***************************************************** Edupage is a service of EDUCAUSE, a nonprofit association whose mission is to advance higher education by promoting the intelligent use of information technology. *****************************************************
TOP STORIES FOR FRIDAY, NOVEMBER 01, 2002 FBI Traces Attacks on Internet Recent Internet Attacks May Open Door for More Madster Ordered to Track Songs AND 12-Hour Rule Officially Dead Judge Accepts Microsoft Settlement Report Ranks Security of Operating Systems FBI TRACES ATTACKS ON INTERNET Last week's attacks on the Internet's root servers have been traced to computers in the United States and Korea, according to a statement from FBI Director Robert Mueller. The distributed denial of service (DDOS) attacks targeted all 13 of the Internet's root servers, disabling as many as 9 of them temporarily. Because they are home to large numbers of computers and broadband access users, the United States and Korea are common sources of DDOS attacks. Mueller offered no details about the investigation or whether the FBI has identified any suspects. Experts noted that even if the computers involved in the attack could be identified, finding the people behind the attack is a more difficult proposition because hackers are often able to gain remote access to and control of others' computers. IDG, 1 November 2002 http://www.idg.net/ic_961320_1794_9-10000.html RECENT INTERNET ATTACKS MAY OPEN DOOR FOR MORE Despite the failure of last week's attacks on the Internet's root and name servers to significantly disrupt Internet activity, some experts say that information gained from the attacks could improve attackers' odds next time. Steve Gibson of Gibson Research Corp. said that previously attackers didn't know how much bandwidth would cripple the DNS servers. "Now," he said, "everybody knows." Jeffrey Schiller of the Internet Engineering Task Force made similar comments, noting that with new information, future attacks could prove much more difficult to handle. Experts identified several measures, including over-provisioning and supporting a variety of protocols, that can help in defending against attacks. Washington Post, 31 October 2002 http://www.washingtonpost.com/wp-dyn/articles/A47438-2002Oct31.html MADSTER ORDERED TO TRACK SONGS Several weeks after ruling that online file-swapping service Madster violated copyright laws in the same way Napster did, U.S. District Judge Marvin Aspen this week decided that the company must maintain a list of songs currently available on its system. Madster was also ordered to remove any copyrighted material from its network. Cary Sherman, president of the Recording Industry Association of America, said the ruling is a victory for copyright holders and those who want "to see the legitimate online market grow." Johnny Deep, founder of Madster, has previously said he does not know how his company will be able to filter copyrighted material because everything moving through Madster's network is encrypted. Associated Press, 1 November 2002 (registration req'd) http://www.nandotimes.com/technology/story/601627p-4656846c.html AND ***************************************************** 12-HOUR RULE OFFICIALLY DEAD The contentious 12-hour rule officially died today with a final regulation from the U.S. Department of Education in the "Federal Register." Distance education providers had long lobbied to change the rule, which prevented many distance learners from qualifying for federal financial aid. Replacing the 12-hour rule is the "one-day rule," requiring at least one day of instruction per week, though "one day" has never been clearly defined. The department's notice concerning the change said that most who commented on the change supported it and that none who opposed it suggested an alternative. Chronicle of Higher Education, 1 November 2002 http://chronicle.com/free/2002/11/2002110101t.htm JUDGE ACCEPTS MICROSOFT SETTLEMENT On Friday U.S. District Judge Colleen Kollar-Kotelly approved most of the provisions of the antitrust settlement between Microsoft and the Justice Department. The decision means that the remaining states involved in the case who thought the settlement too lenient will not be able to pursue stricter sanctions. Among its provisions, the settlement forbids Microsoft from restrictive deals that hurt competitors, allows computer makers and users to remove icons for some Microsoft features, and compels Microsoft to release certain technical data that developers can use to write applications compatible with Microsoft's software. Kollar-Kotelly said the sanctions will last five years unless the court extends them. Wall Street Journal, 1 November 2002 (sub. req'd) http://online.wsj.com/article/0,,SB1036180232889262591,00.html REPORT RANKS SECURITY OF OPERATING SYSTEMS A new report from mi2g Ltd. ranks Apple Computer's Macintosh as among the most secure operating systems, much less vulnerable to hackers, worms, and viruses than either Microsoft or Linux operating systems. The report is based on data from mi2g's Security Intelligence Products and Systems database, which tracks information about computer vulnerabilities. Of the 1,162 vulnerabilities discovered in the first 10 months of this year, more than 500 affected Windows, and more than 200 affected Linux. Fewer than 25 vulnerabilties were reported for Macintosh and for each of two versions of UNIX. The report also noted that the number of attacks on computers has risen sharply this year, with worldwide economic losses from those attacks reaching $7.8 billion. IDG, 31 October 2002 http://www.idg.net/ic_961134_1794_9-10000.html ***************************************************** EDUPAGE INFORMATION To subscribe, unsubscribe, or change your settings, visit http://www.educause.edu/pub/edupage/edupage.html Or, you can subscribe or unsubscribe by sending e-mail to [EMAIL PROTECTED] To SUBSCRIBE, in the body of the message type: SUBSCRIBE Edupage YourFirstName YourLastName To UNSUBSCRIBE, in the body of the message type: SIGNOFF Edupage If you have subscription problems, send e-mail to [EMAIL PROTECTED] For past issues of Edupage or information about translations of Edupage into other languages, visit http://www.educause.edu/pub/edupage/edupage.html ***************************************************** OTHER EDUCAUSE PUBLICATIONS EDUCAUSE publishes periodicals, including "EDUCAUSE Quarterly" and "EDUCAUSE Review," books, and other materials dealing with the impacts and implications of information technology in higher education. For information on EDUCAUSE publications see http://www.educause.edu/pub/ ***************************************************** CONFERENCES For information about EDUCAUSE conferences and other professional development opportunities, visit http://www.educause.edu/conference/ ***************************************************** COPYRIGHT Edupage copyright (c) 2002, EDUCAUSE
