Fun with DNS hacking and the importance of updating your router
Published in News

On March 2 2015 CVE-2015-1187 was released. This alert indicated that a simple cross-site request forgery allowed someone (the “bad” guys) to hijack DNS settings on a wide range of routers. By doing this they were able to point people to their own DNS server and in turn direct them to malicious sites. These sites could be anything they wanted them to be from phishing sites to sites with malware intended to compromise the target system. The exploit is a pretty smart one especially when you take into account the fact that the bad guys do not need to remotely manage the target router to get this going.

Kingston HyperX Cloud II Gaming Headset Review
Published in Enthusiast Audio
17 May 2015
Rate this item
(0 votes)

Kingston HyperX Cloud II Gaming Headset Review Featured

After the success of the Hyper X Cloud Pro Gaming headset Kingston went back to the drawing board to make a product that would be a worthy successor. The question was, how do you top something that is that good? The Hyper X Cloud Pro was (and still is) an amazing headset. The sealed enclosures for the larger than normal drivers along with the tuning make them one of the best headsets you can get for the money. Kingston’s team decided that throwing in their own USB audio controller, complete with simulated surround and amp, would be a good start. We had the chance to play with a set during CES 2015 and also got one to bring home. Since then we have used them in multiple environments and with more audio sources than we can really put in a single article. So now we can tell you if the Hyper X Cloud Pro II is worthy of the name or not.

Nothing like GPU accelerated malware to brighten your day
Published in News

The idea of GPU accelerated applications is one that has caught the attention of many developers over the years since we first heard about it. It is a great advancement in technology that allows you to use the parallel processing and faster memory of a GPU to perform complex tasks much faster than most CPUs can. This is great for software that needs that extra boost like AI, video or photo editing and… Malware. Yes it is also possible to develop malware that uses OpenCL and Cuda (NVIDIA’s flavor of GPU programing language.

Apple faces FTC investigation into Beats Streaming Service.
Published in News

Remember that pesky anti-trust suit that Apple faced over fixing eBook prices with publishers? Well if not, let me remind you. When Apple brought their eBook store to iOS they knew they were facing an uphill battle against Amazon. To counter this they worked out a deal with several publishers to fix prices at a certain level and also to guarantee that they got the best prices along with a few exclusive books. They were found guilty of this and are supposed to be making amends for it along with having a watchdog looking over their shoulders.

Black Mesa Source Moves to Steam Early Access
Published in News

Half Life is one of those games, along with Doom and Castle Wolfenstein, which helped define an entire genre of games. It gave us a new type of hero as well, the crowbar toting MIT PHD Gordon Freeman. Since the games introduction fans have waited for each new chapter in the life of Dr. Freeman. Sadly we have never really gotten the “third” chapter in Freeman’s life, but there has always been the modding community to help keep u going. Back in 2012 a group called Black Mesa Source revamped the game from beginning to the Lambda Core level to the delight of many fans.

Mumblehard Spamming Malware Making the Rounds in Joomla and WordPress sites
Published in News

There is a common belief that Linux and BSD operating systems are, by their nature, much more secure than anything Microsoft has ever released. The problem with this belief is that it is simply not true. Linux, BSD and Windows can all be made more secure than they are by default, but there is work involved and there is a tradeoff of ease of use when you start locking things down. Many web hosts running Linux or BSD do not really have the time or available man power to really lock their host systems down which leaves them vulnerable to a number of attacks.

It looks like AMD is betting the farm on 2016 and 14nm
Published in Editorials

A couple of days ago we published an article on the state of AMD and what their immediate (next 18 months) looked like. In that article we looked at the state that AMD is in right now with what they have on the table…. It seems that a few readers did not like what we had to say. Oddly enough, yesterday a number of articles popped up on the internet that supported much of what we had to say including many of the time lines (14nm by Q3 2016 etc.) Let’s take a look at some of the information out there.

Very few bright spots to be seen in AMD's future
Published in News

In the last couple of months we have talked a lot about AMD and the direction they are trying to move to. Most of what we have reported is not good news and centers on the fact that AMD’s R&D/production budget is dwindling to the point where they cannot push multiple projects at one time. They have had to consolidate their efforts to the point that they do not really have products to bring to market to make them more money. An example of this is the lack of a new GPU for the normal launch cycles. AMD does have some products in the pipeline, but these might not be enough to win them back any marketshare from Intel or NVIDIA.

SMB, Windows and the hole that has been open since 1997
Published in News

Over the weekend there was a lot of talk about how Windows in particular is vulnerable to a flaw that is linked to SMB. This flaw could allow someone to grab user information by forcing a redirect to a malicious server using the SMB protocol. The way it works is pretty simple; if you give someone a URL that begins with the work “file” then Windows (and some other systems) will think that you want to use SMB to connect to a file share. If the server that the link (URL) points to uses even basic authentication then you can try and tempt a user to put in their own credentials and grab them during the exchange.

AMD cuts orders to Global Foundries... Are they pulling in for one last effort?
Published in News

Although you would not think it possible, AMD is still having issues that stem back from their purchase of ATi all those years ago. As most of you are sick of hearing the details of that acquisition and the gradual fall out we will not bore you here. What we will talk about are some of the issues that AMD now faces and what they mean for the consumer and AMD themselves.