21st > February > 2003 Archive
Pipex and Eclipse have scooped the top awards at this year's "Internet Oscars" held in London last night.
Britain's bosses are being pressed to treat their staff with respect and allow them sufficient time to take pee breaks.
Swiss security researchers have discovered an attack against implementations of the ubiquitous SSL protocol that could potentially compromise email passwords, though not ecommerce transactions.
What did you make up in the war on terror, daddy? The Register's recent discovery of the 'approved news' panel on the front page of the US Customs site is already paying dividends.
Cambridge researchers have documented a worrying PIN cracking technique against the hardware security modules commonly used by bank ATMs.
AOL is kicking butt in a bid to clamp down on spam.
Data Protection Act breaches by London's traffic congestion charge system may be numerous and varied, even if you exclude all of the ones that are committed if Mayor Ken's security ring of steel exists. And a report by one of the many (we presume) journalists who've infiltrated the system suggests a) that it doesn't work to anything like the extent claimed; b) that conduct and training of camera operators is inadeqate and in breach of CCTV legislation; and c) that the whole shooting match will fall over if too many recipients of penalty charges contest them.
UpdatePoker.com Inc is continuing to pursue "all legal avenues" in a bid to regain control of the domain www.poker.com.
IBM today launched what it touts as the world's most powerful entry-level Web server.
In one of life's more astonishing pieces of bad luck, the web site of the Internet-oriented Marbles credit card vanished today, just as The Register's new Marbles card and Internet login details arrived.
The days of dialling-up to retrieve your voicemail are numbered, thanks to audio MMS, says Carlo d'Asaro Biondo, the general manager for communications and media at Unisys EMEA.
AOL is investigating reports that crackers gained access to its customer database through a combination of cracking and social engineering exploits.