Feeds

Email of Microsoft species more deadly than the mail

Judge "Dread" Jackson lays down the law

  • alert
  • submit to reddit

Protecting users from Firesheep and other Sidejacking attacks with SSL

Three times the Department of Justice asked Microsoft to produce documents and emails. Three times Microsoft refused to comply. The cock crowed. Judge Jackson held an impromptu hearing lasting 20 minutes and gave Microsoft 24 hours to produce documents, emails, and details of meetings with Intel, Apple, and OEMs if Apple's QuickTime was discussed. A stunned Microsoft said it would comply. Microsoft's motion that the scope of the trial should be limited, or that Microsoft should be given six months to prepare its case was briefly considered by Jackson. Jackson told Microsoft that "My view of the case as raised by the complaint is not quite so narrow as yours" and decided to put off the decision on the scope to another hearing on 17 September, a week before the trial, which is still scheduled for 23 September. The Microsoft-friendly court of appeals has probably been put on standby by Microsoft if Judge Jackson does not humour Microsoft. Microsoft may have fallen into a trap set by the DoJ. It has protested that introducing additional evidence of its relationship with Apple, Intel, Sun, Bristol Technology and others would increase the scope of the present case, and that the additional lines of enquiry being followed by the DoJ would in effect create a need for a series of trials. But David Boies, the special trial counsel for the DoJ who has considerable relevant experience since he helped IBM in its epic 12-year antitrust case, told Judge Jackson that the purpose was to prove a pattern of predatory conduct. Gina Talamona, spokeswoman for the DoJ, said that it is not unusual for new information to arise during the discovery period. Meanwhile, Bristol Technologies' case against Microsoft caught the DoJ's eye. Keith Blackwell, the CEO, was interviewed by the DoJ and subpoenaed him to provide documents and a deposition. Microsoft claimed that the DoJ was on a fishing expedition. ®

Website security in corporate America

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.