RICHARDSON, Texas -- This fall, three new watches from Fossil will allow wearers to receive and display customized Web content at the flick of a wrist.
The watches sport Microsoft's Smart Personal Objects Technology (SPOT), and will provide consumers with instant access to personalized Web information and services -- including news, weather, sports, stock quotes, instant messaging and more.
From a configuration Web page, users select content they desire. Once selected, the content is broadcast over a new radio receiver solution developed by Microsoft and beamed to the watch.
Bill Gates announced the watches in his keynote address at the 2003 Consumer Electronics Show in Las Vegas. The watches will be low-power and low-cost, will perform core functions, such as auto-time adjustment based on location, and will have customizable watch faces with SPOT-enhanced software.
The watches will receive data from MSN Direct, a new wireless service that Microsoft said will be available in more than 100 of the largest population centers in North America, representing cities in all 50 states and the largest cities in Canada.
The watches will receive personal messages via MSN Messenger and calendar appointment reminders from Microsoft Outlook. Pricing for MSN Direct Customers is available in two options: a monthly subscription rate of $9.95 per month with the first month free, or an introductory offer of $59 for a full year of service.
Let "Honeytokens" Catch Attackers
Network administrators have long used "honeypots" to attract electronic attacks, which help them better understand network vulnerabilities. Typically a honeypot is an exposed computer or other information resource that draws attackers.
Now network administrators may consider using "honeytokens" to do the same thing. A honeytoken is smaller -- a credit card number, an Excel spreadsheet, a PowerPoint presentation, a database entry, or even a bogus login and password -- that has no use, so anybody accessing the honeytoken is up to no good.
Administrators can create a honeytoken of a false Social Security number in a database, and if the bogus number is accessed, the administrator knows an attacker is violating system security.
Alternatively, a Word document, PDF file, or Excel spreadsheet can be inserted into file, Web or e-mail servers embedded with unique names or tags. If administrators see those honeytokens traversing their networks, they'll know employees or someone on the internal network is accessing files without authorization to.
Honeytokens are not designed specifically to detect blackhats or prevent attacks, but are a flexible and simple tool with multiple security applications. When honeytokens are scattered throughout a network and someone accesses them, administrators know they have a security problem.
Perhaps the biggest advantage for network administrators is honeytokens' cost --practically zero. In tight budget times, honeytokens could offer a thrifty and effective way to watch for network attacks. -- Excerpted from "Honeytokens: The Other Honeypot," part of a series of papers by Lance Spitzner on SecurityFocus Online. For the complete paper, visit
National Cancer Institute Creates Online Maps
WASHINGTON, D.C. -- The National Cancer Institute (NCI) has created a series of Section 508-compliant maps showing cancer mortality rates for the United States.
The NCI maintains a massive database containing mortality information for 40 different cancers for all 50 states, more than 3,000 counties and Washington, D.C.
The NCI Cancer Mortality Maps and Graphs site allows visitors to view customized maps showing cancer mortality rates at the state, county or economic area level for any of the 40 listed cancers. Mortality rates also are tracked and sorted by age, gender, time period and race.
Information contained in the charts, graphs and maps is accessible to the blind and visually challenged