Mr Legoland Windsor sued over his Web site
9/3/2000; 9:49:36 PM 'The piss artist formerly known as Craig Cottrell has found himself on the end Danish toy company Lego's ire. It all started over a few beers with his mate. Inebriated, both of them decided to change their names by deed poll for a bet.'
And it goes downhill from there... love the ending of this article. BTW, despite the way that sounds, this is a true story from The Register.
Ain't no network strong enough
Misc.9/1/2000; 10:44:43 AM 'Master cryptographer Bruce Schneier's "Secrets and Lies" explains why computer security is an oxymoron.'His basic contention is that humans will always screw up, thus no (human-built) system will be secure. It's very hard to challenge that line of reasoning. The more real-world experience you have, the harder it gets to challenge.I'm going to be very contrary to what seems to be public opinion, and say I hope Bruce Schneier is correct. A system with perfect security also strongly implies a system with perfect control, which will presumably belong to a someone or a small group of someones. The price we would have to pay for systems with perfect security is too high, compared to a world where nothing is quite secure.On a lighter note, how will William Gibson's Neuromancer ever come to pass if there's perfect security?
Updated cookie-alert software released for IE 5.5
MS fumbles Word privacy scare
Privacy from Companies9/1/2000; 10:19:29 AM 'Microsoft was caught off-guard yesterday by a warning that Word documents could be tracked over the Internet without their readers' knowledge. 'A press release from a security consultant drew attention to the potential problem, by which embedded links to content on servers could be used to track the usage of documents as they're passed around multiple users on the Net. Richard M Smith pointed out that the embedded content could well be invisible to the user, who could find themselves being tracked without their knowledge.'This security 'flaw' will exist in any place that URLs can be used, thus, they may exist in HTML e-mail, Word documents, or even a Linux script file that calls wget (which retrieves something based on the URL) to retrieve some URL. It's a fundamental problem to our conception of Internet security, not just a flaw in Word. If it's a flaw in word, it's a flaw that's extremely common.The problem is that there is no good way to prevent this. If you are going to allow people to use URLs to refer to network documents, and you automatically retrieve these documents without making the user confirm each one individually (if even that would help!), then retrieving an empty graphic image or a null string or something else that will be invisible will be possible.Any "solution" to this problem will make Word work less well, as they are basically going to have to just remove the feature.(Yesterday's news. Sorry for the delay, but I had a really hard time getting through to ETP.com yesterday.)
|<- Future Posts||Past Posts ->|