Feeds

MS stops hacked hardware accessing Xbox Live

Tweaked DVD drive? No thanks

The Power of One Brief: Top reasons to choose HP BladeSystem

Microsoft has begun booting owners of modified-firmware Xbox 360 games consoles off of its Xbox Live online service, an array of postings on fan forums have revealed.

Microsoft's message to Xbox 360 hackers
Microsoft's message to Xbox 360 hackers who log on to Xbox Live

The move appears to centre on users who've patched their consoles' firmware to allow the built-in DVD drive to read games on non pre-recorded media. They argue it's to allow them to play back-up copies - Microsoft is presumably motivated to stop people playing unauthorised copies of games, many if not all of which are not back-ups made by folk who've paid for the title they've duplicated for their personal use.

A posting on Microsoft's own Gamerscore website reveals the move was prompted by the launch of the Halo 3 public beta this week. The software giant, it emerged, has a "no tolerance policy towards inappropriate behavior like hacking or cheating".

Xbox 360 owners who have tweaked their machines "will not have their account automatically banned from LIVE, but they will no longer be able to access the service from the console they modified", Microsoft said.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.