Classic FPS Descent to be rebooted by Star Citizen alums

The last time we checked in with Eric “Wingman” Peterson was August of 2014, where he was running Cloud Imperium Games’ Austin office and overseeing development on Star Citizen’s persistent universe. However, just a few months after that, Peterson left Cloud Imperium to develop his own game: a reboot of the mid-’90s first-person shooter game  Descent. Peterson has formed Descendent Studios , hired a development staff, and is currently overseeing a Kickstarter to pull together a minimum of $600,000 to finance development of the game, which is titled Descent Underground . Critically, Descent Underground has something that previous attempts to resurrect the Descent franchise have lacked: a licensing agreement with IP-holder Interplay. Kickstarter teaser for Descent Underground , formerly code-named “Ships That Fight Underground.” Old name, new presentation Descent was published by Interplay more than 20 years ago, in 1994. The first-person shooter developed by Parallax Software had players zipping around underground in a series of cavernous (and sometimes claustrophobic) mines filled with mad killer robots. Players navigated the underground environment in a Pyro GX spacecraft, which led to the game’s main selling point: it wasn’t just a regular FPS, but one which offered “six degrees of freedom.” In other words, you could move in any direction (X, Y, and Z) and turn in any direction (roll, pitch, yaw). Read 14 remaining paragraphs | Comments

Read the article:
Classic FPS Descent to be rebooted by Star Citizen alums

A $6 commute with Wi-Fi, USB ports, and coconut water

SAN FRANCISCO—In a city replete with not only local buses, and the famously-hated tech company buses that shuttle hundreds of workers daily 40 miles south, a new startup is set to debut a private luxury commuter bus line, charging $6 for a roughly three-mile ride. At its Wednesday launch, Leap will only operate four buses (with one more in reserve) during commuting hours, focusing on giving rides from the Marina neighborhood in the city’s north, going southeast to downtown in the morning, and the reverse in the evening. There’s no fixed schedule—the buses are just constantly rolling at 10 to 15 minute intervals, and passengers can check the iOS or Web apps to see when they will arrive. (Ars first profiled Leap in March 2014.) Leap is betting that riders are willing to pay nearly three times what a ride on a local Muni bus costs, and a fair bit less than what a taxi (or its newer cousins, Uber, Lyft, and Sidecar) would charge for a similar journey. What makes it worth that price? Free Wi-Fi, comfortable seats (limited to just 27, no standing passengers), USB ports, plus food and drinks. Read 24 remaining paragraphs | Comments

Read More:
A $6 commute with Wi-Fi, USB ports, and coconut water

A look at Android 5.1: speed, security, tweaks

Four months after the first release of Android 5.0 Lollipop , Google has followed up with a second version: Android 5.1. The speedy turnaround time compared to Android 5.0 (which appeared a year after 4.4) means that there aren’t many large-scale changes to look at—but the release does feature numerous little improvements and tweaks. It’s faster! (on the Nexus 6, at least) Ron Amadeo 5.1 brings much faster random read and write speeds to the Nexus 6, and the Nexus 5 improves a little, too. 3 more images in gallery 5.1 seems to have eliminated many of the performance issues with the Nexus 6. When we initially reviewed the device, the Nexus 6 was slower at loading apps and switching tasks than the older Nexus 5 had been. With 5.1, the newer phone feels much snappier; with non-game apps, it can now keep pace with the Nexus 5. On benchmarks, we’re seeing much higher random read and write scores on the Nexus 6 with 5.1; random read gets a 2x speed boost, while random write is a whopping 9x faster. The same dramatic speed boosts aren’t present on the Nexus 5, and we suspect the difference is that the Nexus 6 is encrypted while the Nexus 5 is not. According to Francisco Franco , a longtime third-party Android kernel developer, Google is now using NEON instructions on the Nexus 6 to speed up encryption performance. Performance could be further improved by enabling hardware-accelerated encryption, which the Nexus 6 still doesn’t use, but Google has been experimenting with the feature in the Android Open Source Project. Read 7 remaining paragraphs | Comments

Read More:
A look at Android 5.1: speed, security, tweaks

Cops are freaked out that Congress may impose license plate reader limits

Despite the fact that no federal license plate legislation has been proposed, the International Association of Chiefs of Police (IACP) has sent a pre-emptive letter to top Congressional lawmakers, warning them against any future restrictions of automated license plate readers. The IACP claims to be the “world’s   oldest and largest association of law enforcement executives.” As the letter, which was published  last week, states: We are deeply concerned about efforts to portray automated license plate recognition (ALPR) technology as a national real-time tracking capability for law enforcement. The fact is that this technology and the data it generates is not used to track people in real time. ALPR is used every day to generate investigative leads that help law enforcement solve murders, rapes, and serial property crimes, recover abducted children, detect drug and human trafficking rings, find stolen vehicles, apprehend violent criminal alien fugitives, and support terrorism investigations. Sarah Guy, a spokeswoman for the IACP, told Ars that current state and local restrictions have made the police lobby group concerned at the federal level. Read 14 remaining paragraphs | Comments

View article:
Cops are freaked out that Congress may impose license plate reader limits

Epic Google snafu leaks hidden whois data for 280,000 domains

Google leaked the complete hidden whois data attached to more than 282,000 domains registered through the company’s Google Apps for Work service, a breach that could bite good and bad guys alike. The 282,867 domains counted by Cisco Systems’ researchers account for 94 percent of the addresses Google Apps has registered through a partnership with registrar eNom. Among the services is one to shield from public view all personal information included in domain name whois records. Starting in mid 2013, a software defect in Google Apps started leaking the data, including names, phone numbers, physical addresses, e-mail addresses. The bug caused the data to become public once a registration was renewed. Cisco’s Talos Security Intelligence and Research Group discovered on February 19 and five days later the leak was plugged, slightly shy of two years after it first sprung. Whois data is notoriously unreliable, as is clear from all the obviously fake names, addresses and other data that’s contained in public whois records. Still, it’s reasonable to assume that some people might be more forthcoming when signing up using a privacy-enhancing service that promises to hide such data. Even in cases where people falsified records, the records might provide important clues about the identities of the people who made them. Often when data isn’t pseudo-randomized, it follows patterns that can link a person to a particular group or other Internet record. As Cisco researchers Nick Biasini, Alex Chiu, Jaeson Schultz, Craig Williams, and William McVey wrote: Read 4 remaining paragraphs | Comments

See more here:
Epic Google snafu leaks hidden whois data for 280,000 domains

Microsoft to step up the pace of delivering Windows 10 builds

Though the plan was to give Windows 10 preview a series of regular updates, there hasn’t been a new build since January. Windows 10 has two public release channels. The fast channel is meant to get more regular updates, and so get new features sooner, while the slow channel is meant to be more thoroughly tested and a little more stable. Both channels have been quiet lately. While there’s no immediate change on that front—a new public candidate build is in testing but it’s not done yet—testers of the new operating system should take note: the fast channel is due to get faster. Gabe Aul, a General Manager in Microsoft’s Operating Systems Group tweeted today the fast channel is going to go faster , and if you want a more stable situation, you should switch to the slow channel . Further, Aul says that the company may introduce additional channels, perhaps to offer even more cutting edge builds. Read 1 remaining paragraphs | Comments

View post:
Microsoft to step up the pace of delivering Windows 10 builds

Apple releases iOS 8.2 today with Apple Watch support and plenty of bug fixes

SAN FRANCISCO—iOS 8.2 has been in development for several months now, and today Apple is formally releasing the update to the public. It’s available as an over-the-air update or through iTunes for any device running iOS 8, including the iPhone 4S, 5, 5C, 5S, 6, and 6 Plus; all iPads except the first-generation model; and the fifth-generation iPod Touch. The biggest feature update is support for the Apple Watch. The device will work with the iPhone 5 and newer models, but it will not work with iPads or iPods. Once you’ve tethered a watch to your phone, a new companion app will allow you to change the watch’s settings, organize its Home screen, and make other changes. We’ll take a longer look at this companion app when the time comes to review the Apple Watch itself. For those of you with other iDevices and/or no particular interest in the Apple Watch, there are still plenty of reasons to install the update. HomeKit will allow users to control devices at home Read 2 remaining paragraphs | Comments

Link:
Apple releases iOS 8.2 today with Apple Watch support and plenty of bug fixes

The Ambassador who worked from Nairobi bathroom to avoid State Dept. IT

The current scandal roiling over the use of a private e-mail server by former Secretary of State Hillary Clinton is just the latest in a series of scandals surrounding government e-mails. And it’s not the first public airing of problems with the State Department’s IT operations—and executives’ efforts to bypass or work around them. At least she didn’t set up an office in a restroom just to bypass State Department network restrictions and do everything over Gmail. However, another Obama administration appointee—the former ambassador to Kenya—did do that, essentially refusing to use any of the Nairobi embassy’s internal IT. He worked out of a bathroom because it was the only place in the embassy where he could use an unsecured network and his personal computer, using Gmail to conduct official business. And he did all this during a time when Chinese hackers were penetrating the personal Gmail inboxes of a number of US diplomats. Why would such high-profile members of the administration’s foreign policy team so flagrantly bypass federal and agency regulations to use their own personal e-mail to conduct business? Was it that they had something they wanted to keep out of State’s servers and away from Congressional oversight? Was it that State’s IT was so bad that they needed to take matters into their own hands? Or was it because the department’s IT staff wasn’t responsive enough to what they saw as their personal needs, and they decided to show just how take-charge they were by ignoring all those stuffy policies? Read 19 remaining paragraphs | Comments

Visit link:
The Ambassador who worked from Nairobi bathroom to avoid State Dept. IT

Apple becomes part of the Dow Jones Industrial Average, AT&T gets the boot

Dow Jones has issued a press release this morning announcing that as of March 19, there will be a change to the list of companies that make up the Dow Jones Industrial Average: AT&T is out, and Apple is in. According to the press release, the change is due in part to Visa’s upcoming 4:1 stock split, which will effectively lower Visa’s stock price and its effect on the index. To balance this reduction in Visa’s price—which the press release says can have “a material impact on sector representation”—Apple is being added to the index. The DJIA membership is fixed at thirty stocks , and so in order to add a company to it, one must be removed. The Dow has chosen to drop AT&T, leaving telecommunications to be represented on the index by AT&T’s rival Verizon—which, the release explains, is very similar to AT&T but has a higher market capitalization. The last time any membership changes were made to the DJIA was in September 2013, when Goldman Sachs, Nike, and Visa were added. AT&T has been a member of the DJIA since November 1999. Read 2 remaining paragraphs | Comments

Follow this link:
Apple becomes part of the Dow Jones Industrial Average, AT&T gets the boot

DNS enhancement catches malware sites by understanding sneaky domain names

A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, initially developed by researcher Jeremiah O’Connor, uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank , it spots DNS requests for sites that have names similar to legitimate sites, but with IP addresses that are outside the expected address blocks and other related data that hints at sketchiness. The practice of using look-alike domain names as part of an effort to fool victims into visiting websites or approving downloads is a well-worn approach in computer crime. But recent crafted attacks via “phishing” links in e-mails and social media have gone past the well-worn “typo-squatting” approach by using domain names that appear close to those of trusted sites, registered just in time for attacks to fly under reputation-scoring security tools to make blacklisting them harder. Fake domain names such as update-java.net and adobe-update.net, for example, were used in the recently discovered “Carbanak” attacks on banks that allowed criminals to gain access to financial institutions’ networks starting in January 2013 and steal over $1 billion over the next two years. Many security services can screen out malicious sites based on techniques such as reputation analysis—checking a centralized database to see if a site name has been associated with any malware attacks. But because attackers are able to rapidly register new domains with scripted systems that look relatively legitimate to the average computer user, they can often bypass reputation checks—especially when using their specially crafted domain names in highly targeted attacks. Read 4 remaining paragraphs | Comments

More here:
DNS enhancement catches malware sites by understanding sneaky domain names