privilege

ANZ Banking Group reveals major cyber defence overhaul

ANZ Banking Group reveals major cyber defence overhaul

Powered by 1.5 Petabyte analytics environment.
Jul 31 2018 12:00PM
Defence IT providers still make undocumented changes

Defence IT providers still make undocumented changes

But agency takes tighter control of user access privileges.
Jun 15 2018 11:23AM
NSW to relax content blocking on school netbooks

NSW to relax content blocking on school netbooks

Home privileges talked up as 60,000 new devices announced.
Mar 15 2010 2:10PM
EFF presses Obama on policy

EFF presses Obama on policy

Just days after his election to the presidency, Barack Obama is being lobbied by privacy advocates for stricter protections.
Nov 10 2008 3:16PM
Review: BeyondTrust Privilege Manager v3.5

Review: BeyondTrust Privilege Manager v3.5

In Unix it is important that there be multiple levels of administrator rights, and managing that with group permissions is pretty awkward. I recall wondering why there was not such a utility for Windows since, arguably, Windows has the same challenges with administrator rights in spades.
May 27 2008 3:51PM
Hot or Not: Local privilege escalation vulnerabilities

Hot or Not: Local privilege escalation vulnerabilities

Due to the interactive nature and required access to exploit, local privilege escalation vulnerabilities have traditionally been thought to have a minimal impact on the strategies enterprise IT departments incorporate to protect networks when compared to other code execution vulnerabilities.
Apr 12 2007 4:31PM
Microsoft sews XBox privilege vulnerability

Microsoft sews XBox privilege vulnerability

Microsoft has silently patched a privilege-escalation flaw in Xbox 360 that would have let users run operating systems and other programs on the popular gaming console.
Mar 7 2007 12:42AM
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Jul 27 2005 12:00AM

Log In

Email:
Password:
  |  Forgot your password?