Urban Terror Code Stolen

New submitter herbalt writes “The code of the free FPS game Urban Terror (a standalone game based on a Quake 3 mod), has been stolen. The development team, Frozen Sand, at first stated their Git Repository had been hacked, but later issued an announcement stating the perpetrator of the leak was a member of the development team. Frozen Sand also states they have found chat logs indicating there had been ‘a plot to get B1naryTh1ef to steal the code so they could sell Urban Terror under a different name on Steam.'” Read more of this story at Slashdot.

View post:
Urban Terror Code Stolen

After its acquisition of Waze this past June, Google announced this morning that it is deploying rea

After its acquisition of Waze this past June, Google announced this morning that it is deploying real time incident reports from Waze users to Google Maps mobile and apps users. Waze users can now search with Google, too. And if you’re into mapmaking, the Waze Map Editor now includes Google Street View. [ Google and Waze ] Read more…        

Continue reading here:
After its acquisition of Waze this past June, Google announced this morning that it is deploying rea

Researchers Release Tool That Can Scan the Entire Internet In Under an Hour

dstates writes “A team of researchers at the University of Michigan has released Zmap, a tool that allows an ordinary server to scan every address on the Internet in just 45 minutes. This is a task that used to take months, but now is accessible to anyone with a fast internet connection. In their announcement Friday , at the Usenix security conference in Washington they provide interesting examples tracking HTTPS deployment over time, the effects of Hurricane Sandy on Internet infrastructure, but also rapid identification of vulnerable hosts for security exploits. A Washington Post Blog discussing the work shows examples of the rate with which of computers on the Internet have been patched to fix Universal Plug and Play, ‘Debian weak key’ and ‘factorable RSA keys’ vulnerabilities. Unfortunately, in each case it takes years to deploy patches and in the case of UPnP devices, they found 2.56 million (16.7 percent) devices on the Internet had not yet upgraded years after the vulnerability had been described.” Read more of this story at Slashdot.

View the original here:
Researchers Release Tool That Can Scan the Entire Internet In Under an Hour

How One Programmer Is Coding Faster By Voice Than Keyboard

mikejuk writes “Is it possible that we have been wasting our time typing programs. Could voice recognition, with a little help from an invented spoken language, be the solution we didn’t know we needed? About two years ago Tavis Rudd, developed a bad case of RSI caused by typing lots of code using Emacs. It was so severe that he couldn’t code. As he puts it: ‘Desperate, I tried voice recognition’. The Dragon Naturally Speaking system used by Rudd supported standard language quite well, but it wasn’t adapted to program editing commands. The solution was to use a Python speech extension, DragonFly, to program custom commands. OK, so far so good, but … the commands weren’t quite what you might have expected. Instead of English words for commands he used short vocalizations — you have to hear it to believe it. Now programming sounds like a conversation with R2D2. The advantage is that it is faster and the recognition is easier — it also sounds very cool and very techie. it is claimed that the system is faster than typing. So much so that it is still in use after the RSI cleared up.” Read more of this story at Slashdot.

View article:
How One Programmer Is Coding Faster By Voice Than Keyboard

The World’s First CPU Liquid Cooler Using Nanofluids

An anonymous reader writes “CPU water cooling may be more expensive than air cooling, but it is quieter and moves the bulk away from your CPU. It’s also improving, as Zalman has just demonstrated with the announcement of the Reserator 3. Zalman is claiming that the Reserator 3 is the world’s first liquid cooler to use nanofluids. What’s that then? It involves adding refrigerant nanoparticles to the fluid that gets pumped around inside the cooler transporting the heat produced by a CPU to the radiator and fan where it is expelled. By using the so-called nanofluid, Zalman believes it can offer better cooling, and rates the Reserator 3 as offering up to 400W of cooling while remaining very quiet. The fluid and pump is supplemented by a dual copper radiator design and “quadro cooling path, ” which consists of two copper pipes sitting behind the fan and surrounded by the radiators. The heatsink sitting on top of the CPU is a micro-fin copper base allowing very quick transfer of heat to the nanofluid above.” Read more of this story at Slashdot.

View article:
The World’s First CPU Liquid Cooler Using Nanofluids

Researchers Snuck Malware Onto the App Store By Making It a Transformer

No one really knows exactly how Apple makes sure the apps that wind up in its store are safe. All we know is that the App Store has a comparatively better track record than its Android counterpart . But nothing is ever totally safe. Researchers managed to sneak malware onto the App Store with ease by giving their app the power to transform . Read more…        

Originally posted here:
Researchers Snuck Malware Onto the App Store By Making It a Transformer

Get your 1980s retro Dungeons & Dragons fix with this crazy short film

This Must Be the Only Fantasy is a Dungeons & Dragons style collaboration between fashion line Rodarte and photographer Todd Cole. The short movie is packed with amazing unicorns, badass ear cuffs, Elijah Wood drop ins, and self important pauses. But it does 100% feel like the 80s. Read more…        

More:
Get your 1980s retro Dungeons & Dragons fix with this crazy short film

A "Glitch" Made All the Doors in a Max. Security Prison Open at Once

A Florida prison says that a computer “glitch” is to blame after all of the doors in the maximum security wing opened without warning. Wired has news for them , though. Sometimes, these kinds of glitches are caused by sneaky characters called hackers. And this situation looks pretty suspect. Read more…        

Continue Reading:
A "Glitch" Made All the Doors in a Max. Security Prison Open at Once

Archaeologists Just Found the Oldest Board Game Tokens Ever

In a tomb near Siirt in southeast Turkey, archaeologists believe they may have just found the oldest gaming tokens ever after dating them back to a whopping 5, 000 years young. Read more…        

More here:
Archaeologists Just Found the Oldest Board Game Tokens Ever

Studying the Slow Decay of a Laptop Battery For an Entire Year

First time accepted submitter jradavenport writes “I’ve been keeping a log of the health of my MacBook Air battery for the past year, taking samples every minute I use the computer (152, 411 readings so far!). This has allowed me to study both my own computing/work habits, but also the fascinating rapid decay of battery capacity. Comparing it to my previous 2009 MacBook Pro, the battery in this 2012 Air is degrading much faster.” Read more of this story at Slashdot.

Continue reading here:
Studying the Slow Decay of a Laptop Battery For an Entire Year