Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. GeForce 9800 GTX+ SLI test <http://www.guru3d.com/article/geforce--9800-gtx-sli-review-plus-model/>'>http://www.guru3d.com/article/geforce--9800-gtx-sli-review-plus-model/> You know, we predicted that the GeForce 9800 GTX+ model is going to be a pretty popular product. Honestly, it's really good value and performance for just over 200 USD. A price that is attractive but most of all acceptable to a lot of you. The minute that review was posted I started receiving email, emails asking us to test this product in SLI and then compare it with AMDs Radeon 4850 HD in Crossfire. And sure, that's a very interesting perspective to look at, so I'll happily dedicate some time for such an article, which you just landed at. Read article here: http://www.guru3d.com/article/geforce--9800-gtx-sli-review-plus-model/ <http://www.guru3d.com/article/geforce--9800-gtx-sli-review-plus-model/> --
  2. net4mac 1.5 for Mac OS X is available - Published on 07/24/08 net4mac is a social network built exclusively for Mac users. In order to become a part of the community and use all its features, users need to download an innovative application designed for Mac OS X 10.4 Tiger and Mac OS X 10.5 Leopard. Today, net4mac is launching version 1.5 with many improvements. Walnut Creek, California - net4mac is a social network built exclusively for Mac users. In order to become a part of the community and use all its features, users need to download an innovative application designed for Mac OS X 10.4 Tiger and Mac OS X 10.5 Leopard. Today, we are launching version 1.5 with many improvements. The net4mac application allows you to: * Create an account and login to the service (internet connexion required) * Create your profile including your location, job, activities, skills and the type of Macs, iPhone, iPod, etc. that you own. * Add friends to your profile and manage them (remember, the service is only for Mac users) * Contact members, send invitations to join the community, and manage your messages * Create your own groups of interest and invite friends to join them (people using the same application, in your same location, sharing the same passions, etc) * Browse and join groups you find interesting - share discussions, events and more * Create events and invite Mac users (this is useful if you want to announce the presentation of a product / service, etc) * Search members using different of criteria (for example, you can find people that use the same Mac or software) * Discover people around you (other Mac users in your neighborhood) * And many more functions There are many good reasons to use an application instead of a website: * Better integration between Mac OS X technologies and the features. * The community is easy to access from the Dock * You can send invitations using your AddressBook * You can add/remove members with public profiles to/from your AddressBook * You can add a picture to your profile or a group from your webcam * You can see the number of messages in your dock (like Apple mail) What's new with version 1.5? * Improved chat (completely rewritten) * better geolocation feature (to see members on a map) * Better user interface with more feedback * Forums * Tips and Tricks for Mac users * Bugs fixed net4mac: http://www.net4mac.com Direct Download Link: http://dl.filekicker.com/send/file/208539-JVEH/net4mac.dmg Screenshot 1: http://www.net4mac.com/pic1.jpg Screenshot 2: http://www.net4mac.com/pic2.jpg Screenshot 3: http://www.net4mac.com/pic3.jpg Icon: http://www.net4mac.com/icon15.png net4mac is a social network built exclusively for Mac users. ### Greg Barrot Products manager 408-550-4969 feedback ( -at -) net4mac.com *******
  3. Hello Technology News Community, I4U NEWS published a review of the waterproof Mighty Mouse 5 from Man & Machine. Quote from the review: "Today we are going to look at the Mighty Mouse 5 from Man & Machine. The mouse is covered in silicon and is totally waterproof and can be disinfected. Overall, the Mighty Mouse 5 is very good and the added ability to sterilize the mouse to prevent germs from causing illness and the waterproof design this may be the perfect general use mouse in a shared computer setting." Full Review: http://www.i4u.com/full-review-454.html Photo: http://www.i4u.com/images/2007/mightymouse5-stock.jpg Homepage Link: http://www.i4u.com We would very much appreciate if you post this news story/review on your site. As always I4U News is open to cross-post your technology stories. Please visit http://www.i4u.com for more stories. As long as you provide credits and links to the original story on I4U News we appreciate any cross-posting of our content. If you don't want to receive review and news submissions from I4U News please just reply to this email indicating that or use the unsubscribe link below. We appreciate giving us a chance to inform you about our latest reviews and please apologize if this email reaches you in error or does not meet your interest. best regards, Chief Editor Luigi Lugmayr :: I4U Technology News Network :: http://www.i4u.com - Technology News http://shop.i4u.com - I4U Shop http://pricewatch.i4u.com - Shopping Guide http://www.wristdreams.com - Technology Wrist Watches :::
  4. Dear Friends, I just got this "Spy" shot from NVIDIA 2008 Driver Roadmap, i'm not sure about everything it is in there, the info i have is what i can read, but let me tell you that Big Bang I was the introduction of SLI (so i guess this will be big). Teh launch of this Big Bang II is in September. Yuo will find attached the picture we got so feel free to use it. I can read the following features: Display Connectivity Quality Improvements Performance Improvements OpenGL 3.0 Here is the link to the source: http://www.chw.net/foro/nvidia-lanzara-big-bang-ii-en-septiembre-t170487.html#post2166398 Regards Metro
  5. Good day, Today Neoseeker takes a quick look at Crossfire performance in Vista with the new Cat' 8.7's. URL: http://www.neoseeker.com/Articles/Hardware/Features/catx87/ "Earlier this week, Catalyst 8.7 went live on the AMD server,<http://ati.amd.com/support/driver.html>so we thought we would check it out, and report on 8.7's performance. This Catalyst release was fairly major as it was the first to support ATI's newest HD 4000 series video cards. For this brief article, we had two main goals: first off, to see how much, if any, performance gains were made for a HD 3870 going from Catalyst 8.6 to 8.7; and second, to see what levels of performance CrossFireX setups using multiple HD 4000 could offer." Thanks for any links, Kevin Spiess Editor, Neoseeker.com
  6. Asus recently contacted us with an interesting 3D graphics product that was intended to be nothing more than a proof of concept. The product was affectionately named Trinity and though it didn't necessarily conjure up visions of leather-clad vigilante-dominatrix-hotties for us, it certainly did have an intriguing design and board build. The Asus Trinity prototype is built on a trio of AMD ATI Radeon HD 3850 GPUs in CrossFireX mode for tri-GPU performance in a single slot. Direct Link: http://www.hothardware.com/News/Asus_Trinity_TriGPU_Graphics_Prototype_Bench ed/ Thanks for stopping by and a post in your news section, should you see fit.
  7. Hello Everyone, Gadi Singer, Vice President of Intel's Mobility Group, and Doug Davis, Vice President of Intel's Digital Enterprise Group, held a conference call today to discuss a brand new product line from Intel targeted at security, storage, communications, and industrial applications, the Intel EP80579 Integrated Processor family. The Intel EP80579 Integrated Processor family, however, is more than just a new processor. The products actually consist of new System on a Chip designs that integrate a Pentium M core, with a Memory Controller Hub (MCH), I/O hub (ICH), and in some cases specialized security, TDM, and data path acceleration engines, which have been dubbed Intel QuickAssist Technology. We've got a preview of the technology posted right here... URL: http://www.hothardware.com/News/Intel_Unveils_New_System_On_A_Chip_Designs/ Site: http://www.hothardware.com/ As always, a link in your news sections would be much appreciated! If you'd like us to return the favor, please don't hesitate to send your press
  8. A news post would be great. OCC has published a new review on the Sapphire HD 4870 Here is a quote from the review: Quote: "This card was the best overclockable card I have tested out of the three HD 4870 cards I have reviewed. The limits allowable in the Catalyst Control Center are 790MHz on the core and 1100MHz on the memory. I was almost able to max them out with the Sapphire HD 4870 reaching 785MHz on the GPU and 1095MHz on the memory, for an effective speed of 4380MHz. That is a very fast memory speed. Anything higher and the screen would artifact or I would get a BSOD, so the overclocked tests will be run at 785/1095MHz." Title: Sapphire HD 4870 Review Link: http://www.overclockersclub.com/reviews/sapphire_4870/ Img: http://www.overclockersclub.com/siteimages/articles/sapphire_4870/9_thumb.jpg
  9. Digit-Life Review: Conroe vs. Wolfdale: To the Limit Excerpt: "We shall examine two interesting families of Intel processors with 333 MHz (1333 MHz Quad Pumped) FSB, based on the relatively old (Conroe) and relatively new (Wolfdale) cores. We selected the slowest and the fastest CPU from each series. So, even if you are not interested in core comparison, you still get useful information about performance ranges of these CPU families." Article: http://www.digit-life.com/articles3/cpu/intel-c2d-e6550-e6850-e8200-e8500-p1.html A post on your website would be appreciated! To exchange news & reviews with Digit-Life, to change subscription address, or to unsubscribe write to cormac ( -at -) ixbt.com. If you post notes about Digit-Life reviews, but don't see me doing the same, please email me as well. Best regards, Artem Pavlenko, www.Digit-Life.com / iXBT.com
  10. news

    Announce: GVFS 0.99.3

    Unfortunately, GVFS 0.99.2 shipped with a serious crasher that caused a lot of grief. This release fixes that bug. Download location ================= http://ftp.gnome.org/pub/GNOME/sources/gvfs/0.99/ Changes since GVFS 0.99.2 ========================= * Fix frequent crasher in volume monitor. -- Hans Petter _______________________________________________
  11. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] dnsmasq (SSA:2008-205-01) New dnsmasq packages are available for Slackware 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, and -current to address possible DNS cache poisoning issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 Here are the details from the Slackware 12.1 ChangeLog: +--------------------------+ patches/packages/dnsmasq-2.45-i486-1_slack12.1.tgz: Upgraded to dnsmasq-2.45. It was discovered that earlier versions of dnsmasq have DNS cache weaknesses that are similar to the ones recently discovered in BIND. This new release minimizes the risk of cache poisoning. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com. Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 10.0: ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/dnsmasq-2.45-i486-1_slack10.0.tgz Updated package for Slackware 10.1: ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/dnsmasq-2.45-i486-1_slack10.1.tgz Updated package for Slackware 10.2: ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/dnsmasq-2.45-i486-1_slack10.2.tgz Updated package for Slackware 11.0: ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/dnsmasq-2.45-i486-1_slack11.0.tgz Updated package for Slackware 12.0: ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/dnsmasq-2.45-i486-1_slack12.0.tgz Updated package for Slackware 12.1: ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/dnsmasq-2.45-i486-1_slack12.1.tgz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/dnsmasq-2.45-i486-1.tgz MD5 signatures: +-------------+ Slackware 10.0 package: e1f567c3679e23ab3f80a86cec1343c4 dnsmasq-2.45-i486-1_slack10.0.tgz Slackware 10.1 package: aabb7b9b872654b9b663014d49ba37c1 dnsmasq-2.45-i486-1_slack10.1.tgz Slackware 10.2 package: 41c8042baabfdbdeb7b59f2fd48cbc08 dnsmasq-2.45-i486-1_slack10.2.tgz Slackware 11.0 package: fab50ae940bde92eabba0c062908ef42 dnsmasq-2.45-i486-1_slack11.0.tgz Slackware 12.0 package: b8e850a726270c0d7e305a7c6523ede4 dnsmasq-2.45-i486-1_slack12.0.tgz Slackware 12.1 package: 1c61011340f57e4179c788f3f0127dc0 dnsmasq-2.45-i486-1_slack12.1.tgz Slackware -current package: 11fe1505a7177ec1a1c84a1b259b9c03 dnsmasq-2.45-i486-1.tgz Installation instructions: +------------------------+ Upgrade the packages as root: # upgradepkg dnsmasq-2.45-i486-1_slack12.1.tgz Restart dnsmasq: # sh /etc/rc.d/rc.dnsmasq restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  12. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: thunderbird security update Advisory ID: RHSA-2008:0616-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0616.html Issue date: 2008-07-23 CVE Names: CVE-2008-2785 CVE-2008-2798 CVE-2008-2799 CVE-2008-2800 CVE-2008-2801 CVE-2008-2802 CVE-2008-2803 CVE-2008-2805 CVE-2008-2807 CVE-2008-2808 CVE-2008-2809 CVE-2008-2810 CVE-2008-2811 ===================================================================== 1. Summary: Updated thunderbird packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed HTML content was displayed. An HTML mail containing specially-crafted content could, potentially, trick a Thunderbird user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Thunderbird. An HTML mail containing malicious content could cause Thunderbird to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Thunderbird. (CVE-2008-2808) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Note: JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable unless JavaScript is enabled. All Thunderbird users should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 452204 - CVE-2008-2785 mozilla: CSS reference counter overflow (ZDI-CAN-349) 452597 - CVE-2008-2798 Firefox malformed web content flaws 452598 - CVE-2008-2799 Firefox javascript arbitrary code execution 452599 - CVE-2008-2800 Firefox XSS attacks 452600 - CVE-2008-2802 Firefox arbitrary JavaScript code execution 452602 - CVE-2008-2803 Firefox javascript arbitrary code execution 452604 - CVE-2008-2805 Firefox arbitrary file disclosure 452605 - CVE-2008-2801 Firefox arbitrary signed JAR code execution 452709 - CVE-2008-2807 Firefox .properties memory leak 452710 - CVE-2008-2808 Firefox file location escaping flaw 452711 - CVE-2008-2809 Firefox self signed certificate flaw 452712 - CVE-2008-2810 Firefox arbitrary file disclosure 453007 - CVE-2008-2811 Firefox block reflow flaw 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.12-14.el4.src.rpm i386: thunderbird-1.5.0.12-14.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-14.el4.i386.rpm ia64: thunderbird-1.5.0.12-14.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.ia64.rpm ppc: thunderbird-1.5.0.12-14.el4.ppc.rpm thunderbird-debuginfo-1.5.0.12-14.el4.ppc.rpm s390: thunderbird-1.5.0.12-14.el4.s390.rpm thunderbird-debuginfo-1.5.0.12-14.el4.s390.rpm s390x: thunderbird-1.5.0.12-14.el4.s390x.rpm thunderbird-debuginfo-1.5.0.12-14.el4.s390x.rpm x86_64: thunderbird-1.5.0.12-14.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.12-14.el4.src.rpm i386: thunderbird-1.5.0.12-14.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-14.el4.i386.rpm x86_64: thunderbird-1.5.0.12-14.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.12-14.el4.src.rpm i386: thunderbird-1.5.0.12-14.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-14.el4.i386.rpm ia64: thunderbird-1.5.0.12-14.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-14.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.12-14.el4.src.rpm i386: thunderbird-1.5.0.12-14.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-14.el4.i386.rpm ia64: thunderbird-1.5.0.12-14.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-14.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-14.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-2.0.0.16-1.el5.src.rpm i386: thunderbird-2.0.0.16-1.el5.i386.rpm thunderbird-debuginfo-2.0.0.16-1.el5.i386.rpm x86_64: thunderbird-2.0.0.16-1.el5.x86_64.rpm thunderbird-debuginfo-2.0.0.16-1.el5.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-2.0.0.16-1.el5.src.rpm i386: thunderbird-2.0.0.16-1.el5.i386.rpm thunderbird-debuginfo-2.0.0.16-1.el5.i386.rpm x86_64: thunderbird-2.0.0.16-1.el5.x86_64.rpm thunderbird-debuginfo-2.0.0.16-1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIh8bOXlSAg2UNWIIRAqV5AJ90I0bqntzHqBP84a4DhS540CwU7QCfT9U+ 5kg9P4DZwj9C45lSl2SH9/g= =TTi/ -----END PGP SIGNATURE----- --
  13. Hi, We've just posted a new article on our website, Hardware Secrets. Title: Thermaltake BigWater 780e Water Cooler Link: http://www.hardwaresecrets.com/article/588 Category: First Look Summary: We took a look on BigWater 780e, a water cooling solution that uses three 5 ¼” bays from your case, comes with a copper CPU block and is compatible with ESA technology. Here is a snippet: "BigWater 780e (CL-W0169) is a liquid cooling solution from Thermaltake that goes into three 5 ¼" bays from your case and is compatible with nVidia's ESA technology, which allows you to monitor the system if you have an ESA-compatible PC. The main building block comes with the water tank, water pump, radiator and a 120-mm fan already assembled. All you need to do is to install the copper CPU block that comes with the product on top of your CPU, install (and cut) the hoses and pour the coolant liquid inside the water tank. Let's take a look on this cooling solution from Thermaltake." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
  14. This is a multi-part message in MIME format... ------------=_1216855836-11275-7544 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:154 http://www.mandriva.com/security/ _______________________________________________________________________ Package : xemacs Date : July 23, 2008 Affected: Corporate 3.0 _______________________________________________________________________ Problem Description: A vulnerability in xemacs was found where an attacker could provide a group of files containing local variable definitions and arbitrary Lisp code to be executed when one of the provided files is opened by xemacs (CVE-2008-2142). The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142 _______________________________________________________________________ Updated Packages: Corporate 3.0: e0986da570ec923b469a5f23efdb4538 corporate/3.0/i586/xemacs-21.4.15-5.2.C30mdk.i586.rpm 3beba91071cfd28058b2e99694fc7726 corporate/3.0/i586/xemacs-devel-21.4.15-5.2.C30mdk.i586.rpm 7cb5ac450bf9aeeed94bd138bdc82cdb corporate/3.0/i586/xemacs-el-21.4.15-5.2.C30mdk.i586.rpm a5aedca9c3340a6d354376191303e8e1 corporate/3.0/i586/xemacs-extras-21.4.15-5.2.C30mdk.i586.rpm c33a8054e1f35ad9c36d60c28d2ae0e7 corporate/3.0/i586/xemacs-packages-21.4.15-5.2.C30mdk.i586.rpm a6dad6c62c77c973ecee89e9f9eb7f32 corporate/3.0/SRPMS/xemacs-21.4.15-5.2.C30mdk.src.rpm Corporate 3.0/X86_64: 80e20b9c79f16ed724d83a9b4219408d corporate/3.0/x86_64/xemacs-21.4.15-5.2.C30mdk.x86_64.rpm 5596fce531b255858ce572883ffa5692 corporate/3.0/x86_64/xemacs-devel-21.4.15-5.2.C30mdk.x86_64.rpm f019a4bfb2fee7558ac4edbffa0e5c73 corporate/3.0/x86_64/xemacs-el-21.4.15-5.2.C30mdk.x86_64.rpm 4a863f88ff3c85a1c10aa1a795b2419e corporate/3.0/x86_64/xemacs-extras-21.4.15-5.2.C30mdk.x86_64.rpm 08e1e58a1583ff7298b1eb1001baa751 corporate/3.0/x86_64/xemacs-packages-21.4.15-5.2.C30mdk.x86_64.rpm a6dad6c62c77c973ecee89e9f9eb7f32 corporate/3.0/SRPMS/xemacs-21.4.15-5.2.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIh5QpmqjQ0CJFipgRAgcGAJ4tCnRP1mjrn13n3WuDE9Dd4uMulACfWj5A I+MUzZJ8MO16rwh3wiuSpGg= =gTyK -----END PGP SIGNATURE----- ------------=_1216855836-11275-7544 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1216855836-11275-7544--
  15. This is a multi-part message in MIME format... ------------=_1216850150-11275-7543 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:153 http://www.mandriva.com/security/ _______________________________________________________________________ Package : emacs Date : July 23, 2008 Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0 _______________________________________________________________________ Problem Description: A vulnerability in emacs was found where an attacker could provide a group of files containing local variable definitions and arbitrary Lisp code to be executed when one of the provided files is opened by emacs (CVE-2008-2142). The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: d74dae9fd1bd25a85ad129942acedda9 2007.1/i586/emacs-21.4-26.4mdv2007.1.i586.rpm a8722c58647f3459d7fa1091129d36d2 2007.1/i586/emacs-doc-21.4-26.4mdv2007.1.i586.rpm 34887a7e1f7555db0ec555e8fa4fc632 2007.1/i586/emacs-el-21.4-26.4mdv2007.1.i586.rpm e5a9e7e14e0df3d647a5c96bd9372460 2007.1/i586/emacs-leim-21.4-26.4mdv2007.1.i586.rpm 1c9838c3a561ad8813d4b5cee8b82400 2007.1/i586/emacs-nox-21.4-26.4mdv2007.1.i586.rpm b9892f4738715018b2e6df7d02e6687d 2007.1/i586/emacs-X11-21.4-26.4mdv2007.1.i586.rpm af96e6a121eb5f8b8170ff941114c489 2007.1/SRPMS/emacs-21.4-26.4mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 600d616346db08ca13bdf11ddbcef44b 2007.1/x86_64/emacs-21.4-26.4mdv2007.1.x86_64.rpm 928441ff823f240f73538d3158153fbe 2007.1/x86_64/emacs-doc-21.4-26.4mdv2007.1.x86_64.rpm 60e33fa1d0bdf71a779a037c15d1985c 2007.1/x86_64/emacs-el-21.4-26.4mdv2007.1.x86_64.rpm 198718097f7a60bff2a68af82db28a43 2007.1/x86_64/emacs-leim-21.4-26.4mdv2007.1.x86_64.rpm 4299965f8b4b183af31e3f898c81110f 2007.1/x86_64/emacs-nox-21.4-26.4mdv2007.1.x86_64.rpm 5ca6f64f83f530f8b51d271bc8ec726e 2007.1/x86_64/emacs-X11-21.4-26.4mdv2007.1.x86_64.rpm af96e6a121eb5f8b8170ff941114c489 2007.1/SRPMS/emacs-21.4-26.4mdv2007.1.src.rpm Mandriva Linux 2008.0: 024e38f1ec4e6eabae4b274da83dde18 2008.0/i586/emacs-22.1-5.3mdv2008.0.i586.rpm 4214b10282db0615b9b729f187934db1 2008.0/i586/emacs-common-22.1-5.3mdv2008.0.i586.rpm 22ff8c91f547061d333465ded6a2d0da 2008.0/i586/emacs-doc-22.1-5.3mdv2008.0.i586.rpm 304b35b5af43ba47a736d2c0d9a8faa2 2008.0/i586/emacs-el-22.1-5.3mdv2008.0.i586.rpm 97788932323d9f7e2250d30f97ce3f8c 2008.0/i586/emacs-gtk-22.1-5.3mdv2008.0.i586.rpm 2406a6b60ee316bc1c67385b0db82cf8 2008.0/i586/emacs-leim-22.1-5.3mdv2008.0.i586.rpm 12883d439574ef26201af9c504144b9f 2008.0/i586/emacs-nox-22.1-5.3mdv2008.0.i586.rpm d333358ad7b06f3f0c0db4fea12e1570 2008.0/SRPMS/emacs-22.1-5.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: d57e83291c764980266625bcb889cc87 2008.0/x86_64/emacs-22.1-5.3mdv2008.0.x86_64.rpm 03cef7dd549b3d65e11c8d12875516cf 2008.0/x86_64/emacs-common-22.1-5.3mdv2008.0.x86_64.rpm 94f8e4725a640069161a0f86cee69195 2008.0/x86_64/emacs-doc-22.1-5.3mdv2008.0.x86_64.rpm a1b95c035307112fc7ccbed4ce53975c 2008.0/x86_64/emacs-el-22.1-5.3mdv2008.0.x86_64.rpm f47c2c3bffd8ecaeffec9bb3b19c94e8 2008.0/x86_64/emacs-gtk-22.1-5.3mdv2008.0.x86_64.rpm 118252721969c9ce844cebdcbcd3f8a7 2008.0/x86_64/emacs-leim-22.1-5.3mdv2008.0.x86_64.rpm 6c5622ed590a236cf2576814dd87ec9d 2008.0/x86_64/emacs-nox-22.1-5.3mdv2008.0.x86_64.rpm d333358ad7b06f3f0c0db4fea12e1570 2008.0/SRPMS/emacs-22.1-5.3mdv2008.0.src.rpm Mandriva Linux 2008.1: 29455a1008c19f2f0d7d8abb2a653c73 2008.1/i586/emacs-22.1-7.2mdv2008.1.i586.rpm 98a8a2d6fa0aaa7cde7770759012a411 2008.1/i586/emacs-common-22.1-7.2mdv2008.1.i586.rpm 5c08857d28e60a6834bee8e77d6725c3 2008.1/i586/emacs-doc-22.1-7.2mdv2008.1.i586.rpm 50c31d9e899581584a78490b0a27c837 2008.1/i586/emacs-el-22.1-7.2mdv2008.1.i586.rpm ce0ad85bc6539d1303c5658f24417670 2008.1/i586/emacs-gtk-22.1-7.2mdv2008.1.i586.rpm 7f4413c929c28b926c3887985fa3b0a2 2008.1/i586/emacs-leim-22.1-7.2mdv2008.1.i586.rpm 51844adc76e16167fdd4db0d61daffe8 2008.1/i586/emacs-nox-22.1-7.2mdv2008.1.i586.rpm cf941f26a979357e553b0cb973a7c7ab 2008.1/SRPMS/emacs-22.1-7.2mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 6961fbbb8bafde024f192ce2bb536138 2008.1/x86_64/emacs-22.1-7.2mdv2008.1.x86_64.rpm 41f14023d94c42112ac6b9e5063e9fc7 2008.1/x86_64/emacs-common-22.1-7.2mdv2008.1.x86_64.rpm 228d317d952c8ece0c8c64b091717826 2008.1/x86_64/emacs-doc-22.1-7.2mdv2008.1.x86_64.rpm bcb34100a279a0727192cfefa898486f 2008.1/x86_64/emacs-el-22.1-7.2mdv2008.1.x86_64.rpm a7f2b52088198749411707b9fde36f2a 2008.1/x86_64/emacs-gtk-22.1-7.2mdv2008.1.x86_64.rpm bb4f8dafeb0696b7e5c739abdd91a0cf 2008.1/x86_64/emacs-leim-22.1-7.2mdv2008.1.x86_64.rpm 83064451a138656cbefb593faa354cc9 2008.1/x86_64/emacs-nox-22.1-7.2mdv2008.1.x86_64.rpm cf941f26a979357e553b0cb973a7c7ab 2008.1/SRPMS/emacs-22.1-7.2mdv2008.1.src.rpm Corporate 3.0: aa44fea1e2985d86ed71f48eac5abec1 corporate/3.0/i586/emacs-21.3-9.5.C30mdk.i586.rpm be5642981a031290778de67d9556f868 corporate/3.0/i586/emacs-el-21.3-9.5.C30mdk.i586.rpm 5e54605b3cffe03ba9de9124272c959b corporate/3.0/i586/emacs-leim-21.3-9.5.C30mdk.i586.rpm 97d5a50d7ec4b6f75c38bcca83309192 corporate/3.0/i586/emacs-nox-21.3-9.5.C30mdk.i586.rpm 96871dcd19d6ae0d23cc9d03f52408cf corporate/3.0/i586/emacs-X11-21.3-9.5.C30mdk.i586.rpm d8ab165d73eeb1a5e8643632fcbf8b8c corporate/3.0/SRPMS/emacs-21.3-9.5.C30mdk.src.rpm Corporate 3.0/X86_64: cfb4c6e5c48e6adccc9b23cc010b7252 corporate/3.0/x86_64/emacs-21.3-9.5.C30mdk.x86_64.rpm 71f61c5b428497dc8a10f894eb6b6b26 corporate/3.0/x86_64/emacs-el-21.3-9.5.C30mdk.x86_64.rpm 24bb6c31bfbdb2d326a99fbb78affdae corporate/3.0/x86_64/emacs-leim-21.3-9.5.C30mdk.x86_64.rpm 36a9451b1820dfae7790db09118e1214 corporate/3.0/x86_64/emacs-nox-21.3-9.5.C30mdk.x86_64.rpm 000162f47d9476d0371b5e22d5b322ed corporate/3.0/x86_64/emacs-X11-21.3-9.5.C30mdk.x86_64.rpm d8ab165d73eeb1a5e8643632fcbf8b8c corporate/3.0/SRPMS/emacs-21.3-9.5.C30mdk.src.rpm Corporate 4.0: 7ea53f218d5f2cd10c9453e037532c63 corporate/4.0/i586/emacs-21.4-20.4.20060mlcs4.i586.rpm 9ef2b2ae079cde479e3c74360778b84a corporate/4.0/i586/emacs-doc-21.4-20.4.20060mlcs4.i586.rpm 7cfa4a5ee6b58c9fce5bef6f4fc8985d corporate/4.0/i586/emacs-el-21.4-20.4.20060mlcs4.i586.rpm 71fd5a4bbb715b58f279e1281915de84 corporate/4.0/i586/emacs-leim-21.4-20.4.20060mlcs4.i586.rpm 22fc643aff3581bdfdc6d2c021df1ca8 corporate/4.0/i586/emacs-nox-21.4-20.4.20060mlcs4.i586.rpm f943ee6d0fda515238cb8f3c6db8a4e5 corporate/4.0/i586/emacs-X11-21.4-20.4.20060mlcs4.i586.rpm 82c6556a9f0d125a15d2df02c49807db corporate/4.0/SRPMS/emacs-21.4-20.4.20060mlcs4.src.rpm Corporate 4.0/X86_64: 6a1e64628ce09fd63366b5e41d90286f corporate/4.0/x86_64/emacs-21.4-20.4.20060mlcs4.x86_64.rpm c979719c9aa18c47b0892f735af54529 corporate/4.0/x86_64/emacs-doc-21.4-20.4.20060mlcs4.x86_64.rpm a470c830c769e694481dc53c22cfc351 corporate/4.0/x86_64/emacs-el-21.4-20.4.20060mlcs4.x86_64.rpm 9042d89bcdf57c898ef17c56ff3dfd9a corporate/4.0/x86_64/emacs-leim-21.4-20.4.20060mlcs4.x86_64.rpm ccb0b523841d34b9cc77d6b083104068 corporate/4.0/x86_64/emacs-nox-21.4-20.4.20060mlcs4.x86_64.rpm 97ad08d31dc9e606a9c9ed0bfe6cf1fd corporate/4.0/x86_64/emacs-X11-21.4-20.4.20060mlcs4.x86_64.rpm 82c6556a9f0d125a15d2df02c49807db corporate/4.0/SRPMS/emacs-21.4-20.4.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIh5QUmqjQ0CJFipgRAnIWAJ0c0RJIQipIM8P9hIspzhZ1IZYwEQCg0zxA VROAjOI7Kiy7SHFZks+TlI8= =Q2TO -----END PGP SIGNATURE----- ------------=_1216850150-11275-7543 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1216850150-11275-7543--
  16. Title: Palit HD 4870 512MB Video Card Reviewed ( -at -) TheTechLounge Quote: "The real win is having a $300 card: NVIDIA made a lot of money with the 9800 GTX before the 4850 forced them to sell it for $200. Now that bracket belongs to ATI, who, for the first time in years, is dictating hardware costs, not following prices set by NVIDIA. We'll have to wait for board partners to add innovation. So yes, the card isn't perfect, but like they say, it's lonely at the top." Article URL: http://www.thetechlounge.com/article/547/Palit+HD+4870+512MB+Video+Card/ Image URL: http://www.thetechlounge.com/files/articles/547/index_250.jpg If you think this article is of interest to your readers, we would greatly appreciate a post in your site's news. Please feel free to
  17. Hello, - The Last Guy Trailer http://www.gamershell.com/news_56104.html - Tales of Symphonia: Dawn of the New World E3 2008 Screens and Gameplay Trailers http://www.gamershell.com/news_56102.html - Eternal Sonata E3 2008 Screens and Gameplay Trailers http://www.gamershell.com/news_56100.html Best Regards, GamersHell.com Staff =============================================================================
  18. news

    GNOME 2.23.5 Released!

    GNOME 2.23.5 Development Release ================================ Here's the first release after GUADEC. Istanbul. It was a great place. And some people actually had time to visit the beautiful city. Or to take a turkish bath. Sounds like a cool program, doesn't it? Of course, it was not only about this -- there were tons of interesting discussions, lots of sessions around various topics, etc. But you know what? The GNOME contributors actually managed to continue hacking on their modules. Amazing. Those people never stop. I guess it shows how passionate they are! So they made changes that are now visible in this latest version of GNOME. And if you look closely, you can feel some turkish love in the air around this release! Cool stuff. You all know what you have to do now. Go download it. Go compile it. Go test it. And go hack on it, document it, translate it, fix it. To compile GNOME 2.23.5, you can use GARNOME [1] (which supports users and has additional/different modules available), or the jhbuild [2] modulesets [3] (which use the exact tarball versions from the official release): [1] http://www.gnome.org/projects/garnome/ [2] http://library.gnome.org/devel/jhbuild/ [3] http://download.gnome.org/teams/releng/2.23.5/ The release notes that describe the changes between 2.23.2 and 2.23.5 are available. Go read them to learn all the goodness of this release: platform - http://download.gnome.org/platform/2.23/2.23.5/NEWS desktop - http://download.gnome.org/desktop/2.23/2.23.5/NEWS admin - http://download.gnome.org/admin/2.23/2.23.5/NEWS bindings - http://download.gnome.org/bindings/2.23/2.23.5/NEWS devtools - http://download.gnome.org/devtools/2.23/2.23.5/NEWS The GNOME 2.23.5 release is available here: platform sources - http://download.gnome.org/platform/2.23/2.23.5/ desktop sources - http://download.gnome.org/desktop/2.23/2.23.5/ admin sources - http://download.gnome.org/admin/2.23/2.23.5/ bindings sources - http://download.gnome.org/bindings/2.23/2.23.5/ devtools sources - http://download.gnome.org/devtools/2.23/2.23.5/ WARNING! WARNING! WARNING! -------------------------- This release is a snapshot of development code. Although it is buildable and usable, it is primarily intended for testing and hacking purposes. GNOME uses odd minor version numbers to indicate development status. For more information about 2.23, the full schedules, the official modules list and the proposed modules list, please see our 2.23 page: http://www.gnome.org/start/unstable/ Also take a look at the abbreviated schedule reminder page at: http://live.gnome.org/Schedule We hope you'll love it, The GNOME Release Team -- Les gens heureux ne sont pas pressés. _______________________________________________
  19. Hello, Scythe Zipang 140mm CPU Cooler Review "The Scythe Zipang is top-down heatsink with a huge ~140mm fan on top. A series of 6 copper heat pipes make this heatsink capable of cooling down an Intel Quad Core CPU as the lowest noise levels. We put it to the test and compare its performance to 45 other popular CPU coolers." http://www.madshrimps.be/gotoartik.php?articID=858 ____________________________________________________ Thank you in advance for posting,
  20. Hi, We've just posted a new article on our website, Hardware Secrets. Title: NZXT Khaos Case Review Link: http://www.hardwaresecrets.com/article/587 Category: Reviews Summary: Khaos is a top-notch all-aluminum full-tower case from NZXT featuring eleven 5 ¼” bays, eight internal 3 ½” bays, three 120-mm fans and one 140-mm fan. Here is a snippet: "Khaos is a top-notch all-aluminum full-tower case from NZXT featuring eleven 5 ¼" bays, eight internal 3 ½" bays (in two hard disk drive cages, each cage using three 5 ¼" bays), three 120-mm fans, one 140-mm fan and space for installing three more fans in the middle of the case. Is it worth paying USD 440 for this case? Let's see." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
  21. Hello, - Digimon World Championship E3 2008 Trailer and Screens http://www.gamershell.com/news_56098.html - Afro Samurai E3 2008 Trailer and Screens http://www.gamershell.com/news_56096.html - Mister Slime Ships to North America http://www.gamershell.com/news_56094.html - Bully Coming to Japan http://www.gamershell.com/news_56092.html - Perimeter 2: New Earth Trailers http://www.gamershell.com/news_56090.html - LotRO Shadows of Angmar Book 14 Released and Screens #3 http://www.gamershell.com/news_56088.html Best Regards, GamersHell.com Staff =============================================================================
  22. Coolermaster GeminII S Heatsink Review "In this review Frostytech is evaluating the Coolermaster GeminII S - a low height, lower noise, down-exhaust heatsink for Intel socket 775 and AMD socket 754/939/940/AM2+ processors. Coolermaster's GeminII S heatsink stands just 88mm tall and ships with a 120mm fan mounted to its frame. An extra set of brackets allow that fan to be replaced with two 92mm or 80mm fans; say if you want airflow blowing directly down onto adjacent memory slots. The GeminII S heatsink weighs 560grams, features five 6mm dia. copper heatpipes and cooling fins that descend to the CPU base." REVIEW URL: http://www.frostytech.com/articleview.cfm?articleID=2288 TAG-LINE: Coolermaster GeminII S Heatsink Review ( -at -) Frostytech.com Please post a link in your news to this review if you think it may be of interest your readers. - Thanks, Max!
  23. Hello, - 1942: Joint Strike Released and New Gameplay Trailers http://www.gamershell.com/news_56086.html - Monster Madness: Grave Danger Trailer #3 http://www.gamershell.com/news_56084.html - Merscom Signs Sarah's Emergency Room http://www.gamershell.com/news_56082.html - Coyote's Tale: Fire and Water Announced http://www.gamershell.com/news_56076.html - Big Kahuna Party Announced http://www.gamershell.com/news_56080.html - Florensia Gameplay Trailer http://www.gamershell.com/news_56074.html - Strategic Command Design Challenge Winners Announced http://www.gamershell.com/news_56072.html - Righteous Kill Announced http://www.gamershell.com/news_56070.html Best Regards, GamersHell.com Staff =============================================================================
  24. Hello, - Darkness Within: The Dark Lineage Trailer http://www.gamershell.com/news_56068.html - Too Human Pre-Order Bonus Content Announced and Screens/Trailers http://www.gamershell.com/news_56066.html - Time Hollow Officially Announced http://www.gamershell.com/news_56064.html - Multiplayer Championship [censored] Released http://www.gamershell.com/news_56062.html - Sam & Max Season Two Collector's DVD Announced http://www.gamershell.com/news_56060.html - Rumble Fighter New Contests Announced http://www.gamershell.com/news_56056.html - Penny Arcade Adventures Episode One Coming to PS3 http://www.gamershell.com/news_56054.html - Ticket to Ride: Europe Expansion Announced http://www.gamershell.com/news_56052.html Best Regards, GamersHell.com Staff =============================================================================
  25. Hello, - Requiem: Bloodymare Screens #9 and Possession Beasts Details http://www.gamershell.com/news_56050.html - Dokapon Kingdom Screens #2 http://www.gamershell.com/news_56048.html - Paint Military Vehicles by DS Screenshots http://www.gamershell.com/news_56046.html - Purr Pals Now Available for Wii http://www.gamershell.com/news_56044.html - DC Universe Online Comic-Con 2008 World Premiere Announced http://www.gamershell.com/news_56042.html - Sword of the Stars: Born of Blood v1.5.3 Patch http://www.gamershell.com/news_56040.html - Gears of War 2 Goes Comic This Week http://www.gamershell.com/news_56038.html - Dream of Mirror Online New Content Announced #10 http://www.gamershell.com/news_56036.html - Kickster Online Street Soccer Announced and Screens http://www.gamershell.com/news_56034.html Best Regards, GamersHell.com Staff =============================================================================
×