Depacco.com

14 May 2009

Google wants to know if you're sick

Google is attempting to find out how much of a role Internet searches play in the self-diagnosis process.

The company plans later Wednesday to start rolling out a subtle question at the bottom of pages with search results for a few common ailments, such as "Did you search because you or someone you know may have an ear infection?" That question will only appear for a very small number of users who search for terms such as "ear infection," but it will help Google start to understand how many people are searching on such terms looking for treatment remedies or options as opposed to doing research, said Dr. Roni Ziegler, a product manager forGoogle Health.

Understanding how many people are searching on Google for help diagnosing their health could improve future search results, the company thinks.

(Credit: Google)

In a way, this is an extension of the work Google has done tracking the flu with Google Flu Trends. The company noticed that search activity related to the flu tends to rise about two weeks before a similar rise is reported to the Centers for Disease Control by doctors, but years of data on flu patterns validates those trends, Ziegler said. Similar data does not exist for more common health issues.

Google is not exactly sure what it wants to do with that data, or how much useful data will be produced by the experiment. Ultimately, however, everything at Google goes back into the search process, so it's possible that the data could be used to offer searchers more options, such as "Did you mean to search for treatment options for X?" at the top of the search page.

This is a temporary project: Google plans to gather data for several weeks, starting Wednesday afternoon.

Apple Patch Day: 67 Mac OS X, Safari vulnerabilities

On the same day Microsoft shipped a bundle of patches for gaping holes in its PowerPoint software, Apple followed suit, dropping a monster Mac OS X update to correct 67 security vulnerabilities.

The sudden Apple Patch Day also included a patch to cover a trio of flaws in the Safari Web browser (Mac OS X and Windows).

The OS X update covers flaws in 31 different components, including several known (and dated) issues in open-source packages used by Apple. These include vulnerabilities in Apache, BIND, CUPS, OpenSSL, PHP and Kerberos.

The update also fixes what Apple describes as “arbitrary code execution” vulnerabilities in ATS, CFNetwork, CoreGraphics, Cscope, Disk Images and Spotlight.

The full list of affected software, components and discussion of risk isavailable on Apple’s support site.

Separately, Apple shipped new versions of its Safari 3 and Safari 4 (beta) browsers to cover the following issues:

  • libxml (CVE-2008-3529) A heap buffer overflow exists in libxml’s handling of long entity names. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Affects both Mac OS X and Windows XP and Vista.
  • Safari (CVE-2009-0162) Multiple input validation issues exist in Safari’s handling of “feed:” URLs. Accessing a maliciously crafted “feed:” URL may lead to the execution of arbitrary JavaScript. This update addresses the issues by performing additional validation of “feed:” URLs. These issues do not affect systems prior to Mac OS X v10.5. Also affects Windows XP and Vista.
  • WebKit (CVE-2009-0945) A memory corruption issue exists in WebKit’s handling of SVGList objects. Visiting a maliciously crafted website may lead to arbitrary code execution. This update addresses the issue through improved bounds checking. Apple credits security researcher “Nils” for reporting this issue, suggesting it is the flaw exploited during this year’s CanSecWest contest.

10 May 2009

EC wants software makers held liable for code

Software companies could be held responsible for the security and efficacy of their products, if a new European Commission consumer protection proposal becomes law.

Commissioners Viviane Reding and Meglena Kuneva have proposed that EU consumer protections for physical products be extended to software. The suggested change in the law is part of an EU action agenda put forward by the commissioners after identifying gaps in EU consumer protection rules.

A priority area for possible EU action is "extending the principles of consumer protection rules to cover licensing agreements of products like software downloaded for virus protection, games, or other licensed content," according to the commissioners' agenda. "Licensing should guarantee consumers the same basic rights as when they purchase a good: the right to get a product that works with fair commercial conditions."

"Digital content is not a tangible good and should not be subject to the same liability rules as toasters."
--Francisco Mingorance, BSA director of public policy

EU consumer commissioner Kuneva said that more accountability for software makers, and for companies providing digital services, would lead to greater consumer choice.

"If we want consumers to shop around and exploit the potential of digital communications, then we need to give them confidence that their rights are guaranteed," Kuneva said. "That means putting in place and enforcing clear consumer rights that meet the high standards already existing in the main street. (The) Internet has everything to offer consumers, but we need to build trust so that people can shop around with peace of mind."

The Business Software Alliance (BSA), which represents the interests of software makers including Apple, IBM, and Microsoft, criticized the proposals.

"Digital content is not a tangible good and should not be subject to the same liability rules as toasters," Francisco Mingorance, BSA director of public policy told ZDNet UK on Thursday. "Unlike tangible goods, creators of digital content cannot predict with a high degree of certainty both the product's anticipated uses and its potential performance."

Mingorance said the performance of a piece of software depends on the environment it operates in, how the code is updated, whether it is possible to adapt and modify the software, and whether the code is attacked.

According to Mingorance, the proposed regulatory extension would cover all software, including beta products, and would cover both proprietary and open-source software.

Right now, under the current EU Sales and Guarantees Directive, physical products are expected to carry a guarantee of two years. Extending those terms to software would have the effect of limiting customer choice, as contract terms would have to be extended to a minimum of two years, Mingorance added.

"Extending the scope would force the businesses to maintain update services for such contracts beyond the contractual term and ultimately limit the choice of offers," the BSA director said. "It is like renting your house for a summer month and being then obliged to extend the rent for another 23 months."

In addition, Mingorance said that extending consumer regulation to software could lead to less interoperability between software products, as manufacturers might decide to limit how far third-party developers could access their code.

Software companies have long argued against accepting responsibility for the security and efficiency of their code. Linux kernel developer Alan Cox in 2007 told a House of Lords Committee that neither proprietary nor open-source developers should be held accountable for their code.

Windows 7 RC gets its first bug, and it's a doozy

The first documented bug in the Windows 7 Release Candidate (build 7100) is a doozy.

Yesterday, Microsoft published Knowledge Base article 970789, which provides details of a problem that affects the 32-bit (x86) English-language version of Windows 7 build 7100. The problem, in short, is that the installer incorrectly sets access control lists (ACLs) on the root of the system drive. The longer version is described as follows:


In the English version of Windows 7 Release Candidate (build 7100) 32-bit Ultimate, the folder that is created as the root folder of the system drive (%SystemDrive%) is missing entries in its security descriptor. One effect of this problem is that standard users such as non-administrators cannot perform all operations to subfolders that are created directly under the root. Therefore, applications that reference folders under the root may not install successfully or may not uninstall successfully. Additionally, operations or applications that reference these folders may fail.

For example, if a folder is created under the root of the system drive from an elevated command prompt, this folder will not correctly inherit permissions from the root of the drive. Therefore, some specific operations, such as deleting the folder, will fail when they are performed from a non-elevated command prompt. Additionally, the following error message appears when the operation fails:

Access is denied.

Furthermore, the missing security descriptor entries protect non-admin file operations directly under the root.In the English version of Windows 7 Release Candidate (build 7100) 32-bit Ultimate, the folder that is created as the root folder of the system drive (%SystemDrive%) is missing entries in its security descriptor. One effect of this problem is that standard users such as non-administrators cannot perform all operations to subfolders that are created directly under the root. Therefore, applications that reference folders under the root may not install successfully or may not uninstall successfully. Additionally, operations or applications that reference these folders may fail.

For example, if a folder is created under the root of the system drive from an elevated command prompt, this folder will not correctly inherit permissions from the root of the drive. Therefore, some specific operations, such as deleting the folder, will fail when they are performed from a non-elevated command prompt. Additionally, the following error message appears when the operation fails:

Access is denied.

Furthermore, the missing security descriptor entries protect non-admin file operations directly under the root.

A hotfix is available as an important update that should be delivered and installed automatically by Windows Update, assuming you have set up automatic updates. On one test system that I checked just now, the update had already been installed overnight. On two other systems, the update had been downloaded but was awaiting installation.

The hotfix package fixes the security descriptor of the root of the system drive, but it does not repair applications that are already installed, nor does it affect the permissions of folders that were created after the installation.

If you installed the x64 version of Windows 7, you are apparently unaffected by this issue.

If you haven’t yet installed the Windows 7 RC, it’s important to install this hotfix after you set up Windows and before you install any programs or restore any backed-up data.

This sounds like a pretty serious bug, and I’m surprised that it slipped through into the release candidate. I haven’t observed any deleterious effects from this issue yet but am doing further testing today. If anyone has any firsthand reports of being bitten by this bug, please leave a comment in the Talkback section with more details.

08 May 2009

SILICON POWER

SILICON POWER’ s first step to enhance the Branding image: expanding the channels in Taiwan

May 7, 2009(Taipei, Taiwan) The World leading SSD manufacture company, Silicon Power, today announce it will decide to expand it’s channel in Taiwan along with the recognition from consumer in Japan. To build up the long term relationship with partners through various tactics to create the win win situation, Silicon Power will cooperate with all major channels in Taiwan, including Carrefour, Far Eastern Geant, Tatung 3C, TKEC, rainbow3C and so on. They covered from 3C channel stores to super market stores. To celebrate the announcement of its channel strategy, Silicon Power will also launch the “channel spring promotion program”. Hope can attract more consumers to make a success in the first hit through the promotion event.

For Silicon Power, 2009 is the very important mile stone to enhance its company branding around the world. Silicon Power won the success in Japan market and keeps cultivating its branding image with the experience in Japan more proactively. First, Silicon Power will show the commitments to gather more reliable partners and distributors in Taiwan. Second, Silicon Power will extend more on line channels to reach more consumers. To open more new business opportunity, we take step by step approach to create the win-win situation for the long term relationship, also to win the strong branding image over the next year.