Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Big Brother China Censors WeChat AGAIN (techarp.com)

crazyeyes writes: Last week, Tencent removed at least 40 WeChat public pages, allegedly at the behest of the Chinese government. Of course, this isn't the first time WeChat has censored its pages for the Chinese government. Early in January 2013, they censored and banned words or Chinese characters that referred to the Southern Weekly, which had then called for "certain reforms and greater respect for constitutional rights".

This may sound like hyperbole, but this incident could well be the beginning of the end for WeChat as an international text and voice messaging service. The Chinese people may have no other decent options, but those of us outside the Great Firewall of China have a lot more choices. Better choices even.

For our part, we are uninstalling our WeChat messengers, partly because there are better (and less annoying) instant messengers, and partly because we don't care for censorship. Join us in uninstalling WeChat, if you don't care for censorship either. China can keep their Instant Messenger of Much Insecurity. Original article at http://www.techarp.com/showart...

Submission + - Did the NSA use the Apple SSL bug to insert the DROPOUTJEEP spy software?

crazyeyes writes: Here's an interesting look at the SSL bug in Apple's iOS and OS X operating systems :

There is speculation that this could well be the security hole which the NSA exploited to insert the DROPOUTJEEP software implant, probably using automatic updates via SSL. DROPOUTJEEP, whose existence was revealed by Edward Snowden, targets the Apple iPhone (but could conceivably be used on all other iOS devices) and allows the NSA to "remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.All communications with the implant will be covert and encrypted.”

Apple, of course, denies that the NSA can access or are accessing iOS devices as Snowden's leaked documents claim. Still, there is no denying that such a bug is a major flaw, and allows iOS and Mac OS to be exploited by malicious persons.

Submission + - The Linux kernel as an exquisitely sensitive stability test for overclocked PCs (techarp.com) 1

crazyeyes writes: This article looks at using the Linux kernel as a more accurate and sensitive stability test for overclocked PCs :

"Using an overclocked PC is not a problem, provided that the PC is stable at the overclocked settings. Several programs are available to assess system stability by stress-testing the overclocked system. However, most overclockers do not know that the Linux kernel is an exquisitely sensitive tool to detect instabilities in an overclocked system. In fact, it is more accurate and sensitive than either Prime95 or IBT/LinX.

The Linux kernel supplies users with a dead simple method for measuring hardware instabilities — like those caused by an 'unstable' overclock. There is nothing special to install as this functionality seems to be naively included in the kernel itself. To use it, simply run a standard stress test such as Prime95 or Linpack and watch the output from dmesg. If the system is unstable due to insufficient voltage settings, excessive heat, it will report...

Data Storage

Submission + - VelociRaptors vs. SSDs! (techarp.com)

crazyeyes writes: This is the mighty battle of the ancient HDDs against the young SSD upstarts! The HDDs are represented by their finest warriors — the Western Digital VelociRaptors, and the SSDs by their favorite representatives — the Intel 520 Series and X25-M series. Will the HDDs prevail, or will the SSDs triumph and declare the beginning of the end of the HDD era? FIGHT!
AMD

Submission + - NVIDIA's Ninja Graphics Technology details leaked (techarp.com)

crazyeyes writes: There is a leak on NVIDIA's upcoming secret trick for their Kepler GPUs — the NVIDIA Ninja Graphics Technology . It claims to give NVIDIA gamers a random chance at evading bullets in FPS games through the manipulation of 3D primitives. Here's the key explanation :

"Normally, primitive data is converted to vertex points in 2D space before textures are applied and the scene is rendered. However, when an NVIDIA Kepler-based graphics card detects a game that supports Ninja Graphics, the GPU will automatically replicate an extra set of 3D primitive data for each frame and modify one copy with a random variable so that there are two slightly different primitives. The modified data will be sent back to the game, while the unmodified data sent to the vertex shaders and rendered normally.

Why do that at all? Well, the modified primitive data tricks the game into showing the player at a slightly different position in the game's world space. What this means is that the player appears slightly off to one side or another to other players (or the game's non-player characters) even though he is exactly where he's supposed to be. Perhaps this is why NVIDIA calls it Ninja Graphics — the player appears to be there, but isn't actually there."

Submission + - Second Hand Camera Lens Buying Guide (techarp.com)

crazyeyes writes: "This is a must-read guide for anyone who wants to buy second-hand camera lens. It has 13 pages of tips and pictures to show you how to look for defects in second-hand lens and how to avoid getting cheated online."

Submission + - NVIDIA Xmas Gift - the GeForce GTX 570 (techarp.com)

crazyeyes writes: NVIDIA just gave the gaming community a Xmas gift when they launched the GeForce GTX 570. It's faster than the GeForce GTX 480 but priced at just $349!

If you cannot afford that, you will be happy to note that they are pushing the price of the GeForce GTX 470 down to just $259. Will AMD follow suit?

Slashdot Top Deals

egrep -n '^[a-z].*\(' $ | sort -t':' +2.0

Working...