Larry Dignan

Larry Dignan is Editor in Chief of ZDNet and Editorial Director of ZDNet's sister site TechRepublic. He was most recently Executive Editor of News and Blogs at ZDNet. Prior to that he was executive news editor at eWeek and news editor at Baseline. He also served as the East Coast news editor and finance editor at CNET News.com. Larry has covered the technology and financial services industry since 1995, publishing articles in WallStreetWeek.com, Inter@ctive Week, The New York Times, and Financial Planning magazine. He's a graduate of the Columbia School of Journalism and the University of Delaware.

Zack Whittaker

Zack Whittaker was the security editor for ZDNet.

Stephanie Condon

Stephanie Condon is a staff writer for CBS Interactive based in Portland, Oregon, covering business technology for ZDNet. She previously covered politics for CBSNews.com, as well as the intersection of technology and politics for CNET. Stephanie graduated with a B.A. in communication from Stanford University.

Latest Posts

Scoble's 12 reasons for MS avoidance

Scoble's 12 reasons for MS avoidance

Responding to Ross Mayfield's post on Microsoft's challenges in pivoting into services world inhabited by Google and others (Microsoft's announcements on the subject coming later this morning), Microsoft alpha blogger Robert Scoble offers 12 reasons--such as start up costs, performance per dollar, no lock in, more scalable, more security, easier to customize--why Web 2.0 entrepreneurs say that they don't want to work with Microsoft software.

November 1, 2005 by in Microsoft

Sony Music CDs surreptitiously install DRM Trojan horses on PCs

Sony Music CDs surreptitiously install DRM Trojan horses on PCs

Reports are beginning to turn up around the Web that discuss how certain CDs from Sony Music come with a Trojan horse-based digital restrictions management (DRM) technology that surreptitiously installs itself as a rootkit on Windows PCs.   When software surreptitiously installs a rootkit, it's usually doing so to cover its tracks -- a technique commonly associated with malware such as viruses and Trojan horses.

November 1, 2005 by in Security

Apple: Not a DRM monopoly yet, but  behavior is monopolistic

Apple: Not a DRM monopoly yet, but behavior is monopolistic

In another blog entry that I published earlier today regarding how something as simple as the playback of one track of a music CD can result in the surreptitious installation of a Digital Restrictions Management (DRM) Trojan horse on your system, I also discuss how the DRM technology found on certain CDs is incompatible with Apple's DRM technology known as FairPlay.  The result of this incompatibility is that the music on DRM-protected CDs from Sony music cannot be loaded into iPods.

November 1, 2005 by in Apple

An antidote for blogs attacks

An antidote for blogs attacks

I don't want to address the Forbes cover story, "Attack of the Blogs," that characterized blogs as "the prized platform of an online lynch mob spouting liberty but spewing lies, libel and invective."  Long before blogs, plain old Web sites (POWS) were used to promote various agendas using underhanded techniques, joining print, radio, TV, etc.

October 31, 2005 by in Enterprise Software

Top Stories