Thursday, August 02, 2007

CA files $200 million lawsuit against Rocket ... Dell buys software license

HIGHLIGHTS
News: CA files $200 million copyright lawsuit against Rocket
News: Dell buys software license management company
News: Nokia posts big Q2 profit on one-time gain
News: After complaints, Adobe axes link to Kinkos
News: Google's AP deal passes 1-year mark, yields nothing
News: Web browser attack skirts corporate firewall
Unix Tip: Taking advantage of trust in a script
ITwhirled: Elderly Swede wastes world's fastest Internet connection


NEWS UPDATES

CA files $200 million copyright lawsuit against Rocket
CA Inc. has filed a $200 million copyright lawsuit against rival developer Rocket Software Inc., alleging that the company hired away developers and stole source code.

Dell buys software license management company
Dell Inc. has agreed to acquire ASAP Software Inc. in a move to meet demand from large customers for tools and services that help manage their software assets.

Nokia posts big Q2 profit on one-time gain
Second-quarter net profit soared at Nokia Corp. thanks to a large one-time gain from the company's new telecommunications equipment manufacturing venture with Siemens AG.

After complaints, Adobe axes link to Kinkos
Adobe Systems Inc. will remove a menu option in its Acrobat and Reader programs that lets users send documents over the Internet to FedEx Kinkos for printing, the company said on Thursday.

Google's AP deal passes 1-year mark, yields nothing
One year after Google Inc. acknowledged signing a licensing deal with The Associated Press to launch new Google features and services, the promised offerings haven't been delivered.

BLACK HAT: Web browser attack skirts corporate firewall
A 10-year-old security problem has come back to haunt corporate IT, security researcher Dan Kaminsky told an audience at the Black Hat conference in Las Vegas Wednesday. Kaminsky showed how problems in the way browser software works with the Internet's domain name system could be exploited to give attackers access to any resources behind the corporate firewall.


UNIX TIP

Taking advantage of trust in a script
By Sandra Henry-Stocker, ITworld.com

If you Google the terms "ssh" and "password", you will come up with a generous number of hits on how to set up SSH so that you can log in to a system or run commands remotely on that system without entering a password. While representing something of a security risk (anyone who breaks into your account on one system can access your account on the other as well), this configuration is extremely handy if you need to collect data from the system using a script. For example, you could type "ssh bandana uptime" to find out how long bandana has been running since its last reboot.

Detecting whether a command run via ssh within a script required entry of a password or made use of public key authentication, on the other hand, is more than a little tricky.

Read the full article here


ITWHIRLED

Elderly Swede wastes world's fastest Internet connection
The Swedish city of Karlstad installed an experimental Internet connection in Sigbritt Lothberg's house. She can download data at 40 gigabits a second -- fast enough to download a full-length movie in two seconds. Of course, since the 75-year-old Lothberg has never had an Internet connection, she's not necessarily impressed by the speedy link: she apparently mostly uses it to read newspapers online.

No comments: