In news that is sure to spike last minute sales of Grand Theft Auto: San Andreas as the insatiable gamers rush to get a copy of the PC version before Wal-Mart yanks it off the shelves, an investigation has been launched to determine if creator Rockstar Games intentionally encoded sexually explicit material within.
Historys Most Successful Hacker To Be Extradited
The United States has begun extradition proceedings for an alleged British hacker, accused of hacking into almost 100 US military and NASA computer networks.
Hacker Prevention Techniques
I remember when the term “hacker” referred to a computer geek who could transform a mundane electronic device, with a few modifications, into something completely different from what the manufacturer and designer had envisioned for it. In some cases, these were cool improvements and more than one of these hackers made a fortune selling the rights to them. In other cases, the transformation just made you wonder if the guy’s horn-rimmed glasses were a little too tight.
Windows: How to Protect a Hacker’s Favorite Target
Hacking incidents are on the rise – August 2002 was the most active month for hacking since the dawn of the Internet. The target? Primarily Windows systems. Formerly Linux systems were the hacker’s target of choice, but now they’re breaking their way in to the Windows OS.
One reason for the switch is that cracking a Linux server is a point of pride; Linux admins are typically security-conscious and pose a challenge to the intellectual hacker. With such ego-inflating attacks on the decline and criminal attacks on the rise however, Windows systems are more popular targets because they’re easier to break into. Microsoft releases warnings about security holes constantly, with patches following quickly. But how quickly are these patches located and applied? The lazy, criminal hacker hopes you’ll forget to patch and make his break in easy.