Apr 95 Newsbits
Volume Number: | | 11
|
Issue Number: | | 4
|
Column Tag: | | Newsbits
|
Newsbits
By Scott T Boyd, Editor
New NeoLogic
NeoLogic Systems announced the release of NeoAccess 3.1, an update of NeoLogics cross-platform object database engine. This latest release includes full support for all Unix platforms in addition to the Windows, Macintosh and DOS support provided in previous releases.
NeoAccess 3.1s new features include full support for all Unix platforms, enhancements to the metaclass facility (including the ability to add members), improved support for dynamically adding and removing indices from a class, improvements in consolidated index support, and even more powerful object iterator support.
The NeoAccess Developers Toolkit sells for $749 per developer (no runtime licensing fees). It includes full source code, sample applications, 450+ pages of docs, and 30 days of online technical support.
Credit card orders (800) 799-4737. Save an additional $100 if you purchase the product off the Internet (ftp://ftp.neologic.com/users/neologic/neoaccess.sea.hqx), Metrowerks CodeWarrior or Symantecs Developers Advantage CD-ROMs.
NeoLogic Systems 1450 Fourth St., Suite 12 Berkeley, CA 94710 (510) 524-5897 voice, (510) 524-4501
fax, neologic@neologic.com, http://www.neologic.com/~neologic/
Version Control
Barking Dog Software Co. has released Version Control for both PowerMac and 68K Macintosh systems. Version Control is a stand-alone program for source code and document revision control and release management. It allows users to recover past versions of single files or easily extract entire releases composed of hundreds of files using a snapshot feature. The software allows easy tracking of who made file changes, when the changes were made, and why the changes were made. A complete audit trail of the file history is available for bug tracking, specific version source reconstruction and change management. Version Control utilizes Drag & Drop for check-ins.
A single user license of Version Control is $199, 2 users $249, 3-5 users $349, and 6-10 users $499.
Barking Dog Software Co., 4822 Santa Monica Ave., Suite 179, San Diego, CA 92107. (619) 222-8361, calltree@aol.com.
Mercutio - Powerful, Cheap MDEF
Digital Alchemy announces the release of version 1.2 of the Mercutio, available from any info-mac site, including
ftp://ftp.hawaii.edu//mirrors/info-mac/dev/mercutio-mdef-12.hqx
The Mercutio MDEF allows developers to easily extend the power of their application menus. Menus may have multiple-modifier key-equivalents (e.g. shift-command-C), custom icons, item callbacks, and other goodies. Mercutio includes System 7s Balloon Help and True Gray, Color menus, Small and large icons, SICNs in hierarchical menu items, and 99% compatible with the standard MDEF.
Major feature additions and changes since 1.1.5 are:
- Support for non-printing keys (function keys, page up/down, arrow keys, etc)
- Support for icon suites
- Support for all 4 modifier keys (command, shift, option, control)
- Removed command-key requirement
- User-definable style mapping: developer determines which style bits are used as feature flags
- Dynamic items: items whose contents change depending on what modifier keys are being held down (e.g. when the option key is held down, Save becomes Save All).
- Application callback routine to let you decide on the fly what the item contents should be.
The Mercutio MDEF works with System 6.0.4 or later, with or without Color QuickDraw. Mercutio is fully compatible with System 7, and supports all the features of the System MDEF. Integrating the MDEF into your program shouldnt take more than 15 minutes.
The documentation for Mercutio is in Adobes Acrobat format. To obtain a free Acrobat reader application, FTP from:
ftp://ftp.adobe.com/pub/adobe/Applications/Acrobat/Macintosh/AcroRead.sea.hqx
Developers may use Mercutio free of charge as long as they give credit in the About box and documentation, and send a copy of the final program (including future upgrades for as long as they use the MDEF). Other licensing terms are available.
ShareWare Authors Take Note
CompuServe offers a Shareware Registration service (GO SWREG) as part of its basic services. CompuServe provides a convenient, secure distribution and support environment for both shareware developers and users. Nearly 4,000 authors participate in the registration service.
CompuServe members simply look up the software online that they want to register and follow on-screen instructions. The cost of the product appears on their next CompuServe bill. CompuServe offers developers a convenient way to track registrations. The developer interface permits varied shipping & handling pricing based on the users location. Developers can edit and update their product descriptions as needed.
CompuServe members often help with the development process as beta testers. The Shareware Beta Forum (GO SWBETA) allows shareware authors to test applications prior to release. The Association of Shareware Professionals (ASP) manages a forum on CompuServe. A number of authors use the shareware registration service to get access to sales they might not have made otherwise.
MacTech Magazine Seen On the Web
Get1Resource, Carl Haynes Web zine for Mac programmers, included the following tidbit, The January issue of MacTech Magazine included CDs to encourage developing of parts for both OpenDoc from CIL, and OLE from Microsoft. I poked around a little with the OpenDoc stuff, and like probably 90% of the readers threw my OLE disk into my pile of CDs that Ill never look at again. http://www.asel.udel.edu/~haynes/g1r.html
EFF Fights for Cryptography Rights
In a move aimed at expanding the growth and spread of privacy and security technologies, the Electronic Frontier Foundation is sponsoring a federal lawsuit seeking to bar the government from restricting publication of cryptographic documents and software. EFF argues that the export-control laws, both on their face and as applied to users of cryptographic materials, are unconstitutional.
EFF believes that cryptography is central to the preservation of privacy and security in an increasingly computerized and networked world. Many of the privacy and security violations alleged in the Kevin Mitnick case, such as the theft of credit card numbers, the reading of other peoples electronic mail, and the hijacking of other peoples computer accounts, could have been prevented by widespread deployment of this technology. The U.S. government has opposed such deployment, fearing that its citizens will be private and secure from the government as well as from other vandals.
The plaintiff in the suit is a graduate student in the Department of Mathematics at the University of California at Berkeley named Daniel J Bernstein. Bernstein developed an encryption equation, or algorithm, and wishes to publish the algorithm, a mathematical paper that describes and explains the algorithm, and a computer program that runs the algorithm. Bernstein also wishes to discuss these items at mathematical conferences and other open, public meetings.
The problem is that the government currently treats cryptographic software as if it were a physical weapon and highly regulates its dissemination. Any individual or company who wants to export such software - or to publish on the Internet any technical data such as papers describing encryption software or algorithms - must first obtain a license from the State Department. Under the terms of this license, each recipient of the licensed software or information must be tracked and reported to the government. Penalties can be pretty stiff - ten years in jail, a million dollar criminal fine, plus civil fines. This legal scheme effectively prevents individuals from engaging in otherwise legal communications about encryption.
The lawsuit challenges the export-control scheme as an impermissible prior restraint on speech, in violation of the First Amendment. Software and its associated documentation, the plaintiff contends, are published, not manufactured; they are Constitutionally protected works of human-to-human communication, like a movie, a book, or a telephone conversation. These communications cannot be suppressed by the government except under very narrow conditions - conditions that are not met by the vague and overbroad export-control laws. In denying people the right to publish such information freely, these laws, regulations, and procedures unconstitutionally abridge the right to speak, to publish, to associate with others, and to engage in academic inquiry and study. They also have the effect of restricting the availability of a means for individuals to protect their privacy, which is also a Constitutionally protected interest.
More specifically, the current export control process:
allows bureaucrats to restrict publication without ever going to court;
provides too few procedural safeguards for First Amendment rights;
requires publishers to register with the government, creating in effect a licensed press;
disallows general publication by requiring recipients to be individually identified;
is sufficiently vague that ordinary people cannot know what conduct is allowed and what conduct is prohibited;
is overbroad because it prohibits conduct that is clearly protected (such as speaking to foreigners within the US);
is applied overbroadly, by prohibiting export of software that contains no cryptography, on the theory that cryptography could be added to it later;
egregiously violates the First Amendment by prohibiting private speech on cryptography because the government wishes its own opinions on cryptography to guide the public instead; and
exceeds the authority granted by Congress in the export control laws, as well as exceeding the authority granted by the Constitution.
If this suit is successful in its challenge of the export-control laws, it will clear the way for cryptographic software to be treated like any other kind of software. This will allow companies to build high-quality security and privacy protection into their operating systems. It will also allow computer and network users, including those who use the Internet, much more freedom to build and exchange their own solutions to these problems, such as the freely available PGP encryption program. And it will enable the next generation of Internet protocols to come with built-in cryptographic security and privacy, replacing a sagging part of todays Internet infrastructure.
Civil Action No. C95-0582-MHP was filed in Federal District Court for the Northern District of California. EFF anticipates that the case will take several years to win. If the past is any guide, the government will use every trick and every procedural delaying tactic available to avoid having a court look at the real issues. Nevertheless, EFF remains firmly committed to this long term project. Once a court examines the issues on the merits, the government will be shown to be violating the Constitution, and that its attempts to restrict both freedom of speech and privacy will be shown to have no place in an open society.
Full text of the lawsuit and other paperwork filed in the case is available from the EFFs online archives. The exhibits which contain cryptographic information are not available online, because making them publicly available on the Internet could be considered an illegal export until the law is struck down. See http://www.eff.org/pub/EFF/Policy/Crypto/ITAR_export/Bernstein_case/