Overwatch's Torbjorn Is Being Nerfed, Here's How and When
June 26, 2016 12:59
Overwatch‘s Torbjorn character is being nerfed–but not so soon.
Game director Jeff Kaplan said in a Reddit thread titled “Torbjorn is utterly ruining the game on PS4” that a patch next month will reduce the character’s effectiveness substantially.
“In an upcoming patch, we will reduce the damage done by Torbjorn’s turret by 30% on Xbox One and PS4. PC will remain unchanged,” he explained (via Kotaku).
The update will come out in “mid to late July,” Kaplan said. The exact timing will depend on certification processes from Sony and Microsoft.
Torbjorn is a defense-focused character. His arsenal includes a rivet gun and a hammer. As mentioned, he can also build upgradeable turrets–but they won’t be as deadly for much longer.
For more on the character and how to play him best, check out the video above.
Source link
Reputation Management 911: Defuse Online Attackers & Disarm Dishonest Competitors (English Edition)
June 26, 2016 12:43It Only Takes A Second…
A world famous singer viciously beats his celebrity girlfriend and the horrendous pictures of his victim are distributed all over the Internet.
A comedian is filmed engaging in a racist outburst and the video is downloaded millions of times.
A once reputable organization is vilified online for threatening to sue a low-income family because their grandson illegally downloaded some songs on the web.
What do these stories all have in common?
These reputation damaging accounts received a massive level of online exposure and publicity that can be directly attributed to advances in technology. And, although these are not recent events, the stories, videos and pictures are still widely available to anyone with Internet access and a cursory familiarity with Google.
Have you heard the old adage that it only takes a second to destroy a reputation?
Well here’s the 21st century version…
It only takes a second to destroy a reputation built over a lifetime, everyone will know about it within the next couple of hours, and the evidence will reside online forever.
If you and your reputation are going to survive, you’d better be prepared to defend yourself, your family and your company by any means necessary. That’s where this book comes in.
The speed in which the Internet can expose and amplify a negative story is so powerful that you must be in a position to respond quickly and appropriately. Making a decision when emotions are running high and time is short is never a smart move, so you can only do this effectively if you already have a strategy in place.
Get ready and have your strategy prepared by reading Reputation Management 911: Defuse Online Attackers & Disarm Dishonest Competitors.
Resident Evil 7 não se trata de um reboot, garantem os produtores do jogo
June 26, 2016 8:58
Foi publicada uma entrevista com o produtor Masachika Kawata e o diretor Koushi Nakanishi de Resident Evil 7 no site da Capcom Unity, onde ambos conversaram um pouco mais sobre este novo capitulo da franquia, e fizeram questão de afirmar que o game não será um reboot, mas sim uma continuação de todos os eventos que acompanhamos durante os últimos anos. Nakanishi disse o seguinte:
“Não é um reboot e não estamos deixando de lado a parte canônica da história. É um novo game numerado da série e é uma sequência dos jogos existentes na linha principal. Depois de eu dizer isso, provavelmente irão jogar a demo e me dirão ‘é sério’? porque não se parece com nada que já tenhamos visto’ mas acredite em mim.”
Além disso, Nakanishi disse que chegaram a realizar protótipos diferentes do game em outras perspectivas, e que o formato em 1ª pessoa foi o que mais agradou.
“Estávamos confiantes de que este era o caminho que devíamos seguir. Ficamos muito satisfeitos com a forma como nos sentimos com Resident Evil em primeira pessoa.“
O novo game da franquia têm dado o que falar pela internet, e o hype aumenta consideravelmente cada vez que temos novidades sobre o mesmo – e eu já não vejo a hora deles revelarem mais detalhes sobre a nova história. Nós do Combo Infinito jogamos a demo do game, e você pode conferi-la no vídeo abaixo:
Resident Evil 7 será lançado no dia 24 de Janeiro de 2017, com versões para Xbox One, PS4 e PC.
Source link
So Hey You Should Stop Using Texts for Two-Factor Authentication
June 26, 2016 8:54
Since two-factor authentication became the norm for web services that care about securing your accounts, it’s started to feel like a security blanket, an extra layer keeping your data safe no matter whether your password is as strong as 8$&]$@I)9[P&4^s or as dumb as dadada. But a two-factor setup—which for most users requires a temporary code generated on, or sent to, your phone in addition to a password—isn’t an invincibility spell. Especially if that second factor is delivered via text message.
The last few months have demonstrated that SMS text messages are often the weakest link in two-step logins: Attacks on political activists in Iran, Russia, and even here in the US have shown that determined hackers can sometimes hijack the SMS messages meant to keep you safe. Whenever possible, it’s worth taking a minute to switch to a better system, like an authentication smartphone app or a physical token that generates one-time codes. And for services like Twitter that only offer text messages as a second factor, it’s time to wake up, smell the targeted attacks, and give users better options.
“SMS is just not the best way to do this,” says security researcher and forensics expert Jonathan Zdziarski. “It’s depending on your mobile phone as a means of authentication [in a way] that can be socially engineered out of your control.”
That kind of social engineering is more than hypothetical. Earlier this month, Black Lives Matter activist DeRay McKesson found that his Twitter account was hacked to tweet pro-Donald Trump messages, despite having two-factor authentication in place. The hackers, as he tells it, had called up Verizon, impersonated him, and convinced the company to redirect his text messages to a different SIM card, intercepting his one-time login codes. And activists in Iran and in Russia both recently found that their Telegram accounts were being hacked, likely by state-owned telecom companies helping those authoritarian governments to hijack the SMS messages Telegram uses to log users in.
In fact, one doesn’t have to be a public figure to become a target. As password security expect Lorrie Cranor suffered a related hack, she noted that these “SIM swap” attacks have grown prevalent enough to prompt New York State to issue an official warning.
Adding a layer of SMS-based verification to your login process is certainly better than relying on a password alone. But Zdziarski goes so far as to argue that two-factor authentication using SMS text messages isn’t technically two-factor at all. The idea of two-factor authentication, he points out, is to test someone’s identity based on something they know (like a password) and something they have (like their phone or another device.) Better tools like Google Authenticator or an RSA token prove that possession, by generating a unique code that matches one generated on a web service’s server. It’s a test that, thanks to some clever crypto tricks, doesn’t involve any communication between the two computers. That’s far more effective than sending a text message with a one-time code to someone’s phone. It’s less convenient, though, which may be why it’s also less commonplace.
“SMS has turned that ‘something you have’ into ‘something they sent you,’” says Zdziarski. “If that transaction is happening, it can be intercepted. And that means you’re potentially at some level of risk.”
Tactics like social-engineering or strong-arming the phone company to subvert two-factor comprise only a fraction of SMS vulnerabilities. Fake cell phone towers known as IMSI catchers or “stingrays” can intercept text messages, too. And the security community has recently been calling attention to weaknesses in SS7, the protocol that allows telecom networks to communicate with each other. Hackers can exploit SS7 to spoof a change to a user’s phone number, intercepting their calls or text messages. “Any network can tell any other network ‘your subscriber’s here now,’ and until your phone says otherwise, every call and text is diverted to this other network,” says Karsten Nohl, the chief scientist at Security Research Labs, who recently demonstrated the attack for 60 Minutes. “If there’s an attacker, they get all your text messages. it’s completely trust-based…It’s so simple it’s almost embarrassing to call it a hack.”
Those attacks aren’t exactly easy to pull off, and likely require the attacker to figure out the user’s cell phone number in addition to the password that they’ve stolen, guessed, or reused after being compromised in a data breach from another hacked service. But for anyone who might be a target of sophisticated hackers, all of those techniques mean SMS should be avoided when possible for anything login-related.
Luckily, plenty of services offer better options. Google last week launched Google Prompt, a service that sends a second-factor login prompt directly from its servers to Android phones or to the Google Search app for iOS. But even more secure still are systems that don’t require any message to be sent at all. Apps like Google Authenticator and tokens like those sold by RSA generate one-time-password codes that change ever few seconds. Those same exact codes are generated on the servers run by services like Slack, WordPress, or Gmail, so that the user can cough up the code to prove their identity without it ever being sent over the internet. (The math behind that system is clever: When the user signs up for the service, the Google Authenticator app and the server both start with a seed value that’s transformed into a long, unique string of characters with a “hash”—a mathematical function that can’t be reversed. Then that string of characters is hashed again, and results are hashed again, repeating every few seconds. And only a few digits of those characters are displayed as the login code, so that no one who glances at a user’s phone can start their own hash chain.)
Unfortunately, some services like Twitter still only offer two-factor authentication via text message. But the embarrassment of high-profile hacks like DeRay McKesson’s account may have had some effect. Twitter tells WIRED in a statement that “we’re exploring additional ways to make sure your account stays secure.” In other words, Twitter, like other services that store your sensitive data, may soon be offering a second-factor option other than the rickety telephone line that SMS represents. And security-conscious users should take it.
Source link
Aplicativos Moveis. Aplicativos
June 26, 2016 8:43
Compre agora!
R$ 20,80
O objetivo deste livro é auxiliar o desenvolvedor de softwares a incluir, melhorar ou simplesmente avaliar os aspectos da aplicação tratados no ambiente em desenvolvimento. Pode ser usado também para a implantação de sistemas criados com a plataforma .NET da Microsoft.Desenvolvimento de Sistemas é uma das áreas mais afetadas pelos aspectos de segurança, e muitos desses problemas existentes hoje em dia não são físicos, nem de procedimentos, mas sim erros de programação e codificação.Este livro apresenta uma ferramenta da Microsoft chamada Visual Studio.NET, que auxilia no desenvolvimento de sistemas aplicativos móveis .NET usando a linguagem C#.NET com segurança, padrão e produtividade.
USB Lock 1.2
June 26, 2016 7:32
USB Lock allows you to password protect and secure USB drives, External drives, Memory cards, SD cards and all other types of external storage devices. It uses the most advanced techniques of data leak prevention to safeguard your data, ensuring maximum security with minimal effort.
Important! USB Lock can be installed on a USB-drive only. The software provides a Lifetime license and free upgrades!
Source link
Pac-Man Championship Edition 2 seems to be a thing
June 26, 2016 4:57
The original Pac-Man Championship Edition revitalised the dot-munching yellow pizza offcut…thingy with beautiful art, a pumping soundtrack, and some clever twists on the traditional Pac-Mechanics. I’m very glad there’s (probably) going to be another one, then, in the form of Pac-Man Championship Edition…2.
Such a thing has been spotted by Twitter user lifelower on the Korean Ratings board, for PC, PS4 and Xbox One. There’s no projected release date, and no word on how it will build on the expanded DX version of the first game, which is coincidentally quite cheap in the Steam sale.
Bandai Namco recently released Pac-Man 256 on PC—an endless, Crossy Road-ish take on Pac-Man made by Crossy Road developer Hipster Whale. Here’s the launch trailer:
(Thanks, Eurogamer.)
Source link
Desenvolvimento de Aplicações Profissionais em Android
June 26, 2016 4:42
Compre agora!
R$ 116,08
O mercado móvel apresentou em 2013 uma grande hegemonia dos dispositivos Android com mais de metade da quota de mercado na venda de dispositivos móveis. A Google Play, loja online de aplicações Android, registou em 2013 mais de 1 milhão de aplicações e mais de 50 biliões de downloads foram feitos. No fim do ano, a Google lançou o Android KitKat (versão 4.4) juntamente com o seu novo smartphone, o Nexus 5. Estes números impressionam e são o mote para a escrita desta obra, que tem como objetivo partilhar conceitos avançados no desenvolvimento de aplicações profissionais para dispositivos Android. A linguagem de programação usada é o Java e o ambiente de desenvolvimento onde foram escritos todos os exemplos da obra, compatíveis com a versão 4.x do Android, é o Eclipse. No seguimento da obra anterior do mesmo autor, Android – Introdução ao Desenvolvimento de Aplicações, esta é, também, uma obra fundamental e de leitura obrigatória para profissionais da área da programação móvel; professores e alunos de disciplinas de computação móvel que queiram obter um suporte teórico-prático sobre a programação para dispositivos móveis; e para todas as pessoas que se interessam pelas novas tecnologias e queiram tirar partido do seu dispositivo móvel. Esta obra disponibiliza ainda a correspondência dos principais termos técnicos para o Português do Brasil. Livro segundo o novo Acordo Ortográfico
Qual é o segredo do Vale do Silício?
June 26, 2016 3:29
Na verdade, não existe segredo. Costumo dizer que existem três pontos que fazem da região um sucesso. O primeiro deles é o conhecimento. O Vale do Silício possui várias excelentes Universidades, entre elas a Stanford University, uma das instituições mais prestigiadas mundialmente e sabemos que a troca de conhecimento deriva grandes ideias. O segundo segredo para o sucesso são as empresas compradoras de tecnologia, que estão de olho nas pequenas pelo potencial de criarem projetos inovadores e se tornarem grandes conglomerados, impulsionando o chamado Corporate Venture.
O terceiro para completar a tríade são os investidores a procura de bons negócios. Muitos deles pessoas físicas que tiveram sucesso nos primeiros empreendimentos na região e de investidores de outros setores e regiões que viram no polo gerador de negócios do Vale do Silício algo a ser explorado, ou seja, a concentração financeira ficou gigante. Sintetizando, o segredo está na área acadêmica que gera conhecimento, o nicho de pessoas dispostas a investir no risco e a experiência de grandes empresas de olho nas startups. O Vale do Silício é um professor disposto a ensinar e o que nos compete é o aprendizado do modus operandi.
O Brasil está próximo de algo semelhante do Vale do Silício tendo em vista o crescimento do número de startups, de espaços inovadores com a proposta de coworking, aceleradoras e do movimento do Corporate Venture, propiciando o desenvolvimento de novos negócios. Exemplos clássicos deste movimento são os estados de Goiás, São Paulo, Santa Catarina e Minas Gerais – o último com a conhecida Santa Rita do Sapucaí.
Atualmente, grandes empresas tradicionais no Brasil têm buscado novas formas de inovar com o auxílio das startups de equity crowdfunding, que se tornaram fontes alternativas de investimento e uma oportunidade para o crescimento do chamado Corporate Venture. O fenômeno é caracterizado pelo investimento das grandes corporações em negócios nascentes e isolados e que, futuramente, podem ser incorporados aos próprios negócios do grupo empresarial.
Outro ponto importante para ser considerado é o movimento inverso do Vale do Silício. E se sou uma pequena empresa no mercado? Aproveitar os segredos da região da Califórnia é saber que a grande onda disruptiva está nas soluções digitais e o movimento para conseguir destaque é saber aliar-se. Networking com outras empresas inovadoras e a busca por apoio de uma base forte acadêmica ou conhecimento é tão importante para uma empresa tradicional quanto para as que estão começando agora.
A sugestão para as pequenas está na oferta de participação societária para o desenvolvimento do negócio. A nossa cultura é muito recente em relação ao desenvolvimento da rede de alianças – os conhecidos conglomerados. As pequenas precisam identificar este movimento na busca por potenciais investidores, oferecendo a eles participação como forma de incentivo. Você pode notar que qualquer startup bem sucedida ou em crescente expansão possui aliados. Comece a perceber o quadro societário e descubra o diferencial de se ter uma rede apoiadora.
A Prime Systems, empresa do Grupo Seculus, especializada em soluções de mobilidade, é um exemplo desse movimento de mirar os negócios digitais e levar soluções para fora do Brasil por meio de alianças com empresas interessadas no negócio dela. Outro exemplo de startup que cresceu é a goGeo, que começou incubada dentro de uma Universidade, habilitou a plataforma dela junto com o conhecimento dos clientes da PC Sistemas e, por meio disso, criaram uma nova plataforma de inteligência geográfica. No primeiro mês de operação, diversos clientes já optaram por ela.
O Vale do Silício traz histórias inspiradoras de líderes globais, que sabiam muito bem aproveitar os segredos da região e aplicar aos negócios. O DNA empreendedor não nasce apenas de mentes brilhantes, mas de alunos atentos, que sabem identificar o movimento.
*Allan Pires é CEO da multinacional dinamarquesa Targit para a América Latina.
Fonte
By the title, I thought that it would burn CD & DVD and not Blu ray discs since it is not mentioned. If it can burn Blu ray discs then that is an important item to include with the description.
ImgBurn. Always free, always better.
|
Comment by marksg
–
Last hour
–
Did you find this comment useful? yes | no
(+2)
For what I burn, the free CDBurnerXp does all I need.
|
Comment by PhilS
–
Last hour
–
Did you find this comment useful? yes | no
(+2)
Hi everybody.
No easy-to-find address of this developer, neither on its website nor through whois services.
Still it wants your name, surname, address, city, nation, email, etc, when you are trying to buy its services (on avangate.com).
I’ll admit this time I haven’t downloaded, scanned, tried and uninstalled this software.
Thanks anyway!
|
Comment by xilolee
–
2 hours ago
–
Did you find this comment useful? yes | no
(+4)
Installed program, tried to burn data disk, most of the on-screen options were missing and the program would not work.
DELETED! Thanks anyway.
Very quick download, registration given in the Read Me file, no having to fill in personal details. Works perfectly on Windows 10 64bit and has a nice simple UGI. It is similar to Ashampoo Burning studio in both looks and operation. I tried out some of the options an both DVD and Blu ray discs and it worked perfectly. It’s a keeper. Thanks GOTD and Coolmedia.