Wine 2.0 Released

An anonymous reader quotes a report from Softpedia: It’s finally here! After so many months of development and hard work, during which over 6, 600 bugs have been patched, the Wine project is happy to announce today, January 24, 2017, the general availability of Wine 2.0. Wine 2.0 is the biggest and most complete version of the open-source software project that allows Linux and macOS users to run applications and games designed only for Microsoft Windows operating systems. As expected, it’s a massive release that includes dozens of improvements and new features, starting with support for Microsoft Office 2013 and 64-bit application support on macOS. Highlights of Wine 2.0 include the implementation of more DirectWrite features, such as drawing of underlines, font fallback support, and improvements to font metrics resolution, font embedding in PDF files, Unicode 9.0.0 support, Retina rendering mode for the macOS graphics driver, and support for gradients in GDI enhanced metafiles. Additional Shader Model 4 and 5 shader instructions have been added to Direct3D 10 and Direct3D 11 implementation, along with support for more graphics cards, support for Direct3D 11 feature levels, full support for the D3DX (Direct3D Extension) 9 effect framework, as well as support for the GStreamer 1.0 multimedia framework. The Gecko engine was updated to Firefox 47, IDN name resolutions are now supported out-of-the-box, and Wine can correctly handle long URLs. The included Mono engine now offers 64-bit support, as well as the debug registers. Other than that, the winebrowser, winhlp32, wineconsole, and reg components received improvements. You can read the full list of features and download Wine 2.0 from WineHQ’s websiteS. Read more of this story at Slashdot.

Read the article:
Wine 2.0 Released

Insecure Scientists Build 1000-Watt ‘Super Laser’ 10 Times Stronger Than Stupid Regular Lasers

On Tuesday, an international team of scientists announced they successfully tested “Bivoj, ” a high peak power laser named after a legendary Czech strongman—and boy, they really want you to know it’s really, really strong. Read more…

View article:
Insecure Scientists Build 1000-Watt ‘Super Laser’ 10 Times Stronger Than Stupid Regular Lasers

Virulent Android malware returns, gets >2 million downloads on Google Play

Enlarge (credit: portal gda ) A virulent family of malware that infected more than 10 million Android devices last year has made a comeback, this time hiding inside Google Play apps that have been downloaded by as many as 12 million unsuspecting users. HummingWhale, as the professionally developed malware has been dubbed, is a variant of HummingBad, the name given to a family of malicious apps researchers documented in July invading non-Google app markets . HummingBad attempted to override security protections by exploiting unpatched vulnerabilities that gave the malware root privileges in older versions of Android. Before Google shut it down, it installed more than 50,000 fraudulent apps each day, displayed 20 million malicious advertisements, and generated more than $300,000 per month in revenue. Of the 10 million people who downloaded HummingBad-contaminated apps, an estimated 286,000 of them were located in the US. HummingWhale, by contrast, managed to sneak its way into about 20 Google Play apps that were downloaded from 2 million to 12 million times, according to researchers from Check Point, the security company that has been closely following the malware family for almost a year. Rather than rooting devices, the latest variant includes new virtual machine techniques that allow the malware to perform ad fraud better than ever, company researchers said in a blog post published Monday . Read 6 remaining paragraphs | Comments

Visit link:
Virulent Android malware returns, gets >2 million downloads on Google Play

The 32-Bit Dog Ate 16 Million Kids’ CS Homework

“Any student progress from 9:19 to 10:33 a.m. on Friday was not saved…” explained the embarrassed CTO of the educational non-profit Code.org, “and unfortunately cannot be recovered.” Slashdot reader theodp writes: Code.org CTO Jeremy Stone gave the kids an impromptu lesson on the powers of two with his explanation of why The Cloud ate their homework. “The way we store student coding activity is in a table that until today had a 32-bit index… The database table could only store 4 billion rows of coding activity information [and] we didn’t realize we were running up to the limit, and the table got full. We have now made a new student activity table that is storing progress by students. With the new table, we are switching to a 64-bit index which will hold up to 18 quintillion rows of information. The issue also took the site offline, temporarily making the work of 16 million K-12 students who have used the nonprofit’s Code Studio disappear. “On the plus side, this new table will be able to store student coding information for millions of years, ” explains the site’s CTO. But besides Friday’s missing saves, “On the down side, until we’ve moved everything over to the new table, some students’ code from before today may temporarily not appear, so please be patient with us as we fix it.” Read more of this story at Slashdot.

View original post here:
The 32-Bit Dog Ate 16 Million Kids’ CS Homework

Massive Twitter Bot Army Exposed by Its Obsession With Star Wars

Bot accounts are the bane of Twitter. The automated accounts that are often characterized by the default egg icon can wreak all sorts of havoc and totally turn the tide on topics that are trending. In a new paper , researchers discovered a bot army of 350, 000 accounts that all had one thing in common: a love of Star… Read more…

See the original post:
Massive Twitter Bot Army Exposed by Its Obsession With Star Wars

Carbon nanotube transistors push up against quantum uncertainty limits

Enlarge / A diagram of the transistors built in this paper, next to a false-colored image of the actual hardware. Atomically thin materials like graphene and carbon nanotubes have the potential to provide significant benefits compared to today’s electronics, like smaller features, lower operating voltages, and more efficient performance. So, even though we’re struggling to figure out how to use them in bulk manufactured electronics, lots of organizations are spending money, brains, and time to work that out. Note the phrasing above—potential. Since it’s been incredibly hard to make transistors based on these materials, we aren’t entirely sure how all of them will behave. A group of researchers from China’s Peking University decided it was time to cut down on some of the uncertainty. The answer they came up with? Transistors made with carbon nanotubes and graphene perform so well that they’re pushing up against the fundamental limits set by Heisenberg’s uncertainty principle. That still doesn’t mean we can make a chip full of these things, but it does show it’s worth the continued effort to try to figure out how. Read 10 remaining paragraphs | Comments

More:
Carbon nanotube transistors push up against quantum uncertainty limits

Female Shark Learns To Reproduce Without Males After Years Alone

An anonymous reader quotes a report from New Scientist: A female shark separated from her long-term mate has developed the ability to have babies on her own. Leonie the zebra shark (Stegostoma fasciatum) met her male partner at an aquarium in Townsville, Australia, in 1999. They had more than two dozen offspring together before he was moved to another tank in 2012. From then on, Leonie did not have any male contact. But in early 2016, she had three baby sharks. Intrigued, Christine Dudgeon at the University of Queensland in Brisbane, Australia, and her colleagues began fishing for answers. One possibility was that Leonie had been storing sperm from her ex and using it to fertilize her eggs. But genetic testing showed that the babies only carried DNA from their mum, indicating they had been conceived via asexual reproduction. Some vertebrate species have the ability to reproduce asexually even though they normally reproduce sexually. These include certain sharks, turkeys, Komodo dragons, snakes and rays. However, most reports have been in females who have never had male partners. In sharks, asexual reproduction can occur when a female’s egg is fertilized by an adjacent cell known as a polar body, Dudgeon says. This also contains the female’s genetic material, leading to “extreme inbreeding”, she says. “It’s not a strategy for surviving many generations because it reduces genetic diversity and adaptability.” Nevertheless, it may be necessary at times when males are scarce. “It might be a holding-on mechanism, ” Dudgeon says. “Mum’s genes get passed down from female to female until there are males available to mate with.” It’s possible that the switch from sexual to asexual reproduction is not that unusual; we just haven’t known to look for it, Dudgeon says. Read more of this story at Slashdot.

Read More:
Female Shark Learns To Reproduce Without Males After Years Alone

The Original iPhone Is Dead

The original iPhone has died. AT&T, the phone’s only carrier, decided to end its support for 2G cellular networks , thus rendering the original iPhone useless. This means that iPhone can no longer make calls or send text messages. He was just nine and a half years old. Read more…

Read this article:
The Original iPhone Is Dead

That critical “ImageTragick” bug Ars warned you about? It cost Facebook $40k

Last May, Ars reported that a critical vulnerability in a widely used image-processing application left a huge number of websites open to attacks that allowed hackers to execute malicious code on the underlying servers. More than five months later, Facebook paid a $40,000 bounty after discovering it was among those at risk. On Tuesday, researcher Andrey Leonov, said he was able to exploit the vulnerability in the ImageMagick application by using a tunneling technique based on the domain name system that bypassed Facebook firewalls. The firewalls had successfully protected against his earlier exploit attempts. Large numbers of websites use ImageMagick to quickly resize images uploaded by users. “I am glad to be the one of those who broke the Facebook,” Leonov wrote in a blog post that gave a blow-by-blow account of how he exploited the ImageMagick vulnerability. Two days after the researcher privately shared the exploit with Facebook security personnel, they patched their systems. Ten days after that, they paid Leonov $40,000, one of the biggest bounties Facebook has ever paid. Read 4 remaining paragraphs | Comments

Originally posted here:
That critical “ImageTragick” bug Ars warned you about? It cost Facebook $40k