTunes Store when video became available, Grosse Pointe Blank, didn't look like it was encoded from any sort of master print, even taking into account video compression.

<http://www.imdb.com/title/tt0119229/>

Frequent TidBITS contributor Andrew Laurence noted that this shift to non-DRM music makes it possible to play back music purchased from the iTunes Store on hardware devices such as the Slim Devices Squeezebox or the Sonos Digital Music System.

<http://www.slimdevices.com/>
<http://www.sonos.com/>

I also wonder (without any information to back it up) whether other music companies or services are planning to announce DRM-free offerings soon. The Apple/EMI event wasn't announced until the day before it happened, and the new tracks won't be available on the iTunes Store until May. To me, it sounds like Steve Jobs hopped a quick flight to England to make sure Apple and iTunes garnered the first headlines.

ToC

More on Apple/EMI and DRM-Free Music

by Geoff Duncan <geoff@tidbits.com>
TidBITS#874/09-Apr-07
article link: <http://db.tidbits.com/article/8938>

[TidBITS Editor's Note: We weren't able to touch base with Editor-at-Large Geoff Duncan in time for last week's "Apple and EMI Offer DRM-Free Music via iTunes" (2007-04-02), but his extensive experience in the recording industry makes his commentary essential reading for anyone following the situation. -Adam]

<http://db.tidbits.com/article/8937>

For folks who aren't regular watchers of the music industry: EMI is the third largest of the "big four" major music labels, and home to popular acts like Robbie Williams, Pink Floyd, The Rolling Stones, Norah Jones, Coldplay, and (of course) The Beatles. (If you're wondering when The Beatles music might be available for download purchase, there's still no timetable, although EMI CEO Eric Nicoli did say, "We're working on it.") EMI has always had a UK bent, but its roster also includes a number of well-known American artists like Bonnie Raitt, Lenny Kravitz, Liz Phair, and Wynton Marsalis.

So what about the remaining big record labels? Right now, all indications are that they plan to let EMI set sail alone into the unchartered waters of offering unprotected music, then wait to see what happens. And no one knows what's going to happen: major labels' market research is essentially limited to a handful of tracks (many released by EMI) intended to promote specific artists or album releases. EMI obviously believes the results of those tests were positive enough to warrant making their entire catalog available without DRM, albeit at a premium.

Right now, none of the other major labels feel so confident, but Steve Jobs has boldly predicted as much as half the music sold on iTunes may be DRM-free by the end of the year: that probably indicates he expects at least one other major label to come on board.

EMI will be offering other digital music services the option to sell non-DRM content in AAC, Windows Media, and standard MP3 formats. Although the iTunes Store will be the first to offer EMI music without DRM, there's nothing exclusive about the deal. (A Microsoft spokesperson noted last week that the company is also in talks with other unnamed publishers.)

<http://playlistmag.com/news/2007/04/06/drmfree/>

As a side note, yes, EMI's wholesale price to distributors for unprotected tracks is higher than for DRM-laden tracks, but EMI is offering the same wholesale price for complete albums regardless of whether they carry DRM protection. Music labels are seeing revenue from traditional CD sales declining sharply, and revenues from digital sales are failing to make up the difference. Industry analysis seems to indicate online music stores' a la carte purchasing systems are a contributing factor, encouraging customers to purchase just the handful of tracks they want rather than buying an entire collection. While consumers love being able to purchase individual tracks, the result is that, on an album-by-album basis, labels earn less money from digital sales than traditional CD sales - even from artists' fans. So both online music stores and music labels are looking for ways to encourage consumers to purchase entire albums - Apple's new "Complete My Album" feature is another example (see "iTunes, You Complete Me," 2007-04-02).

<http://db.tidbits.com/article/8933>

But the bottom line here will be the bottom line. EMI believes it can increase digital sales and overall revenue by offering its music catalog without digital rights management - increasing the encoding rate on iTunes offerings from 128 Kbps to 256 Kbps is a value-added feature to sweeten/justify that 30 cents/.30 Euros premium. If the expected revenue fails to materialize, we can probably expect EMI to put a swift end to this experiment.

When unprotected AAC tracks become available via iTunes, I'll be curious to see what turns up as they're inevitably deconstructed and analyzed. I wouldn't be surprised if Apple encodes purchase identifiers or other watermarks to monitor piracy and trace tracks as they promulgate to file sharing services... but my gut tells me they won't bother. Remember, it's all about the bottom line: at this point, it's no surprise that music is being copied and shared widely, and it doesn't matter much whether it comes from traditional audio CDs, unprotected tracks offered for sale, or other sources. The question is whether offering non-DRM tracks encourages more people to tap into legal, revenue-generating sources of music. EMI and Apple apparently believe the answer will be "yes."


Hear Hear!

Speaking of that encoding rate improvement, Glenn Fleishman suggested in the Staff Roundtable section of last week's article that 256 Kbps AAC files "should be indistinguishable from the data encoded in a typical audio CD." Between "should be" and "will be" are an essentially infinite number of variables, but yes, generally speaking, if you can hear the sort of artifacts and soundstage compression that happens with typical 128 Kbps AAC encoding, in most cases you'll probably be happier with 256 Kbps AAC encoding.

However, if you fall into this category, you've just separated yourself from 99.5 percent of the music listening public, and you've probably put a lot of time and money into your gear. Although there are many variables - not the least of which is the nature of the recorded material - most musicians I know can't tell the difference between a 128 Kbps MP3 and an audio CD until I start pointing things out. That said, once things are pointed out, musicians generally can hear them, which often isn't true of non-musicians.

Glenn also postulated that optimizing the quality from the original digital masters could produce even better results. There are two main variables here: the encoding software and the masters. I haven't compared AAC encoders, but I'm told there are significant differences between them. MP3 encoders are still highly variable. So, yes: let's hope whatever third party does the encoding picks a good one and knows how to use it.

As for the masters... for the time being, most listeners only have the possibility of seeing high-res masters on specialized releases; for instance, some material mastered for surround, DVD-Audio, or SACD. Those generally aren't the masters which will be used by EMI for iTunes or other music vendors. In the future, we may see digital services offering audiophile audio from high resolution masters, but the EMI non-DRM releases won't fall into that category - they're all about mainstream music. Audiophiles won't be happy with anything but high-res lossless formats anyway, and then they'll complain about the mastering gear ("At exactly 4:16.35 I can hear that characteristic 6072A tube ring in the left channel! Argh! The phasing is intolerable!") so I doubt it will happen.

Even if you're able to acquire 256 Kbps AAC files with greater fidelity than 44.1/16-bit audio CDs, again, you won't be able to hear the difference without putting time and money into your gear and having good ears. Most consumers stand little chance of hearing the difference because the DACs - the digital-to-analog converter chips in Macs and other digital music players - just aren't up to the task. Without good ears and years of experience, users will have to get into systems with considerably better specs than what's available in even high-end consumer gear before they can reliably detect a quality difference.

ToC

SonicLiving Links Musical Resources

by Adam C. Engst <ace@tidbits.com>
TidBITS#870/12-Mar-07
article link: <http://db.tidbits.com/article/8900>

Thanks to our EFF buddy Fred von Lohmann for a pointer to SonicLiving, a Web site that offers a service similar to the iConcertCal iTunes plug-in we covered recently (see "iConcertCal: Your Gig-Going Pal," 2007-03-05).

<http://www.eff.org/>
<http://sonicliving.com/>
<http://db.tidbits.com/article/8888>

Like iConcertCal, SonicLiving can generate a calendar of concerts based on artists in your iTunes library, though it does this via a Java applet that reads your artist list and then lets you select which artists to watch for. That's actually a good thing, since options let you select all artists, artists with more than one song, and artists with five or more songs, easily letting you eliminate the one-hit wonders. SonicLiving can also pick up your favorite artists from music services such as Pandora (see "Pandora Beats iTunes for Holiday Music," 2005-12-05) and the similar last.fm. Unlike iConcertCal, SonicLiving shows concerts only in 11 metropolitan areas, so it's most useful for those near certain major cities.

<http://www.pandora.com/>
<http://db.tidbits.com/article/8347>
<http://www.last.fm/>

But what sets SonicLiving apart, and makes it worth a look for anyone interested in music, is the amount of information it integrates about any given artist. Once you've added all your favorites to your wishlist, clicking an artist's name displays an overview page containing the next few upcoming events, an area where video clips from YouTube are listed and can be played, and a summary of other people who like the artist. You can expand any of these sections to list all events, to show all the people who have this artist on their wishlists, to see news items about the artist, or to see what albums the artist has on the iTunes Store.

<http://www.tidbits.com/resources/2007-03/SonicLiving-overview.jpg>

Although others may find the social networking aspects of SonicLiving compelling (you can easily see what shows others are interested in and set up friend connections), I was more struck by the way SonicLiving provides an easy interface for watching music videos on YouTube (many of which are undoubtedly copyright infringements, but which can provide low-quality, full-length song previews) and for playing all 30-second preview clips from the iTunes Store, one after another. I've always found the need to play each preview in iTunes separately annoying; I often want to hear all the clips on an album without fussing with something like the iTunes Music Store Player script. It is of course easy to jump to the iTunes Store to purchase a song or album.

<http://www.dougscripts.com/itunes/scripts/scripts02.php?page=3#itunesmsp>

I was disappointed that SonicLiving lacked links to artist Web sites, and I was also surprised that it doesn't do the "people who liked X also liked Y" kind of recommendations. You can see the wishlists of people whose lists overlap with yours, which is sort of the same thing, but that seems a bit roundabout. Nonetheless, SonicLiving is the kind of site you can easily lose yourself in, so be sure to dive in when you have some time to burn.

ToC

Cisco says 77 of its routers open to 'drive-by pharming'

The easiest solution: Change the default password

by Gregg Keizer
URL: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9011588

February 20, 2007 (Computerworld) -- Cisco Systems Inc. is warning users that nearly 80 of its routers are vulnerable to a hack tactic that got play last week.

Dubbed "drive-by pharming" by Symantec Corp. and university researchers who first publicized the danger in a paper, the attack involves luring users to malicious sites where a device's default password is used to redirect them to bogus sites. Once they are at those sites, their identities could be stolen or malware could be force-fed to their computers.

In an advisory posted Thursday, Cisco listed 77 vulnerable routers in the lines sold to small offices, home offices, branch offices and telecommuters. The advisory recommended that users change the default username and password required to access the router's configuration settings, and disable the device's HTTP server feature.

The paper, co-written by a Symantec researcher and two other researchers from Indiana University (download PDF), urged a similar move by router owners.

"Owners of home routers who set a moderately secure password -- one that is non-default and non-trivial to guess -- are immune to router manipulation via JavaScript," the report read.

The researchers also argued that router makers should stop using blank or easy-to-guess passwords, such as "admin," and switch to the device's serial number. "This value, which is unique to each individual router, would comprise a very secure and unpredictable password," the report stated.


[Editor's Note: My thanks to Jon Bjerke for submitting this piece for the newsletter.]

ToC

WEP Security Called Unreliable

Researchers say they've found a fast way to break WEP protection on Wi-Fi networks.

Peter Sayer, IDG News Service
Wednesday, April 04, 2007 08:00 AM PDT
URL: http://www.pcworld.com/article/id,130385/article.html

The Wi-Fi security protocol WEP should not be relied on to protect sensitive material, according to three German security researchers who have discovered a faster way to crack it. They plan to demonstrate their findings at a security conference in Hamburg this weekend.

Mathematicians showed as long ago as 2001 that the RC4 key scheduling algorithm underlying the WEP (Wired Equivalent Privacy) protocol was flawed, but attacks on it required the interception of around 4 million packets of data in order to calculate the full WEP security key. Further flaws found in the algorithm have brought the time taken to find the key down to a matter of minutes, but that's not necessarily fast enough to break into systems that change their security keys every five minutes.

Now it takes just 3 seconds to extract a 104-bit WEP key from intercepted data using a 1.7GHz Pentium M processor. The necessary data can be captured in less than a minute, and the attack requires so much less computing power than previous attacks that it could even be performed in real time by someone walking through an office.

Anyone using Wi-Fi to transmit data they want to keep private, whether it's banking details or just e-mail, should consider switching from WEP to a more robust encryption protocol, the researchers said.

"We think this can even be done with some PDAs or mobile phones, if they are equipped with wireless LAN hardware," said Erik Tews, a researcher in the computer science department at Darmstadt University of Technology in Darmstadt, Germany.

Tews, along with colleagues Ralf-Philipp Weinmann and Andrei Pyshkin, published a paper about the attack showing that their method needs far less data to find a key than previous attacks: just 40,000 packets are needed for a 50 percent chance of success, while 85,000 packets give a 95 percent chance of success, they said.

Although stronger encryption methods have come along since the first flaws in WEP were discovered over six years ago, the new attack is still relevant, the researchers said. Many networks still rely on WEP for security: 59 percent of the 15,000 Wi-Fi networks surveyed in a large German city in September 2006 used it, with only 18 percent using the newer WPA (Wi-Fi Protected Access) protocol to encrypt traffic. A survey of 490 networks in a smaller German city last month found 46 percent still using WEP, and 27 percent using WPA. In both surveys, over a fifth of networks used no encryption at all, the researchers said in their paper.

Businesses can still protect their networks from the attack, even if they use old Wi-Fi hardware incapable of handling the newer WPA encryption.

For one thing, the researchers said, their attack is active: in order to gather enough of the right kind of data, they send out ARP (Address Resolution Protocol) requests, prompting computers on the network under attack to reply with unencrypted packets of an easily recognizable length. This should be enough to alert an IDS (intrusion detection system) to the attack, they say.

Another way to defeat attacks like that of the Darmstadt researchers, which use statistical techniques to identify a number of possible keys and then select the one most likely to be correct for further analysis, is to hide the real security key in a cloud of dummy ones. That's the approach taken by AirDefense Inc. in its WEP Cloaking product, which was released Monday. The technique means that businesses can cost-effectively protect networks using old hardware, such as point-of-sale systems, without the need to upgrade every terminal or base station, the company said.

If your network supports WPA encryption, though, you should use that instead of WEP to protect your private data, Tews said.

"Depending on your skills, it will cost you some minutes to some hours to switch your network to WPA. If it would cost you more than some hours of work if such private data becomes public, then you should not use WEP anymore," he said.


[Editor's Note: My thanks to Jon Bjerke for submitting this piece for the newsletter. For more on this topic check out "Step on a WEP Crack, Break Your Network's Back" by Glenn Fleishman at <http://db.tidbits.com/article/8942>.]

ToC

WIKISKY: Google Maps-Like View of the Night Sky

"WIKISKY lets you see what's up in the heavens above. You can locate many deep sky objects, get detailed information on them by simply hovering your mouse, and see high-quality Sloan Digital Sky Survey images for selected parts of the sky. Type in your current location, verify your timezone, and you can use WIKISKY to help plan your next observing session"

<http://www.hackszine.com/blog/archive/2007/04/wikisky_google_earthlike_view.html?CMP=OTC-7G2N43923558>

ToC

Fight Firefox resizing

"Hate it when websites take it on themselves to resize your browser window?"

<http://www.downloadsquad.com/2007/03/23/fight-firefox-resizing-with-four-simple-steps/>

ToC

I know the face. I just can't place the name.

Check out this web interface... remind you of something... a long time ago.... ?

<http://www.chiptune.com/>

ToC

The PC Section:

WinInfo Short Takes

Paul Thurrott
URL: http://www.wininformant.com/

The Truth About Vista SP1

I'm tired of Microsoft's insane posturing about Windows Vista SP1. I've written about this before, but it bears repeating. Every single time Vista SP1 comes up, some representative from Microsoft--all the way up to CEO Steve Ballmer, by the way, who has done this twice in public--acts as if the company has no idea when it will ship SP1 or what features it will include. That is not true. Microsoft will ship Windows Vista SP1 concurrently with Longhorn Server in Q3 2007 and SP1 will include a major kernel update for Vista that will bring the client OS up to speed with the version of the Windows kernel in Longhorn Server. That has been the plan for quite a while, and they all know it. Why the company can't just say, "We'd rather not discuss SP1 at this time" is beyond me. Instead, they're simply lying, and for no good reason. And that's not right, especially when there are millions of customers waiting on this release to upgrade. You'd think a company that supposedly cares about transparency as much as Microsoft would realize when they're being so, well, transparent.

Microsoft Acknowledges Vista Product Activation Hacks

Microsoft this week admitted that hackers have broken the product activation scheme in Windows Vista in at least two different ways, allowing users to pirate the software and install multiple copies on PCs. Intriguingly, the company says it has no plans, however, to thwart the efforts. "Our goal isn't to stop every 'mad scientist' that's on a mission to hack Windows," Microsoft senior product manager Alex Kochis wrote in his blog this week. "Our first goal is to disrupt the business model of organized counterfeiters and protect users from becoming unknowing victims. This means focusing on responding to hacks that are scalable and can easily be commercialized, thereby making victims out of well-intentioned customers." I guess Microsoft isn't technically sanctioning these hacks, but it sure isn't doing much to discourage people either.

Acer Notebook Sales Surge

PC maker Acer is coming on strong in the notebook market, thanks to new retail pushes. In the fourth quarter of 2006, Acer pushed aside Toshiba to become the third best selling maker of notebook computers, behind HP and Dell. In the quarter, HP sold 5.05 million notebook computers, compared to Dell, with 3.52 million, and Acer, with 3.37 million. Fourth place Toshiba sold 2.45 million units. Researchers at IDC now believe that Acer has enough momentum to pull into third place overall in the PC industry. To do so, they'll have to displace Lenovo, which is currently in the top three behind HP and Dell.

Has Firefox Growth Stalled Since Microsoft Shipped IE 7.0?

This week, Web analysts at Janco Associates said that Mozilla Firefox's growth has stalled since Microsoft shipped IE 7.0, suggesting that the software giant has finally found a solution to its previously dropping share of the browser market. Since December 2006--when Microsoft made IE 7.0 a semiautomatic download through Windows Update--Firefox use has increased less than one percentage point, from 12.5 percent to 13.4 percent. In contrast, IE's market share has surged from 67.5 percent in December 2006 to 70.5 percent in March 2007. IE 7.0 now accounts for about 31 percent of the entire Web browser market, according to Web analytics company WebSideStory.

Intel Talks Up Next-Generation Processors

Intel this week promoted its upcoming microprocessor designs, which will ship over the next year and a half. The company is moving all of its mainstream microprocessors to a more efficient 45nm design, which will provide better performance and cooling (a win-win situation in the hardware world). Intel will ship six new microprocessors over the next year and a half and will move to models with more processor cores than today's dual-core models. A new processor family--code-named Penryn--will ship this year, offering the 45nm design, more efficient power management, and quad-core functionality. A future processor family, Nehalem, will ship in 2008 and integrate system interconnects, memory controllers, and a graphics engine right in the CPU. This chip will come in versions with as many as eight processor cores. Intel describes this chip design as the first major architecture shift in its mainstream processors since the Pentium Pro, which shipped more than a decade ago.

ToC

Windows XP to be phased out by year's end despite customer demand

URL: http://apcmag.com/5835/vendors_in_no_rush_to_ditch_xp_for_vista

Computer makers have been told they'll no longer be able to get Windows XP OEM by the end of this year, despite consumer resistance to Vista and its compatibility problems.

By early 2008, Microsoft's contracts with computer makers will require companies to only sell Vista-loaded machines. "The OEM version of XP Professional goes next January," said Frank Luburic, senior ThinkPad product manager for Lenovo. "At that point, they'll have no choice."

Despite Microsoft's relentless promotion of Vista, manufacturers are still seeing plenty of demand from customers for systems preloaded with XP, especially in the finicky SOHO market.

In a recent post on its Direct2Dell blog, Dell reaffirmed to concerned customers that it wasn't about to force small business users -- who typically purchase PCs piecemeal, rather than in large enterprise-style orders -- to shift to Vista, which has experienced a less-than-stellar reaction from many buyers because of driver issues and moderately beefy hardware requirements.

"Dell recognizes the needs of small business customers and understands that more time is needed to transition to a new operating system," the post read in part. "The plan is to continue offering Windows XP on select Dimension and Inspiron systems until later this [northern] summer."

"From a local perspective, the post was a reminder more than an announcement," Dell ANZ corporate communications manager Paul McKeon told APC.

"This was something we'd always planned during the transition phase since businesses will have different time frames to adopt the new OS. If you're a consumer, you're unlikely to be managing more than say 2.4 OS images at home, so it's less of an issue"

There's general agreement amongst PC resellers that Vista has provided a minor boost to PC sales, but hasn't produced blockbuster numbers. A similar story applies in the retail space. Figures from marketing consultancy GfK suggest that after an initial sales surge, around 1500 copies of Vista are now being sold through Australian retailers each week, according to a recent report in the AFR.

While Dell's post suggested it wouldn't be promoting Vista systems to the home market, manufacturers still have the option of selling XP-based systems for consumers this year.

ToC

Vista beta users 'face pricey upgrade'

URL: http://www.digitmag.co.uk/news/index.cfm?RSS&NewsID=7717

Microsoft has begun reminding millions of testers of Windows Vista's beta and release candidate (RC) previews that their trial runs end on June 1. Cori Hartje, director of Microsoft's antipiracy efforts, became the first company executive to note the impending deadline. "As a reminder to those that helped with Windows Vista beta testing, the beta installations are set to expire at the end of May 2007," said Hartje in a Q&A that Microsoft posted March 30 on its public relations Web site. "So customers need to decide if they want to move to Windows Vista or back to Windows XP if they have test versions of Windows Vista on their PCs."

Details on how best to do that, however, are scant. Despite repeated requests to clarify the exact procedure beta and RC users need to take -- and whether Microsoft will provide either guidance or offer a discount to testers -- the company declined to spell out its plans.

What information the company has published is on last year's Customer Preview Program (CPP) site, which points to the June 1 expiration date and explains that once installed, the Vista previews don't allow for operating system rollbacks. "You cannot roll back to the previous operating system installation -- you will either have to acquire and install the final released edition of Windows Vista or reinstall a previous edition of Windows," the site reads.

ToC

Microsoft Confirms Move to DRM-Free Music

Paul Thurrott, WinInfo
URL: http://www.windowsitpro.com/windowspaulthurrott/Article/ArticleID/95736/windowspaulthurrott_95736.html

Lost amid the hoopla last week over EMI's announcement that it will sell digital music without Digital Rights Management (DRM) restrictions was the fact that Apple wasn't the only online music service to sign on for the DRM-free music offerings. This week, Microsoft also admitted that it will offer music without DRM.

"The EMI announcement is not exclusive to Apple," a Microsoft spokesperson said. "Consumers have made it clear that unprotected music is something they want. We plan on offering it to them as soon as our label partners are comfortable with it." Microsoft said that it has been working with EMI and other record labels for quite some time, and will offer DRM-free music as soon as possible via the Zune Marketplace, Microsoft's online service for the Zune.

What's unclear is which file format Microsoft will choose to sell its music in. Apple will sell DRM-free music in the Advanced Audio Coding (AAC) format, which has serious compatibility problems with non-Apple hardware. Microsoft currently sells music on the Zune Marketplace in the Windows Media Audio (WMA) format, which suggests that the company will continue to do so when DRM is no longer required. However, EMI said that online music services can use whatever format they'd like, including the industry-standard MP3 format, which is the most interoperable format.

If Microsoft would like to one-up Apple--and I'm guessing that the software giant would--it should use the MP3 format. Doing so would be a great way to ensure that the more expensive and consortium-owned AAC format doesn't become the de facto standard.

ToC

23 Ways To Speed WinXP Without Defrag

Still defragmenting disks to speed customers' PCs? Try these techniques instead.

URL: http://www.crn.com/white-box/59201471

Defragmenting, of course, is the process of reorganizing all data on a hard-disk drive so that each file is arranged into a single uninterrupted, or contiguous, location on the disk. Many system builders and technicians have been taught, and still believe, that defragmenting hard disk drives on a regular basis keeps PCs operating at peak performance. But that idea is behind the times.

While it was true that defragmenting helped older PCs, it no longer applies. Today we have 7200-RPM (rotations per minute) hard-disk drives with improved seek and latency times; many also contain an 8-MB cache buffer. Let's not forget Windows XP's ultra-efficient NTFS (NT File System). For PCs, servers, and workstations equipped with these innovations, defragmenting no longer makes much improvement, if any, to system performance.

This is even more of an issue with the new Serial ATA hard disk drives, which are soon to become the new standards utilized in the market. Examples of SATA drives include the Seagate Barracuda line and new 10,000-RPM IDE (Integrated Drive Electronics) hard-disk drives, such as the Western Digital Raptor.

Still, defragmenting remains an important task. Why? For one, power consumption and heat can be directly related to a fragmented hard drive. When the computer's operating system requests data, if a file is not contiguous, then extra seeking on the disk may be required. But a more important consideration is disk failure. Should a hard drive fail, the likelihood of successfully recovering data from the dead or damaged drive improves significantly if the data is contiguous rather than randomly scattered about the drive platters.

The software companies that create defragmentation software would like you to believe that their software does improve system performance. But my own in-house testing refutes that, as do recent findings from Steve Gibson and other system testers.

So What Works?

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer %96 only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

CAREY HOLZMAN is president of Discount Computer Repair in Glendale, Ariz., and the author of The Healthy PC: Preventative Care And Home Remedies For Your Computer (McGraw-Hill Osborne, 2003).

ToC

Get AVG Anti-Rootkit Free

URL: http://free.grisoft.com/doc/avg-anti-rootkit-free/lng/us/tpl/v5

AVG Anti-Rootkit is a powerful tool with state-of-the-art technology for detection and removal of rootkits. Rootkits are used to hide the presence of a malicious object like trojans or keyloggers on your computer. If a threat uses rootkit technology to hide itself it is very hard to find the malware on your PC. AVG Anti-Rootkit gives you the power to find and delete the rootkit and to uncover the threat the rootkit is hiding.

Important notice

AVG Anti-Rootkit protects you against a certain kind of threat: Rootkits. To be protected in realtime against all kind of threats that could harm your computer it is recommended to have a look at AVGs fully integrated solutions.

Download link: http://free.grisoft.com/doc/5390/lng/us/tpl/v5#avg-anti-rootkit-free

Highlights

Support & Licensing

ToC

[Editor's Note: My thanks to Kevin Hisel for the contributions to this section of the newsletter.]

ToC

The Linux Section:

Adopting Ubuntu - Linux switch can be painless, free

'For many people, e-mail, web surfing, picture editing, listening to music, making spreadsheets and basic word processing are just about all they do with their computers. Today's Macs and Windows PCs are impressive machines indeed, but their power - and price - can be overkill for the average computer user. If you're looking for a new computer and you're not sure whether to go Windows or Mac, I'd suggest also paying some attention to the "L" word.

No, not that "L" word. I'm talking about Linux'

<http://www.cbc.ca/news/background/tech/linux.html>

ToC

Ubuntu 7.04 arrives Thursday

"For Linux business users, the most important Linux release of 2007 so far is Red Hat Enterprise Linux 5. But for most other Linux fans, the upcoming release of Ubuntu Version 7.04 on April 19 demands more attention."

<http://www.desktoplinux.com/news/NS5776756265.html>

ToC

The Macintosh Section:

Apple Introduces Eight-Core Mac Pros

by Jeff Carlson <jeffc@tidbits.com>
TidBITS#874/09-Apr-07
article link: <http://db.tidbits.com/article/8941>

For those who have been waiting for new Mac desktops to land, Apple has one message: eight is great. Last week the company added an 8-core Intel Xeon processor configuration to the Mac Pro. The 8-core Mac Pro relies on two "Clovertown" 3.0 GHz quad-core Xeon 5300 series processors, available as a custom option when assembling a system at the online Apple Store for $1,500 more than the default configuration of a pair of dual-core Xeons. Each processor features 8 MB of L2 cache (16 MB total), 128-bit SSE3 vector engine, and 64-bit data paths and registers. Otherwise, the specifications for the Mac Pro remain essentially the same as the quad-core configurations that are still available, including up to 3 TB of internal storage (increased from 2 TB thanks to Apple selling 750 GB drives), up to 16 GB of RAM, and a 16x SuperDrive with double-layer support.

<http://www.apple.com/macpro/>
<http://www.apple.com/macpro/specs.html>

If you're wondering what difference eight cores makes to performance, you're not alone. Apple has not updated its benchmark listings for the new configuration, and the company didn't even issue a press release for the new Mac Pro. Macworld quotes an Apple spokesperson as saying that the new option for the Mac Pro gives software developers a platform from which they can prepare their applications for a future when eight-core technology is more prevalent. Our question: Is this really a custom Mac for Adobe's development team to ensure that the CPU-hungry Photoshop and friends will be able to chow down on eight cores in a forthcoming major update to the Mac Pro?

<http://www.apple.com/macpro/performance.html>
<http://www.macworld.com/news/2007/04/04/eightcore/>

ToC

Leopard Pushed to October 2007

by Jeff Carlson <jeffc@tidbits.com>
TidBITS#875/16-Apr-07
article link: <http://db.tidbits.com/article/8948>

Leopard will remain caged for a few more months. In a statement released last week, Apple announced that Mac OS X 10.5 Leopard will not be released until some time in October 2007. The delay is attributed to the company's focus on getting the iPhone ready for its June rollout, which required "borrowing some key software engineering and QA resources from our Mac OS X team," according to the statement. The iPhone reportedly remains on schedule, and those of us who don't live and die by our cell phones are hoping that it pays Leopard back with interest.

<http://biz.yahoo.com/prnews/070412/sfth056.html>
<http://www.apple.com/iphone/>

The statement notes that Apple planned to release Leopard at the Worldwide Developer Conference (WWDC) in June. Now, a "near final version" will be shown at the conference and given to attendees for last testing before release. It remains to be seen if previously unannounced features will be added to Leopard in time for WWDC; as we wrote in "Mac OS X 10.5 Leopard Previewed at WWDC 2006" (2006-08-07), "Jobs offered overviews of ten new or improved features to be found in Leopard, and coyly referred to other 'top secret' features that weren't going to be shown..." Certainly, the delay provides Apple additional time to implement and test new features, along with those already announced.

<http://db.tidbits.com/article/8632>

For reactions to the news, see "The Mystery of the Leopard Ship Date: Solved" (2007-04-16) and the thoughtful comments in TidBITS Talk.

<http://db.tidbits.com/article/8951>
<http://emperor.tidbits.com/TidBITS/Talk/1241/>

ToC

iTunes 7.1 Prepares for Apple TV

by Jeff Carlson <jeffc@tidbits.com>
TidBITS#870/12-Mar-07
article link: <http://db.tidbits.com/article/8902>

Apple has released iTunes 7.1, an update that doesn't appear to offer much on the surface, but incorporates compatibility with the upcoming Apple TV. A new Apple TV section in the preferences displays Apple TV units that have been authorized to work with iTunes. When the video streaming device is released this month, you will be able to use iTunes 7.1 to synchronize media to the Apple TV's 40 GB hard disk for playback on a connected television (see "Apple TV Connects Macs and TVs," 2007-01-15).

<http://www.apple.com/support/downloads/itunes71formac.html>
<http://www.apple.com/appletv/>
<http://db.tidbits.com/article/8812>

Also new in iTunes 7.1 is the option to browse the library in a full-screen Cover Flow mode. A new Sorting tab in the Get Info dialog for individual tracks lets you set up nicknames, which can then be applied to related artists and sorted; for example, tracks composed by two artists can be sorted together with each artist's other works. (Chris Breen at Playlist offers more details.)

<http://playlistmag.com/weblogs/ipodblog/2007/03/newitunes71/>

iTunes 7.1 is available via Software Update or as a 28 MB download; it requires Mac OS X 10.3.9 or later. Apple also released iTunes 7.1 for Windows, but Windows Vista compatibility (which seems to be spotty) is not touted; Apple lists Windows XP with Service Pack 2 and Windows 2000 with Service Pack 4 as system requirements.

<http://www.apple.com/support/downloads/itunes71forwindows.html>

ToC

iTunes 7.1.1 and iPod Reset Utility 1.0 Fix Bugs

by Jeff Carlson <jeffc@tidbits.com>
TidBITS#871/19-Mar-07
article link: <http://db.tidbits.com/article/8913>

Apple has released iTunes 7.1.1, an update that "addresses a stability issue and minor compatibility problems in iTunes 7.1," according to Apple. The update is available via Software Update or as a 28 MB stand-alone download. A 36.1 MB download for Windows is also available.

<http://www.apple.com/support/downloads/itunes711formac.html>
<http://www.apple.com/support/downloads/itunes711forwindows.html>

The company also released iPod Reset Utility 1.0 for Mac (3.4 MB) and Windows (2.2 MB), which is designed to reset either generation of iPod shuffle if iTunes is unable to reset it.

<http://www.apple.com/support/downloads/ipodresetutility10formac.html>
<http://www.apple.com/support/downloads/ipodresetutility10forwindows.html>

ToC

Apple TV: The Real Video iPod

by Jeff Carlson <jeffc@tidbits.com>
TidBITS#872/26-Mar-07
article link: <http://db.tidbits.com/article/8924>

Although the iPod has been "video-enabled" for more than a year, Apple treats video playback on the portable device as an incidental extra feature. The upcoming iPhone comes closest to the video iPod that Apple fans have been waiting for, with its widescreen-capable display. However, it turns out that Apple's true video iPod was released last week - and it's the Apple TV.

<http://www.apple.com/ipod/>
<http://www.apple.com/iphone/>
<http://www.apple.com/appletv/>

No one will mistake the screen-less, silver box for an iPod, of course, but in functionality - from the features to the menus - the Apple TV is the iPod's wireless, tricked-out cousin. Rather than build a box that would dominate your living room and take over your television (as the Windows Media Center attempts to do), Apple designed the Apple TV to be as familiar and easy to use as its multi-million-selling portable media player.

The Apple TV started to become available last week after a three-week delay from Apple's original shipping estimate. I received mine on Friday, and although I've spent a fair amount of time doing research from the couch, I'm not ready to write a full review. Instead, I want to pass on my initial impressions, along with some valuable pointers and sources of other great information that have appeared online. For a rundown of the basic specs and capabilities, see our article from Macworld Expo, "Apple TV Connects Macs and TVs" (2007-01-15).

<http://db.tidbits.com/article/8812>

The Good and the Bad

Bridging the chasm between the computer and the television isn't trivial. The Mac mini was a solid first step in the living room (and may be preferred by some people, as I'll explain shortly), but it was still a computer attached to a television. You interact with it like a computer, and the television just happens to be a different variety of monitor. Apple's Front Row software is helpful, certainly, but you have to switch out of "computer mode" into "Front Row mode" to get close to the simple, menu-driven method that most people use to operate their televisions.

The Apple TV may be a Mac OS X computer at heart, but it operates with a singular focus as a menu-driven gateway to your media. Its interface is almost exactly like an iPod: a main screen containing categories (movie, music, photos, settings) that lead to lists of each item type, all listed as you would find them on an iPod. So, the first main benefit of the Apple TV is that it will be familiar to everyone who has used an iPod.

But the Apple TV needs to overcome some hurdles, so let's get them out of the way first. It's not a TiVo that records broadcast television; the only link with any type of TV feed would be if you decide to stack the Apple TV on top of your TiVo or cable box. (I don't recommend putting anything on top of the Apple TV: it runs really hot!)

<http://www.tivo.com/>

It's also not a DVD player. Its content comes from other computers on your home network (Mac or Windows), and only via iTunes. As a result, the image quality of movies is, practically speaking, limited to what Apple calls "near DVD quality": 640 by 480 pixels using H.264 encoding. That's actually not terrible, but it is noticeably worse than a DVD's output. For this reason, some people may choose to go with a Mac mini or a stand-alone DVD player. Another disadvantage is that the Apple TV supports Dolby Pro Logic audio, not Dolby Digital 5.1 surround sound.

<http://en.wikipedia.org/wiki/Dolby_Pro_Logic>
<http://en.wikipedia.org/wiki/Dolby_Digital_5.1_Surround_Sound>

Of course, you can rip DVDs that you own using a program like MediaFork (formerly known as HandBrake), MPEG Streamclip, or VisualHub, import the movie files into iTunes, and then synchronize or stream the video to the Apple TV. However, Apple's tagline of "If it's on iTunes, it's on your widescreen" is a little misleading. Although iTunes can play a variety of video formats, it won't synchronize or stream material that isn't MPEG-4 video encoded with H.264. If you ripped your DVD library into a different format, you'll need to re-encode the movies.

<http://handbrake.m0k.org/?page_id=8>
<http://www.squared5.com/>
<http://www.techspansion.com/visualhub/>

The device does support 720p HD video, which is 1280 by 720 pixels, but so far the only content at that resolution are HD movie trailers and samples from Apple (the 720p option) or video you provide. If you have an HD video camera and QuickTime Pro, you can export footage from iMovie or QuickTime Player into Apple TV format. I'm optimistic that Apple will provide HD movies from the iTunes Store at some point, but even with compression, the file sizes for feature-length movies would be large enough that it would take many hours to download them over a typical home broadband Internet connection. (A feature-length movie purchased from the iTunes Store is about 1.5 GB, while HD content would be about 16 times larger than that.)

<http://www.apple.com/quicktime/guide/hd/>

And although it includes built-in 802.11n wireless networking (making it backwards-compatible with 802.11g and 802.11b networks; see "AirPort Extreme 802.11n Throughput Limits," 2007-01-29), the Apple TV can't download much content from the Internet, such as from sites like YouTube. It will stream 30 second previews of selected material from the iTunes Store (the day's top songs, movies, etc.), but you need to purchase the songs or movies from within iTunes on a computer. Direct purchasing and downloading is another feature that I wouldn't be surprised to see in the future once Apple TV gains a foothold in the market.

<http://db.tidbits.com/article/8834>

Lastly, it won't work on most televisions. You need, in Apple's words, a "widescreen, enhanced-definition or high-definition TV capable of 1080i, 720p, 576p, or 480p resolutions." Some standard-definition TVs with component inputs will also work, as Paul Kafasis at Rogue Amoeba discovered when his Apple TV arrived. However, the display may appear scrunched; in a briefing last week, Apple told me that the interface has been designed for widescreen TVs, so hooking it up to a TV that falls outside the recommended specs may not be ideal.

<http://www.apple.com/appletv/connect.html>
<http://www.rogueamoeba.com/utm/posts/Article/appleTV-2007-03-22-21-30>

So, that leaves us with a $300 device that plays media acquired primarily through iTunes. It sounds like a crazy move on Apple's part, but the widespread familiarity with the iPod, and by extension people's familiarity with iTunes, makes the Apple TV more appealing to people who see the value in accessing their digital content but don't want to feel like they need to operate a computer (or need to call on their tech-savvy friends) to do so.

The Apple TV benefits from Apple design, which comprises much more than just the rounded-corner enclosure. Setup is easy and straightforward, including the process of pairing with computers on your network. As I mentioned earlier, the navigation system is similar to the iPod. (However, as with the iPod, you still have to get past the initial confusion of having a right-facing arrow icon (actually a greater-than symbol, or ">") indicating more content, but pressing the right-arrow button on the remote does nothing; you need to press the Play/Pause/Select button instead. It's one of the few odd design choices of the iPod system, but something that's easy to adapt to.)

The interface's look is simple without appearing basic, polished instead of garish. In fact, the Apple TV seems to value restraint; the screen saver that appears after a couple of minutes, for example, is composed of photos (or album artwork) that drift slowly from the bottom of the screen to prevent burn-in on plasma displays.

Another nice touch: when you resume playing a video, the two options (Resume Playing and Start from Beginning) are set against an out-of-focus version of the frame you last viewed when you stopped playback previously.

Lastly, the Apple TV feels like a product designed for the near future. The U.S. changeover to digital television broadcasting in February 2009 will bring more widespread use of HDTVs, which continue to drop in price. Although you can't yet buy HD content from the iTunes Store, it makes sense that Apple would offer it in the future. And other capabilities, such as games like those found on the iPod (or even special versions of normal Mac OS X games), could be added by downloadable system updates. Perhaps the USB port on the back could be utilized for more than just diagnostics, as Apple currently states, perhaps even an adapter for a wireless game controller like the Wii Remote.

<http://en.wikipedia.org/wiki/Wii_Remote>

Sync and Stream

Okay, enough speculation. When you first begin using the Apple TV, you'll want to jump in and start watching your movies and TV shows right away, but unfortunately there's a wait involved.

The Apple TV synchronizes its content with one Mac or Windows PC running iTunes; once you've defined the sync machine, media is copied over the network and stored on the Apple TV's 40 GB hard disk. That's a lot of data to copy, even on an 802.11n network.

Fortunately, you can also view content that's streamed over the network and not stored on disk. If you start watching a movie on the sync computer that hasn't been copied over, syncing gets put on hold while the movie is streamed. When the show is over, or if you're streaming audio only, syncing resumes.

To transfer your media more quickly at first, connect the device to your computer via Ethernet instead of a wireless network.

<http://docs.info.apple.com/article.html?artnum=305254>

Only one computer can sync to the Apple TV, but you can stream to it from up to five other computers.

Remote Bleed

The Apple TV comes with an Apple Remote, the same type that's included in all recent Macs. Out of the box, the remote's infrared signal can work on any capable nearby Mac. My wife's MacBook would jump into Front Row while I was using the Apple TV.

To avoid this inconvenience, pair each remote to its respective Mac. Hold the remote close to the IR receiver on the front and press and hold the Menu and right-arrow buttons. After a few seconds, an image of a remote with an interlocking chain link icon above it appears. On the Apple TV, go to the Settings menu and then choose Pair Remote.

<http://docs.info.apple.com/article.html?artnum=304991>

As more Apple Remotes invade our house (this is the third), I'm also having trouble keeping them straight. My low-tech but effective solution is to wrap a different colored rubber band around each one.

Apple TV Hacks

Early Apple TV recipients wasted no time in voiding their warranties. Within a couple of days, tinkerers had disassembled the Apple TV, figured out how to replace the internal 40 GB hard disk with a larger one (which looks to be an involved process), and configured the device to play other video formats such as Xvid. In fact, it's amazing just how hackable this little unit is. The Apple TV Hacks Web site is a good source for tracking new developments, including ways to enable Remote Desktop on the Apple TV.

<http://www.anandtech.com/mac/showdoc.aspx?i=2951&p=3>
<http://www.appletvhacks.net/2007/03/23/apple-tv-harddrive-upgrade-process/>
<http://forums.somethingawful.com/showthread.php?s=&threadid=2391956>
<http://appletvhacks.net/>

Still waiting for your Apple TV to arrive? You can get a taste of the snazzy startup animation by watching a QuickTime movie.

<http://www.mcwiggin.com/AppleTVHacks/Intro.mov>

I don't have a burning desire to open up an Apple TV, so for the time being I'm content to keep testing it from the couch. With popcorn.

ToC

Hackers Dissect Apple TV to Create the Cheapest Mac Ever

Rob Beschizza
04.06.07 | 2:00 AM
URL: http://www.wired.com/gadgets/mac/news/2007/04/appletvhacks_0406

Apple TV is dead, long live the Mac Nano. Sort of.

Just two weeks after Apple released its streaming media box to the public, hackers successfully installed OS X, Apple's desktop operating system, on the $300 device, making it the cheapest PC Cupertino has ever sold.

"The breakthrough is done, OS X runs on Apple TV!" wrote "Semthex," the anonymous hacker responsible for the mod, at his website <http://www.semthex.com/>. "Now we got (the) low-budget Mac we ever wanted."

The add-on may be of limited appeal to everyday users. It involves a laborious 13-step procedure <http://www.appletvhacks.net/2007/04/01/mac-os-x-running-on-apple-tv/>, and the resulting installation is unable to take advantage of all the Apple TV's hardware. Without video acceleration, games can't floor the graphic chip's throttle. There's no audio or ethernet support either, making the box useless for its original purpose as a media hub.

Over the past week, however, enthusiasts worked to solve these problems, exchanging ideas over IRC and testing new versions of specially tailored system software Semthex created, which is necessary to bypass built-in restrictions on installing the full version of OS X.

"This hack seriously opens up the doors with what the Apple TV could be used for," said Tom Anthony, administrator of Apple TV Hacks <http://appletvhacks.net/>, in an e-mail.

Released March 21, Apple TV won praise for its compact design and usable interface, and criticism for its limited utility and poor-quality video content <http://blog.wired.com/gadgets/2007/04/review_apple_tv.html>. Early hacks included adding the popular Xvid video codec and installing a larger hard drive. Some hackers enabled SSH to permit secure command-line access to the box, and USB keyboards and mice soon followed. Other unauthorized add-ons include the Apache web server, early attempts at a Linux port and the VNC remote desktop system.

The hacks are not for the faint-hearted. Gaining the system access required to accomplish these modifications usually requires owners to get their hands dirty, opening the box and following complex instructions that might deter the casual user.

With OS X on board, however, almost anything might soon be running on Apple TV, even the Media Center edition of Microsoft Windows.

The reasons behind this assault are found in the box itself: Despite being fitted with a Pentium M processor, as much RAM as Sony's PlayStation 3 and a faster graphics chip than a Nintendo Wii, Apple TV doesn't replace other devices under the TV set. While some people are happy to stream media from iTunes libraries to their televisions, many want to put that hardware to other uses. More, perhaps, than anyone suspected.

Anthony's site was briefly unavailable earlier this week, battered by hordes of visitors.

"I wasn't quite prepared for how big it would be; in the first week I had half a million visitors, and I had to purchase additional bandwidth to the site," Anthony said. "The biggest problem with the site has been (that) I have been receiving so many e-mails ... I haven't been able to keep up with my day job."

If Apple objects to this kind of interference, it has yet to say so openly, though unlikely sounding (and unconfirmed) rumors <http://blog.wired.com/gadgets/2007/03/apple_cracking_.html> circulated late last week that Apple was remotely disabling add-ons through a remote internet connection.

If all this sounds exciting, beware. It's not easy work. Here's how to void your warranty in style:

ToC

iTunes, You Complete Me

by Jeff Carlson <jeffc@tidbits.com>
TidBITS#873/02-Apr-07
article link: <http://db.tidbits.com/article/8933>

One of the great things about the iTunes Store has been the way it lets you buy single songs without having to purchase an entire album. I own too many CDs that contain only one or two songs I like; the rest of the selections just don't hold my interest. I'm especially bad about this if I go into a store (such as the excellent local Sonic Boom Records), listen to a couple of tracks or parts of tracks, buy the album thinking I've stumbled on some cutting edge band, and then discover later that the disc wasn't so hot (and that my radar for new music is still subpar, darn it).

<http://www.sonicboomrecords.com/>

Occasionally, though, I'll buy a single song and then realize that the rest of the album is worth buying. Purchasing the album from the iTunes Store would result in a duplicate of that single, and if there were more than nine songs on the album, it wouldn't be worth buying them individually to avoid duplicating the one I already own.

Apple has now introduced Complete My Album, a new feature that gets around the problem. When you click the iTunes Store link for a song (the arrow to the right of the song title in your iTunes library), a Complete My Album option appears, listing the cost of the rest of the album and a Buy button. So, for example, if you've purchased one $0.99 track, it will cost you $9.00 (plus tax) to purchase the rest of the album's tracks.

<http://www.apple.com/pr/library/2007/03/29itunes.html>
<http://www.tidbits.com/resources/2007-04/itunes_complete2.jpg>

Apple says that the Complete My Album feature applies to qualifying tracks for up to 180 days after you've purchased the singles. However, I've noticed that the feature currently applies to singles I purchased when the iTunes Store first opened, too.

ToC

Apple Sends Vista to Boot Camp

by Joe Kissell <joe@tidbits.com>
TidBITS#873/02-Apr-07
article link: <http://db.tidbits.com/article/8932>

Apple last week released Boot Camp 1.2 beta, the latest version of its software for enabling Intel-based Macs to boot into Microsoft Windows. This is likely to be the final update to Boot Camp before the release of Mac OS X 10.5 Leopard, which according to Apple will include a release version of Boot Camp (though there's still much speculation about what form Boot Camp will take in Leopard). Boot Camp 1.2's most prominent new feature is support for Windows Vista (but only 32-bit versions for now), which previously required awkward hacks. Also new in this beta are updated drivers for numerous Apple devices including trackpads and iSight cameras, support within Windows for the Apple Remote, the inclusion of Apple Software Update (to update Apple software within Windows), and numerous other improvements. It's a 138 MB download.

<http://www.apple.com/macosx/bootcamp/>

ToC

Vista on your Mac? Not so fast

by Mathew Ingram
April 12, 2007
URL: http://www.theglobeandmail.com/servlet/story/LAC.20070412.TQ5MACMAC/TPStory//

Now that Apple computers use Intel processors -- a change the company made last year -- Mac owners can run Windows and Apple's Mac OS X side by side. That's thanks to a technology called "virtualization," which allows users to switch from one operating system to the other without having to reboot their computer.

So does that means Mac users will be able to run Microsoft Vista and have two state-of-the-art operating systems on one machine? Not so fast.

Using virtualization software such as Parallels or VMWare, Mac users can theoretically have Vista and OS X running side by side. But they can't use the cheaper version of Vista designed for home users -- at least, not if they want to abide by the terms of the End User Licence Agreement, which software owners effectively agree to when they install a product.

That's because the Microsoft agreement states that anyone running Parallels can't use the $199 basic or the $239 premium edition of Vista. Instead, they have to buy the $299 business version or the $399 ultimate version of the long-anticipated OS. MIcrosoft says the move was necessary because of security issues with virtualization technology. A security analyst showed last year that, in theory, the kind of virtualization that Intel and AMD processors allow could be used to run malicious software programs alongside another operating system, creating the potential for damage. The Globe and Mail

AMD and Intel have both questioned whether the research is valid, however, and said there are no inherent security issues with virtualization. But Microsoft maintains that there's a chance such a problem could occur, and has therefore restricted the use of Vista to versions that it assumes are likely to be run either by corporations or by sophisticated users.

Unfortunately for anyone who plans to use their copy of Vista to play music or watch videos while running a virtual PC on their Mac, the Vista end user agreement also prohibits virtualization programs from playing any content that's encrypted with Microsoft's digital-rights management software -- another security risk, according to Microsoft.

If you're a Mac user, you can get around these restrictions by using Apple's Boot Camp software, which also allows you to run Windows Vista and OS X on the same machine. But it's not virtualization software -- which means that you'll have to reboot your computer in order to switch from one OS to another.

ToC

Opening My Vistas

by Glenn Fleishman <glenn@tidbits.com>
TidBITS#870/12-Mar-07
article link: <http://db.tidbits.com/article/8896>

I just bought a new laptop with Windows Vista pre-installed, and, hey, I kinda like it.

As I dodge flaming arrows from regular TidBITS readers, let me note that it's not my main computer nor intended to be; that I've been using the Mac platform since 1985; and that I currently own something like five working Macs. (Yes, we Mac owners know the difference: I have two other Macs of ancient vintage that haven't been powered on in years.)

I purchased a Dell Inspiron 6400 laptop for two reasons. First, I'm a technology journalist, and Vista is destined to be the world's dominant platform within a year or two. I need to know how it works and how to use it. Second, I write quite a bit about Wi-Fi and wireless data. Invariably, new wireless cards come out with Windows drivers first; Mac drivers lag by weeks or years, and often lack full feature support.

<http://www.dell.com/content/products/features.aspx/inspn_6400>

My criteria for a Vista system were fairly elaborate. I wanted a dual-core Intel chip - the one I got is a "budget" Core Duo chip with half the Core Duo's Level 2 cache - and I thought it would be nice to have a good platform on which to perform side-by-side comparisons with similar Mac platforms. I needed an ExpressCard expansion slot because that's the format in which new Wi-Fi and cell data modems will be issued. By the same token, I ordered the Intel Draft N (802.11n) internal card that's just been released because it will be among the most heavily sold Wi-Fi adapters this year.

<http://www.intel.com/pressroom/kits/wireless/kedron/>

Finally, I wouldn't buy a PC that didn't have Vista pre-installed. From everything I've read, buying a machine with Windows XP today and upgrading tomorrow is a sucker's bet. Further, I needed at least the Vista Business flavor to get the networking options necessary for the kind of testing I would be performing.

I looked at all the major manufacturers, and Dell came closest to what I needed at a reasonable price. Despite quite a lot of well-publicized missteps in the last couple of years - Dell used to be ranked a not-too-distant No. 2 behind Apple for customer support, but has slipped quite a bit - the company seems in the middle of a turnaround that includes Michael Dell resuming leadership.

The Inspiron 6400 I settled on has a 15.4-inch screen, 2 GB of RAM, a 120 GB 5400 RPM hard drive, a dual-layer 8x DVD burner, a Draft N adapter, and a 1.6 GHz Pentium T2060 dual-core processor. It does not feature gigabit Ethernet. (A previous version of this article posted to the TidBITS Web site stated that the Inspiron 6400 had a Core 2 Duo processor rather than the "budget" Core Duo that it actually includes.)

Along with the computer, I purchased a two-year subscription to a full McAfee anti-everything package: anti-spyware, anti-virus, firewall, and anti-this-and-that. Pre-purchasing that package meant the software is installed and supported, and was cheaper, too. I also bought a three-year extended warranty that includes 24-hour-a-day phone support and next-day, on-site repair.

For all that, I paid $1,500 including sales tax. That's not a terrible price.

Dell made setup easy. Unpack the box. Plug in a power adapter. Press the power key. A simple one-sheet setup poster came with it, and I didn't need to refer to it. Initializing Vista involved answering just a few questions before it was up and running.

My early experience with Vista, after spending only a couple of hours getting it set up and running, wasn't awful. Sure, it asks me about granting approval for programs more often than I'd like. It's weird that I can't easily say, "Hey, I trust this action for this particular program," since I've been able to do that with Zone Alarm Pro under Windows XP for years.

<http://www.zonelabs.com/store/content/catalog/products/sku_list_zap.jsp?dc=12bms>

The McAfee package, however, did lock up my computer. A minimized window needed user approval to proceed, and that locked the whole minimized windows task bar at the bottom of the screen. I had to use the old Control-Alt-Delete trick to display the Process Manager, and then I was able to bring the McAfee program to the front and move ahead. That happened just once.

Vista, as a whole, does conform to reports that at the surface it's Windows XP with fancier dressing. (Beneath the surface, there's a lot that's changed, but we will have to wait to see how it shakes out on the security and stability fronts.) There are some nice features, many of them familiar to me as a long-time Mac OS X user, but I don't find it offensive or confusing. The Aero interface, which offers translucency among other features, is attractive. Vista, so far, is just fine. (Wait until I start really using it, of course, to see how it holds up.)

Now, you will ask me, "Why, Glenn, oh why did you not simply buy a MacBook Pro? It has a full Intel Core 2 Duo - not the budget Core Duo you got - along with an ExpressCard slot, and it can run Windows."

My answer is that at the moment, you can only install Windows Vista under Boot Camp for a native boot - which would be needed to handle Windows drivers for the ExpressCard slot - with a bit of elbow grease. Boot Camp is still in beta; Apple doesn't support Vista with Boot Camp yet, either.

<http://www.apple.com/macosx/bootcamp/>

Also, a similarly equipped MacBook Pro from Apple is nearly $2,400 including sales tax. That's for a far superior 2.16 GHz Core 2 Duo processor with gigabit Ethernet and Apple-supplied RAM, but that's the cheapest and slowest MacBook Pro offered and I could shave only a few dollars by supplying third-party RAM myself. Further, given Apple's product cycles, I expect that we'll see new versions of the MacBook Pro in the next two to four months.

The folks at Parallels told me at Macworld Expo that their Parallels Desktop virtualization software might be able to support Windows drivers working on devices inserted in the ExpressCard slot, just as they've improved USB support in their most recent release. However, that's speculative until it's available.

<http://www.parallels.com/en/products/desktop/>

My insidious plan is to use the Dell laptop until the time comes that I can easily install and run Vista for all my needs using either Boot Camp or Parallels Desktop. The Dell should fetch a decent price when sold. And this is, of course, all a mental trick to justify buying a MacBook Pro in the future - but only when the time is right.

ToC

VMware Fusion Beta 3 Draws New Parallels

by Joe Kissell <joe@tidbits.com>
TidBITS#874/09-Apr-07
article link: <http://db.tidbits.com/article/8943>

Last week VMware released Beta 3 of its Fusion virtualization software for running Windows on an Intel-based Mac. Among several new features are two that are obvious attempts to overcome advantages offered by competitor Parallels Desktop: support for booting from a copy of Windows installed under Boot Camp and an Easy Install option to automate the process of running the Windows installer. This version also includes performance improvements and a simplification in the way virtual machines are packaged, among other changes. Fusion beta 3 is a 135 MB download.

<http://www.vmware.com/products/beta/fusion/>
<http://www.parallels.com/products/desktop/>

ToC

Grab Bag of Security Fixes and Patches for Mac OS X

by Glenn Fleishman <glenn@tidbits.com>
TidBITS#871/19-Mar-07
article link: <http://db.tidbits.com/article/8907>

Last week Apple updated Mac OS X 10.4 Tiger to version 10.4.9 and provided a security update for Mac OS X 10.3.9 Panther. The security update is incorporated into the Tiger update, and could have been labeled "Fixes for the Month of Apple Bugs," a project we have written about before (see "MoAB Is My Washpot," 2007-02-19).

<http://docs.info.apple.com/article.html?artnum=304821>
<http://docs.info.apple.com/article.html?artnum=305214>
<http://db.tidbits.com/article/8869>

Security Update 2007-003 and the related code in Mac OS X 10.4.9 fix dozens of problems reported in the Month of Apple Bugs, including what was the most serious remaining problem, a way to exploit a flaw in Software Update by "enticing a user to download and open a Software Update Catalog file." We haven't seen reports of this - or any of the rest of the bugs - in the wild. Most of the non-MoAB exploits fixed by the security update require local users with access to an account and software that isn't enabled by default in Mac OS X.

There's no simple way to summarize 10.4.9's general enhancements. Like the last few updates to Tiger, this one is a grab bag of fixes for numerous individual problems, and it's likely the last big hurrah for Tiger, as Mac OS X 10.5 Leopard's ostensible ship date moves ever closer. Although Apple could release a 10.4.10, history shows us they prefer the numerical purity of single digits. (Jaguar ended its run with 10.2.8 and Panther with 10.3.9.)

Notable among the general changes are improvements to .Mac synchronization. As a regular .Mac sync user, I have seen lots of inconsistent behavior and long delays. I'm hoping 10.4.9 eliminates these problems. Another fix related to USB modems I have to call out as "I fax in your general direction": the note says that the update improves reliability in faxing in France or Belgium when using the Apple USB Modem.

Apple has made available separate incremental and combo updates for PowerPC and Intel systems running both Mac OS X and Mac OS X Server; you can use Software Update to download the best updater for your system or view all eight updates from the Apple downloads page. The combo updates work for 10.4.0 and later; the incremental releases work for 10.4.8. Set aside some download time, since the size of the updates runs from 72 MB (PowerPC incremental) to 350 MB (Mac OS X Server Intel combo). Panther's Security Update 2007-003 is also available both via Software Update and as standalone downloads for both Mac OS X (36 MB) and Mac OS X Server (49.5 MB).

<http://www.apple.com/support/downloads/>

As always, if you experience any unusual problems after updating, particularly with applications not launching, download and install the combo updater for your Mac, since it can provide a cleaner installation.

Apple also released iPhoto 6.0.6, which "addresses issues with EXIF data compatibility and photocasting." The photocasting fix is in response to another Month of Apple Bugs report. It's also available via Software Update or as an 8 MB standalone download.

<http://www.apple.com/support/downloads/iphoto606.html>

ToC

TimesSelect Free for Higher Ed

by Adam C. Engst <ace@tidbits.com>
TidBITS#871/19-Mar-07
article link: <http://db.tidbits.com/article/8910>

After all my puzzling over how to create permanent links to articles in the New York Times (see "Easier New York Times Linking," 2007-02-26), I was amused to hear from a friend that the New York Times is now making TimesSelect free to any student or faculty member with a valid college or university email address. TimesSelect includes access to articles from the New York Times Op-Ed and news columnists in both text and podcast forms, along with up to 100 articles per month from the full New York Times Archive, which contains content back to 1851.

<http://db.tidbits.com/article/8881>
<http://www.nytimes.com/gst/ts_university_email_verify.html>

ToC

Sound Studio 3.5 Adds Numerous Features

by Andy J. Williams Affleck <andyjw@raggedcastle.com>
TidBITS#871/19-Mar-07
article link: <http://db.tidbits.com/article/8914>

Freeverse has released Sound Studio 3.5, which adds many new features of interest to all users of this excellent audio editor and recorder. Sound Studio has long been my favorite tool for editing audio files, whether I'm producing a podcast, trimming a file in my iTunes library, or recording my son's funny snore one night (and later removing the laptop fan noise from the recording - it's important to have high quality embarrassment material for when he's a teenager).

<http://www.freeverse.com/soundstudio/>

Among Sound Studio 3.5's many new features are the addition of new audio formats for opening and saving, including Apple Lossless, ADTS AAC, NeXT/Sun Audio, and Ogg Vorbis. In addition, Sound Studio now supports 8-, 16-, and 24-Kbps bit rates when saving MP3 format files.

<http://forum.freeverse.com/viewtopic.php?pid=3387>

For podcasters, Sound Studio has added the capability to manage all iTunes-supported tags, including the podcast bit that determines whether a file appears in the Podcasts section of iTunes or in the regular Music section. This is a major boon to me, since I would like to move podcasts I want to keep into my music collection and let all others automatically delete themselves after listening, something that's been difficult to accomplish so far. Now I can open the file in Sound Studio, toggle the appropriate checkbox and re-import the file into iTunes where it appears in my Music section rather than in the Podcasts section. The reverse approach enables you to move spoken audio files from the Music section into the Podcasts section, if you so desire.

Podcasters will also appreciate the fact that markers set by Sound Studio within audio files are now automatically saved as chapters in podcasts. In other words, when playing back in iTunes, the marker titles are listed within the Chapters menu and enable one to jump directly to that spot in the playback. (For more information on how to use Sound Studio for podcasting, see my ebook, "Take Control of Podcasting on the Mac.")

<http://www.takecontrolbooks.com/podcasting-mac.html?14@@!pt=TB871>

Other enhancements in Sound Studio 3.5 include new preferences for how scrolling occurs during playback, the capability to loop sound in filter previews (rather than requiring you to play the sound over and over as you make adjustments), and new AppleScript support for referencing individual tracks and changing the pan and volume of each track.

Finally, Sound Studio now provides an innovative way to set the beats per minute (BPM) of a track. BPM is a piece of metadata that appears in the iTunes tag editor and as part of the display grid of the main Sound Studio window; it can be useful for generating smart playlists of slow or fast music in iTunes. All you have to do to set the beats per minute is click a button in time with the rhythm of the music.

Sound Studio 3.5 costs $80, and upgrades are free to registered owners of 3.0 or higher. Special upgrade pricing for users of earlier versions is available as well, as is a free demo (a 10.2 MB download) for anyone who hasn't yet tried Sound Studio.

<http://www.freeverse.com/download/select.php?name=soundstudio&platform=osx>
<http://dev.freeverse.com:16080/faq/index.php?action=artikel&cat=394881&id=84>


[Andy J. Williams Affleck built Dartmouth College's first Web site in 1993, created the original Web site for the sitcom Friends, and started a virtual community that's still around a decade later. When he's not producing his Podcrumbs podcast or working on "Take Control of Podcasting on the Mac," he's a senior project manager and accessible Web design expert.]

<http://www.podcrumbs.com/>

ToC

Hard Drive Failures and Contributory Storage

by Adam C. Engst <ace@tidbits.com>
TidBITS#871/19-Mar-07
article link: <http://db.tidbits.com/article/8911>

At last month's 5th USENIX Conference on File and Storage Technologies, two academic papers - one from Bianca Schroeder and Garth A. Gibson of Carnegie Mellon University (CMU) and the other by Eduardo Pinheiro, Wolf-Dietrich Weber, and Luiz AndrŽ Barroso of Google - looked at the reliability of hard drives in large-scale installations. Among other conclusions, the CMU team found that real-world replacement rates were much higher than would have been expected from vendor-provided mean time to failure (MTTF) estimates, and Google's researchers concluded that there was little correlation between failure and either elevated temperature or activity levels. The papers weren't written for the lay audience and aren't easy reading, but they are worth a look if you're interested in when and why hard disk mechanisms fail.

<http://www.usenix.org/events/byname/fast.html>
<http://www.usenix.org/events/fast07/tech/schroeder/schroeder_html/>
<http://labs.google.com/papers/disk_failures.pdf>

Also interesting is the paper by James Cipar, Mark D. Corner, and Emery D. Berger of the University of Massachusetts Amherst on the Transparent File System (TFS). The goal of TFS is to create a contributory storage system in which multiple people could contribute unused disk space to a shared pool, much as the SETI@home project enables users to contribute unused CPU cycles to the shared task of analyzing radio telescope data. (And yes, there is still an active TidBITS team for SETI@home.) Apparently, TFS can contribute all of the unused space on a disk while imposing only a negligible performance drag on the contributor. Prototype source code is available; I'll be curious to see if anyone cleans it up and ports it to MacFUSE (see "MacFUSE Explodes Options for Mac File Systems," 2007-01-29).

<http://www.usenix.org/events/fast07/tech/cipar/cipar_html/>
<http://setiathome.ssl.berkeley.edu/>
<http://setiathome.berkeley.edu/team_display.php?teamid=30293>
<http://prisms.cs.umass.edu/tcsm/TFS.html>
<http://code.google.com/p/macfuse/>
<http://db.tidbits.com/article/8835>

ToC

SpamSieve 2.6 Adds Thunderbird Support

by Adam C. Engst <ace@tidbits.com>
TidBITS#872/26-Mar-07
article link: <http://db.tidbits.com/article/8920>

Michael Tsai has released SpamSieve 2.6, a notable update to his popular spam-filtering tool. This version adds Mozilla Thunderbird to the extensive list of supported email programs and improves detection of image spam and phishing messages. Both are tricky to identify, the former due to either a complete lack of text or to a great deal of random text along with the image payload, and the latter because the text so closely mimics normal messages. Other improvements include more efficient AppleScript support, improved compatibility with pre-release versions of Mac OS X 10.5 Leopard, and a variety of minor tweaks to the Apple Mail plug-in. SpamSieve 2.6 is a free upgrade for registered users; new copies cost $30 and there's a 30-day trial version. The program requires any version of Mac OS X after 10.2.8, with 10.4 or later recommended.

<http://c-command.com/spamsieve/>
<http://c-command.com/blog/2007/03/19/spamsieve-26/>

ToC

Enhance iChat with Chax

by Adam C. Engst <ace@tidbits.com>
TidBITS#872/26-Mar-07
article link: <http://db.tidbits.com/article/8921>

iChat has increasingly become a necessary aspect of business and personal communication, but I still don't love the program. I remain peeved by its approach to status (see "iChat Status Report," 2004-03-29) and its general clumsiness. Oddly for an Apple program, iChat uses lots of individual windows, and since you often want to switch among them, having them in separate windows in the window-layered Mac OS X (as opposed to the way Mac OS 9 was by default application-layered) can require some additional fussing.

<http://db.tidbits.com/article/7606>

A while back, I was turned on to Kent Sutherland's Chax, a free (donations gladly accepted) utility that extends and enhances iChat in numerous ways. It installs directly into iChat, so you can set its preferences in a tab of the normal iChat preferences window. I've seen no instability or odd behavior because of it, and as such I'd encourage anyone bothered by iChat to check it out. It is an Input Manager that injects itself into every application, which is entirely appropriate behavior, but if you install Chax and find that you're not using it, you can uninstall it as explained on its Web site. (For more information about Input Managers, see Matt Neuburg's "Are Input Managers the Work of the Devil?" 2006-02-20.)

<http://www.ksuther.com/chax/>
<http://db.tidbits.com/article/8430>

Chax's feature list is as long as my arm, but here are the features I find most useful.


Tabbed Browsing

This is Chax's marquee feature, and the single capability that makes it worthwhile for many people. Instead of every chat appearing in its own window by default, Chax can embed them all in one window, separating them with tabs that look and work just like tabs in Safari. You can also "tear off" a tab to make it into its own window, if you want to watch multiple chats simultaneously. Tab names change color if the other user in that tab is typing or if there's a new message you haven't yet seen, and the tabs contain both names and user icons. You can move between tabs by clicking or with keyboard shortcuts, and you can even set the edge of the window that should contain the tabs (top and bottom are good if you have relatively few active chats most of the time; left and right are good if you have tons of active chats).


Improved Away Handling

Although Chax can't implement my suggestion of how iChat status should work, it does improve the situation. You can set Chax to make your status Away after a user-specified number of minutes, so if you're Available, then leave your computer, iChat first changes your status to Idle, then Chax later changes it to Away after the time you set elapses. In my case, you probably wouldn't see Idle as my state very often, since Chax can also switch the state to Away (with a custom message) when the screen saver activates, as it does on my Mac after about 5 minutes. I figure that if my screen saver is active, it's a good indication that I really won't see any incoming messages. Plus, Chax can automatically reply to incoming messages when you're away (once per conversation), and you can set a custom reply.


Better Notifications

iChat has a variety of alert sounds you can set, but I find them annoying if I'm not actually sitting at the Mac, so I like the fact that Chax can disable them if I'm Away or Idle. If I really don't want to be interrupted audibly (such as when I'm recording a podcast), I can turn them off when Available too. I don't tend to think of the Dock as a place for changing information, but Chax has a variety of options for showing notifications there. More useful for me is its support for the universal Growl notification system; I really like seeing the first message of new chats appear briefly in a Growl notification that slides up from the bottom of my screen no matter what application I'm currently using.

<http://growl.info/>


Chat Enhancements

Chax also provides some tweaks to how chats themselves work. You can set Chax to accept text chat invitations and incoming file transfers automatically, though it warns you that the latter is of course a security risk. It can warn you before you send a message to a mobile phone user, enable you to open received graphics in Preview with a double-click, and can require you to confirm quitting when there are open message windows (it's always embarrassing when you leave a chat because you thought you were quitting a different application). Chax can also hide the smiley button in the text input line and can embed a variety of status changes along with the chats themselves, so you can keep track of when people come and go. And lastly, it can disable picture-in-picture in video chats, though I quite like that aspect of iChat, and it can keep audio and video chats going during active file transfers. If you're disconnected by a flaky Internet connection, Chax can automatically try to reconnect you, and it provides a variety of options for modifying the look and feel of your chat and buddy list windows.


Chax in the Box

Apple has promised numerous enhancements to iChat for Leopard, but the kind of configuration flexibility that Chax provides isn't usually the sort of thing Apple likes to inflict on undemanding users. But for those of us who prefer to configure our environments just so, Chax is an essential addition to iChat now, and I suspect it will continue to be equally as relevant in Leopard.

Chax 1.4.8 is a universal binary and requires at least Mac OS X 10.4.3 or later. It's a 1 MB download.

ToC

Stick 3 GB of RAM in an Intel Core 2 Duo iMac, MacBook

by Glenn Fleishman <glenn@tidbits.com>
TidBITS#872/26-Mar-07
article link: <http://db.tidbits.com/article/8917>

Other World Computing has a 3 GB memory kit that it says is a first for Intel Core 2 Duo MacBook laptops. Apple doesn't offer this option. The same $340 kit - a set of one 1 GB and one 2 GB PC5300 DDR2 SO-DIMM modules - also works with the Core 2 Duo iMac and the 15-inch, 2.16 GHz Core 2 Duo MacBook Pro. The other two standard MacBook Pro models include 2 GB as two 1 GB modules, and can be upgraded by swapping one of those modules for a 2 GB unit for $260 from Other World Computing.

<http://eshop.macsales.com/item/Other%20World%20Computing/53IM2DDR3GBK/>

Apple doesn't offer a 3 GB build-to-order configuration for either its MacBook or iMac models, although the 1 GB stock MacBook Pro can be upgraded to 3 GB for $750, while the 2 GB stock MacBook Pro models can be upgraded to 3 GB for $575.

Other World Computing offers a trade-in rebate of between $44 and $60 for 1 GB of memory, depending on the Mac model it was pulled out of and the configuration (as two 512 MB modules or one 1 GB module).

<http://eshop.macsales.com/money-back-rebate/imacintel-memory#imac>

Apple recommends or requires pairing identically sized RAM modules for all its Intel-based Macs. The Mac Pro and Xserve require paired modules, but the company emphasizes the benefits for those models that use system RAM for video operations instead of dedicated RAM for graphics purposes - the Mac mini, MacBook, and iMac. The Intel Core 2 Duo MacBook Pro models have no Apple recommendation for paired memory; the original Intel Core Duo models did, just to add to the confusion.

<http://developer.apple.com/documentation/HardwareDrivers/Conceptual/HWTech_RAM/Articles/RAM_implementation.html>

With paired memory, the processor can access RAM at up to twice the speed of unpaired memory, which is especially important for video output. What that means for actual performance can be determined only through real-world benchmark testing.

It's possible that increasing memory to the maximum 3 GB may trump the increased performance of paired memory, because additional RAM can prevent an operating system from moving data back and forth between RAM and hard disk-based swap files as it pages data and program pieces in and out. The more RAM, to some extent, the less time the computer spends performing relatively glacial hard disk operations.

We recommend using TidBITS Contributing Editor Matt Neuburg's freeware program MemoryStick to see whether or not you currently rely on disk swapping enough that additional RAM might improve overall application performance.

<http://www.tidbits.com/matt/>

Oddly, OWC's own benchmarking of a Core 2 Duo MacBook with varying amounts of RAM and varying tests doesn't seem to show that more memory produces substantially different results. However, the benchmarks they used look at sets of operations or program functions, rather than a typical Mac user's array of different programs in real-world usage scenarios.

<http://eshop.macsales.com/Reviews/MacBook/Testing/Memory_Benchmarks>

ToC

Add a DJ to iTunes with SpotDJ

by Adam C. Engst <ace@tidbits.com>
TidBITS#872/26-Mar-07
article link: <http://db.tidbits.com/article/8915>

"There goes the last DJ, who plays what he wants to play, who says what he wants to say." -Tom Petty in "The Last DJ"

<http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewAlbum?playlistId=161788&s=143441&i=161764>

I've never been sufficiently involved with radio to quite understand Tom Petty's lament about the passing of the independent disc jockey as "the last human voice." But even if I missed hearing Wolfman Jack live in his prime, there are times when I'm listening to my favorite music in iTunes or on my iPod that it feels, well, a little repetitive. Sure, being able to play random selections from the 4,800 tracks in my iTunes library means I'm not listening to the same songs over and over again, but in contrast to the days when I listened to the radio, even my favorite songs can sometimes feel a bit one-dimensional. The reason: no human voice introducing them, or relating a bit of background at the end to give some depth and background.

<http://en.wikipedia.org/wiki/Wolfman_Jack>

Thanks to the Web-enabled SpotDJ, you can now add a panoply of human voices to your existing music, whether you play it in iTunes or on the iPod. SpotDJ comes from a tiny San Francisco company founded in part by Scott Kleper, who made a name for himself in the Mac world back in the late 1990s writing the KlepHacks shareware programs.

<http://www.spotdj.com/>
<http://www.printerport.com/klephacks/>


Getting Spots Out

Once you sign up for a free account and download the SpotDJ software (available for both Mac OS X and Windows; nearly 40 percent of the users are Mac users), you simply play songs in iTunes, just as you normally would. Whenever the SpotDJ application detects that you're playing an artist or song for which someone in the SpotDJ community has recorded a "spot" - a short spoken piece - it waits until iTunes finishes playing the song, pauses iTunes, and streams the audio spot, starting iTunes again at the end of the spot. It's that simple.

An option on the SpotDJ Web site let you control how often spots play, since hearing a human voice every so often is quite nice, but having someone talk after every song could become annoying. For the moment, SpotDJ is also restricted in how often it plays by whether or not it has any matching spots for a particular song or artist. The more esoteric your music, the less likely you are to hear spots. You can also choose to hear spots in English, in the language you record spots in if it's not English, or both.

Of course, not all spots are equally well done, so you can use the SpotDJ application (which is essentially a Web interface in a custom window) to rate the DJ from 1 to 5 stars, or add the DJ as a favorite. Your ratings and favorites help control which spots you hear; if you don't like a particular DJ's comments, rating them poorly will ensure that you won't hear from them again (to quote Lady Macbeth, "Out, damned spot! out, I say!"). You can also leave text comments about particular spots; SpotDJ is new enough that I haven't seen many comments yet, though I seldom watch the SpotDJ interface while listening to music.

<http://www.tidbits.com/resources/2007-03/SpotDJ-interface.jpg>

Adding spots to your iPod requires a bit more work. Click the little iPod tab at the top of SpotDJ's window, select a playlist, and click Create Spotted Playlist. SpotDJ analyzes your playlist data, looks for associated spots, downloads the spots (normally they're streamed, but that won't work on the iPod, of course), and then creates a new playlist that interleaves the songs and the spots appropriately. After that it's merely a matter of syncing that playlist to your iPod and making sure that you're not shuffling songs.


Getting Spots In

Of course, listening to spots is only half the fun. The entire point of SpotDJ is that anyone can be a DJ and can contribute spots about their favorite songs. When you find yourself wanting to record a spot for the current song, just stop it, switch to SpotDJ, and click the Spot This Song button. In the drawer that appears, you can record your spot and preview it, repeating those actions until it sounds the way you want. (Please use a decent headset or microphone!) Then click Upload and your spot is automatically uploaded for everyone else to listen to. Spots can be specific to a song or can apply to anything by a particular artist.

Although it's easiest to record a spot directly in the SpotDJ application, you can also record spots on the SpotDJ Web site, by uploading a pre-recorded bit of audio, and even by calling the company on the phone and leaving a message.

<http://www.spotdj.com/create>
<http://www.spotdj.com/upload>
<http://www.spotdj.com/call>

I don't have any particular recording experience, so I found that I had to write my spots out first and then read them into the headset mic, but after the first one, it was easy. I doubt my spots will be heard all that often, since I attached them to specific songs that probably aren't terribly popular right now, but you can listen to them on my DJ page.

<http://www.spotdj.com/adamengst>

Once you've recorded spots, you can also use tools on the SpotDJ site to email a notification to friends or to create an HTML snippet for embedding a customized SpotDJ badge on your Web site.


The Human Voice

Although SpotDJ isn't the most elegant application around, it's simple to use and is sufficiently unobtrusive that it's easy to leave running. I've been using it for a few weeks now, and I quite enjoy hearing the spots.

The best ones I've heard so far are from Ben Fong-Torres, a fixture in the music world who wrote for Rolling Stone and who has many years of experience as a DJ. His many spots, apart from being impeccably recorded, also often feature recorded interview clips with famous musicians he was interviewing for Rolling Stone.

<http://www.spotdj.com/Fong-Torres>

Perhaps the most obvious use of SpotDJ is for artists to record spots about their own songs - doing so both adds value and could serve as a marketing tool because SpotDJ plays spots after 30-second previews in iTunes as well. Other ways spots have been used is for relating trivia, providing reviews, pointing listeners to related music, offering interpretations of ambiguous lines, or just telling stories about the music. I could even see SpotDJ being used for music education classes.

Right now, SpotDJ has thousands, but not tens of thousands, of spots, but that number only stands to grow as more people find SpotDJ and realize how easy it is to record spots. It's a little addictive, and great fun for anyone who is interested in sharing opinions about music. And like the iPod, I think SpotDJ is one of those services that somewhat transcends generations; aging hippies can participate just as happily as young hipsters. We'll see...

SpotDJ is entirely free right now, and isn't currently doing much with the usual approach of advertising and affiliate sales. In part, I suspect that's because it makes more sense to license the technology and content database to a larger player - can you say "iTunes"? I'd certainly like to see Apple do so and build it into iTunes and the iPod directly.

The more I think about SpotDJ, though, the more I think Scott and the SpotDJ folks are on to something larger. It's bigger than music, though music is a great start. What SpotDJ is enabling is ad hoc audio commentary on arbitrary virtual objects. Podcasting may be all the rage, but it's far harder to record a podcast than it is to contribute a spot to SpotDJ, and podcasts stand alone, whereas SpotDJ spots are linked to songs.

What if SpotDJ could play spots when you visited particular Web pages, or viewed a particular book on Amazon.com? Most things on the Internet don't have obvious end points, so you'd need a little more control over when spots were played, but imagine loading a TidBITS article and having a SpotDJ menubar icon display a "5" badge to indicate that there were 5 comments about the article. Clicking the menu would reveal them, in order of relevance, based on your preferences and others' rankings, and you could play one or all of them, while you continue to go about your business. It would all be optional, of course, but it could provide an additional dimension to our everyday browsing.

But that's all just possibility - for now, just check out what SpotDJ can do for you in iTunes and on your iPod.

ToC

Adobe Ships Creative Suite 3, Offers Video Betas

by Glenn Fleishman <glenn@tidbits.com>
TidBITS#875/16-Apr-07
article link: <http://db.tidbits.com/article/8951>

Adobe's recently announced revisions to its flagship design, Internet, interactivity, video, and page layout software collectively sold as Creative Suite 3 (CS3) are now shipping (see "Adobe Announces Creative Suite 3 Plans, Pricing, Dates," 2007-04-02). The company said "April" for the first four of six separate editions: Design and Web available in Standard and Pro releases. The latter two editions, one containing all 13 Creative Suite 3 programs, and the other focused on video editing and production, will ship in the third quarter of 2007.

<http://db.tidbits.com/article/8930>
<http://www.adobe.com/products/creativesuite/>

The revised line-up of programs now available are universal binaries for Mac OS X, finally exploiting the power of Intel multi-core processors. In a nice bit of what is perhaps not coincidental timing, Apple last week announced the availability of eight-core (two four-core processor) Mac Pro desktops (for details, see "Apple Introduces Eight-Core Mac Pros," 2007-04-09).

<http://db.tidbits.com/article/8941>


Adobe Previews Video

Coinciding with this week's National Association of Broadcasters (NAB) conference, Adobe also released betas of its forthcoming video editing and effects applications, Premiere Pro CS3 and After Effects CS3 Pro. The former represents a return to the Mac for Adobe's video editing application, which has been Windows-only since 2003.

<http://nabshow.com/>
<http://labs.adobe.com/technologies/premierecs3/>
<http://labs.adobe.com/technologies/aftereffectscs3/>

At NAB, Adobe also showed off Adobe Media Player, software that might be to video, Flash, and Web pages what the Acrobat Portable Document Format (PDF) and Acrobat Reader have become to the printed and previewed page. The Adobe Media Player will let designers create offline media for later playback using formats typically designed to be embedded in Web pages.

<http://www.adobe.com/aboutadobe/pressroom/pressreleases/200704/041607AMP.html>

Adobe Media Player will allow subscriptions to video feeds, feedback ratings of viewed videos, and other tools clearly designed for narrowcasting and broadcasting video content - especially when you read about the variety of advertising and branding features available to content producers in the player. The free player will be available later in 2007 as a beta and will ship before the end of the year.


Adobe vs. Microsoft

The Wall Street Journal is trying to stir up a little action about competition between Adobe and Microsoft via last weekend's article, "Microsoft, Adobe Set a Collision Course." Of course, it's really Microsoft trying to challenge Adobe's entrenched position with Flash and its creative applications, and Adobe trying to counter Windows Media Player by leveraging Flash's dominance for embedded video playback at YouTube and elsewhere.

<http://www.emailthis.clickability.com/et/emailThis?clickMap=viewThis&etMailToID=1306133125&pt=Y>

The article notes that Microsoft's Silverlight will work much like Flash, and will work with Mac OS X and multiple browsers. Years of experience in getting Windows Media Player to play nicely with others isn't encouraging. Plus, Microsoft's Expression Studio is hardly a CS3 competitor, lacking critical pieces, including a Photoshop competitor, and the fact that some components of the suite have been in beta for years gives one pause too.

<http://www.microsoft.com/expression/expression-studio/overview.aspx>

Microsoft has tried to beat Adobe before in areas that Adobe dominates. The operating system and business suite giant wanted to replace PDF with its own readers and interchange documents that wouldn't require owning a copy of the creating application to view. Needless to say, attempts made multiple times over several years by Microsoft have resulted in no change in Acrobat's near-total ownership of this task.

There are three reasons for this: Adobe has published its PDF specification, allowing third parties (including Apple) to roll their own compatible writers and readers; with the help of the prepress industry, Adobe turned PDF into a final format for prepping files to go on a printing press, rather than just a method to proof a job; and Adobe doesn't particularly care what program creates a PDF file, just that every program can create such files.

We don't see this as a fair fight: Adobe has won the hearts and minds of graphic designers over more than two decades. Microsoft doesn't stand a chance unless it delivers superior tools, not just those that achieve parity in limited areas.

ToC

FutureBITS: Sweet Batteries, Faster P2P, Nanofiber Displays

by Adam C. Engst <ace@tidbits.com>
TidBITS#875/16-Apr-07
article link: <http://db.tidbits.com/article/8947>

Predicting the future is a tricky thing, but as the late Macintosh writer Cary Lu once noted, all the technology we'll see in products in the next five years is being worked on in research labs today. With Cary's remark in mind, I'm going to keep an eye out for news of research projects that could affect our technological world. No promises here - if I could identify those projects that will survive to produce a paradigm-shifting product, I'd be a venture capitalist, not a writer. But it's always fun to imagine what products could be like if only they used...


Sugar-Based Batteries

Bothered by batteries? Led by electrochemist Shelley Minteer, researchers at Saint Louis University have demonstrated a fuel cell battery that relies on enzymes that convert sugar to energy, leaving behind water as the main byproduct. Being the source of energy for most living organisms, sugar is cheap and widely available, and although the best source tested so far was normal table sugar (sucrose) dissolved in water, glucose, flat soda, sweetened drink mixes, and even tree sap have all been used successfully. Others have developed similar sugar-based fuel cells, but Minteer claims hers is the most powerful and longest lasting so far, and since power and longevity are the key weaknesses of alternative power sources, the question will be if both can be improved to the point where the sugar-based fuel cell can power a cell phone, iPod, laptop, or other portable electronic device. Just think, you could mix up a sugar solution, give half to your iPod, and put the other half in a hummingbird feeder.

<http://www.slu.edu/x14605.xml>


Faster P2P Downloading

Peer-to-peer file sharing is for more than just copyright infringement - the technology is interesting for how it distributes massive bandwidth loads widely among a large population of users. Bandwidth may be cheap, but it's not free, and sharing the load helps all users in the system. According to a news release from Carnegie Mellon University, David G. Andersen of Carnegie Mellon and Michael Kaminsky of Intel Research Pittsburgh have developed a technique called "handprinting" that enables P2P clients to locate similar, but not identical, chunks of data, and they've used it in a new system called Similarity-Enhanced Transfer (SET) that significantly outperforms the popular BitTorrent P2P approach. Technology such as this could significantly ease Apple's bandwidth bills for distributing massive software updates, such as the 300+ MB 10.4.9 combo updater, or HD-quality video from the iTunes Store. I could even imagine an approach where contributing your bandwidth to help others download purchased content from the iTunes Store would give you credits that you could apply toward future purchases.

<http://www.cmu.edu/news/archive/2007/April/april10_set.shtml>
<http://www.cs.cmu.edu/~dga/papers/nsdi2007-set/>


Flexible Nanofiber Displays

One of the limitations of modern electronics is having a rigid, often highly breakable, display. Much research is going into various ways to create flexible displays, but the latest promising research comes from an interdisciplinary group at Cornell University in the form of tiny - really tiny - "nanolamps," or light-emitting nanofibers. The 200 nanometer-wide fibers are actually smaller than the wavelength of the light they emit, enabling extremely localized light sources. Hurdles abound: getting the nanofibers to emit sufficiently bright light in the necessary colors, being able to control the light emitting properties of either individual nanofibers or sufficiently small clumps to create addressable on-screen pixels, and ensuring that the nanofibers offer sufficient durability and longevity. Fabrication is always a concern as well, although the nanofibers were created relatively simply using a technique called electrospinning. I suspect Cornell's research is years from being used in a commercial product, but we can still dream of having large screens attached to the walls like tapestries, or small displays woven into clothing.

<http://www.news.cornell.edu/stories/April07/electrospun.fibers.aj.html>

ToC

The CUCUG Section:

March General Meeting

reported by Kevin Hopkins (kh2@uiuc.edu)

Thu, 15 Mar 2007 - The meeting started at 7:12 PM. with 22 members in attendance.

President Rollins welcomed everyone to the meeting and then related the sad news of the passing of Jeff Stevenson, one of our founding members and CUCUG's first Treasurer. This prompted some reminiscing and Kevin Hisel told us a little about that very first meeting of 25 or 30 people back in October of 1983.

We then moved on to the Question and Answer Session.

Phil Wall had a drive question concerning BartPE and Drive2Drive. He wants to copying a CD sized image to a external USB drive. He was advised to go to UlitmateBootCD <http://www.UBCD4Win.com>.

Wayne Hamilton had a similar question about copying a C: drive. Richard recommended BartPE because it's free.

Wayne has an external USB drive that has switched itself from removable to fixed. He switched it back but then got some new hardware and it flipped from removable to fixed again. But, now he can't remember what he did to corrected the problem.

Joe Dewalt said his drive died and he had a question about what to replace it with. It was in an old Sony Vio desktop. It's on a PCI bus. People thought he was risking it to put two drives in it because of power supply issues. Richard Rollins talked about the new hybrid drives. Kevin Hisel talked about the freeware version of Mr. Mirror 1.3 <http://www.warpgear.com/index.php?f=downloads> he uses to back up his drives over his network.

Further discussing backing up hard drives or problem drives, Richard talked about Spinrite from GRC.com, which boots off of a CD, and the cloning software that comes with most any hard drive you buy.

DAZ3D.com, the owners of the old Bryce, are now giving away Mac and PC versions of Bryce 5.0 for free. You can get Bryce 6.0 for $30.

Russell Gillen had a Vista question about being denied access to the Shared folder from XP boxes.

With the questions winding down, Kevin Hisel conducted a Windows oriented prize giveaway. The winners drawn from a hat and their respective prizes were:

Norton Confidential - Russ Gillen
Internet Security 2007 - Ed Serbe
Norton AntiVirus 2007 - Emil Cobb who passed it on to George Krumins
Windows Vista Product guide - Richard Rollins
Small Thumb Drive - Joe DeWalt
Zoo Tycoon 2 game - David Noreen
transfer cable - Phil Wall
2 GiG thumb drive - Wayne Hamilton

David Noreen talked about the Beckman open house. He also spoke about a 3D cartridge.

Norris Hansell had a question about the business model of a company that builds stuff with too many holes for exploitation to be fixed. He said Steve Gibson is worried and very confident about his worries. The group talked about various Internet security issues.

The PC SIG: Jon Bjerke shows off Windows Vista

reported by Jon Bjerke

As a follow up to the demo, I'd like to include this website: <http://www.windowsvistatestdrive.com/>. You'll need to use IE, but you can login and play around with a Vista system or follow along with guided exercises and videos within Microsoft's environment.

The Macintosh SIG: Emil Cobb works with his camera and iChat

reported by Kevin Hopkins (kh2@uiuc.edu)

Emil played with his new camera and Keith Perigrines's machine using iChat.

ToC

March Board Meeting

reported by Kevin Hopkins (kh2@uiuc.edu)

The March meeting of the CUCUG executive board took place on Tuesday, March 27, 2007, at 7PM, at Kevin Hisel's house. (For anyone wishing to attend - which is encouraged, by the way - the address and phone number are both in the book). Present at the meeting were: Richard Rollins, Emil Cobb, Kevin Hopkins, and Kevin Hisel.

Richard Rollins: Richard said, "I'd like to thank Jon Bjerke for his Vista demo. I appreciate it. Kevin Hisel said the presentation was very nice and it confirmed his opinion that there is no reason to buy Vista. In the discussion that followed it was stated that the entire consumer side of Dell is now all Vista. If you buy a new machine you'll get it. Most of Vista's sales have been OEM sales. Home Premium and Ultimate have been most of the retal sales. Basic sucks.

Richard noted that the Q&A was very lively. He said he enjoyed the raffle. It was nice to have one again.

Emil Cobb: Emil said we had a good Mac SIG, too. He said Edwin Hadley may have something for next month. This meeting there were 22 in attendance.

Kevin Hopkins: Kevin advanced the idea of having a call list to personally contact those that have not renewed there membership. This was not met with enthusiasm. Several Board members said they'd be uncomfortable making such calls.

Kevin Hisel: Kevin noted the passing of the Amiga News Network. It shut down about a week ago. He then went on to discuss his new installation of Thunderbird.

ToC

The Back Page:

The CUCUG is a not-for-profit corporation, originally organized in 1983 to support and advance the knowledge of area Commodore computer users. We've grown since then, now supporting PC, Macintosh and Linux platforms.

Meetings are held the third Thursday of each month at 7:00 p.m. at the First Baptist Church of Champaign in Savoy. The FBC-CS is located at 1602 N. Prospect Avenue in Savoy, on the NE corner of Burwash and Prospect. To get to the the First Baptist Church from Champaign or Urbana, take Prospect Avenue south. Setting the trip meter in your car to zero at the corner of Kirby/Florida and Prospect in Champaign (Marathon station on the SW corner), you only go 1.6 miles south. Windsor will be at the one mile mark. The Savoy village sign (on the right) will be at the 1.4 mile mark. Burwash is at the 1.6 mile mark. The Windsor of Savoy retirement community is just to the south; Burwash Park is to the east. Turn east (left) on Burwash. The FBC-CS parking lot entrance is on the north (left) side of Burwash. Enter by the double doors at the eastern end of the building's south side. A map can be found on the CUCUG website at <http://www.cucug.org/meeting.html>. The First Baptist Church of Champaign is also on the web at <http://www.fbc-cs.org>.

Membership dues for individuals are $20 annually; prorated to $10 at mid year.

Our monthly newsletter, the Status Register, is delivered by email. All recent editions are available on our WWW site. To initiate a user group exchange, just send us your newsletter or contact our editor via email. As a matter of CUCUG policy, an exchange partner will be dropped after three months of no contact.

For further information, please attend the next meeting as our guest, or contact one of our officers (all at area code 217):

   President/WinSIG:   Richard Rollins      469-2616
   Vice-Pres/MacSIG:   Emil Cobb            398-0149
   Secretary/Editor:   Kevin Hopkins        356-5026
   Treasurer:          Richard Hall         344-8687
   Corp.Agent/Web:     Kevin Hisel          406-948-1999
   Linux SIG:          Allen Byrne          344-5311

Email us at <http://www.cucug.org/contact/index.html>, visit our web site at <http://www.cucug.org/>, or join in our online forums at <http://www.cucug.org/starship/> .

CUCUG
912 Stratford Drive
Champaign, IL
61821-4137

ToC