news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
SUSE Security Update: Security update for ghostscript-library ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2492-1 Rating: important References: #1001951 Cross-References: CVE-2013-5653 CVE-2016-7978 CVE-2016-7979 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for ghostscript-library fixes the following issues: - Multiple security vulnerabilities have been discovered where ghostscript's "-dsafer" flag did not provide sufficient protection against unintended access to the file system. Thus, a machine that would process a specially crafted Postscript file would potentially leak sensitive information to an attacker. (CVE-2013-5653, bsc#1001951) - An incorrect reference count was found in .setdevice. This issue lead to a use-after-free scenario, which could have been exploited for denial-of-service or, possibly, arbitrary code execution attacks. (CVE-2016-7978, bsc#1001951) - Insufficient validation of the type of input in .initialize_dsc_parser used to allow remote code execution. (CVE-2016-7979, bsc#1001951) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1458=1 - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1458=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1458=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1458=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1458=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-devel-9.15-11.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 References: https://www.suse.com/security/cve/CVE-2013-5653.html https://www.suse.com/security/cve/CVE-2016-7978.html https://www.suse.com/security/cve/CVE-2016-7979.html https://bugzilla.suse.com/1001951 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for ghostscript-library ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2493-1 Rating: important References: #1001951 #939342 Cross-References: CVE-2013-5653 CVE-2015-3228 CVE-2016-7977 CVE-2016-7979 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for ghostscript-library fixes the following issues: - Multiple security vulnerabilities have been discovered where ghostscript's "-dsafer" flag did not provide sufficient protection against unintended access to the file system. Thus, a machine that would process a specially crafted Postscript file would potentially leak sensitive information to an attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951) - Insufficient validation of the type of input in .initialize_dsc_parser used to allow remote code execution. (CVE-2016-7979, bsc#1001951) - An integer overflow in the gs_heap_alloc_bytes function used to allow remote attackers to cause a denial of service (crash) via specially crafted Postscript files. (CVE-2015-3228, boo#939342) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-ghostscript-library-12781=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-ghostscript-library-12781=1 - SUSE Manager 2.1: zypper in -t patch sleman21-ghostscript-library-12781=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-ghostscript-library-12781=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-ghostscript-library-12781=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-ghostscript-library-12781=1 - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-ghostscript-library-12781=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-ghostscript-library-12781=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-ghostscript-library-12781=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-ghostscript-library-12781=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-ghostscript-library-12781=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Manager Proxy 2.1 (x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Manager 2.1 (s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): ghostscript-devel-8.62-32.38.1 ghostscript-ijs-devel-8.62-32.38.1 libgimpprint-devel-4.2.7-32.38.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): ghostscript-library-debuginfo-8.62-32.38.1 ghostscript-library-debugsource-8.62-32.38.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): ghostscript-library-debuginfo-8.62-32.38.1 ghostscript-library-debugsource-8.62-32.38.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): ghostscript-library-debuginfo-8.62-32.38.1 ghostscript-library-debugsource-8.62-32.38.1 References: https://www.suse.com/security/cve/CVE-2013-5653.html https://www.suse.com/security/cve/CVE-2015-3228.html https://www.suse.com/security/cve/CVE-2016-7977.html https://www.suse.com/security/cve/CVE-2016-7979.html https://bugzilla.suse.com/1001951 https://bugzilla.suse.com/939342 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Toshiba OCZ VX500 512GB Solid State Drive Review @ ThinkComputers.org
news posted a topic in Upcoming News
Toshiba OCZ VX500 512GB Solid State Drive Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/toshiba-ocz-vx500-512gb-solid-state-drive-review/ Image URL: http://www.thinkcomputers.org/reviews/ocz_vx500/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/ocz_vx500/small.jpg Quote: "Today we have a new OCZ solid state drive that fits right in the mainstream with that of Crucial’s MX300 and Samsung’s EVO series in terms of both price and performance. The VX500 is made to replace OCZ’s Vector 180 and is made up completely of Toshiba parts with Toshiba’s TC358790 controller and Toshiba-made 15nm MLC NAND. It is actually quite interesting to see a MLC-based solid state drive come out now with many companies opting for the less expensive TLC NAND. In any case the OCZ VX500 boasts sequential read and write speeds speeds of 550 MB/s and 510 MB/s respectively and is backed by OCZ’s impressive 5-year Shield Plus warranty. Can this new SSD compete with other lower-cost drives out there? Read on as we find out!" -
[gentoo-announce] [ GLSA 201610-06 ] MySQL and MariaDB: Multiple vulnerabilities
news posted a topic in Upcoming News
The Fedora Project is pleased to announce the immediate availability of Fedora 25 Beta, the next big step on our journey to the exciting Fedora 25 release in November. Fedora's journey is not simply about up[censored] one operating system with the latest and greatest packages. It's also about innovation for the many different platforms represented in the Fedora Project: Workstation, Server, Atomic, and the various Spins. Coordinating the efforts across the many working groups is no small task, and serves as a testament to the talent and professionalism found within the Fedora community. Download the prerelease from our Get Fedora site: * Get Fedora 25 Beta Workstation https://getfedora.org/en/workstation/prerelease/ * Get Fedora 25 Beta Server https://getfedora.org/en/server/prerelease/ Looking for Cloud edition? Check out the section on Fedora Atomic below. Or, check out one of our popular variants: * Get Fedora 25 Beta Spins https://spins.fedoraproject.org/prerelease * Get Fedora 25 Beta Labs https://labs.fedoraproject.org/prerelease * Get Fedora 25 Beta ARM https://arm.fedoraproject.org/prerelease What's New? =========== As we move into this Beta phase of the Fedora 25 release cycle, what can users expect? Fedora-Wide Changes =================== Some of the changes that will be seen across all aspects of Fedora include: * Docker updated to version 1.12 * Support for weaker certificate authorities (i.e., 1024-bit) has been removed * Node.js updated to version 6.x, providing a new and better version of the popular server-side JavaScript engine * "Secondary architectures" now known as "alternate architectures" * Rust: Fedora 25 brings the support for the Rust programming language. Rust is a system programming language which runs blazingly fast, and prevents almost all crashes, segfaults, and data races. * Python: Alongside the "standard" Python versions included in Fedora 25 (3.5 and 2.7), Python programmers can now install Python 3.4, 3.3, and 2.6 from the repositories to help them run test suites on multiple Python versions, as well as on PyPy, PyPy3, and Jython, which were already there. Fedora Workstation ================== The Workstation edition of Fedora 25 Beta is going to show off its stuff, too: * GNOME 3.22: Fedora 25 includes GNOME 3.22 in its pre-release and in the Final version, coming soon. Helpful new features include multiple file renaming, a redesigned keyboard settings tool, and many other UI improvements across the environment. For full details, refer to the GNOME 3.22 release notes. https://help.gnome.org/misc/release-notes/3.22/ * New Fedora media writer: The new Fedora Media Writer is a tool that downloads the latest stable Fedora for you. It then helps you write it to media such as a USB stick, so you can take Fedora for a spin on your system. If you like what you see, you can install to your system from the live environment. The Fedora Media Writer is available for Windows, Mac OS, and Linux. * Wayland has been under development for several years. While like most software it still has some bugs, we believe it's ready to serve as a default that works for many users. Users can still select the old X11 system if necessary to avoid a problem that affects them. * Improved Flatpak support in the Software tool: The Software tool has the ability to install, update, and remove Flatpak software where a Fedora system is configured to point to a repo that offers it. * GNOME Shell extensions are no longer checked for compatibility with the current version of the Shell. This was originally required because the GNOME interfaces were changing rapidly during the early days of GNOME 3. Now these interfaces have stabilized, and extensions can generally be expected to work with new releases. Any problems with an extension should be reported to the author through the homepage, as listed on the Extensions site. Fedora Server ============= Fedora 25 Server is also going to see some interesting changes in this cycle, particularly in the Cockpit tool: * SELinux Troubleshooter module: Cockpit now has a SELinux Troubleshooter module similar to Fedora Workstation. If a system encounters an SELinux denial, it will display information about the issue as well as suggestions for correcting the issue if it was unexpected. Without the module, an administrator has to notice a denial occurred, dig through log files for the denial, and search for workarounds. The SELinux Troubleshooter presents information clearly and to the point all from the convenience of Cockpit. * Displays host SSH keys in the system dashboard: Easy to see and understand what SSH keys are added to the system for connecting to the machine. * Includes support for network teaming, Docker volume, and storage management, as well as the creation of systemd timer units * Supports multi-step (including two-factor) authentication FreeIPA identity management system has also been upgraded to 4.4 series: * Topology management: FreeIPA web UI can now be used to visually manage topology graph for large deployments * DNS sites: DNS management in FreeIPA now supports location-specific placement of services * Subordinate Certificate Authorities: FreeIPA Certificate Authority now is able to create subordinate CAs to issue certificates with a specific scope * Kerberos Authentication Indicators: Kerberos KDC now takes Authentication Indicators into account when issuing service tickets. This allows, for example, to require two-factor authenticated Kerberos credentials prior to obtaining tickets to a VPN service (supported by OpenConnect Server). * Client certificate authentication in Web UI: FreeIPA Web UI and API end-points now can be configured to log-in with client certificates and smart cards. * Active Directory integration improvements: a number of features were added for enterprise environments * FreeIPA now supports alternative user principal names and suffixes from Active Directory and allows FreeIPA users to have Kerberos aliases * Active Directory users can now manage own details through the command line interface (CLI), including public SSH keys and certificates - In case of trusting multiple Active Directory forests, FreeIPA is now capable to automatically solve DNS namespace routing conflicts - FreeIPA framework gained support for external plugins - Performance of FreeIPA has been optimized for large environments Fedora Atomic ============= Fedora Atomic includes a base image suitable for creating virtual machines, the Fedora Atomic Host image for creating hosts for container deployment, and a Docker image. This aspect of Fedora represents some of the most exciting changes, as we build more cloud- and container-ready tools into Fedora to create a fantastic developer platform. While Fedora 25 Atomic Host will not be a part of this beta release, the Fedora Project plans to change Fedora Atomic Host to be on Fedora 25 base on when generally available. Fedora Atomic images have new persistent download points: https://getfedora.org/atomic_qcow2_latest https://getfedora.org/atomic_raw_latest https://getfedora.org/atomic_vagrant_libvirt_latest https://getfedora.org/atomic_vagrant_virtualbox_latest "We chose to use Fedora Atomic as the base for our Navops Launch - Kubernetes cluster provisioning solution because our customers trust and already run Red Hat operating systems. We love the immutable aspect of Fedora Atomic which is perfect for containerized environments." Cameron Brunner, Chief Architect, Navops by Univa. Fedora Atomic has a two-week refresh release cycle with major releases every six months. It has an easy upgrade path to accommodate rapid development for supporting the latest applications. It can also be run as a desktop for those requiring a lightweight and highly reconfigurable environment. Still undergoing active development, once stable, Fedora Atomic should allow the typical Fedora user to easily provision cloud services. User contributions and experience reports are particularly welcome in preparing the upcoming version. Fedora Atomic will replace Fedora Cloud as one of our three Fedora Editions. The Fedora Cloud Base image will continue to be available for users wanting to build on a more traditional rpm-based foundation in a cloud environment. https://getfedora.org/en/cloud/prerelease/ Spins and More ============== These are not the only iterations of Fedora that are seeing changes in the Beta release today. Our KDE spin features new and improved packages for music, video, and personal information management. Xfce includes imrpovements to the terminal, notifications, and power management. Mate-Compiz features an update to Mate 1.16 and a complete switch to the GTK+ 3 toolkit. Issues and Details ================== Since this is a beta release, we expect that you may encounter bugs or missing features. To report issues encountered during testing, contact -
The Fedora Project is pleased to announce the immediate availability of Fedora 25 Beta, the next big step on our journey to the exciting Fedora 25 release in November. Fedora's journey is not simply about up[censored] one operating system with the latest and greatest packages. It's also about innovation for the many different platforms represented in the Fedora Project: Workstation, Server, Atomic, and the various Spins. Coordinating the efforts across the many working groups is no small task, and serves as a testament to the talent and professionalism found within the Fedora community. Download the prerelease from our Get Fedora site: * Get Fedora 25 Beta Workstation https://getfedora.org/en/workstation/prerelease/ * Get Fedora 25 Beta Server https://getfedora.org/en/server/prerelease/ Looking for Cloud edition? Check out the section on Fedora Atomic below. Or, check out one of our popular variants: * Get Fedora 25 Beta Spins https://spins.fedoraproject.org/prerelease * Get Fedora 25 Beta Labs https://labs.fedoraproject.org/prerelease * Get Fedora 25 Beta ARM https://arm.fedoraproject.org/prerelease What's New? =========== As we move into this Beta phase of the Fedora 25 release cycle, what can users expect? Fedora-Wide Changes =================== Some of the changes that will be seen across all aspects of Fedora include: * Docker updated to version 1.12 * Support for weaker certificate authorities (i.e., 1024-bit) has been removed * Node.js updated to version 6.x, providing a new and better version of the popular server-side JavaScript engine * "Secondary architectures" now known as "alternate architectures" * Rust: Fedora 25 brings the support for the Rust programming language. Rust is a system programming language which runs blazingly fast, and prevents almost all crashes, segfaults, and data races. * Python: Alongside the "standard" Python versions included in Fedora 25 (3.5 and 2.7), Python programmers can now install Python 3.4, 3.3, and 2.6 from the repositories to help them run test suites on multiple Python versions, as well as on PyPy, PyPy3, and Jython, which were already there. Fedora Workstation ================== The Workstation edition of Fedora 25 Beta is going to show off its stuff, too: * GNOME 3.22: Fedora 25 includes GNOME 3.22 in its pre-release and in the Final version, coming soon. Helpful new features include multiple file renaming, a redesigned keyboard settings tool, and many other UI improvements across the environment. For full details, refer to the GNOME 3.22 release notes. https://help.gnome.org/misc/release-notes/3.22/ * New Fedora media writer: The new Fedora Media Writer is a tool that downloads the latest stable Fedora for you. It then helps you write it to media such as a USB stick, so you can take Fedora for a spin on your system. If you like what you see, you can install to your system from the live environment. The Fedora Media Writer is available for Windows, Mac OS, and Linux. * Wayland has been under development for several years. While like most software it still has some bugs, we believe it's ready to serve as a default that works for many users. Users can still select the old X11 system if necessary to avoid a problem that affects them. * Improved Flatpak support in the Software tool: The Software tool has the ability to install, update, and remove Flatpak software where a Fedora system is configured to point to a repo that offers it. * GNOME Shell extensions are no longer checked for compatibility with the current version of the Shell. This was originally required because the GNOME interfaces were changing rapidly during the early days of GNOME 3. Now these interfaces have stabilized, and extensions can generally be expected to work with new releases. Any problems with an extension should be reported to the author through the homepage, as listed on the Extensions site. Fedora Server ============= Fedora 25 Server is also going to see some interesting changes in this cycle, particularly in the Cockpit tool: * SELinux Troubleshooter module: Cockpit now has a SELinux Troubleshooter module similar to Fedora Workstation. If a system encounters an SELinux denial, it will display information about the issue as well as suggestions for correcting the issue if it was unexpected. Without the module, an administrator has to notice a denial occurred, dig through log files for the denial, and search for workarounds. The SELinux Troubleshooter presents information clearly and to the point all from the convenience of Cockpit. * Displays host SSH keys in the system dashboard: Easy to see and understand what SSH keys are added to the system for connecting to the machine. * Includes support for network teaming, Docker volume, and storage management, as well as the creation of systemd timer units * Supports multi-step (including two-factor) authentication FreeIPA identity management system has also been upgraded to 4.4 series: * Topology management: FreeIPA web UI can now be used to visually manage topology graph for large deployments * DNS sites: DNS management in FreeIPA now supports location-specific placement of services * Subordinate Certificate Authorities: FreeIPA Certificate Authority now is able to create subordinate CAs to issue certificates with a specific scope * Kerberos Authentication Indicators: Kerberos KDC now takes Authentication Indicators into account when issuing service tickets. This allows, for example, to require two-factor authenticated Kerberos credentials prior to obtaining tickets to a VPN service (supported by OpenConnect Server). * Client certificate authentication in Web UI: FreeIPA Web UI and API end-points now can be configured to log-in with client certificates and smart cards. * Active Directory integration improvements: a number of features were added for enterprise environments * FreeIPA now supports alternative user principal names and suffixes from Active Directory and allows FreeIPA users to have Kerberos aliases * Active Directory users can now manage own details through the command line interface (CLI), including public SSH keys and certificates - In case of trusting multiple Active Directory forests, FreeIPA is now capable to automatically solve DNS namespace routing conflicts - FreeIPA framework gained support for external plugins - Performance of FreeIPA has been optimized for large environments Fedora Atomic ============= Fedora Atomic includes a base image suitable for creating virtual machines, the Fedora Atomic Host image for creating hosts for container deployment, and a Docker image. This aspect of Fedora represents some of the most exciting changes, as we build more cloud- and container-ready tools into Fedora to create a fantastic developer platform. While Fedora 25 Atomic Host will not be a part of this beta release, the Fedora Project plans to change Fedora Atomic Host to be on Fedora 25 base on when generally available. Fedora Atomic images have new persistent download points: https://getfedora.org/atomic_qcow2_latest https://getfedora.org/atomic_raw_latest https://getfedora.org/atomic_vagrant_libvirt_latest https://getfedora.org/atomic_vagrant_virtualbox_latest "We chose to use Fedora Atomic as the base for our Navops Launch - Kubernetes cluster provisioning solution because our customers trust and already run Red Hat operating systems. We love the immutable aspect of Fedora Atomic which is perfect for containerized environments." Cameron Brunner, Chief Architect, Navops by Univa. Fedora Atomic has a two-week refresh release cycle with major releases every six months. It has an easy upgrade path to accommodate rapid development for supporting the latest applications. It can also be run as a desktop for those requiring a lightweight and highly reconfigurable environment. Still undergoing active development, once stable, Fedora Atomic should allow the typical Fedora user to easily provision cloud services. User contributions and experience reports are particularly welcome in preparing the upcoming version. Fedora Atomic will replace Fedora Cloud as one of our three Fedora Editions. The Fedora Cloud Base image will continue to be available for users wanting to build on a more traditional rpm-based foundation in a cloud environment. https://getfedora.org/en/cloud/prerelease/ Spins and More ============== These are not the only iterations of Fedora that are seeing changes in the Beta release today. Our KDE spin features new and improved packages for music, video, and personal information management. Xfce includes imrpovements to the terminal, notifications, and power management. Mate-Compiz features an update to Mate 1.16 and a complete switch to the GTK+ 3 toolkit. Issues and Details ================== Since this is a beta release, we expect that you may encounter bugs or missing features. To report issues encountered during testing, contact
-
[gentoo-announce] [ GLSA 201610-05 ] Subversion, Serf: Multiple Vulnerabilities
news posted a topic in Upcoming News
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:*D-Link DCS-2530L HD 180-Degree Wi-Fi Camera *Link:*http://bigbruin.com/content/dcs-2530l_1 *Image (250x250):*http://bigbruin.com/images/articles/927/promo_1.jpg *Quote:* At a media event held on September 15, 2016, D-Link released its new 180-Degree Wi-Fi camera, the DCS-2530L. At first glance it looks a lot like the DCS-2630L that we reviewed almost a year ago; that is until you get them side by side. They both have the same shape, but as you will see later the newer DCS-2530L is significantly smaller. In this review I will go over the basics of the camera and compare the features of this 2530L to the 2630L. Best regards, Jason www.bigbruin.com -- -
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:*D-Link DCS-2530L HD 180-Degree Wi-Fi Camera *Link:*http://bigbruin.com/content/dcs-2530l_1 *Image (250x250):*http://bigbruin.com/images/articles/927/promo_1.jpg *Quote:* At a media event held on September 15, 2016, D-Link released its new 180-Degree Wi-Fi camera, the DCS-2530L. At first glance it looks a lot like the DCS-2630L that we reviewed almost a year ago; that is until you get them side by side. They both have the same shape, but as you will see later the newer DCS-2530L is significantly smaller. In this review I will go over the basics of the camera and compare the features of this 2530L to the 2630L. Best regards, Jason www.bigbruin.com --
-
Hardware Canucks is pleased to present our review of the new Western Digital Blue 1TB SSD. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/73569-western-digital-blue-1tb-ssd-review.html *Quote:* *Western Digital, once known for their hard drives alone, is now wading in the SSD market with two new series. In this review, we take the new Blue 1TB SSD out for a spin.* We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
-
A new stable release of Rygel! 0.32.1 ====== - Translation updates - Fix compile warnings with newer vala compiler All contributors to this release:  - Rico Tzschichholz  - Gianvito Cavasoli Added/updated translations  - it, courtesy of Gianvito Cavasoli Download source tarball here: http://download.gnome.org/sources/rygel/0.32/ -------- What is Rygel? Rygel is a home media solution that allows you to easily share audio, video and pictures, and control of media player on your home network. In technical terms it is both a UPnP AV MediaServer and MediaRenderer implemented through a  plug-in mechanism. Interoperability with other devices in the market is achieved  by conformance to very strict requirements of DLNA and on the fly  conversion of media to formats that client devices are capable of handling. More information at our project home page: http://www.rygel-project.org _______________________________________________
-
A new release of GUPnP-AV. Main feature: Remove dependency on GUPnP so it is usable with both GUPnP 1.0.x and 1.1.x series 0.12.9 ====== Changes since 0.12.8: - Drop dependency on GUPnP All contributors to this release:  - Jens Georg GUPnP-AV is available for download at https://download.gnome.org/sources/gupnp-av/0.12/ _______________________________________________
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2016:2047-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2047.html Issue date: 2016-10-10 CVE Names: CVE-2016-7039 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path as an unlimited recursion could unfold in both VLAN and TEB modules leading to a stack corruption in the kernel. (CVE-2016-7039, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375944 - CVE-2016-7039 kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-327.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm kernel-doc-3.10.0-327.36.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm perf-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-327.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm kernel-doc-3.10.0-327.36.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm perf-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-327.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm kernel-doc-3.10.0-327.36.2.el7.noarch.rpm ppc64: kernel-3.10.0-327.36.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.36.2.el7.ppc64.rpm kernel-debug-3.10.0-327.36.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.36.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.36.2.el7.ppc64.rpm kernel-devel-3.10.0-327.36.2.el7.ppc64.rpm kernel-headers-3.10.0-327.36.2.el7.ppc64.rpm kernel-tools-3.10.0-327.36.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.36.2.el7.ppc64.rpm perf-3.10.0-327.36.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm python-perf-3.10.0-327.36.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.36.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debug-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.36.2.el7.ppc64le.rpm kernel-devel-3.10.0-327.36.2.el7.ppc64le.rpm kernel-headers-3.10.0-327.36.2.el7.ppc64le.rpm kernel-tools-3.10.0-327.36.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.36.2.el7.ppc64le.rpm perf-3.10.0-327.36.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm python-perf-3.10.0-327.36.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm s390x: kernel-3.10.0-327.36.2.el7.s390x.rpm kernel-debug-3.10.0-327.36.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.s390x.rpm kernel-debug-devel-3.10.0-327.36.2.el7.s390x.rpm kernel-debuginfo-3.10.0-327.36.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.36.2.el7.s390x.rpm kernel-devel-3.10.0-327.36.2.el7.s390x.rpm kernel-headers-3.10.0-327.36.2.el7.s390x.rpm kernel-kdump-3.10.0-327.36.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.36.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.36.2.el7.s390x.rpm perf-3.10.0-327.36.2.el7.s390x.rpm perf-debuginfo-3.10.0-327.36.2.el7.s390x.rpm python-perf-3.10.0-327.36.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.s390x.rpm x86_64: kernel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm perf-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.36.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.36.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-327.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm kernel-doc-3.10.0-327.36.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm perf-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-7039 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/B/DXlSAg2UNWIIRAnxIAJ0caImbU/keEpfj+NLwG1ot88xhGACfTWv7 Ugflv6ud+f6nUaE93AOd2qQ= =kTSD -----END PGP SIGNATURE----- --
-
About mutter ============ Mutter is a window and compositing manager that displays and manages your desktop via OpenGL. Mutter combines a sophisticated display engine using the Clutter toolkit with solid window-management logic inherited from the Metacity window manager. While Mutter can be used stand-alone, it is primarily intended to be used as the display core of a larger system such as GNOME Shell. For this reason, Mutter is very extensible via plugins, which are used both to add fancy visual effects and to rework the window management behaviors to meet the needs of the environment. News ==== * Fix feedback loop between StClipboard and X11 bridge [Carlos; #760745] * Fall back gracefully if DRM plane rotation fails [Carlos; #772512] * Approximate native monitor backend behavior to X [Rui; #772176] * Fix crash on VT switch on wayland [Jonas; #771646] * Expose Flatpak ID for application matching [Florian; #772613, #772614] Contributors: Jonas Ådahl, Carlos Garnacho, Rui Matos, Florian Müllner, Olav Vitters Translations: Inaki Larranaga Murgoitio [eu], Milo Casagrande [it] Download ======== https://download.gnome.org/sources/mutter/3.22/mutter-3.22.1.tar.xz (3.37M) sha256sum: ffba28b955dc1b8a4734020de4ed4dff4afed435f0a059974be9bf3168acf59e _______________________________________________
-
About GNOME Shell ================= GNOME Shell provides core user interface functions for the GNOME 3 desktop, like switching to windows and launching applications. GNOME Shell takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts to provide a visually attractive and easy to use experience. Tarball releases are provided largely for distributions to build packages. If you are interested in building GNOME Shell from source, we would recommend building from version control using the build script described at: https://wiki.gnome.org/Projects/GnomeShell Not only will that give you the very latest version of this rapidly changing project, it will be much easier than get GNOME Shell and its dependencies to build from tarballs. News ==== * Fix hidden network indicator on startup [Florian; #772249] * Fix order of windows with modal dialogs in window switcher [Florian; #747153] * Fix feedback loop between StClipboard and X11 bridge [Carlos; #760745] * Reliably match windows from Flatpak apps [Florian; #772615] * Misc. bug fixes [Philip; #742249] Contributors: Philip Chimento, Carlos Garnacho, Florian Müllner Translations: Inaki Larranaga Murgoitio [eu], Khaled Hosny [ar], BM [uz ( -at -) cyrillic], Milo Casagrande [it], Cheng-Chia Tseng [zh_TW], gogo Download ======== https://download.gnome.org/sources/gnome-shell/3.22/gnome-shell-3.22.1.tar.xz (1.86M) sha256sum: ca9492fae6c647e6bf98624a7cef6e4776894e4888f54b63e60b672b754fb217 _______________________________________________
-
About gnome-shell-extensions ============================ GNOME Shell Extensions is a collection of extensions providing additional and optional functionality to GNOME Shell. Most extensions can be installed by configuring --prefix=$HOME/.local, and will be picked automatically at next login. News ==== * window-list: Update icon on app changes Download ======== https://download.gnome.org/sources/gnome-shell-extensions/3.22/gnome-shell-extensions-3.22.1.tar.xz (332K) sha256sum: e6fd8974758d3e97a8708fe0b0fb92ca00b48f67bc24590ff718f756b820c6cd _______________________________________________
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: tomcat security update Advisory ID: RHSA-2016:2046-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2046.html Issue date: 2016-10-10 CVE Names: CVE-2014-7810 CVE-2015-5346 CVE-2016-5388 CVE-2016-5425 CVE-2016-6325 ===================================================================== 1. Summary: An update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * It was discovered that the Tomcat packages installed configuration file /usr/lib/tmpfiles.d/tomcat.conf writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-5425) * It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325) * It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810) * It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5388) * A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests. (CVE-2015-5346) Red Hat would like to thank Dawid Golunski (http://legalhackers.com) for reporting CVE-2016-5425 and Scott Geary (VendHQ) for reporting CVE-2016-5388. The CVE-2016-6325 issue was discovered by Red Hat Product Security. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1222573 - CVE-2014-7810 Tomcat/JbossWeb: security manager bypass via EL expressions 1311085 - CVE-2015-5346 tomcat: Session fixation 1353809 - CVE-2016-5388 Tomcat: CGI sets environmental variable based on user supplied Proxy request header 1362545 - CVE-2016-5425 tomcat: Local privilege escalation via systemd-tmpfiles service 1367447 - CVE-2016-6325 tomcat: tomcat writable config files allow privilege escalation 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: tomcat-7.0.54-8.el7_2.src.rpm noarch: tomcat-servlet-3.0-api-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: tomcat-7.0.54-8.el7_2.noarch.rpm tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm tomcat-docs-webapp-7.0.54-8.el7_2.noarch.rpm tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-javadoc-7.0.54-8.el7_2.noarch.rpm tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-jsvc-7.0.54-8.el7_2.noarch.rpm tomcat-lib-7.0.54-8.el7_2.noarch.rpm tomcat-webapps-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: tomcat-7.0.54-8.el7_2.src.rpm noarch: tomcat-servlet-3.0-api-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: tomcat-7.0.54-8.el7_2.noarch.rpm tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm tomcat-docs-webapp-7.0.54-8.el7_2.noarch.rpm tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-javadoc-7.0.54-8.el7_2.noarch.rpm tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-jsvc-7.0.54-8.el7_2.noarch.rpm tomcat-lib-7.0.54-8.el7_2.noarch.rpm tomcat-webapps-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux Server (v. 7): Source: tomcat-7.0.54-8.el7_2.src.rpm noarch: tomcat-7.0.54-8.el7_2.noarch.rpm tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-lib-7.0.54-8.el7_2.noarch.rpm tomcat-servlet-3.0-api-7.0.54-8.el7_2.noarch.rpm tomcat-webapps-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: tomcat-7.0.54-8.el7_2.noarch.rpm tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm tomcat-docs-webapp-7.0.54-8.el7_2.noarch.rpm tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-javadoc-7.0.54-8.el7_2.noarch.rpm tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-jsvc-7.0.54-8.el7_2.noarch.rpm tomcat-lib-7.0.54-8.el7_2.noarch.rpm tomcat-webapps-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: tomcat-7.0.54-8.el7_2.src.rpm noarch: tomcat-7.0.54-8.el7_2.noarch.rpm tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm tomcat-lib-7.0.54-8.el7_2.noarch.rpm tomcat-servlet-3.0-api-7.0.54-8.el7_2.noarch.rpm tomcat-webapps-7.0.54-8.el7_2.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: tomcat-docs-webapp-7.0.54-8.el7_2.noarch.rpm tomcat-javadoc-7.0.54-8.el7_2.noarch.rpm tomcat-jsvc-7.0.54-8.el7_2.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-7810 https://access.redhat.com/security/cve/CVE-2015-5346 https://access.redhat.com/security/cve/CVE-2016-5388 https://access.redhat.com/security/cve/CVE-2016-5425 https://access.redhat.com/security/cve/CVE-2016-6325 https://access.redhat.com/security/updates/classification/#important https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX+/82XlSAg2UNWIIRAgOSAJ9aABVl6Frcdth31LFI2ezFGEThFQCdHTk4 EFkvvoMOhjMDVVwCnsedKK8= =FOMm -----END PGP SIGNATURE----- --
-
MSI GT83VR 6RF Titan SLI GTX 1080 Laptop Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=fd1101295c&e=872093acb5 http://www.kitguru.net =MSI GT83VR 6RF TITAN SLI GTX 1080 LAPTOP REVIEW= From the moment Nvidia announced its new GTX 10-series graphics chips we only had one question ‘When will we see the new MSI Titan?’. Well, the answer is ‘now’. The previous GT80S 6QF Titan was a gaming monster that packed dual GTX 980 GPUs in SLI along with a Core i7, a mechanical keyboard and a huge 18.4-inch screen. The price was also huge at £3,999, but damn it was an amazing experience. Titan set a new benchmark for, well, everything. Read the review here: http://www.kitguru.net/lifestyle/laptops/notebook/leo-waldock/msi-gt83vr-6rf-titan-sli-gtx-1080-laptop-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=fd1101295c&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
[RHSA-2016:2045-01] Important: tomcat6 security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: tomcat6 security and bug fix update Advisory ID: RHSA-2016:2045-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2045.html Issue date: 2016-10-10 CVE Names: CVE-2015-5174 CVE-2015-5345 CVE-2016-0706 CVE-2016-0714 CVE-2016-5388 CVE-2016-6325 ===================================================================== 1. Summary: An update for tomcat6 is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - noarch Red Hat Enterprise Linux HPC Node (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325) * It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714) * It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5388) * A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. (CVE-2015-5174) * It was found that Tomcat could reveal the presence of a directory even when that directory was protected by a security constraint. A user could make a request to a directory via a URL not ending with a slash and, depending on whether Tomcat redirected that request, could confirm whether that directory existed. (CVE-2015-5345) * It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706) Red Hat would like to thank Scott Geary (VendHQ) for reporting CVE-2016-5388. The CVE-2016-6325 issue was discovered by Red Hat Product Security. Bug Fix(es): * Due to a bug in the tomcat6 spec file, the catalina.out file's md5sum, size, and mtime attributes were compared to the file's attributes at installation time. Because these attributes change after the service is started, the "rpm -V" command previously failed. With this update, the attributes mentioned above are ignored in the RPM verification and the catalina.out file now passes the verification check. (BZ#1357123) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1265698 - CVE-2015-5174 tomcat: URL Normalization issue 1311082 - CVE-2016-0714 tomcat: Security Manager bypass via persistence mechanisms 1311087 - CVE-2016-0706 tomcat: security manager bypass via StatusManagerServlet 1311089 - CVE-2015-5345 tomcat: directory disclosure 1353809 - CVE-2016-5388 Tomcat: CGI sets environmental variable based on user supplied Proxy request header 1357123 - rpm -V tomcat6 fails due on /var/log/tomcat6/catalina.out [rhel-6.8.z] 1367447 - CVE-2016-6325 tomcat: tomcat writable config files allow privilege escalation 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: tomcat6-6.0.24-98.el6_8.src.rpm noarch: tomcat6-6.0.24-98.el6_8.noarch.rpm tomcat6-admin-webapps-6.0.24-98.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-98.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-98.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-lib-6.0.24-98.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-98.el6_8.noarch.rpm tomcat6-webapps-6.0.24-98.el6_8.noarch.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: tomcat6-6.0.24-98.el6_8.src.rpm noarch: tomcat6-6.0.24-98.el6_8.noarch.rpm tomcat6-admin-webapps-6.0.24-98.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-98.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-98.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-lib-6.0.24-98.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-98.el6_8.noarch.rpm tomcat6-webapps-6.0.24-98.el6_8.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: tomcat6-6.0.24-98.el6_8.src.rpm noarch: tomcat6-6.0.24-98.el6_8.noarch.rpm tomcat6-admin-webapps-6.0.24-98.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-98.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-98.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-lib-6.0.24-98.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-98.el6_8.noarch.rpm tomcat6-webapps-6.0.24-98.el6_8.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: tomcat6-6.0.24-98.el6_8.src.rpm noarch: tomcat6-6.0.24-98.el6_8.noarch.rpm tomcat6-admin-webapps-6.0.24-98.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-98.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-98.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-98.el6_8.noarch.rpm tomcat6-lib-6.0.24-98.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-98.el6_8.noarch.rpm tomcat6-webapps-6.0.24-98.el6_8.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5174 https://access.redhat.com/security/cve/CVE-2015-5345 https://access.redhat.com/security/cve/CVE-2016-0706 https://access.redhat.com/security/cve/CVE-2016-0714 https://access.redhat.com/security/cve/CVE-2016-5388 https://access.redhat.com/security/cve/CVE-2016-6325 https://access.redhat.com/security/updates/classification/#important https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.45 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX+/4AXlSAg2UNWIIRAjm0AJ9rYknhq2i5F0ykr0zogwOYt9DJ6QCdHkkb kkUxsjVWgiQohr2wjkMhuFg= =OFvs -----END PGP SIGNATURE----- -- -
gThumb 3.4.4 is now available for download at: http://download.gnome.org/sources/gthumb/3.4/ b008fe4d4d8e2e3e3d110e8e918c46dbb3491493b81b024d0b567b0c58570ddf gthumb-3.4.4.news 15d8d601645bd59966b90aa99d32e16c3d1b9bb168710dfc21c7e5fcc6398810 gthumb-3.4.4.changes 154bdc8c1940209f1e3d9c60184efef45b0d24f5f7f7f59b819e9c08e19c2981 gthumb-3.4.4.tar.xz What is gThumb ============== gThumb is an image viewer and browser utility for the GNOME environment. The README file distributed with the tar archive contains a complete list of features and the instructions to compile the source. The complete description, screenshots and other info are available at http://live.gnome.org/gthumb Overview of changes from gThumb 3.4.3 to 3.4.4 ============================================== Bugs fixed: * Sizing issues in gthumb preferences under gtk+ git master. (#770546) * Hide the image frame when in fullscreen mode. (#767731) * Fixed headerbar buttons not shown correctly after activating a tool. * Orginaze files: fixed wrong catalog cardinality. * Fixed scrollbars resetting their position when changing image. * Find duplicates: faster. * New folder: open the created folder. * Print dialog: expand the options side to make the zoom slider visible. * Fixed wrong image loaded after deleting an image from a catalog. New or updated application translations: * Croatian (gogo) * Indonesian (Andika Triwidada) Licensing ========= This program is released under the terms of the GNU General Public License (GNU GPL) version 2 or greater. You can find a copy of the license in the file COPYING. October 10th, 2016 Paolo Bacchilega _______________________________________________
-
*Gears of War 4 DX12 PC VGA graphics performance review* Today Gears of War 4 is released in it's DirectX 12 flavor. We look at the game for the Windows PC platform. We'll test the game on the PC platform relative towards graphics card performance with the latest AMD/NVIDIA graphics card drivers. Multiple graphics cards are being tested and benchmarked. We have a look at performance with the newest graphics cards and technologies. Read our review right here <http://www.guru3d.com/articles-pages/gears-of-war-4-pc-vga-graphics-performance-benchmark-review,1.html>'>http://www.guru3d.com/articles-pages/gears-of-war-4-pc-vga-graphics-performance-benchmark-review,1.html> . URL: http://www.guru3d.com/articles-pages/gears-of-war-4-pc-vga-graphics-performance-benchmark-review,1.html <http://www.guru3d.com/articles-pages/gears-of-war-4-pc-vga-graphics-performance-benchmark-review,1.html> --
-
[Tech ARP] The Galaxy Note7 Recall & Replacement Explained Rev. 5.0
news posted a topic in Upcoming News
Dear visitors, dear colleagues Title: ASUS Z170 Pro Gaming Aura Review ( -at -) ocaholic Text: If you're lookin for an ASUS motherboard suitable for a gaming rig and you're on a tight budget, then you'll most likely find the Z170 Pro Gaming Aura. On the following pages we're going to look into whether ASUS is capable of standing up to it's promise of offering a well-priced gaming motherboard. Link: http://www.ocaholic.co.uk/modules/smartsection/item.php?itemid=4024 Image: http://www.ocaholic.ch/uploads/extgallery/public-photo/thumb/thumb_ASUS-Z170ProGamingAura_027_642_92022.JPG If you have interesting articles yourself we would also like to publish -
Tt eSPORTS Level 10M Advanced Gaming Mouse Review @ ThinkComputers.org
news posted a topic in Upcoming News
Tt eSPORTS Level 10M Advanced Gaming Mouse Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/tt-esports-level-10m-advanced-gaming-mouse-review/ Image URL: http://www.thinkcomputers.org/reviews/tt_level10_advanced/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/tt_level10_advanced/small.jpg Quote: "Almost four years ago we took a look at Tt eSPORTS’ original Level 10M Gaming Mouse, we followed that up with the Level 10M Hybrid a couple years later and today we have the new Level 10M Advanced. This mouse is what Tt eSPORTS calls an “enhanced version†of the original Level 10M mouse. It packs in a very similar design to the original mouse, a 16000 DPI sensor, OMRON switches, 3-zone RGB lighting, and more. Will these features be enough for it to compete against other gaming mice out there? Read on as we find out!" -
Nerdytec Couchmaster Cycon Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=e4ae304b9b&e=872093acb5 http://www.kitguru.net =NERDYTEC COUCHMASTER CYCON REVIEW= There is no doubt that PC gaming is still all about the mouse and keyboard. While there has definitely been a big push towards gaming in the living room, as proven by Steam with their Steam Machines and Steam Controllers, such concepts are still a long way off from being as ubiquitous as the tried-and-trusted keyboard and mouse combination. Rather than trying to fight that, Nerdytec have launched the Couchmaster Cycon in an attempt to make using the keyboard and mouse from your sofa as comfortable as possible. Read the review here: http://www.kitguru.net/peripherals/dominic-moass/nerdytec-couchmaster-cycon-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=e4ae304b9b&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
<http://www.eteknix.com>'>http://www.eteknix.com> MSI Vortex G65VR 6RE GTX 1070 SLI Gaming PC Review The typical PC form factor has progressively evolved over time due to the advent of die shrinks and other efficiency savings which make compact systems a viable purchase. Unless you're opting for a build with multiple graphics cards, it's possible to construct an extremely powerful machine in a sleek and slimline chassis. Saying that, full tower cases provide better airflow due to the larger surface area and tiny ITX cube cases tend to be reserved for low-end HTPC usage scenarios. Despite the higher thermal loads, consumers appear to be embracing smaller hardware and enjoy the concept of downsizing their PC. This market trend has inspired manufacturers to draft innovative, interesting designs which could potentially change the way we perceive systems with exceptional gaming credentials. URL - http://www.eteknix.com/msi-vortex-g65vr-6re-gtx-1070-sli-gaming-pc-review/ <http://www.eteknix.com> MSI Vortex G65VR 6RE GTX 1070 SLI Gaming PC Review The typical PC form factor has progressively evolved over time due to the advent of die shrinks and other efficiency savings which make compact systems a viable purchase. Unless you're opting for a build with multiple graphics cards, it's possible to construct an extremely powerful machine in a sleek and slimline chassis. Saying that, full tower cases provide better airflow due to the larger surface area and tiny ITX cube cases tend to be reserved for low-end HTPC usage scenarios. Despite the higher thermal loads, consumers appear to be embracing smaller hardware and enjoy the concept of downsizing their PC. This market trend has inspired manufacturers to draft innovative, interesting designs which could potentially change the way we perceive systems with exceptional gaming credentials. URL - http://www.eteknix.com/msi-vortex-g65vr-6re-gtx-1070-sli-gaming-pc-review/ --
-
** TECHSPOT ------------------------------------------------------------ ** Lenovo Yoga Book Review ------------------------------------------------------------ ** http://www.techspot.com/review/1257-lenovo-yoga-book/ ------------------------------------------------------------ The Yoga Book is one of the most attractive pieces of hardware I've used this year. Lenovo is aiming for the best of both worlds: a compact tablet that's easy to hold and transport; and an on-the-go laptop that isn't hindered by an awkward dock. But going from concept to actual product, how well does it work? Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
<http://www.eteknix.com> BIOSTAR A68N-5200 Motherboard Review Despite a lot of the media focus being on Kaby Lake and AMD's fabled Zen architecture, it's important to remember that some users require a new motherboard as a matter of urgency and cannot wait for upcoming solutions. Not only that, in low-end scenarios such as a home office system or HTPC, modern processors provide more than enough performance. Some time ago, BIOSTAR decided to focus their efforts on embedded products after acknowledging the herculean task of trying to compete with ASUS, Gigabyte and other brands in the enthusiast market. URL - http://www.eteknix.com/biostar-a68n-5200-motherboard-review/ --