6567591
story
scruffybr writes
"Whether it's World War 2, the American Wild West or ancient Greece, history has long provided a rich source of video game narrative. Historical fact has been painstakingly preserved in some games, yet distorted beyond all recognition in others. Whereas one game may be praised for its depiction of history, others have been lambasted for opening fresh wounds or glorifying tragic events of our near past. Games have utilized historical narrative extensively, but to what extent does the platform take liberties with, and perhaps misuse it?"
4128759
story
Peter N. M. Hansteen writes
"In real life, zombies feed off both weak minds and the weak passwords they choose. When the distributed brute-force attempts stopped abruptly after a couple of months of futile pounding on ssh servers, most of us thought they had seen sense and given up. Now, it seems that they have not; they are back. 'This can only mean that there were enough successful attempts at guessing people's weak passwords in the last round that our unknown perpetrators found it worthwhile to start another round. For all I know they may have been at it all along, probing other parts of the Internet ...' The article has some analysis and links to fresh log data."
4108087
story
palegray.net writes
"Inspired by a recent Ask Slashdot, I've written a step-by-step tutorial for setting up an Openfire server on Debian Linux, for those interested in running their own open source collaboration server. Aimed at those just getting started with collaboration software, the tutorial shows precisely how to get Openfire up and running quickly on a base Debian install, and offers a basic feature tour of the software's plugin and IM gateway functionality."
1338025
story
CWmike writes
"Just a day after downplaying the vulnerability that caused it to issue an out-of-cycle patch last week, Microsoft warned customers late yesterday that exploit code had gone public and was being used in additional attacks. 'We've identified the public availability of exploit code that now shows code execution for the vulnerability addressed by MS08-067,' said Mike Reavey, operations manager of Microsoft's Security Response Center, in a post to the MSRC blog. 'This exploit code has been shown to result in remote code execution on Windows Server 2003, Windows XP, and Windows 2000.'"