Saturday, May 15, 2004

How to Create A JavaScript Windows Interface - WebReference.com-:
"When windows first appeared on computer screens around the world it revolutionized the way programs interfaced with the user. Multiple programs could be run at the same time without much confusion. Even within a single program, multiple windows could be used to separate unrelated bits of information or data entry forms and much more."

http://www.webreference.com/programming/javascript/gr/column6/index.html
ZDNet: Printer Friendly - Search engines take the stand:
"Fifteen years after his trial, a convicted drug dealer in New York state belatedly got a chance to clear his name--thanks in part to an Internet search.

A federal judge last November threw out Manuel Rodriguez's conviction and granted him a new trial after discovering evidence of potential jury tampering in a review of court records and queries on Web search engine Google. U.S. Magistrate Judge Frank Maas said that his review of the 1988 court transcript, coupled with looking up jurors' names in Google, had revealed that the assistant district attorney had 'improperly' removed Hispanics.… "

Some judges call Web search a crucial research tool, but critics of the trend are warning that searches on Google and its rivals are no substitute for the painstaking process of evidence and testimony.

"A Google search that I conducted" suggested that a removed juror had "a Hispanic name," Maas wrote in the court decision overturning the conviction.

Rodriguez finished his sentence before his new trial could take place. But his case nevertheless offers a striking illustration of the growing clout of Internet search engines among the judiciary--a controversial trend that's so far garnered little attention outside legal circles.

In the United States and abroad, judges are turning to search engines such as Google to check facts, to look up information about companies embroiled in litigation, and to challenge statistics presented by attorneys in court. Dozens of judges have penned opinions describing Google as a valuable--and sometimes crucial--source of knowledge.

To be sure, Google has no monopoly in the legal system. Yahoo's search engine popped up in the landmark Napster copyright case four years ago, and Oregon police tried to track a criminal defendant accused of firearm violations through Yahoo searches. When AltaVista was in its heyday, it also was mentioned in a handful of cases.

But in the last few years, Google appears to have become the courts' favorite search engine. The Mountain View, Calif.-based company--which announced its plans for an initial public offering last month--accounts for 41 percent of U.S. search referrals, according to statistics compiled by research company WebSideStory.

In one case in Ohio, a judge who ordered a mother not to smoke near her 8-year-old daughter cited medical journals and a Google search that lists 60,000-plus links for "secondhand smoke" and 30,000-plus links for "secondhand smoke children." In addition, the California Supreme Court has Googled for evidence showing that stun belts, which jolt prisoners with 50,000-volt electric shocks, can be harmful and should not have been used in a criminal trial. And an enterprising federal judge in New York did his own Google search to demonstrate that a watch, jeans and handbag retailer named Alfredo Versace was infringing the trademarks of the famous Gianni Versace design house.

Some legal experts warn that Google searches are no substitute for the painstaking process of evidence and testimony. "If a judge is taking as proof facts that are reported in any public medium that pertain to individual actions by persons involved in a case, that is troubling," said George Fisher, a Stanford University law professor. "Those are the sorts of facts that are supposed to be proved in the courtroom under the rules of evidence."

http://zdnet.com.com/2102-1104_2-5211658.html?tag=printthis
DVD Rot, or Not?:
"The recent Associated Press story about insidious, disc-devouring 'rot' wasn't the first to hit the mainstream press. Major news outlets Worldwide have for years been publishing sensational reports that up to 20 percent of all mass-produced CDs and DVD-Video discs were slowly destroying themselves. But when an alarmed DVD industry investigated whether the problem was indeed as catastrophic as it appeared, it turned out that most reported incidents had actually been caused by improper disc handling and storage. Despite the latest round of headlines, true 'DVD Rot' today appears to be exceedingly rare. Users themselves are the greatest threat to the longevity of their DVD collections.

Most people think of DVDs as little more than high-capacity CDs, but though the two are very similar, DVDs have vulnerabilities that require particular care in their handling, storage, and cleaning. But with a bit of knowledge and effort, nearly all damage to DVDs can be prevented."

http://www.pcmag.com/print_article/0,1761,a=126783,00.asp
Wallon Worm Skirts Around Windows Patch Release:
"Wallon's infection process is complicated. Unlike the ordinary e-mail worm that arrives in an attachment to a message, Wallon appears as a link in a message to a Yahoo page. But with redirection, the Yahoo connection leads to another page that delivers an encrypted link to yet another page that delivers a special downloader application.

Microsoft provided a security patch for this vulnerability in April and suggested its application for all currently supported Windows versions. The company describes the update as 'critical' and recommends it for all Windows variants, starting with Windows 98, even for systems where Outlook Express is not the default e-mail reader. "

http://www.eweek.com/article2/0,1759,1591569,00.asp

Friday, May 14, 2004

Mac Trojan Set Loose—More to Come?:
"The first malicious Trojan for Mac OS X has been found in the wild, leading some to claim the platform may be on the verge of increased attention from virus writers."

The Trojan—dubbed AS.MW2004.Trojan by anti-virus company Intego—was first discovered by a reader of British Mac magazine MacWorld. It takes the form of a file purporting to be a version of the newly released Office 2004 for Mac and is available on download services such as LimeWire.

However, despite appearing with a legitimate-looking icon, the Trojan is in fact a simple AppleScript application that, when run, erases the contents of the user's Home folder. And, unlike the real release of Office 2004, the application is only 108KB in size.

http://www.eweek.com/article2/0,1759,1591850,00.asp?kc=ewnws051304dtx1k0000599
New Sasser variant indicates copycat - News - ZDNet:
"A teenager suspected of writing the Sasser code has been arrested by police in Germany. Since his arrest, two variants of the worm have been detected in the wild. The suspected author had confessed to German police that he had released the fifth version of the worm, Sasser.E, four days before he was taken into custody. Antivirus firms didn't detect the variant until the day after the arrest. The most recent, Sasser.F, was first detected Tuesday.

Luis Corrons, head of antivirus company Panda's research labs, said the Sasser.F worm's source code looks like it was written by an inexperienced programmer who has slightly modified the original code but had not added any new functions or behaviors.

'Studying the evolution of Sasser, the fact that variant F does not include any new features confirms that it is the work of a different person,' Corrons said. "

http://zdnet.com.com/2100-1105_2-5211114.html?tag=header.newsfeed
Microsoft Issues Single New Security Alert for May:
"Microsoft's security alerts for May were posted this afternoon. And the list was refreshingly short. The single new vulnerability revealed does allow for remote code execution by an attacker, but with many limitations on the attack, leading Microsoft to classify the problem as 'important.'

The problem is in the Windows Help and Support Center in Windows XP and Windows Server 2003. Windows 2000 and other earlier versions are not affected. The Help and Support Center is based on Internet Explorer components and uses a special protocol called HCP, also used by the Control Panel."

Such pages use an "hcp://" prefix, while normal Web pages use an "http://" prefix. The vulnerability is in the process that the Help and Support Center uses to validate the data from an HCP Web site.

The attacker would have to construct a malicious Web page and entice the user to visit it and click on a specific link. According to Microsoft's advisory on the issue, "After they click the link, they would be prompted to perform several actions. An attack could only occur after they performed these actions."

Certain very old versions of Outlook, lacking certain past security patches, also might allow the attack to be sent through an HTML e-mail. All versions of Outlook and Outlook Express for the past several years run HTML e-mails in the "restricted zone," which would make it much harder to exploit this vulnerability.

Microsoft released a patch for the vulnerability, which can be downloaded from the same page that contains the advisory describing the vulnerability. There are also workarounds available, including unregistering the HCP protocol. These are described in the advisory.

http://www.microsoft.com/technet/security/bulletin/MS04-015.mspx

http://www.eweek.com/article2/0,1759,1590651,00.asp?kc=ewnws051104dtx1k0000599

Thursday, May 13, 2004

Microsoft Security Bulletin MS04-015: Vulnerability in Help and Support Center Could Allow Remote Code Execution (840374):
"This update resolves a newly-discovered vulnerability. A remote code execution vulnerability exists in the Help and Support Center because of the way that it handles HCP URL validation. The vulnerability is documented in the Vulnerability Details section of this bulletin.

If a user is logged on with administrative privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.

Microsoft recommends that customers install the update at the earliest opportunity."

http://www.microsoft.com/technet/security/bulletin/ms04-015.mspx

Wednesday, May 12, 2004

Motherboards.org - The Elusive Zen of Motherboard Identification:
"It certainly may appear to the inexperienced that there is some 'black magic' involved in the art of motherboard identification but really it only involves patience, determination and a little common sense in most cases. There is no doubt that those of us that have some experience do have an advantage in the ability to recognise some common model numbers or bios strings and in knowing the location of certain resources but all this really does is make the search quicker.

80% of the requests for motherboard identification in this forum can be answered in a few seconds by doing a search using the information supplied by the poster and a good search engine such as www.google.com

This can be done by anyone, 'guru' or not."

http://www.motherboards.org/articlesd/how-to-guides/910_1.html