Identifying Where Technology Logging and Monitoring and Increased Security End and Violations of Personal Privacy and Student Records Begin

EDS bans IM

EDS bans IM. Viral risk avoidance [The Register]

The Computer Virus of the Future

StarOffice to eat MS share (probably)

Hackers Continue ‘Early Warning’ Attacks On U.S. Web Sites

NewsBytes:

Hackers Continue ‘Early Warning’ Attacks On U.S. Web Sites

A team of hackers, cutting a wide swath of Web-site defacements across the country in what they say is the interests of national security, added servers from Sandia National Laboratories, the U.S. Geological Survey (USGS) and the National Institute of Standards and Technology (NIST) to a list of conquests today.

But the team that calls itself the “Deceptive Duo” continues to shy away from requests that they reveal the security holes they claim open “critical infrastructure” to attacks by America’s foes.

Using JSSE for secure socket communication

IBM developerWorks:
Using JSSE for secure socket communication
The JDK 1.4 Java Secure Socket Extension is easy enough to use — once you understand all the steps necessary for the initial setup and configuration. In this tutorial Greg Travis offers cookbook-style instructions for creating and installing JSSE encryption keys in a client/server application environment. Upon completion of this tutorial, you will know how to easily convert any existing client/server application to use encryption, as well as how to create a secure application from scratch.

Data binding with Castor

IBM developerWorks:
Data binding with Castor
XML data binding for Java is a powerful alternative to XML document models for applications concerned mainly with the data content of documents. In this article, enterprise Java expert Dennis Sosnoski introduces data binding and discusses what makes it so appealing. He then shows readers how to handle increasingly complex documents using the open source Castor framework for Java data binding.

WinAmp bug opens door to MP3 viruses

WinAmp bug opens door to MP3 viruses. Interactive Week Apr 30 2002 9:22AM ET [Moreover – Tech latest]

Fun With Your Zip Program

NY Times: Fun With Your Zip Program. “Using little more than the zipping programs found on most personal computers, [Italian scientists] can easily distinguish between texts written in 10 different languages and almost unfailingly tell which of a large group of texts were written by the same author.” …
“The scientists performed a further test of their technique by analyzing a single text that has been translated into many different languages — in this case the Universal Declaration of Human Rights. The researchers used their method to measure the linguistic “distance” between more than 50 translations of this document. From these distances, they constructed a family tree of languages that is virtually identical to the one constructed by linguists. “
[Scripting News]

China Incapable of Hacking US Files

AP via NY Times (April 25, 2002):

China Incapable of Hacking US Files

The Chinese military is seeking to develop the ability to disrupt Taiwanese and U.S. computer systems, but doesn’t have the sophistication to cause widespread problems, U.S. officials said Thursday.


“These are … not people from the government,” the official said. “For the most part, it’s students who are doing this during school breaks.”