May 7, 2002, 4:34 pm
EDS bans IM. Viral risk avoidance [The Register]
May 3, 2002, 9:07 am
NewsBytes:
Hackers Continue ‘Early Warning’ Attacks On U.S. Web Sites
A team of hackers, cutting a wide swath of Web-site defacements across the country in what they say is the interests of national security, added servers from Sandia National Laboratories, the U.S. Geological Survey (USGS) and the National Institute of Standards and Technology (NIST) to a list of conquests today.
But the team that calls itself the “Deceptive Duo” continues to shy away from requests that they reveal the security holes they claim open “critical infrastructure” to attacks by America’s foes.
May 2, 2002, 3:02 pm
IBM developerWorks:
Using JSSE for secure socket communication
The JDK 1.4 Java Secure Socket Extension is easy enough to use — once you understand all the steps necessary for the initial setup and configuration. In this tutorial Greg Travis offers cookbook-style instructions for creating and installing JSSE encryption keys in a client/server application environment. Upon completion of this tutorial, you will know how to easily convert any existing client/server application to use encryption, as well as how to create a secure application from scratch.
May 2, 2002, 2:57 pm
IBM developerWorks:
Data binding with Castor
XML data binding for Java is a powerful alternative to XML document models for applications concerned mainly with the data content of documents. In this article, enterprise Java expert Dennis Sosnoski introduces data binding and discusses what makes it so appealing. He then shows readers how to handle increasingly complex documents using the open source Castor framework for Java data binding.
April 30, 2002, 1:54 pm
NY Times: Fun With Your Zip Program. “Using little more than the zipping programs found on most personal computers, [Italian scientists] can easily distinguish between texts written in 10 different languages and almost unfailingly tell which of a large group of texts were written by the same author.” …
“The scientists performed a further test of their technique by analyzing a single text that has been translated into many different languages in this case the Universal Declaration of Human Rights. The researchers used their method to measure the linguistic “distance” between more than 50 translations of this document. From these distances, they constructed a family tree of languages that is virtually identical to the one constructed by linguists. “
[Scripting News]
April 28, 2002, 7:54 am
AP via NY Times (April 25, 2002):
China Incapable of Hacking US Files
The Chinese military is seeking to develop the ability to disrupt Taiwanese and U.S. computer systems, but doesn’t have the sophistication to cause widespread problems, U.S. officials said Thursday.
…
“These are … not people from the government,” the official said. “For the most part, it’s students who are doing this during school breaks.”