Forgot your password?

Dead Space 2 Announced 56

Posted by Soulskill
from the now-with-extra-dead dept.
Electronic Arts announced on Monday that their popular survival-horror game Dead Space is officially getting a sequel. According to the press release, it's being developed for the PS3, Xbox 360 and PC. There's speculation that Dead Space 2 may include some form of multiplayer, after an EA job opening was spotted on LinkedIn that mentioned multiplayer level design for the franchise.
Data Storage

Best Home Backup Strategy Now? 611

Posted by kdawson
from the all-thumbs dept.
jollyreaper writes "Technology moves quickly and what was conventional wisdom last year can be folly this year. But the one thing that's remained constant is hard drives are far too large to backup via conventional means. Tape is expensive and can be unreliable, though it certainly has its proponents. DVDs are just too small. There are prosumer devices like the Drobo, but it's still just a giant box of hard drives, basically RAID. And as we've all had drilled into our heads, 'RAID is not backup.' When last this topic came up on Slashdot, the consensus was that hard drives were the best way to backup hard drives. Backup your internal HDD to an external one, and if your data is really important, have two externals and swap one off-site once a week. Is there any better advice these days?"
The Military

Open Source Software In the Military 91

Posted by kdawson
from the keep-it-stupid-stupid dept.
JohnMoD writes With the advent of, etc. the military seems to be getting on board with free and open source software. A working group meeting is going to be held at Georgia Tech in Atlanta, August 12-13, 2009. There's a pretty good lineup of speakers including a Marine from the Iraq-Marine Expeditionary Forces, who was on the ground and saw the agility open source gave to him and his soldiers. A number of OSS projects are going to be meeting there: Delta 3D, OpenCPI, FalconView, OSSIM, Red Hat, etc. Looks like there will be some good discussions."

Danish Expert Declares Vinland Map Genuine 210

Posted by kdawson
from the even-now-they-walk-among-us dept.
MBCook writes "A Danish conservation expert named Rene Larsen has finished a 5-year study of the infamous Vinland Map and declared it genuine. 'All the tests that we have done over the past five years — on the materials and other aspects — do not show any signs of forgery,' he said at the press conference. He and his team studied the ink, the paper, and even insect damage. They believe that the ink, which was discovered in 1972 to contain titanium dioxide and thus supposedly was too new for the map to be genuine, was contaminated when sand was used to dry the ink."

Security Threats 3 Levels Beyond Kernel Rootkits 264

Posted by kdawson
from the close-to-the-machine dept.
GhostX9 writes "Tom's Hardware has a long interview with security expert Joanna Rutkowska (which is unfortunately split over 9 pages). Many think that kernel rootkits are the most dangerous attacks, but Joanna and her team have been studying exploits beyond Ring 0 for some years. Joanna is most well known for the BluePill virtualization attack (Ring -1) and in this interview she chats a little bit about Ring -2 and Ring -3 attacks that go beyond kernel rootkits. What's surprising is how robust the classic BluePill proof-of-concept is: 'Many people tried to prove that BluePill is "detectable" by writing various virtualization detectors (but not BluePill detectors). They simply assumed that if we detect a virtualization being used, this means that we are "under" BluePill. This assumption was made because there were no products using hardware virtualization a few years ago. Needless to say, if we followed this way of reasoning, we might similarly say that if an executable makes network connections, then it must surely be a botnet.'" Rutkowska says that for her own security, "I don't use any A/V product on any of my machines (including all the virtual machines). I don't see how an A/V program could offer any increased security over the quite-reasonable-setup I already deployed with the help of virtualization." She runs three separate virtual machines, designated Red, Yellow, and Green, each running a separate browser and used for increasingly sensitive tasks.

Software Glitch Leads To $23,148,855,308,184,500 Visa Charges 544

Posted by timothy
from the what's-the-grace-period-again dept.
Hmmm2000 writes "Recently several Visa card holders were, um, overcharged for certain purchases, to the tune of $23,148,855,308,184,500.00 on a single charge. The company says it was due to a programming error, and that the problem has been corrected. What is interesting is that the amount charged actually reveals the type of programming error that caused the problem. 23,148,855,308,184,500.00 * 100 (I'm guessing this is how the number is actually stored) is 2314885530818450000. Convert 2314885530818450000 to hexadecimal, and you end up with 20 20 20 20 20 20 12 50. Most C/C++ programmers see the error now ... hex 20 is a space. So spaces were stuffed into a field where binary zero should have been."

To do nothing is to be nothing.