The Google-Oracle fight has been going on for a long time now and has had a few ups and downs in the course of the case. The original premise of the case is that Google was able to speed up development through the reuse of nine (9) lines of code that Oracle claims are protected by copyright. One judge agreed that this was absurd, but his decision was thrown out on appeal. Now, the Department of Justice is throwing their two cents into the mix at the request of the Supreme Court. Their commentary is quite interesting…
Want to play a trick on your iPhone owning friends? Well we have a good one for you. According to Reddit there is a sequence of symbols and Arabic characters that will cause an iPhone to crash and reboot. Oh the joy you will have playing this game over and over with your friends. To add even more to the fun the original text that caused the issue will still be in the messenger app. That means if you open it up… your phone reboots again.
The idea of copyright was and is a good thing. Being able to temporarily protect your artistic investment is never wrong. The problem comes when the copyright holders get greedy or feel that their copyright grants them special rights and powers. This is the situation we have with the current copyright cartel… I mean groups. They feel that they have powers that are not, in any way, part of the copyright laws and legal protections. They also feel like they exist in a special world that grants them more rights than anyone else.
The world of the technical press has been evolving since it stumbled on the scene back in the mid-1990s. At that time the world seemed to be open to anyone with access to a website and willing to spend a few hours tinkering with the latest gadgets. This spawned a time when the internet was really a good source for information on computer hardware and software. Manufacturers also saw this and started relationships with many of the review sites online to help them understand the market and build better hardware.
On March 2 2015 CVE-2015-1187 was released. This alert indicated that a simple cross-site request forgery allowed someone (the “bad” guys) to hijack DNS settings on a wide range of routers. By doing this they were able to point people to their own DNS server and in turn direct them to malicious sites. These sites could be anything they wanted them to be from phishing sites to sites with malware intended to compromise the target system. The exploit is a pretty smart one especially when you take into account the fact that the bad guys do not need to remotely manage the target router to get this going.
After the success of the Hyper X Cloud Pro Gaming headset Kingston went back to the drawing board to make a product that would be a worthy successor. The question was, how do you top something that is that good? The Hyper X Cloud Pro was (and still is) an amazing headset. The sealed enclosures for the larger than normal drivers along with the tuning make them one of the best headsets you can get for the money. Kingston’s team decided that throwing in their own USB audio controller, complete with simulated surround and amp, would be a good start. We had the chance to play with a set during CES 2015 and also got one to bring home. Since then we have used them in multiple environments and with more audio sources than we can really put in a single article. So now we can tell you if the Hyper X Cloud Pro II is worthy of the name or not.
The idea of GPU accelerated applications is one that has caught the attention of many developers over the years since we first heard about it. It is a great advancement in technology that allows you to use the parallel processing and faster memory of a GPU to perform complex tasks much faster than most CPUs can. This is great for software that needs that extra boost like AI, video or photo editing and… Malware. Yes it is also possible to develop malware that uses OpenCL and Cuda (NVIDIA’s flavor of GPU programing language.
Remember that pesky anti-trust suit that Apple faced over fixing eBook prices with publishers? Well if not, let me remind you. When Apple brought their eBook store to iOS they knew they were facing an uphill battle against Amazon. To counter this they worked out a deal with several publishers to fix prices at a certain level and also to guarantee that they got the best prices along with a few exclusive books. They were found guilty of this and are supposed to be making amends for it along with having a watchdog looking over their shoulders.
Half Life is one of those games, along with Doom and Castle Wolfenstein, which helped define an entire genre of games. It gave us a new type of hero as well, the crowbar toting MIT PHD Gordon Freeman. Since the games introduction fans have waited for each new chapter in the life of Dr. Freeman. Sadly we have never really gotten the “third” chapter in Freeman’s life, but there has always been the modding community to help keep u going. Back in 2012 a group called Black Mesa Source revamped the game from beginning to the Lambda Core level to the delight of many fans.
There is a common belief that Linux and BSD operating systems are, by their nature, much more secure than anything Microsoft has ever released. The problem with this belief is that it is simply not true. Linux, BSD and Windows can all be made more secure than they are by default, but there is work involved and there is a tradeoff of ease of use when you start locking things down. Many web hosts running Linux or BSD do not really have the time or available man power to really lock their host systems down which leaves them vulnerable to a number of attacks.