Greetings WOW Members and Web professionals everywhere. Bill Cullifer here with the World Organization of Webmasters (WOW and the WOW Technology Minute. It?’s web news Monday and here?’s what shaping our Web world this week.
A special public meeting of the U.S. Federal Communications Commission meets at Harvard Law School today.
The Associated press reports that he Internet Forum is headed for Boston this week with an agenda to weigh whether users should be free to surf when and where they want and download what they please vs. the potential rights of the networks that make up the Internet. As you know, recent events involving Comcast Corp. and Verizon Wireless have raised questions about network owners interfering with customer traffic flow.
To review the entire article visit:
http://ap.google.com/article/ALeqM5j6yyNoLav
VPBjHwb3lUUcN1XaZeAD8V075TO0
In other news, Goolag Tool is available that lets Google Aid Hackers
The Washington Post is reporting that the hacking group Cult of the Dead Cow has released a tool that should make Google hacking a little easier for novices. Called Goolag, the open-source software lets hackers use the Google search engine to scan Web sites for vulnerabilities. Goolag comes with an easy-to-use graphical interface. It is based on techniques developed by Computer Sciences Corp. researcher Johnny Long, a well-known computer hacker who has spent years documenting the way that Google’s search engine can be used to uncover security vulnerabilities in the Web sites it indexes.
To review the entire article visit:
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/23/AR2008022301481.html
Speaking of security, the New York Times is reporting that a group led by a Princeton University computer security researcher has developed a simple method to steal encrypted information stored on computer hard disks.
The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is widely used by companies and government agencies, notably in portable computers that are especially susceptible to theft.
To review the entire article visit:
http://www.nytimes.com/2008/02/22/technology/22chip.html?em&ex=1203915600&en=13d01f43eefefaeb&ei=5087%0A
In other news, I read a thoughtful editorial from Sitepoint?’s, Kevin Yank regarding Microsoft?’s effort to purchase Yahoo. In short, Kevin writes that “Yahoo! Design Patterns Library has set the gold standard for well-documented, reusable JavaScript and user interface design resources. And these resources are just two prominent examples of all the good work Yahoo! has been doing (and giving away) at the Yahoo! Developer Network.”
He adds that “Yahoo! is the only big web company in business today that I?’d trust with the future of the Web. Their continuing efforts to make life better for web developers, their willingness to provide open APIs for getting data into and out of their applications, and their recent investments in open initiatives like OpenID all point to a company that understands the potential of the Web if it is developed openly.”“In sharp contrast, he writes that Google won?’t even bother to serve a proper DOCTYPE declaration on its main search form (the most-visited page on the Web without a DOCTYPE declaration?).”
And finally he didn?’t have anything great to say about Microsoft as well.
To review the entire article visit:
http://www.sitepoint.com/blogs/2008/02/19/yahoo-for-sale-will-developers-be-left-behind/
For further details and the links to these stories check out today?’s WOW Technology Minute at www.webprominute.org