Aller au contenu

FGR*

Plein écran

FGR* Blog

April 3, 2011 21:00 , par Inconnu - | No one following this article yet.

Seven: The Days Long Gone is a gorgeous feat of world design

May 2, 2016 9:02, par FGR* Blog

From a technical perspective, Shadow Warrior 2 is the prettiest game I saw at PAX East, but if we’re talking design and scope, Seven: The Days Long Gone is even more astounding. Its tiny, isometric-style world creates the sense that I’m hovering over a model world splayed out across the floor of an aircraft hanger, filled with little lights, rivers, fog machines, and animatronics.

As its delicate little hero, I climbed around pipes and through windows, up and down a vertical city that looks like ruins built on ruins, with concrete and metal and snaking tree roots intertwined. When I handed off the controller to a more experienced dev, he sneaked out of the city and into the wilds of the prison island Seven takes place on, through toxic wastes and past deep canyons.

Right from the start, players will be able to go anywhere, so long as they don’t get caught without the necessary paperwork. As a prisoner on this island, your rights are restricted, but you’re also a master thief. So if you want to do a sidequest to earn a visa to travel to a new place, you can do that, but if you want to break into the visa office and murder the agents there to steal one, that’s cool too. Or you can just climb over the walls.

Developer Fool’s Theory includes some former Witcher 3 developers, and the experience is apparent, though it’s early days for Seven. I got to fight with a simple real-time combat system—lock-on and start beating ‘em up with melee and ranged weapons—but didn’t see anything more advanced than simple combos. How character progression might work, if there are character stats at all, is unclear. And how free we’ll be to finish the main storyline our way isn’t decided either. I asked if we could kill vital story NPCs, and got no answer either way.

Project lead Jakub Rokosz did, however, give me a nice summary of the world and design when I chatted with him at PAX East last week. Watch that interview in the video above, and the first trailer here. Seven will be out ‘when it’s done.’


Source link

Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms

May 2, 2016 8:55, par FGR* Blog

A smoke detector that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can be programmed from your smartphone sounds convenient, too. But when a piece of malware can trigger that fire alarm at four in the morning or unlock your front door for a stranger, your “smart home” suddenly seems pretty dumb.

The security research community has been loudly warning for years that the so-called Internet of Things—and particularly networked home appliances—would introduce a deluge of new hackable vulnerabilities into everyday objects. Now one group of researchers at the University of Michigan and Microsoft have published what they call the first in-depth security analysis of one such “smart home” platform that allows anyone to control their home appliances from light bulbs to locks with a PC or smartphone. They discovered they could pull off disturbing tricks over the internet, from triggering a smoke detector at will to planting a “backdoor” PIN code in a digital lock that offers silent access to your home, all of which they plan to present at the IEEE Symposium on Security and Privacy later this month.

“If these apps are controlling non-essential things like window shades, I’d be fine with that. But users need to consider whether they’re giving up control of safety-critical devices,” says Earlence Fernandes, one of the University of Michigan researchers. “The worst case scenario is that an attacker can enter your home at any time he wants, completely nullifying the idea of a lock.”

Unlocking Doors

The Microsoft and Michigan researchers focused their testing on Samsung’s SmartThings platform, a networked home system that’s in hundreds of thousands of homes, judging by Google’s count of downloads of its Android app alone. What they found allowed them to develop four attacks against Samsung’s system, taking advantage of design flaws that include badly controlled limitations of apps’ access to the features of connected devices, and an authentication system that would let a hacker impersonate a legitimate user logged into the SmartThings cloud platform.

In the most severe of their proof-of-concept attacks, the researchers found they could exploit SmartThings’ flawed implementation of a common authentication protocol known as OAuth. The researchers analyzed an Android app designed to control SmartThings services, and found a certain code—meant to be secret—that let them take advantage of a flaw in the SmartThings web server known as an “open redirect.” (The researchers declined to name that Android app to avoid helping real hackers replicate the attack.)
The researchers exploit that inconspicuous bug to pull off an intrusion worse than merely picking a lock: it plants a backdoor in your front door. First they trick a smart-home-owning victim into clicking on a link, perhaps with a phishing email purporting to come from SmartThings support. That carefully crafted URL would take the victim to the actual SmartThings HTTPS website, where the person logs in with no apparent sign of foul play. But due to the hidden redirect in the URL, the victim’s login tokens are sent to the attacker (in this case the researchers), allowing them to log into the cloud-based controls for the door lock app and add a new four digit PIN to the lock unbeknownst to the home owner, as shown in this video, sabotaging a Schlage electronic lock:

That malicious link could even be broadcast widely to SmartThings victims to plant secret backdoor codes in the locks of any SmartThings owner who clicked it, says Atul Prakash, a University of Michigan computer science professor who worked on the study. “It’s definitely possible to do an attack on a large number of users just by getting them to click on these links on a help forum or in emails,” says Prakash. “Once you have that, whoever clicks and signs on, we’ll have the credentials required to control their smart app.”

Bad Apps

The researchers admit that the other three of their four demonstration attacks require a more involved level of trickery: The attackers would have to convince their victim to download a piece of malware disguised as an app in Samsung SmartThing’s dedicated app store that would appear to simply monitor the battery charge of various devices on a SmartThings home network. The challenge there would be not just in getting someone to download the app but in smuggling an evil app into the SmartThings app store in the first place, a step the researchers didn’t actually attempt for fear of legal repercussions or compromising real peoples’ homes.

Due to what they describe as a design flaw in SmartThings’ system of privileges for apps, however, such a battery monitor app would actually have far greater access to those devices than SmartThings intended. With it installed, the researchers have demonstrated that an attacker could disable “vacation mode”—a setting designed to periodically turn lights on and off to make the owner appear to be at home—set off a smoke detector, or steal the PIN from the victim’s door lock and send it via text message to the attacker. Here’s a video demo of that PIN-stealing attack in action:

In a statement, a SmartThings spokesperson said that Samsung had been working with the researchers for weeks “on ways that we can continue to make the smart home more secure,” but nonetheless downplayed the severity of their attacks. “The potential vulnerabilities disclosed in the report are primarily dependent on two scenarios – the installation of a malicious SmartApp or the failure of third party developers to follow SmartThings guidelines on how to keep their code secure,” the SmartThings statement reads. The company, in other words, blames the authentication vulnerability that allowed the addition of a secret lock PIN on the Android app the researchers reverse-engineered to pull off their redirect attack.

“Regarding the malicious SmartApps described, these have not and would not ever impact our customers because of the certification and code review processes SmartThings has in place to ensure malicious SmartApps are not approved for publication. To further improve our SmartApp approval processes and ensure that the potential vulnerabilities described continue not to affect our customers, we have added additional security review requirements for the publication of any SmartApp.”

It’s a Privilege Problem

The researchers say, however, that their attacks would still work today as well as they did when they first approached Samsung; neither the Android app they reverse engineered to exploit the SmartThings authentication flaw nor the privilege overreach flaw itself has been fixed. And they argue that it would be tough for Samsung’s app reviewers to detect the sort of malware they created. None of the battery-monitoring app’s malicious commands were actually apparent in its code, they say, and could instead be injected from the server that controls the app when it’s past that code review and running on the victim’s device.

They analyzed 499 SmartThings and found that more than half of them had at least some level of privilege they considered overbroad, and that 68 actually used capabilities they weren’t meant to possess.

“The code is set up so we can very nicely push in the malicious stuff,” says Fernandes. “But you’d have to explicitly be looking for that.” As evidence that SmartThings owners would actually install their malware, they performed a survey of 22 people using SmartThings devices and found that 77 percent of them would be interested in that battery monitor app.

The researchers argue that the more fundamental issue in SmartThings’ platform is “overprivilege.” Just as smartphone apps must ask a user’s permission for access to his or her location, a SmartThings app that’s meant to check a lock’s battery shouldn’t be able to steal its PIN or set off a fire alarm, they argue. In fact, they analyzed 499 SmartThings and found that more than half of them had at least some level of privilege they considered overbroad, and that 68 actually used capabilities they weren’t meant to possess. “It only takes one bad app, and that’s it,” says Prakash. “They really need to fix this overprivilege issue.”

The broader lesson for consumers is a simple one, says Michigan’s Prakash: Approach the whole notion of a smart home with caution. “These software platforms are relatively new. Using them as a hobby is one thing, but they’re not there yet in terms of sensitive tasks,” he says. “As a homeowner thinking of deploying them, you should consider the worst case scenario, where a remote hacker has the same capabilities you do, and see if those risks are acceptable.”

Go Back to Top. Skip To: Start of Article.


Source link

iM-Magic Partition Resizer Server 2.6.3

May 2, 2016 7:37, par FGR* Blog

The IM-Magic Partition Resizer Server is designed for people to safely shrink or extend computer drive partition space when your computer partition is running out of space or gets low disk space error messages. It also helps repartition computer hard drive when your drive partitions are improperly divided.

Moreover, in daily use, it also help copy, delete, format, wipe, move or manage computer hard drive partitions without losing any important files. Overall, it is worth trying to manage your computer hard drive partitions perfectly.


Source link

Como fazer Cloud e Indústria 4.0 trabalharem em conjunto?

May 2, 2016 7:12, par FGR* Blog


O termo Indústria 4.0 originou-se de um projeto estratégico de alta tecnologia do governo alemão, sendo mencionado pela primeira vez na feira Hannover Messe, em 2012. Considerada a Quarta Revolução Industrial, o conceito engloba as principais inovações tecnológicas dos campos de automação, controle de dados e tecnologia da informação, aplicadas a processos de manufatura, além de considerar que as fábricas serão gerenciadas por sistemas cyber-físico no futuro.

Este novo movimento da indústria tem seis princípios básicos nas quais precisam e devem estar na agenda de prioridades do CIO. São elas:

▪ Capacidade de operação em tempo real – Consiste na aquisição e tratamento de dados de forma instantânea, permitindo a tomada de decisões em tempo real.

▪ Virtualização – Propõe a existência de uma cópia virtual das fabricas inteligentes. Permitindo a rastreabilidade e monitoramento remoto de todos os processos por meio dos inúmeros sensores espalhados ao longo da planta.

▪ Descentralização – A tomada de decisões poderá ser feita pelo sistema cyber-físico de acordo com as necessidades da produção em tempo real. Além disso, as máquinas não apenas receberão comandos, mas poderão fornecer informações sobre seu ciclo de trabalho.

▪ Orientação a serviços – Utilização de arquiteturas de software orientadas a serviços aliado ao conceito de Internet of Services.

▪ Modularidade – Produção de acordo com a demanda, acoplamento e desacoplamento de módulos na produção. O que oferece flexibilidade para alterar as tarefas das máquinas facilmente.

▪ Interoperabilidade – Capacidade dos sistemas cyber-físicos (suportes de peças, postos de reunião e produtos), humanos e fábricas inteligentes comunicar-se uns com os outros através da Internet das Coisas e da Internet.

A despeito do que é falado no mercado, que Internet das Coisas, Big Data e Segurança são os três pilares necessários que suportam esta nova corrente, na verdade, as tecnologias de Cloud Computing estão por trás destas sustentações e é uma parte fundamental para as indústrias a caminho do conceito 4.0.

Se olharmos as principais vantagens para o negócio na adoção do modelo na nuvem, que são agilidade, flexibilidade e colaboração – vemos como a modalidade se torna um complemento aos princípios da Indústria 4.0. É muito importante que o CIO , CTO e todo os C-level possíveis estejam alinhados com a estratégia e, sobretudo, saber qual tecnologia é mais favorável ao seu modelo de negócio.

Trazendo a tendência para o mercado de Cloud Públicas, temos atualmente dois dos principais líderes de mercado, leia-se AWS e Microsoft Azure, focados em diversas ofertas nos modelos IaaS, PaaS e SaaS com o intuito de atender os princípios da Indústria 4.0. Por exemplo, para implementar a capacidade de operação em tempo real pode-se usar na Azure o Machine Learning, um serviço no qual permite facilmente construir, implementar e compartilhar soluções de análise preditiva.

Há também a opção do Stream Analytics que pode desenvolver e implementar rapidamente soluções de baixo custo com o intuito de obter insights em tempo real a partir de dispositivos, sensores, infraestrutura e aplicações. O principio de Descentralização pode-se usar o Data Factory, módulo focado na movimentação e integração de dados de múltiplas fontes.

Analisando as ofertas da AWS podemos atender Orientação a serviços com toda sua gama de serviços EC2 (Compute), S3 (Storage) e RDS (Database) em conjunto com seu modelo de pagamento On-Demand ou Upfront. Para Interoperabilidade, o AWS IoT, plataforma que permite conectar os dispositivos com facilidade e segurança em caminhões, lâmpadas e esteiras, além de poder interagir com aplicativos em nuvens.

Em resumo, como temos uma variedade de ofertas e modelos, é muito importante que as áreas de negócio da indústria, tais como produção, logística, marketing, vendas e outras, consigam demonstrar claramente seus desafios com a indústria 4.0. Dessa forma, a área de TI consegue definir em conjunto os melhores fornecedores e serviços a fim de atender esta neo revolução industrial, fazendo o seu real papel, o de agente transformador da mudança.

*Bruno Faustino é diretor de tecnologia e novos negócios da Sonda IT


Fonte

GameTrailers.com: Story Trailer

May 2, 2016 5:01, par FGR* Blog

Please note that any reproduction of this video without the express written consent of GameTrailers is expressly forbidden.


Source link


The Investigative Challenges Of Live Streamed Child Abuse

May 2, 2016 4:54, par FGR* Blog

Monday, May 02, 2016 (06:07:34)

The Investigative Challenges Of Live Streamed Child Abuse

Among the challenges facing digital forensic investigators today, the instantaneous nature of online communication is arguably one of the most persistent. Trying to investigate whether a crime has occurred, and if so to bring its perpetrators to justice in a space that is constantly changing, is no simple task. With the Apple App Store alone reportedly growing by up to 1,000 applications per day, keeping up to date with the necessary methods of communication becomes increasingly difficult.

Just in the past twelve months, there have been instances of paedophiles using within-game messaging services to groom youngsters, as well as the wave of recent discussion regarding Isis’ purported use of encrypted messaging app Telegram to communicate.

For those whose specialism is investigating crimes against children, there is another element of online life that makes the job even more challenging: live streaming.

Read More


Source link

Deep Web 47 Success Secrets – 47 Most Asked Questions On Deep Web – What You Need To Know

May 2, 2016 4:51, par FGR* Blog



Compre agora!


First in its Deep Web field. There has never been a Deep Web Guide like this.

It contains 47 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the information you need–fast! This all-embracing guide offers a thorough view of key knowledge and detailed insight. This Guide introduces what you want to know about Deep Web.

A quick look inside of some of the subjects covered: Internet Watch Foundation, Digital library – Searching, Deep Web, Deep Web – Size, Agris: International Information System for the Agricultural Sciences and Technology – Searching for digital resources, Deep Web Technologies, Web spider – Crawling the deep web, Web crawling – Crawling the deep web, Aphex Twin – Syro and unreleased works: 2014–present, World Wide Web – Statistics, Federated search – Implementation, Google Instant – Non-indexable data, Web archiving – Crawlers, WorldWideScience, Office of Scientific and Technical Information – Science information resources freely available for public use, Web crawler – Crawling the deep web, Spokeo – Technology, Internet research – Search tools, Death Grips – 2012: The Money Store and No Love Deep Web, Open-source intelligence – Business, Deep Web – Classifying resources, Gary Price (librarian) – Life and work, Harvest Records – Discography, Childish Gambino – 2013–present: Because the Internet and Community departure, The web – Statistics, Death Grips – 2013–2014: Government Plates, The Powers That B and disbandment, Lego Alpha Team – Evil Orbs, Alex Winter – Theatrical feature films, Google Search Non-indexable data, Bleeding Edge – Major and recurring characters, TorSearch – Publicity, Donald Glover – 2013–present: Because the Internet and Community departure, and much more…



CAELinux

May 2, 2016 2:09, par FGR* Blog

CAELinux é uma distribuição, construída sobre um Xubuntu 12.04 x64 atualizado (LTS), com um conjunto completo de ferramentas de engenharia disponíveis gratuitamente para usuários de Linux.

A lista de softwares na distribuição é interessante: GEDA, Kicad, Fritzing, Arduino, dxf2gcode, cadpy, GNU Octave, QtOctave, Scilab, wxMaxima, R & rkward, Python Scipy e Spyder, Qt Creator, Arduino 1.0, LibreCAD, SagCad, FreeCAD 0,13, Salome 6.6, MeshLab, Blender, OpenSCAD, PyCAM 0.6, GCAM, Dxf2Gcode, Inkscape Gcodetools, e muito mais.

CAELinux



Canal FineAndroid

May 2, 2016 1:31, par FGR* Blog

Games, aplicativos, wallpapers e muito mais.

Canal FineAndroid



Canal I.T. Expert

May 2, 2016 1:19, par FGR* Blog

Cursos, livros e artigos sobre infraestrutura. Apenas conteúdos gratuitos.

Canal I.T. Expert