Online divorcee jailed after killing virtual hubby
TOKYO â€“ A 43-year-old Japanese woman whose sudden divorce in a virtual game world made her so angry that she killed her online husbandâ€™s digital persona has been arrested on suspicion of hacking, police said Thursday.
Commercial Locks and Security | How-to Guides for running your business from Work.com
Protecting a business from loss due to theft and vandalism is a high priority for every business owner. This is true for every business, no matter what type of product or service it offers. For this reason, it's critical that business owners choose commercial locks, such as those manufactured by Schlage, that have proven themselves in the commercial lock industry for decades.
Revealed: The Internetâ€™s Biggest Security Hole
Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.
Red Hat Digital Keys Violated by Intruder
Just about the most serious breach of security possible at an OS vendor happened to this company. Red Hat is releasing updated OpenSSH packages to address the compromise of its internal systems.
Ten ways improve Vistaâ€™s security
Although Windows XP was Microsoftâ€™s preferred desktop operating system for an unprecedented length of time, it became something of a PR nightmare for the software giant.
Ajax Security Tools
In this article, learn application-strengthening tools, including Firefox tools and add-ons, which you can use to improve or solve security problems within your Ajax applications. Certain vulnerabilities within Ajax applications can allow hackers to reek havoc with your applications. These include identity theft, unprotected access to sensitive information, browser crashes, defacement of Web applications, and Denial of Service attacks.
Anatomy of Security-Enhanced Linux
Linux has been described as one of the most secure operating systems available, but the NSA has taken Linux to the next level with Security-Enhanced Linux (SELinux). In this article explore the ideas behind SELinux and how it's implemented. SELinux takes the existing GNU/Linux operating system and extends it with kernel and user-space modifications to make it bullet-proof.
Improve Security with Linux PAM
Linux Pluggable Authentication Module (PAM) can help you protect world-writeable shared directories from abuse. This article for Linux system administrators lays out the steps to enable namespaces with PAM. The pam_namespace module creates a separate namespace for users on your system when they login to protect users from several types of security attacks.
Role-based Access Control in SELinux
Learn how RBAC in SELinux acts as a layer of abstraction between the user and the underlying TE model, and how the three pieces of an SELinux context (policy, kernel, and userspace) work together to enforce the RBAC and tie Linux users into the TE policy.