PSA: 51 classic Sega Genesis games on Steam for about five cents each

Over the years, we’ve gotten used to Sega porting much of its library of legacy Genesis title to every platform imaginable, from mobile phones to the PlayStation 3. For those looking for a nostalgic fix, paying a few bucks per game for one of these quick trips down memory lane hasn’t been an awful deal. But paying just about five cents each for a bundle of 51 classic Genesis titles is a bargain basement deal that’s too good for practically any gaming fan to pass up. Amazon is currently selling all five pieces of the “Sega Genesis & Mega Drive Classic” series as downloadable Steam codes for the ridiculously low price of $2.62 . Among the dozens of games in the five-part collection are highlights like Eternal Champions, Gunstar Heroes , Phantasy Star 2, 3 , and 4 , Shining Force 1 and 2 , all three Streets of Rage games, all three Golden Axe games, and Vectorman 1 and 2 . A complete list of included titles is available on these Steam pages . Sold individually, these games usually run $3 each on Steam, which is more than the entire 51-game collection will run you currently on Amazon right now. Even in bundles, the collection usually goes for $37.50 on Steam or $18.70 on Amazon. A a quick look at a Steam price tracker suggests the bulk of the collection (not including the fifth part) has never been offered for less than $14.98 on the service. So depending on how you look at it, the current Amazon price is so that’s anywhere from an 85 to 98 percent savings from what were already some pretty good bundle prices for such a massive selection of classic games. Read 2 remaining paragraphs | Comments

More:
PSA: 51 classic Sega Genesis games on Steam for about five cents each

Password cracking experts decipher elusive Equation Group crypto hash

Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew’s exploits. It’s Arabic for “unregistered.” Researchers for Moscow-based Kaspersky Lab spent more than two weeks trying to crack the MD5 hash using a computer that tried more than 300 billion plaintext guesses every second. After coming up empty-handed, they enlisted the help of password-cracking experts, both privately and on Twitter , in hopes they would do better. Password crackers Jens Steube and Philipp Schmidt spent only a few hours before figuring out the plaintext behind the hash e6d290a03b70cfa5d4451da444bdea39 was غير مسجل, which is Arabic for “unregistered”. The hex-encoded string for the same Arabic word is dbedd120e3d3cce1. “That was a shock when it popped up and said ‘cracked,'” Steube told Ars Monday evening. He is the developer behind the free Hashcat password-cracking programs and an expert in password cracking. Read 6 remaining paragraphs | Comments

Read More:
Password cracking experts decipher elusive Equation Group crypto hash

Samsung’s first 14nm SoC is a 64-bit, 8-core Exynos aimed at high-end phones

Samsung has just announced a new high-end Exynos 7 Octa SoC . It uses eight CPU cores—a combination of four high-end Cortex A57 cores and four low-end, power-saving Cortex A53 cores in a big.LITTLE configuration—and supports the 64-bit ARMv8 instruction set. However, its most significant new feature is Samsung’s new 14nm manufacturing process, which promises performance and power consumption improvements compared to the existing 20nm process. Samsung is already shipping eight-core 64-bit Exynos chips on its older 20nm process, most notably in the Galaxy Note Edge and some variants of the Galaxy Note 4. Compared to those chips, Samsung claims that the 14nm version “enables up to 20 percent faster speed, 35 percent less power consumption, and 30 percent productivity gain.” Those numbers don’t tell us much in terms of actual clock speeds or performance-per-watt numbers, but it’s safe to assume that the 14nm Exynos 7 will be able to run at higher clock speeds for longer while consuming less power. We don’t know anything about the new Exynos’ GPU yet. The 20nm Exynos 7 Octa uses a high-end Mail-T760 GPU from ARM, and we’ll probably see something similar in the 14nm version. Read 2 remaining paragraphs | Comments

More:
Samsung’s first 14nm SoC is a 64-bit, 8-core Exynos aimed at high-end phones

South American ice chemistry records rise of Incas, arrival of Spanish

Ice cores are often relied on to be natural archives of past climate, capturing information that predates both our measurements and our greenhouse gas emissions. They’re a way of having records of the natural world that we don’t have a history of. However, natural archives like these can also act as records of human history, either directly (via fossils or artifacts) or indirectly. In mountainous regions, glacial ice doesn’t go as deep into the past as in Greenland or Antarctica, but it can tell stories of the recent past with excellent resolution. Airborne pollutants, for example, stand out sharply in measurements of the ice. They don’t say “pure as the driven snow” for nothing. Not much of this kind of work has been done in South America, though. Some lake sediment archives have shown the influence of local mining, but the timeline was fuzzy. In a new study, a team led by Chiara Uglietti , now at Switzerland’s Paul Scherrer Institute, has produced a detailed ice core record of air pollution from Peru’s Quelccaya Ice Cap that goes back to the year 793. Read 10 remaining paragraphs | Comments

More:
South American ice chemistry records rise of Incas, arrival of Spanish

Assassin’s Creed movie officially in production

The long-awaited Assassin’s Creed movie is finally moving ahead, with Ubisoft revealing the film has officially entered production. The video game adaptation will be released on December 21, 2016. Word of the production came from the most mundane of places though—Ubisoft’s quarterly financial call. The publisher is co-producing the film with studio New Regency, which has had a golden period in recent years with films such as 12 Years a Slave , Birdman , and Gone Girl under its umbrella. “We have the pleasure to announce today that the green light has been given by New Regency, and the production has already started,” said Ubisoft’s CEO Yves Guillemot. “This is a very important milestone for the project and for our team on Assassin’s Creed .” Read 4 remaining paragraphs | Comments

Continue reading here:
Assassin’s Creed movie officially in production

15-year-old bug allows malicious code execution in all versions of Windows

Microsoft just patched a 15-year-old bug that in some cases allows attackers to take complete control of PCs running all supported versions of Windows. The critical vulnerability will remain unpatched in Windows 2003, leaving that version wide open for the remaining five months Microsoft pledged to continue supporting it. The flaw, which took Microsoft more than 12 months to fix, affects all users who connect to business, corporate, or government networks using the Active Directory service. The database is built into Windows and acts as a combination traffic cop and security guard, granting specific privileges to authorized users and mapping where on a local network various resources are available. The bug—which Microsoft classifies as MS15-011 and the researcher who first reported it calls Jasbug—allows attackers who are in a position to monitor traffic passing between the user and the Active Directory network to launch a man-in-the-middle exploit that executes malicious code on vulnerable machines. “All computers and devices that are members of a corporate Active Directory may be at risk,” warned a blog post published Tuesday by JAS Global Advisors, the firm that reported the bug to Microsoft in January 2014. “The vulnerability is remotely exploitable and may grant the attacker administrator-level privileges on the target machine/device. Roaming machines—Active Directory member devices that connect to corporate networks via the public Internet (possibly over a Virtual Private Network (VPN))—are at heightened risk.” Read 4 remaining paragraphs | Comments

View post:
15-year-old bug allows malicious code execution in all versions of Windows

Google announces SPDY’s coming demise as HTTP/2 approaches

A little over five years ago, Google unveiled SPDY, a new protocol that it positioned as a more secure, better-performing replacement for hypertext transfer protocol (HTTP), the communication protocol on which the Web is built. Today the company announced that it would soon be removing SPDY support from Chrome. That’s because the Internet Engineering Task Force (IETF) has been working to update HTTP to produce HTTP/2, an updated revision of a protocol that has not seen any major changes since its introduction in the early 1990s. SPDY’s major goals were to reduce latency and improve security. To reduce latency, it included support for multiplexing—making multiple requests and responses over a single connection, with prioritization for different requests—and for security, it makes the use of TLS compulsory. Read 2 remaining paragraphs | Comments

Continued here:
Google announces SPDY’s coming demise as HTTP/2 approaches

Somalia is no safe refuge for torrent site

In the world of online piracy , it seems like it’s one in, one out at the moment. While The Pirate Bay returned  last week, Kickass Torrents has now been taken down via a domain name seizure. The site, which was already blocked from direct UK access as a result of high court blocking orders, now turns up an error message when users attempt to access its Somali .so domain. A look at its Whois record  shows the site listed as banned. The Somali registry was seen as a safe haven for the site, away from copyright holders and their lawyers, but it appears the takedown was a result of a claim. Several other sites with a .so domain, including the unaffiliated scam site kickasstorrents.so, have also been taken down, which indicates a far-reaching block on any URL with “kickass” in it that is based in the country. Read 4 remaining paragraphs | Comments

Continued here:
Somalia is no safe refuge for torrent site

Understanding M.2, the interface that will speed up your next SSD

Most solid-state drives released within the last year or so have been too fast for the bus they’re connected to. The 6Gbps SATA III spec was finalized in the days when rotational hard drives still ruled and SSDs were rare, ludicrously expensive, and relatively unreliable. There are a couple of different standards that have been created to solve this problem, and they both solve it in the same basic way. One, SATA Express , uses the same physical connector as older SATA drives but uses PCI Express lanes rather than the SATA bus to boost storage speeds. The other, which will be more common in space-constrained mini-desktops, all-in-ones, and Ultrabooks, is called M.2 (previously NGFF, for “Next-Generation Form Factor”). M.2 is interesting not just because it can speed up storage with PCI Express lanes, but because it can use a whole bunch of different buses too; it stands to replace both mSATA and mini PCI Express, two older standards that have been used for SSDs and Wi-Fi cards in laptops for a while now. Intel’s new Broadwell CPUs and their chipsets include native support for M.2 and PCI Express boot drivers—neither PCIe-connected storage ( hi Apple ) nor the M.2 connector itself are new, but beginning with Broadwell systems each of those two things will become much more common. Read 11 remaining paragraphs | Comments

Continue Reading:
Understanding M.2, the interface that will speed up your next SSD

Malicious Google Play apps (may have) hosed millions of Android handsets

Security researchers have once again found Google Play offering malicious apps that have been downloaded by millions of Android users. According to a blog post published Tuesday by antivirus provider Avast, the apps include the Durak card game app and at least two other titles. Combined, those apps have been installed as many as 15 million times. Researcher Filip Chytry wrote: When you install Durak, it seems to be a completely normal and well working gaming app. This was the same for the other apps, which included an IQ test and a history app . This impression remains until you reboot your device and wait for a couple of days. After a week, you might start to feel there is something wrong with your device. Some of the apps wait up to 30 days until they show their true colors. After 30 days, I guess not many people would know which app is causing abnormal behavior on their phone, right? Each time you unlock your device an ad is presented to you, warning you about a problem, e.g. that your device is infected, out of date or full of porn. This, of course, is a complete lie. You are then asked to take action, however, if you approve you get re-directed to harmful threats on fake pages, like dubious app stores and apps that attempt to send premium SMS behind your back or to apps that simply collect too much of your data for comfort while offering you no additional value. It’s not the first time Google’s official Android app bazaar has been found to host malicious apps. In the past, it has offered titles laced with surreptitious remote access trojans , Bitcoin miners , and rogue advertising networks . Three years ago, Google introduced a cloud-based scanner that scours Play for malicious apps , but attackers have been known to bypass it . Google officials regularly remove apps from Play when they are found to be malicious. At the time this post was being prepared, all three flagged by Avast remained available for download. Read 1 remaining paragraphs | Comments

Continue Reading:
Malicious Google Play apps (may have) hosed millions of Android handsets