Thursday, March 31, 2005

NC Department of Crime Control and Public Safety:

AMBER Alert Cancelled for Two Georgia Children
The AMBER Alert issued in North Carolina this morning for two missing Georgia children has been cancelled. The Clayton County Police Department in Georgia has advised North Carolina authorities that the children have been recovered safely.

A Guide to Small Claims Court

Choosing A Complaint Form
Before you file your lawsuit, you must fill out a complaint form. The clerk of court has different complaint forms for different kinds of problems. The three most commonly used forms are:

* Complaint for Money Owed*
* Complaint to Recover Possession of Personal Property
* Complaint in Summary Ejectment (used by landlords).

* [The Complaint for Money Owed is described in detail in
the next section.]

If you want to get back some property which is in dispute, you should use the Complaint to Recover Possession of Personal Property. On that form, you as the plaintiff must say if you are a "secured party" or not. A secured party is usually a finance company or other institution of some sort rather than an individual. If you have a written statement that you may repossess property if payments are not made according to an agreed upon schedule, then you are a secured party.

Landlords use the Complaint in Summary Ejectment form to collect back rent or evict tenants. This form is fairly complicated to understand both for landlords (the plaintiffs) and tenants (the defendants).

If none of the standard forms suits your exact situation, you may write your own complaint. Be sure to state what your claim is and include the type of information.

How to Fill Out "Complaint for Money Owed" FORM

* Step 1. If you are filing the suit, put your correct full name as plaintiff, with your address and telephone number, if any. You must include the name of your county.

* Step 2. Put the person's full name being sued as defendant, with the address and telephone number, if any, and the county where the person lives.

If you are suing a business, you must find out if it is a corporation or not. If the business is a corporation, you list the correct name of the corporation as the defendant. Your complaint and summons must go to the "registered agent" of the corporation, or to an officer, director, or managing agent of the corporation. If the business is not a corporation, you list the owners of the business as the defendants. For more explanation of businesses as defendants, see the appendix.
* Step 3. List the name and address of your attorney, if you have one. If you don’t have an attorney, leave this blank.
* Step 4. List the county where you are bringing this lawsuit.
* Step 5. After "Principal Amount Owed," put the exact amount of money which you claim the defendant owes you. If you are claiming interest on this money, put that amount on the next line. Add the two figures to get the "Total Amount Owed."
* Step 6. In the sample complaint form, note the choices of boxes the plaintiff may use. You can check a box and fill in the information on the line next to the box. Or you can check "other" and describe the purpose of your suit.
* Step 7. Sign and date the complaint. If you have a lawyer, he or she may sign it.

Wednesday, March 30, 2005

American copyright law got Charles Dickens down

On Tuesday, the Supreme Court heard arguments in MGM v. Grokster, a case that pits music and movie companies against Grokster and StreamCast. Both companies have made programs that let users share files online, including copyrighted music, movies, and TV shows.

At issue: whether the companies that make such programs should be held accountable when people use them to infringe someone else's copyright. Many in Hollywood say "yes." Many in Silicon Valley say "no." We say, "time to take a look at the history of copyright."


Today's Knowledge
Copyright Noticed



Ever since William Caxton sold England's first printed books in the 15th century, laws have been passed to regulate publishing rights. But the first publishing laws had as much to do with the crown's rights to censor ideas and collect revenues as with the rights of authors or publishers.

In fact, in the old days, authors hardly had any rights at all. Booksellers who published original works enjoyed what amounted to perpetual monopolies over them. The booksellers, not the authors, could even pass exclusive rights to profitable original works down to their heirs.

Queen Anne's Authorial Rights

That remained the case in England until the Statute of Queen Anne went into effect in 1710. This landmark act, the first full-fledged copyright act in the English-speaking world, said that authors should own the copyrights on their creations.

The statute also established that copyrights should expire after a certain period--in most cases, 14 years, with a one-time-only option to renew for a second 14-year term. That limitation helped create the public domain, the collection of creative works that have passed out of copyright and are now free for all to use and distribute.

The Colonies' Copyright Theft

The Statute of Queen Anne protected authors in Great Britain, but not in America. During the 18th century, American booksellers regularly sold British writers' works without permission (the wily Benjamin Franklin was one prominent offender). Still, America's founders clearly took copyright seriously. Article 1 of the U.S. Constitution says Congress can "promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries."

The United States passed its first major copyright law in 1790, but it protected only native authors. During the 19th century, American publishers continued to sell thousands of copies of British books without permission--and without ever having to pay their authors or legitimate publishers a penny.

Hugely popular British writers like Walter Scott, Benjamin Disraeli, and Charles Dickens tore their hair out in frustration as cheap pirated editions of their novels flooded the American market. Dickens protested against such piracy when he visited America in 1842, but many Americans didn't want to hear it. Piracy meant cheap British books.

The League of Copyrighted Nations

Eventually, the need for international copyright agreements became clear, and in 1886-87 a group of nations signed the Berne Convention for the Protection of Literary and Artistic Works. Each country agreed to extend its domestic copyright protections to any author from any of the other signing countries. One notable holdout was the United States, which didn't join until 1988 (though it worked out bilateral agreements with many nations years earlier).

The U.S. Congress passed the Copyright Act of 1976, which established the basic term of protection as the life of the author plus 50 years. In 1992, copyright renewal was made automatic, which prevented the copyright on many works protected before 1978 from expiring. In 1998, the term of protection was extended again--to the author's life plus 70 years, unless the work was made for hire or was anonymous or pseudonymous, in which case it was protected for 95 years after its publication.

Why so many extensions? For one thing, the heirs of early-20th-century authors--like, say, Walt Disney--aren't anxious to see their copyrights expire. Nor do they want to see their intellectual property shared at the click of a mouse.

Jeffery Vail
March 30, 2005

Want to learn more?
Browse a timeline of copyright history
http://arl.cni.org/info/frn/copy/timeline.html






KnowledgeNews.Net * 110 West Main Street * Urbana, Illinois 61801 * USA

Questions? Comments? Suggestions? Write to us at info@knowledgenews.net.
We read every note and answer as quickly as possible.

Toshiba's New Battery Recharges In One Minute

Toshiba announces a new lithium-ion battery -- the type used in virtually all laptops -- that recharges 60 times faster than current batteries.

TechWeb News



Toshiba on Tuesday announced a new lithium-ion battery -- the type used in virtually all laptops -- that recharges 60 times faster than current batteries and loses less than one percent of its capacity after 1,000 recharges.

The new battery can be refilled to 80 percent of capacity in one minute, Toshiba claimed, significantly less time than the one-to-four hours needed for lithium-ion batteries now in use.

According to Toshiba, the secret's in the negative electrode. "Nano-particles prevent organic liquid electrolytes from reducing during battery recharging," said Toshiba in a statement. "The nano-particles quickly absorb and store vast amount of lithium ions, without causing any deterioration in the electrode."

The Japanese technology giant said that it expected to put the new batteries into play in 2006, initially in automotive and industrial applications. One use, Toshiba said, would be within hybrid vehicles, which store power generated when, for instance, the car decelerates.

Toshiba said it would move the new batteries into consumer electronics applications, such as laptops and cameras, at a later date.

Wednesday, March 23, 2005

Experts Fear Drive-by Computer Viruses

Scripps Howard News Service

By LANCE GAY

Wednesday, March 23, 2005



Security News Home





Until a year ago, the concept that someone could infect a computer while just passing by seemed like a pipe dream.

Today, it's the digital age's nightmare.

Following the appearance of viruses that infect cell phones from a distance, security experts wonder if computers running home digital television sets, burglar alarms or even global positioning systems could be similarly infected and disabled.



Alfred Huger, senior director of engineering at the security software firm Symantec, said he expects in the future that someone just walking through a house with an infected cell phone could pass viruses to home computers or any other device with a wireless connection.



"I think we are looking at threats crossing platforms," said Huger.



Huger said the appearance of cell-phone viruses that can be transmitted through wireless connections were only theoretical until a year ago, when a version of the Cabir virus turned up on two cell phones displayed behind glass windows in a California cell-phone store.



The exact method of infection isn't known, but it's suspected that a passerby transferred the infected viruses through a wireless connection.



Huger said the first generations of the virus were innocuous, but the virus writers released their computer source codes on the Internet, providing vital information to other virus writers. Other versions are appearing that keep cell-phone connections active to run down the battery and run up fees. "The first version was Cabir-A, and we're already up to Cabir-T," he said.



Some experts predict that if cell phone virus writers follow the same pattern as the writers of worms and viruses did with personal computers, the innocuous viruses will soon be followed with malicious versions that do damage; not far behind would be viruses that operate like spyware on computers to steal information.

read more »

Page Hijack: The 302 Exploit, Redirects and Google

302 Exploit: How somebody else's page can appear instead of your page in the search engines.

By Claus Schmidt.


Abstract:
An explanation of the page hijack exploit using 302 server redirects. This exploit allows any webmaster to have his own "virtual pages" rank for terms that pages belonging to another webmaster used to rank for. Successfully employed, this technique will allow the offending webmaster ("the hijacker") to displace the pages of the "target" in the Search Engine Results Pages ("SERPS"), and hence (a) cause search engine traffic to the target website to vanish, and/or (b) further redirect traffic to any other page of choice. more »

Tuesday, March 22, 2005

Public Library of Science:

(PLoS) is a non-profit organization of scientists and physicians committed to making the world's scientific and medical literature a freely available public resource.


The internet and electronic publishing enable the creation of public libraries of science containing the full text and data of any published research article, available free of charge to anyone, anywhere in the world.


Immediate unrestricted access to scientific ideas, methods, results, and conclusions will speed the progress of science and medicine, and will more directly bring the benefits of research to the public. more »

Tuesday, March 15, 2005

HP Jornada 540 Pocket PC

» Solve a problem
Having a problem with your product? Find your solution here.


» Software & Driver downloads
Looking for software & driver updates? Download available software & drivers here.


» Setup and install
Connect, install or verify installation of your product.


» How to use
Enhance your product's performance with details on how to use and maintain.


» Product information
Get product specifications, warranty, supplies, parts and accessories.


» Manuals
Download your product's user documentation.


» FAQs
Frequently asked questions regarding your product

BlackBerry 7520

Trade-in your old handheld and get $100 back. Combine with the $100 mail-in rebate for a total savings of $200!


Features


Wireless Access to Email

• Always on, office email while you're mobile. Receive and answer email from the BlackBerry 7520 handheld wirelessly. Microsoft Outlook, IBM Lotus Notes and ISP/POP3 email capable.

Monday, March 14, 2005

Ga. Woman Held Hostage Describes Ordeal

By DANIEL YEE


ATLANTA (AP) - For hours, Ashley Smith gently talked to the armed suspect in Atlanta's courthouse slayings, turning from hostage to confidant as they discussed God, family, pancakes and the massive manhunt going on outside her apartment.


``I believe God brought him to my door,'' Smith said Sunday, only hours after her 911 call ended a manhunt for Brian Nichols, who is accused of shooting four people since Friday.


Over the course of the night, Nichols untied Smith, and some of the fear lessened as they talked. Nichols told Smith he felt like ``he was already dead,'' but Smith urged him to consider the fact that he was still alive a ``miracle.''

Saturday, March 12, 2005

Important Tax Information


W-2 Information

Effective September 17, 2003, all current myPay active/reserve military users and Defense Finance and Accounting Service (DFAS) civilian employees who request or already have a myPay Personal Identification Number (PIN) and access myPay are consenting to receive only an electronic W-2. They may, however, elect to receive a hardcopy W-2. All other Department of Defense (DoD) civilian employees who use MyPay may elect to receive an electronic W-2 in lieu of a hardcopy W-2 through the MyPay system. Click here for more information.

Tuesday, March 08, 2005

eBay: Learning Center: Selling:

First time seller on eBay? The courses below will get you up and running in no time. You'll learn how to create a sellers account, list an item, accept online payments and keep track of all your selling activity on your own My eBay page.

28.02.2005 / Eugene Spafford, Purdue University:

Some experts including Bill Gates believe that spam can be eradicated in a couple of years. What are your thoughts?





Spafford: I think it can be reduced with some effort, but I do not see how it can be eliminated without also eliminating e-mail, or radically changing the way we run the Internet. Spam is, in part, subjective – what is spam to one person may be a great idea to another. Thus, there will always be some people who actually want some of it!





The biggest problem with spam right now is that the spammers refuse to abide by some procedure that will let users opt out of getting it. The fraud used in sending spam – both deceptive titles and hijack of machines – compounds the problem. If we can cut down on the fraudulent use of servers, and impose some really strong authentication on the advertisements that remain, then perhaps we can control spam ... but it is doubtful we will be able to eliminate it completely in only a few years.




This problem is so large and complex, it was named as one of the CRA Grand Challenges. Those four challenges are:




* Eliminate epidemic-style attacks – worms, viruses, spam, phishing and denial of service attacks.




* Discover how to design and build large-scale, distributed computing systems that must be highly reliable even in the face of probable attack. Examples include medical health records, law enforcement databases, and financial system computing.


* Develop quantitative cyber risk measurement techniques to a point at least the equal of current quantitative financial risk measurement techniques. This will allow us to compare security solutions, measure risk appropriately, and invest the right amounts into protection of our cyber assets.




* Develop mechanisms to allow computing users to set their own levels of data protection and privacy in understandable, repeatable, and reliable manners. Thus, we want each person to be able to interact with systems in a way that allows them to choose how much information to entrust to the systems, and at what level to protect it.

Those interfaces should be understandable and simple to use.

Cybercrime-Hacking

Title: Cyber-vigilantes go after scammers

Source: Silicon.com

Date Written: 2005-02-11

Date Collected: 2005-02-14

The 419 Flash Mob, an Internet vigilante group, started attacking fake banking websites February 9, 2005. A statement by Artists Against 419, who supports the 419 Flash Mob, said their aim was to shut down eight such websites within 48 hours using denial-of- service (DoS) attacks in celebration of the Chinese New Year. Many of the attacked websites were hosted by the same service provider in China, and included Abbey Trust & Offshore Bank, First Global Trust, Allied Trust Bank UK, Crystal Bonds & Securities, Allied Trust Bank UK, KASH BANK CORPORATION, and Liberty Stronghold Securities and Finance.


Title: Businesses targeted by ID "hijack" scam

Source: Silicon.com

Date Written: 2005-02-14

Date Collected: 2005-02-14

Online fraud prevention firm Early Warning has discovered a scam targeting British companies through the Companies House database. In this scam, an attacker changes the address of the registered office for a limited company--all that is needed is the current address and the business's registered company number, both of which can be found in an internet search. Once the address is changed, attackers can open trade accounts and order goods in the company's name. Businesses only discover the identity theft when debt collectors and lawsuits appear to recover fraudulently ordered goods. Companies House is working with the Home Office and the Metropolitan Police to address the emerging problem. In the meantime, companies can protect themselves by filing documents electronically through the Proof system, subscribing to the Companies House monitoring service, and periodically confirming registered details.

HOMELAND SECURITY POLICY INSTITUTE GROUP

The moderator of Tactical@yahoogroups.com recently posted an email alert to several egroups. This alert was an issued by the U.S. Attorney General’s Office. This email expressed a new level of concern re an impending al-Qaeda (aQ) attack between now and Inauguration Day. This email has been circulating for the last two weeks. Other intel sources have been quick to point out this alert is not based on any new info/intel. A recent report by Bill Gertz in the Washington Times has much the same information.


While this threat assessment is very real, these alerts never really say what we should be alert for. What are the potential targets in California? Are there any relationships to the Inland Empire? Who is the enemy and the ideology that drives it? How is the enemy organized and what are its operational tactics? What are activities and behaviors that might tip the existence of an aQ cell? Further the traditional law enforcement paradigm is ill-equipped to counter this new threat. We are the domestic boots on the ground.

Al-Qaeda seen planning for 'spectacular' attack




Become a member and help us get the word out

Jerusalem Post May 6, 2004

Virtual jihad

How serious is cyber-terror's threat, and what is the free world doing about it?


In-Depth Coverage


By Alan D. Abbey


Islamic terrorists are winning the on-line war against Western interests because of their virtually unchecked ability to use the Internet to plan, promote, and propagate both physical and cyber attacks.


Efforts to monitor, predict, and counter such attacks are only in the earliest stages. Technical, legal, privacy, and even political challenges are slowing down what could be called cyber counterterrorism in Israel and the US. Private groups have done much of what little successful monitoring has been done so far, as government efforts, particularly in the US, have been hampered by civil liberties concerns.

9-11 News and Legal Resources, Information and Related Services

Terrorism and Homeland Security


Compiled and Edited By: Sabrina I. Pacifici, Editor, Publisher, Web Manager, LLRX.com


See LLRX Newstand for additional daily news updates

Security Tightening Ahead of Eid in Malaysia, Indonesia

By Kazi Mahmood, IOL Southeast Asia Correspondent

Kuala Lumpur, November 24 (IslamOnline) - Security in several countries in South East Asia (SEA) is tightening ahead of the Eid el Fitri festivals that start at the end of the holy month of Ramadhan in December. Indonesia, Malaysia and Brunei have already stepped up routine patrols with more police forces on the streets than usual.

In Jakarta, the police are currently carrying out unusual raids in night spots and streets where foreigners would gather in a bid to deter night clubs, bars and other alcohol vendors to carry out their business during the month of Ramadhan.

Emergency Response Resource Directory:

This directory provides a comprehensive list of vendors, products and services to the emergency response community and is published directly to the following web sites.

High Tech "NewsBits"

UK Net pedo jailed for eight years A UK man, inappropriately named Lawrence Horn, has been jailed for eight years after trying to seduce a 14-year-old boy in an Internet chatroom. The 14-year-old was in fact detective Mark Bucci from Philadelphia in the States who was working under the pseudonymn Justin. Mr Horn, 35 from near Ashford in Kent, held numerous conversations with "Justin" which became increasingly sexually graphic. http://www.theregister.co.uk/content/6/22447.html


Taliban opposition site a casualty of war A Web site operated by opponents of Afghanistan's Taliban regime will likely remain offline for at least another month after hackers took it out of commission in an apparent case of mistaken identity. Visitors sent about 10,000 hate messages soon after the Sept. 11 terrorism strikes, and hackers brought down the ``AfghanGovernment.org'' site within days. http://www.siliconvalley.com/docs/news/tech/011931.htm

Hacking Incident Closes Security News Site The day before Marquis Grove decided to shutter his popular computer security news site, the operator of SecurityNewsPortal.com was brimming with energy about his labor of love. "I have a large viewership and I feel I owe them a responsibility to be there and keep slamming out the freshest news that I can to keep them amused and informed," said Grove in an e-mail interview Monday. http://www.newsbytes.com/news/01/171478.html


Bin Laden worm wriggling in South Korea A computer virus named after Osama bin Laden, the Saudi-born fugitive accused of masterminding the attacks on the United States, has surfaced in South Korea, a local antivirus software maker said Wednesday. "We received a report from a personal computer user who got an e-mail containing the virus, "Jin Yoon-jung of antivirus company Ahnlab told Reuters. "His computer was not infected, as he reported it to us without opening the e-mail.
http://news.cnet.com/news/0-1003-200-7641111.htmlRead More

UGN Security: Tech News

Google takes 'beta' off desktop search Spammers adopt slippery tactics to bypass ISP defences US Not Quite Ready for High Tech Cell Phones Antivirus Application Could Spread Viruses .US Domain Owners to Lose Anonymity Court Orders Microsoft Retrial – Waives Fine UK Police Want Special Internet Porn Unit Earthlink Announces Flash-Based Webmail Israeli Army Issues Video Screens to Troops New Online Magazine From al-Qaeda's Iraqi Wing Sony PSP to Top iPod as Must-Have in 2005 Judge dismisses spam conviction Sony offers pizza feature for hungry gamers Opera beefs up browser to thwart phishers Jef Raskin, Macintosh Creator, Died Sunday

Tech Law Journal Daily E-Mail Alert

Sen. John Edwards (D-NC), another member of the Subcommittee, also participated in the hearing. He is the sponsor of his own cyber security bills: S 1900, the Cyberterrorism Preparedness Act of 2002, and S 1901, the Cybersecurity Research and Education Act of 2002. S 1900 would authorize the appropriation of $70 Million in FY 2003 for grants to be administered by the National Institute of Standards and Technology (NIST) "to support the development of appropriate cyber security best practices, support long term cyber security research and development, and perform functions relating to such activities." S 1901 would authorize appropriations for a cyber security graduate fellowship program, and other educational programs.

Congressional Record: January 9, 2003 (Senate)

By Mr. DASCHLE (for himself, Mr. Leahy, Mr. Biden, Mr. Kennedy,
Mr. Schumer, Mr. Durbin, Mrs. Clinton, Mrs. Murray, Mr. Dayton,
Mr. Corzine, and Mr. Reed):

S. 22. A bill to enhance domestic security, and for other purposes;
to the Committee on the Judiciary.
Mr. LEAHY. Mr. President, I am pleased today to join Senator Daschle
and other Democratic Senators in introducing the Justice Enhancement
and Domestic Security Act of 2003. This comprehensive crime bill builds
on prior Democratic crime initiatives, including the landmark Violent
Crime Control and Law Enforcement Act of 1994, that worked to bring the
crime rate down.
This year marked an unfortunate turn after a decade of remarkable
declines in the Nation's crime rate. The decade of progress we made
under the leadership of a Democratic President helped revitalize our
cities and restore a sense of security for millions of Americans.
According to the latest FBI report, however, the number of murders,
rapes, robberies, assaults, and property crimes is up across the United
States in all regions of the country except the Northeast, the first
year-to-year increase since 1991. This upswing has been fueled by the
faltering economy and high unemployment rates. The President's ill-
conceived tax cut in 2001, along with the new cuts he proposes now, are
likely to exacerbate these economic woes by plunging us deeper into
deficit spending.Read More

Homeland Security Information

Links to various homeland securty related web sites where the
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.

SatCom Systems - Government and Homeland Securty:

SatCom Systems develops and provides critical communication solutions for First Responders and Incident Command Operations in Homeland Defense - available today and ready for the future.


The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.


First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »

Monstrous Homeland Securty - Lawyer's Boon and Citizen's DOOM!

By Harsha Sankar


From: WETHEPEOPLE_UNITED@yahoogroups.com

Dear Citizen, December 2002



It is the utmost hope for the sake of next generations that Americans now realize their freedoms have irrevocably been harmed in 2002. Due to the passage of the monstrous Homeland Security Act, the average American can expect the following.


Every credit card purchase, every magazine subscription, every medical prescription, every visited Web site, every e-mail, every academic grade, every bank deposit,and even every booked trip Will Be Recorded. All these transactions and communications will go into a vast database of the Defense Department. This once far-fetched Orweillan scenario is now reality.


The Information Awareness Office will now have the data-mining power to "snoop" on all Americans.Two hundred million dollars have been appropriated to create computer dossiers on all citizens. This Act, along with the U.S.A. Patriotic Act, has officially marked the end of Constitution's 4th Amendment. Since all matters now filter through the judiciary, the official inauguration of the police state will be a boon to the bar associations cult.Read More

Homeland Securty abandons MS for Linux

The United States Department of Homeland Security ( www.dhs.gov )
changed its servers over to Oracle on Linux last week, after running
on Windows 2000 for several months. Experts say that it is unlikely the
change is a reaction to "Slammer," the MS SQL server worm that rocked
the Internet last week. "

Defense tech debated

BY Frank Tiboni

Published on March 04, 2005



Congress will scrutinize the Defense Department's $30.1 billion budget request for military information technology spending for fiscal 2006 by questioning redundancy in the services' warfighting IT systems.


DOD IT officials requested $7.4 billion for command, control, communications and computer systems next year — a $1 billion increase from what they received last year. Lawmakers think troops could better communicate and access intelligence in Iraq and Afghanistan if they consolidated them.

On Line for Independent Inventors (24FEB2005)

This is a transcript of the on-line chat held on Thursday, February 24, 2005.

This final version is an edited version of the actual transcript. Where you see “edited answer” below, the original on-line chat answer has been modified to ensure completeness and accuracy of the answers originally provided by USPTO staff.

As in our previous chats held so far, we received hundreds more questions then we had time to answer. We selected questions for posting which we believed would be of interest to others besides the author of the question. Once we selected the question, we developed the answer, and then posted the question and the answer for viewing by the public. During the actual chat, occasionally the answer was actually posted before the public saw the question. This edited transcript always has the question before the answer. In reviewing the transcript below, if you see the time of the answer before the time of the question, we originally posted them out of sequence. More Info

Trademark Applications and Registrations Retrieval (TARR)

Important Notice Concerning TARR:
TARR is intended for use by the general public. Due to limitations of equipment and bandwidth, TARR is not intended to be a source for bulk downloads of USPTO data. Bulk data may be purchased from USPTO at cost (see the USPTO Products and Services Catalog). Individuals, companies, IP addresses, or blocks of IP addresses who, in effect, deny service to the general public by generating unusually high numbers of daily TARR accesses (searches, pages, or hits), whether generated manually or in an automated fashion, may be denied access to these servers without notice. More Info

Monday, March 07, 2005

Security In The News

[INFOCON] US-CERT Cyber Security Alert SA04-196A Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express



National Cyber Alert System

Cyber Security Alert SA04-196A


Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express



Systems Affected


* Microsoft Windows Systems


Overview


Microsoft has released a Security Bulletin Summary for July, 2004.
There are several security bulletins released in this summary.


I. Description


Microsoft's Security Bulletin Summary for July, 2004 includes
summaries of several bulletins that address vulnerabilities in various
Windows applications and components. For more technical information,
see US-CERT Technical Alert TA04-196A.

II. Impact


An attacker may be able to control your computer if these
vulnerabilities are exploited.


III. Solution


Apply a patch


Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.


Do not follow unsolicited links


Do not click on unsolicited links received in email, instant messages,
web forums, or chat rooms. While this is generally a good security
practice, following this behavior will not prevent the exploitation of
these vulnerabilities in all Read More