8/4/2005

Microsoft Ships Word Doc Redaction Tool

Filed under: — Aviran Mordo

Microsoft Corp. has quietly released a redaction tool for Office Word 2003 to let users black out sections of confidential data from documents.

The security tool, available as a free download, plugs into Microsoft Office Word 2003 to offer a simple interface for marking sections of a document for redaction.

The tool runs on Windows 2000 Service Pack 3; Windows Server 2003 and Windows XP Service Pack 1.

The tool could come in useful for government departments and businesses worried about the leakage of sensitive documents and confidential legal information.

Source: eWeek

PlayStation 3 To Support Linux And OS X

Filed under: — Aviran Mordo

With its enormous processing power, the next generation PlayStation is more reminiscent of a super computer than a typical games console. The PS3’s piece de resistance is its new multi-core 3.2 GHz Cell processor. The Cell was developed jointly by IBM, Sony Group and Toshiba and is supported by a 256 megabyte XDR memory.

Accourding to Sony, the Cell processor enables an astonishing two teraflops of computing power will be able to support a variety of operating systems such as Linux or Apple’s Tiger.

Windows Vista targeted by virus writers

Filed under: — Aviran Mordo

Security experts are warning of a possible scripting virus ‘outbreak’ when the OS formerly known as Longhorn finally ships

Virus writers have published what are thought to be the first examples of malicious code targeting Microsoft’s Windows Vista operating system, around a week after the first beta of the next-generation operating system was released.

Five proof-of-concept viruses that target Monad, the next version of Microsoft’s command prompt, were included in a recently published virus writing magazine, according to Mikko Hyppönen, the director of antivirus research at F-Secure.

Source: ZDNet

Reputation System Fights P2P Junk

Filed under: — Aviran Mordo

Many of the files that are shared on p2p networks tend to be junk. Organizations such as the RIAA and music labels regularly pollute these networks with nonsense files masquerading as real music/video files. These junk files make it difficult for users to find what they want on such p2p networks. Some researchers at Cornell University have developed a reputation system called Credence, that works on the Gnutella network, allowing users to tell the good files from the bad ones.

Source: Slashdot

Yahoo Tests New Audio Search Feature

Filed under: — Aviran Mordo

Yahoo Inc. on Thursday will begin testing a new search engine feature that will pore through millions of songs offered by popular Internet music services like iTunes, Rhapsody and Napster.

The free service, available at http://audio.search.yahoo.com , boasts an index of more than 50 million audio files, including newscasts, speeches and interviews posted online, as well as the Internet’s deepening pool of “podcasts” - recordings made to be played on a computer or digital device like Apple Computer Inc.’s iPod player. The index identifies the content by reading information - known as “metadata” - embedded in the files.

Other Internet search engines, such as America Online’s Singing Fish and Blinkx, already find audio files, but Yahoo is touting its as the most comprehensive, largely because it has received permission to index downloadable songs offered by virtually all of the Internet’s top music services.

Source: AP

Worm hole found in Windows 2000

Filed under: — Aviran Mordo

A serious flaw has been discovered in a core component of Windows 2000, with no possible work-around until it gets fixed, a security company said.

The vulnerability in Microsoft’s operating system could enable remote intruders to enter a PC via its Internet Protocol address, Marc Maiffret, chief hacking officer at eEye Digital Security, said on Wednesday. As no action on the part of the computer user is required, the flaw could easily be exploited to create a worm attack, he noted.

What may be particularly problematic with this unpatched security hole is that a work-around is unlikely, he said.

“You can’t turn this (vulnerable) component off,” Maiffret said. “It’s always on. You can’t disable it. You can’t uninstall.”

Source: ZDNet

Powered by WordPress