[3917] in linux-announce channel archive
Linux-Announce Digest #209
daemon@ATHENA.MIT.EDU (Digestifier)
Sat Oct 26 14:13:09 2002
From: Digestifier <Linux-Announce-Request@senator-bedfellow.mit.edu>
To: Linux-Announce@senator-bedfellow.mit.edu
Reply-To: Linux-Announce@senator-bedfellow.mit.edu
Date: Sat, 26 Oct 2002 14:13:04 EDT
Linux-Announce Digest #209, Volume #4 Sat, 26 Oct 2002 14:13:04 EDT
Contents:
Update on Decentralized Smart Card Data Storage ("Jorg Huser")
Shareware: txt2pdf 6.1 ("Sanface Software")
SECURITY: NSA Security-enhanced Linux updated (Howard Holm)
CGIpaf 1.2.0pre1 (Staf Wagemakers)
RE COMMERCIAL: 1U rackmount server for $495 (sales)
VanLUG - Mon, 21 Oct 2002 - 7:30 pm (Dave Michelson)
----------------------------------------------------------------------------
From: "Jorg Huser" <jorg@microsurvivor.com>
Subject: Update on Decentralized Smart Card Data Storage
Date: 25 Oct 2002 18:05:57 GMT
This is a multi-part message in MIME format.
=======_NextPart_000_005C_01C27A02.0EA346E0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
September 11th forced many companies to re-think their storage
strategies, increasing business requirements for continuity,
performance, and capacity. To realize the benefits of greater
resource utilization and data accessibility, organizations must
rethink their strategy to manage and protect sensitive & valuable
data.
Emerging and Secure Smart Card technology has the potential to
substitute DVD, CD, Hard Disk Drives and other storage media.
By protecting information in transit, in use and in storage allows for
super-distribution models. This technology can store information in
a decentralized way with significantly lower risk factors and is based
on the proven principle "divide and conquer".
There is a variety of promising emerging technologies available -
like cellular database technology to combine different sources of
data, peer-to-peer networks to connect all the above and thin
client/server models for distributed implementation, which would
allow for implementation of so called pervasive computing systems
with decentralized data storage & protection. Emerging information
technologies are capable of reorganizing data on higher distributed
levels which could prevent future catastrophic cyber attacks. The US
banking system is based on only three central data centers and an attack
could have a devastating impact on the US Economy. Let's make the world
a better place and more ethical by increasing both security and privacy
of sensitive data in transit, in use and in storage. The highest risk
appears
when too much sensitive data is concentrated on one point - fortunately,
today's emerging technologies allow for decentralized systems in a
scalable way.
In addition to that, smart cards are marketing instruments and in
combination with a secure container (large data storage) for digital
goods can evolve to a moving digital marketplace in the physical
world. Finally, we have a pervasive computing system that has system
inherent rules that can be controlled by human beings with computational
intelligence. The computational intelligence helps to maintain the system
and
gives the user incentives to use it. Human beings are not capable of
overseeing millions of cards, billions of transactions and data
without "Computational Intelligence" (CI) . "CI" refers to a growing family
of techniques
in use today that enables computers to recognize patterns that humans cannot
recognize, "learn" behavior that humans cannot learn, explore data too vast
for human exploration, "breed" programs that humans cannot write,
assemble logical reasoning too complex for humans, evolve "brain
mechanisms" that humans cannot design, and exhibit emergent
properties that humans cannot anticipate. These things happen at
electronic speed.
Finally, we have reached a meta-level of control/influence for
chaotic systems and the task is to find the strange attractors
supporting profitable and ethical outcomes in a complex world. There
is a huge potential for new technologies and business models.
If you want to take advantage of this growing opportunity, check out the
following link for technical material:
http://www.microsurvivor.com
Please feel free to contact me for any questions or comments.
Thanks,
Jorg Huser
http://www.microsurvivor.com
=======_NextPart_000_005C_01C27A02.0EA346E0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2719.2200" name=3DGENERATOR></HEAD>
<BODY style=3D"COLOR: #000000; FONT-FAMILY: Arial">
<DIV><FONT size=3D2><FONT size=3D2><FONT size=3D3>September 11th forced =
many companies=20
to re-think their storage<BR>strategies, increasing business =
requirements for=20
continuity,<BR>performance, and capacity. To realize the benefits of=20
greater<BR>resource utilization and data accessibility, organizations=20
must<BR>rethink their strategy to manage and protect sensitive &=20
valuable<BR>data.<BR><BR>Emerging and Secure Smart Card technology has =
the=20
potential to<BR>substitute DVD, CD, Hard Disk Drives and other storage=20
media.</FONT></FONT></DIV>
<DIV>
<DIV><FONT size=3D2><FONT size=3D3>By protecting information in =
transit, in use=20
and in storage allows for </FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>super-distribution models. This =
technology can=20
store information in </FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>a decentralized way=20
with significantly lower risk factors and is based=20
</FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>on the proven principle "divide =
and =20
conquer".<BR><BR>There is a variety of promising emerging =
technologies=20
available -<BR>like cellular database technology to combine different =
sources=20
of<BR>data, peer-to-peer networks to connect all the above and=20
thin<BR>client/server models for distributed implementation, which=20
would<BR>allow for implementation of so called pervasive computing=20
systems<BR>with decentralized data storage & protection. Emerging=20
information<BR>technologies are capable of reorganizing =
data on=20
higher distributed<BR>levels which could prevent future =
catastrophic cyber=20
attacks. The US </FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>banking </FONT></FONT><FONT =
size=3D2><FONT=20
size=3D3>system is based on only three central data centers and an =
attack=20
</FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>could </FONT></FONT><FONT =
size=3D2><FONT=20
size=3D3>have a devastating impact on the US Economy. Let's make the =
world=20
</FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>a better place and more ethical by =
increasing=20
both security and privacy </FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>of sensitive data in transit, in use =
and in=20
storage. The highest risk appears </FONT></FONT></DIV>
<DIV><FONT size=3D3>when too much sensitive data is concentrated on =
one point=20
- fortunately,<BR>today's emerging technologies allow for decentralized =
systems=20
in a<BR>scalable way.<BR><BR>In addition to that, smart cards are =
marketing=20
instruments and in<BR>combination with a secure container (large data =
storage)=20
for digital<BR>goods can evolve to a moving digital marketplace in the=20
physical<BR>world. Finally, we have a pervasive computing system that =
has=20
system<BR>inherent rules that can be controlled by human beings =
with <SPAN=20
class=3D388123602-07082002>computational</SPAN><BR>intelligence. =
The <SPAN=20
class=3D388123602-07082002>computational</SPAN> intelligence helps to =
maintain the=20
system and<BR>gives the user incentives to use it. Human beings are not =
capable=20
of<BR>overseeing millions of cards, billions of transactions and =
data<BR>without=20
"<SPAN class=3D388123602-07082002>Computational Intelligence</SPAN>" =
(<SPAN=20
class=3D388123602-07082002>C</SPAN>I) . "<SPAN=20
class=3D388123602-07082002>C</SPAN>I" refers to a growing family of =
techniques=20
</FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>in use today that enables computers =
to recognize=20
patterns that humans cannot </FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>recognize, "learn" behavior that =
humans cannot=20
learn, explore data too vast </FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D3>for human exploration, "breed" =
programs that=20
humans cannot write,<BR>assemble logical reasoning too complex for =
humans,=20
evolve "brain<BR>mechanisms" that humans cannot design, and exhibit=20
emergent<BR>properties that humans cannot anticipate. These things =
happen=20
at<BR>electronic speed.<BR><BR>Finally, we have reached a meta-level of=20
control/influence for<BR>chaotic systems and the task is to find the =
strange=20
attractors<BR>supporting profitable and ethical outcomes in a complex =
world.=20
There<BR>is a huge potential for new technologies and business =
models.<BR>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV>If you want to take a<SPAN class=3D388123602-07082002>dvantage of =
this=20
growing opportunity</SPAN>, check out the following link for technical=20
material:<BR><A=20
href=3D"http://www.microsurvivor.com/">http://www.microsurvivor.com</A></=
DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV>Please feel free to contact me for any questions or<SPAN=20
class=3D388123602-07082002> </SPAN>comments.<BR><BR>Thanks,<BR><BR>Jorg=20
Huser<BR><A=20
href=3D"http://www.microsurvivor.com/">http://www.microsurvivor.com</A></=
FONT></FONT></DIV></DIV>
<DIV><FONT size=3D3></FONT> </DIV><FONT =
size=3D2></FONT></FONT></DIV>
<DIV><FONT size=3D2><FONT size=3D2></FONT></FONT> </DIV>
<DIV><FONT size=3D2><FONT size=3D2></DIV>
<DIV><BR></DIV></FONT></FONT></BODY></HTML>
=======_NextPart_000_005C_01C27A02.0EA346E0==
##########################################################################
# Send submissions for comp.os.linux.announce to: cola@stump.algebra.com #
# PLEASE remember a short description of the software and the LOCATION. #
# This group is archived at http://stump.algebra.com/~cola/ #
##########################################################################
------------------------------
From: "Sanface Software" <sanface@sanface.com>
Subject: Shareware: txt2pdf 6.1
Date: 25 Oct 2002 18:06:00 GMT
SHAREWARE: txt2pdf 6.1
We would like to announce txt2pdf 6.1 version.
http://www.sanface.com/txt2pdf.html
txt2pdf is shareware; it is a very flexible and powerful PERL5 script
that converts text files to PDF format files, so you can use it in every
operating systems supported by PERL5, including MPE/iX, OpenVMS and
EPOC.
It's simple to design background like invoices, orders etc.
Here nice examples made using txt2pdf PRO
http://www.sanface.com/pdf/Purchase_Order.pdf
http://www.sanface.com/pdf/invoice.pdf
http://www.sanface.com/pdf/hfmus.pdf
http://www.sanface.com/pdf/heraldbill.pdf
If you prefer we also distribute executables for Windows, Linux,
Solaris, AIX, HP-UX, and Mac OS X. Inside the Windows version is Visual
txt2pdf, a VB GUI.
What's new in this version
New pagemark feature to open the PDF inside your browser at the page you
prefer using the URL http://your_site.your_ext/your_pdf_document#pagen
where n is the number of the page e.g.
http://www.sanface.com/pdf/test.pdf#page2
New Windows installation GUI
Windows Help and html documentation
Test txt2pdf 6.1!
You can find it at http://www.sanface.com/txt2pdf.html
--
Posted via Mailgate.ORG Server - http://www.Mailgate.ORG
##########################################################################
# Send submissions for comp.os.linux.announce to: cola@stump.algebra.com #
# PLEASE remember a short description of the software and the LOCATION. #
# This group is archived at http://stump.algebra.com/~cola/ #
##########################################################################
------------------------------
From: hdholm@epoch.ncsc.mil (Howard Holm)
Subject: SECURITY: NSA Security-enhanced Linux updated
Date: 25 Oct 2002 18:06:04 GMT
The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype. The base 2.5 kernel version has been
updated to 2.5.44. The base 2.4 kernel version remains at 2.4.19, but
many changes have been made to the 2.4 LSM patch and to the 2.4 SELinux
module since the last release. The modified login, sshd and crond
programs have been updated to use a new configuration scheme. Socket
handling has been improved. Internally, precondition functions have
been removed in favor of early initialization support. The modified tar
has been updated to tar-1.13.25. A number of other improvements, bug
fixes and policy enhancements have taken place.
Security-enhanced Linux incorporates a strong, flexible mandatory
access control architecture into the major subsystems of the Linux
kernel. The system provides a mechanism to enforce the separation of
information based on confidentiality and integrity requirements. This
allows threats of tampering and bypassing of application security
mechanisms to be addressed and enables the confinement of damage that
can be caused by malicious or flawed applications. The SELinux web
site <http://www.nsa.gov/selinux/> contains background information,
documentation, source code, and archives for the selinux mailing-list.
--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency
##########################################################################
# Send submissions for comp.os.linux.announce to: cola@stump.algebra.com #
# PLEASE remember a short description of the software and the LOCATION. #
# This group is archived at http://stump.algebra.com/~cola/ #
##########################################################################
------------------------------
From: Staf Wagemakers <staf@patat.org>
Subject: CGIpaf 1.2.0pre1
Date: 25 Oct 2002 18:06:08 GMT
"cgipaf" allows users to change their un*x Password, Autoreply and mail
Forwarding by a webinterface.
CGIpaf is a combination of three CGI programs:
* passwd.cgi: which allow users to update their password.
* viewmailcfg.cgi: which allows users to view their current mail
configuration.
* mailcfg.cgi: which updates the mail configuration.
All programs use PAM for the user authentication.
It is possible to run a script to update SAMBA passwords or NIS
configuration when a password is changed.
mailcfg.cgi creates a .procmailrc in the user's home directory, it's
possible to use external script to update the mail configuration to
support other mail configuration than procmail ( a sample Perl script
with vacation support is included ).
A user with too many invalid logins can be locked. The minimum and
maximum UID can be set in the configuration file, so you can specify a
range of UIDs that are allowed to use CGIpaf.
1.2.0pre1 is the latest development release of CGIpaf
cgipaf 1.2.0pre1 is available at:
http://staf.patat.org/cgipaf/develop/
mirror: http://stafwag.netfirms.com/cgipaf/develop/
Changelog:
* 1.2.0pre1 24 Oct 2002
o Access Control List added ( AclOrder, AllowUsers, AllowGroups,
DenyUsers, DenyGroups directives )
As always, comments and suggestions are welcome.
regards,
--
staf
##########################################################################
# Send submissions for comp.os.linux.announce to: cola@stump.algebra.com #
# PLEASE remember a short description of the software and the LOCATION. #
# This group is archived at http://stump.algebra.com/~cola/ #
##########################################################################
------------------------------
From: sales <sales@storeanywhere.com>
Subject: RE COMMERCIAL: 1U rackmount server for $495
Date: 25 Oct 2002 18:06:11 GMT
Storeanywhere.com Inc. right now are promoting its 1U rackmount
server with the following configurations or any configurations of your
choice. For variety of promotions go and check our website:
http://www.storeanywhere.com .
Intel Celeron 1Ghz CPU/Copper fan
MSI 6368 Lan motherboard
256mb PC-133 SDRAM
40G Hard disk
Integrated vedio card
Integrated Sound card
Lan card built on motherboard
52X CD-Rom, 1.44Floppy drive
Keyboard,Mouse(3 button)
1U black nice rackmount chassis
Second ethernet card optional(add $25)
Please call us for placing orders on 718-934-7313. For
questions send e-mail to : sales@storeanywhere.com.
##########################################################################
# Send submissions for comp.os.linux.announce to: cola@stump.algebra.com #
# PLEASE remember a short description of the software and the LOCATION. #
# This group is archived at http://stump.algebra.com/~cola/ #
##########################################################################
------------------------------
Date: Fri, 25 Oct 2002 13:00:54 CST
From: Dave Michelson <davem@ece.ubc.ca>
Subject: VanLUG - Mon, 21 Oct 2002 - 7:30 pm
Vancouver Linux Users Group
http://www.vanlug.bc.ca
Monthly Meeting
Mon, 21 Oct 2002 7:30 - 9:00 pm
BCIT, Bldg SE6, TELUS Theatre
Calling All Independent Game Developers:
Wireless Games and AirGML
Kareen McKinnon, Bryce Pasechnik
Air Games Wireless Inc.
http://www.airg.com
In 2000, Simon Fraser University (SFU) engineering science students
Frederick Ghahramani, Vincent Yen, and Bryce Pasechnik founded Air Games
Wireless (AirG). Their goal, simply put, is to transcend geographic,
technological, and language barriers in order to deliver a cutting edge
mobile entertainment experience. AirG is now available to over 100
million cellular subscribers across 20 mobile networks globally. As they
have begun transforming traditional wireless networks into massively
multiplayer gaming arenas, AirG is making extensive use of Open Source
tools. In this presentation, Kareen and Bryce will describe:
1. AirG's business history.
2. The technical challenges of wireless development.
3. "AirGML" and how it tackles those challenges.
4. The business case for independent developers considering
using AirGML.
5. The logistics of working with AirGML and the company.
6. The role of Open Source tools in wireless game
development
--
Dave Michelson
dmichelson@ieee.org
##########################################################################
# Send submissions for comp.os.linux.announce to: cola@stump.algebra.com #
# PLEASE remember a short description of the software and the LOCATION. #
# This group is archived at http://stump.algebra.com/~cola/ #
##########################################################################
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: Linux-Announce-Request@NEWS-DIGESTS.MIT.EDU
You can submit announcements to be moderated via:
Internet: linux-announce@NEWS.ORNL.GOV
Linux may be obtained via one of these FTP sites:
ftp.funet.fi pub/Linux
tsx-11.mit.edu pub/linux
sunsite.unc.edu pub/Linux
End of Linux-Announce Digest
******************************