November 16, 2001

I've re-released the MP3s on my music website under the Open Audio License.

I'll be putting up some new stuff soon, but right now Wander and Shake All Over are freely available for unlimited distribution.

November 15, 2001

Here's an eerie Flash animation of Michael Jackson's strange metamorphosis to his latest state.

A new tool lets parents mar classic films in the name of cleaning them up!

See this article by Gwendolyn Mariano for CNET Trilogy Studios to offer home censor kit.

Software maker Trilogy Studios said it plans to release a home "censorware" product that will cut scenes and language from DVDs to create PG versions of R-rated movies.
The company, which launched a new Web site last week, said it plans to unveil its Movie Mask DVD player by the first quarter of 2002. The software works on PCs and Microsoft's Xbox game console, telling the device to skip over specific frames in the film that portray violence, profanity or nudity. The company said the DVD remains unaffected, since the censorship instructions reside in the video playback device.
In addition to taking scenes out of a film, the software can be used to put more "wholesome" scenes in. While Movie Mask might cut the violent moments from the opening scene of Steven Spielberg's World War II epic "Saving Private Ryan," for example, it also lets parents add educational links to battle maps or a biography of Gen. Dwight D. Eisenhower.
"Choice is the main thing," said Breck Rice, chief revenue officer for Trilogy Studios. Trilogy wanted to "share some of the great Hollywood movies with...children but wanted to show it at a level that they could handle a little better."

A new e-mail tool that allows Lotus Notes and Domino users to retract unread e-mails from a person's inbox is most likely in violation of more than one of the U.K.'s surveillance and data protection laws.

See: E-mail retraction tool breaking laws?, by Wendy McAuliffe for ZDNet (UK).

The Office of the Information Commissioner has warned that the Demailer tool, announced by IBM/Lotus on Wednesday, could conflict with e-mail interception principles set out in the Regulation of Investigatory Powers Act 2000 (RIPA). The e-mail retraction utility is also in danger of infringing data processing guidelines contained within the Data Protection Act 1998, as the intended recipient will be unaware that an e-mail has been retrieved from their inbox.
"If the tool allows an individual to retrieve an e-mail from the server, that is not unreasonable," said David Clancy, assistant commissioner to the information commissioner. "But if it allows someone to retrieve an e-mail from beyond the server, when the e-mail is waiting in the inbox, we would see this as interception, which also has potential data protection issues."
The IBM/Lotus Demailer, developed by IT Simple, allows users of Lotus Domino Notes to retract e-mails within any organization, across any organization's domains, within private Domino intranets, and from Domino customers and suppliers through the Internet. The tool is designed for the retrieval of e-mails sent in error, without the receiver being informed. E-mail retraction has been a feature of some systems for years, but recent legislation may mean that such a tool is no longer legitimate for business purposes.

Citibank is going to offer its Web payment service for free in an attempt to give PayPal a run for its money.

See the story: Citibank to make Web payment service free, by Troy Wolverton for CNET

Neato. Check out the 802.11 Planet Conference going on in Santa Clara November 27-28, 2001.

Here's a great account by Neil McAllister of one of the most exciting sessions of last week's O'Reilly P2P and Web Services Conference: Michael R. Macedonia, Ph.D.'s Network-Centric Warfare.

Peering Into The Future -- The military contemplates network-centric warfare

The term "cyber warfare" gets thrown around every now and again. Most often, it comes attached to the fanciful notion of some virtual battleground of the near future, one where hackers are the foot soldiers, worms and viruses are the tools and dominance over the network is the ultimate military objective. It's an idea that owes more to Hollywood than to reality, however. In truth, bullets, bombs and control of all-too-real estate are likely to remain central to warfare for a long time to come.
That's not to say the US armed forces are letting the fruits of the Internet Age simply drop from the vine -- far from it. The military is among the first institutions to recognize the many contributions of the computing industry to solving real-world problems. So perhaps it shouldn't have come as a surprise when representatives of the armed forces came looking for ideas among a decidedly nonmilitary bunch: the geeks, hackers and codeheads attending last week's O'Reilly P2P and Web Services Conference in Washington, DC.

Here's a great piece by O'Reilly Weblog newcomer Bruce Epstein that parallels his daughter's new bus security requirements to the unseen etiquitte of P2P Networks:
Group formation in P2P networks.

November 13, 2001

Here's a healthy alternative to solitaire: Teletubbies.

November 12, 2001

Is it impolite to protect yourself and warn others about security vulnerabilities without first waiting 30 days to see if they can be patched? Or the other way around?

Or as AnchorDesk Editorial Director Patrick Houston put it: "MS to hackers: Shhh, can't we be a little more discreet?"

See the ZDNet article by Robert Lemos' : MS group to oversee hack reports.

The latest announcement has already sparked controversy: Russ Cooper, a software security expert and editor of security mailing list "NTBugTraq," published his own guidelines for an independent security group, called the Responsible Disclosure Forum. Cooper boycotted Microsoft's conference largely because he distrusts the software giant's motives.
For the most part, however, Cooper and Microsoft agree on the problems that fully disclosing software flaws can create.
"You either participate in the Responsible Disclosure Forum, or you're a black hat bent on being malicious. End of story," he wrote in the introduction to the guidelines. "Too much money, too many individuals and too much of the world's communication rely on responsible disclosure for it to be continued to be seen as a discussion worth debating."
The Microsoft-supported guidelines tentatively give software makers 30 days to patch their products after being informed of a flaw. They also require members to respond promptly to a report of a security hole and keep the original author advised of their progress.
"This is something we talked about 11 months ago (at a previous security conference) and we have some real traction now," Microsoft's Culp said.

More bad news: The plane wrecked into a residential area in the Rockaway section of Queens.

These photos taken from the same article referenced earlier today: - American Airlines jet crashes in New York - November 12, 2001

I had the best time last week at The O'Reilly P2P and Web Services Conference.

Here's the one weblog I've written so far covering the event: RIAA President Hilary Rosen Speaks to P2P Community .

I created an HTML version of her speech. (Which was quite an eye opener.)

More coverage on the way...

The Center for Disease Control (CDC) has issued its Considerations for Distinguishing Influenza-Like Illness from Inhalational Anthrax.

CDC has issued guidelines on the evaluation of persons with a history of exposure to Bacillus anthracis spores or who have an occupational or environmental risk for anthrax exposure (1). This notice describes the clinical evaluation of persons who are not known to be at increased risk for anthrax but who have symptoms of influenza-like illness (ILI). Clinicians evaluating persons with ILI should consider a combination of epidemiologic, clinical, and, if indicated, laboratory and radiographic test results to evaluate the likelihood that inhalational anthrax is the basis for ILI symptoms.

Some other good links are provided at the end of the report:

Additional information about anthrax is available at <> and < ttp://>. Additional information about influenza, RSV and other viral respiratory infections, and pneumococcal disease is available at <>, <>, <>, <>, and <>.

Here's a pretty vague account of how three journalists were killed in Afghanistan over the weekend: - Blame disputed in journalist killings - November 12, 2001

I'm trying to find a better account of the details of the situation. (Something better than "Those who managed to stay on the machine survived, those who jumped or fell died".)

The journalists -- two French, one German -- were killed Sunday when the Northern Alliance military convoy in which they were traveling was ambushed by Taliban troops, about 30 minutes outside of this northern town, near the city of Taloqan.
Those killed were part of a group of six journalists who were riding on the back of an armored personnel carrier with alliance forces going toward the front lines.
In an exclusive interview with CNN's Satinder Bindra, Northern Alliance Gen. Atiqullah Baryalai said those killed were "assassinated."
But Paul McGeough, a journalist for the Sydney Morning Herald, disagreed.
"I don't think they could have discerned that in the pitch dark, there were six journalists on top of this machine," said McGeough, one of the three journalists who survived.
He said Baryalai's claim was biased "spin" and noted that "it's funny how in war, people want to make the appalling more appalling."

Another plane tragedy in NYC (this time it appears to be an accident).

See: - American Airlines jet crashes in New York - November 12, 2001