(PLoS) is a non-profit organization of scientists and physicians committed to making the world's scientific and medical literature a freely available public resource.
The internet and electronic publishing enable the creation of public libraries of science containing the full text and data of any published research article, available free of charge to anyone, anywhere in the world.
Immediate unrestricted access to scientific ideas, methods, results, and conclusions will speed the progress of science and medicine, and will more directly bring the benefits of research to the public. more »
Tuesday, March 22, 2005
Tuesday, March 15, 2005
HP Jornada 540 Pocket PC
» Solve a problem
Having a problem with your product? Find your solution here.
» Software & Driver downloads
Looking for software & driver updates? Download available software & drivers here.
» Setup and install
Connect, install or verify installation of your product.
» How to use
Enhance your product's performance with details on how to use and maintain.
» Product information
Get product specifications, warranty, supplies, parts and accessories.
» Manuals
Download your product's user documentation.
» FAQs
Frequently asked questions regarding your product
Having a problem with your product? Find your solution here.
» Software & Driver downloads
Looking for software & driver updates? Download available software & drivers here.
» Setup and install
Connect, install or verify installation of your product.
» How to use
Enhance your product's performance with details on how to use and maintain.
» Product information
Get product specifications, warranty, supplies, parts and accessories.
» Manuals
Download your product's user documentation.
» FAQs
Frequently asked questions regarding your product
BlackBerry 7520
Trade-in your old handheld and get $100 back. Combine with the $100 mail-in rebate for a total savings of $200!
Features
Wireless Access to Email
• Always on, office email while you're mobile. Receive and answer email from the BlackBerry 7520 handheld wirelessly. Microsoft Outlook, IBM Lotus Notes and ISP/POP3 email capable.
Features
Wireless Access to Email
• Always on, office email while you're mobile. Receive and answer email from the BlackBerry 7520 handheld wirelessly. Microsoft Outlook, IBM Lotus Notes and ISP/POP3 email capable.
Monday, March 14, 2005
Ga. Woman Held Hostage Describes Ordeal
By DANIEL YEE
ATLANTA (AP) - For hours, Ashley Smith gently talked to the armed suspect in Atlanta's courthouse slayings, turning from hostage to confidant as they discussed God, family, pancakes and the massive manhunt going on outside her apartment.
``I believe God brought him to my door,'' Smith said Sunday, only hours after her 911 call ended a manhunt for Brian Nichols, who is accused of shooting four people since Friday.
Over the course of the night, Nichols untied Smith, and some of the fear lessened as they talked. Nichols told Smith he felt like ``he was already dead,'' but Smith urged him to consider the fact that he was still alive a ``miracle.''
ATLANTA (AP) - For hours, Ashley Smith gently talked to the armed suspect in Atlanta's courthouse slayings, turning from hostage to confidant as they discussed God, family, pancakes and the massive manhunt going on outside her apartment.
``I believe God brought him to my door,'' Smith said Sunday, only hours after her 911 call ended a manhunt for Brian Nichols, who is accused of shooting four people since Friday.
Over the course of the night, Nichols untied Smith, and some of the fear lessened as they talked. Nichols told Smith he felt like ``he was already dead,'' but Smith urged him to consider the fact that he was still alive a ``miracle.''
Saturday, March 12, 2005
Important Tax Information
W-2 Information
Effective September 17, 2003, all current myPay active/reserve military users and Defense Finance and Accounting Service (DFAS) civilian employees who request or already have a myPay Personal Identification Number (PIN) and access myPay are consenting to receive only an electronic W-2. They may, however, elect to receive a hardcopy W-2. All other Department of Defense (DoD) civilian employees who use MyPay may elect to receive an electronic W-2 in lieu of a hardcopy W-2 through the MyPay system. Click here for more information.
Friday, March 11, 2005
HTC Netstore
D-Link DI-604 Express EtherNetwork 4-Port Broadband Cable/DSL Router (free shipping)
Regular price: $65.00
Sale price: $43.90, 2/$83.80, 10/$375.00
D-Link DI-704P Express EtherNetwork 4-Port Broadband Cable/DSL Router Plus Print Server (free shipping)
Regular price: $89.00
Sale price: $61.70, 2/$121.40, 10/$550.00
D-Link DI-707 7-Port Broadband Cable/DSL Router (free shipping)
Regular price: $118.00
Sale price: $82.60
more prices
Regular price: $65.00
Sale price: $43.90, 2/$83.80, 10/$375.00
D-Link DI-704P Express EtherNetwork 4-Port Broadband Cable/DSL Router Plus Print Server (free shipping)
Regular price: $89.00
Sale price: $61.70, 2/$121.40, 10/$550.00
D-Link DI-707 7-Port Broadband Cable/DSL Router (free shipping)
Regular price: $118.00
Sale price: $82.60
more prices
Tuesday, March 08, 2005
eBay: Learning Center: Selling:
First time seller on eBay? The courses below will get you up and running in no time. You'll learn how to create a sellers account, list an item, accept online payments and keep track of all your selling activity on your own My eBay page.
28.02.2005 / Eugene Spafford, Purdue University:
Some experts including Bill Gates believe that spam can be eradicated in a couple of years. What are your thoughts?
Spafford: I think it can be reduced with some effort, but I do not see how it can be eliminated without also eliminating e-mail, or radically changing the way we run the Internet. Spam is, in part, subjective – what is spam to one person may be a great idea to another. Thus, there will always be some people who actually want some of it!
The biggest problem with spam right now is that the spammers refuse to abide by some procedure that will let users opt out of getting it. The fraud used in sending spam – both deceptive titles and hijack of machines – compounds the problem. If we can cut down on the fraudulent use of servers, and impose some really strong authentication on the advertisements that remain, then perhaps we can control spam ... but it is doubtful we will be able to eliminate it completely in only a few years.
This problem is so large and complex, it was named as one of the CRA Grand Challenges. Those four challenges are:
* Eliminate epidemic-style attacks – worms, viruses, spam, phishing and denial of service attacks.
* Discover how to design and build large-scale, distributed computing systems that must be highly reliable even in the face of probable attack. Examples include medical health records, law enforcement databases, and financial system computing.
* Develop quantitative cyber risk measurement techniques to a point at least the equal of current quantitative financial risk measurement techniques. This will allow us to compare security solutions, measure risk appropriately, and invest the right amounts into protection of our cyber assets.
* Develop mechanisms to allow computing users to set their own levels of data protection and privacy in understandable, repeatable, and reliable manners. Thus, we want each person to be able to interact with systems in a way that allows them to choose how much information to entrust to the systems, and at what level to protect it.
Those interfaces should be understandable and simple to use.
Spafford: I think it can be reduced with some effort, but I do not see how it can be eliminated without also eliminating e-mail, or radically changing the way we run the Internet. Spam is, in part, subjective – what is spam to one person may be a great idea to another. Thus, there will always be some people who actually want some of it!
The biggest problem with spam right now is that the spammers refuse to abide by some procedure that will let users opt out of getting it. The fraud used in sending spam – both deceptive titles and hijack of machines – compounds the problem. If we can cut down on the fraudulent use of servers, and impose some really strong authentication on the advertisements that remain, then perhaps we can control spam ... but it is doubtful we will be able to eliminate it completely in only a few years.
This problem is so large and complex, it was named as one of the CRA Grand Challenges. Those four challenges are:
* Eliminate epidemic-style attacks – worms, viruses, spam, phishing and denial of service attacks.
* Discover how to design and build large-scale, distributed computing systems that must be highly reliable even in the face of probable attack. Examples include medical health records, law enforcement databases, and financial system computing.
* Develop quantitative cyber risk measurement techniques to a point at least the equal of current quantitative financial risk measurement techniques. This will allow us to compare security solutions, measure risk appropriately, and invest the right amounts into protection of our cyber assets.
* Develop mechanisms to allow computing users to set their own levels of data protection and privacy in understandable, repeatable, and reliable manners. Thus, we want each person to be able to interact with systems in a way that allows them to choose how much information to entrust to the systems, and at what level to protect it.
Those interfaces should be understandable and simple to use.
Cybercrime-Hacking
Title: Cyber-vigilantes go after scammers
Source: Silicon.com
Date Written: 2005-02-11
Date Collected: 2005-02-14
The 419 Flash Mob, an Internet vigilante group, started attacking fake banking websites February 9, 2005. A statement by Artists Against 419, who supports the 419 Flash Mob, said their aim was to shut down eight such websites within 48 hours using denial-of- service (DoS) attacks in celebration of the Chinese New Year. Many of the attacked websites were hosted by the same service provider in China, and included Abbey Trust & Offshore Bank, First Global Trust, Allied Trust Bank UK, Crystal Bonds & Securities, Allied Trust Bank UK, KASH BANK CORPORATION, and Liberty Stronghold Securities and Finance.
Title: Businesses targeted by ID "hijack" scam
Source: Silicon.com
Date Written: 2005-02-14
Date Collected: 2005-02-14
Online fraud prevention firm Early Warning has discovered a scam targeting British companies through the Companies House database. In this scam, an attacker changes the address of the registered office for a limited company--all that is needed is the current address and the business's registered company number, both of which can be found in an internet search. Once the address is changed, attackers can open trade accounts and order goods in the company's name. Businesses only discover the identity theft when debt collectors and lawsuits appear to recover fraudulently ordered goods. Companies House is working with the Home Office and the Metropolitan Police to address the emerging problem. In the meantime, companies can protect themselves by filing documents electronically through the Proof system, subscribing to the Companies House monitoring service, and periodically confirming registered details.
Source: Silicon.com
Date Written: 2005-02-11
Date Collected: 2005-02-14
The 419 Flash Mob, an Internet vigilante group, started attacking fake banking websites February 9, 2005. A statement by Artists Against 419, who supports the 419 Flash Mob, said their aim was to shut down eight such websites within 48 hours using denial-of- service (DoS) attacks in celebration of the Chinese New Year. Many of the attacked websites were hosted by the same service provider in China, and included Abbey Trust & Offshore Bank, First Global Trust, Allied Trust Bank UK, Crystal Bonds & Securities, Allied Trust Bank UK, KASH BANK CORPORATION, and Liberty Stronghold Securities and Finance.
Title: Businesses targeted by ID "hijack" scam
Source: Silicon.com
Date Written: 2005-02-14
Date Collected: 2005-02-14
Online fraud prevention firm Early Warning has discovered a scam targeting British companies through the Companies House database. In this scam, an attacker changes the address of the registered office for a limited company--all that is needed is the current address and the business's registered company number, both of which can be found in an internet search. Once the address is changed, attackers can open trade accounts and order goods in the company's name. Businesses only discover the identity theft when debt collectors and lawsuits appear to recover fraudulently ordered goods. Companies House is working with the Home Office and the Metropolitan Police to address the emerging problem. In the meantime, companies can protect themselves by filing documents electronically through the Proof system, subscribing to the Companies House monitoring service, and periodically confirming registered details.
HOMELAND SECURITY POLICY INSTITUTE GROUP
The moderator of Tactical@yahoogroups.com recently posted an email alert to several egroups. This alert was an issued by the U.S. Attorney General’s Office. This email expressed a new level of concern re an impending al-Qaeda (aQ) attack between now and Inauguration Day. This email has been circulating for the last two weeks. Other intel sources have been quick to point out this alert is not based on any new info/intel. A recent report by Bill Gertz in the Washington Times has much the same information.
While this threat assessment is very real, these alerts never really say what we should be alert for. What are the potential targets in California? Are there any relationships to the Inland Empire? Who is the enemy and the ideology that drives it? How is the enemy organized and what are its operational tactics? What are activities and behaviors that might tip the existence of an aQ cell? Further the traditional law enforcement paradigm is ill-equipped to counter this new threat. We are the domestic boots on the ground.
Al-Qaeda seen planning for 'spectacular' attack
Become a member and help us get the word out
While this threat assessment is very real, these alerts never really say what we should be alert for. What are the potential targets in California? Are there any relationships to the Inland Empire? Who is the enemy and the ideology that drives it? How is the enemy organized and what are its operational tactics? What are activities and behaviors that might tip the existence of an aQ cell? Further the traditional law enforcement paradigm is ill-equipped to counter this new threat. We are the domestic boots on the ground.
Al-Qaeda seen planning for 'spectacular' attack
Become a member and help us get the word out
Jerusalem Post May 6, 2004
Virtual jihad
How serious is cyber-terror's threat, and what is the free world doing about it?
In-Depth Coverage
By Alan D. Abbey
Islamic terrorists are winning the on-line war against Western interests because of their virtually unchecked ability to use the Internet to plan, promote, and propagate both physical and cyber attacks.
Efforts to monitor, predict, and counter such attacks are only in the earliest stages. Technical, legal, privacy, and even political challenges are slowing down what could be called cyber counterterrorism in Israel and the US. Private groups have done much of what little successful monitoring has been done so far, as government efforts, particularly in the US, have been hampered by civil liberties concerns.
How serious is cyber-terror's threat, and what is the free world doing about it?
In-Depth Coverage
By Alan D. Abbey
Islamic terrorists are winning the on-line war against Western interests because of their virtually unchecked ability to use the Internet to plan, promote, and propagate both physical and cyber attacks.
Efforts to monitor, predict, and counter such attacks are only in the earliest stages. Technical, legal, privacy, and even political challenges are slowing down what could be called cyber counterterrorism in Israel and the US. Private groups have done much of what little successful monitoring has been done so far, as government efforts, particularly in the US, have been hampered by civil liberties concerns.
9-11 News and Legal Resources, Information and Related Services
Terrorism and Homeland Security
Compiled and Edited By: Sabrina I. Pacifici, Editor, Publisher, Web Manager, LLRX.com
See LLRX Newstand for additional daily news updates
Compiled and Edited By: Sabrina I. Pacifici, Editor, Publisher, Web Manager, LLRX.com
See LLRX Newstand for additional daily news updates
Security Tightening Ahead of Eid in Malaysia, Indonesia
By Kazi Mahmood, IOL Southeast Asia Correspondent
Kuala Lumpur, November 24 (IslamOnline) - Security in several countries in South East Asia (SEA) is tightening ahead of the Eid el Fitri festivals that start at the end of the holy month of Ramadhan in December. Indonesia, Malaysia and Brunei have already stepped up routine patrols with more police forces on the streets than usual.
In Jakarta, the police are currently carrying out unusual raids in night spots and streets where foreigners would gather in a bid to deter night clubs, bars and other alcohol vendors to carry out their business during the month of Ramadhan.
Kuala Lumpur, November 24 (IslamOnline) - Security in several countries in South East Asia (SEA) is tightening ahead of the Eid el Fitri festivals that start at the end of the holy month of Ramadhan in December. Indonesia, Malaysia and Brunei have already stepped up routine patrols with more police forces on the streets than usual.
In Jakarta, the police are currently carrying out unusual raids in night spots and streets where foreigners would gather in a bid to deter night clubs, bars and other alcohol vendors to carry out their business during the month of Ramadhan.
Emergency Response Resource Directory:
This directory provides a comprehensive list of vendors, products and services to the emergency response community and is published directly to the following web sites.
High Tech "NewsBits"
UK Net pedo jailed for eight years A UK man, inappropriately named Lawrence Horn, has been jailed for eight years after trying to seduce a 14-year-old boy in an Internet chatroom. The 14-year-old was in fact detective Mark Bucci from Philadelphia in the States who was working under the pseudonymn Justin. Mr Horn, 35 from near Ashford in Kent, held numerous conversations with "Justin" which became increasingly sexually graphic. http://www.theregister.co.uk/content/6/22447.html
Taliban opposition site a casualty of war A Web site operated by opponents of Afghanistan's Taliban regime will likely remain offline for at least another month after hackers took it out of commission in an apparent case of mistaken identity. Visitors sent about 10,000 hate messages soon after the Sept. 11 terrorism strikes, and hackers brought down the ``AfghanGovernment.org'' site within days. http://www.siliconvalley.com/docs/news/tech/011931.htm
Hacking Incident Closes Security News Site The day before Marquis Grove decided to shutter his popular computer security news site, the operator of SecurityNewsPortal.com was brimming with energy about his labor of love. "I have a large viewership and I feel I owe them a responsibility to be there and keep slamming out the freshest news that I can to keep them amused and informed," said Grove in an e-mail interview Monday. http://www.newsbytes.com/news/01/171478.html
Bin Laden worm wriggling in South Korea A computer virus named after Osama bin Laden, the Saudi-born fugitive accused of masterminding the attacks on the United States, has surfaced in South Korea, a local antivirus software maker said Wednesday. "We received a report from a personal computer user who got an e-mail containing the virus, "Jin Yoon-jung of antivirus company Ahnlab told Reuters. "His computer was not infected, as he reported it to us without opening the e-mail.
http://news.cnet.com/news/0-1003-200-7641111.htmlRead More
Taliban opposition site a casualty of war A Web site operated by opponents of Afghanistan's Taliban regime will likely remain offline for at least another month after hackers took it out of commission in an apparent case of mistaken identity. Visitors sent about 10,000 hate messages soon after the Sept. 11 terrorism strikes, and hackers brought down the ``AfghanGovernment.org'' site within days. http://www.siliconvalley.com/docs/news/tech/011931.htm
Hacking Incident Closes Security News Site The day before Marquis Grove decided to shutter his popular computer security news site, the operator of SecurityNewsPortal.com was brimming with energy about his labor of love. "I have a large viewership and I feel I owe them a responsibility to be there and keep slamming out the freshest news that I can to keep them amused and informed," said Grove in an e-mail interview Monday. http://www.newsbytes.com/news/01/171478.html
Bin Laden worm wriggling in South Korea A computer virus named after Osama bin Laden, the Saudi-born fugitive accused of masterminding the attacks on the United States, has surfaced in South Korea, a local antivirus software maker said Wednesday. "We received a report from a personal computer user who got an e-mail containing the virus, "Jin Yoon-jung of antivirus company Ahnlab told Reuters. "His computer was not infected, as he reported it to us without opening the e-mail.
http://news.cnet.com/news/0-1003-200-7641111.htmlRead More
UGN Security: Tech News
Google takes 'beta' off desktop search Spammers adopt slippery tactics to bypass ISP defences US Not Quite Ready for High Tech Cell Phones Antivirus Application Could Spread Viruses .US Domain Owners to Lose Anonymity Court Orders Microsoft Retrial – Waives Fine UK Police Want Special Internet Porn Unit Earthlink Announces Flash-Based Webmail Israeli Army Issues Video Screens to Troops New Online Magazine From al-Qaeda's Iraqi Wing Sony PSP to Top iPod as Must-Have in 2005 Judge dismisses spam conviction Sony offers pizza feature for hungry gamers Opera beefs up browser to thwart phishers Jef Raskin, Macintosh Creator, Died Sunday
Tech Law Journal Daily E-Mail Alert
Sen. John Edwards (D-NC), another member of the Subcommittee, also participated in the hearing. He is the sponsor of his own cyber security bills: S 1900, the Cyberterrorism Preparedness Act of 2002, and S 1901, the Cybersecurity Research and Education Act of 2002. S 1900 would authorize the appropriation of $70 Million in FY 2003 for grants to be administered by the National Institute of Standards and Technology (NIST) "to support the development of appropriate cyber security best practices, support long term cyber security research and development, and perform functions relating to such activities." S 1901 would authorize appropriations for a cyber security graduate fellowship program, and other educational programs.
Congressional Record: January 9, 2003 (Senate)
By Mr. DASCHLE (for himself, Mr. Leahy, Mr. Biden, Mr. Kennedy,
Mr. Schumer, Mr. Durbin, Mrs. Clinton, Mrs. Murray, Mr. Dayton,
Mr. Corzine, and Mr. Reed):
S. 22. A bill to enhance domestic security, and for other purposes;
to the Committee on the Judiciary.
Mr. LEAHY. Mr. President, I am pleased today to join Senator Daschle
and other Democratic Senators in introducing the Justice Enhancement
and Domestic Security Act of 2003. This comprehensive crime bill builds
on prior Democratic crime initiatives, including the landmark Violent
Crime Control and Law Enforcement Act of 1994, that worked to bring the
crime rate down.
This year marked an unfortunate turn after a decade of remarkable
declines in the Nation's crime rate. The decade of progress we made
under the leadership of a Democratic President helped revitalize our
cities and restore a sense of security for millions of Americans.
According to the latest FBI report, however, the number of murders,
rapes, robberies, assaults, and property crimes is up across the United
States in all regions of the country except the Northeast, the first
year-to-year increase since 1991. This upswing has been fueled by the
faltering economy and high unemployment rates. The President's ill-
conceived tax cut in 2001, along with the new cuts he proposes now, are
likely to exacerbate these economic woes by plunging us deeper into
deficit spending.Read More
Mr. Schumer, Mr. Durbin, Mrs. Clinton, Mrs. Murray, Mr. Dayton,
Mr. Corzine, and Mr. Reed):
S. 22. A bill to enhance domestic security, and for other purposes;
to the Committee on the Judiciary.
Mr. LEAHY. Mr. President, I am pleased today to join Senator Daschle
and other Democratic Senators in introducing the Justice Enhancement
and Domestic Security Act of 2003. This comprehensive crime bill builds
on prior Democratic crime initiatives, including the landmark Violent
Crime Control and Law Enforcement Act of 1994, that worked to bring the
crime rate down.
This year marked an unfortunate turn after a decade of remarkable
declines in the Nation's crime rate. The decade of progress we made
under the leadership of a Democratic President helped revitalize our
cities and restore a sense of security for millions of Americans.
According to the latest FBI report, however, the number of murders,
rapes, robberies, assaults, and property crimes is up across the United
States in all regions of the country except the Northeast, the first
year-to-year increase since 1991. This upswing has been fueled by the
faltering economy and high unemployment rates. The President's ill-
conceived tax cut in 2001, along with the new cuts he proposes now, are
likely to exacerbate these economic woes by plunging us deeper into
deficit spending.Read More
Homeland Security Information
Links to various homeland securty related web sites where the
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.
SatCom Systems - Government and Homeland Securty:
SatCom Systems develops and provides critical communication solutions for First Responders and Incident Command Operations in Homeland Defense - available today and ready for the future.
The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.
First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »
The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.
First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »
Subscribe to:
Posts (Atom)