March 10, 2006 10:00 AM PST
Week in review: Origami unwrapped
(continued from previous page)
Intel's 65-nanometer manufacturing process and will ship in the first quarter of 2007, Intel representatives said.
One factor could affect the popularity of chips with four cores, however. Although servers often run software whose tasks are divided into multiple threads that can take advantage of multicore processors, PC software is not so amenable to the approach.
Meanwhile, Intel introduced a new generation of its Centrino notebook technology. Santa Rosa--due in the first half of 2007--is the code name for the next iteration of Centrino, which combines a mobile processor, chipset and wireless chip. Santa Rosa will accommodate the Merom processor that's expected to launch later this year, but will feature a new chipset called Crestline that's designed to improve graphics performance.
Kedron, the new wireless chip in Santa Rosa, will support the 802.11n standard expected to be ratified early next year. But Wi-Fi networks such as 802.11n are only one part of Intel's wireless vision. The company continues to push WiMax technology as a future wide-area-network standard that could deliver data signals at broadband speeds over areas the size of cities.
The war of words is heating up over Apple Computer's Mac OS security.
The Mac maker released a security update for its operating system on Wednesday to plug 20 holes. The patch arrived after two weeks of intense scrutiny of the safety of OS X, prompted by the discovery of two worms and the disclosure of a vulnerability that was deemed "extremely critical" by security monitoring company Secunia.
The update added a function called "download validation" to the Safari Web browser, Apple Mail client and iChat instant messaging tool. The function warns people that a download could be malicious when they click on the link. Before that change, clicking on a link could have resulted in the automatic execution of code on a Mac.
However, experts say the patch doesn't completely fix a high-profile Mac OS X flaw, leaving a toehold for cyberattacks. Apple failed to address a key part of the problem: The fix should be at a lower, operating-system level, experts said. It is now still possible for hackers to construct a file that appears to be a safe file type, such as an image or movie, but is actually an application, said Kevin Long, an analyst at security specialist Cybertrust.
Meanwhile, a Mac hacking contest is raising the hackles of many Mac fans. An individual who won such a contest last month by gaining root control of a machine using an unpublished security vulnerability called it "easy pickings."
On Feb. 22, a Sweden-based Mac enthusiast set up his Mac Mini as a server and invited hackers to break through the computer's security and gain root control, which would allow the attacker to take charge of the computer and delete files and folders or install applications.
Within hours of going live, the "rm-my-mac" competition was over. The challenger posted this message on his Web site: "This sucks. Six hours later, this poor little Mac was owned, and this page got defaced."
However, many observers criticized the validity of the competition because participants were given local client access to the target computer.
The contest raised the ire of a university systems engineer in Wisconsin, who invited hackers to break into his Mac. Dave Schroeder asked hackers to alter the home page hosted on a Mac Mini that is running Mac OS X 10.4.5 with the latest security updates.
The system has two local accounts, and has SHH and HTTP open--"a lot more than most Mac OS X machines will ever have open," Schroeder said on his Web site.
But the event ended early after information emerged that the contest had drawn the scrutiny of the chief information officer at the University of Wisconsin-Madison, whose network Schroeder's Mac Mini was on.
"The Mac OS X 'challenge' was not an activity authorized by the UW-Madison," Brian Rust, a university spokesman, said in an e-mailed statement. "Once the test came to the attention of our CIO, she ended it...Our primary concern is for security and network access for UW services."
Also of note
AT&T will acquire fellow phone company BellSouth in a stock deal worth $67 billion, creating a telecommunications giant that dwarfs Verizon, its nearest competitor...Advanced Micro Devices will launch "Rev F" versions of its Opteron chips in the third quarter, a move that ends the single-core server processor era and paves the way for four-core models...TiVo is phasing out its popular lifetime service plan and implementing a series of flexible pricing options that include the company's hardware...Google said it erred last week when it posted on its Web site internal projections not meant for the public...The U.S. economy is headed for a "day of reckoning," warned Robert Reich, former Department of Labor secretary in the Clinton administration.
13 commentsJoin the conversation! Add your comment