Save yourself from your OEM’s bad decisions with a clean install of Windows 8.1

Crapware is a fact of life for Windows PC buyers. Most of the time, it’s relatively harmless: limited anti-virus subscriptions you don’t want, WildTangent games, and demoware you don’t need, and Microsoft Office demos you can’t use without spending more money. Sometimes, as we’ve seen with today’s “Superfish” news , it can be actively harmful, putting users’ security at risk. With some effort, this unwanted and unsafe software can usually be uninstalled. If you have an affected Lenovo PC, we’ve outlined the multi-step process for removing the software and the root certificate here . If you want to be sure that everything is completely removed (and if you’re willing to do the work), the more comprehensive solution is to completely reinstall Windows yourself. It’s not for everyone, but there are benefits to doing it this way—you get a totally clean PC that you’re in full control over. Read 38 remaining paragraphs | Comments

Read the article:
Save yourself from your OEM’s bad decisions with a clean install of Windows 8.1

Windows Defender now removes Superfish malware… if you’re lucky

First the good news. Microsoft today released a signature update for Windows Defender, the anti-malware software that’s built in to Windows, to enable it to both detect and remove the Superfish malware that Lenovo installed on some systems . Defender’s removal process seems to be quite robust, both uninstalling the software and removing the dangerous certificate that Superfish installs. However, it doesn’t appear to clean any contaminated installs of Firefox or Thunderbird; for that, you’ll want to check out our manual removal instructions . Uh oh… 2 more images in gallery Now the bad news. While Windows Defender is supplied as part of Windows and works well enough, Microsoft gave it some rather strange behavior  as a concession to third-party anti-malware vendors . If a third-party anti-malware product is installed, Windows Defender will automatically disable itself. Many Lenovo systems include trial versions of anti-malware software; during the duration of these trials, Windows Defender will be inactive. Read 2 remaining paragraphs | Comments

View article:
Windows Defender now removes Superfish malware… if you’re lucky

PSA: 51 classic Sega Genesis games on Steam for about five cents each

Over the years, we’ve gotten used to Sega porting much of its library of legacy Genesis title to every platform imaginable, from mobile phones to the PlayStation 3. For those looking for a nostalgic fix, paying a few bucks per game for one of these quick trips down memory lane hasn’t been an awful deal. But paying just about five cents each for a bundle of 51 classic Genesis titles is a bargain basement deal that’s too good for practically any gaming fan to pass up. Amazon is currently selling all five pieces of the “Sega Genesis & Mega Drive Classic” series as downloadable Steam codes for the ridiculously low price of $2.62 . Among the dozens of games in the five-part collection are highlights like Eternal Champions, Gunstar Heroes , Phantasy Star 2, 3 , and 4 , Shining Force 1 and 2 , all three Streets of Rage games, all three Golden Axe games, and Vectorman 1 and 2 . A complete list of included titles is available on these Steam pages . Sold individually, these games usually run $3 each on Steam, which is more than the entire 51-game collection will run you currently on Amazon right now. Even in bundles, the collection usually goes for $37.50 on Steam or $18.70 on Amazon. A a quick look at a Steam price tracker suggests the bulk of the collection (not including the fifth part) has never been offered for less than $14.98 on the service. So depending on how you look at it, the current Amazon price is so that’s anywhere from an 85 to 98 percent savings from what were already some pretty good bundle prices for such a massive selection of classic games. Read 2 remaining paragraphs | Comments

More:
PSA: 51 classic Sega Genesis games on Steam for about five cents each

Password cracking experts decipher elusive Equation Group crypto hash

Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew’s exploits. It’s Arabic for “unregistered.” Researchers for Moscow-based Kaspersky Lab spent more than two weeks trying to crack the MD5 hash using a computer that tried more than 300 billion plaintext guesses every second. After coming up empty-handed, they enlisted the help of password-cracking experts, both privately and on Twitter , in hopes they would do better. Password crackers Jens Steube and Philipp Schmidt spent only a few hours before figuring out the plaintext behind the hash e6d290a03b70cfa5d4451da444bdea39 was غير مسجل, which is Arabic for “unregistered”. The hex-encoded string for the same Arabic word is dbedd120e3d3cce1. “That was a shock when it popped up and said ‘cracked,'” Steube told Ars Monday evening. He is the developer behind the free Hashcat password-cracking programs and an expert in password cracking. Read 6 remaining paragraphs | Comments

Read More:
Password cracking experts decipher elusive Equation Group crypto hash

South American ice chemistry records rise of Incas, arrival of Spanish

Ice cores are often relied on to be natural archives of past climate, capturing information that predates both our measurements and our greenhouse gas emissions. They’re a way of having records of the natural world that we don’t have a history of. However, natural archives like these can also act as records of human history, either directly (via fossils or artifacts) or indirectly. In mountainous regions, glacial ice doesn’t go as deep into the past as in Greenland or Antarctica, but it can tell stories of the recent past with excellent resolution. Airborne pollutants, for example, stand out sharply in measurements of the ice. They don’t say “pure as the driven snow” for nothing. Not much of this kind of work has been done in South America, though. Some lake sediment archives have shown the influence of local mining, but the timeline was fuzzy. In a new study, a team led by Chiara Uglietti , now at Switzerland’s Paul Scherrer Institute, has produced a detailed ice core record of air pollution from Peru’s Quelccaya Ice Cap that goes back to the year 793. Read 10 remaining paragraphs | Comments

More:
South American ice chemistry records rise of Incas, arrival of Spanish

Deaf group sues Harvard, MIT over online courses

The National Association for the Deaf (NAD) filed a lawsuit  (PDF) against Harvard and MIT yesterday, saying the two universities are violating the Americans with Disabilities Act because they don’t properly caption their online course offerings. Harvard’s online courses aren’t really intended for students at the Ivy League university. Rather, the thousands of videos made available are part of the University’s “commitment to equity,” an effort “to create effective, accessible avenues for people who desire to learn but who may not have an opportunity to obtain a Harvard education.” The problem with Harvard’s offering, NAD lawyers say, is that it leaves out hard-of-hearing people. “Much of Harvard’s online content is either not captioned, or is inaccurately or unintelligibly captioned, making it inaccessible for individuals who are deaf or hard of hearing,” the complaint reads. “Just as buildings without ramps bar people who use wheelchairs, online content without captions excludes individuals who are deaf or hard of hearing.” Read 6 remaining paragraphs | Comments

View post:
Deaf group sues Harvard, MIT over online courses

Wheel of Time TV pilot producers sue Robert Jordan’s widow for defamation

The tale of the late-night Wheel of Time pilot that aired in a paid infomercial slot on FXX has taken another odd turn. Producers Red Eagle Entertainment LLC and Manetheren LLC have filed a lawsuit in the United States District Court for central California against Harriet McDougal (widow of James Rigney, who wrote the Wheel of Time novels under the pen name Robert Jordan), her company, Bandersnatch Group Inc., and twenty unnamed other persons (“Does 1-20”). The suit alleges that McDougal’s statements about her lack of involvement in the pilot’s production constitute breach of contract, slander, and interference with contractual relations and prospective economic relations; the suit demands declaratory relief and a jury trial. With the pilot coming essentially out of nowhere and airing with no fanfare, very few fans of the series were even aware of its existence until after the fact; it was clear that the production was accomplished in very little time and on a minimal budget. The resulting effort (titled “Winter Dragon”) did not resemble the series prologue very closely, and it quickly drew strong rebuke from McDougal, who claimed the pilot was made “without my knowledge or cooperation,” and that no one from Robert Jordan’s estate has been involved in any way with it. McDougal claims that Universal currently holds the rights to the Wheel of Time TV series, not Red Eagle Entertainment, and that the pilot made no mention of Universal or her own company, the Bandersnatch Group. That statement was apparently interpreted by Red Eagle Entertainment LLC—the corporate entity that produced the pilot and also claims to hold the television rights to The Wheel of Time —as fighting words. Read 4 remaining paragraphs | Comments

More:
Wheel of Time TV pilot producers sue Robert Jordan’s widow for defamation

Assassin’s Creed movie officially in production

The long-awaited Assassin’s Creed movie is finally moving ahead, with Ubisoft revealing the film has officially entered production. The video game adaptation will be released on December 21, 2016. Word of the production came from the most mundane of places though—Ubisoft’s quarterly financial call. The publisher is co-producing the film with studio New Regency, which has had a golden period in recent years with films such as 12 Years a Slave , Birdman , and Gone Girl under its umbrella. “We have the pleasure to announce today that the green light has been given by New Regency, and the production has already started,” said Ubisoft’s CEO Yves Guillemot. “This is a very important milestone for the project and for our team on Assassin’s Creed .” Read 4 remaining paragraphs | Comments

Continue reading here:
Assassin’s Creed movie officially in production

VESA publishes Embedded DisplayPort 1.4a standard that supports 8K displays

VESA, the standards body responsible for such luminary technologies as DisplayPort and the omnipresent VESA monitor mount, has published the specification for version 1.4a of Embedded DisplayPort (eDP). The new standard builds upon DisplayPort 1.3, which was published at the end of 2014. In short, eDP 1.4a allows for laptops, smartphones, tablets, and all-in-ones with 8K displays (7680×4320) or high-frequency (120Hz) 4K displays—but it includes a few other neat features, too. eDP 1.4a appears to be almost entirely based on DisplayPort 1.3—which was published in September 2014—with a couple of new features thrown in for good measure. eDP 1.4a specifies four high-speed (HBR3) lanes between the graphics adapter and display, with each lane capable of 8.1Gbps; the lanes can either be used individually, in pairs (more on that later), or all together for a total theoretical bandwidth of 32.4Gbps. That’s enough bandwidth to drive a 4K display (3840×2160) at 120Hz with 10-bit color or an 8K display at 60Hz. Beyond higher bandwidth, one of the more interesting features of eDP 1.4a is Direct Stream Compression (DSC), a standard developed by VESA and MIPI that—as the name implies—compresses the output video signal. According to VESA, the compression is “visually lossless” (i.e., it is lossy, but your games won’t suddenly look like a hand-me-down JPEG). VESA and MIPI say that DSC can reduce the component cost and power consumption of high-resolution displays—a claim that obviously needs to be confirmed once eDP 1.4a devices start shipping. Read 2 remaining paragraphs | Comments

Read this article:
VESA publishes Embedded DisplayPort 1.4a standard that supports 8K displays

Palm-sized pwnage: Ars tests the Pwn Plug R3

Imagine for a moment the following scenario: you’re the manager for a busy bank branch in a major city. You come back from lunch and are told by one of your employees that someone from corporate IT dropped by to check on a reported problem with a branch PC. You don’t remember putting in a trouble ticket with IT, but apparently the guy left after looking under a desk and re-plugging a network cable or something. It took less than five minutes. You think nothing of it and go back to approving loans. Three days later, you get a call from the head of corporate security, wanting to know why someone at your branch has been performing wire transfers from the accounts of customers who’ve never used your branch to accounts at offshore banks. A few hours later, you’re unplugging the bank’s network equipment while he’s shouting at you over the phone about gigabytes of corporate data being pulled down from something in your bank. And when the security team and police arrive to investigate, they find a little nondescript box plugged into a network port, connected to a broadband cellular modem. Something like this happened to banks in London last year . A man posing as an IT contractor wired networked keyboard-video-monitor (KVM) switches connected to cellular routers into PCs at two bank branches. The ring involved with the thefts was only caught because they decided to go for a third score, and their “technician” was caught in the act. The digital heists were a variation on the hacker “drop box” strategy: boldly walking into a place of business and planting a device, often hidden in plain sight, to use as a Trojan horse to gain remote access to the business’ network. Read 27 remaining paragraphs | Comments

Read more here:
Palm-sized pwnage: Ars tests the Pwn Plug R3