news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] stunnel (SSA:2016-219-04) New stunnel packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/stunnel-5.35-i586-1_slack14.2.txz: Upgraded. Fixes security issues: Fixed malfunctioning "verify = 4". Fixed incorrectly enforced client certificate requests. (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/stunnel-5.35-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/stunnel-5.35-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/stunnel-5.35-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/stunnel-5.35-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/stunnel-5.35-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/stunnel-5.35-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/stunnel-5.35-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/stunnel-5.35-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/stunnel-5.35-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/stunnel-5.35-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/stunnel-5.35-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/stunnel-5.35-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/stunnel-5.35-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/stunnel-5.35-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: f851d47b2bb8fdd6e5562c0233aa51ee stunnel-5.35-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 3bc7b74e15d29224a7934b1e3ae1be3f stunnel-5.35-x86_64-1_slack13.0.txz Slackware 13.1 package: bde3b85dfe6532a7605fb562c7111db0 stunnel-5.35-i486-1_slack13.1.txz Slackware x86_64 13.1 package: 14d11556b9c655a8694a7a9ea2cf7c73 stunnel-5.35-x86_64-1_slack13.1.txz Slackware 13.37 package: ee18b740a0c8e409f3645330017a968e stunnel-5.35-i486-1_slack13.37.txz Slackware x86_64 13.37 package: b3da66494d731dc8c3a14ecaaa51b80a stunnel-5.35-x86_64-1_slack13.37.txz Slackware 14.0 package: 5ef90d639d3fb228230a5ca81eb3f9cd stunnel-5.35-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 3caeb94a85e1ea088380a4e2adb67368 stunnel-5.35-x86_64-1_slack14.0.txz Slackware 14.1 package: eb9368942b21022941d942958e36be6b stunnel-5.35-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 7119ca1b4fb29c2ba5259e7424e1463c stunnel-5.35-x86_64-1_slack14.1.txz Slackware 14.2 package: 27813f43047b8fd5a1938b9941e5ce82 stunnel-5.35-i586-1_slack14.2.txz Slackware x86_64 14.2 package: fca9ace8551711035e751e1c28d59bce stunnel-5.35-x86_64-1_slack14.2.txz Slackware -current package: f61ddcd459e12ef76181f54bfafc214b n/stunnel-5.35-i586-1.txz Slackware x86_64 -current package: e9afb09f40a8d944912214d3b5c946d2 n/stunnel-5.35-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg stunnel-5.35-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-firefox (SSA:2016-219-02) New mozilla-firefox packages are available for Slackware 14.1 and 14.2 to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/mozilla-firefox-45.3.0esr-i586-1_slack14.2.txz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/mozilla-firefox-45.3.0esr-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/mozilla-firefox-45.3.0esr-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-firefox-45.3.0esr-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-firefox-45.3.0esr-x86_64-1_slack14.2.txz MD5 signatures: +-------------+ Slackware 14.1 package: f9230ee9a64564c573b9abc3922f8ef1 mozilla-firefox-45.3.0esr-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 4fd8c540e971bfb453f14623602b7bdc mozilla-firefox-45.3.0esr-x86_64-1_slack14.1.txz Slackware 14.2 package: 75049990bb42b5c50f68471dfc0118fb mozilla-firefox-45.3.0esr-i586-1_slack14.2.txz Slackware x86_64 14.2 package: ccf48ad14f4bf3d8f1ce03b46fdb987f mozilla-firefox-45.3.0esr-x86_64-1_slack14.2.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg mozilla-firefox-45.3.0esr-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] curl (SSA:2016-219-01) New curl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/curl-7.50.1-i586-1_slack14.2.txz: Upgraded. This release fixes security issues: TLS: switch off SSL session id when client cert is used TLS: only reuse connections with the same client cert curl_multi_cleanup: clear connection pointer for easy handles For more information, see: https://curl.haxx.se/docs/adv_20160803A.html https://curl.haxx.se/docs/adv_20160803B.html https://curl.haxx.se/docs/adv_20160803C.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/curl-7.50.1-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/curl-7.50.1-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/curl-7.50.1-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/curl-7.50.1-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/curl-7.50.1-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/curl-7.50.1-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/curl-7.50.1-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/curl-7.50.1-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/curl-7.50.1-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/curl-7.50.1-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/curl-7.50.1-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/curl-7.50.1-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/curl-7.50.1-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/curl-7.50.1-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 3a0529a79a5ed8b2fcc6119f6d84bb87 curl-7.50.1-i486-1_slack13.0.txz Slackware x86_64 13.0 package: b7cec32a6a27092b8c8b971870ee33f0 curl-7.50.1-x86_64-1_slack13.0.txz Slackware 13.1 package: 3a2236a337f2219138047f0503bd5d20 curl-7.50.1-i486-1_slack13.1.txz Slackware x86_64 13.1 package: 2fc28a5a4aacab8287fc5c56166acbf5 curl-7.50.1-x86_64-1_slack13.1.txz Slackware 13.37 package: 995375f2cf8c91a12a1077ee5537abc5 curl-7.50.1-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 4505d0795928ad1335e1c9f38d698704 curl-7.50.1-x86_64-1_slack13.37.txz Slackware 14.0 package: b43f912f026a0e4c445d0d0ec6668699 curl-7.50.1-i486-1_slack14.0.txz Slackware x86_64 14.0 package: f2af6747b255004c74553a8fd2f4f4b2 curl-7.50.1-x86_64-1_slack14.0.txz Slackware 14.1 package: a97784a7a315f339216f999c0cf2745a curl-7.50.1-i486-1_slack14.1.txz Slackware x86_64 14.1 package: a38bb7251900222224b8231ce2f98bef curl-7.50.1-x86_64-1_slack14.1.txz Slackware 14.2 package: 84542748723d80e423a2980f3798375a curl-7.50.1-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 7143b71f834c8f78b190d33c9a718535 curl-7.50.1-x86_64-1_slack14.2.txz Slackware -current package: 56f4e11b032cba84cba8d9a684f3f5f0 n/curl-7.50.1-i586-1.txz Slackware x86_64 -current package: 87011664f95d330683daad3fb9bcb1df n/curl-7.50.1-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg curl-7.50.1-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] openssh (SSA:2016-219-03) New openssh packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/openssh-7.3p1-i586-1_slack14.2.txz: Upgraded. This is primarily a bugfix release, and also addresses security issues. sshd(8): Mitigate a potential denial-of-service attack against the system's crypt(3) function via sshd(8). sshd(8): Mitigate timing differences in password authentication that could be used to discern valid from invalid account names when long passwords were sent and particular password hashing algorithms are in use on the server. ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle countermeasures. ssh(1), sshd(8): Improve operation ordering of MAC verification for Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC before decrypting any ciphertext. sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes. For more information, see: http://www.openssh.com/txt/release-7.3 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssh-7.3p1-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssh-7.3p1-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssh-7.3p1-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssh-7.3p1-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssh-7.3p1-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssh-7.3p1-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssh-7.3p1-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssh-7.3p1-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssh-7.3p1-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssh-7.3p1-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssh-7.3p1-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssh-7.3p1-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssh-7.3p1-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssh-7.3p1-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 926a45f63599a8f7d559039220f2773c openssh-7.3p1-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 2f18a3adf8ed54e59ac0c0740b138a67 openssh-7.3p1-x86_64-1_slack13.0.txz Slackware 13.1 package: 7f5e48238b26237b9c2542a3d34847b6 openssh-7.3p1-i486-1_slack13.1.txz Slackware x86_64 13.1 package: e277d7c7865fd46bc48ac128849d6426 openssh-7.3p1-x86_64-1_slack13.1.txz Slackware 13.37 package: 17c49c75c5d2b6ad49e0d2352fd2e922 openssh-7.3p1-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 6305b5ce1ce3a4390a56c36eca6920cc openssh-7.3p1-x86_64-1_slack13.37.txz Slackware 14.0 package: 508dbde12ca36275d305ad1014f12066 openssh-7.3p1-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 699e2c1d8d7383ba2137e9ead9001be2 openssh-7.3p1-x86_64-1_slack14.0.txz Slackware 14.1 package: 6a2a5dca4d9334c70239c20bfed92791 openssh-7.3p1-i486-1_slack14.1.txz Slackware x86_64 14.1 package: eb14e40f2c50beb19ccf1aaccbaf416d openssh-7.3p1-x86_64-1_slack14.1.txz Slackware 14.2 package: 624fbc40486642443292ffdaaffba640 openssh-7.3p1-i586-1_slack14.2.txz Slackware x86_64 14.2 package: c0e4d51dfb3722aa69e008389f4f089d openssh-7.3p1-x86_64-1_slack14.2.txz Slackware -current package: e9109896f7640f872e3695603579954f n/openssh-7.3p1-i586-1.txz Slackware x86_64 -current package: bcf65b51088b5b7f1dc55bab1ef63684 n/openssh-7.3p1-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg openssh-7.3p1-i586-1_slack14.2.txz Next, restart the sshd daemon: # sh /etc/rc.d/rc.sshd restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
The Wine development release 1.9.16 is now available. What's new in this release (see below for details): - Better 64-bit binary compatibility on macOS. - Performance improvements in JavaScript. - More progress towards the Direct3D command stream. - More shader instructions in Direct3D. - Performance improvements in GDI. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/1.9/wine-1.9.16.tar.bz2 http://mirrors.ibiblio.org/wine/source/1.9/wine-1.9.16.tar.bz2 Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 1.9.16 (total 43): 19051 Myst V installer will not run. 19546 Grafit text labels not displayed properly 21985 Devil May Cry 3: Black screen when playing game, but special effects are seen 23041 Darkness Within 2 demo: crashes on startup without native d3dx9_40 24645 PDF Factory 3.x/4.x installer fails to install printer drivers (winspool.SetPrinterW lacks support for level 8, global default printer settings) 26360 Time Warner Cable Connection Manager 1.03.0012.0 does not install 28932 Screamer Radio, language selection works incorrectly 29598 eRacer demo: no text displayed 32491 dbghelp doesn't support DW_FORM_flag_present 33398 Word / Excel 2010: crash when clicked (2nd or 3rd times) on a link 33457 An integer overflow ( -at -) line 268 of dsa.c ? 33594 Cool Record Edit: crash during startup 33939 Ballistic game: no animation when ball is lost 34243 YGOPro Percy exits after a single duel/replay 36828 Multiple DirectX11 games need D3D11CreateDevice implementation with D3D_FEATURE_LEVEL_11_x support (Sniper Elite 3) 37338 Multiple games and applications using Boost.Interprocess need 'NtQuerySection' implementation (file-backed shared memory)(RobloxPlayer, Tera Online) 37903 Winzip 6: Unable to install. Controls are missing. 37919 Spellforce 2 needs d3dx9_36.dll.D3DXCreateTextureShader 38310 Trackbar control (msctls_trackbar32) does not send WM_CTLCOLORSTATIC as it does in Windows 39501 King Arthur II demo crashes with unimplemented function d3dx10_43.dll.D3DXCpuOptimizations 39502 King Arthur II demo crashes with unimplemented function d3dx10_43.dll.D3DX10CreateTextureFromMemory 39744 No sound with winepulse.drv in multiple applications when PulseAudio fails to allocate full buffer 39919 Purple / Pink reflections in Mass Effect 3 40520 Gauntlet and WoW (d3d11 renderer) need FrontCounterClockwise 40734 Unreal Tournament 3 doesn't quit properly when Pulseaudio is used 40735 Midnight Mysteries: The Edgar Allan Poe Conspiracy (Steam) needs a more fleshed out msscript.ocx to get past the initial 'OLE Error 80004002' 40757 GOG Galaxy crashes with unimplemented function api-ms-win-crt-stdio-l1-1-0.dll.__stdio_common_vsnwprintf_s 40758 GOG Galaxy crashes with unimplemented function api-ms-win-crt-runtime-l1-1-0.dll._get_wide_winmain_command_line 40815 comctl32: Leftmost position of trackbar not selectable with mouse, slider initial position wrong 40875 ITHVNR does not work in wine 40882 Nvidia GT 740M is not correctly recognized 40905 Multiple applications need api-ms-win-crt-runtime-l1-1-0.dll._get_narrow_winmain_command_line (PCSX2 1.4.0, Battle.Net Launcher) 40920 Into The Stars (UE4 game) crashes while loading with SwapChain->GetFullscreenState error 40987 Wine hangs indefinitely on start with "[__NSArrayM insertObject:atIndex:]: index 6 beyond bounds [0 .. 4]". 40999 Epic Games Launcher needs ws2_32.InetNtopW 41009 PCSX2 1.4.0 needs api-ms-win-crt-stdio-l1-1-0.dll.__stdio_common_vswprintf_p 41010 TVS_TRACKSELECT uses wrong hittest region 41015 comctl32/treeview: Alt-Up/Down keyboard shortcuts don't work 41033 Unimplemented function api-ms-win-crt-runtime-l1-1-0.dll.set_terminate need by Battle.net 41037 Unimplemented function vcruntime140.dll.__std_type_info_name is needed by Battle.net 41040 VariantChangeTypeEx lead to error when casting IUnknown(nil) -> IDispatch 41044 Age of Mythology: Extended Edition needs api-ms-win-crt-stdio-l1-1-0.dll.__stdio_common_vswprintf_s 41051 GOG Galaxy crashes with unimplemented function vcruntime140.dll.__std_type_info_destroy_list ---------------------------------------------------------------- Changes since 1.9.15: Aaryaman Vasishta (7): d3drm: Fix IDirect3DRMViewport*::QueryInterface returning wrong HRESULT for invalid interfaces. d3drm: Implement IDirect3DRMViewport*::Init. d3drm: Implement IDirect3DRM*::CreateViewport. d3drm: Implement IDirect3DRMViewport::GetDirect3DViewport. d3drm/tests: Add viewport validation tests. d3drm/tests: Add QueryInterface tests for IDirect3DRMViewport*. d3drm: Implement IDirect3DRMViewport*::GetDevice. Akihiro Sagawa (3): include: Add definition of GetProcessIdOfThread. imm32/tests: Add ImmDisableIME tests. imm32: Implement ImmDisableIME. Alexandre Julliard (9): kernel32/tests: Remove some win9x compatibility cruft. server: Store the section flags separately from the protection. ntdll: Implement the SectionBasicInformation class of NtQuerySection. ntdll: Implement the SectionImageInformation class of NtQuerySection. kernel32/tests: Fix loader test failures on some Windows versions. server: Avoid rounding mapping sizes on the server side. server: Don't grow the mapped file for read-only mappings. ntoskrnl.exe: Fix ZwQuerySection spec file entry. kernel32/tests: Fix a few more loader test failures. Alistair Leslie-Hughes (8): comctl32/trackbar: Use WM_CTLCOLORSTATIC when painting background. include/icftypes.idl: Add more typedefs. include/netfw.idl: Add INetFwRule, INetFwRules, INetFwServiceRestriction, INetFwPolicy2 interfaces. hnetcfg: Add stubbed INetFwPolicy2 interface. hnetcfg/tests: Add initial tests. d3dx10: Add D3DXCpuOptimizations stub. msxml3: Implement IXMLParser GetParserState. d3dx10: Implement D3DX10CreateDeviceAndSwapChain. Andrew Eikum (2): winepulse.drv: Downgrade failed server connection message to WARN. winepulse.drv: Don't hold PA-owned buffer between capture callbacks. Andrey Gusev (8): mmdevapi: Use debugstr_guid() in TRACE() message. include: Add missing include directive in d3dx10tex.h. include: Improve include directives in d3dx9* headers. cabinet: Use debugstr_a() in TRACE() message. riched20: Use debugstr_guid() in TRACE() messages. wined3d: Fix a typo in state_zwriteenable() function name. xinput: Fix XInputGetBatteryInformation spec file entry. d3dx10: Add D3DX10CreateTextureFromMemory stub. Anton Baskanov (6): amstream: Fix AMAudioData::QueryInterface. amstream: Implement AMAudioData::GetInfo. amstream: Implement AMAudioData::SetBuffer. amstream: Implement AMAudioData::SetActual. amstream: Implement AMAudioData::GetFormat. amstream: Implement AMAudioData::SetFormat. Aric Stewart (4): ntoskrnl: Build a more intelligent and correct RegistryPath if possible. ntoskrnl.exe: Track drivers created with IoCreateDriver. ntoskrnl.exe: Implement ObReferenceObjectByName but only for loaded drivers. winedevice: Use IoCreateDriver and IoDeleteDriver. Bernhard Übelacker (2): wininet/tests: Fix pathLen given to InternetCrackUrlA. dinput8/tests: Add valid wide string termination to actionName member. Bruno Jesus (3): joy.cpl: Display the correct number of button boxes during test. ws2_32/tests: Add tests for InetNtopW. mcicda: Use a helper to read the CD-ROM TOC. Christian Costa (2): d3dx9: Implement D3DXCreateTextureShader with stubbed ID3DXTextureShader interface. include: Fix prototypes of D3DXFillXXXTextureTx for d3dx9. Corentin Rossignon (2): dinput: Retrieve vendor ID and product ID in Linux joystick API. dinput: Fix product GUID generation in Linux joystick and event API. Daniel Lehman (1): msvcp140: Add sprintf. David Lawrie (2): dinput: Sort virtual joysticks by name on the Mac. winejoystick.drv: Sort virtual joysticks by name on the Mac. François Gouget (4): kernel32/tests: Remove a trailing space from an ok() call message. d3drm: Make d3drm_device_set_ddraw_device_d3d() static. d3drm/tests: Spelling fixes for a couple of ok() messages. ntoskrnl.exe: Add a trailing '\n' to a FIXME() message. Henri Verbeet (35): wined3d: Pass a texture and sub-resource index to wined3d_volume_download_data(). wined3d: Pass a texture and sub-resource index to wined3d_volume_srgb_transfer(). wined3d: Merge wined3d_volume_load_location() into texture3d_load_location(). wined3d: Unify the query get_data() implementations. wined3d: Unify the query issue() implementations. wined3d: Get rid of struct wined3d_volume. wined3d: Pass a wined3d_const_bo_address structure to wined3d_texture_ops.texture_upload_data(). wined3d: Upload only a single sub-resource in wined3d_texture_upload_data(). wined3d: Use the context's gl_info in wined3d_timestamp_query_ops_issue(). wined3d: Issue queries through the command stream. wined3d: Use wined3d_texture_upload_data() in wined3d_device_update_texture_3d(). wined3d: Use texture3d_upload_data() in texture3d_srgb_transfer(). wined3d: Use texture3d_upload_data() in texture3d_load_location(). wined3d: Merge wined3d_volume_upload_data() into texture3d_upload_data(). wined3d: Introduce wined3d_texture_load_location(). wined3d: Use wined3d_texture_load_location() in context_validate_onscreen_formats(). wined3d: Use wined3d_texture_load_location() in device_clear_render_targets(). wined3d: Use wined3d_texture_load_location() in wined3d_device_update_sub_resource(). wined3d: Use wined3d_texture_load_location() in draw_primitive(). wined3d: Use wined3d_texture_load_location() in surface_depth_blt_fbo(). wined3d: Use wined3d_texture_load_location() in surface_blt_fbo(). wined3d: Use wined3d_texture_load_location() in surface_upload_from_surface(). wined3d: Use wined3d_texture_load_location() in surface_load_sysmem(). wined3d: Use wined3d_texture_load_location() in surface_load_drawable(). wined3d: Use wined3d_texture_load_location() in surface_load_texture(). wined3d: Use wined3d_texture_load_location() in wined3d_surface_blt(). wined3d: Use wined3d_texture_load_location() in swapchain_blit(). wined3d: Use wined3d_texture_load_location() in wined3d_swapchain_rotate(). wined3d: Use wined3d_texture_load_location() in swapchain_gl_present(). wined3d: Use wined3d_texture_load_location() in swapchain_gl_frontbuffer_updated(). wined3d: Use wined3d_texture_load_location() in wined3d_texture_get_dc(). wined3d: Rename wined3d_sample_destroy_object() to wined3d_sampler_destroy_object(). wined3d: Invalidate STATE_STREAMSRC in buffer_unload() if needed. wined3d: Evict managed resources through the command stream. wined3d: Use wined3d_cs_emit_unload_resource() in wined3d_device_uninit_3d(). Hugh McMaster (1): reg/tests: Add some tests for 'reg import'. Huw D. M. Davies (22): gdi32: Use POINT and SIZE to hold positions and extents. gdi32: Avoid unnecessary calls to get_dc_ptr(). gdi32: Pass a DC pointer to get_device_rect() to avoid accesses via the handle. gdi32: Use lp_to_dp() instead of LPtoDP() in the dib driver. gdi32: Pass a DC pointer to get_mono_dc_colors(). gdi32: Pass a DC pointer to get_pixel_color(). gdi32: Access a few more properties directly from the DC in the dib driver. gdi32: Use a buffer on the stack if the number of points is small. gdi32: Add an internal version of GetTextCharsetInfo() that takes a DC pointer. gdi32: Don't call GetObjectW() unless necessary. gdi32: Pass a DC pointer to get_gdi_flat_path(). gdi32: Pass the path directly to start_new_stroke(). gdi32: Pass a DC pointer to the point adding routines. gdi32: Pass a DC pointer to PATH_CheckCorners(). gdi32: Access a few more properties directly from the DC in the path driver. gdi32: Remove an unnecessary call to get_dc_ptr(). gdi32: Add an internal version of DPtoLP that takes a DC pointer. gdi32: Move the release until after the final dc access. gdi32: Where possible directly access the DC instead of using GetCurrentObject(). gdi32: Access several more properties directly from the DC. gdi32: Convert a few uses of get_dc_ptr() to get_physdev_dc(). gdi32: Only reselect the objects if the linear transform portion changes. Iván Matellanes (7): msvcirt: Get rid of specific functions for signed and unsigned chars. msvcirt: Add stubs for istream::operator>>. msvcirt: Implement istream::operator>> for characters. msvcirt: Implement istream::operator>> for strings. msvcirt: Implement istream::operator>> for integers. msvcirt: Implement istream::operator>> for floats. msvcirt: Implement istream::operator>> for streambufs. Jacek Caban (28): jscript: Store function arguments on JS stack and transfer them to variable object only when needed. jscipt: Use passed copy of arguments if they are alread at the top of the stack. jscript: Fixed potential leak in RegExp lastIndex setter. jscript: Set output to undefined in jsval_copy on failure. wininet: Rewrite chunked stream to store full stream state and allow non-blocking reads crossing chunk boundries. wininet: Added chunked stream blocking tests. wininet: Return data available in current chunk in chunked_get_avail_data. jscript: Store exception code in exprval_t. jscript: Use exprval_t to represent property references passed on JS stack. jscript: Allow accessing arguments values directly from stack. mshtml: Forward nsIHttpChannel::SetReferrer to SetReferrerWithPolicy. mshtml: Don't send https referrer to non-https channel. mshtml: Set referer HTTP header in nsIHttpChannel::SetReferrerWithPolicy. mshtml: Use correct principal to create in create_nsxhr. jscript: Build local references map in compiler and use it to search the scope. jscript: Access arguments directly from stack in arguments object if possible. jscript: Setup arguments object by interpreter and store all arguments inside the object on call exit. jscript: Delay arguments object until it's accessed and properly detach it after function exits. jscript: More arguments object tests. jscript: Use locals map for local variables. jscript: Store local functions in locals map. jscript: Don't use OP_var_set. jscript: Store variables on the stack if possible. jscript: Replaced OP_identid with static binding when possible. jscript: Replaced OP_ident with static binding when possible. jscript: Create scope in setup_scope. jscript: Don't create arguments object in pop_call_frame if it wasn't already created. jscript/tests: Added more tests. Jactry Zeng (1): shell32: Use remove() instead of rmdir(). Jeremy Audiger (1): wined3d: Add Nvidia GT 740M to the GPU list. Józef Kucia (41): wined3d: Introduce helper function for enabling common GLSL extensions. wined3d: Add ARB_derivative_control extension. wined3d: Implement SM5 deriv_rtx_coarse instruction. wined3d: Implement SM5 deriv_rty_coarse instruction. wined3d: Implement SM5 deriv_rtx_fine instruction. wined3d: Implement SM5 deriv_rty_fine instruction. wined3d: Recognize SM5 rcp opcode. wined3d: Require ARB_derivative_control for SM5. d3d11/tests: Add test for buffer data initialization. d3d11/tests: Add test for index buffer offset. d3d10core/tests: Add test for buffer data initialization. d3d10core/tests: Add test for index buffer offset. wined3d: Introduce R10G10B10X2 vertex formats for D3D8/9. d3d11/tests: Add test for DXGI_FORMAT_R10G10B10A2_UINT vertex format. d3d10core/tests: Add test for DXGI_FORMAT_R10G10B10A2_UINT vertex format. wined3d: Handle SM5 derivative instructions in shader_get_registers_used(). wined3d: Introduce rasterizer state object. d3d11: Add support for FrontCounterClockwise. wined3d: Implement SV_IsFrontFace input sysval semantic. wined3d: Add FIXMEs for unhandled sysval semantics. d3d11/tests: Add test for face culling. d3d10core/tests: Add test for face culling. wined3d: Rename wined3d_cull enum values. wined3d: Get rid of separate function for SM5 derivative instructions. wined3d: Extract wined3d_swapchain_set_fullscreen() from wined3d_device_reset(). wined3d: Add WINED3D_SWAPCHAIN_ALLOW_MODE_SWITCH flag. wined3d: Add WINED3D_SWAPCHAIN_RESTORE_WINDOW_RECT flag. dxgi: Implement dxgi_swapchain_GetFullscreenState(). dxgi: Implement dxgi_swapchain_SetFullscreenState(). dxgi: Switch display mode when creating fullscreen swapchains. dxgi: Return swapchain target output when available in dxgi_swapchain_GetContainingOutput(). dxgi/tests: Add tests for IDXGISwapChain_GetFullscreenState() to test_create_swapchain(). dxgi/tests: Add test for IDXGISwapChain_SetFullscreenState(). dxgi/tests: Add multi-monitor test for IDXGISwapChain_GetContainingOutput(). dxgi/tests: Add test for default fullscreen target output. wined3d: Add R32G32B32A32_SINT vertex format. wined3d: Fix window rect restoring. wined3d: Introduce wined3d_swapchain_resize_target(). dxgi: Implement IDXGISwapChain_ResizeTarget(). dxgi/tests: Add test for IDXGISwapChain_ResizeTarget(). d3dx9/tests: Fix compilation when the INFINITY macro is not available. Ken Thomases (3): ntdll: For Mac 64-bit, poke the TEB address to %gs:0x30 and re-enable the inlining of NtCurrentTeb(). kernel32: For Mac 64-bit, re-enable the inlining of various functions, leveraging the TEB self pointer at %gs:0x30. ntdll: For Mac 64-bit, poke NtCurrentTeb()->ThreadLocalStoragePointer to the corresponding offset from %gs. Lauri Kenttä (1): po: Update Finnish translation. Martin Storsjo (2): ucrtbase: Expose the fabsf function on arm. msvcp140: Add MSVC 2015 C++ support DLL. Matteo Bruni (8): wined3d: Fix generic_d3dcolor(). wined3d: Also check BLENDWEIGHT for immediate mode fallback. d3d9/tests: Add a vertex blending test with D3DCOLOR weights. wined3d: Swizzle D3DCOLOR attributes in the GLSL FFP replacement when necessary. d3dx11: Use debugstr_a() to trace a user-supplied string. d3dx10: Use debugstr_a() to trace a user-supplied string. d3dx9: Add stubs for D3DXFill*TextureTX(). d3dx9/tests: Add a test for texture shaders. Michael Stefaniuc (25): dmusic: Use debugstr_guid to trace some GUIDs. dmime: Use debugstr_guid() to trace a REFIID. ddraw: Don't memset memory before overwritting it. comctl32: Remove an always true conditional expression. comctl32: Use straight assignments instead of CopyRect(). comctl32: Avoid using memset on RECTs. comctl32/tests: Avoid using memset() on RECTs. comctl32/tests: Use SetRectEmpty() instead of SetRect(). mshtml: Use SetRectEmpty() instead of memset(). wined3d: Use SetRect() instead of open coding it. ddraw: Use SetRectEmpty() instead of memset(). dwrite/tests: Use SetRectEmpty() instead of memset(). user32: Use straight assignments instead of CopyRect(). uxtheme: Use straight assignments instead of CopyRect(). cryptui: Avoid using the LPJUNK style for COM interface types. comctl32/tests: Make use of todo_wine_if(). user32/tests: Make use of todo_wine_if(). urlmon/tests: Make use of todo_wine_if(). d3d10core/tests: Make use of todo_wine_if(). mmdevapi/tests: Make use of todo_wine_if(). oleaut32/tests: Use todo_wine_if() instead of ifdef constructs. dinput/tests: Make use of todo_wine_if(). dinput8/tests: Make use of todo_wine_if(). gdi32/tests: Make use of todo_wine_if(). gdiplus/tests: Make use of todo_wine_if(). Nikolay Sivov (45): msscript: Implement AddObject(). dwrite: Implement newer SetLineSpacing/GetLineSpacing. dwrite: Only invalidate lines if line spacing changed. dwrite: Update to DWRITE_LINE_METRICS1. dwrite: Added missing script tags. dbghelp: Recognize DW_FORM_flag_present. comctl32/treeview: Set hot item when hovering over item, not entire row. comctl32/monthcal: Implement MCS_NOSELCHANGEONNAV style. comctl32/treeview: Handle WM_SYSKEYDOWN. ucrtbase: Implement _get_narrow_winmain_command_line/_get_wide_winmain_command_line. comdlg32/itemdlg: Fix setting NULL file name (Coverity). strmbase: Fully cleanup on initialization failure (Coverity). rpcrt4: Added NdrAsyncServerCall stub. winetest: Initialize sin_zero field sockaddr_in structure (Coverity). include: TVS_EX_NOSINGLECOLLAPSE is documented. ucrtbase: Added __stdio_common_vsnwprintf_s(). comctl32/listview: Filter invalid indices when setting selection mark. comctl32/listview: Remove redundant check in LVM_DELETECOLUMN handler. ucrtbase: Forward set_terminate(). ntdll: Fix its vs it's typos. ddraw: Fix its vs it's typos. ucrtbase: Added __stdio_common_vswprintf_s(). ucrtbase: Fix some spec file entries. oleaut32: Fix return value when converting from NULL interface pointers. comctl32/tests: Test that callback mask is stored as is, check more message results. ucrtbase: Added __stdio_common_vswprintf_p(). gdi32: Fix its vs it's typo. dinput: Fix its vs it's typo. dplayx: Fix its vs it's typo. krnl386: Fix its vs it's typo. mmsystem: Fix its vs it's typo. gdiplus: Fix its vs it's typos. dwrite: Add missing return value check (Coverity). cabinet: Fix its vs it's typos. quartz: Fix its vs it's typo. shlwapi: Fix its vs it's typo. wined3d: Fix its vs it's typos. comctl32/listview: Return earlier on allocation failure (Coverity). hlink: Handle failure better (Coverity). mshtml: Remove dead assignment (Coverity). msvcp140: Added __crtInitializeCriticalSectionEx(). dsound: Fix its vs it's typos. d3dx9: Remove dead assignment (Coverity). d3dx9/tests: Remove dead assignment. gdiplus: Remove some casts. Philipp Hoppermann (1): ws2_32: Implement InetNtopW. Piotr Caban (10): ucrtbase: Add _get_narrow_winmain_command_line tests. ntdll: Keep drive letter size in RtlGetFullPathName_U when full path is specified. msvcp120: Don't export structures as stubs. msvcp120_app: Don't export structures as stubs. msvcp110: Don't export structures as stubs. msvcp100: Don't export structures as stubs. ucrtbase: Fix __std_type_info_compare implementation. ucrtbase: Add __std_type_info_name implementation. ucrtbase: Add __std_type_info_destroy_list implementation. ucrtbase: Add initial __std_type_info tests. Sebastian Lackner (5): gdi32/enhmfdrv: Remove unused debug channel. winetest: Remove duplicate if check. ntoskrnl.exe: Fix leak of ServiceKeyName if DriverInit fails. xaudio2_7: Only declare debug channel when needed. winedevice: Get rid of static driver_module variable. Vincent Povirk (4): gdiplus: Implement metafile recording for ScaleWorldTransform. gdiplus: Implement metafile playback for ScaleWorldTransform. gdiplus/tests: Add test for ScaleWorldTransform in metafiles. gdiplus: Implement ResetWorldTransform metafile playback/recording. Xiaoshan Sun (1): comctl32/dsa: Handle overflow in DSA_InsertItem(). -- Alexandre Julliard julliard ( -at -) winehq.org
-
Hello Everyone, HiTech Legion has released a new article. Hopefully your readers will find it interesting. Review: PowerColor Radeon RX 470 Red Devil Review <http://www.hitechlegion.com/video-cards/48980-powercolor-radeon-rx-470-red-devil-review> ( -at -) HiTech Legion Snippet: /"The maximum overclock I was able to achieve was 1372 MHz which is +102 MHz over the base clock. To limit any throttling, I turned the fan to manual and increased it to 75%, at 75% I did not experience any throttling at all and was able to sustain 1372 MHz throughout my whole benchmark suite." / Article Url: http://www.hitechlegion.com/video-cards/48980-powercolor-radeon-rx-470-red-devil-review Image Url: http://www.hitechlegion.com/images/videocards/pc_470/PowerColor-470-4GD5_BOX_CARD.jpg Thank You for Helping us grow and we would appreciate your future support.
-
New Matter MOD-t 3D Printer Review: Low Cost, User-Friendly Creation
news posted a topic in Upcoming News
View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=45a400a47d&e=0c004f9c13) 3D printers have come a long way since our first round-up review in 2012. This exciting technology has created everything from toys to running shoes, to prostheses for amputees. Is 3D printing, however, practical in a home office or in a classroom use case? The New Matter MOD-t 3D printer claims to be the most user-friendly printer ever and is supposedly “designed for 3D printing beginners and enthusiasts alike.†Is this device, however, something that truly belongs in your home office or a teacher’s classroom? Naturally, that's what we're here to find out. New Matter MOD-t 3D Printer Review: Low Cost, User-Friendly Creation (http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=53e9192239&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=78fa626296&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=8d0da0a6b6&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=ffcf9fe084&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e81b273107&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=0044ce58bf&e=0c004f9c13 ============================================================ -
-------- ZEALSOUND HDE-300 EARPHONES REVIEW ( -at -) APH NETWORKS ------------------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: ZealSound HDE-300 Earphones Review ( -at -) APH Networks * Description: The ZealSound HDE-300 has a clean and classical look with actually decent sound quality for $15. * Link: http://aphnetworks.com/reviews/zealsound-hde-300 * Image: http://aphnetworks.com/review/zealsound-hde-300/003.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
TITLE: PowerColor RED DEVIL RX 470 Review ( -at -) Vortez CONTENT: Having already scrutinised the devilish delights of PowerColor's RED DEVIL RX 480, we turn to the brand again today for a look at their RED DEVIL RX 470. The 470 variant arrives with a similar livery, although the cooler now bears two cooling fans and is obviously smaller in size - making it more discreet. PowerColor has equipped this new card to feature the dual-switch OC mode to have the card operate in a low-noise state or advanced overclock. LINK: http://www.vortez.net/review.php?id=1194 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
Case Mod Friday: Blue Morpho ( -at -) ThinkComputers.org Feature Link: http://www.thinkcomputers.org/case-mod-friday-blue-morpho/ Image URL: http://www.thinkcomputers.org/articles/casemodfriday/blue-morpho-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/casemodfriday/blue-morpho-small.jpg Quote: "Welcome to another Case Mod Friday showcase! This week we have BeckModz "Blue Morpho" build. Here is what they had to say about it, "This time i bought an In-Win D-Frame Mini case, and started brainstorming about the Design layout. Usually when i am about to start a new project, i just go crazy on google and search for all kinds of stuff, and this time i fell upon an image of a beautifull Blue butterfly sitting on a bunch of small white rocks..And BOOM there it was, my head was loving the white and blue colors, and it didnt take me long to make an image collage of all the hardware and designs i wanted for this build.""
-
Sennheiser Momentum Ivory 2.0 wireless headset review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=09326ed18a&e=872093acb5 http://www.kitguru.net Sennheiser Momentum Ivory 2.0 wireless headset review Sennheiser is well known for high-quality headphones aimed at an audience that prides itself on substance – and a little style – over anything else. Traditionally though that has meant keeping those headphones firmly rooted to devices through wires – but not so with the Momentum Wireless 2.0 headphones. This set of cans is Bluetooth compatible and makes use of the AptX codec to prevent the usual quality dip that is associated with wireless connections. These headphones also incorporate noise cancelling technology. Read the review here: http://www.kitguru.net/site-news/highlights/jon-martindale/sennheiser-momentum-ivory-2-0-wireless-headset-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=09326ed18a&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
** TECHSPOT ------------------------------------------------------------ ** OnePlus 3 Review ------------------------------------------------------------ ** http://www.techspot.com/review/1217-oneplus-3/ ------------------------------------------------------------ The OnePlus 3 is a superb piece of hardware at a very affordable price point. This 5.5-inch handset is powered by a Snapdragon 820 SoC, and there’s a huge 6 GB of RAM complemented by 64 GB of storage as standard, a fingerprint scanner, and a 16MP rear camera with OIS. It's not just the hardware that impresses: OnePlus has finally ditched their ludicrous invite system too. Thank you. Julio Franco Executive Editor | TECHSPOT (http://www.techspot.com) ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
Title: GAINWARD GeForce GTX 1070 Phoenix GS 8GB Graphics Card Review ( -at -) NikKTech Description: Thanks to an custom dual-fan cooling system and a substantial factory overclock the GeForce GTX 1070 Phoenix GS 8GB graphics card by GAINWARD has very little to be jealous of its more expensive brother, the GeForce GTX 1080. Article Link: http://www.nikktech.com/main/articles/pc-hardware/graphics-cards/6800-gainwa rd-geforce-gtx-1070-phoenix-gs-8gb-graphics-card-review Image Link: http://www.nikktech.com/main/images/pics/reviews/gainward/gtx_1070_phoenix_g lh/gainward_gtx_1070_phoenix_glha.JPG A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
The Ubuntu team is pleased to announce the release of Ubuntu 14.04.5 LTS (Long-Term Support) for its Desktop, Server, Cloud, and Core products, as well as other flavours of Ubuntu with long-term support. We have expanded our hardware enablement offering since 12.04, and with 14.04.5, this point release contains an updated kernel and X stack for new installations to support new hardware across all our supported architectures, not just x86. As usual, this point release includes many updates, and updated installation media has been provided so that fewer updates will need to be downloaded after installation. These include security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility with Ubuntu 14.04 LTS. Kubuntu 14.04.5 LTS, Edubuntu 14.04.5 LTS, Xubuntu 14.04.5 LTS, Mythbuntu 14.04.5 LTS, Ubuntu GNOME 14.04.5 LTS, Lubuntu 14.04.5 LTS, Ubuntu Kylin 14.04.5 LTS, and Ubuntu Studio 14.04.5 LTS are also now available. More details can be found in their individual release notes: https://wiki.ubuntu.com/TrustyTahr/ReleaseNotes#Official_flavours Maintenance updates will be provided for 5 years for Ubuntu Desktop, Ubuntu Server, Ubuntu Cloud, Ubuntu Core, Ubuntu Kylin, Edubuntu, and Kubuntu. All the remaining flavours will be supported for 3 years. To get Ubuntu 14.04.5 --------------------- In order to download Ubuntu 14.04.5, visit: http://releases.ubuntu.com/14.04.5/ Users of Ubuntu 12.04 will be offered an automatic upgrade to 14.04.5 via Update Manager. For further information about upgrading, see: https://help.ubuntu.com/community/TrustyUpgrades As always, upgrades to the latest version of Ubuntu are entirely free of charge. We recommend that all users read the 14.04.5 release notes, which document caveats and workarounds for known issues, as well as more in-depth notes on the release itself. They are available at: https://wiki.ubuntu.com/TrustyTahr/ReleaseNotes If you have a question, or if you think you may have found a bug but aren't sure, you can try asking in any of the following places: #ubuntu on irc.freenode.net http://lists.ubuntu.com/mailman/listinfo/ubuntu-users http://www.ubuntuorg http://askubuntu.com Help Shape Ubuntu ----------------- If you would like to help shape Ubuntu, take a look at the list of ways you can participate at: http://www.ubuntu.com/community/get-involved About Ubuntu ------------ Ubuntu is a full-featured Linux distribution for desktops, laptops, clouds and servers, with a fast and easy installation and regular releases. A tightly-integrated selection of excellent applications is included, and an incredible variety of add-on software is just a few clicks away. Professional services including support are available from Canonical and hundreds of other companies around the world. For more information about support, visit: http://www.ubuntu.com/support More Information ---------------- You can learn more about Ubuntu and about this release on our website listed below: http://www.ubuntu.com/ To sign up for future Ubuntu announcements, please subscribe to Ubuntu's very low volume announcement list at: http://lists.ubuntu.com/mailman/listinfo/ubuntu-announce On behalf of the Ubuntu Release Team, ... Adam Conrad --
-
openSUSE Security Update: Security update for MozillaFirefox, mozilla-nss ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1964-1 Rating: important References: #984126 #984403 #984637 #986541 #991809 Cross-References: CVE-2016-0718 CVE-2016-2830 CVE-2016-2835 CVE-2016-2836 CVE-2016-2837 CVE-2016-2838 CVE-2016-2839 CVE-2016-5250 CVE-2016-5251 CVE-2016-5252 CVE-2016-5254 CVE-2016-5255 CVE-2016-5258 CVE-2016-5259 CVE-2016-5260 CVE-2016-5261 CVE-2016-5262 CVE-2016-5263 CVE-2016-5264 CVE-2016-5265 CVE-2016-5266 CVE-2016-5268 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes 22 vulnerabilities is now available. Description: Mozilla Firefox was updated to 48.0 to fix security issues, bugs, and deliver various improvements. The following major changes are included: - Process separation (e10s) is enabled for some users - Add-ons that have not been verified and signed by Mozilla will not load - WebRTC enhancements - The media parser has been redeveloped using the Rust programming language - better Canvas performance with speedy Skia support - Now requires NSS 3.24 The following security issues were fixed: (boo#991809) - CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards - CVE-2016-2830: Favicon network connection can persist when page is closed - CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content - CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 - CVE-2016-5251: Location bar spoofing via data URLs with malformed/invalid mediatypes - CVE-2016-5252: Stack underflow during 2D graphics rendering - CVE-2016-0718: Out-of-bounds read during XML parsing in Expat library - CVE-2016-5254: Use-after-free when using alt key and toplevel menus - CVE-2016-5255: Crash in incremental garbage collection in JavaScript - CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown - CVE-2016-5259: Use-after-free in service workers with nested sync events - CVE-2016-5260: Form input type change from password to text can store plain text password in session restore file - CVE-2016-5261: Integer overflow in WebSockets during data buffering - CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes - CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback - CVE-2016-5263: Type confusion in display transformation - CVE-2016-5264: Use-after-free when applying SVG effects - CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file - CVE-2016-5266: Information disclosure and local file manipulation through drag and drop - CVE-2016-5268: Spoofing attack through text injection into internal error pages - CVE-2016-5250: Information disclosure through Resource Timing API during page navigation The following non-security changes are included: - The AppData description and screenshots were updated. - Fix Firefox crash on startup on i586 (boo#986541) - The Selenium WebDriver may have caused Firefox to crash at startup - fix build issues with gcc/binutils combination used in Leap 42.2 (boo#984637) - Fix running on 48bit va aarch64 (boo#984126) - fix XUL dialog button order under KDE session (boo#984403) Mozilla NSS was updated to 3.24 as a dependency. Changes in mozilla-nss: - NSS softoken updated with latest NIST guidance - NSS softoken updated to allow NSS to run in FIPS Level 1 (no password) - Various added and deprecated functions - Remove most code related to SSL v2, including the ability to actively send a SSLv2-compatible client hello. - Protect against the Cachebleed attack. - Disable support for DTLS compression. - Improve support for TLS 1.3. This includes support for DTLS 1.3. (experimental) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-937=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-937=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): MozillaFirefox-48.0-27.1 MozillaFirefox-branding-upstream-48.0-27.1 MozillaFirefox-buildsymbols-48.0-27.1 MozillaFirefox-debuginfo-48.0-27.1 MozillaFirefox-debugsource-48.0-27.1 MozillaFirefox-devel-48.0-27.1 MozillaFirefox-translations-common-48.0-27.1 MozillaFirefox-translations-other-48.0-27.1 libfreebl3-3.24-21.1 libfreebl3-debuginfo-3.24-21.1 libsoftokn3-3.24-21.1 libsoftokn3-debuginfo-3.24-21.1 mozilla-nss-3.24-21.1 mozilla-nss-certs-3.24-21.1 mozilla-nss-certs-debuginfo-3.24-21.1 mozilla-nss-debuginfo-3.24-21.1 mozilla-nss-debugsource-3.24-21.1 mozilla-nss-devel-3.24-21.1 mozilla-nss-sysinit-3.24-21.1 mozilla-nss-sysinit-debuginfo-3.24-21.1 mozilla-nss-tools-3.24-21.1 mozilla-nss-tools-debuginfo-3.24-21.1 - openSUSE Leap 42.1 (x86_64): libfreebl3-32bit-3.24-21.1 libfreebl3-debuginfo-32bit-3.24-21.1 libsoftokn3-32bit-3.24-21.1 libsoftokn3-debuginfo-32bit-3.24-21.1 mozilla-nss-32bit-3.24-21.1 mozilla-nss-certs-32bit-3.24-21.1 mozilla-nss-certs-debuginfo-32bit-3.24-21.1 mozilla-nss-debuginfo-32bit-3.24-21.1 mozilla-nss-sysinit-32bit-3.24-21.1 mozilla-nss-sysinit-debuginfo-32bit-3.24-21.1 - openSUSE 13.2 (i586 x86_64): MozillaFirefox-48.0-74.1 MozillaFirefox-branding-upstream-48.0-74.1 MozillaFirefox-buildsymbols-48.0-74.1 MozillaFirefox-debuginfo-48.0-74.1 MozillaFirefox-debugsource-48.0-74.1 MozillaFirefox-devel-48.0-74.1 MozillaFirefox-translations-common-48.0-74.1 MozillaFirefox-translations-other-48.0-74.1 libfreebl3-3.24-37.1 libfreebl3-debuginfo-3.24-37.1 libsoftokn3-3.24-37.1 libsoftokn3-debuginfo-3.24-37.1 mozilla-nss-3.24-37.1 mozilla-nss-certs-3.24-37.1 mozilla-nss-certs-debuginfo-3.24-37.1 mozilla-nss-debuginfo-3.24-37.1 mozilla-nss-debugsource-3.24-37.1 mozilla-nss-devel-3.24-37.1 mozilla-nss-sysinit-3.24-37.1 mozilla-nss-sysinit-debuginfo-3.24-37.1 mozilla-nss-tools-3.24-37.1 mozilla-nss-tools-debuginfo-3.24-37.1 - openSUSE 13.2 (x86_64): libfreebl3-32bit-3.24-37.1 libfreebl3-debuginfo-32bit-3.24-37.1 libsoftokn3-32bit-3.24-37.1 libsoftokn3-debuginfo-32bit-3.24-37.1 mozilla-nss-32bit-3.24-37.1 mozilla-nss-certs-32bit-3.24-37.1 mozilla-nss-certs-debuginfo-32bit-3.24-37.1 mozilla-nss-debuginfo-32bit-3.24-37.1 mozilla-nss-sysinit-32bit-3.24-37.1 mozilla-nss-sysinit-debuginfo-32bit-3.24-37.1 References: https://www.suse.com/security/cve/CVE-2016-0718.html https://www.suse.com/security/cve/CVE-2016-2830.html https://www.suse.com/security/cve/CVE-2016-2835.html https://www.suse.com/security/cve/CVE-2016-2836.html https://www.suse.com/security/cve/CVE-2016-2837.html https://www.suse.com/security/cve/CVE-2016-2838.html https://www.suse.com/security/cve/CVE-2016-2839.html https://www.suse.com/security/cve/CVE-2016-5250.html https://www.suse.com/security/cve/CVE-2016-5251.html https://www.suse.com/security/cve/CVE-2016-5252.html https://www.suse.com/security/cve/CVE-2016-5254.html https://www.suse.com/security/cve/CVE-2016-5255.html https://www.suse.com/security/cve/CVE-2016-5258.html https://www.suse.com/security/cve/CVE-2016-5259.html https://www.suse.com/security/cve/CVE-2016-5260.html https://www.suse.com/security/cve/CVE-2016-5261.html https://www.suse.com/security/cve/CVE-2016-5262.html https://www.suse.com/security/cve/CVE-2016-5263.html https://www.suse.com/security/cve/CVE-2016-5264.html https://www.suse.com/security/cve/CVE-2016-5265.html https://www.suse.com/security/cve/CVE-2016-5266.html https://www.suse.com/security/cve/CVE-2016-5268.html https://bugzilla.suse.com/984126 https://bugzilla.suse.com/984403 https://bugzilla.suse.com/984637 https://bugzilla.suse.com/986541 https://bugzilla.suse.com/991809 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=6fcbfe6fdb&e=0c004f9c13) Join us for the latest episode of HotHardware's Two And A Half Geeks webcast. This week Dave, Marco, and Chris discuss the monstrous NVIDIA TITAN X, AMD's just-launched Radeon RX 470, the Alienware Aurora R5 gaming system, Samsung's Galaxy Note7, the Moto Z and its companion Moto Mods and More! Two And A Half Geeks 8/4/16: Titan X, Radeon RX 470, Alienware Aurora R5, Galaxy Note7 And More (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=e1584605d2&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4661437090&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=a1e0af3213&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=b55c7be3c8&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=1ce777bef3&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4817e0e58a&e=0c004f9c13 ============================================================
-
*Nvidia Titan X (Pascal) Review* In this article we'll look at something that rises like Phoenix, the new generation Nvidia Titan X based on that all new Pascal GPU. Armed with 12GB of GDDR5X graphics memory and that all new GP102 GPU we are certain, we're gonna break some records today. Read the review here <http://www.guru3d.com/articles-pages/nvidia-geforce-titan-x-pascal-review,1.html>'>http://www.guru3d.com/articles-pages/nvidia-geforce-titan-x-pascal-review,1.html> . URL: http://www.guru3d.com/articles-pages/nvidia-geforce-titan-x-pascal-review,1.html <http://www.guru3d.com/articles-pages/nvidia-geforce-titan-x-pascal-review,1.html> --
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: NVIDIA Titan X Pascal 12 GB Link: http://www.techpowerup.com/reviews/NVIDIA/Titan_X_Pascal Brief: NVIDIA released their new Pascal based Titan X earlier this week. It is based on a brand-new GP102 graphics processor, which is even more power efficient than the one in GTX 1080. In our review of this $1200 card, we take a closer look at whether there is a way to justify the purchase somehow.
-
SUSE Security Update: Security update for Linux Kernel Live Patch 0 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1961-1 Rating: important References: #971793 #973570 #979064 #979074 #979078 #980856 #980883 #983144 #984764 Cross-References: CVE-2013-7446 CVE-2015-8019 CVE-2015-8816 CVE-2016-0758 CVE-2016-1583 CVE-2016-2053 CVE-2016-3134 CVE-2016-4470 CVE-2016-4565 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.49-11.1 fixes the several issues. These security issues were fixed: - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764). - CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883). - CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856). - CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793). This non-security issue was fixed: - bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1157=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_49-11-default-5-14.2 kgraft-patch-3_12_49-11-xen-5-14.2 References: https://www.suse.com/security/cve/CVE-2013-7446.html https://www.suse.com/security/cve/CVE-2015-8019.html https://www.suse.com/security/cve/CVE-2015-8816.html https://www.suse.com/security/cve/CVE-2016-0758.html https://www.suse.com/security/cve/CVE-2016-1583.html https://www.suse.com/security/cve/CVE-2016-2053.html https://www.suse.com/security/cve/CVE-2016-3134.html https://www.suse.com/security/cve/CVE-2016-4470.html https://www.suse.com/security/cve/CVE-2016-4565.html https://bugzilla.suse.com/971793 https://bugzilla.suse.com/973570 https://bugzilla.suse.com/979064 https://bugzilla.suse.com/979074 https://bugzilla.suse.com/979078 https://bugzilla.suse.com/980856 https://bugzilla.suse.com/980883 https://bugzilla.suse.com/983144 https://bugzilla.suse.com/984764 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
** TECHSPOT ------------------------------------------------------------ ** AMD Radeon RX 470 Review ------------------------------------------------------------ ** http://www.techspot.com/review/1220-amd-radeon-rx-470/ ------------------------------------------------------------ The RX 470 should be an exciting product for a few reasons. First, this is an affordable sub-$200 GPU within the reach of most gamers. Coming from the first Polaris 10 board, we expect this to be an extremely capable 1080p gamer while 1440p should also be playable. The RX 470 also only comes in a 4GB version, which I personally feel is the right choice here. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
Short version (TL;DR) ===================== /usr/bin/gpg will soon be provided by GnuPG's "modern" branch (2.1.x) and the "classic" branch (1.4.x) will be available as /usr/bin/gpg1 The rest of this e-mail provides details for users of GnuPG and package maintainers. For more about the rationale and benefits, see https://debian-administration.org/users/dkg/weblog/116. Details below: What does this mean for users of GnuPG? --------------------------------------- Even if you use GnuPG regularly, you shouldn't notice too much of a difference. One of the main differences is that all access to your secret key will be handled through gpg-agent, which should be automatically launched as needed. This means that operations like signing and decryption will cause gpg-agent to prompt the the user to unlock any locked keys directly, rather than gpg itself prompting the user. If you have an existing keyring, you may also notice a difference based on a change of how your public keys are managed, though again this transition should ideally be smooth enough that you won't notice unless you care to investigate more deeply. If you use GnuPG regularly, you might want to read the NEWS file that ships with GnuPG and related packages for updates that should help you through the transition. If you use GnuPG in a language other than English, please install the `gnupg-l10n` package, which contains the localization/translation files. For versions where those files are split out of the main package, `gnupg` explicitly `Recommends: gnupg-l10n` already, so it should be brought in for new installations by default. If you have an archive of old data that depends on known-broken algorithms, PGP3 keys, or other deprecated material, you'll need to have "classic" GnuPG around to access it. That will be provided in the `gnupg1` package What does this mean for package maintainers? -------------------------------------------- If you maintain a package that depends on `gnupg`: be aware that the `gnupg` package in debian is going through this transition. A few general thoughts: * If your package `Depends: gnupg` for signature verification only, you might prefer to have it `Depends: gpgv` instead. `gpgv` is a much simpler tool that the full-blown GnuPG suite, and should be easier to manage. I'm happy to help with such a transition (we've made it recently with `apt` already) * If your package `Depends: gnupg` and expects `~/.gnupg/` to be laid out in a certain way, that's almost certainly going to break at some point. `~/.gnupg/` is GnuPG's internal storage, and it's not recommended to rely on any specific data structures there, as they may change. `gpg` offers commands like `--export`, `--import`, and `--delete` for manipulating its persistent storage. please use them instead! * If your package depends on parsing or displaying `gpg`'s output for the user, please make sure you use its special machine-readable form (`--with-colons`). Parsing the human-readable text is not advised and may change from version to version. If you maintain a package that depends on `gnupg2` and tries to use `gpg2` instead of `gpg`, that should stay ok. However, at some point it'd be nice to get rid of `/usr/bin/gpg2` and just have one expected binary (`gpg`). So you can help with that: * Look for places where your package expects `gpg2` and make it try `gpg` instead. If you can make your code fall back cleanly * Change your dependencies to indicate `gnupg (>= 2)` * Patch `lintian` to encourage other people to make this switch What specifically needs to happen? ---------------------------------- The last major step for this transition was renaming the source package for "classic" GnuPG to be `gnupg1`. This transition is currently in the ftp-master's NEW queue. Once it makes it through that queue, and both `gnupg1` and `gnupg2` have been in experimental for a few days without reports of dangerous breakage, we'll upload both `gnupg1` and `gnupg2` to unstable. We'll also need to do some triage on the BTS, reassigning some reports which are really only relevant for the "classic" branch. Please report bugs via the BTS as usual! You're also welcome to ask questions and make suggestions on #debian-gnupg on irc.oftc.net, or to mail the Debian GnuPG packaging team at pkg-gnupg-maint ( -at -) lists.alioth.debian.org. Happy hacking! --dkg
-
XFX Radeon RX 470 4GB Black Edition Video Card Review @ Legit Reviews
news posted a topic in Upcoming News
Now that the AMD Radeon RX 480 video card has been successfully rolled out for $199 on the 4GB model and $249 for the 8GB model, AMD’s able to shift focus on bringing their 14nm FinFET GPU technology down to lower price points. The next card AMD will be releasing launched earlier today and that would be the Radeon RX 470 4GB graphics card at $179. This card is aimed at 1080P gamers that are looking for 60+ FPS performance on AAA game titles with Anti-Aliasing enabled. Article Title: XFX Radeon RX 470 4GB Black Edition Video Card Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/xfx-radeon-rx-470-4gb-black-edition-video-card-review_184908 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
AMD's Radeon RX 470 graphics card uses a slightly cut-down Polaris GPU to deliver a big jump in performance at the $180-and-up price point. We extensively tested the card to find out just how much those cuts hurt. Read more: http://techreport.com/review/30473/amd-radeon-rx-470-graphics-card-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
<http://www.eteknix.com> Sapphire Nitro+ RX 470 OC Graphics Card Review Not so long ago, Sapphire unveiled the Nitro+ RX 480 OC <http://www.eteknix.com/sapphire-nitro-rx-480-oc-8gb-graphics-card-review/>  graphics card which allowed AMD's flagship Polaris 10 core to perform to its maximum potential. This is due to the company's exceptional cooling solution which managed to tame the GPU's thermal loads and in turn, ensured the boost clock didn't plummet in a wide range of demanding games. Unfortunately, AMD's relatively simplistic reference cooling design doesn't contain any heat-pipes and relies on a single aluminium heatsink with a copper base. This was inadequate for overclocking and after speaking to AMD, they acknowledged it could have been engineered better. While the RX 480 offers outstanding value for money and targets the mainstream demographic, the price point might still be too high for certain consumers on a tight budget or those considering PC gaming for the first time. Thankfully, the RX 470 can dispel those concerns and is a slightly scaled back version of the RX 480. This particular configuration is capable of up to 4.9 TFLOP/s peak performance, has 32 compute units, 2048 stream processors all within a very respectable 150-watt TDP on models sporting an 8-pin connector. URL - http://www.eteknix.com/sapphire-nitro-rx-470-oc-graphics-card-review/ --
-
Asus RX 470 Strix Gaming OC Aura RGB 4GB ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=6575a1fc90&e=872093acb5 http://www.kitguru.net Asus RX 470 Strix Gaming OC Aura RGB 4GB Today is the second of AMD’s recent graphics card releases. While AMD sampled reference solutions for RX 480, they are relying on partner cards for the RX 470 launch. Today we take a close up look at the Asus RX 470 Strix Gaming which arrives with a custom cooler, RGB lighting and enhanced ‘out of the box’ speeds. Read the review here: http://www.kitguru.net/components/graphic-cards/zardon/asus-rx-470-strix-gaming-oc-aura-rgb-4gb/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=6575a1fc90&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.