Firefox add-on shows Chinese perspective

With the help of a Firefox add-on, Internet users outside of China can now experience the censored view of the Web provided by the Chinese government to its residents. Replicating China’s Golden Shield Project, the China Channel add-on uses the SwitchProxy Tool to connect users to Internet proxies inside China and gives them Chinese IP addresses. The software creators have posted a video to demonstrate their new tool. (Information Week)

Fibre Channel over Ethernet draws criticism

Fibre Channel over Ethernet (FCoE), a draft specification for carrying Fibre Channel frames over 10 Gbit-per-second Ethernet networks, elicited skeptical reactions from storage administrators at the Storage Networking World Europe show this month, according to reports. Storage area network vendors tout the specification because it needs only a single network card instead of two. But critics say that FCoE is likely to appeal only to existing Fibre Channel customers, its cost is prohibitive, and many organizations would need new network cabling. (InfoWorld)

Hash functions fall under Fourth Amendment search law, court says

A US District Court has ruled that hash functions constitute a search under the Fourth Amendment, possibly making it illegal for authorities to use hash analysis on hard drives without a warrant, according to an Ars Technica report. The case, USA v. Robert Ellsworth Crist, involves a Pennsylvania man who was discovered to have child pornography on his computer by authorities after they ran an MD5 hash algorithm on his imaged hard drive, despite the fact that he had reported the computer stolen. The decision is likely to be appealed, partly because it might have left some questions unanswered – one law professor noted that the court did specify what part of the investigation was a search. “Is the creation of the hash a search?” George Washington University professor Orin Kerr wrote on his blog. “Is running a query that matches the hashes to known hashes and produces a positive hit a search? It might also break down based on how much the government saw of the machine while the hashes were being made: Perhaps the search occurred when the file structure was revealed to the officers.” (Ars Technica)

Researchers run exploit using good code

Malware isn’t necessary to exploit vulnerabilities in applications. Instead, attackers can use “return-oriented programming” to make good code automatically do malicious things, according to research by two graduate students from the University of California,-San Diego. Erik Buchanan and Ryan Roemer, who presented their findings at ACM’s Conference on Communications and Computer Security this week, discovered that they could extract instructions from regular code and group them into “gadgets” that carry out attacks. “You can create any kind of malicious program you can imagine — Turing complete functionality,” said UC San Diego computer science professor Stefan Shacham, who co-authored the report. Because many security measures are based on identifying good or bad code, the findings could force changes in how flaws are handled. (Dark Reading)

Yahoo goes open source

Yahoo introduced its Open Strategy on Wednesday, exposing its data and tools in an effort to let developers build Yahoo applications. The company envisions developers tapping into its social networks via an authentication service, then building applications that make use of those connections. “Basically, we’re letting developers centralize anything you do on the Web as an update on our platform – with your explicit permission, of course,” Yahoo senior vice president Jay Rossiter said. “Publishers love this because they get exposed to more visitors whose friends implicitly recommend their content.” (Computerworld)

Code of conduct established to protect free speech online

Google, Yahoo, and Microsoft are leading a new program to help companies and organizations protect online privacy and free expression. Called the Global Network Initiative, the program includes guidelines from technology companies, human rights organizations, and academic institutions. But according to The New York Times, critics say the venture doesn’t have enough behind it. “After two years of effort, they have ended up with so little,” Morton Sklar, executive director of the World Organization for Human Rights USA, told the Times. “It is really very little more than a broad statement of support for a general principle without any concrete backup mechanism to ensure that the guidelines will be followed.” (The New York Times)

Word to the Web: Microsoft to take Office suite online

Microsoft plans to release a Web version of its popular Office suite, offering scaled-down versions of Word, Excel, PowerPoint, and OneNote when the next Office version is released late next year. The company made the announcement Tuesday at its Professional Developers Conference in Los Angeles, calling it “software plus services.” Microsoft senior vice president Chris Capossela said the company is hoping to attract professionals such as doctors and factory workers, who don’t work in traditional desktop environments. “We’ve done incredibly well with Office 2007. At the same time, Windows has 1 billion users. Office has only 500 million,” he said. (Computerworld)

Settlement allows Google to post out-of-print books

Google has agreed to pay US$125 million to settle a lawsuit against its Book Search program, which  scans  out-of-print books and posts them online, opening the door for a massive digital library and providing incentive for copyright holders to claim royalties. As part of the settlement, Google will back the Book Rights Registry, a nonprofit organization managed by authors and publishers that represents copyright holders. Google said that the settlement will effectively expand the market for thousands of older books that otherwise wouldn’t be available, including “orphan books,” which have no known copyright holder. (Wired)

Cyberattacks thrive in economic crisis

The global economic crisis is a boon for cybercriminals, who have adjusted their techniques to prey on anyone affected by the economy, according to a Dark Reading report. Some phishing attacks have used the recent wave of bank closures as lures, including a site that posed as the Better Business Bureau. Security company Finjan reported finding servers with stolen data roughly five or six times a month, a threefold increase in the past two months. (Dark Reading)

Facebook, YouTube give IT headaches

The proliferation of Web 2.0 in the workplace has had an adverse affect on IT departments, which must contend with more malware and viruses, according to a report by FaceTime Communications. While email is the most common use of work time for personal purposes – 97 percent of surveyed users said they had checked personal e-mail – social media sites such as LinkedIn, Facebook, and YouTube trailed not far behind at 82 percent. Meanwhile, IT managers who saw an increase in social networking reported handling an average of 34 Internet-related attacks per month, taking an average 22 hours to fix and costing up to US$50,000. Workplaces that had no increased usage in the same six-month period had only 22 or 23 incidents per month, taking roughly half the time and cost to fix. (Dark Reading)

Showing 3,651 - 3,660 of 4,530 results.
Items per Page 10
of 453