Feeds

Hacker pledges to re-enable Linux on PS3

Sony anti-hack firmware to be hacked

The Power of One Brief: Top reasons to choose HP BladeSystem

Hacker George Hotz, the guy who opened up the Sony PlayStation 3 earlier this year, has vowed to find a way to allow Linux buffs to install their favourite OS on the console after an upcoming firmware update renders this impossible.

Hotz wrote on his blog this week that he will devise a "custom version of 3.21 that doesn't lose Other OS support".

His reference to "Other OS support" is the option in the current PS3 firmware which allows older versions of the console - all those released before the introduction of the PS3 Slim in September 2009 - to be loaded and booted with Linux.

Sony announced this week that tomorrow's Firmware 3.21 will remove this option for security reasons.

Ironically, it's Hotz' hack that may have led Sony to decide to remove Linux support. The PS3 Slim - reviewed here - has never had this option. Undoubtedly, Sony fears the hack being used to play ripped off games.

Hotz, however, says putting Other OS support back "isn't about getting what you didn't pay for, it's about making sure you do get what you did.

"This is about more than this feature right now," he writes. "It's about whether these companies have the right to take away advertised features from a product you purchased. Imagine if an exploit were found in Safari on the iPhone, but instead of fixing it, Apple decides to pull web browsing altogether. Legally, they may be within their right to do so, but we have to show them it's the wrong move for the future of the product and the company." ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.