*****************************************************
Edupage is a service of EDUCAUSE, a nonprofit association
whose mission is to advance higher education by promoting
the intelligent use of information technology.
*****************************************************

TOP STORIES FOR FRIDAY, NOVEMBER 01, 2002
  FBI Traces Attacks on Internet
  Recent Internet Attacks May Open Door for More
  Madster Ordered to Track Songs
AND
  12-Hour Rule Officially Dead
  Judge Accepts Microsoft Settlement
  Report Ranks Security of Operating Systems


FBI TRACES ATTACKS ON INTERNET
Last week's attacks on the Internet's root servers have been traced
to computers in the United States and Korea, according to a statement
from FBI Director Robert Mueller. The distributed denial of service
(DDOS) attacks targeted all 13 of the Internet's root servers,
disabling as many as 9 of them temporarily. Because they are home to
large numbers of computers and broadband access users, the United
States and Korea are common sources of DDOS attacks. Mueller offered no
details about the investigation or whether the FBI has identified any
suspects. Experts noted that even if the computers involved in the
attack could be identified, finding the people behind the attack is a
more difficult proposition because hackers are often able to gain
remote access to and control of others' computers.
IDG, 1 November 2002
http://www.idg.net/ic_961320_1794_9-10000.html

RECENT INTERNET ATTACKS MAY OPEN DOOR FOR MORE
Despite the failure of last week's attacks on the Internet's root and
name servers to significantly disrupt Internet activity, some experts
say that information gained from the attacks could improve attackers'
odds next time. Steve Gibson of Gibson Research Corp. said that
previously attackers didn't know how much bandwidth would cripple the
DNS servers. "Now," he said, "everybody knows." Jeffrey Schiller of the
Internet Engineering Task Force made similar comments, noting that with
new information, future attacks could prove much more difficult to
handle. Experts identified several measures, including
over-provisioning and supporting a variety of protocols, that can help
in defending against attacks.
Washington Post, 31 October 2002
http://www.washingtonpost.com/wp-dyn/articles/A47438-2002Oct31.html

MADSTER ORDERED TO TRACK SONGS
Several weeks after ruling that online file-swapping service Madster
violated copyright laws in the same way Napster did, U.S. District
Judge Marvin Aspen this week decided that the company must maintain a
list of songs currently available on its system. Madster was also
ordered to remove any copyrighted material from its network. Cary
Sherman, president of the Recording Industry Association of America,
said the ruling is a victory for copyright holders and those who want
"to see the legitimate online market grow." Johnny Deep, founder of
Madster, has previously said he does not know how his company will be
able to filter copyrighted material because everything moving through
Madster's network is encrypted.
Associated Press, 1 November 2002 (registration req'd)
http://www.nandotimes.com/technology/story/601627p-4656846c.html

AND
*****************************************************

12-HOUR RULE OFFICIALLY DEAD
The contentious 12-hour rule officially died today with a final
regulation from the U.S. Department of Education in the "Federal
Register." Distance education providers had long lobbied to change the
rule, which prevented many distance learners from qualifying for
federal financial aid. Replacing the 12-hour rule is the "one-day
rule," requiring at least one day of instruction per week, though "one
day" has never been clearly defined. The department's notice
concerning the change said that most who commented on the change
supported it and that none who opposed it suggested an alternative.
Chronicle of Higher Education, 1 November 2002
http://chronicle.com/free/2002/11/2002110101t.htm

JUDGE ACCEPTS MICROSOFT SETTLEMENT
On Friday U.S. District Judge Colleen Kollar-Kotelly approved most of
the provisions of the antitrust settlement between Microsoft and the
Justice Department. The decision means that the remaining states
involved in the case who thought the settlement too lenient will not be
able to pursue stricter sanctions. Among its provisions, the settlement
forbids Microsoft from restrictive deals that hurt competitors, allows
computer makers and users to remove icons for some Microsoft features,
and compels Microsoft to release certain technical data that developers
can use to write applications compatible with Microsoft's software.
Kollar-Kotelly said the sanctions will last five years unless the court
extends them.
Wall Street Journal, 1 November 2002 (sub. req'd)
http://online.wsj.com/article/0,,SB1036180232889262591,00.html

REPORT RANKS SECURITY OF OPERATING SYSTEMS
A new report from mi2g Ltd. ranks Apple Computer's Macintosh as among
the most secure operating systems, much less vulnerable to hackers,
worms, and viruses than either Microsoft or Linux operating systems.
The report is based on data from mi2g's Security Intelligence Products
and Systems database, which tracks information about computer
vulnerabilities. Of the 1,162 vulnerabilities discovered in the first
10 months of this year, more than 500 affected Windows, and more than
200 affected Linux. Fewer than 25 vulnerabilties were reported for
Macintosh and for each of two versions of UNIX. The report also noted
that the number of attacks on computers has risen sharply this year,
with worldwide economic losses from those attacks reaching $7.8
billion.
IDG, 31 October 2002
http://www.idg.net/ic_961134_1794_9-10000.html

*****************************************************
EDUPAGE INFORMATION

To subscribe, unsubscribe, or change your settings, visit
http://www.educause.edu/pub/edupage/edupage.html

Or, you can subscribe or unsubscribe by sending e-mail to
[EMAIL PROTECTED]
To SUBSCRIBE, in the body of the message type:
SUBSCRIBE Edupage YourFirstName YourLastName
To UNSUBSCRIBE, in the body of the message type:
SIGNOFF Edupage

If you have subscription problems, send e-mail to
[EMAIL PROTECTED]

For past issues of Edupage or information about translations
of Edupage into other languages, visit
http://www.educause.edu/pub/edupage/edupage.html

*****************************************************
OTHER EDUCAUSE PUBLICATIONS

EDUCAUSE publishes periodicals, including "EDUCAUSE Quarterly"
and "EDUCAUSE Review," books, and other materials dealing with
the impacts and implications of information technology in higher
education.

For information on EDUCAUSE publications see
http://www.educause.edu/pub/

*****************************************************
CONFERENCES

For information about EDUCAUSE conferences and other
professional development opportunities, visit
http://www.educause.edu/conference/

*****************************************************
COPYRIGHT

Edupage copyright (c) 2002, EDUCAUSE

Reply via email to