November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities.
Honestly, I haven't been incredibly impressed with Google Docs. The other day, a couple of friends and I tried to collaboratively edit a document, but each person would only think that one other person was editing the document, and the only way we could see each other's updates was to refresh the page. Furthermore, changes are only pushed out every 15 seconds from the Google server, making real-time collaboration difficult. If only Google Docs were more like Etherpad...
TFA even says that the worm can update itself, so how does BitDefender plan to distribute the worm if the worm can be updated to shut down everything that may harm it?
Yes, I did. That part would have been more interesting if they had provided more evidence of what they did, but it just seemed like a permissions issue (perhaps they had created the files as administrator and could not change it afterwards). However, this does not change the fact is that the first two arguments presented are worthless.
Seriously, what sort of conclusions does this "article" even make? They say that it is somehow Window's fault that their software stops working because a DLL is replaced, because you know, somehow programs are supposed to run after you change parts of them. Next thing you know, they'll blame Windows for breaking their graphics card after they deleted their graphics driver. As for programs modifying the firewall, that has been implemented since the Windows XP firewall at least. Run an iTunes install and you'll see all the exceptions that Apple puts into the firewall for their own software. Hell, perhaps we should blame Windows for letting the iTunes installer put Bonjour and Apple Updater and QuickTime on your computer as well? Clearly, they are allowing software vendors to put crapware on your machine!
TechForensics writes "A few days' testing of Windows 7 has already disclosed some draconian DRM, some of it unrelated to media files. A legitimate copy of Photoshop CS4 stopped functioning after we clobbered a nagging registration screen by replacing a DLL with a hacked version. With regard to media files, the days of capturing an audio program on your PC seem to be over (if the program originated on that PC). The inputs of your sound card are severely degraded in software if the card is also playing an audio program (tested here with Grooveshark). This may be the tip of the iceberg. Being in bed with the RIAA is bad enough, but locking your own files away from you is a tactic so outrageous it may kill the OS for many persons. Many users will not want to experiment with a second sound card or computer just to record from online sources, or boot up under a Linux that supports ntfs-3g just to control their files." Read on for more details of this user's findings.
Just managed to get worse? That's ignoring things like the Sony rootkit fiasco, right?
Actually, I believe Windows Vista fixed this vulnerability. To bad MS did such a poor job with UAC that a lot of people might end up catching this virus anyways.
Wikipedia says that the first worm spread through BSD UNIX. (1988):
The EU's issue with Microsoft is that it is limiting competition among web browsers by including IE with its product, so a removal of the GUI wrapper would probably be sufficient. Inclusion of the rendering engine won't do anything if you can't use it to browse the Internet in any reasonable fashion.
Do you honestly think that foreign intelligence agencies won't write Linux or Macintosh viruses if it would get them into the DoD network? The OS might be part of the problem, but users are the much bigger one.
Matt_dk writes "A team of internationally renowned astronomers and opticians may have found a way to make "unbelievably large" telescopes on the Moon. 'It's so simple,' says Ermanno F. Borra, physics professor at the Optics Laboratory of Laval University in Quebec, Canada. 'Isaac Newton knew that any liquid, if put into a shallow container and set spinning, naturally assumes a parabolic shape, the same shape needed by a telescope mirror to bring starlight to a focus. This could be the key to making a giant lunar observatory.'"
An anonymous reader writes "Over the past year I have traveled across the globe for work but I can't seem to find the right balance of technology to take with me. After reading a CNET article about tech for traveling, I'm still slightly undecided about what hardware suits me best. On the work side of things I need a laptop, nothing fancy but it can't be too heavy or slow. I also need a smart phone that can receive emails across the world and if possible a satellite navigation device, as I need to get to less-traveled locations on a regular basis. From a personal perspective I need my music but I don't care about video, so I'm looking for something with high-quality audio and great battery life. A compact camera wouldn't go amiss but dSLRs are too heavy for my needs and carrying strength, so something I can tuck in a pocket would be perfect. Any suggestions greatly appreciated."
BSDer (666) writes "An Israeli security researcher published a paper few hours ago, detailing attacks against Mac, OpenBSD and other BSD-style operating systems. The attacks, says Amit Klein from Trusteer enable DNS cache poisoning, IP level traffic analysis, host detection, O/S fingerprinting and in some cases even TCP blind data injection. The irony is that OpenBSD boasted their protection mechanism against those exact attacks when a similar attack against the BIND DNS server was disclosed by the same researcher mid 2007. It seems now that OpenBSD may need to revisit their code and their statements. According to the researcher, another affected party, Apple, refused to commit to any fix timelines. It would be interesting to see their reaction now that this paper is public."