news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
This is a multi-part message in MIME format... ------------=_1214421064-11275-6677 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:123 http://www.mandriva.com/security/ _______________________________________________________________________ Package : imlib2 Date : June 25, 2008 Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0 _______________________________________________________________________ Problem Description: Stefan Cornelius discovered two buffer overflows in Imlib's image loaders for PNM and XPM images, which could possibly result in the execution of arbitrary code (CVE-2008-2426). The updated packages have been patched to prevent this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: 1ecafd85391001ebb4d30209552309ba 2007.1/i586/imlib2-data-1.2.2-3.2mdv2007.1.i586.rpm 3737a0a9fd33471a724f6f8902dd9726 2007.1/i586/libimlib2_1-1.2.2-3.2mdv2007.1.i586.rpm bdca73870489834a7237723734c2cfe9 2007.1/i586/libimlib2_1-devel-1.2.2-3.2mdv2007.1.i586.rpm 09a10fa2bfac9b0a4bc544e4b4a5c2c0 2007.1/i586/libimlib2_1-filters-1.2.2-3.2mdv2007.1.i586.rpm cf47069a5a66673ab43d96ca45fe00a7 2007.1/i586/libimlib2_1-loaders-1.2.2-3.2mdv2007.1.i586.rpm 75afe69b0e922d72122bd3a4498bfe8f 2007.1/SRPMS/imlib2-1.2.2-3.2mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: a849312fa506167d86addce88916b87a 2007.1/x86_64/imlib2-data-1.2.2-3.2mdv2007.1.x86_64.rpm f479fa3a9822eda1ee711c64e4371295 2007.1/x86_64/lib64imlib2_1-1.2.2-3.2mdv2007.1.x86_64.rpm 8608807fe46db99a5812bc06e893e334 2007.1/x86_64/lib64imlib2_1-devel-1.2.2-3.2mdv2007.1.x86_64.rpm 188de9396d778da58af40db064d85589 2007.1/x86_64/lib64imlib2_1-filters-1.2.2-3.2mdv2007.1.x86_64.rpm 2e60dccd71bbd149859beaa786234616 2007.1/x86_64/lib64imlib2_1-loaders-1.2.2-3.2mdv2007.1.x86_64.rpm 75afe69b0e922d72122bd3a4498bfe8f 2007.1/SRPMS/imlib2-1.2.2-3.2mdv2007.1.src.rpm Mandriva Linux 2008.0: 1214ee42f4076fec8704794bc767916e 2008.0/i586/imlib2-data-1.4.0.003-2.1mdv2008.0.i586.rpm eb5319b2c8cb33a204332822e6349201 2008.0/i586/libimlib2_1-1.4.0.003-2.1mdv2008.0.i586.rpm ea8dbec91f1a8299550f2ff4acb17980 2008.0/i586/libimlib2_1-filters-1.4.0.003-2.1mdv2008.0.i586.rpm 6362adf88ef3e4179f9a31b9acb20dcb 2008.0/i586/libimlib2_1-loaders-1.4.0.003-2.1mdv2008.0.i586.rpm 116ac3cb141512cc78adb8a1f4c37ecb 2008.0/i586/libimlib2-devel-1.4.0.003-2.1mdv2008.0.i586.rpm 42f76cee20ca495e92f7ba5ca98408e8 2008.0/SRPMS/imlib2-1.4.0.003-2.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: f3ec35cf049082651ef9f4db223e830b 2008.0/x86_64/imlib2-data-1.4.0.003-2.1mdv2008.0.x86_64.rpm dccec6f91c995c5ac32c0c6de00b2acc 2008.0/x86_64/lib64imlib2_1-1.4.0.003-2.1mdv2008.0.x86_64.rpm 7fb7d920e314dcbfba83d0205c58e5a7 2008.0/x86_64/lib64imlib2_1-filters-1.4.0.003-2.1mdv2008.0.x86_64.rpm 4285b0a221052eabb0287873c615e6bc 2008.0/x86_64/lib64imlib2_1-loaders-1.4.0.003-2.1mdv2008.0.x86_64.rpm 5b3650f57fc915e344cb53366c865de6 2008.0/x86_64/lib64imlib2-devel-1.4.0.003-2.1mdv2008.0.x86_64.rpm 42f76cee20ca495e92f7ba5ca98408e8 2008.0/SRPMS/imlib2-1.4.0.003-2.1mdv2008.0.src.rpm Mandriva Linux 2008.1: 61630dec23098687773aa4fdec0da7de 2008.1/i586/imlib2-data-1.4.0.003-4.1mdv2008.1.i586.rpm 31eca31bf55a696bda613046687bb3c2 2008.1/i586/libimlib2_1-1.4.0.003-4.1mdv2008.1.i586.rpm 7292f56c20d9413cfd826e3f7d4ed04b 2008.1/i586/libimlib2_1-filters-1.4.0.003-4.1mdv2008.1.i586.rpm 5fce6ab5d5dca0077c0a86b3a3d73c33 2008.1/i586/libimlib2_1-loaders-1.4.0.003-4.1mdv2008.1.i586.rpm 85bda71fab55a242d68336f4267e0188 2008.1/i586/libimlib2-devel-1.4.0.003-4.1mdv2008.1.i586.rpm 8c34ee1b5d7ba25a4e38991212628a73 2008.1/SRPMS/imlib2-1.4.0.003-4.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: f3dd712617045232ceecaa82a3177352 2008.1/x86_64/imlib2-data-1.4.0.003-4.1mdv2008.1.x86_64.rpm b06834c0f22ccfc256681a48a93033a3 2008.1/x86_64/lib64imlib2_1-1.4.0.003-4.1mdv2008.1.x86_64.rpm 5ea2f28aab852d9f62693dcc5e8ecdd4 2008.1/x86_64/lib64imlib2_1-filters-1.4.0.003-4.1mdv2008.1.x86_64.rpm b6e8fba14f5b8da8d54c167f5ea25da7 2008.1/x86_64/lib64imlib2_1-loaders-1.4.0.003-4.1mdv2008.1.x86_64.rpm b04ebb76f8efac0d2a02f49d34443918 2008.1/x86_64/lib64imlib2-devel-1.4.0.003-4.1mdv2008.1.x86_64.rpm 8c34ee1b5d7ba25a4e38991212628a73 2008.1/SRPMS/imlib2-1.4.0.003-4.1mdv2008.1.src.rpm Corporate 3.0: 22503a39dda4bfffe3c65232e7d87c93 corporate/3.0/i586/libimlib2_1-1.0.6-4.5.C30mdk.i586.rpm a03ce61ccf1c8c5070a168c5349b358c corporate/3.0/i586/libimlib2_1-devel-1.0.6-4.5.C30mdk.i586.rpm 58d70546c96b5a46ac8ca01f1ff3384e corporate/3.0/i586/libimlib2_1-filters-1.0.6-4.5.C30mdk.i586.rpm 42916631379dd652af28865ac46d03b6 corporate/3.0/i586/libimlib2_1-loaders-1.0.6-4.5.C30mdk.i586.rpm b494bd83d273dd46d71eca324bca5416 corporate/3.0/SRPMS/imlib2-1.0.6-4.5.C30mdk.src.rpm Corporate 3.0/X86_64: 1f3bd632cf8d35c6d39b246f1249579a corporate/3.0/x86_64/lib64imlib2_1-1.0.6-4.5.C30mdk.x86_64.rpm 2a9b0f77a8b889e06f779274e0008fc8 corporate/3.0/x86_64/lib64imlib2_1-devel-1.0.6-4.5.C30mdk.x86_64.rpm f7dbc8a2aa66932553ce5766f8bd7566 corporate/3.0/x86_64/lib64imlib2_1-filters-1.0.6-4.5.C30mdk.x86_64.rpm 0fc7214ac8520db812f4fb3c7feb844e corporate/3.0/x86_64/lib64imlib2_1-loaders-1.0.6-4.5.C30mdk.x86_64.rpm b494bd83d273dd46d71eca324bca5416 corporate/3.0/SRPMS/imlib2-1.0.6-4.5.C30mdk.src.rpm Corporate 4.0: 71d4dd6004a7a8fdd021c9ee3e12833e corporate/4.0/i586/imlib2-data-1.2.1-1.4.20060mlcs4.i586.rpm 64ea155ea7d232ec0cd4ca0312d46d6b corporate/4.0/i586/libimlib2_1-1.2.1-1.4.20060mlcs4.i586.rpm d32d8308dc1e1c255b3a0760347fb309 corporate/4.0/i586/libimlib2_1-devel-1.2.1-1.4.20060mlcs4.i586.rpm 68d0ad2024383f05cc1609fbba6fd2ad corporate/4.0/i586/libimlib2_1-filters-1.2.1-1.4.20060mlcs4.i586.rpm 232ee295638c7403f493c39b5ce4813e corporate/4.0/i586/libimlib2_1-loaders-1.2.1-1.4.20060mlcs4.i586.rpm dba76014532c7a9b1c8ba646324263ae corporate/4.0/SRPMS/imlib2-1.2.1-1.4.20060mlcs4.src.rpm Corporate 4.0/X86_64: 0e36868fe671a6e97ed37b7e272abe06 corporate/4.0/x86_64/imlib2-data-1.2.1-1.4.20060mlcs4.x86_64.rpm 5037005d5d71e60e75d283cef7c8704e corporate/4.0/x86_64/lib64imlib2_1-1.2.1-1.4.20060mlcs4.x86_64.rpm c822cf77f4cca4e4edd602d25db126ea corporate/4.0/x86_64/lib64imlib2_1-devel-1.2.1-1.4.20060mlcs4.x86_64.rpm a448734f54c6e97f287a441a711aa8f3 corporate/4.0/x86_64/lib64imlib2_1-filters-1.2.1-1.4.20060mlcs4.x86_64.rpm 74d9ee28fc94bbc2d44162fc1d4efe33 corporate/4.0/x86_64/lib64imlib2_1-loaders-1.2.1-1.4.20060mlcs4.x86_64.rpm dba76014532c7a9b1c8ba646324263ae corporate/4.0/SRPMS/imlib2-1.2.1-1.4.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIYmvvmqjQ0CJFipgRAupZAJ44Mn0CGl9nhfCba/LxlZ8rHG3NywCgxVz2 THkDcXYGQo9+HLuvSHEuCJg= =yEaf -----END PGP SIGNATURE----- ------------=_1214421064-11275-6677 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1214421064-11275-6677--
-
Digit-Life Review: AMD Phenom X3 8750 Excerpt: "Frankly speaking, considering test results of Phenom X4 9850, we were not keen to test a lower-clocked Phenom X3 8750 with fewer cores. However, our initial negative thinking served the good turn, because we were not disappointed. On the contrary, we decided that some people may seriously like this curiosity." Article: http://www.digit-life.com/articles3/cpu/amd-phenom-x3-8750-p1.html A post on your website would be appreciated! To exchange news & reviews with Digit-Life, to change subscription address, or to unsubscribe write to cormac ( -at -) ixbt.com. If you post notes about Digit-Life reviews, but don't see me doing the same, please email me as well. Best regards, Artem Pavlenko, www.Digit-Life.com / iXBT.com
-
TechwareLabs has published a review of the PCTV HD Pro Stick (801e). Here's a clip from the review: Quote: Artiom takes a look at he Pinnacle Systems HD Pro 801e USB stick. For you video editors out there this may be just what you need. Take a look at our review to find out if the HD stick 801e is what you need for your video editing. LINK: http://www.techwarelabs.com/reviews/peripherals/PCTV Title: PCTV HD Pro Stick (801e) ( -at -) TechwareLabs Image: http://www.techwarelabs.com/reviews/peripherals/PCTV/images/pctv.jpg A news post would be greatly appreciated!
-
Hi, We've just posted a new article on our website, Hardware Secrets. Title: AMD ATI Chips Comparison Table Link: http://www.hardwaresecrets.com/article/131 Category: Tutorials Summary: A table comparing the basic technical specs from all AMD/ATI graphics chips available on the market, from Radeon 9200 to Radeon HD 4870. Updated to include Radeon HD 4850 and HD 4870. Here is a snippet: "With more and more graphics chips being released every day it became very complicated for the user who does not follow the video card market to know the differences among all ATI graphic chips in the market today. To facilitate knowing and understanding the difference among major ATI chips, we have compiled the following table." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
-
Dear Folks, We have 4 new analysis articles on the Radeon HD 4000: Radeon HD 4850, Radeon HD 4870, Radeon HD 4850 CrossFire and an Arquitectura Analysis on RV770. Title: Radeon HD 4850 Link (spanish): http://www.chw.net/Revisiones/Tarjetas-de-Video/AMD-ATi-Radeon-HD-4850-200806252038.html Link (english): http://translate.google.com/translate?u=http%3A%2F%2Fwww.chw.net%2FRevisiones%2FTarjetas-de-Video%2FAMD-ATi-Radeon-HD-4850-200806252038.html&hl=es&ie=UTF8&sl=es&tl=en Title: Radeon HD 4870 Link (spanish): http://www.chw.net/Revisiones/Tarjetas-de-Video/AMD-ATi-Radeon-HD-4870-200806252037.html Link (english): http://translate.google.com/translate?u=http%3A%2F%2Fwww.chw.net%2FRevisiones%2FTarjetas-de-Video%2FAMD-ATi-Radeon-HD-4870-200806252037.html&hl=es&ie=UTF8&sl=es&tl=en Title: Radeon HD 4850 in CrossFire Link (spanish): http://www.chw.net/Revisiones/Tarjetas-de-Video/AMD-ATi-Radeon-HD-4850-en-CrossFireX-200806252036.html Link (english): http://translate.google.com/translate?u=http%3A%2F%2Fwww.chw.net%2FRevisiones%2FTarjetas-de-Video%2FAMD-ATi-Radeon-HD-4850-en-CrossFireX-200806252036.html&hl=es&ie=UTF8&sl=es&tl=en Title: RV770 Architecture Analysis Link (spanish): http://www.chw.net/Articulos/Tarjetas-de-Video/Arquitectura-RV770-200806252035.html Link (english): http://translate.google.com/translate?u=http%3A%2F%2Fwww.chw.net%2FArticulos%2FTarjetas-de-Video%2FArquitectura-RV770-200806252035.html&hl=es&ie=UTF8&sl=es&tl=en Best regards, JF
-
friedEgg Touch 1.2 adds Automator Actions to Analysis Workflow - Published on 06/25/08 friedEgg Limited has announced the release of version 1.2 of friedEgg Touch, an interactive data analysis tool for Mac OS X. Version 1.2 adds Automator actions and scriptability to further simplify its use and make it easier to integrate in an analysis workflow. friedEgg Touch differs from other basic charting tools in that it allows the user to interact with their data by directly manipulating a chart. This enables complex analysis, across many dimensions, in a few simple steps. London, UK - friedEgg Limited has announced the release of version 1.2 of friedEgg Touch, an interactive data analysis tool for Mac OS X. Version 1.2 adds Automator actions and scriptability to further simplify its use and make it easier to integrate in an analysis workflow. friedEgg Touch differs from other basic charting tools in that it allows the user to interact with their data by directly manipulating a chart. This enables complex analysis, across many dimensions, in a few simple steps. Consider an analysis process with a traditional spreadsheet - A table of data is prepared and filtered with expressions or by selecting items from a list. This is either presented as another table of numbers or as a simple chart. If the user wants to change the chart, this requires changes to either the expressions or items selected in the lists, followed by the re-generation of the chart. friedEgg Touch revolutionizes this process. The user changes the filters directly in the charts, by either clicking on objects or by dragging a filter panel across either of the three chart dimensions. The selected data is then available for another step of the analysis, maybe applying different data columns to the chart dimensions. By visually indicating when an item is selected, the user has more control over what is being filtered. Large multi column data tables can be viewed and analysed. By using additional analysis steps, maybe assigning different data columns to a chart dimension, the user can drill down on the information they need. This simple approach allows non-technical users to mine their data on their own desktop, without the the overhead of more complex and expensive tools. Common analysis steps can be saved as templates, to apply against similar structured data tables. Both the selected data and the chart image can then be exported to other applications. The major activities in creating and saving an analysis, together with the exporting of data and chart images, are supported by a number of automator actions that are provided with friedEgg Touch. These, together with the AppleScript support, make it even easier to integrate friedEgg Touch in an analysis workflow. Highlights: * Automator actions for workflow integration * Create chart from any data table by simply assigning data columns to a chart dimension * Apply filters by dragging panels within the charts * 3D graphical interface for user to select data * Selected data is carried to the next analysis step, enabling complex analysis, across many dimensions, in a few simple steps * Automatic formatting of data to simplify presentation to user * Export selected data as comma separated (csv) text file to other applications * Export charts as either TIFF, JPEG2 or PNG images for presentations Pricing and Availability: Single user licenses for may be obtained, from the Kagi store accessed from within friedEgg Touch, for just $39 USD and the upgrade to version 1.2 is free for existing license holders. friedEgg Touch: http://www.friedegg.com Direct Download Link: http://www.friedegg.com/downloads/Touch_1.2.dmg Screenshot: http://www.friedegg.com/images/friedEgg Touch Screenshot.jpg App Icon: http://friedegg.com/images/friedEgg Touch App Icon.jp2 friedEgg Limited is a UK based Mac developer, dedicated to providing the most easy to use data analysis tools for non-technical small business and educational users. ### Richard Bauer Director +44.7770431541 richard.bauer ( -at -) friedegg.com *******
-
Hello, We've just posted our latest review and would love it if you linked it. TIA! "Whether you're someone with an adventuresome style and spirit, an avid participant in tough travel environments, or just want to be regarded as an army nutjob in your office, the eGo Camo is a fun external drive that has a curved chassis covered by a woodland camouflage pattern. It also comes with a removable 'Power Grip', a rubber band which provides extra durability and helps prevent the drive from slipping from your desk and ending up in pieces." http://www.biosmagazine.co.uk/rev.php?id=765 _____ Christian Harris Editor/Publisher BIOS (http://www.biosmagazine.co.uk) _____
-
[RHSA-2008:0519-01] Important: kernel security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2008:0519-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0519.html Issue date: 2008-06-25 CVE Names: CVE-2008-0598 CVE-2008-2358 CVE-2008-2729 ===================================================================== 1. Summary: Updated kernel packages that fix various security issues and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * A security flaw was found in the Linux kernel memory copy routines, when running on certain AMD64 systems. If an unsuccessful attempt to copy kernel memory from source to destination memory locations occurred, the copy routines did not zero the content at the destination memory location. This could allow a local unprivileged user to view potentially sensitive data. (CVE-2008-2729, Important) * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and 64-bit emulation. This could allow a local unprivileged user to prepare and run a specially crafted binary, which would use this deficiency to leak uninitialized and potentially sensitive data. (CVE-2008-0598, Important) * Brandon Edwards discovered a missing length validation check in the Linux kernel DCCP module reconciliation feature. This could allow a local unprivileged user to cause a heap overflow, gaining privileges for arbitrary code execution. (CVE-2008-2358, Moderate) As well, these updated packages fix the following bug: * Due to a regression, "gettimeofday" may have gone backwards on certain x86 hardware. This issue was quite dangerous for time-sensitive systems, such as those used for transaction systems and databases, and may have caused applications to produce incorrect results, or even crash. Red Hat Enterprise Linux 5 users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 433938 - CVE-2008-0598 kernel: linux x86_64 ia32 emulation leaks uninitialized data 447389 - CVE-2008-2358 kernel: dccp: sanity check feature length 451271 - CVE-2008-2729 kernel: [x86_64] The string instruction version didn't zero the output on exception. 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-92.1.6.el5.src.rpm i386: kernel-2.6.18-92.1.6.el5.i686.rpm kernel-PAE-2.6.18-92.1.6.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-PAE-devel-2.6.18-92.1.6.el5.i686.rpm kernel-debug-2.6.18-92.1.6.el5.i686.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-debug-devel-2.6.18-92.1.6.el5.i686.rpm kernel-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.i686.rpm kernel-devel-2.6.18-92.1.6.el5.i686.rpm kernel-headers-2.6.18-92.1.6.el5.i386.rpm kernel-xen-2.6.18-92.1.6.el5.i686.rpm kernel-xen-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-xen-devel-2.6.18-92.1.6.el5.i686.rpm noarch: kernel-doc-2.6.18-92.1.6.el5.noarch.rpm x86_64: kernel-2.6.18-92.1.6.el5.x86_64.rpm kernel-debug-2.6.18-92.1.6.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.x86_64.rpm kernel-debug-devel-2.6.18-92.1.6.el5.x86_64.rpm kernel-debuginfo-2.6.18-92.1.6.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.x86_64.rpm kernel-devel-2.6.18-92.1.6.el5.x86_64.rpm kernel-headers-2.6.18-92.1.6.el5.x86_64.rpm kernel-xen-2.6.18-92.1.6.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-92.1.6.el5.x86_64.rpm kernel-xen-devel-2.6.18-92.1.6.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-92.1.6.el5.src.rpm i386: kernel-2.6.18-92.1.6.el5.i686.rpm kernel-PAE-2.6.18-92.1.6.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-PAE-devel-2.6.18-92.1.6.el5.i686.rpm kernel-debug-2.6.18-92.1.6.el5.i686.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-debug-devel-2.6.18-92.1.6.el5.i686.rpm kernel-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.i686.rpm kernel-devel-2.6.18-92.1.6.el5.i686.rpm kernel-headers-2.6.18-92.1.6.el5.i386.rpm kernel-xen-2.6.18-92.1.6.el5.i686.rpm kernel-xen-debuginfo-2.6.18-92.1.6.el5.i686.rpm kernel-xen-devel-2.6.18-92.1.6.el5.i686.rpm ia64: kernel-2.6.18-92.1.6.el5.ia64.rpm kernel-debug-2.6.18-92.1.6.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.ia64.rpm kernel-debug-devel-2.6.18-92.1.6.el5.ia64.rpm kernel-debuginfo-2.6.18-92.1.6.el5.ia64.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.ia64.rpm kernel-devel-2.6.18-92.1.6.el5.ia64.rpm kernel-headers-2.6.18-92.1.6.el5.ia64.rpm kernel-xen-2.6.18-92.1.6.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-92.1.6.el5.ia64.rpm kernel-xen-devel-2.6.18-92.1.6.el5.ia64.rpm noarch: kernel-doc-2.6.18-92.1.6.el5.noarch.rpm ppc: kernel-2.6.18-92.1.6.el5.ppc64.rpm kernel-debug-2.6.18-92.1.6.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.ppc64.rpm kernel-debug-devel-2.6.18-92.1.6.el5.ppc64.rpm kernel-debuginfo-2.6.18-92.1.6.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.ppc64.rpm kernel-devel-2.6.18-92.1.6.el5.ppc64.rpm kernel-headers-2.6.18-92.1.6.el5.ppc.rpm kernel-headers-2.6.18-92.1.6.el5.ppc64.rpm kernel-kdump-2.6.18-92.1.6.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-92.1.6.el5.ppc64.rpm kernel-kdump-devel-2.6.18-92.1.6.el5.ppc64.rpm s390x: kernel-2.6.18-92.1.6.el5.s390x.rpm kernel-debug-2.6.18-92.1.6.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.s390x.rpm kernel-debug-devel-2.6.18-92.1.6.el5.s390x.rpm kernel-debuginfo-2.6.18-92.1.6.el5.s390x.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.s390x.rpm kernel-devel-2.6.18-92.1.6.el5.s390x.rpm kernel-headers-2.6.18-92.1.6.el5.s390x.rpm kernel-kdump-2.6.18-92.1.6.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-92.1.6.el5.s390x.rpm kernel-kdump-devel-2.6.18-92.1.6.el5.s390x.rpm x86_64: kernel-2.6.18-92.1.6.el5.x86_64.rpm kernel-debug-2.6.18-92.1.6.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-92.1.6.el5.x86_64.rpm kernel-debug-devel-2.6.18-92.1.6.el5.x86_64.rpm kernel-debuginfo-2.6.18-92.1.6.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-92.1.6.el5.x86_64.rpm kernel-devel-2.6.18-92.1.6.el5.x86_64.rpm kernel-headers-2.6.18-92.1.6.el5.x86_64.rpm kernel-xen-2.6.18-92.1.6.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-92.1.6.el5.x86_64.rpm kernel-xen-devel-2.6.18-92.1.6.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2358 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2729 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIYmjDXlSAg2UNWIIRAvVmAKCzyx4amEJSyv8P3Wm9W+jb63JFEgCgmv6u oxXBJHr1o6HqzfQ2lbahoYQ= =oUiB -----END PGP SIGNATURE----- -- -
VisionTek & MSI Radeon 4850s V NVIDIA 9800 GTX+ Review @ DriverHeaven
news posted a topic in Upcoming News
For a few weeks it appeared as if ATI would easily achieve this goal but some aggressive price repositioning of the 9800 GTX by Nvidia as well as a snap announcement of the 9800 GTX+ mean the 4850 is hitting a very crowded but interesting market. Today we will be running the two new products through a selection of the latest games at resolutions up to 2560x1600 as well as delving into some Blu-Ray playback testing and overclocking in order to establish how well they perform. We will also be looking at how they compare to the more expensive cards currently available to see if the extra cash outlay really does benefit the consumer, or if these new cards provide excellent performance at a much more attractive price. http://www.driverheaven.net/reviews.php?reviewid=583 DriverHeaven and GamingHeaven News Mailer -
[RHSA-2008:0508-01] Important: kernel security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2008:0508-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0508.html Issue date: 2008-06-25 CVE Names: CVE-2008-0598 CVE-2008-1367 CVE-2008-2365 CVE-2008-2729 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and a bug are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * A security flaw was found in the Linux kernel memory copy routines, when running on certain AMD64 systems. If an unsuccessful attempt to copy kernel memory from source to destination memory locations occurred, the copy routines did not zero the content at the destination memory location. This could allow a local unprivileged user to view potentially sensitive data. (CVE-2008-2729, Important) * Alexey Dobriyan discovered a race condition in the Linux kernel process-tracing system call, ptrace. A local unprivileged user could use this flaw to cause a denial of service (kernel hang). (CVE-2008-2365, Important) * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and 64-bit emulation. This could allow a local unprivileged user to prepare and run a specially crafted binary, which would use this deficiency to leak uninitialized and potentially sensitive data. (CVE-2008-0598, Important) * It was discovered that the Linux kernel handled string operations in the opposite way to the GNU Compiler Collection (GCC). This could allow a local unprivileged user to cause memory corruption. (CVE-2008-1367, Low) As well, these updated packages fix the following bug: * On systems with a large number of CPUs (more than 16), multiple applications calling the "times()" system call may have caused a system hang. Red Hat Enterprise Linux 4 users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 433938 - CVE-2008-0598 kernel: linux x86_64 ia32 emulation leaks uninitialized data 437312 - CVE-2008-1367 Kernel doesn't clear DF for signal handlers 449101 - [4.7] System goes unresponsive if times() syscall is called concurrently on many cpus 449359 - CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race 451271 - CVE-2008-2729 kernel: [x86_64] The string instruction version didn't zero the output on exception. 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-67.0.20.EL.src.rpm i386: kernel-2.6.9-67.0.20.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.20.EL.i686.rpm kernel-devel-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.20.EL.i686.rpm kernel-smp-2.6.9-67.0.20.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.i686.rpm ia64: kernel-2.6.9-67.0.20.EL.ia64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.ia64.rpm kernel-devel-2.6.9-67.0.20.EL.ia64.rpm kernel-largesmp-2.6.9-67.0.20.EL.ia64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.ia64.rpm noarch: kernel-doc-2.6.9-67.0.20.EL.noarch.rpm ppc: kernel-2.6.9-67.0.20.EL.ppc64.rpm kernel-2.6.9-67.0.20.EL.ppc64iseries.rpm kernel-debuginfo-2.6.9-67.0.20.EL.ppc64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.ppc64iseries.rpm kernel-devel-2.6.9-67.0.20.EL.ppc64.rpm kernel-devel-2.6.9-67.0.20.EL.ppc64iseries.rpm kernel-largesmp-2.6.9-67.0.20.EL.ppc64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.ppc64.rpm s390: kernel-2.6.9-67.0.20.EL.s390.rpm kernel-debuginfo-2.6.9-67.0.20.EL.s390.rpm kernel-devel-2.6.9-67.0.20.EL.s390.rpm s390x: kernel-2.6.9-67.0.20.EL.s390x.rpm kernel-debuginfo-2.6.9-67.0.20.EL.s390x.rpm kernel-devel-2.6.9-67.0.20.EL.s390x.rpm x86_64: kernel-2.6.9-67.0.20.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.x86_64.rpm kernel-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-67.0.20.EL.src.rpm i386: kernel-2.6.9-67.0.20.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.20.EL.i686.rpm kernel-devel-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.20.EL.i686.rpm kernel-smp-2.6.9-67.0.20.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.i686.rpm noarch: kernel-doc-2.6.9-67.0.20.EL.noarch.rpm x86_64: kernel-2.6.9-67.0.20.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.x86_64.rpm kernel-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-67.0.20.EL.src.rpm i386: kernel-2.6.9-67.0.20.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.20.EL.i686.rpm kernel-devel-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.20.EL.i686.rpm kernel-smp-2.6.9-67.0.20.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.i686.rpm ia64: kernel-2.6.9-67.0.20.EL.ia64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.ia64.rpm kernel-devel-2.6.9-67.0.20.EL.ia64.rpm kernel-largesmp-2.6.9-67.0.20.EL.ia64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.ia64.rpm noarch: kernel-doc-2.6.9-67.0.20.EL.noarch.rpm x86_64: kernel-2.6.9-67.0.20.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.x86_64.rpm kernel-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-67.0.20.EL.src.rpm i386: kernel-2.6.9-67.0.20.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.20.EL.i686.rpm kernel-devel-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-2.6.9-67.0.20.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.20.EL.i686.rpm kernel-smp-2.6.9-67.0.20.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-2.6.9-67.0.20.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.i686.rpm ia64: kernel-2.6.9-67.0.20.EL.ia64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.ia64.rpm kernel-devel-2.6.9-67.0.20.EL.ia64.rpm kernel-largesmp-2.6.9-67.0.20.EL.ia64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.ia64.rpm noarch: kernel-doc-2.6.9-67.0.20.EL.noarch.rpm x86_64: kernel-2.6.9-67.0.20.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.20.EL.x86_64.rpm kernel-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.20.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-2.6.9-67.0.20.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.20.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.20.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2365 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2729 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIYmHsXlSAg2UNWIIRAqgFAJ99yj522cnmgB1O2Gmod2OtKwcdOACeMOXQ wx+oqa3/HlRvUCW/Y/nqM+8= =jD9e -----END PGP SIGNATURE----- -- -
Hello, - Red Faction: Guerrilla Video Dev Diary #1 http://www.gamershell.com/news_53650.html - Fallout 3 Screens #7 http://www.gamershell.com/news_53646.html - Blood Bowl Teaser Trailer http://www.gamershell.com/news_53644.html Best Regards, GamersHell.com Staff =============================================================================
-
Hello, - Unreal Tournament 3 Bonus Pack 3 Volume I Released http://www.gamershell.com/news_53640.html - Eudemons Online v1.115 Client http://www.gamershell.com/news_53638.html - Voyage Century Online v0.42 Client http://www.gamershell.com/news_53636.html Best Regards, GamersHell.com Staff =============================================================================
-
Second Gear releases Today 1.2 - Published on 06/25/08 Second Gear is pleased to announce the release of Today 1.2, an update to their popular Mac OS X application for managing iCal events and tasks. Version 1.2 introduces several new features and enhancements such as date browsing and editing of events from iCal. Today offers a 10 day trial and is available for purchase for $15. Evansville, Indiana - Second Gear is pleased to announce the release of Today 1.2, an update to their popular Mac OS X application for managing iCal events and tasks. Version 1.2 introduces several new features and enhancements such as date browsing and editing of events from iCal. Full release notes can be found at the Second Gear Website. Today makes it easy to get a one day snapshot view of your upcoming events and tasks in a compact window. Assign a keyboard shortcut, and you can toggle Today's visibility in a split second. Adding new events and tasks is just as easy. You can quickly schedule next week's meeting or a quick task in Today. No iCal required. Today is a first class citizen for Mac OS X Leopard. Since Today uses the same calendaring and tasks system as iCal and Apple Mail, changes you make either application are automatically shared with Today. Events created or edited on your iPhone or iPod touch will also be shared with Today on your next sync. Feature Highlights in Version 1.2: * Added ability for double-clicking on an event or task to open it in iCal. * Added support for quickly navigating between dates. Click on the currently selected date to drop down the sheet. * Today now automatically shifts the visible date forward at midnight. * Added gesture-based date navigation to the main Today window. * Users can now adjust the opacity of the Today window to their liking. * Various bug fixes and enhancements. System Requirements: * Requires Mac OS X v10.5 or later * Universal Binary for PowerPC and Intel * 5.4MB of hard drive space Pricing and Availability: Today 1.2 may be purchased for $15.00 USD and offers a fully featured 10 day trial period. Second Gear: http://secondgearllc.com Today 1.2: http://secondgearllc.com/today/ Direct Download Link: http://secondgearllc.com/today/downloads/Today.zip Release Notes: http://secondgearllc.com/today/changelog.php Screenshot: http://secondgearllc.com/today/img/mainwindow.jpg Screenshot/App Icon: http://secondgearllc.com/today/img/Today.png Second Gear LLC is based Evansville, Indiana. Founded in 2006 by Crew Chief Justin Williams, Second Gear focuses on building beautiful Mac OS X and iPhone applications for consumers and business. Their first application, PocketTweets, is the most popular Twitter client for Apple's revolutionary iPhone. ### Justin Williams Crew Chief 812-669-1001 justin ( -at -) secondgearllc.com *******
-
Hello dear editors, this is our new review TITLE: *Review AMD Radeon HD4850, HD4870 and HD4850 Crossfire* Brief: AMD wants to conquer the hearts of enthusiasts with graphics products that not only have excellent performance, but also a price achievable. Its first claw was the Radeon HD4850 with a competitive price of $199USD today appears the Radeon HD4870 $299USD for the masses with a great price/performance ratio. LINK: http://www.madboxpc.com/review-amd-radeon-hd4870-hd4850/ TRANSLATED LINK: http://translate.google.com/translate?u=http%3A%2F%2Fwww.madboxpc.com%2Freview-amd-radeon-hd4870-hd4850%2F&hl=es&ie=UTF8&sl=es&tl=en <http://translate.google.com/translate?u=http%3A%2F%2Fwww.madboxpc.com%2Freview-amd-radeon-hd4870-hd4850%2F&hl=es&ie=UTF8&sl=es&tl=en> A post in your news section would be apreciated Best Regards -- *Juan Eduardo Donoso Rosas** Content Administrator URL: **http://www.madboxpc.com RSS: http://feeds.madboxpc.com/portalmbpc** **e-mail: jotequila ( -at -) madboxpc.com <mailto:jotequila ( -at -) madboxpc.com>** **MSN Messenger: juanedonoso ( -at -) gmail.com <mailto:juanedonoso ( -at -) gmail.com>** **Twitter: http://twitter.com/Jotequila** **Phone: (56)-9-76240004*
-
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Ubuntu MID Edition 8.04 ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=12533 Summary: "Two months after Ubuntu 8.04 LTS was released and almost one month after Ubuntu Netbook Remix was first showcased, Ubuntu MID Edition 8.04 has been released. This is the newest Canonical product in the Ubuntu family and is designed for Mobile Internet Devices (MIDs). Ubuntu MID Edition is a cut-down version of Ubuntu 8.04 for the desktop but with many packages sliced away and with optimizations for Intel's Atom Processor and mobile software enhancements as a result of the Moblin project." Please feel free to contact us with any questions or comments you may
-
Hello Webmasters and News Posters, NEW CONTENT (Motherboards) - ZOTAC NVIDIA 790i Ultra SLI Motherboard QUOTE: "The 790i is the first chipset from NVIDIA to be re-designed totally. 790i has its own PCI Express 2.0 controller built into the chipset along with a new memory controller for DDR3 memory with support for EPP 2.0, and today we have ZOTAC’s high performance motherboard to play with. ZOTAC has definitely made its mark with us. While our first board we received from them based on the GeForce 8300 chipset failed to impress, the 790i Ultra SLI board really got us going." For more information, please visit - http://www.tweaktown.com/reviews/1482/zotac_nvidia_790i_ultra_sli_motherboard/index.html Best Regards, The TweakTown Team http://www.tweaktown.com
-
HIS Radeon HD 4870 CrossFire Video Card Review - GDDR5 Arrives Last week, AMD was forced to release the ATI Radeon HD 4850 graphics cards early since some retailers had already started selling the card to the public before it was launched. This week AMD has released the the Radeon HD 4870, which is priced at $299. This is the big brother to the Radeon HD 4850 and features higher clock speeds and newer cutting edge technology like GDDR5 memory ICs for improved memory bandwidth. Quote: "The Radeon HD 4870 is the first retail graphics card to use GDDR5 memory and the 512MB of memory uses Qimonda branded ICs. GDDR5 introduces features and functions that go beyond previous GDDR standards and enables GDDR5 to operate at data rates up to 6 Gbps, three times the performance of todays high speed GDDR3. The memory ICs feature adaptive power management, error compensation, adaptive interface timings and date eye optimization. The ICs being used are part number IDGV1G-05A1F1C-40X, which are entry level GDDR5 chips and are rated for just 4 Gbps. ATI has them clocked at just 3.6 Gbps, so these should have some overclocking head room left in them..." or "The ATI Radeon HD 4870 and Radeon 4850 are basically the same thing as both have the same number of transistors (965 million) and use the 55nm manufacturing process at TSMC. Both offer DX10.1 and Shader Model 4.1 support and use ATI's CrossFireX multi-GPU technology. The only big difference here is the clock speed and the memory type! The new higher clock frequencies mean the math processing rate is now 1.2 TeraFLOPS over the 1.0 TeraFLOPS found on the Radeon HD 4850..." Article Title: HIS Radeon HD 4870 CrossFire Video Card Review ( -at -) Legit Reviews Article URL: http://legitreviews.com/article/734/1/ --
-
Hello, - Rune Factory 2: A Fantasy Harvest Moon Announced and Screens http://www.gamershell.com/news_53598.html - Alone in the Dark Ships to North America and Unkle Trailer http://www.gamershell.com/news_53596.html - Hellboy: The Science of Evil in Stores http://www.gamershell.com/news_53594.html - Theatre of War Free Strategy Guide Released http://www.gamershell.com/news_53592.html - Music Wars Rebirth Announced http://www.gamershell.com/news_53590.html - Asda Story NA Release Confirmed http://www.gamershell.com/news_53588.html - Cake Mania 2 Now Available http://www.gamershell.com/news_53586.html - Safecracker Wii Version Announced and Screens http://www.gamershell.com/news_53584.html - Battlefield: Bad Company Sprinkles and Bad World Trailers http://www.gamershell.com/news_53582.html - Wacky Races: Crash & Dash Released http://www.gamershell.com/news_53580.html Best Regards, GamersHell.com Staff =============================================================================
-
AssistiveWare announces KeyStrokes 4.1 on-screen keyboard for Mac OS X
news posted a topic in Upcoming News
AssistiveWare announces KeyStrokes 4.1 on-screen keyboard for Mac OS X - Published on 06/25/08 AssistiveWare today announced the release of KeyStrokes 4.1, an important new version of the award-winning on-screen keyboard with multilingual word prediction for Mac users with physical impairments. Version 4.1 is now Universal Binary, offers enhanced compatibility with Spaces, and on Leopard provides automatic layout switching when the user changes the keyboard layout in the Mac OS X Input menu. Also included is a newly released LayoutKitchen 2.1.1 keyboard editor. Amsterdam - AssistiveWare® today announced the release of KeyStrokes® 4.1, an important new version of the award-winning on-screen keyboard with multilingual word prediction for Mac users with physical impairments. Version 4.1 is now Universal Binary, offers enhanced compatibility with Spaces, and on Leopard provides automatic layout switching when the user changes the keyboard layout in the Mac OS X Input menu. Also included is a newly released LayoutKitchen 2.1.1 layout editor, which allows users to design their own on-screen keyboards. KeyStrokes is not only used by Mac users with disabilities, but also by graphic designers who prefer typing with their tablet instead of a physical keyboard and by developers of touch screen kiosks. KeyStrokes 4.1 requires Mac OS X 10.4 and later. The suggested retail price for KeyStrokes is 249 Euro excluding VAT (299 USD in North America). Registered KeyStrokes 3 users can use the new version, but to use LayoutKitchen and design their own keyboards an upgrade to a KeyStrokes 4 activation code is required. An upgrade from KeyStrokes 3 to KeyStrokes 4 (including LayoutKitchen) costs 99 euro excluding VAT (129 USD in North America). This upgrade is free for anyone who purchased KeyStrokes 3 in 2007 or 2008. For more information, fully-functional downloadable demo please consult the product page. For more information contact AssistiveWare directly or one of our distributors such as Origin Instruments Corporation for North America or ordiTICE for France. AssistiveWare Website: http://www.assistiveware.com KeyStrokes: http://www.assistiveware.com/keystrokes.php Download KeyStrokes: http://www.assistiveware.com/ksdownload.php KeyStrokes Screenshot: http://www.assistiveware.com/images/KeyStrokes4screenshot.png KeyStrokes Icon: http://www.assistiveware.com/images/KSXicon128.gif AssistiveWare is the worldwide leader in innovative assistive technology software for Mac OS X that gives people back their lives. This includes award-winning KeyStrokes® and TouchStrokes® virtual keyboards, SwitchXS® scanning on-screen keyboard, LayoutKitchen® panel editor, and Proloquo® multi-purpose speech solution. The ConvenienceWare product line makes the advanced technologies developed by AssistiveWare available in cool and convenient applications that can make the life of Mac users easier. AssistiveWare and ConvenienceWare are trade names and trademarks or registered trademarks of Niemeijer Consult. VisioVoice, SwitchXS, KeyStrokes, TouchStrokes, LayoutKitchen, GhostReader and Proloquo are trademarks or registered trademarks of Niemeijer Consult. Infovox iVox is a trademark of Acapela Group. All other trademarks are properties of their respective owners. ### David Niemeijer CTO / co-CEO d.niemeijer ( -at -) assistiveware.com ******* -
Bigbruin.com has new content posted... A mention in your site's news section would be greatly appreciated! Title: Logitech G15 Revision 2 Gaming Keyboard URL: http://www.bigbruin.com/2008/logitechg15_1 Image URL (150x70 pixels): http://www.bigbruin.com/2008/logitechg15/logo.gif Quote: This review is going to focus on a keyboard loaded with features specifically designed for 3D gamers; the G15 Revision 2. The overall style is sporty, a "GamePanel" LCD provides convenient access to system information, a handful of G-keys allow you to program your own macros, and backlit keys let you take command with any lighting condition. Thank you. Best regards, Jason www.bigbruin.com
-
You can almost hear the fanboys vibrating with excitement over the Radeon HD 4800 series. The buzz has been building for weeks. For the first time in quite a while, AMD would seem to have an unequivocal winner on its hands. Read on for our in-depth take on this impressive new GPU. http://techreport.com/articles.x/14990 Thanks, Scott __ Scott Wasson The Tech Report PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link:
-
Hello, - International Athletics PSP Trailer and Screens http://www.gamershell.com/news_53634.html - Elite Forces: Unit 77 Screens #2 http://www.gamershell.com/news_53630.html - Spore Galactic Edition Announced http://www.gamershell.com/news_53628.html - Lord of the Evil Revealed http://www.gamershell.com/news_53632.html - Fallen Empire: Legions Goes Public Beta and Screens #2 http://www.gamershell.com/news_53626.html - Myth War II Open Beta Test Tomorrow http://www.gamershell.com/news_53624.html - Fun Park Trailer Released http://www.gamershell.com/news_53618.html - Super Street Fighter II Turbo HD Remix Beta Released and Screens #4 http://www.gamershell.com/news_53616.html Best Regards, GamersHell.com Staff =============================================================================
-
[gentoo-announce] [ GLSA 200806-11 ] IBM JDK/JRE: Multiple vulnerabilities
news posted a topic in Upcoming News
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200806-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: IBM JDK/JRE: Multiple vulnerabilities Date: June 25, 2008 Bugs: #186277, #198644, #216112 ID: 200806-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in IBM Java Development Kit (JDK) and Java Runtime Environment (JRE), resulting in the execution of arbitrary code. Background ========== The IBM Java Development Kit (JDK) and the IBM Java Runtime Environment (JRE) provide the IBM Java platform. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/ibm-jdk-bin < 1.5.0.7 >= 1.5.0.7 *>= 1.4.2.11 2 dev-java/ibm-jre-bin < 1.5.0.7 >= 1.5.0.7 *>= 1.4.2.11 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. ------------------------------------------------------------------- Description =========== Because of sharing the same codebase, IBM JDK and JRE are affected by the vulnerabilities mentioned in GLSA 200804-20. Impact ====== A remote attacker could entice a user to run a specially crafted applet on a website or start an application in Java Web Start to execute arbitrary code outside of the Java sandbox and of the Java security restrictions with the privileges of the user running Java. The attacker could also obtain sensitive information, create, modify, rename and read local files, execute local applications, establish connections in the local network, bypass the same origin policy, and cause a Denial of Service via multiple vectors. Workaround ========== There is no known workaround at this time. Resolution ========== All IBM JDK 1.5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/ibm-jdk-bin-1.5.0.7" All IBM JDK 1.4 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/ibm-jdk-bin-1.4.2.11" All IBM JRE 1.5 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/ibm-jre-bin-1.5.0.7" All IBM JRE 1.4 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/ibm-jre-bin-1.4.2.11" References ========== [ 1 ] GLSA 200804-20 http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200806-11.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security ( -at -) gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 -
A Better Finder Rename 7.9.9 adds support for UTF-16 ID3 tags in MP3s
news posted a topic in Upcoming News
A Better Finder Rename 7.9.9 adds support for UTF-16 ID3 tags in MP3s - Published on 06/25/08 publicspace.net is pleased to announce the immediate availability of A Better Finder Rename 7.9.9. The new version adds support for UTF-16 ID3 tags in MP3 music files. A Better Finder Rename has long been the most comprehensive file renaming solution for the Macintosh and has transformed the tedious and time-consuming task of renaming multiple files into a simple matter of seconds for thousands of creative professionals across the world. Luxembourg City, Luxembourg - 25th June 2008 - publicspace.net is pleased to announce the immediate availability of A Better Finder Rename 7.9.9. The new version adds support for UTF-16 ID3 tags in MP3 music files. System Requirements: * Mac OS X 10.4 or later * Universal Binary for Intel and PowerPC * 5 MB Hard Drive space Pricing and Availability: A Better Finder Rename may be purchased for $24.95 USD. Family, Business and Enterprise licensing is also available. Customers may chose to include a "forever upgrade" with their purchase. A Better Finder Rename has long been the most comprehensive file renaming solution for the Macintosh and has transformed the tedious and time-consuming task of renaming multiple files into a simple matter of seconds for thousands of creative professionals across the world. It is based on over 10 years of listening to our users and addressing their requirements to the best of our abilities. publicspace.net: http://www.publicspace.net/ A Better Finder Rename: http://www.publicspace.net/ABetterFinderRename/ Direct Download Link: http://www.publicspace.net/download/ABFRX.dmg Purchase Link: http://www.publicspace.net/ABetterFinderRename/order.html Screenshot: http://www.publicspace.net/images/abfr7/v78_full.png Screencast: http://www.publicspace.net/movies/abfr/abfr_doug_vo3_final.mov publicspace.net was founded by Frank Reiff in 1996 with the aim of producing affordable best-of-breed software for the Macintosh. In the past decade, our A Better Finder series of file utilities and our MacBreakZ personal ergonomic assistant have become familiar fixtures of the Macintosh community. publicspace.net is also active in the Windows software market. ### Frank Reiff Owner/Founder reiff ( -at -) publicspace.net ******* -
Hello, - Guitar Hero: Aerosmith Trailer #5 http://www.gamershell.com/news_53614.html - Hail to the Chimp Released and Human News Remix Trailer http://www.gamershell.com/news_53612.html - Space Chimps Trailer #7 and TV Spot http://www.gamershell.com/news_53610.html Best Regards, GamersHell.com Staff =============================================================================