Categories
Opinion TechNews Bytes

Copyright Crackdown

In an attempt to further erode your rights and encroach on the realm of fair use, the music industry is sinking more money into preventing you from using your own music that you’ve bought and paid for the way you’d like to use it instead of sinking more money into finding oh, I don’t know, actual talent or new music that will invigorate their industry. A textbook example of an industry that has absolutely no problems with beating the dead horse that is their customer base (namely because that customer base simply won’t stand up for themselves and make a statement back at the music industry) has made another move indicating that they’ll either sue you, infringe on your rights, take your money, or perhaps all three, is now introducing new technology on music CDs that is designed to limit the number of copies of the CD you can make, and will get in the way of you putting your freshly bought tunes on your favorite mp3 player.

Yes, you heard me right-you bought the music, it’s yours-or is it? Not if the music industry has anything to say about it. They’re fighting tooth and nail to retain as much control over how you use the music as possible, what you do with it, how you listen to it, where you listen to it, and how, if at all, you share it with other listeners. Sony BMG and EMI are the first to introduce this technology (which isn’t specifically surprising in itself) and Sony’s technology specifically targets the iPod in order to limit your ability to rip your Sony-owned artist’s tunes to the ever-popular iPod, without specifically requesting a workaround from them. The usual arguments are already stirring; what is fair use, what rights do you have, how do you get around this technology (and it really is only a matter of time before its cracked), and more, but in reality this leads to a larger question-how far can the entertainment industry go on walking into your living room and telling you how to enjoy the product they sold you, and how much do you own it?

[ http://www.pcworld.com/news/article/0,aid,121949,pg,1,00.asp ]

Categories
Gear and Gadgets TechNews Bytes

Apple Releases the Mighty Mouse!

Here it comes to save the day! Mighty Mouse is on its way!

Okay seriously. Leave it to Apple to design and develop a mouse that has multiple buttons and a scroll ball but doesn’t actually have any buttons. It’s pretty sleek looking, don’t get me wrong, but seriously, they could have chosen a name other than Mighty Mouse. It just sounds…well…silly, and brings to mind images of the old cartoon. Oh well, maybe that’s what they wanted to do. Anyway, the new mouse features multibutton support (especially in the form of two buttons at the top of the mouse, finally giving Apple users the right-click that’s been long coded into the OS but languished as a hidden feature) and some other special features for the side buttons and the scroll ball. It’s pretty neat, but the $49 price tag is nothing to smile at-it’s not surprising since all of Apple’s keyboards and mice are expensive (Apple keyboard: $29, Apple wireless keyboard: $59, Apple mouse: $29, Apple wireless mouse: $59) and the Mighty Mouse was sure to fit in there somewhere. The Mighty Mouse is wired, and here’s to hoping it’ll start shipping with every new Mac. When it’s the default mouse for the Macintosh, then we’ll have a winner on our hands. I can’t imagine Apple doing anything else, though.

Check out the Mighty Mouse:
[ http://www.apple.com/mightymouse/ ]

Categories
Sites and Downloads TechNews Bytes

Wiping Apple Off The Map

An update to that tidbit yesterday; noticed on the first day of its launch, Microsoft Virtual Earth was noted strangely to not have Apple’s headquarters on the map at its Cupertino, California address. Astute observers noticed the on Google Earth, Apple’s headquarters, in all its overhead glory, was seated firmly where it should be, but on Virtual Earth there was nothing but a warehouse and an empty dirt lot.

I know, I know, Microsoft didn’t do anything insidious and remove Apple headquarters, they’re just using old satellite photos. Very, very old satellite photos. So old in fact that the World Trade Center is still standing in New York City, for example. But regardless, Wired News picked up on the story today and actually managed to get hold of a Microsoft spokesperson, who gave the predictably amusing reply:

[ http://www.wired.com/news/culture/0,1284,68308,00.html ]

Categories
Sites and Downloads TechNews Bytes

MSN Virtual Earth Deletes Apple HQ

So, if you didn’t notice, MSN unveiled Virtual Earth [ http://virtualearth.msn.com/ ], yet another step behind Google Maps-which has been all the rage for a while now-(it’s only a matter of time before they copycat again with some virtual earth globe thingy which emulates Google Earth) and Microsoft has made their first blunder…or offensive stab. Look up the address for Apple Headquarters, better known as 1 Infinite Loop, Cupertino, California, and on Google Earth you get this [ http://maps.google.com/maps?ll=37.332307,-122.030103&spn=0.005924,0.010131&t=k&hl=en ] and on MSN Virtual Earth you get this [ http://virtualearth.msn.com/default.aspx?ss=apple&cp=37.333411|-122.029708&style=h&lvl=17&v=1 ].

Aside from the quality of the two images being vastly different, and in my opinion Google’s being far superior(when’s that satellite footage from, Microsoft? 1972?), there’s one thing missing from the MSN Virtual Earth image. Apple Headquarters is missing. Yup, completely gone, not there, poof, kaput. But-we know it’s there, so where is it? Who knows, I’m waiting to hear what the PR folks at Microsoft manage to cook up to cover their butts this time, but whatever it is it’ll probably be a doozy.

The Guardian broke the hilarity-I mean the story, so check out their take:

[ http://www.theregister.co.uk/2005/07/25/msn_earth_deletes_aple/ ]

Categories
TechNews Bytes Tips and Tricks

Hacker Mitnick Advises on Security

Kevin Mitnick, perhaps one of the security world’s most famous convicted hackers, now spends much of his time consulting on matters of IT security for various institutions, and his message is clear, real, and while not old, definitely fresh for some ears. Social Engineering is a much greater threat than viruses, worms, and other software threats. While the software threats are ever present and ever changing, computers can be designed to protect against them, to see them coming, and to defend themselves, without the user having to know much more than how to install the preventative software. However, when it comes to social engineering, the human factor comes into play and only well-trained staff can stave off the wave of attacks performed that way.

I often joke with friends about how easy it would be to call someone who left a reciept in the gas pump before I pull up and pretend to be from their bank, verifying their personal information using only their name, a phone book, and the last four letters of their credit card, and how people should definitely be more careful with their personal information-everything from those pesky credit card applications you get in the mail to, of course, gas station and ATM reciepts-all of it can lead to identity theft if a talented and intelligent social engineer or hacker gets their hands on them. Kevin Mitnick, thankfully, agrees with me. He proposes that organizations create a “human firewall” of sorts, where red flags go up in people’s heads when the wrong questions are being asked out of the blue, or someone can’t provide the identity verification they need to, or when someone is asking questions they should probably know the answers to.

Social engineering isn’t just easy, it’s a significant threat. I read stories about someone walking in to an executive’s office one day, dressed well, and says he’s from IT and here to look at the “Outlook problem” he had been having. The executive, happy someone had come, didn’t even mention that he didn’t recall having a problem, but let the gentleman sit at his computer and begin working. A few minutes later, the man got up, told him “it should be better now,” and left with a keydrive full of the executive’s confidential corporate data. Whether the story is true or not, we can all see it happening easily, when we live in a world where many people can’t remember the names of their IT support staff much less their faces, or ubiquitously yield our information to anyone who asks because we assume authority. I don’t think anyone’s suggesting you stonewall the people who are there to help you, but be cautious about giving our your information, and if it feels wrong, dig a little deeper.

That’s my two cents, here’s PC World’s:

[ http://www.pcworld.com/news/article/0,aid,121922,tk,dn072205X,00.asp ]

Categories
Gear and Gadgets TechNews Bytes

Who Is Driving? Tiger Is Driving!

Or more appropriately, “Apple’s Tiger Drives A Car.” In this year’s DARPA (Defense Advanced Research Projects Agency) Grand Challenge, Team Banzai has developed a fully autonomous vehicle running on Mac OS X, version 10.4, more commonly known as “Tiger.” The logistics are actually spectacular, they used a VW Touareg controlled by PowerMac G5s that operate every aspect of the vehicle, from the gas and the brakes to the steering and the GPS navigation system. The event takes place this fall, but I’m already curious how their vehicle will perform in the qualifiers and hopefully the subsequent race.

[ http://www.pcworld.com/news/article/0,aid,121920,tk,dn072205X,00.asp ]

Categories
TechNews Bytes

Are Digital Music Fans Going Legit?

A British study this week revealed that online legal music downloads are spreading and growing at an incredible rate, moreso than illegal music downloads, which came as a shocker to researchers, and might be evidence that legal music downloads are actually filling the niche needed in the music market for the first time. Music industry lawyers have long decried legal downloads as a fluff option that won’t stop the “plague” of illegal downloads, and that only lawsuits are the way to resolve the problem, but perhaps now a little more evidence on the side of “give people a better option and they’ll take it” has accumulated.

Personally I think that legal music downloads are the way to go, and had this service appeared earlier and the music industry not fought tooth and nail to make them either go away altogether or prohibitively expensive, they wouldn’t be in the mess they’re in right now, with fans alienated and music buyers jaded and having to pay armies of lawyers, but I used to think they’d eventually smarten up. They haven’t yet, and while I can only hope this study might lend some strength to the argument, I doubt they will. Until the day they do, the rest of us can take joy in knowing that legal music downloads are popular among our peers, and probably going to grow and become more competitive in the future, which can only mean good things for you and I, the consumer.

[ http://www.pcworld.com/news/article/0,aid,121924,tk,dn072205X,00.asp ]

Categories
TechNews Bytes

Getting Help: Is Anybody Out There?

PCWorld did an experiment, a very good one, I might add. They went from website to website, taking 12 popular and frequently visited and used websites, and looked about for their “contact us” link or form, and then submitted a question. They then timed how long it took for that site to get back to them with a personalized reply specific to their question. Sites like Amazon, Google, MSN, eBay, and Craigslist were all subject to the litmus test, and to say that the results were surprising is an understatement. The results weren’t particularly flattering, and reveal that getting real help and attention when shopping or doing business on the web is still a long ways away from calling over a salesperson in a brick-and-mortar store, and that companies have a long way to go before they can claim to have effective and responsive online customer service and support.

Regardless, the results are in, and now you know who you’re on your own with and who you’re not-especially when some sites, like Amazon, for example, go to great lengths to hide their customer service telephone number from shoppers, and do everything in their power to make you surf a FAQ or set of help pages before even being able to consider contacting them. I’ve been on both sides of this equation before-you want to give people the tools to help themselves, and you want the signal-to-noise of the questions that get through to be pretty high, but often that means treading carefully on the line between good customer service and good customer education, and to these companies’ credit, it’s not an easy line to walk.

Here’s the results.

[ http://www.pcworld.com/news/article/0,aid,121869,tk,dn072105X,00.asp ]

Categories
TechNews Bytes

Microsoft Names New Operating System “Vista”

Looks like the new Windows operating system, up to this point referred to as “Longhorn,” its codename used by Microsoft developers, has been given an official marketing name. The new OS, due out sometime in 2006, will be dubbed and sold as Microsoft Windows Vista.

Not sure how I really feel about that, I mean, I had become so used to two-letter acronyms that identified the OS, you know, “2k” for Windows 2000, “ME” for Windows Millennium, “XP” for Windows XP, and so on. I know, I know, I’m nitpicking, but hey-marketing is a big part of it! Anyway, the new OS finally has a name and we can stop calling it “Longhorn,” which is fine by me.

You can read the press release here:
[ http://money.cnn.com/2005/07/22/technology/microsoft_vista/index.htm?cnn=yes ]

And see the newly unveiled Windows Vista website here:
[ http://www.microsoft.com/windowsvista/default.mspx ]

Categories
TechNews Bytes

Man Arrested for Accessing Wi-Fi Network

This could turn out to be an interesting case, although I’m sure it’ll probably just die quickly as all parties probably just want the commotion to end, but a Florida man was arrested under a little-known and little used statute forbidding people from accessing other peoples’ wireless networks without their permission.

It would have been one thing if the guy had broken the network’s WEP key and broken into the guy’s network, but this was an open, unencrypted network where the SSID was being broadcast all over the cul-de-sac. It’s raised some serious questions about the legality of using someone’s network when it’s wide open like that, and whether ignorance of how to secure a network is protected by the law; most technology analysts don’t believe so-if you decide to buy a wireless router and set up a wireless home network, it’s your responsibility to either leave it open and know what you’re doing, or learn how to close it and secure it properly. Unfortunately, wireless routers don’t come with security instructions. Read more:

[ http://www.pcworld.com/news/article/0,aid,121747,tk,dn070805X,00.asp ]

Categories
TechNews Bytes

File Sharing Services Can Be Sued, Says SCOTUS

If you haven’t been paying attention, yesterday the Supreme Court of the United States (SCOTUS) decided that file sharing services and companies that have been operating and encouraging their users to illegally share and download copyrighted material over their networks can be sued by the music and movie industry for “damages” caused by the users on their networks. The high court came to this decision 9 to 0; or unanimously.

A sad day for technology, and while usually I have a little faith in the Supreme Court to make decisions central to the people and the advance of the people’s goodwill, in this case I find that this is likely just another example of people making decisions about technology and the law without any knowledge of technology. I fear that this will stifle communications and collaboration technology and put so much fear into technology companies that as soon as their technology is discovered to have a remote, possible use that could run contrary to our Draconian copyright laws, the lawyers of the entertainment industry will descend and rip those companies to shreds. The only technology that’ll be allowed will be that approved by the industry; but that doesn’t mean we won’t see good technology (think iTunes, for example), it just means we’ll see a slowdown of innovation and more companies looking over their shoulder than looking at how they can improve their product or service their customers.

Regardless, that’s just my opinion; you can read more details of the decision and come up with your own! Wired has the scoop:

[ http://www.wired.com/news/digiwood/0,1412,68007,00.html?tw=newsletter_topstories_html ]

Categories
TechNews Bytes

Apple Switches to Intel Processors

On Sunday I woke up feeling lost, confused, betrayed, alone-and then I realized what happened. I checked my email and saw it there, first brought to me by the Wall Street Journal, and then later corroborated by other established media outlets, that Apple was making the grand switch to Intel chips to drive it’s Macintosh computer lineup. Now before you start cheering about being able to have MacOS on your home-built PC, know that while they might be using Intel’s chips, that doesn’t mean that the software will support x86 architecture.

At first, I thought the rumors were just rumors. I didn’t even mention or report them a while ago because the Apple moving to x86 rumors happen every year or so; so I wasn’t fooled, and neither was my man Leander Kahney, content editor for Wired News, as he says clearly:
[ http://wiredblogs.tripod.com/cultofmac/index.blog?entry_id=1111006 ]

I, for one, completely agreed with him. I thought it was the nail in the coffin and dismissed the rumors outright. But we were both wrong. Apple is indeed making the huge switch. I’m skeptical; every time Apple makes a huge architecture shift like this, they lose developers, customers, and support. But there is hope, and time will tell whether things will pan out for Apple and this grand endeavor. Read all about it:

[ http://www.nytimes.com/2005/06/06/technology/06apple.html? ]

It’s all true. And Leander, my trusty source of excellent Apple related commentary, points out why Apple is doing this and what hope there is for Apple; and I can tell that he, along with the rest of the Apple community (including myself) is meeting this new announcement with some skepticism about the future of Apple and it’s hardware development and lineup:
[ http://wiredblogs.tripod.com/cultofmac/index.blog?entry_id=1125226 ]

Categories
TechNews Bytes

Microsoft: New Netscape Breaks IE

Just what we all needed, the absolutely new Netscape 8 comes out, vulnerabilities are noticed out of the gate to which Netscape quickly and quietly patches to 8.1, and then Microsoft gets word of and publishes that Netscape-which allows a user to switch between the Firefox and Internet Explorer engines to view pages-breaks Internet Explorer in the process.

Why am I not surprised?

Seriously-Netscape has a proud, long tradition of breaking stuff, and in my frank opinion the last decent browser they produced was the Netscape Communicator 4.x series. Netscape 6 and up tended to be bloated, over-featured, slow, and buggy applications that were the dread of many IT professionals who were forced to deal with them. Regardless, getting back to point, the folks at AOL (who bought Netscape) have managed to put together a browser that breaks the XML rendering capabilities of Internet Explorer, which will render some websites completely unviewable in Internet Explorer as long as Netscape 8 is installed. Now normally I’m all about browser competition, as it can only mean more features and more functionality for users, but AOL’s official statement is absolutely wonderful:

“This issue affects a very small number of users who visit sites that require that advanced technology.”

That’s customer service for you. What? Problem? Well, it only affects people who USE that, duh! Meanwhile an official fix IS on the way. The new Netscape life cycle is off to an amusing, if not predictable, start.

[ http://www.pcworld.com/news/article/0,aid,121023,tk,dn052705X,00.asp ]

Categories
TechNews Bytes

Database Hackers Reveal Tactics

Admittedly these guys broke the law and should be prosceuted for it, but I have to admit a bit of sympathy for them. The teenage hackers responsible for the break-ins at LexisNexis and the theft of hundreds of thousands of social security numbers and other personally identifiable information confess their tactics and admit that, contrary to the assertions of federal authorities, they had no intention to sell the information or defraud the individuals whose information they obtained, they simply wanted bragging rights (common in the hacking and cracking community) and they wanted to see if they could do it.

Regardless, it’s very possible they’re just saying this now that they’re caught and wrapped up in a federal investigation, and they had ever nefarious intention when they actually had the information, or that the power and ability to get the information could have very well been enough lure to do something else illegal with the information, but regardless, I would definitely feel more than sympathetic for a few guys who were talented and curious beyond the limits of the law. But now that they are caught and being investigated and possibly facing criminal charges, they’re cooperating with authorities and showing them the methods they used to breach the security of data warehouses as tightly controlled as LexisNexis.

Wired news naturally has the much longer scoop, with incredible detail. Read all about it:
[ http://www.wired.com/news/business/0,1367,67629,00.html ]

Categories
Opinion TechNews Bytes

Ground Rules for the Windows-Macintosh War

Not my opinion this time, but I have to say that David Pogue does bring up some really amusing (and all too true) points with this article. I for one try to stay out of this particular battle altogether: I use a Macintosh at work (by choice, I have a PC available) and a PC at home (also by choice, I have an old powerbook I could use if I wanted to), so I tend to think that both PCs and Macintoshes are good for anyone who would want them and they’re equally good for most things, so there’s no point in debating at all. Pogue however, admits there’s a debate, and sets a few valuable ground rules for making the discussion as productive as it possibly can be.

Check it out:
[ http://www.nytimes.com/2005/05/26/technology/circuits/26POGUE-EMAIL.html ]

Categories
TechNews Bytes

Apple vs. TigerDirect; Winner: Apple

Remember that nonsense drummed up around the release of MacOS 10.4 where the horrible technology distributer TigerDirect [ http://www.tigerdirect.com/ ] filed suit against Apple over the use of the word “Tiger?” Yeah, we thought it was ridiculous, too, which is why we’re only making mention of it now: I mean, if TigerDirect actually had a case, they would have filed suit months ago, when the codename was originally published and not have waited for the week of the OS release, this making their case obviously a PR stunt. If TigerDirect put as much money and effort into resolving their complaints with the Better Business Bureau and their disgruntled customers, or into fixing their horribly tarnished image as a hack, late-night-infomercial, sells cruddy PCs at exorbitant prices image as they do into publicity stunts like this, then maybe they’d get some actual business.

But don’t just take my word for it, I got the scoop from MacBlog:
[ http://macblog.org/archives/2005/05/19/apple_vs_tigerdirect.php ]

And AppleInsider has the whole story:
[ http://www.appleinsider.com/article.php?id=1076 ]

Categories
TechNews Bytes

First Look: Tiger Lives Up to the Hype

Now that we’ve had our hands on Mac OS 10.4 “Tiger” for a while, it’s about time for the comprehensive reviews to start trickling in, and who has our first but the reliable folks at PCWorld? 4.5/5 stars, they give it, a must have for Mac owners, and well worth the upgrade, they conclude, but that’s not all they say-some in depth analysis of the new features, how some of the new features like Spotlight, iChat AV, RSS integration into Safari, and Dashboard will all change your Mac for the better, and a few oft overlooked features in the new OS that make a difference, like the addition of Automator (which is designed as kind of an AppleScript for the common man-which should help streamline your often repeated tasks) and stricter yet more comprehensive OS-based parental controls; something that Apple has long outdone Microsoft on.

Read the full review:
[ http://www.pcworld.com/reviews/article/0,aid,120646,tk,prx,00.asp ]

Categories
TechNews Bytes

Friday is Tiger-day, also Apple unveils new G5 Desktops

This is one heck of a week for Apple! First, Amazon leaks the specs for their new G5 desktops and Apple releases the things the next day, and Friday the 29th of April is the big release of MacOS 10.4, “Tiger,” Apple’s most recent revision to the Macintosh Operating System.

But should you upgrade? Are those new G5’s worth a look at the Apple Store? What’s so special about all of this stuff and why does Apple keep selling new OSes every year when Microsoft can make Windows XP and hang tough with it for years? Well, let’s take a look at those questions, shall we?

Don’t worry Apple, I know you guys have been in the habit of suing websites who give out classified information, so I assure you all ahead of time, no juicy bits here that other people either don’t know or just aren’t my personal opinion. And that’s what you all want anyway, right? Anyway-read all about it:

[ http://www.pleasanttingle.net/story/2005/4/28/1148/89609 ]

While we’re at it, the rumors are flying again as to whether Apple will release OS X for x86 architecture (meaning everyday PCs). The rumor is likely untrue, and even if it were true, it would be a nightmare for Apple regardless of what people think about it (oh but it’ll make it so much cheaper! It’ll open up a whole new market! Apple just hates its customers! ::stamp::) and there’s a million reasons why, but let’s look at a few from a piece I put together a while ago:

[ http://www.pleasanttingle.net/story/2003/6/30/104241/123 ]

Categories
Sites and Downloads TechNews Bytes

Google Feature Logs Users’ Histories

Oh Google, you so crazy! First it was a ton of extra space for GMail users, then it was Google Video, which started out as just a method to search the closed-captioning of television shows and is now accepting uploads from you, me, everyone else who might be interested in archiving their video with Google: [ http://video.google.com/ ] and more importantly WHY they want your video and how to get it to them: [ https://upload.video.google.com/ ]. Now, they’ve globalized your login and password that you use for GMail and renamed it your “Google Login,” which will act as your global authentication for all Google services.

Cool huh? Yeah-it wasn’t cool when Microsoft did it with Passport, but that was more because they tried to shove it down your throat for all MSN services and then some, and people tended to shy away from it. We’ll see if Google has better luck-I can see uses for a global Google login (customized deal searches across trusted sites on Froogle, for example) but getting back to point. The first step in Google’s mind, to making everyone log in to Google before using Google services is to allow you the opportunity to search your search history. Here’s the scenario: You Googled for some search terms that led you to a page a couple of days ago. You read it, used the info from it, and closed it. A couple of days later, someone asks you about the same thing-you’ve forgotten the web address so you can’t give the page to them. What do you do? Google again? But you forgot the exact search terms you used! Oh no! Well, Google comes to the rescue. If you logged in prior to making the search, you can look back through your search history (instead of having to dig through your browser history) to find that search and the page that resulted from it. Sounds cool, right? I think so. Read all about it:

[ http://www.pcworld.com/news/article/0,aid,120516,tk,dn042105X,00.asp ]

Categories
Sites and Downloads TechNews Bytes

GMail Users, Rejoice!

If you catch it in time, check out the GMail login page:
[ http://gmail.google.com/ ]

It looks like they’re turning 1 today, and as a reward, there are a few new features for everyone! First of all, everyone’s getting an extra gig of space! That’s right, now you’re up to 2GB! But wait-if you log in, you’ll see you definitely have more than 1GB, but less than 2GB. Why? Check out the login page-they’re increasing everyone’s space gradually and you can see how much space each person is getting as it increases on the front page! Watch those megabytes climb!

The best part is that it’s accurate, and here’s to hoping its not an April Fool’s joke!

The second new feature is rich-text formatting in GMail messages! For those of you who like being able to personalize your messages with color, fonts, large or small text, and all that jazz, you can finally do it and send it away with all your happy customizations! Give it a try. Can’t say I will, I’m a plain text kinda guy, but hey-I know a lot of people out there aren’t, so this is a good thing!

You can check out all of GMail’s recent improvements and more that’s on the horizon over here:
[ http://gmail.google.com/gmail/help/about_whatsnew.html ]

By the way, if you’re looking for Google’s April Fools gag, check it out here: A new product from Google (in beta):
[ http://www.google.com/googlegulp/ ]