GameTrailers.com: Modes Trailer
Aprile 14, 2016 15:37
Please note that any reproduction of this video without the express written consent of GameTrailers is expressly forbidden.
Source link
Photoshop Creative #137
Aprile 14, 2016 15:28Officially the world’s best Photoshop magazine, Photoshop Creative is jam-packed with practical Photoshop advice and incredible step-by-step tutorials for all abilities and versions.
Linux AIO Zorin 11
Aprile 14, 2016 15:20Em comemoração a marca de 200000 downloads, os desenvolvedores do Linux AIO disponibilizaram o Linux AIO Zorin 11.
O Linux AIO Zorin 11 Live ISO contém o Zorin OS 11 Core de 64 bits, Zorin OS 11 Core de 32 bits e Zorin OS 11 Lite 32 de bits, além de dois utilitários: o primeiro permite verificar a memória do computador em busca de erros e o outro utilitário verifica a compatibilidade do sistema e hardware antes de instalar Zorin OS 11.
Nintendo NX more poweful than the PS4? Duh. Why wouldn't it be?
Aprile 14, 2016 11:36
The rumor consists of that the Nintendo NX will be more powerful than the PS4 by a “considerable amount.” What does that even mean? Well people are making it mean what they want it to mean. People who are anti-Nintendo or just looking for click-bait material are assuming that it means NX is just “somewhat” more powerful than the PS4 and that PS4K is somehow going to miraculously be leaps and about more powerful than that (some of these same people claimed that it was even impossible for NX to be more powerful than the NX last year.) Others are saying than NX will be leaps and bounds more powerful than PS4 and PS4K. This dilapidated way of thinking has no basis in fact or reality at all. We have no idea how powerful either of those consoles will be.
(Nintendo, Nintendo NX, PS4)
Source link
Ubuntu em Linha de Comando: Operação e Administração Eficiente do Ubuntu Linux
Aprile 14, 2016 10:29Pretende-se com este livro disponibilizar um texto introdutório e didático sobre operação e administração de sistemas Linux através de linha de comando. Apesar de ser um livro introdutório, seu conteúdo pode ser útil para usuários com diferentes níveis de conhecimento no sistema operacional Linux.
Os capítulos deste livro apresentam uma breve introdução sobre os temas a serem apresentados, seguidos de exemplos práticos da utilização dos comandos, através de um diálogo com o leitor tendo em vista a importância de um texto introdutório ter caráter didático, em contrapartida de um texto de linguagem exclusivamente técnica (o que muitas vezes torna a leitura mais cansativa).
A distribuição Linux utilizada neste texto é a Ubuntu, entretanto usuários de outras distribuições também podem utilizar este livro, já que a maioria dos comandos apresentados estão disponíveis na principais distribuições Linux atuais.
Sobre o Autor
Fabrício Bueno é graduado em Ciência da Computação pela Pontifícia Universidade Católica de Goiás e mestre em Engenharia da Computação pela Universidade Federal de Goiás. Já atuou em diversas instituições: SERPRO, Agência Goiana de Administração e Negócios Públicos, Pontifícia Universidade Católica de Goiás, Universidade Federal de Goiás, Universidade Federal da Fronteira Sul e Instituto Federal de Santa Catarina.
É autor dos livros técnicos “Otimização Gerencial em Excel” e “Estatística para Processos Produtivos” pela editora VisualBooks, e autor dos romances “Estações Marítimas: O Retorno ao Continente”, “O Olho e Outros Contos Insólitos” e “Gonecity” pela Amazon.
A Scheme to Encrypt the Entire Web Is Actually Working
Aprile 14, 2016 10:23
Apple’s move to encrypt your iPhone and WhatsApp’s rollout of end-to-end encrypted messaging have generated plenty of privacy applause and law enforcement controversy. But more quietly, a small non-profit project has enacted a plan to encrypt the entire global web. And it’s working.
Earlier this week, the San Francisco-based Internet Security Research Group (ISRG) announced that the initiative it calls Let’s Encrypt is coming out of beta—and that it’s making serious headway toward helping tens of millions of unencrypted sites around the world switch from the insecure web standard HTTP to HTTPS, which encrypts your web browsing to protect it from surveillance. Without that layer of encryption, a regular HTTP connection can be intercepted and read by anyone between a web visitor’s browser and the site he or she is visiting—whether a hacker on the same Wi-Fi network, an internet service provider, or a government agency. Since launching less than six months ago, Let’s Encrypt has helped 3.8 million websites switch to HTTPS encryption, taking a significant chunk out of the unprotected web data that’s available to those eavesdroppers.
“Frankly it’s irresponsible how much of our information goes flying around the web in the clear. Anyone can just pull it down and read it. That’s not what people should expect from such an important network today,” says Josh Aas, the founder of the Internet Security Research Group, who officially works for Mozilla but runs Let’s Encrypt for ISRG. “We want to feel that when we’re using [the web] we have privacy…Our goal is to get to one hundred percent encryption.”
Let’s Encrypt has tried to make it easier for websites to switch from HTTP to HTTPS by flattening one of the biggest hurdles in the process: certificates. Let’s Encrypt functions as a certificate authority, one of the dozen or so organizations like Comodo, Symantec, Godaddy and Globalsign that verify that servers running HTTPS web sites are who they claim to be. (A carefully-secured web connection isn’t much good if you’re sending private data to a spoofed site.) Once verified, these authorities issue those computers a “certificate” they need to make their HTTPS encryption work with your browser. The certificate is designed to be an unforgeable signature that’s cryptographically checked by your browser so that you can be sure your communications are decrypted only by the intended site and not an impostor.
Unlike commercial certificate authorities, however, Let’s Encrypt is free, thanks to corporation sponsorship from companies including Cisco, Google and Akamai. It’s available to websites anywhere in the world—even far-flung countries like Cuba and Iran that sometimes aren’t served by other major certificate authorities. And it’s automatically configured with a piece of code that runs on any server that wants to switch on HTTPS. “This is the silver bullet that…lowers the barrier to encrypted web communications,” says Ross Schulman, the co-director of the cybersecurity initiative at the Open Technology Institute. “It brings the cost of executing a secure website down to zero.”
All of that has led to a noticeable tectonic shift in the layer of encryption unfolding across the web. The 1.8 million certificates Let’s Encrypt has issued to 3.8 million websites make it the third-largest certificate authority in the world now, according to Aas, behind Comodo and Symantec. And because 85 percent of those sites never had HTTPS before, it’s already significantly boosted the total fraction of sites that are encrypted on the web as a whole. Based on numbers Mozilla gathers from Firefox users, encrypted sites now account for more than 42 percent of page visits, compared with 38.5 percent just before Let’s Encrypt launched. And Aas says that number is still growing at close to one percent a month. “For the web, that’s a rate of change that you don’t usually see,” he says. “A lot of us have our eyes on that 50 percent mark.”

Let’s Encrypt’s free and automated HTTPS certification is designed to make it easy for individuals without technical expertise or resources to encrypt their sites. But its automation also helps big companies trying to roll out HTTPS to a large number of customers. WordPress, for instance, announced just last week that all WordPress sites with custom URLs will now be encrypted by default using Let’s Encrypt’s certificates. And that automation is set to get more sophisticated in the coming months, says Peter Eckersley, a technologist with the Electronic Frontier Foundation, which has helped to create and maintain the Let’s Encrypt certification software. Upcoming versions, he says, will be capable of more detailed configurations—geekier tasks like making sure the certificate properly displays its expiration date to browsers and uses the most secure encryption algorithms. “We want to not only get a certificate and install it for you, but also deal with all the behind the scenes settings to get things right and have HTTPS actually be secured,” Eckersley says.
Just how easy it is to get a Let’s Encrypt’s certificate hasn’t always been a good thing. In January, security firm Trend Micro pointed out that the group’s certificates were being used to encrypt the connections between malicious advertisements on a website the firm declined to name and on a server controlled by cybercriminals, who used that encrypted connection to install a banking trojan on visitors’ computers. After all, Let’s Encrypt only certifies that a site—or in this case, an element of a site—is encrypted by the server from which that content is loaded. Unlike some commercial certificates, it doesn’t claim to check who the organization is behind that server, which is a more manual and involved process.
Aas doesn’t pretend that all Let’s-Encrypt-certified sites are benevolent. “People ask if the bad guys use Let’s Encrypt. The answer is basically ‘yeah,’” he says. “But they’re also using a server, an ISP, a domain name. [An HTTPS] certificate is only a small part of their plan, and taking it away wouldn’t really change what’s going on.”
Allowing that kind of occasional criminal use of web encryption, Aas adds, is a small price to pay to help shut down a kind of low-hanging surveillance fruit of the web—one that’s available to any interloper, from a snoop on the Starbucks Wi-Fi network to Comcast to the NSA. “For any country that spies on its citizens and other countries’ citizens, when you put your information out there in the clear, it makes widespread surveillance easy,” says Aas. With ubiquitous HTTPS, he adds, “the price of surveillance goes up. There’s no free lunch anymore.”
Source link
Сrazy Talk Animator 1
Aprile 14, 2016 9:00
CrazyTalk Animator is a revolutionary animation suite with all the necessary tools to easily create pro-level animation. CrazyTalk Animator’s stage is a 3D layered 2D studio where you can drag and drop actors, props, scenery and images or video directly to the stage for scene setup. Create actors from any photo or illustration and CrazyTalk Animator’s innovative Actor Creator wizard. Bring actors to life with automatic facial animation and innovative puppeteering motion. Drag-and-drop to build sets with scenery and props. Film and direct all the action with camera and time-line tracks for complete 2D animation.
System Requirements:
Windows XP (With Service Pack 2 or later)/ Vista/ 7/ 8/ 10; Pentium4 2GHz; 2GB free hard disk space; Display Resolution: 1024×720; Color Depth: True Color (32-bit); Graphics Card*: Support for DirectX 9.0c; Video Memory: 256MB RAM
Publisher:
Homepage:
http://www.reallusion.com/crazytalk/animator/default.aspx
File Size:
289 MB
Price:
The program is available for $49.95,
but it will be free for our visitors
as a time-limited offer.
Source link
Lionhead Offers Thanks To Fable Legends Players As The Game Officially Shuts Down
Aprile 14, 2016 7:34
Fable Legends’ beta shut down today, and its developer, Lionhead Studios, offered thanks to its fans, as well as details about refunds related to the game.
If you spent money on the game, you may already see a refund in your account. If you’re not seeing one yet, Lionhead says to be patient and check you Xbox Live messages. On the blog announcing the game’s official closure, Lionhead also offered thanks to its fans, which you can see below.
All of us here at Lionhead Studios would like to thank you for participating in the closed beta and being a part of the game’s development. All stories have to end eventually, but the memories of Heroic triumphs and Villainous plots will last forever. Thank you for your support – you are all Legends!
The details of Lionheads’ likely closure are still being worked out, and some rumors are pointing to development continuing for Fable Legends outside of Microsoft. The studio is currently in “consultation” and we will know more about the studios’ future once that period draws to a close.
[Source: Lionhead]
Our Take
Despite my reservations about Fable Legends (I was never particularly on board with the idea of an online multiplayer-focused Fable) it’s still disappointing to hear about the possible closure of the studio and the cancellation of a game that has been in development for such a long period of time. Hopefully the rumors of the game’s continued development are more than just rumors.
Source link
Software Livre na Administração Pública Brasileira
Aprile 14, 2016 6:28Este eBook foi convertido ao formato digital por uma comunidade de voluntários. Você pode encontra-lo gratuitamente online. A compra da edição Kindle inclui os custos da entrega sem fio.
Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers?
Aprile 14, 2016 4:22
After much speculation over who provided the FBI with the mysterious solution for hacking into the San Bernardino iPhone, the Washington Post reported this week that it was a “gray hat” hacker who came forward to save the day for the feds.
According to the Post, the hacker, along with one or more associates, found a zero-day flaw in the iOS 9 software running on the San Bernardino iPhone 5C and sold it to the government for a one-time fee. This allowed the feds to bypass security features on the phone to crack its password.
So, what exactly is a gray hat hacker?
There are three types of hackers: white hats, black hats and gray hats.
TL;DR: White hats disclose vulnerabilities to software vendors so they can be fixed; black hats use or sell them to other criminals to conduct crimes; gray hats disclose or sell them to governments to be used for hacks against adversaries and criminal suspects.
White Hats
White hats are security researchers or hackers who, when they discover a vulnerability in software, notify the vendor so that the hole can be patched. It used to be that white hats were rewarded with just an acknowledgement in the patch release or a T-shirt and other swag from the company they helped. But these days white hats can earn good money—anywhere from $500 to more than $100,000—by selling information about a vulnerability to companies that have bug bounty programs. White hats are considered the good guys.
Black Hats
Black hats are criminals. They use their prowess to find or develop software holes and attack methods (aka zero day vulnerabilities and exploits) or other malicious tools to break into machines and steal data, such as passwords, email, intellectual property, credit card numbers or bank account credentials. They also sell information about the security holes to other criminals for them to use. Black hats are, obviously, considered the bad guys.
Gray Hats
Gray hats fall into the middle ground between these two other hacker categories. Gray hats sell or disclose their zero-day vulnerabilities not to criminals, but to governments—law enforcement agencies, intelligence agencies or militaries. The governments then use those security holes to hack into the systems of adversaries or criminal suspects. Gray hats can be individual hackers or researchers who uncover flaws on their own, defense contractors who have hacking divisions tasked specifically with uncovering flaws for a government to use, or boutique broker firms like Vupen and Zerodium, two French companies who are in the business of finding or brokering the sale of zero-days to law enforcement and intelligence agencies.
All of these kinds of hackers are considered gray hats because they’re selling to parties that will presumably use the vulnerabilities responsibly for the public good, although that is not necessarily the case. There are governments that use zero days to spy on dissidents, political rivals and others. The Italian firm Hacking Team, for example, is known for selling its espionage tools and zero-days to repressive regimes. When it comes to good and bad, like black and white, there’s always a gray area.
Source link