Go to the content

FGR*

Full screen

FGR* Blog

Aprile 3, 2011 21:00 , by Unknown - | No one following this article yet.

Dirt Rally Review – The Hard Road To The Top

Marzo 29, 2016 9:01, by FGR* Blog

It’s easy to approach a rally game as if it’s another racing title. Speed, fighting for control, and a strong competitive spirit rule both, but rally racing is a different breed. If the focus of regular racing is primarily the finish, then rally racing is a marathon where you die and are reborn a million times before you reach the end. Corners aren’t the only place where you gain or lose time. Every second is an attempt to conquer a growing fear. Victory at the finish line – and knowing the dangers you pushed past to get there – is an exhale of relief as much as jubilation.

To tap into the moments that make rally racing so exhilarating, you need a game that isn’t just about sliding around hairpin turns. Dirt Rally’s superior car handling communicates the vibrancy and challenge, creating an unparalleled experience. Dirt Rally isn’t alone in translating velocity, physics, weight transfer, traction, and other intangibles into a video game package. However, the way it taxes these elements every second you’re on the course in a flurry of ever-changing demands is what elevates the genre.

For example, I get a little air coming over the crest of a hill, which is not a fist-pumping moment. Being that the crest itself is at a slight angle, I have to prepare my takeoff angle before I go airborne, and once I land I’m immediately trying to gather the car back up and get ready for the bend ahead. I’m on light gravel so I shouldn’t expect too much of a slide or spin of the tires, but I also have to flirt with when and how much brake I apply versus maintaining speed. Throw in a rock on the outside of the already-narrow bend that will likely destroy my car if I’m not careful. This isn’t some big setpiece in a “boss battle” of a track; it’s just a typical sequence you have to deal with that feels wonderful in your hands.

The co-driver is good about calling out what lies ahead through a sometimes complicated lexicon (but when he says “Don’t cut” for a corner, that’s a clear directive). You cannot ignore any of it, nor listen to all of it. The sweet spot occurs when you get into that auto-pilot zone, internalizing the next 100 or so yards while also focusing on the danger at hand. This is gaming as tense and demanding as you’ve ever known it.




A Few Console Additions
The console version adds a series of tutorial videos and fully loaded cars that can ease progression early on, but these don’t fundamentally change the game.

Dirt Rally isn’t just for the hardcore, although it could do a better job of inviting newcomers. The career mode’s championships progress in difficulty and the cars you buy spanning the sport’s eras get faster and harder to control, but the title could use a tutorial section or the ability to flashback and rewind if you crash like in previous Codemasters titles. You can only restart back at the beginning or reset the car back on the track for a time penalty, which you’ll definitely do. This in a mode that has its share of grinding for requisite championship points and cash to buy cars specifically for the hill climb and rallycross disciplines.

You unlock upgrades the more you race with a car (better engine performance, the ability to tweak the handling, etc), and a team consisting of a crew chief and up to four engineers that help repair damage between stages faster. The perks’ excitement is limited to speeding up the rate at which your car upgrades and is fractured over different car makes and models. The framework around the racing gameplay could be more inviting, like featuring more unlocks (liveries or cars) or prizes around your achievements – that slightly fatuous fluff that makes us feel like we’re getting somewhere.

Beating the stage and overall rally times of Codemasters’ online challenges are a natural fit for rally racing’s solo structure, but more group-orientated play is available if you join a league where you can post your best times among your peers and go up against them simultaneously in rallycross races.

Dirty Rally can be unforgiving, unrelenting, and seemingly as high in its demands as the infamous hill climb at Pikes Peak. But the journey is sublime.

Note: This review originally ran for the PC version. Although this PS4 version has additions (see sidebar above), the score remains the same.


Source link

Hype Around the Mysterious ‘Badlock’ Bug Raises Criticism

Marzo 29, 2016 7:25, by FGR* Blog

Brand-name software bugs with flashy public relations campaigns are commonplace since the Heartbleed vulnerability was announced in 2014 with a media-friendly name, logo, and web site.

But another bug is on the horizon that is setting a new bar for brand-name bug disclosures. It’s called Badlock and it’s already receiving a lot of controversial attention, even though the exact nature of the bug—and most importantly, the patches to fix it—won’t be disclosed for another three weeks.

The bug affects unknown versions of the Windows operating system and Samba, free open-source software that integrates Linux or Unix servers and Windows computers across a network. A pre-patch marketing campaign about the security hole includes a web site and logo that SerNet, the German company behind the bug discovery, says is meant to inform system administrators that patches are coming April 12 so they can prepare to update systems that day.

“Admins and all of you responsible for Windows or Samba server infrastructure: Mark the date,” SerNet warned on its Badlock web site this week. “Please get yourself ready to patch all systems on this day. We are pretty sure that there will be exploits soon after we publish all relevant information.”

But the campaign has caused many in the information security community to criticize the company for hyping the issue for profit—and, worse, for putting people at risk. The pre-patch campaign effectively gives hackers about three weeks to determine what the flaw might be and develop exploits to attack it before Microsoft and the Samba developer team can release patches.

Not How the System Should Work

“The bug disclosure process here is not doing anyone any favors,” says Dan Kaminsky, noted security researcher and chief scientist at White Ops. “What’s the call to action [for system administrators] other than pay attention? Even when we complain about [other] bugs with logos and with media attention, yeah there’s annoyance, but the core reality is there’s a problem, here’s a fix, people should act. … What are people supposed to do [in this case] other than applaud… or guess the flaw?”

Brian Martin, director of vulnerability intelligence at Risk Based Security, called it “pure, unadulterated marketing” on the part of SerNet. “People will start contacting them [seeking information and protection], and it opens up sales channels left and right.”

But not everyone opposes the three-week warning.

“I think it makes sense to give … notice for a flaw this widespread, if it turns out to be critical… [i]n other words, widespread, easy to exploit, and high impact,” says Chris Wysopal, cofounder and CTO of Veracode.

It’s not unusual for researchers who discover a vulnerability to publicly disclose it before a patch is available; it’s also not unusual for security companies that offer detection and protection services to market their products and services before a patch is released to help protect customers until a security hole gets sealed.

But Kaminsky and Martin say this one is different because SerNet has released hints that could help hackers figure out the security hole quickly. There are also, Martin notes, questions about whether the SerNet worker who discovered the hole had a role in creating it.

All We Know About Badlock: It’s Good For Business

The bug was discovered by Samba developer Stefan Metzmacher, who has been writing code for Samba since at least 2002 and now works for SerNet, which specializes in Samba training and consultation.

Metzmacher’s name appears in 463 Samba source code files, created between 2002 and 2014, and several other people at SerNet were also developers of the Samba software. This is part of the company’s selling point for its services—it can claim that few people and companies know Samba as well as Metzmacher and its other employees do.

But if it turns out that the Badlock flaw Metzmacher found is in a part of the Samba code he or other SerNet workers actually wrote, he and SerNet could face even more criticism for marketing the discovery of a bug they helped create through flawed programming.

“It is certainly eye opening when someone develops a piece of software for over a decade, then finds a critical vulnerability in it a couple years after … and will most likely capitalize on it directly,” Martin wrote in his blog post.

Others have expressed a similar sentiment.

@wpawlikowski
1. Introduce bug
2. Discover your own vulnerability
3. ???
4. Profit

— Gabor (@gszathmari) March 22, 2016

SerNet CEO Johannes Loxen has acknowledged the bug’s marketing value for his company on Twitter.

@SteveD3 A serious bug gets attention and marketing for us and our open source business is a side effect of course. #whynot #winwin #badlock

— Johannes Loxen (@jloxen) March 23, 2016

A Challenge to Hackers

Little is known about the Badlock flaw other than it’s a “crucial security bug” in Windows and Samba, according to SerNet’s Badlock web site, and Loxen has hinted on Twitter that it can give an attacker administrative-level privileges on a local network. Wysopal explains that, with only that knowledge to go on, this could be anything from another Conficker worm, “which spread using flaws in Windows file-sharing” and hit more than 9 million machines, to nothing very serious at all. “We have seen other named vulnerabilities that were hyped that turned out to be hard to exploit and not widespread in reality so we will have to wait and see,” he said.

But simply knowing it affects Windows and Samba narrows the possibilities of what the bug might be, Martin says, making it easier for hackers to figure out. He and others suggest the flaw may be in what’s known as the SMB protocol, or Server Message Block protocol, which lets computers read and write files over a local network. Windows uses a specific implementation of the SMB protocol known as CIFS, or Common Internet File System.

“We know it is almost assuredly [a remote-code execution flaw], and likely has to do with the implementation of the SMB/CIFS protocol,” Martin wrote in a blog post on Wednesday.

The Badlock name also might provide hints about the nature of the bug.

“The name Badlock is likely based on a file or resource locking mechanism within the SMB implementation, and the code that controls it,” Martin wrote.

If this is the case, it won’t take long for hackers to find it, which worries Kaminsky.

“At minimum they shouldn’t have named the flaw,” he says. “Now you’ve got a lot of people looking at the locking subsystem in SMB and maybe people find this particular Badlock flaw, maybe they find others.” Whatever they find, he says, “there’s a 12-day period in which everyone is on notice: ‘Large bug here; no patch.’”

Kaminsky isn’t new to big-bug controversies. He discovered and helped coordinate a massive multi-vendor patch operation for a serious DNS flaw in 2008 that affected nearly every web site and was known as “the worst internet security hole since 1997.” But even though he publicly revealed the existence of the bug at a press conference, he withheld details about it to give DNS server owners time to patch their systems. He had planned to reveal details of the bug a month later during a presentation at the Black Hat security conference in Las Vegas. But two weeks after the press conference a security firm inadvertently released details online, which allowed someone to create an exploit before the day was out. Kaminsky says the circumstances around his bug were different than Badlock’s, however, since many systems were already patched in his case.

“I don’t pretend that I did it right,” he told WIRED. “But the thing I didn’t do wrong was have all sorts of hackers out after my bug.”

Kaminsky says one of the biggest concerns with Badlock is that other variants of the flaw might be found before patches can be released. “Every bug has a hundred variants … that would show up across other platforms,” Kaminsky says. Martin points out that if the flaw is in the SMB protocol and not just a specific implementation of it, it could affect other software that use or include support in them for SMB, such as versions of Mac OS X, FreeBSD and Solaris.

Kaminsky also worries that Microsoft and Samba may encounter problems that prevent them from releasing their patches on the designated day. “As they’re doing the final testing on this patch, they might discover something wrong and they have no flexibility to move the [patch release] day,” he says. “[A]ny patch that comes out must come out on this particular day, because it’s a situation that’s now on fire. How is this protecting users; how does this have anything to do with users?”

Critics of SerNet say it’s certainly user-friendly to them, and to one other element: hackers.

Go Back to Top. Skip To: Start of Article.


Source link

Gurgamoth – Steam Launch Trailer

Marzo 29, 2016 5:00, by FGR* Blog


Gurgamoth is a flying fighting game where the level is your weapon. It is now available on Steam.


Source link



Turning Live Surveillance Feeds Into Unsettling Works of Art

Marzo 29, 2016 1:22, by FGR* Blog

In the small town of Fredericton, Canada, a woman crosses a quiet intersection in front of a church cathedral. Unbeknownst to her, a nearby webcam catches her in the street, along with the red light behind her—evidence of her crime.

The webcam’s public feed, like thousands of others like it, is accessible to anyone who can find its URL with a Google search. At an art gallery thousands of miles away, a tiny Raspberry Pi computer is streaming the video to a monitor while it analyzes the footage with a simple computer vision algorithm. It instantly snitches, flashing, “WOULD YOU LIKE TO REPORT THE JAYWALKER?” on the screen. If you’re a visitor at this gallery, you’ll face a choice: hit a red button in front of the computer, and it will send a screenshot of the incident in an email to the nearest police precinct, potentially costing her a $42 fine. Or you can let the oblivious lawbreaker go on her way.

This demonstration of surveillance-turned-art, titled “Jaywalking,” presents the sort of uncomfortably easy privacy invasion that Dries Depoorter has made his trademark. The 25-year-old Belgian artist has a talent for assembling widely accessible images and video streams into exhibits that feel provocatively intrusive. And he hopes they’ll spark his audience to consider the very real possibilities of using public data to invade personal privacy—or at least what we once believed to be private. “You have a choice, to send the screenshot to the police or not,” says Depoorter. “I wanted the visitors to think. To
get the feeling of having this power.”

Depoorter in front of his "Jaywalking" installation's three screens.
Depoorter in front of his “Jaywalking” installation’s three screens.Nichon Glerum

On Saturday, a retrospective show assembling years of Depoorter’s surveillance-themed works opens at the Z33 gallery in Hassert, Belgium. It won’t actually include the real-time, three-screen jaywalking feed that he’s displayed in past shows. Instead, he’s taking a softer approach, selling framed prints of jaywalkers whom his webcam monitoring software has detected—each one priced at the cost of a jaywalking fine in the place where it was taken. (“I liked the idea that the money goes to the artist rather than to the police,” he says.) But Depoorter’s first solo exhibition will also include a collection of previous spying experiments, from those performed on himself to one that surveils broad swaths of an American city in real time.

Depoorter’s installation called “Seattle Crime Cams” streams real-time video from publicly accessible, city-owned traffic cameras in Seattle to a wall of monitors. Though the city’s online cameras were meant to show only a single still image updated every minute, he says he found the full video file in the site’s code and was able to instead access the continuous stream. He’s paired those surveillance feeds with police and fire alerts and dispatch audio made available as part of Seattle’s Open Data program. And he’s synched that feed to the screen so that the videos show the closest camera to the location described in the audio for a disturbingly voyeuristic experience. Visitors can choose whether to view video feeds with the most alerts or the least. As in “Jaywalking,” they become an active participant in the surveillance act. “I found it pretty strange, that the police were sharing all this data,” he says. “I had to show what you can do with this… You see just how much surveillance there is.”

Here’s a video of “Seattle Crime Cams” in action:

In the “Seattle Crime Cams” piece, Depoorter argues, it’s not any single feed of public data that leads to a sense of intrusion, but combining the images with real-time emergency services reports. He points to the same notion of combining two sources of public data to produce a privacy violation in another, older piece he calls “Tinder In,” which matches a person’s Tinder photos and neatly frames them with the same individual’s LinkedIn profile photo. The effect of that controversial series is to show how internet users live double lives, each on display simultaneously to anyone who looks. One of those “Tinder In” pairs shows Depoorter himself in his work context and a Amsterdam vacation photo he shows potential dates.

In fact, Depoorter began his explorations of privacy by violating his own. In his first experiment as an art student at the KASK School of Art in Ghent in 2010, he recorded all his conversations and the sounds around him for a 24-hour period and posted them online and in a gallery installation. Some conversations with friends and family that he considered more sensitive, however, he made private, and instead posted links to sell the audio based on its privacy value to him. Later, he set up a piece of software to track his iPhone’s locations for a month and post Google Streetview images from those locations to a page on his website.

In his most masochistic project, he set up his computer to capture a full screenshot at a random time every day and post it to Twitter, and allowed a friend to change his Twitter password so he wouldn’t be able to delete any images. Since he never knew when the screenshot would come, his Macbook became his own personal panopticon. He stopped visiting NSFW sites, shrunk his chat windows with friends to show only a single line of conversation, and even ceased googling certain questions that might be embarrassing. “You don’t want other people to see your stupid Google search queries,” he says. “There was this feeling that there’s always someone watching. It’s not the NSA, but my friends and family.”

Depoorter is hesitant to spell out his motivations for these stunts, instead preferring that people see them online or in the context of his show and come to their own conclusions. But in experiments like “Seattle Crime Cams” and “Jaywalking,” which use real-world data, he admits that he does want to warn his audience about what’s possible, and to hint how such perfectly legal and public forms of privacy violation won’t always be limited to art. “The police can automatically detect you jaywalking. They have much more knowledge than me. They can link it to a database, and tomorrow they can make this all automatic. You jaywalk and tomorrow you pay a fee,” he says. “Is it ok that the police can automatically give fines for crossing a red light? These are the important questions.”

Go Back to Top. Skip To: Start of Article.


Source link

Linux – O Guia Essencial

Marzo 20, 2016 16:57, by FGR* Blog

Com certeza o livro de cabeceira clássico dos usuários de Linux. Contém uma listagem de todos os comandos executados diariamente, num formato prático e sucinto. Com uma abordagem clara e objetiva, é uma referência rápida dos comandos e recursos básicos de um dos sistemas operacionais mais poderosos e flexíveis existentes.



Easy Linux For Beginners

Marzo 20, 2016 7:30, by FGR* Blog

What separates this book from all the others out there is the approach to teaching. A lot of the books you will stumble upon simply throw information at you, leaving you confused and stuck.

We believe that books of this nature should be easy to grasp and written in jargon-free English you can understand, making you feel confident and allowing you to grasp each topic with ease.

To help you achieve this, the guide has been crafted in a step-by-step manner which we feel is the best way for you to learn a new subject, one step at a time. It also includes various images to give you assurance you are going in the right direction, as well as having exercises where you can proudly practice your newly attained skills.

You will learn the following:

  • What is Linux?
  • How does Linux compare to other Operating Systems?
  • Linux Architecture and Distributions
  • Installing Linux in your PC
  • Get to know Shell, your Desktop and Navigating the File Systems
  • Linux Applications- Office, Multimedia and Imaging
  • Managing Hardware and installing additional Software
  • Using the Linux Command Line
  • Vital Administration and Security
  • Introduction to Scripting
  • And much more



Computer Shopper – May 2016

Marzo 20, 2016 7:00, by FGR* Blog

Computer Shopper gives you independent buying advice, hundreds of product reviews and all the hints and tips a PC owner needs. Computer Shopper helps you buy the best kit from PCs and laptops to HD TVs and digital cameras.



KaOS 2016.03

Marzo 19, 2016 10:00, by FGR* Blog

KaOS uma distribuição linux rolling release e transparente totalmente integrada para o ambiente de trabalho moderno, construida a partir do zero com um foco muito específico. Focada no KDE, um kit de ferramentas (Qt), uma arquitetura (x86_64), mais um foco na avaliação e seleção das ferramentas e aplicações mais adequadas.

O mapa do repositório é simples, e consiste em três grupos, Core, Main e Apps. Um sistema regular completo sempre terá as ultimas atualizações disponíveis, sem precisar da reinstalação do sistema.

  • Core – tem a base de pacotes necessários para que o sistema de boot, comunicação com a BIOS conectado a maioria do hardware e configurar as opções básicas do shell. Exemplos de pacotes estão o kernel, systemd, cadeia de ferramentas para construção e ferramentas básicas de linha de comando . Este repositório é cuidadosamente atualizado, uma vez que qualquer atualização não é exaustivamente testada afeta grandemente a estabilidade do sistema.
  • Main – este repositório consiste em todas as bibliotecas necessárias, drives extras e firmware necessarios para uma Área de trabalho e Aplicações funcionais. Muitas delas podem ser totalmente atualizadas e vai passar para o usuário final, após um período de testes de sete a dez dias. Alguns pacotes mais vulneráveis entrará após um feedback suficiente para não ser haver necessidade regresso.
  • Apps – consiste em todos os pacotes observadas e utilizadas pelos usuários, incluindo KDE e quaisquer ferramentas necessárias. É totalmente atualizado e você pode esperar atualizações neste repositório após um período de teste de curto, a menos que seja necessário construír versões mais recentes dos pacotes centrais ou principal, então será necessario esperar até que aqueles estejem prontos para sair de seus período testes.

O Build é onde todo pacote inicia, se é uma reconstrução, atualização ou nova adição, tudo será construído, uma vez que passaram pelo teste adequado, os pacotes são movidos para seu respectivo repositório.

KaOS 2016.03



Cyborg Hawk Linux

Marzo 19, 2016 8:00, by FGR* Blog

Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system, that benefits from a strong selection of tools, integrated with a stable linux environment.

  • More than 750+ penetration testing tools included
  • Cyborg Hawk is totally Free and always will be
  • Can be used as live OS with full capability
  • Exploitation Toolkit
  • Stress Testing
  • Reverse Engineering
  • Forensics
  • Mobile Security
  • Wireless Security
  • Full virtual machine support (version 1.1)
  • Now comes with its own repository
  • Reliable and stable
  • Various Wireless devices support
  • Well sorted menu, everything is in just the right place
  • Patched kernal from injection

Cyborg Hawk Linux



Proteste afirma que cobrança por franquia de dados em internet fixa é ilegal

Marzo 18, 2016 1:49, by FGR* Blog

Entenda um pouco mais sobre a ridícula limitação mensal de consumo de internet na banda larga fixa no post “Vivo, por favor, não estrague a nossa internet…

DIGA NÃO à Redução da Velocidade da Banda Larga

Bem, senhoras e senhores, retornando ao assunto, recentemente em uma entrevista ao Olhar Digital, Marie Inês, coordenadora institucional da PROTESTE (Associação Brasileira de Defesa do Consumidor), afirmou que este tipo de cobrança é ilegal.

Nós entendemos que a Anatel não pode se omitir e aceitar essa mudança, porque o consumidor é quem vai sair perdendo. Uma mudança como essa precisa passar por uma ampla discussão antes de ser aprovada. Isso é um retrocesso, revelou.

Maria Inês explica que o Marco Civil da Internet deixa claro que uma companhia de telecomunicações só pode impedir o acesso de um cliente à internet se este deixar de pagar a conta. Para ela, as operadoras estão aproveitando uma brecha na legislação (que proíbe explicitamente o modo de cobrança por franquia) para obrigar o consumidor a pagar mais caro por um plano com um limite maior, mesmo que a qualidade da conexão ainda deixe a desejar em termos de estabilidade e velocidade.

DIGA NÃO à Redução da Velocidade da Banda Larga