Samsung developped 35cm-Deep CRT TV

Filed under: — Aviran Mordo

Samsung SDI Co, Ltd of Korea has developed a 32-inch cathode ray tube (CRT) only 35cm deep. The new CRT makes it possible to build a CRT TV only 38cm deep (see Fig). The 32-inch CRT TVs available on the market today are normally 50 to 60cm deep. While this new CRT would still be significantly thicker than the 10cm or so of plasma display panel (PDP) and LCD TVs, it would be on a par with the 40cm depth of most rear-projection units using digital micromirror devices (DMD) or similar technologies.

Samsung thin CRT TV

Samsung SDI plans to begin small-scale manufacturing at the end of 2004, shifting to volume production the following year. The technology used in the 32-inch design will also be adopted in other CRT sizes, and the firm’s entire CRT line-up is expected to be updated by 2006.

Hollywood lawsuits to target illegal file sharing

Filed under: — Aviran Mordo

The trade group that represents Hollywood’s major motion picture studios is expected to announce Thursday that it intends to file as many as 230 lawsuits in coming weeks against individuals who have illegally shared copyrighted movie files over the Internet, according to two people involved in the proceedings.

It would be the first time that the Motion Picture Association of America, which represents the major studios, including Warner Brothers Pictures, Sony Pictures Entertainment and Paramount Pictures, has sued individuals for sharing files, one of the people said. Potential targets of the lawsuits have not received warnings, the people said.

Rich Taylor, a spokesman for the MPAA, declined to comment on any action against file sharing that the organization might be considering. But the movie studios have tried to be more proactive recently in discouraging piracy, sponsoring classes in grade schools and running antipiracy messages in movie theaters.

The association has planned a news conference Thursday at which the association’s new chief executive, Dan Glickman, will disclose the movie industry’s plans, according to a news release distributed on Wednesday.

Source: News.com

Game makers hit with graphics patent violation suit

Filed under: — Aviran Mordo

A US legal firm specialising into corporate law is taking the world’s biggest computer games publishers to task over what it claims is the violation of a 1987 3D graphics patent.

The patent, number 4,734,690 is owned one-time printing and graphics specialist Tektronix and covers the display in 2D of a 3D image. It was filed in April 1987 and granted almost a year later.

The technique described is used by almost every game that uses 3D modelling, from the latest titles right back to the likes of Quake and possibly right back to Doom and even Wolfenstein - all products of the 1990s. It covers the use of a 3D space - the UAC HQ on Mars, say - to encompass one or more 3D objects - half a dozen Cacodeamons, say. The patent details how panning across the scene - sidestepping past a plasma bolt, say - can be realistically depicted on a 2D display, such as a computer monitor.

Given its ubiquity, the firm behind the suit, Dallas, Texas-based McKool Smith, has named all the big guns in the gaming industry, including Electronic Arts, Activision, Take Two, Ubisoft, Atari, THQ, Vivendi Universal, Sega, Square Enix, Tecmo, Lucasarts and Namco. Some smaller firms are also in line for action, apparently.

Prior art may yet come to their rescue. Early 3D games, such as The Colony and Spectre, released in the late 1980s, may just come in ahead of the 1987 filing. Early CAD and 3D graphics apps may also utilise the kind of process outlined in the patent, which doesn’t explicitly focus on games, though that’s clearly where the money is these days.

Source: The Register


Psst…now it’s Cisco source code up for sale

Filed under: — Aviran Mordo

The group of self-identified hackers has posted files online that it claims contains source code for Pix security firewall from Cisco Systems. The price for the proprietary software: $24,000.

“SCC is proud to announce the general availability of Cisco Pix 6.3.1 source code. This release is significant because Pix is vital to the security of many ultra-secure networks,” read a Google group posting marked as a Source Code Club newsletter.

It’s the second time this year that the Source Code Club has offered to sell proprietary software to the public. In July, it listed files purporting to contain Enterasys Networks’ Dragon intrusion detection system and Napster’s client and server software. In its newsletter posting, the group said the prices of that source code had been raised.

Source: News.com


Google Fixed Gmail exploit

Filed under: — Aviran Mordo

Google has fixed a flaw in its high-profile webmail service, Gmail, which created a possible route for hackers to gain full access hackers full access to a user’s email account simply by knowing their user name. Using a hex-encoded XSS link, the victim’s cookie file could have been stolen by a hacker, who might later use it to identify himself to Gmail as the original owner of an email account regardless of whether or not the password is subsequently changed.

China closes 1,600 cybercafes

Filed under: — Aviran Mordo

The Chinese government confirmed this weekend that it has closed 1,600 internet cafes and fined operators a total of 100m yuan ($12m) since March, when it began its crackdown on violent or pornographic content, and other material it considers harmful to public morality.

Government inspectors have checked up on 1.8m cafes since the campaign began, seeking out those letting kids play violent games or access subversive foreign sites. In addition to the 1,600 cafes that have been closed permanently, 18,000 have been shut down for “rectification”, according to reports.

Zhang Xinjian, deputy director of the Chinese Ministry of Culture’s market department said that “porn, gambling, violence and similar problems have adversely affected the healthy development of the Internet in China”.

The government said that since the summer 445 people have been arrested and 1,125 web sites have been shut down.


Google Plans Desktop Search Tool for Apple PCs

Filed under: — Aviran Mordo

Google Inc. plans to release a version of its desktop search tool for computers running on the Mac operating system from Apple Computer Inc. , Google chief executive Eric Schmidt said on Friday.

Schmidt did not set a timetable for a Mac version of Google Desktop, saying it had to be rebuilt from the ground up because of the fundamental differences between the Mac OS and Windows.

“We intend to do it,” Schmidt said at a University of California-Los Angeles conference commemorating the 35th anniversary of the Internet.

Google released the desktop tool earlier this month, staking out early ground in a battle for personal information retrieval that is expected to eventually include players like Microsoft Corp. and even Apple.

Gmail accounts ‘wide open to exploit’

Filed under: — Aviran Mordo

Google’s high profile webmail service, Gmail, is vulnerable to a security exploit that might allow hackers full access to a user’s email account simply by knowing the user name, according to reports.

The security flaw allows full access to users’ accounts, with no need of a password, Israeli news site Nana says . Using a hex-encoded XSS link, the victim’s cookie file can be stolen by a hacker, who can later use it to identify himself to Gmail as the original owner of an email account, regardless of whether or not the password is subsequently changed. Following up a tip from an Israeli hacker, journos from the site confirmed the attack and verified the exploit with local security firm Aladdin Knowledge Systems.


Tip: Use keywords in FireFox address bar

Filed under: — Aviran Mordo

All the users who are surfing the net have their own favorite sites. Usually you create a bookmark for the sites you visit the most. But as your list of site grows finding the right bookmark in the midst of dozens of bookmarks might not be as fast as you’d like.
Fortunately modern browsers allow you to assign a keyword to a site, and by typing the keyword in the address bar will take you to the site.

To assign a keyword in FireFox follow these steps.

1. Create a bookmark of your favorite site. (If it does not already exist).
2. Find the bookmark in the menu and right click on it
3. Select Properties.
4. In the properties window fill in the field “Keyword”.
5. Click OK.

Now every time you’ll type the keyword in the address bar the browser will take you to the site.


Flaws found in Windows-based media players

Filed under: — Aviran Mordo

Microsoft Windows users need to watch out for several flaws in non-Microsoft media players, security experts said.

Apple Computer and RealNetworks have both issued fixes for their Windows software to patch serious security vulnerabilities. Apple released Quicktime 6.5.2 on Wednesday to plug two holes in its Windows media player. On Tuesday RealNetworks advised users of its RealPlayer 10, RealPlayer 10.5 and RealOne Player software to use the “Check for Updates” feature to download the latest patch.

Source: News.com

AOL Files Lawsuit Against IM ‘Spim’

Filed under: — Aviran Mordo

America Online Inc. said Thursday it had filed a federal lawsuit accusing numerous unnamed defendants of violating federal and state laws by sending bulk messages known as “spim” to instant message accounts and Internet chat rooms.

The lawsuit, filed late Wednesday in federal court in Alexandria, Va., marked the first time AOL has expressly targeted spim in a legal action.

AOL and its Anti-Spam Alliance partners — EarthLink Inc., Microsoft Corp. and Yahoo Inc. also said Thursday that they had filed another series of lawsuits targeting spam, the bulk e-mail messages that can clog e-mail inboxes and annoy some users. The lawsuits were filed in courts in Georgia, Virginia, Washington and California.

New Caller I.D. spoofing site available to everyone

Filed under: — Aviran Mordo

Web-based caller I.D. spoofing is back, and this time it’s available to everyone.

A new website offer subscribers a simple Web interface to a caller I.D. spoofing system that lets them appear to be calling from any number they choose.

Called “Camophone,” the service functions much like the Star38.com site that struggled with an abortive launch last month: a user types in their phone number, the number they wish to call, and the number they’d like to wear as a disguise. The system instantly dials back and patches the call through with the properly-forged caller I.D.

Read full article at: Security Focus

Powered by WordPress