news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:* GE 13868 Plug-In Outdoor Smart Switch *Link:*http://bigbruin.com/content/GE-13868_1 *Image (250x250):*http://bigbruin.com/images/articles/924/promo_1.jpg *Quote:* For this mini review we will be looking at the GE 13868 Plug-In Outdoor Smart Switch which has a Bluetooth radio built-in. Unlike the other products covered thus far; this unit is actually designed to be used outside when mounted as directed. It is rated for 120V/60Hz service with a 600W incandescent, ½ HP, or 1800W resistive load and operate in a temperature range of 14-104F (-10-40C). Also unlike the previously reviewed items; this device does not need a hub. Best regards, Jason www.bigbruin.com --
-
Monster Elements Bluetooth Over-ear Wireless Headphones Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=2729730751&e=872093acb5 http://www.kitguru.net =MONSTER ELEMENTS BLUETOOTH OVER-EAR WIRELESS HEADPHONES REVIEW= Monster might not be a company that you are particularly well versed in as a hardcore KitGuru gamer/hardware enthusiast, but it is one you should hear more of in the future. Quite literally because it produces high end headphones. The Elements are Bluetooth connected and are designed to offer a more full sounding experience than the likes of Apple’s recent Airpod design. Read the review here: http://www.kitguru.net/site-news/highlights-v/jon-martindale/monster-elements-bluetooth-over-ear-wireless-headphones-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend2.com/forward?u=bfb2b902b5fb045ad6f841f98&id=2729730751&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
InWin Classic Series 750W Fully-Modular 80 Plus Platinum PSU Review
news posted a topic in Upcoming News
<http://www.eteknix.com> InWin Classic Series 750W Fully-Modular 80 Plus Platinum PSU Review InWin has won many awards for their incredible chassis designs in recent years, and we should know, we've awarded many of them, as have many other publications around the world. However, their love for aluminium and flawless design doesn't stop at the chassis market, as we'll see today with their Classic Series 750W power supply. URL - http://www.eteknix.com/inwin-classic-series-750w-fully-modular-80-plus-platinum-psu-review/ -- -
<http://www.eteknix.com> QNAP TS-251A 2-Bay SOHO NAS With QuickAccess Port Review There are a lot of different NAS systems on the market and they each have their ups and downs, or rather the area where they excel – which is great as there is a good chance that there is just the right model out there for your specific needs. One thing has however been missing, at least in my opinion, and QNAP fixes that with their latest NAS, the TS-251A 2-bay NAS system with QuickAccess port. Today I'm taking a closer look at exactly this system and will show you what it can do. Should two bays be too few for you and you rather want four, then QNAP has that covered too with the TS-451A which is the same system, just with double the amount of drive bays. URL - http://www.eteknix.com/qnap-ts-251a-2-bay-soho-nas-quickaccess-port-review/ --
-
------------------------------------------------------------ http://us7.campaign-archive2.com/?u=406e963590798a4aa1eab5f99&id=7e74f375ce&e=168437af67 Dear News Affiliates, Custom PC Review recently published article(s) your readers may enjoy. We’d appreciate it if you could share it with them. Title: Review: Samsung 850 EVO 4TB SSD ( -at -) Custom PC Review (http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=350133c847&e=168437af67) Excerpt: "At Flash Memory Summit earlier this year, Samsung announced their new 48-layer 3D V-NAND and along with that they announced that they’ll be using the new NAND in their 850 EVO SSD, pushing capacities up to a staggering 4TB. Considering 1TB was the largest capacity just 4-5 years ago, a 4TB drive designed..." Thank you for your support, -- Sam Chen -- Editor-in-Chief -- Custom PC Review -- http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=c2808a00bc&e=168437af67 (http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=2d359137b3&e=168437af67)
-
The Ludicrous Graphics Test: Dual GTX Titan SLI for 4K and Triple Monitor Gaming
news posted a topic in Upcoming News
** TECHSPOT ------------------------------------------------------------ ** The Ludicrous Graphics Test: Dual GTX Titan SLI for 4K and Triple Monitor Gaming ------------------------------------------------------------ ** http://www.techspot.com/review/1246-ludicrous-graphics-test/ ------------------------------------------------------------ Only recently with the arrival of the GTX 1080 has a single GPU been powerful enough to game at 4K and even then at times some tweaking is necessary for optimal gameplay. As impressive as the GTX 1080 is, Nvidia's latest Titan X boasts 40% more CUDA cores, making it all the more of an ally to 4K gamers. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA -
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : policycoreutils Version : 2.1.10-9+deb7u1 CVE ID : CVE-2016-7545 Debian Bug : 838599 It was discovered that there was a sandbox escape via the "TIOCSTI" ioctl in policycoreutils, a set of programs required for the basic operation of an SELinux-based system. For Debian 7 "Wheezy", this issue has been fixed in policycoreutils version 2.1.10-9+deb7u1. We recommend that you upgrade your policycoreutils packages. Regards, - -- ,''`. : :' : Chris Lamb `. `'` lamby ( -at -) debian.org / chris-lamb.co.uk `- -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJX5/W7AAoJEB6VPifUMR5Yf10P+gNNJ/WfqJKmpRtFVj+GPtQ8 9oc1rMj5wr66b+Q17UBIhHFfNrhE1ciMLD5NjVRnmA23RUYK3GiBQp/dCV8nsvbc hBWGUY/PiUZ3DOI24bpIfjPDXK2q9bHd6AJiRI6iTbL80rCRX6+634VLrsFXsLbC O1W/kkHKVeAK3CHcdcbvUGFm7vy8MisumfgyyLY97XsEWO3tZpkNZgTUQYkXFiur 9Lv406ru/1Fqry++OsSmV5yWUEhRnWCFxDPFKAh0Jpmyoj73Csxto6NN3frzlHvn a6lJoJzqC+W1neGaBpDihiZnwHuxDkhTyAy35nNM+kaAelVpl/a+wXqsORLZjjmD rddjm9FVf2sRm32I1QP329AE7UCGTJbP08d9T0ciRO+L0s3D1FYDUkBKknnqdxNS Ldx9LfxtAI01RZmkKuWv00QNxuyhPB/nO/NNnSfU9wmyC7LOHwNFnT8ijG07qGzX ke2cGWtxDO9af4JM3fJ2yXh2L3d430lrZF1H7SzvB11ih7OZ1tzTJ7HXZESS+S3f GDS6bvAVuVcqXUYzOOwbTH3jAZsr5P/hLIiG98fkIlaqqFK8g1dsLG4MvNLOoFWw FCoZjDO21RI2lYPYf01GRKG+Fkd200BqskMVa121ygPI6SRUdymv9lcdpkqmb8WB Un632v3TVE3djOdD9LCx =PCgN -----END PGP SIGNATURE-----
-
Package : openssl Version : 1.0.1t-1+deb7u1 CVE ID : CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306 Several vulnerabilities were discovered in OpenSSL: CVE-2016-2177 Guido Vranken discovered that OpenSSL uses undefined pointer arithmetic. Additional information can be found at https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/ CVE-2016-2178 Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing leak in the DSA code. CVE-2016-2179 / CVE-2016-2181 Quan Luo and the OCAP audit team discovered denial of service vulnerabilities in DTLS. CVE-2016-2180 / CVE-2016-2182 / CVE-2016-6303 Shi Lei discovered an out-of-bounds memory read in TS_OBJ_print_bio() and an out-of-bounds write in BN_bn2dec() and MDC2_Update(). CVE-2016-2183 DES-based cipher suites are demoted from the HIGH group to MEDIUM as a mitigation for the SWEET32 attack. CVE-2016-6302 Shi Lei discovered that the use of SHA512 in TLS session tickets is susceptible to denial of service. CVE-2016-6304 Shi Lei discovered that excessively large OCSP status request may result in denial of service via memory exhaustion. CVE-2016-6306 Shi Lei discovered that missing message length validation when parsing certificates may potentially result in denial of service. For Debian 7 "Wheezy", these problems have been fixed in version 1.0.1t-1+deb7u1. We recommend that you upgrade your openssl and libssl1.0.0 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
-
openSUSE Security Update: Recommended update for flash-player ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2376-1 Rating: important References: #977664 #998589 Cross-References: CVE-2016-4182 CVE-2016-4237 CVE-2016-4238 CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 CVE-2016-6931 CVE-2016-6932 Affected Products: openSUSE 13.1 NonFree ______________________________________________________________________________ An update that fixes 29 vulnerabilities is now available. Description: This update for flash-player fixes the following security issues (APSB16-29, boo#998589): * integer overflow vulnerability that could lead to code execution (CVE-2016-4287). * use-after-free vulnerabilities that could lead to code execution (CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932) * security bypass vulnerabilities that could lead to information disclosure (CVE-2016-4271, CVE-2016-4277, CVE-2016-4278) * memory corruption vulnerabilities that could lead to code execution (CVE-2016-4182, CVE-2016-4237, CVE-2016-4238, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, CVE-2016-6924) The package description was update to reflex that the stand-alone Flash is no longer provided on x86_64 architectures (boo#977664). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1 NonFree: zypper in -t patch 2016-1123=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 NonFree (i586 x86_64): flash-player-11.2.202.635-171.1 flash-player-gnome-11.2.202.635-171.1 flash-player-kde4-11.2.202.635-171.1 References: https://www.suse.com/security/cve/CVE-2016-4182.html https://www.suse.com/security/cve/CVE-2016-4237.html https://www.suse.com/security/cve/CVE-2016-4238.html https://www.suse.com/security/cve/CVE-2016-4271.html https://www.suse.com/security/cve/CVE-2016-4272.html https://www.suse.com/security/cve/CVE-2016-4274.html https://www.suse.com/security/cve/CVE-2016-4275.html https://www.suse.com/security/cve/CVE-2016-4276.html https://www.suse.com/security/cve/CVE-2016-4277.html https://www.suse.com/security/cve/CVE-2016-4278.html https://www.suse.com/security/cve/CVE-2016-4279.html https://www.suse.com/security/cve/CVE-2016-4280.html https://www.suse.com/security/cve/CVE-2016-4281.html https://www.suse.com/security/cve/CVE-2016-4282.html https://www.suse.com/security/cve/CVE-2016-4283.html https://www.suse.com/security/cve/CVE-2016-4284.html https://www.suse.com/security/cve/CVE-2016-4285.html https://www.suse.com/security/cve/CVE-2016-4287.html https://www.suse.com/security/cve/CVE-2016-6921.html https://www.suse.com/security/cve/CVE-2016-6922.html https://www.suse.com/security/cve/CVE-2016-6923.html https://www.suse.com/security/cve/CVE-2016-6924.html https://www.suse.com/security/cve/CVE-2016-6925.html https://www.suse.com/security/cve/CVE-2016-6926.html https://www.suse.com/security/cve/CVE-2016-6927.html https://www.suse.com/security/cve/CVE-2016-6929.html https://www.suse.com/security/cve/CVE-2016-6930.html https://www.suse.com/security/cve/CVE-2016-6931.html https://www.suse.com/security/cve/CVE-2016-6932.html https://bugzilla.suse.com/977664 https://bugzilla.suse.com/998589 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Title: Kingston SSDnow UV400 480GB SSD Review ( -at -) NikKTech Description: Although certainly not made for professional use due to its rather low IOPS performance the brand new Kingston UV400 480GB offers surprisingly good read & write speeds and an excellent price/capacity ratio making it an ideal storage upgrade for consumers. Article Link: http://www.nikktech.com/main/articles/pc-hardware/storage/solid-state-drives /6984-kingston-ssdnow-uv400-480gb-ssd-review Image Link: http://www.nikktech.com/main/images/pics/reviews/kingston/ssdnow_uv400_480gb /kingston_uv400_480gba.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
Microsoft Patents AI To Monitor All Actions In Windows And Feed It To Bing
news posted a topic in Upcoming News
View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=bb6297cb63&e=0c004f9c13) Microsoft has angered users over the past year for its willingness to push the boundaries of acceptable practice for promoting adoption of its operating system. Also, some feel it crossed that line with respect to user data collection and privacy concerns. However, Microsoft stands to garner a lot more criticism if its recent patent filing comes to life in a production software product. The title of the patent is “Query Formulation Via Task Continuum†and it aims to make it easier for apps to share data in real-time so that the user can perform better searches... Microsoft Patents Big Brother AI To Monitor All Actions In Windows And Feed It To Bing (http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=8ebdf33977&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e6265bf86f&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=97e3659244&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=19c149154f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=a6d70635cd&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=095a4d11a6&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f7212e9c77&e=0c004f9c13 ============================================================ -
openSUSE Security Update: Security update for MozillaFirefox, mozilla-nss ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2368-1 Rating: important References: #999701 Cross-References: CVE-2016-2827 CVE-2016-5256 CVE-2016-5257 CVE-2016-5270 CVE-2016-5271 CVE-2016-5272 CVE-2016-5273 CVE-2016-5274 CVE-2016-5275 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5279 CVE-2016-5280 CVE-2016-5281 CVE-2016-5282 CVE-2016-5283 CVE-2016-5284 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: This update for MozillaFirefox and mozilla-nss fixes the following issues: MozillaFirefox was updated to version 49.0 (boo#999701) - New features * Updated Firefox Login Manager to allow HTTPS pages to use saved HTTP logins. * Added features to Reader Mode that make it easier on the eyes and the ears * Improved video performance for users on systems that support SSE3 without hardware acceleration * Added context menu controls to HTML5 audio and video that let users loops files or play files at 1.25x speed * Improvements in about:memory reports for tracking font memory usage - Security related fixes * MFSA 2016-85 CVE-2016-2827 (bmo#1289085) - Out-of-bounds read in mozilla::net::IsValidReferrerPolicy CVE-2016-5270 (bmo#1291016) - Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString CVE-2016-5271 (bmo#1288946) - Out-of-bounds read in PropertyProvider::GetSpacingInternal CVE-2016-5272 (bmo#1297934) - Bad cast in nsImageGeometryMixin CVE-2016-5273 (bmo#1280387) - crash in mozilla::a11y::HyperTextAccessible::GetChildOffset CVE-2016-5276 (bmo#1287721) - Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList CVE-2016-5274 (bmo#1282076) - use-after-free in nsFrameManager::CaptureFrameState CVE-2016-5277 (bmo#1291665) - Heap-use-after-free in nsRefreshDriver::Tick CVE-2016-5275 (bmo#1287316) - global-buffer-overflow in mozilla::gfx::FilterSupport::ComputeSourceNeededRegions CVE-2016-5278 (bmo#1294677) - Heap-buffer-overflow in nsBMPEncoder::AddImageFrame CVE-2016-5279 (bmo#1249522) - Full local path of files is available to web pages after drag and drop CVE-2016-5280 (bmo#1289970) - Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap CVE-2016-5281 (bmo#1284690) - use-after-free in DOMSVGLength CVE-2016-5282 (bmo#932335) - Don't allow content to request favicons from non-whitelisted schemes CVE-2016-5283 (bmo#928187) - fragment timing attack can reveal cross-origin data CVE-2016-5284 (bmo#1303127) - Add-on update site certificate pin expiration CVE-2016-5256 - Memory safety bugs fixed in Firefox 49 CVE-2016-5257 - Memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4 - requires NSS 3.25 - Mozilla Firefox 48.0.2: * Mitigate a startup crash issue caused on Windows (bmo#1291738) mozilla-nss was updated to NSS 3.25. New functionality: * Implemented DHE key agreement for TLS 1.3 * Added support for ChaCha with TLS 1.3 * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF * In previous versions, when using client authentication with TLS 1.2, NSS only supported certificate_verify messages that used the same signature hash algorithm as used by the PRF. This limitation has been removed. * Several functions have been added to the public API of the NSS Cryptoki Framework. New functions: * NSSCKFWSlot_GetSlotID * NSSCKFWSession_GetFWSlot * NSSCKFWInstance_DestroySessionHandle * NSSCKFWInstance_FindSessionHandle Notable changes: * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3 * Regression fix: NSS no longer reports a failure if an application attempts to disable the SSLv2 protocol. * The list of trusted CA certificates has been updated to version 2.8 * The following CA certificate was Removed Sonera Class1 CA * The following CA certificates were Added Hellenic Academic and Research Institutions RootCA 2015 Hellenic Academic and Research Institutions ECC RootCA 2015 Certplus Root CA G1 Certplus Root CA G2 OpenTrust Root CA G1 OpenTrust Root CA G2 OpenTrust Root CA G3 Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1119=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-1119=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): MozillaFirefox-49.0-33.1 MozillaFirefox-branding-upstream-49.0-33.1 MozillaFirefox-buildsymbols-49.0-33.1 MozillaFirefox-debuginfo-49.0-33.1 MozillaFirefox-debugsource-49.0-33.1 MozillaFirefox-devel-49.0-33.1 MozillaFirefox-translations-common-49.0-33.1 MozillaFirefox-translations-other-49.0-33.1 libfreebl3-3.25-29.1 libfreebl3-debuginfo-3.25-29.1 libsoftokn3-3.25-29.1 libsoftokn3-debuginfo-3.25-29.1 mozilla-nss-3.25-29.1 mozilla-nss-certs-3.25-29.1 mozilla-nss-certs-debuginfo-3.25-29.1 mozilla-nss-debuginfo-3.25-29.1 mozilla-nss-debugsource-3.25-29.1 mozilla-nss-devel-3.25-29.1 mozilla-nss-sysinit-3.25-29.1 mozilla-nss-sysinit-debuginfo-3.25-29.1 mozilla-nss-tools-3.25-29.1 mozilla-nss-tools-debuginfo-3.25-29.1 - openSUSE Leap 42.1 (x86_64): libfreebl3-32bit-3.25-29.1 libfreebl3-debuginfo-32bit-3.25-29.1 libsoftokn3-32bit-3.25-29.1 libsoftokn3-debuginfo-32bit-3.25-29.1 mozilla-nss-32bit-3.25-29.1 mozilla-nss-certs-32bit-3.25-29.1 mozilla-nss-certs-debuginfo-32bit-3.25-29.1 mozilla-nss-debuginfo-32bit-3.25-29.1 mozilla-nss-sysinit-32bit-3.25-29.1 mozilla-nss-sysinit-debuginfo-32bit-3.25-29.1 - openSUSE 13.2 (i586 x86_64): MozillaFirefox-49.0-80.1 MozillaFirefox-branding-upstream-49.0-80.1 MozillaFirefox-buildsymbols-49.0-80.1 MozillaFirefox-debuginfo-49.0-80.1 MozillaFirefox-debugsource-49.0-80.1 MozillaFirefox-devel-49.0-80.1 MozillaFirefox-translations-common-49.0-80.1 MozillaFirefox-translations-other-49.0-80.1 libfreebl3-3.25-46.1 libfreebl3-debuginfo-3.25-46.1 libsoftokn3-3.25-46.1 libsoftokn3-debuginfo-3.25-46.1 mozilla-nss-3.25-46.1 mozilla-nss-certs-3.25-46.1 mozilla-nss-certs-debuginfo-3.25-46.1 mozilla-nss-debuginfo-3.25-46.1 mozilla-nss-debugsource-3.25-46.1 mozilla-nss-devel-3.25-46.1 mozilla-nss-sysinit-3.25-46.1 mozilla-nss-sysinit-debuginfo-3.25-46.1 mozilla-nss-tools-3.25-46.1 mozilla-nss-tools-debuginfo-3.25-46.1 - openSUSE 13.2 (x86_64): libfreebl3-32bit-3.25-46.1 libfreebl3-debuginfo-32bit-3.25-46.1 libsoftokn3-32bit-3.25-46.1 libsoftokn3-debuginfo-32bit-3.25-46.1 mozilla-nss-32bit-3.25-46.1 mozilla-nss-certs-32bit-3.25-46.1 mozilla-nss-certs-debuginfo-32bit-3.25-46.1 mozilla-nss-debuginfo-32bit-3.25-46.1 mozilla-nss-sysinit-32bit-3.25-46.1 mozilla-nss-sysinit-debuginfo-32bit-3.25-46.1 References: https://www.suse.com/security/cve/CVE-2016-2827.html https://www.suse.com/security/cve/CVE-2016-5256.html https://www.suse.com/security/cve/CVE-2016-5257.html https://www.suse.com/security/cve/CVE-2016-5270.html https://www.suse.com/security/cve/CVE-2016-5271.html https://www.suse.com/security/cve/CVE-2016-5272.html https://www.suse.com/security/cve/CVE-2016-5273.html https://www.suse.com/security/cve/CVE-2016-5274.html https://www.suse.com/security/cve/CVE-2016-5275.html https://www.suse.com/security/cve/CVE-2016-5276.html https://www.suse.com/security/cve/CVE-2016-5277.html https://www.suse.com/security/cve/CVE-2016-5278.html https://www.suse.com/security/cve/CVE-2016-5279.html https://www.suse.com/security/cve/CVE-2016-5280.html https://www.suse.com/security/cve/CVE-2016-5281.html https://www.suse.com/security/cve/CVE-2016-5282.html https://www.suse.com/security/cve/CVE-2016-5283.html https://www.suse.com/security/cve/CVE-2016-5284.html https://bugzilla.suse.com/999701 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Yesterday[0] I uploaded Perl 5.24 to Debian unstable, starting a 500+ package transition. Wide uninstallability is to be expected in sid for the next few days until the necessary rebuilds have been completed. Please avoid unnecessary uploads of affected packages [1] until the transition is over and perl has migrated to testing. There is no need to submit bug reports against perl about the uninstallability of related packages during this transition. See the "perldelta" document [2] for information on upstream changes since 5.22. Cheers, Dominic. [0] I'm sorry that this message has only been distributed now. It was originally sent yesterday, but the list server blackholed it. [1] https://release.debian.org/transitions/html/perl5.24.html [2] https://metacpan.org/pod/distribution/perl/pod/perldelta.pod
-
[Tech ARP] Constant Innovation & Selling To Millennials @ SAP Ariba Live 2016
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : dwarfutils Version : 20120410-2+deb7u1 CVE IDs : CVE-2016-7510 CVE-2016-7511 It was discovered that there were out-of-bounds read issues in dwarfutils, a library to consume and produce DWARF debug information. For Debian 7 "Wheezy", this issue has been fixed in dwarfutils version 20120410-2+deb7u1. We recommend that you upgrade your dwarfutils packages. Regards, - -- ,''`. : :' : Chris Lamb `. `'` lamby ( -at -) debian.org / chris-lamb.co.uk `- -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJX5mbEAAoJEB6VPifUMR5YY8MP/R4AsdpmMLgCO8YiSDYmOx4+ 3mFdWRKS9wuIMhDLgYpKchO/u7/9kCHYmMcN3Xyw1gqI2j7aTlexNcdxkCo1vrtR ckLTrPE7g5r32ySO7qFkj87EbSLkTy4wyYOMcVSzQ4xe5ZfuZTqRlbJmsKXT76MW HYwNA0ZHJSwmTPDTRzvxR4VAZc6SAGSejuS7Ehw7AgZiOsr6ZAO+L9DuKuL8KJYe f5lz5cP3r+aKfylKx+LXH4rBeuG48Z/7M1nL/dLrtXeIsQAltN56zsTllw11dNsg lj3ciC8czw1LuZRN/mpf7o7j7CAem8oBuvZc3/8Dfc+GmtIJaLTZidn4BMj7mgbD LS895KhJ/OcIiTJGXH4vbR/03sDjaXNTJF4F9oO2BueHDJ9eJqCCHhGCeNt6ff99 Qg21LAK9yLwFWxEumcw7Zi8yEVnQcb7L1/hetqFbPCdP2Hac98dsX6+CLrTN/yW+ 1Dvw8AFkRC2E6sRprrNnc5A/Ab7FscMSJcZnalMVMVZeUJf12CPs42MuvaHA1dDE pN8+3Dlh5otGWRs0ojV1m6aEoAmFQtWbbGxdC8XJInIS4uJIIso9GKowg9F6e7UX fFiy0ArXxfPO5c0WI0FTH4Q1dXLF/MYLq9qCZoj12znAFbSUueOSYQy6x7qNfwrM neyejKzsTbUhneobOWEv =oswl -----END PGP SIGNATURE----- -
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] php (SSA:2016-267-01) New php packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/php-5.6.26-i586-1_slack14.2.txz: Upgraded. This release fixes bugs and security issues. For more information, see: https://php.net/ChangeLog-5.php#5.6.26 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.6.26-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.6.26-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.6.26-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.6.26-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/php-5.6.26-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/php-5.6.26-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.6.26-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.6.26-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.0 package: c35c9a2ecb0efe18d30ac9afd09f2f18 php-5.6.26-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 5d717620237618ae0da8306fb0e103a6 php-5.6.26-x86_64-1_slack14.0.txz Slackware 14.1 package: c86df189624511380930799eedf7147a php-5.6.26-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 2c306082ce746cccc2c43a975dbf723e php-5.6.26-x86_64-1_slack14.1.txz Slackware 14.2 package: fe9dc583d44d71b359a52f787a3a3586 php-5.6.26-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 42ba7fa4b436381f508e21fa48c66d40 php-5.6.26-x86_64-1_slack14.2.txz Slackware -current package: 56a547e8bc4db3c91d6bfa5c31592175 n/php-5.6.26-i586-1.txz Slackware x86_64 -current package: 28256516f8df30cc31d6937c9447853b n/php-5.6.26-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg php-5.6.26-i586-1_slack14.2.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Monster Fatal1ty FxM 200 Headset ( -at -) LanOC Reviews <http://lanoc.org/review/audio/7340-monster-fatal1ty-fxm-200-headset> *DESCRIPTION:* Not everyone who plays games is into e-sports, but there is a large following for e-sports in general, especially a few of the most popular games. Payouts are in the millions of dollars and players are starting to become household names. None of today's players though have found the universal success that Fata1ty has. Fatal1ty paved the way for today's players, won twelve world championship titles, was profiled on MTV’s True Life TV show, and he created his own brand of products. Thorin did a great video covering it all earlier this year < Johnathan Wendel managed totransition huge success across multiple games into a brand. Over the years we have seen a wide variety of products including motherboards, ram, PSUs, and headsets. I actually think a lot of today's gamer crowd may even know him more as that brand than anything else. The reason for the history lesson today is because this past CES Fatal1ty and Monster announced a partnership to bring out new headsets and for a while now I’ve actually had the new Fatal1ty FxM 200 here in the office to test out. So today I’m going to take a closer look at it and see how it performed. *ARTICLE URL:* http://lanoc.org/review/audio/7340-monster-fatal1ty-fxm-200-headset *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/fatal1ty_fxm200/title.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/fatal1ty_fxm200/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review? format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=1af7b3a2ad&e=0c004f9c13) The focus on power efficiency and performance-per-watt from virtually all semi-conductor manufacturers over the last few years has enabled some pretty impressive hardware in fairly tiny form factors, and it’s now possible to have a fully-functional – and rather quick – desktop PC that literally fits in the palm of your hand. Take the Gigabyte Brix S (model number BSi5HT-6200) we’ll be showing you here, for example. This tiny machine is packing a Skylake-based Intel Core i5-6200U processor with Hyperthreading support for four threads, dual DDR4 memory channels, built-in 802.11ac Wi-Fi, Gigabit Ethernet, an M.2 slot, SATA support, Thunderbolt, and the list goes on. Yet, the Brix S measures only a few inches squared... Gigabyte Brix S GB-BSi5HT-6200 Ultra Compact SFF PC Review (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=2ce719932c&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=3c8ff5e625&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=65078c0d84&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=f4667a44a7&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=8ae5701b49&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=020ab3119b&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=189e541c4c&e=0c004f9c13 ============================================================
-
Case Mod Friday: HYPERCUBE ( -at -) ThinkComputers.org Feature Link: http://www.thinkcomputers.org/case-mod-friday-hypercube/ Image URL: http://www.thinkcomputers.org/articles/casemodfriday/hypercube-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/casemodfriday/hypercube-small.jpg Quote: "Welcome to another Case Mod Friday showcase! This week we have Mike Petereyns' "HYPERCUBE" build. Here is what he had to say about it, "As you know modding is a big passion of me so I was realy exited that I was invited to this Intel NUC challenge. It’s realy sommething I never did before modding on this scale but I like the challenge of it. I always try to make something original with function, thermal heat dissipation and minimal design in mind. Therefore I made the decision to mod the NUC into a “HYPERCUBE†design…I think not only does the name fits well, but the total concept of a NUC inside a Hypercube kinda highlights the Power of the NUC without making it to big.""
-
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:*HyperX Cloud Revolver Gaming Headset *Link:*http://bigbruin.com/content/hyperx-cloud-revolver_1 *Image (250x250):*http://bigbruin.com/images/articles/926/promo_4.jpg *Quote:* The HyperX Cloud Revolver is a high end stereo headset that can be used with just about any device thanks to its use of the 3.5mm audio jack... sorry iPhone 7 users. The closed, over the ear design with 50mm drivers creates a studio-grade sound stage, which allows you to better locate an opponent if you're playing a FPS game. And if you are listening to music it allows you to hear things you didn't before. Best regards, Jason www.bigbruin.com --
-
Asustor AS3104T 4-bay NAS Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=b5052bb466&e=872093acb5 http://www.kitguru.net =ASUSTOR AS3104T 4-BAY NAS REVIEW= The AS3104T is the bigger sibling of the 2-bay AS3102T we reviewed recently. With four bays and a dual-core Celeron processor, the AS3104T is marketed by Asustor as an “all-around multimedia entertainment storage solution†and like the AS3102T it forms part of Asustor’s Personal to Home product line. Read the review here: http://www.kitguru.net/professional/networking/simon-crisp/asustor-as3104t-4-bay-nas-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=b5052bb466&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: ECS Z170-LIGHTSABER (Intel LGA1151) Link: http://www.techpowerup.com/reviews/ECS/Z170-LIGHTSABER Brief: ECS has been known to have some rather crazy board names in the past, but none are as crazy as the ECS Z170-LIGHTSABER! With a name like that, you can only naturally expect one thing: a bunch of lights, right? Or will it lean toward the dark side?
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] openssl (SSA:2016-266-01) New openssl packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.2i-i586-1_slack14.2.txz: Upgraded. This update fixes denial-of-service and other security issues. For more information, see: https://www.openssl.org/news/secadv/20160922.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6307 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6308 (* Security fix *) patches/packages/openssl-solibs-1.0.2i-i586-1_slack14.2.txz: Upgraded. +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1u-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1u-i486-1_slack14.0.txz Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1u-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1u-x86_64-1_slack14.0.txz Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1u-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1u-i486-1_slack14.1.txz Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1u-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1u-x86_64-1_slack14.1.txz Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-1.0.2i-i586-1_slack14.2.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-solibs-1.0.2i-i586-1_slack14.2.txz Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-1.0.2i-x86_64-1_slack14.2.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-solibs-1.0.2i-x86_64-1_slack14.2.txz Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.2i-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.2i-i586-1.txz Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.2i-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.2i-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.0 packages: e6d4b3a76383f9f253da4128ba23f269 openssl-1.0.1u-i486-1_slack14.0.txz c61d31a1751ae39af89d3fee0b54f0d8 openssl-solibs-1.0.1u-i486-1_slack14.0.txz Slackware x86_64 14.0 packages: 96be19e6a96c9beb5d3bbc55348fb483 openssl-1.0.1u-x86_64-1_slack14.0.txz b7a8fa2ebd16c8ae106fc1267bc29eca openssl-solibs-1.0.1u-x86_64-1_slack14.0.txz Slackware 14.1 packages: 099b960e62eaea5d1a639a61a2fabca7 openssl-1.0.1u-i486-1_slack14.1.txz b5d5219e05db97f63c4d6c389d6884fb openssl-solibs-1.0.1u-i486-1_slack14.1.txz Slackware x86_64 14.1 packages: fc96c87d76c9d1efd1290ac847fa7c7c openssl-1.0.1u-x86_64-1_slack14.1.txz e873b66f84f45ea34d028a3d524ce573 openssl-solibs-1.0.1u-x86_64-1_slack14.1.txz Slackware 14.2 packages: 85ebfd338921f2818e84e0ad07b3cf1c openssl-1.0.2i-i586-1_slack14.2.txz 5d8aa37736b364beabda0bb50f6b87b1 openssl-solibs-1.0.2i-i586-1_slack14.2.txz Slackware x86_64 14.2 packages: 6a98076465b9e7f2bca791ae957787f5 openssl-1.0.2i-x86_64-1_slack14.2.txz 1aa557b1c5cd8f6ce2a5986395ae47c9 openssl-solibs-1.0.2i-x86_64-1_slack14.2.txz Slackware -current packages: ceebd7f21ac6e9cb2c94d808ef7e83fc a/openssl-solibs-1.0.2i-i586-1.txz faef6f627e1eda3c99f1507005042ec7 n/openssl-1.0.2i-i586-1.txz Slackware x86_64 -current packages: 8c4fb36e01b7943504d24ca4a913b83d a/openssl-solibs-1.0.2i-x86_64-1.txz 75e17a5b960c2cfa7e8803dd52c072a1 n/openssl-1.0.2i-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the packages as root: # upgradepkg openssl-1.0.2i-i586-1_slack14.2.txz openssl-solibs-1.0.2i-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] pidgin (SSA:2016-266-02) New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, and 14.1 to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/pidgin-2.11.0-i486-1_slack14.1.txz: Upgraded. NOTE: These packages provide updates to pidgin-2.11.0, since the previous version was mistakenly reissued for Slackware 13.0 - 14.1. Sorry! This release fixes bugs and security issues. For more information, see: https://www.pidgin.im/news/security/ (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/pidgin-2.11.0-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/pidgin-2.11.0-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/pidgin-2.11.0-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/pidgin-2.11.0-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/pidgin-2.11.0-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/pidgin-2.11.0-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/pidgin-2.11.0-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/pidgin-2.11.0-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/pidgin-2.11.0-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/pidgin-2.11.0-x86_64-1_slack14.1.txz MD5 signatures: +-------------+ Slackware 13.0 package: ee628d99e71d52e3e6da410170536dc0 pidgin-2.11.0-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 5f7100bb70bbd97d4939f946be2ac7cb pidgin-2.11.0-x86_64-1_slack13.0.txz Slackware 13.1 package: fa315fc826cbe7ab3744659153c7cdad pidgin-2.11.0-i486-1_slack13.1.txz Slackware x86_64 13.1 package: 37dc9e8e7d81a51d2b1683b597404236 pidgin-2.11.0-x86_64-1_slack13.1.txz Slackware 13.37 package: 50af9b6ff1b39739a934fef76b229fd7 pidgin-2.11.0-i486-1_slack13.37.txz Slackware x86_64 13.37 package: dfe4b02962e9237a5aea7a1cfdccaedf pidgin-2.11.0-x86_64-1_slack13.37.txz Slackware 14.0 package: 4b1deb11729812419ea7a943ccd67339 pidgin-2.11.0-i486-1_slack14.0.txz Slackware x86_64 14.0 package: a92613a3a40becc3b0001bfd4c5175f5 pidgin-2.11.0-x86_64-1_slack14.0.txz Slackware 14.1 package: 36f4a612d50e48e720e4b4b7480c2186 pidgin-2.11.0-i486-1_slack14.1.txz Slackware x86_64 14.1 package: b57e149ec125fee76d75bfbc03065fa7 pidgin-2.11.0-x86_64-1_slack14.1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg pidgin-2.11.0-i486-1_slack14.1.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
Check out the **video ( http://sable.madmimi.com/c/71191?id=393072.2629.1.f984c6a2d3b3b71b254e1cdaedf8f065 ) for info on how BopPad works with the world’s largest smart fabric sensors from BeBop for the most advanced and accurate drum pad. Video at:** http://sable.madmimi.com/c/71191?id=393072.2630.1.fe42ab3e0a160335e3f5de3bb30ecb3d ( http://sable.madmimi.com/c/71191?id=393072.2664.1.0e25dba77c353288c1938957f586637f ) **Kickstarter at:** http://sable.madmimi.com/c/71191?id=393072.2631.1.567f25322a03c64852f17c0da14220e6 ( http://sable.madmimi.com/c/71191?id=393072.2633.1.dce6720ba0314369a3a1d8193f247af6 ). **Full** **press release below and at:** http://sable.madmimi.com/c/71191?id=393072.2632.1.bb7ae55c710b74d0af664b71ba5fbe93 ( http://sable.madmimi.com/c/71191?id=393072.2637.1.053121f8ce7f361d858a96c21c8679cf ) Thanks - Karen Thomas, Thomas PR (631) 549-7575 kthomas ( -at -) thomaspr.com BEBOP SENSORS PARTNERS WITH KMI TO CREATE ========== WORLD’S MOST RESPONSIVE & ACCURATE DRUM PAD: BOPPAD ========== BopPad Smart Drum Pad Uses Largest Smart Fabric Sensor to ========== Accurately Detect Drum Hits, Velocity, Radius, & Pressure at a Speed of 2.4 Milliseconds ========== for More Dynamic & Expressive Drum Performances & Recordings -- ========== No More Mechanical & Lifeless Electronic Drumming ========== Kickstarter Campaign Reaches Goal in 3 Days: ========== http://sable.madmimi.com/c/71191?id=393072.2640.1.94fb298e820655d31af0fa7c008cb632 ( http://sable.madmimi.com/c/71191?id=393072.2665.1.173196b18d65c755c16bbd49e7bb8daa ) ========== Video: http://sable.madmimi.com/c/71191?id=393072.2634.1.990260864ab9a96ae0eda26f5dd5cee8 ( http://sable.madmimi.com/c/71191?id=393072.2648.1.c2692a36ff21c43609a0c20e0ab7daf9 ) ========== Press Release: http://sable.madmimi.com/c/71191?id=393072.2666.1.981cb2f594a85bebd27354fda97bff58 ( http://sable.madmimi.com/c/71191?id=393072.2667.1.aa3044a1459445ab37ac627644169a56 ) ========== Berkeley, CA, September 8, 2016 — **BeBop Sensors** http://sable.madmimi.com/c/71191?id=393072.2638.1.a0cdccb8a4a965c67b5a2c212184d4ac ( http://sable.madmimi.com/c/71191?id=393072.2643.1.60dfd74094b3ef46e218f387e8c86ec0 ), the leader in smart fabric sensor technology, announced today the **world’s most responsive smart drum pad: BopPad.** Created in collaboration with BeBp Sensors and Keith McMillen Instruments (KMI) musical instrument company, BopPad smart drum pad employs the **world’s largest smart fabric sensor** to create a uniquely expressive and accurate electronic drum pad for drummers, percussionists, and producers. BopPad interprets any style of percussion playing, providing **accurate hit detection, velocity, continuous radius and pressure at a speed of 2.4 milliseconds** with 4 independently programmable zones that output MIDI notes: **velocity, pitch bend, pressure and location** for the world’s most responsive and accurate drum pad. **Detects All Styles of Drumming, from Delicate Finger Strikes to Full Mallet Assaults** Most people think that drums are all the same, but the world of drumming includes many styles, including timpani, tabla, trap set, tubular bells, and more. Prior to BopPad, drum pads for controlling synthesis were limited to sensing a simple stick hit. BopPad has an extremely wide dynamic range, sensing all styles and pressures of drumming, from **delicate finger strikes to full-on aggressive mallet assaults.** BopPad’s robust tuned elastomer surface covers a 10†circle of BeBop Sensors’ patented Smart Sensor fabric, giving drummers a traditional feel combined with a whole new dimension of expressiveness for more dynamic drumming in performances and recordings. **Lower Cost than the Drums it Replaces** BopPad uses a continuous piece of smart fabric divided into multiple zones that are responsive to continuous pressure and location, making BopPad expressive as well as affordable. With a list price of **$199**, BopPad costs much less than the drums it replaces and is an easy and affordable way to add an electronic element to your kit **without the mechanical and lifeless drum sounds that often accompany electronic music.** “You can only play a drum a few ways, but BopPad allows you to take that skill set and play drums in a way you’ve never played before,†said Alex Swain (drummer, Deltron 3030) and Dan the Automator (producer, Deltron 3030, Gorillaz). BeBop Sensors CEO Keith McMillen said, “BeBop needed a way to test its Generation 8 Smart Sensor Fabric in a large format and satisfying the needs of percussionists while surviving the repetitive hits seemed like a great product idea.†KMI President Evan Adams says, “KMI is known for our ultra-expressive synthesizer controllers. Many artists complain that electronic music is mechanical and lifeless, but that is due to the interface between the musician and computer. If the synth controller can only turn a sound off and on, it will never sound natural. BopPad solves this problem.†**Kickstarter Campaign** KMI created a Kickstarter campaign for BopPad that has already reached its goal in just over 3 days and continues to attract musicians and amateurs of all skill levels. Priced at **$199**, BopPad is available on Kickstarter with early bird discounted pricing. See the Kickstarter campaign at: http://sable.madmimi.com/c/71191?id=393072.2668.1.d3c16ad9384fbab4a1ee010940c3133d ( http://sable.madmimi.com/c/71191?id=393072.2669.1.e1c940eafd515a81f69b5c8ee4f734ab ). **About KMI (http://sable.madmimi.com/c/71191?id=393072.2642.1.63806354ca3499c15553b76728970c23 ( http://sable.madmimi.com/c/71191?id=393072.2670.1.90ab0c5c965854b3357730e37cee0ffa ))** **Keith McMillen Instruments (KMI)** develops innovative hardware and software technologies that allow musicians to interface with computers in exciting new ways. Based in Berkeley, California, its products provide today’s musician with the tools needed to bring new dimensions of expression and control to their performance. The company collectively believes that when a computer is played as a musical instrument it should feel and respond like one — with all the nuances and sensitivity that make an instrument musical. **About BeBop Sensors (http://sable.madmimi.com/c/71191?id=393072.2671.1.0826ca07b6aaa61abba4cbbdb8b59e52 ( http://sable.madmimi.com/c/71191?id=393072.2672.1.29c90a8f8710f6e62c83248359a56d56 ))** **BeBop Sensors** is a leading supplier of fabric sensors and winner of the 2015 Frost & Sullivan Technology Innovation award. At the core of BopPad is a single large sensor made from the 8th generation of BeBop’s Smart Sensor fabric. BeBop develops sensors for OEM clients in automotive, sports and fitness, Safety and consumer wellness. **BopPad Photos:** BopPad - drum stick: http://sable.madmimi.com/c/71191?id=393072.2635.1.423915b7ca1397cc0f21465d33995219 ( http://sable.madmimi.com/c/71191?id=393072.2644.1.99fbc92ac5287336e6da4b2db7f4ef86 ) BopPad - with drums: http://sable.madmimi.com/c/71191?id=393072.2636.1.96f55347f37fd93bdb3ee25d9aee657d ( http://sable.madmimi.com/c/71191?id=393072.2645.1.66c1004a1023803b72d22d24deaae146 ) BopPad – drummers: http://sable.madmimi.com/c/71191?id=393072.2639.1.c91c55fe71b34fd979d47a760f5f0d93 ( http://sable.madmimi.com/c/71191?id=393072.2646.1.88547c7b0e88cc0abef97e8a3d8554b6 ) BopPad - with computer: http://sable.madmimi.com/c/71191?id=393072.2641.1.edaa912a3d649fa9811846728f050278 ( http://sable.madmimi.com/c/71191?id=393072.2647.1.4accffbbff2cff4cfdc6ae9b1e2cbe67 ) **BopPad Video:** http://sable.madmimi.com/c/71191?id=393072.2673.1.b07d166b6d17572cc2a6fa9de6225ce8 ( http://sable.madmimi.com/c/71191?id=393072.2674.1.e461f10b57d120ac769f42e582d56d54 ) **BeBop Sensors Press Releases:** http://sable.madmimi.com/c/71191?id=393072.2649.1.4c0d5d1c9d6a532894906f072d3458e4 ( http://sable.madmimi.com/c/71191?id=393072.2675.1.4e3937ba08994255220ad46bb7e9ed82 ) http://sable.madmimi.com/c/71191?id=393072.2650.1.41f56846b626cd299892f5f495ebe651 ( http://sable.madmimi.com/c/71191?id=393072.2676.1.5920e8690c18e52df7ec00ff56d70c28 ) http://sable.madmimi.com/c/71191?id=393072.2651.1.f1a6ac7857bc85f51356609ac4231f79 ( http://sable.madmimi.com/c/71191?id=393072.2677.1.3a570c48337c5b6270f1592b7b80b33b ) http://sable.madmimi.com/c/71191?id=393072.2652.1.78e17c48c808f47eeeb83a82bf647df2 ( http://sable.madmimi.com/c/71191?id=393072.2678.1.2906a10ab387015d51e472fcddb77d64 ) http://sable.madmimi.com/c/71191?id=393072.2653.1.5578b3b23234e0776d0fa56327293f44 ( http://sable.madmimi.com/c/71191?id=393072.2679.1.463b97b470e1f70407d4c028fda9f57c ) **Press Contact:** Karen Thomas/Eva Yutani Thomas PR (631) 549-7575 Emails: kthomas ( -at -) thomaspr.com ( mailto:kthomas ( -at -) thomaspr.com ) eyutani ( -at -) thomaspr.com ( mailto:eyutani ( -at -) thomaspr.com ) Website: http://sable.madmimi.com/c/71191?id=393072.2654.1.5d92a4a4d4a618b19ce959c2a06d5915 ( http://sable.madmimi.com/c/71191?id=393072.2656.1.ad7a253721ada006958e3818340b06ae ) http://sable.madmimi.com/c/71191?id=393072.2655.1.2f459d0d0b9b8fd3d301a35948f7846b ( http://sable.madmimi.com/c/71191?id=393072.2680.1.39cbf174778ac8416d891da27f854955 ) All trademarks are the property of their respective owners. Web Version http://sable.madmimi.com/c/71191?id=393072.2681.1.b917dfb1ae6f49867d690335ddc5a5c7&p=eyIlN0IlN0JtaW1pLXNpZ25hdHVyZSU3RCU3RCI6IjEzNDQzODM4NC05MjUzNTk4NTg1LTMwOGFlMjVhYzY3MDc5ZDYzZWRkYTE4NmYzOWZiZjFlYjhkMGZjYTkiLCIlN0IlN0JlbWFpbElkJTdEJTdEIjoiMzkzMDcyIn0= Unsubscribe https://go.madmimi.com/opt_out?fe=1&pact=393072-134438384-9253598585-308ae25ac67079d63edda186f39fbf1eb8d0fca9&amx=9253598585 Preferences http://sable.madmimi.com/c/71191?id=393072.2660-86.1.90706699a2551d852f8462bbada541d6&p=eyIlN0IlN0JtaW1pLXNpZ25hdHVyZSU3RCU3RCI6IjEzNDQzODM4NC05MjUzNTk4NTg1LTMwOGFlMjVhYzY3MDc5ZDYzZWRkYTE4NmYzOWZiZjFlYjhkMGZjYTkiLCIlN0IlN0JtZW1iZXItaWQlN0QlN0QiOjkyNTM1OTg1ODUsIiU3QiU3QmVtYWlsSWQlN0QlN0QiOiIzOTMwNzIifQ== Karen Thomas, Thomas PR | Thomas PR, 734 Walt Whitman Rd #403, Melville, NY 11747