Wednesday, May 07, 2014

drag2share: Crysis 8K resolution hack offers a peek at the next decade of gaming

Source: http://www.engadget.com/2014/05/06/crysis-8k-resolution-hack/

Want to know what you'll be playing on your PlayStation 5 or Xbox Two in the next decade? Take a look at K-putt's Crysis 3 resolution hack. His tweak to the first-person shooter's main Windows program file lets the game's visuals run at up to a very wide 8K (specifically, 8,000 x 3,333). That's about 13 times more pixels than you'd see in a 1080p image, folks. The results very nearly speak for themselves -- screenshots look more like paintings, and even tiny objects are full of detail.

Don't think that your hot rod gaming PC can make this playable any time soon. Even a behemoth graphics card like NVIDIA's GeForce GTX Titan is barely good enough for running Crysis on three displays at 5,760 x 1,080; you'd need something with four times the pixel-pushing ability to keep up here. You can't exactly find an 8K screen at the local computer store, either. Technology moves quickly, though, and we wouldn't be shocked if both devices and displays are powerful enough to handle this kind of fidelity within a few years.

Filed under: ,

Comments

Via: ExtremeTech

Source: K-putt (Flickr), Reddit

---
drag2share - drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Read More...

Tuesday, May 06, 2014

drag2share: John Lewis' own-brand smart TVs with webOS launching today from £1,399

Source: http://www.engadget.com/2014/05/06/john-lewis-lg-smart-tvs/

The TV section of John Lewis stores, where customers and voyeurs alike come to gawk at the latest sets, will be joined by three new models today that also happen to bear the retailer's name. Its first own-brand TVs, known as the JL9000 series, have been made by LG especially, and thus run the manufacturer's webOS smart TV platform. Self-branded products tend to be at the lower-end of their category, but trust John Lewis to deck out its TVs with 1080p LED IPS panels, integrated 2.2-channel soundbars with extra subwoofers, passive 3D and 8-megapixel webcams. Those bells and whistles come at a cost, of course, so the 49-, 55- and 60-inch models will set you back £1,399, £1,699 and £2,199, respectively (still, a little cheaper than when the range was first teased). In typical John Lewis style, each one comes with a five-year guarantee, meaning you can chase the store directly if something goes wrong -- not that you'd be happy about it when laying down that kind of dosh.

Filed under: ,

Comments

Source: John Lewis

---
drag2share - drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Read More...

drag2share: Lenovo adds its first two consumer Chromebooks: N20 and N20p

Source: http://gigaom.com/2014/05/05/lenovo-adds-its-first-two-consumer-chromebooks-n20-and-n20p/

Following its Chromebooks aimed at the education market, Lenovo added a pair of Chrome OS laptops for consumers on Tuesday. The new devices are very similar to the Chromebooks meant for classrooms and are called the N20 and N20p. The N20 arrives for sale in July for $279 while the N20p launches the following month for $329.

Both share the same Intel Celeron chip that is now becoming fairly standard in Chromebooks save for a few models from Samsung and HP use the same type of processor found in smartphones and tablets. The pair also come with an 11.6-inch display with 1366 x 768 resolution, Wi-Fi, Bluetooth, up to 16 GB of internal storage and 100 GB of Google Drive capacity.

The extra $50 for the N20p adds a touchscreen display, capable of 10 simultaneous touch points. That screen also folds back up to 300-degrees, allowing the N20p to be used in a standing mode. If that sounds familiar, it’s because Lenovo’s Yoga 11e Chromebook does the same. In fact, the N20p is essentially a consumer model of that computer while the N20 is similar but lacks the folding display feature.

n20p chromebook

Related research and analysis from Gigaom Research:
Subscriber content. Sign up for a free trial.

---
drag2share - drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Read More...

drag2share: US to start testing universal internet IDs to combat fraud

Source: http://www.engadget.com/2014/05/06/nstic-government-internet-id/

In 2011, the government started concocting a plan to issue Americans one online ID they can use across multiple agencies' websites -- sort of like an OpenID for the government. Now, that plan's wheels are turning, and pilot testing's slated to begin this May in Pennsylvania and Michigan. The initiative, called National Strategy for Trusted Identities in Cyberspace (NSTIC), was originally devised as a means to prevent fraud and make it easier to verify identities quickly. This initial rollout only involves websites for those applying for government assistance, as it's merely meant to test whether the idea's feasible. But the government hopes this universal ID can replace people's logins for various places on the internet in the future. Obviously, not everyone will be thrilled by this development; after all, we're now very much aware of the NSA's love for snooping. Plus, it's risky using just a single log-in for various services like banking and social security. If you're one of those people, then cross your fingers and hope that NSTIC's completely voluntary, like what the government promised during the project's inception.

Filed under:

Comments

Via: TechDirt

Source: GCN

---
drag2share - drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Read More...

Monday, May 05, 2014

drag2share: How Facebook Connect (And Other Social Logins) Can Expose You To Hackers

Source: http://readwrite.com/2014/05/04/social-login-covert-redirect-openid-oauth-facebook-google-amazon

Be careful if you're signing in to Web services or apps that let you log in using an ID from Facebook, Twitter, or Google. A flaw in widely-used open-source systems known as OAuth 2.0 and OpenID could enable an attacker to covertly redirect you to a malicious site and get access to your data and private information.

Chinese doctoral student Jing Wang publicized the “covert redirect” vulnerability Friday morning. The vulnerability has been known for some time, but fresh attention could make attacks more common—and might also intensify pressure for a fix.

The vulnerability stems from a flaw in OAuth 2.0 and OpenID technology that lets you use your login from Facebook, Google, or Amazon (among others) to access other sites and services. Because of the flaw, an attacker can trick a user into thinking he or she is signing in via Facebook or Google and then redirect them to a malicious website. From there, depending on the level of access granted, it can expose your personal information, your contacts, your friends list, or in the case of Google Apps, stored data.

"This is often the result of a website's overconfidence in its partners," Wang wrote.

Not The Next Heartbleed

"It's not the next Heartbleed, it's not the end of the world, but at the same time, it's something that should be paid attention to," said Kevin O'Brien, director of product marketing for CloudLock. "What's new about it is the socialization," he added, referring to Wang's public campaign to draw attention to the flaw. Once a vulnerability is widely exposed, attacks frequently follow.

Wang discovered the flaw in February, he said via email. "I am not sure whether someone has used the vulnerability or not."

Social login services appeal to developers for several reasons. Amazon, for instance, describes its "Login with Amazon" service to developers as an opportunity to “securely connect with millions of Amazon customers and personalize their experience.” Social logins easy to integrate with Web services or Android and iOS apps, in turn making it simple for customers to sign into their accounts using their Amazon credentials.

The idea here, of course, is that if you trust Amazon, you can trust third parties that use its login system. That lets developers focus on what they do best, quickly, without having to build their own authorization system. Instead, they leave the security to the open source-developed secure OAuth 2.0 protocol.

Yet Another Shortcut Turns Into A Security Flaw

Which isn't an unreasonable thing to do. It just turns out that the problem here isn't merely the vulnerability in OAuth itself; it's also how companies like Facebook, Google and Amazon have implemented it.

Facebook, for instance, recommends developers use a whitelist that would effectively close the OAuth loophole by limiting redirections to safe and secure URLs. But Facebook doesn't require a whitelist, and as a result, many developers don't use one.

When Wang reported the problem to Facebook, the company said it understood the risks with OAuth 2.0. "However, short of forcing every single application on the platform to use a whitelist, [fixing the vulnerability] isn’t something that can be accomplished in the short term,” he wrote.

Wang also reported the vulnerability to Google, LinkedIn, Microsoft, Yahoo, PayPal, Weibo, Taobao, GitHub, and QQ, he said via email. Here are some of their responses:

Google said "[they] are aware of the problem and are tracking it at the moment."

LinkedIn [has] "have published a blog post on how [they] intend to address [the problem]." (Blog address: https://developer.linkedin.com/blog/register-your-oauth-2-redirect-urls)

Microsoft answered after they did an investigation and concluded that the vulnerability exists in the domain of a third-party, different from the one reported by me (login.live.com). They recommended me to report the issue to the third-party instead.

Weibo said that they thought this vulnerability was serious and would ask their developers to deal with this situation.

Taobao just closed my report without giving any reason.

Yahoo and Paypal did not reply me months after my report.

I did not contact VK.com, Mail.Ru and so on because I do not know their email address related to security.

Until there’s a fix, be careful when a site or application asks you to connect via Facebook, Twitter, Google, or other sites that use OAuth 2.0. Pay attention, O'Brien said. If you're looking at a site and get a sudden request for your social-login information when you're not expecting one, "that's the time to step back," he said.

---
drag2share - drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Read More...