Archive for March 2004

Court supports gripe site

CircleID: Another Good Decision on Internet “Gripe Sites”:

Lucas Nursery and Landscaping v. Grosse, 2004 WL 403213 (6th Circuit March 5, 2004).
This case involves Lucas Nursery, a landscaping company in the suburbs of Detroit, Michigan, which apparently botched work done for Michelle Gross – or at least that was her opinion. But, when she established a web site to tell her story, Lucas sued her under the Anticybersquatting Consumer Protection Act (“ACPA”). She took the site down but Lucas persisted, taking her gesture as a sign of weaknesses and hoping to get some blood – or, perhaps, to send a message to other critics. But the trial judge decided she had not posted her web site with a bad faith intent to profit, and the United States Court of Appeals for the Sixth Circuit has now affirmed.

I sympathize with the plaintiff, though I like the predisposition toward freedom of speech.

Pranksters bedevil TV weather announcment system

SecurityFocus: Pranksters bedevil TV weather announcment system:

But once approved, the system allowed a business to change their name and the details of the closing through the website without any further human attention.

“They didn’t actually get in there or compromise any of our equipment… They just signed up as a legitimate business, and then changed their information half-an-hour later,” Schell says.

Invisible Word ink in SCO legal document

CNET News.com: Document shows SCO prepped lawsuit against BofA

[via Slashdot | MS Word File Reveals Changes to SCO’s Plans]

See also Justin Mason:

This seems as good a time as any to re-plug

find-hidden-word-text
, a quick perl hack to use ‘antiword’
to extract hidden text from MS Word documents in an automated
fashion, based on
Simon Byers’ paper Scalable Exploitation of, and Responses to Information
Leakage Through Hidden Data in Published Documents
. It works
well ;)

SCADA vs. the hackers

SCADA vs. The Hackers

The problem is that programmable logic controllers, digital control systems, and supervisory control and data acquisition, or SCADA, systems were never designed with security in mind.

“When companies designed control systems worldwide, there were always two unwritten assumptions,” said Weiss, who served as the technical lead for control system cybersecurity at the Electric Power Research Institute in Palo Alto, Calif., before joining KEMA. “Everyone assumed the system would be isolated, not connected to anything else. We also assumed that the only people who would use the control system were people who were supposed to use it. That was a good assumption for another day.”

[via John Robb]

Caller ID, Domain Keys, SPF

Larry Seltzer (eWeek) compares, contrasts, predicts
Who Will Win the SMTP Authentication Wars?:

This isn’t like three brands of bleach, where you’ve got the same chemicals in all three bottles. In fact, the more you look at these standards, the more different they look. I had been fearful that having three major standards competing would be discouraging to the market, since explaining even one of them isn’t easy. And consider that the three major mail providers in the United States—AOL, Yahoo! and Microsoft—are implementing the three different standards. I think, however, that the three, or at least two of them, could complement each other. The ideal solution may be all three, or some later standard that combines the features of two or three.

[via Christopher Allen]

UMich slows WiFi deployment