Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Intel has finally taken wraps off its long-awaited Core X-Series processors and accompanying X299 chipset, which means high-end desktop computing is going to be getting a big horsepower injection! The Intel Core X-series processor family introduces Intel’s first teraflop desktop CPUs, the entirely new Intel Core i9 processor, and the first consumer desktop CPU with 18 cores and 36 threads. Read on to find out more! Article Title: Intel Introduces Skylake-X, Kaby Lake-X and X299 Platform ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/intel-introduces-skylake-x-kabylake-x-x299-platform_195017 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: nss security and bug fix update Advisory ID: RHSA-2017:1364-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1364 Issue date: 2017-05-30 CVE Names: CVE-2017-7502 ===================================================================== 1. Summary: An update for nss is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) Bug Fix(es): * The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1448488) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, applications using NSS (for example, Firefox) must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1446631 - CVE-2017-7502 nss: Null pointer dereference when handling empty SSLv2 messages 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: nss-3.28.4-3.el6_9.src.rpm i386: nss-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-sysinit-3.28.4-3.el6_9.i686.rpm nss-tools-3.28.4-3.el6_9.i686.rpm x86_64: nss-3.28.4-3.el6_9.i686.rpm nss-3.28.4-3.el6_9.x86_64.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-sysinit-3.28.4-3.el6_9.x86_64.rpm nss-tools-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm x86_64: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.x86_64.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: nss-3.28.4-3.el6_9.src.rpm x86_64: nss-3.28.4-3.el6_9.i686.rpm nss-3.28.4-3.el6_9.x86_64.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-sysinit-3.28.4-3.el6_9.x86_64.rpm nss-tools-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.x86_64.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: nss-3.28.4-3.el6_9.src.rpm i386: nss-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-sysinit-3.28.4-3.el6_9.i686.rpm nss-tools-3.28.4-3.el6_9.i686.rpm ppc64: nss-3.28.4-3.el6_9.ppc.rpm nss-3.28.4-3.el6_9.ppc64.rpm nss-debuginfo-3.28.4-3.el6_9.ppc.rpm nss-debuginfo-3.28.4-3.el6_9.ppc64.rpm nss-devel-3.28.4-3.el6_9.ppc.rpm nss-devel-3.28.4-3.el6_9.ppc64.rpm nss-sysinit-3.28.4-3.el6_9.ppc64.rpm nss-tools-3.28.4-3.el6_9.ppc64.rpm s390x: nss-3.28.4-3.el6_9.s390.rpm nss-3.28.4-3.el6_9.s390x.rpm nss-debuginfo-3.28.4-3.el6_9.s390.rpm nss-debuginfo-3.28.4-3.el6_9.s390x.rpm nss-devel-3.28.4-3.el6_9.s390.rpm nss-devel-3.28.4-3.el6_9.s390x.rpm nss-sysinit-3.28.4-3.el6_9.s390x.rpm nss-tools-3.28.4-3.el6_9.s390x.rpm x86_64: nss-3.28.4-3.el6_9.i686.rpm nss-3.28.4-3.el6_9.x86_64.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.x86_64.rpm nss-sysinit-3.28.4-3.el6_9.x86_64.rpm nss-tools-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm ppc64: nss-debuginfo-3.28.4-3.el6_9.ppc.rpm nss-debuginfo-3.28.4-3.el6_9.ppc64.rpm nss-pkcs11-devel-3.28.4-3.el6_9.ppc.rpm nss-pkcs11-devel-3.28.4-3.el6_9.ppc64.rpm s390x: nss-debuginfo-3.28.4-3.el6_9.s390.rpm nss-debuginfo-3.28.4-3.el6_9.s390x.rpm nss-pkcs11-devel-3.28.4-3.el6_9.s390.rpm nss-pkcs11-devel-3.28.4-3.el6_9.s390x.rpm x86_64: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: nss-3.28.4-3.el6_9.src.rpm i386: nss-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-sysinit-3.28.4-3.el6_9.i686.rpm nss-tools-3.28.4-3.el6_9.i686.rpm x86_64: nss-3.28.4-3.el6_9.i686.rpm nss-3.28.4-3.el6_9.x86_64.rpm nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-devel-3.28.4-3.el6_9.i686.rpm nss-devel-3.28.4-3.el6_9.x86_64.rpm nss-sysinit-3.28.4-3.el6_9.x86_64.rpm nss-tools-3.28.4-3.el6_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm x86_64: nss-debuginfo-3.28.4-3.el6_9.i686.rpm nss-debuginfo-3.28.4-3.el6_9.x86_64.rpm nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm nss-pkcs11-devel-3.28.4-3.el6_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-7502 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZLVNIXlSAg2UNWIIRAu5OAJ0XQgJNwHdxyJlCfnHlZtICO3OYoACgg+wz E4XWzMKYdt6ubh4GYKaAJTQ= =sqLA -----END PGP SIGNATURE----- --
  3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: nss security and bug fix update Advisory ID: RHSA-2017:1365-03 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1365 Issue date: 2017-05-30 CVE Names: CVE-2017-7502 ===================================================================== 1. Summary: An update for nss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) Bug Fix(es): * The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1451421) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, applications using NSS (for example, Firefox) must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1446631 - CVE-2017-7502 nss: Null pointer dereference when handling empty SSLv2 messages 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: nss-3.28.4-1.2.el7_3.src.rpm x86_64: nss-3.28.4-1.2.el7_3.i686.rpm nss-3.28.4-1.2.el7_3.x86_64.rpm nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm nss-tools-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-devel-3.28.4-1.2.el7_3.i686.rpm nss-devel-3.28.4-1.2.el7_3.x86_64.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: nss-3.28.4-1.2.el7_3.src.rpm x86_64: nss-3.28.4-1.2.el7_3.i686.rpm nss-3.28.4-1.2.el7_3.x86_64.rpm nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm nss-tools-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-devel-3.28.4-1.2.el7_3.i686.rpm nss-devel-3.28.4-1.2.el7_3.x86_64.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-3.28.4-1.2.el7_3.src.rpm aarch64: nss-3.28.4-1.2.el7_3.aarch64.rpm nss-debuginfo-3.28.4-1.2.el7_3.aarch64.rpm nss-devel-3.28.4-1.2.el7_3.aarch64.rpm nss-sysinit-3.28.4-1.2.el7_3.aarch64.rpm nss-tools-3.28.4-1.2.el7_3.aarch64.rpm ppc64: nss-3.28.4-1.2.el7_3.ppc.rpm nss-3.28.4-1.2.el7_3.ppc64.rpm nss-debuginfo-3.28.4-1.2.el7_3.ppc.rpm nss-debuginfo-3.28.4-1.2.el7_3.ppc64.rpm nss-devel-3.28.4-1.2.el7_3.ppc.rpm nss-devel-3.28.4-1.2.el7_3.ppc64.rpm nss-sysinit-3.28.4-1.2.el7_3.ppc64.rpm nss-tools-3.28.4-1.2.el7_3.ppc64.rpm ppc64le: nss-3.28.4-1.2.el7_3.ppc64le.rpm nss-debuginfo-3.28.4-1.2.el7_3.ppc64le.rpm nss-devel-3.28.4-1.2.el7_3.ppc64le.rpm nss-sysinit-3.28.4-1.2.el7_3.ppc64le.rpm nss-tools-3.28.4-1.2.el7_3.ppc64le.rpm s390x: nss-3.28.4-1.2.el7_3.s390.rpm nss-3.28.4-1.2.el7_3.s390x.rpm nss-debuginfo-3.28.4-1.2.el7_3.s390.rpm nss-debuginfo-3.28.4-1.2.el7_3.s390x.rpm nss-devel-3.28.4-1.2.el7_3.s390.rpm nss-devel-3.28.4-1.2.el7_3.s390x.rpm nss-sysinit-3.28.4-1.2.el7_3.s390x.rpm nss-tools-3.28.4-1.2.el7_3.s390x.rpm x86_64: nss-3.28.4-1.2.el7_3.i686.rpm nss-3.28.4-1.2.el7_3.x86_64.rpm nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-devel-3.28.4-1.2.el7_3.i686.rpm nss-devel-3.28.4-1.2.el7_3.x86_64.rpm nss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm nss-tools-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: nss-debuginfo-3.28.4-1.2.el7_3.aarch64.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.aarch64.rpm ppc64: nss-debuginfo-3.28.4-1.2.el7_3.ppc.rpm nss-debuginfo-3.28.4-1.2.el7_3.ppc64.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.ppc.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.ppc64.rpm ppc64le: nss-debuginfo-3.28.4-1.2.el7_3.ppc64le.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.ppc64le.rpm s390x: nss-debuginfo-3.28.4-1.2.el7_3.s390.rpm nss-debuginfo-3.28.4-1.2.el7_3.s390x.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.s390.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.s390x.rpm x86_64: nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: nss-3.28.4-1.2.el7_3.src.rpm x86_64: nss-3.28.4-1.2.el7_3.i686.rpm nss-3.28.4-1.2.el7_3.x86_64.rpm nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-devel-3.28.4-1.2.el7_3.i686.rpm nss-devel-3.28.4-1.2.el7_3.x86_64.rpm nss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm nss-tools-3.28.4-1.2.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: nss-debuginfo-3.28.4-1.2.el7_3.i686.rpm nss-debuginfo-3.28.4-1.2.el7_3.x86_64.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpm nss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-7502 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZLVOSXlSAg2UNWIIRAq92AKCY6SgPW0ioGWcqF8auWHzF6CqPrwCfRqSm XLz3YZk/Q+IFWvugtHwhiWI= =6qI6 -----END PGP SIGNATURE----- --
  4. AZIO Armato Gaming Keyboard Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/azio-armato-gaming-keyboard-review/ Image URL: http://www.thinkcomputers.org/reviews/azio_armato/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/azio_armato/small.jpg Quote: "AZIO has a pretty interesting lineup of keyboards. They have two main categories, Lifestyle and Gaming. Of course we are mainly interested in their gaming products, but they have released products like the MK Retro which were very unique. We took at our last AZIO gaming keyboard about a year ago, and while it was good, we still feel it lacked some necessary features. Well they are back with the Armato which they say offers striking aesthetics and essential gaming functionalities. With that you have Cherry MX Brown mechanical key switches, an aluminum chassis design, 5 dedicated macro keys, and a very interesting volume control. Does the Armato have enough for us to recommend it for your next gaming keyboard? Read on as we find out!"
  5. ** TECHSPOT ------------------------------------------------------------ ** Radeon RX 570 vs. GeForce GTX 1060 3GB ------------------------------------------------------------ ** http://www.techspot.com/review/1411-radeon-rx-570-vs-geforce-gtx-1060-3gb/ ------------------------------------------------------------ In an effort to continue stirring the hornet's nest, we're back with even more benchmarks (29 games total), this time pitting the Radeon RX 570 against the GeForce GTX 1060 3GB. All things considered, which of these mid-range GPUs makes the most sense to purchase? Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  6. As Computex kicks off, Intel is refreshing its high-end desktop platform from top to bottom. We take a first look at the company's Skylake-X and Kaby Lake-X CPUs and the X299 platform. Read more: http://techreport.com/review/31986/intel-core-x-series-cpus-and-x299-platform-revealed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  7. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Team Group T-Force DARK ROG 3000 MHz DDR4 Link: https://www.techpowerup.com/reviews/Team_Group/T-Force_Dark_ROG_Certified Brief: Today, we take a look at Team Group's ROG Certified DARK series of DIMMs from their T-Force line-up of enthusiast-oriented DDR4 DIMMs. These ROG Certified DIMMs have a special secret; read on to find out what that is!
  8. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: 28-Way NVIDIA GeForce GPU Comparison On Ubuntu: From GeForce 8 To GeForce 1080 ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=24708 Summary: "After finishing up the tests last week for the GeForce GT 1030 Linux review of this $70 USD passively-cooled graphics card, I ended up getting carried away running more NVIDIA Linux benchmarks and ended up making a much larger comparison -- in part for the pre-celebrations with Phoronix turning 13 next week. Here's a 28-way GeForce graphics card comparison on Ubuntu with GPUs ranging from the GeForce 8600/8800 series through the GeForce GTX 1080 Ti." Please feel free to contact us with any questions or comments you may
  9. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : tnef Version : 1.4.9-1+deb7u3 CVE ID : CVE-2017-8911 CVE-2017-8911 An integer underflow has been identified in the unicode_to_utf8() function in tnef 1.4.14. This might lead to invalid write operations, controlled by an attacker. For Debian 7 "Wheezy", these problems have been fixed in version 1.4.9-1+deb7u3. We recommend that you upgrade your tnef packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJZLInoXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHvxkP/0g4csNAmIYky8I3RAhPXBnX ruS+Rqj0BqbT4wb8nBTVryAd4LmlaEdJ5C1HbxfccGcSRqzHlAqdlZRojPwf/SIn nQtlq3DPXwzZylH6dK66gxyZEcjP8wLm21MHvNQrjjHdFDSibBpdjvkxUQQhiO2f fsC8PwA+rXKhMie7x/b/jEJZYQKIx7BVANeA+oUFKIbTD6/r2a3tQKs8IBo0iwtZ Gvihj9Mnc5lzRxHCgjmD2bvIw9tzfn+TFOIO5qWXlb/31Qp7mDC4+/4vlFF4fd5D ucgsMtwxkHba2KSueMFx67UngOUnAX3mtx9VLFw77z7OkWGG1fPuj4A8/MtwSyEl 7kSl7FQqSDmGyHnq33CHauEBjQOE5QytjQ28JhC0KFhXYT1FGEZMK4HE7KEHiGZ8 GULk41H5ACXH0I77sBtsu0EPwx9bE5upZ06mlOoAZm4iPHWcOIgvm5r1dOw1n5j4 oJ2g3j2C+tU2vDN8nR+co7QKLwBz9kjOQKWcEIGu2KV50L7SLqTvD1sv0kLU6QKF 1FwKf07TGNl98aABCp+wEWLRj/g/1AeGWR/kJx/mkRoGWO/soSel4XWWVADy1NHM dBjfUSBToq0kI9zrxDM3UKMRIsV+tLqXpwMzY7hDsaE1cmt3vyCxlx7obLjyT99p FMS3N5oGIRxbiAhI35F2 =9uUZ -----END PGP SIGNATURE-----
  10. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : tnef Version : 1.4.9-1+deb7u3 CVE ID : CVE-2017-8911 CVE-2017-8911 An integer underflow has been identified in the unicode_to_utf8() function in tnef 1.4.14. This might lead to invalid write operations, controlled by an attacker. For Debian 7 "Wheezy", these problems have been fixed in version 1.4.9-1+deb7u3. We recommend that you upgrade your tnef packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJZLInoXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHvxkP/0g4csNAmIYky8I3RAhPXBnX ruS+Rqj0BqbT4wb8nBTVryAd4LmlaEdJ5C1HbxfccGcSRqzHlAqdlZRojPwf/SIn nQtlq3DPXwzZylH6dK66gxyZEcjP8wLm21MHvNQrjjHdFDSibBpdjvkxUQQhiO2f fsC8PwA+rXKhMie7x/b/jEJZYQKIx7BVANeA+oUFKIbTD6/r2a3tQKs8IBo0iwtZ Gvihj9Mnc5lzRxHCgjmD2bvIw9tzfn+TFOIO5qWXlb/31Qp7mDC4+/4vlFF4fd5D ucgsMtwxkHba2KSueMFx67UngOUnAX3mtx9VLFw77z7OkWGG1fPuj4A8/MtwSyEl 7kSl7FQqSDmGyHnq33CHauEBjQOE5QytjQ28JhC0KFhXYT1FGEZMK4HE7KEHiGZ8 GULk41H5ACXH0I77sBtsu0EPwx9bE5upZ06mlOoAZm4iPHWcOIgvm5r1dOw1n5j4 oJ2g3j2C+tU2vDN8nR+co7QKLwBz9kjOQKWcEIGu2KV50L7SLqTvD1sv0kLU6QKF 1FwKf07TGNl98aABCp+wEWLRj/g/1AeGWR/kJx/mkRoGWO/soSel4XWWVADy1NHM dBjfUSBToq0kI9zrxDM3UKMRIsV+tLqXpwMzY7hDsaE1cmt3vyCxlx7obLjyT99p FMS3N5oGIRxbiAhI35F2 =9uUZ -----END PGP SIGNATURE-----
  11. news

    Introducing gps-share

    Hi, I just tagged the very first release of gps-share: https://github.com/zeenix/gps-share/releases/tag/0.1.0 ---- gps-share is a utility to share your GPS device on local network. It has two goals: * Share your GPS device on the local network so that all machines in your home or office can make use of it. * Enable support for standalone (i-e not part of a cellular modem) GPS devices in Geoclue. Since Geoclue has been able to make use of network NMEA sources since 2015, gps-share works out of the box with Geoclue. The latter means that it is a replacement for GPSD[1] and Gypsy[2]. While "why not GPSD?" has already been documented[3], Gypsy has been unmaintained for many years now. I did not feel like reviving a dead project and I really wanted to code in Rust so I decided to create gps-share. ## Dependencies While cargo manages the Rust crates gps-share depend on, you'll also need the following on your host: * libdbus * libudev * libcap * xz-libs ## Supported devices gps-share currently only supports GPS devices that present themselves as serial port (RS232). Many USB are expected to work out of the box but bluetooth devices need manual intervention to be mounted as serial port devices through rfcomm command. The following command worked on my Fedora 25 machine for a TomTom Wireless GPS MkII. sudo rfcomm connect 0 00:0D:B5:70:54:75 gps-share can autodetect the device to use if it's already mounted as a serial port but it assumes a baudrate of 38400. You can manually set the device node to use by passing the device node path as argument and set the baudrate using the '-b' commandline option. Pass '--help' for a full list of supported options. -- Regards, Zeeshan Ali [1] https://en.wikipedia.org/wiki/Gpsd [2] https://gypsy.freedesktop.org/wiki/ [3] https://gypsy.freedesktop.org/why-not-gpsd.html _______________________________________________
  12. We have posted a new solid state report!! ------------------------------------------------------------ http://mailchi.mp/b0bce053a7ab/the-ssd-review-has-posted-a-new-article?e=1230c2ab07 http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=260c0da012&e=1230c2ab07 TITLE: Kingston DCP1000 Enterprise NVMe SSD Review (1.6TB) – 7GB/s & 1 Mil IOPS in a Single HHHL SSD LINK: http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=e3dc191107&e=1230c2ab07 PHOTO: http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=1fd06eb200&e=1230c2ab07 INFO: Te Kingston DCP1000 is a total beast. It is an IOPS spewing monster that, when utilized to its full potential, can deliver more than enough performance for the vast majority of adopters. Move over Intel DC P3608, we have a new performance king! In today’s testing, it was able to sustain sequential read and write speeds of 7GB/s and 6GB/s, respectively! Not only that, but it is able to deliver over 1.1million IOPS with 4KB random read performance and over 180K for write. During the server workloads, it beat out most of the test pool, except for the Micron 9100 MAX during the more write heavy workloads at higher QDs. _________________________________________________________________________________________
  13. *** glibmm: glibmm 2.54 wraps glib 2.54 glibmm 2.54 is a version of the glibmm-2.54 API. It installs in parallel with the gtkmm-2.4 API/ABI, of which the most recent version is glibmm 2.51.7. http://www.gtkmm.org *** Changes 2.53.2 (unstable): Distro packagers should probably not package this yet. Glib: * ConstructParams: Do not increment allocation size twice  (Daniel Elstner) Gio: * ActionMap: Really fix add_action_with_parameter().  (Daniel Boles) Bug 774444#c31 * UnixSocketAddress::create(): Remove a default value to avoid ambiguity.  (Kjell Ahlstedt) Bug #782592 Gio::DBus * Proxy: Wrap call() and call_sync() methods.  (Vyacheslav Yurkov) Bug #781818 gmmproc: * Use of static_cast instead of C-style casts.  (Murray Cumming) Build: * Fix the build on MacOS, where glib doesn't have gdesktopinfo.  (John Ralls) Bug #781947 * Really use desktopappinfo.hg to fix the build.  (Murray Cumming) Documentation: * Glib, Gio: Update documentation of in-class enums.  (Kjell Ahlstedt) * ActionMap: Improve add_action_with_parameter docs  (Daniel Boles) 2.53.1.1 (unstable): Glib: * Use C++11 enum classes instead of old-style enums, and put many enums  inside relevant class declarations:  - Glib::NodeTree: Move enums into class.  - Glib::BindingFlags is now Glib::Binding::Flags.  - Glib::KeyfileFlags is now Glib::Keyfile::Flags.  - Glib::ModuleFlags is now Glib::Module::Flags.  - Glib::ChecksumType is now Glib::Checksum::Type.  - Glib::Regex: Move enums inside class.  - Glib::Resource: Move enums into class.  (Murray Cumming, Kjell Ahlstedt) * RefPtr: Make this an alias for std::shared_ptr instead.  - Use std::dynamic_pointer_cast() instead of RefPtr::cast_dynamic().  - Use std::static_pointer_cast() instead of RefPtr::cast_static().  - Use std::const_pointer_cast() instead of RefPtr::cast_const().  - When creating RefPtr directly, instead of using create() methods,     use Glib::make_refptr_for_instance() so the std::shared_ptr has the     necessary Deleter.  (Murray Cumming) Bug #755037 * Remove Glib::WeakRef. Use std::weak_ref instead.  (Murray Cumming) Bug #755037 * Object: Use g_object_new_with_properties() instead of (deprecated)  g_object_newv() and (deprecated) GParameter.  (Murray Cumming) * IOChannel: Avoid creating a RefPtr to this.  (Murray Cumming) Bug #755037 * SignalProxy:  connect(): Signals with non-void return values now have no default value  for the "after" parameter, forcing application developers to think about  whether they should connect before or after already-connected signal  handlers, and default signal handlers. This is awkward but necessary.  Just provide "true" to get the previous behaviour, or use connect_notify().  connect_notify(): Signals with void return values have no connect_notify(),  because it is not useful with those signals.  (Kjell Ahlstedt) Bug #126213. Gio: * Use C++11 enum classes instead of old-style enums, and put many enums  inside relevant class declarations:  - Gio::Drive: Move enums into class.  - Gio::TlsDatabase: Move enums into class.  - Gio::UnixSocketAddressType is now Gio::UnixSocketAddress::Type.  - Gio::Mount: Move enums into class.  - Gio::TlsPasswordFlags is now Gio::TlsPassword::Flags.  - Gio::IOStreamSpliceFlags is now Gio::IOStream::SpliceFlags.  - Gio::SettingsBindFlags is now Gio::Settings::BindFlags.  - Gio::ResolverRecordType is now Gio::Resolver::RecordType.  - Gio::Socket: Move enums into class.  - Gio::File: Move some flags enums into the class.  - Gio::OutputStreamSpliceFlags is now Gio::OuputStream::SpliceFlags.  - Gio::CredentialsType is now Gio::Credentials::Type.  - Gio::NotificationPriority is now Gio::Notification::Priority.  - Gio::FileMonitorEvent is now Gio::FileMonitor::Event.  - Gio::FileAttributeInfoFlags is now Gio::FileAttributeInfo::Flags.  - Gio::EmblemOrigin is now Gio::Emblem::Origin.  - Gio::Converter: Put enums inside class.  - Gio::ConverterFlags is now Gio::Converter::Flags.  - Gio::ConverterResult is now Gio::Converter::Result.  - Gio::AppInfoCreateFlags is now Gio::AppInfo::CreateFlags.  - Gio::ApplicationFlags is now Gio::Application::Flags.  (Murray Cumming, Kjell Ahlstedt) * Remove duplicate ErrorEnum declaration.  (Kjell Ahlstedt) * ConstructParams:  - Remove (hopefully really unnecessary) copy constructor.  - C++11: =delete the operator=, instead of making it private.  (Murray Cumming) * Value:  - Remove the CType alias, which should be unnecessary.  - value_custom: Replace a template parameter with C++11 type traits.  - Value: Only use this specialization if T has get_base_type().  (Murray Cumming) Bug #755037 * Variant:  - operator bool(): Simplify to avoid clang++ warnings.  - C++11: Variant: Replace throw(std::bad_cast) with noexcept(false).     See https://bugzilla.redhat.com/show_bug.cgi?id=1438766  (Murray Cumming) * Socket: Avoid creating a RefPtr to this.  (Murray Cumming) Bug #755037 Gio:DBus: * Use C++11 enum classes instead of old-style enums, and put many enums  inside relevant class declarations:  - Gio::DBus::InterfaceSkeletonFlags is now Gio::DBus::InterfaceSkeleton::Flags.  - Gio::DBus::ServerFlags is now Gio::DBus::Server::Flags.  (Murray Cumming, Kjell Ahlstedt) gmmproc: * _WRAP_ENUM(): Generate C++ enum classes instead of enums, and let the enums  be inside class declarations.  (Kjell Ahlstedt) Bug #86864 Build * Windows:  Visual Studio builds: Update ABI version  (Chun-wei Fan) -- Murray Cumming murrayc ( -at -) murrayc.com www.murrayc.com _______________________________________________
  14. news

    Geoclue 2.4.7

    Hi, Here is another release of Geoclue. Changes since 2.4.6: - Fix a potential crash. - More verbose warning on invalid accuracy from NMEA source. Release tarball: http://www.freedesktop.org/software/geoclue/releases/2.4/geoclue-2.4.7.tar.xz sha256sum: d17b96bb5799a84723385ea5704235565e9c3dedd2b7afac475a06e550ae0ea6 --------------------------------------- Geoclue is a D-Bus service that provides location information. The primary goal of the Geoclue project is to make creating location-aware applications as simple as possible, while the secondary goal is to ensure that no application can access location information without explicit permission from user. Geoclue is Free Software, licensed under GNU GPLv2+. It is developed for Linux. The aim of project is to utilize all possible sources of geolocation to best find user's location: * WiFi-based geolocation (accuracy: in meters) * GPS(A) receivers (accuracy: in centimeters) * GPS of other devices on the local network, e.g smartphones (accuracy: in centimeters) * 3G modems (accuracy: in kilometers, unless modem has GPS) * GeoIP (accuracy: city-level) Geoclue used to also do (reverse-)geocoding but that functionality has been dropped in favor of geocode-glib library. D-Bus API documentation: http://www.freedesktop.org/software/geoclue/docs/ Library API documentation: http://www.freedesktop.org/software/geoclue/docs/libgeoclue/ -- Regards, Zeeshan Ali _______________________________________________
  15. *** gtkmm gtkmm 3.91 wraps GTK+ 3.91. It will become gtkmm 4.0, wrapping GTK+ 4.0. It is a version of the gtkmm-4.0 API. It installs in parallel with gtkmm-3.0. gtkmm stays in-sync with gtk+ by (mostly) following the official GNOME release schedule: http://www.gnome.org/start/unstable/ http://www.gtkmm.org *** Changes 3.91.0 (unstable): Distro packagers should probably not package this yet. Gdk: * Improve Gdk::Event, creating a class hierarchy.  (Mark Vender, Kjell Ahlstedt) Bug #135978 * Cursor: Change CursorType to Cursor::Type.  (Murray Cumming) * Device: Change DeviceType to Cursor::Type.  (Murray Cumming) * Pixbuf:  - Remove AlphaMode enum.  - Change PixbufRotation to Pixbuf::Rotation.  (Murray Cumming) * Seat: Change SeatCapabilities to Seat::Capabilities.  (Murray Cumming) * Visual: Change VisualType to Visual::Type.  (Murray Cumming) * Window:  - Change WindowHints to Window::Hints.  - Change WindowTypeHint to Window::TypeHint.  - Change WindowType to Window::Type.  - Change WindowState to Window::State.  (Murray Cumming) Gtk: * Assistant: Change AssistantPageType to Assistant::PageType.  (Murray Cumming) * Box: pack_start/pack_end(): Reimplement with new GTK+ API.  (GtkWidget halign and hexpand properties.  The gtk_box_pack_start() and gtk_box_pack_end() functions no longer  have the expand and fill arguments.  We might remove these parameters later too.  Be careful that the default behaviour of pack_start/pack_end() has now  changed.  - Make PackOptions an enum class, for stricter type checking.  (Murray Cumming) * Builder::get_widget_derived(): Make this static.  To avoid the need to create a shared_ptr to this.  (Murray Cumming) Bug #755037 * ButtonBox: Remove apparently-useless BUTTONBOX_DEFAULT_SPACING.  (Murray Cumming) * Application: Change ApplicationInhibitFlags to Application::InhibitFlags.  (Murray Cumming) * Calendar: Change CalendarDisplayOptions to Calendar::Display::Options.  (Murray Cumming) * CellRendererAccel: Change CellRendererAccelMode to CellRendererAccel::Mode.  (Murray Cumming) * CssSection: Change CssSectionType to CssSection::Typewq.  (Murray Cumming) * Container:  - forall_vfunc(): Remove include_internals parameter.  - Remove set_focus_child(), get_focus_child(), etc.  (Murray Cumming) * Entry: Change EntryIconPosition to Entry::IconPosition.  (Murray Cumming) * FileFilter: Change FileFilterFlags to FileFilter::Flags.  (Murray Cumming) * FileChooser:  - Change FileChooserConfirmation to FileChooser::Confirmation.  - Change FileChooserAction to FileChooser::Action.  (Murray Cumming) * IconView: change IconViewDropPosition to IconView::DropPosition.  (Murray Cumming) * Image: Change ImageType to Image::Type.  (Murray Cumming) * Label: Remove get/set_angle() and property.  (Murray Cumming) * LevelBar: Change LevelBarMode to LevelBar::Mode.  (Murray Cumming) * Notebook: Remove NotebookTab enum.  (Murray Cumming) * Popover: Change PopoverConstraint to Popover::Constraint.  (Murray Cumming) * PrintOperation:  - Change PrintOperationAction to PrintOperation::Action.  - Change PrintOperationResult to PrintOperation::Result.  (Murray Cumming) * Range: Derive from (and implement) Orientable.  (Muray Cumming) Bug #781655 (Daniel Boles) * RecentFilter: Change RecentFilterFlags to RecentFilter::Flags.  (Murray Cumming) * Scrollable: Change ScrollablePolicy to Scrollable::Policy.  (Murray Cumming) * ShortcutsShortcut: Derive directly from Widget.  (Kjell Ahlstedt) * SizeGroup: Rename SizeGroupMode enum to SizeGroup::Mode.  (Murray Cumming) * SpinButton:  - Change SpinButtonUpdatePolicy to SpinButton::UpdatePolicy.  - Move INPUT_ERROR constant into class.  (Murray Cumming) * TextConstIter (TextModel::const_iterator): Add a default constructor.  (Murray Cumming) * TextMark: Avoid creating a RefPtr to this.  By adding a private TextBuffer::get_iter_at_mark()  (Murray Cumming) Bug #755037#c21 * TreeModel: Change TreeModelFlags to TreeModel::Flags.  (Murray Cumming) * TreeView:  - Change TreeViewGridLines to GridLines.  - Change TreeViewDropPosition to TreeView::DropPosition.  (Murray Cumming) * TreeViewColumn: Change TreeViewColumnSizing to TreeViewColumn::Sizing.  (Murray Cumming) * Widget:  - Remove get_preferred_width() etc.  (Kjell Ahlstedt)  - Remove get/set_center_widget().  (Murray Cumming) * Window:  - Remove get/set_hide_titlebar_when_maximized().  - Remove has_toplevel_focus() and property.  (Murray Cumming) Documentation: * Gtk::CellLayout: Improve docs of get_first_cell() funcs.  (Daniel Boles) * Gtk::TreeModel: Improve docs of foreach*() functions.  (Daniel Boles) * Gdk, Gtk: Update documentation of in-class enums.  (Kjell Ahlstedt) * Demos:  - Fix make check after changes in Glib::SignalProxy::connect()  (Kjell Ahlstedt) Bug 126213  - Adapt to changed Box::pack_start/pack_end() behaviour.  For instance: Specify EXPAND_WIDGET, where we previously  used the default value.  (Murray Cumming) * Builder demo: Remove "expand" child property from the .ui file  Because it has been removed from GtkBox. Expand the ScrolledWindow.  (Kjell Ahlstedt) Build: * Adapt to cairomm and glibmm enum changes.  (Murray Cumming) * Adapt dynamic casts for RefPtr as std::shared_ptr.  (Murray Cumming) * Visual Studio builds: Update glibmm ABI version.  (Chun-wei Fan) -- Murray Cumming murrayc ( -at -) murrayc.com www.murrayc.com _______________________________________________
  16. ** TECHSPOT ------------------------------------------------------------ ** Motorola Moto G5 and G5 Plus Review ------------------------------------------------------------ ** http://www.techspot.com/review/1402-motorola-moto-g5/ ------------------------------------------------------------ I've recommended every iteration of the Moto G since it first launched four years ago. Motorola consistently nails it, producing excellent budget smartphones year after year. Most new Moto G phones are only minor upgrades on their predecessor, but with little improvements here and there, and an affordable price point, the Moto G line is hard to pass up. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  17. Title: Nitro Concepts E220 EVO Gaming Chair Review ( -at -) NikKTech Description: The E220 EVO Gaming Chair by Nitro Concepts is a good option for gamers on a tight budget out in the market for a great looking medium sized model (available in 7 color combinations) with good comfort levels. Article Link: https://www.nikktech.com/main/articles/peripherals/gaming-chairs/7823-nitro- concepts-e220-evo-gaming-chair-review Image Link: http://www.nikktech.com/main/images/pics/reviews/nitro_concepts/e220_evo/nit ro_concepts_e220_evob.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  18. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: AMD Ryzen 5 1400 3.2 GHz Link: https://www.techpowerup.com/reviews/AMD/Ryzen_5_1400 Brief: The most affordable Ryzen part at the moment, the $170 Ryzen 5 1400 quad-core processor is endowed with features you find only on Intel processors twice its price. We're interested to see where that leaves competing Intel parts within its price-range.
  19. Guru3D Rig of the Month - May 2017 The May edition of the Guru3D Rig of the April 2017 is here. The turn goes to Mike Norbert who built his own customized PC. The end-result is a nice looking rig of the month April 2017 You can read the ROTM right here <http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-may-2017,1.html> . URL: http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-may-2017,1.html --
  20. -------- HYPERX FURY S MOUSING SURFACE REVIEW ( -at -) APH NETWORKS ----------------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: HyperX Fury S Mousing Surface Review ( -at -) APH Networks * Description: The Kingston HyperX Fury S is a down-to-earth mousing surface, meeting my expectations in both build and performance. * Link: http://aphnetworks.com/reviews/hyperx-fury-s * Image: http://aphnetworks.com/review/kingston-hyperx-fury-s/006.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  21. What is GNOME Commander? ------------------------ GNOME Commander is a "two-pane" graphical file manager for the GNOME desktop environment. GNOME Commander aims to fulfill the demands of more advanced users who like to focus on file management, their work through special applications and running smart commands. Bug fixes: ---------- * Fixed problem bgo#779574 (Other favourite apps settings not saved) * Fixed problem bgo#619112 (Internal-viewer by default display incorrect code pages) New or updated translations: ---------------------------- * cs (Marek Černocký) * de (Mario Blättermann) * eu (Inaki Larranaga Murgoitio) * hu (Balázs Úr) * id (Andika Triwidada) * pl (Piotr Drąg) * pt_BR (Rafael Fontenelle) * sr (ÃœøрþÑÂûðò ÃÂøúþûøћ) * sr ( -at -) latin (ÃœøрþÑÂûðò ÃÂøúþûøћ) * sv (Anders Jonsson) New or updated docs: -------------------- * cs (Marek Černocký) * de (Mario Blättermann) * es (Daniel Mustieles) The new release can be downloaded from: https://download.gnome.org/sources/gnome-commander/1.6/gnome-commander-1.6.4.tar.xz Best wishes Uwe _______________________________________________
  22. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : libical Version : 0.48-2+deb7u1 CVE ID : CVE-2016-5824 CVE-2016-9584 Debian Bug : #860451, #852034 It was discovered that there was a use-after-free vulnerability in the libical iCalendar library. Remote attackers could cause a denial of service and possibly read heap memory via a specially crafted .ICS file. For Debian 7 "Wheezy", this issue has been fixed in libical version 0.48-2+deb7u1. We recommend that you upgrade your libical packages. Regards, - -- ,''`. : :' : Chris Lamb `. `'` lamby ( -at -) debian.org / chris-lamb.co.uk `- -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlkrEBcACgkQHpU+J9Qx HliKJRAAhQcuNbRyrCm87kvaccY2Yfh6/ABnPLkfI2zcowpOZ+i8fLpEsosdqDVd dK8x6HOT6kXKnfmcXFV/3XC3btiOVRJC9QpH6S+XrPxhTq4g4BAsG8/pLe64yCo+ DtN7qEErZeVudYN5WBddT1qMKAnyad0x+ql1HD3vOI4Yw1+SW5ffL+uoYsfUP2mV psESqThICO97ZtyzExYVJ3T4NgAzd9IB8PRe9BETA8SiOhtgkb4flJDu6Yl6+p0m U0uqXNG1CalR19Yn7Wvpopfu/DWHXURPHUbvykkd3kJ148c/qW0yjl/t0c28kf+V UZbgiM8BePbzDiiVvAiZbGzPU3pDnynrLvmlBPyQAuLsHBXpI51AnNehCafl7cXd 8YUxfDVC8r+nyXhZrJZ24mkjDwCb/Pk4051X8uX+qIAJdYlwa6LwdtNKWDZctTes +nysfye3/cBxMgu9Qi8eASsAJIzjoZeKd6CAA+VFC/KMsQ0DuD2zjNvnR5f1fA5d OsrZ6ZgNfc5XrL3XWYWsVeOefijAKSkEOZNgINbdRq1iOzevAReLmSUEccn+Kqx9 IUX/IbMwZbDBKUXU6I/GGQ1xlYmKm3zrVbh/gdjjJUVmEZiDZlfZ0/rtvyHNUhgo r34Ft4OJ5b8hqXNvrWN9Iz1q7b9OLsO5OelpyVryeDw2xM1TxtI= =tx1k -----END PGP SIGNATURE-----
  23. openSUSE Security Update: Security update for java-1_7_0-openjdk ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1429-1 Rating: important References: #1034849 Cross-References: CVE-2017-3289 CVE-2017-3509 CVE-2017-3511 CVE-2017-3512 CVE-2017-3514 CVE-2017-3526 CVE-2017-3533 CVE-2017-3539 CVE-2017-3544 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This update for java-1_7_0-openjdk fixes the following issues: - Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849) * Security fixes - S8163520, CVE-2017-3509: Reuse cache entries - S8163528, CVE-2017-3511: Better library loading - S8165626, CVE-2017-3512: Improved window framing - S8167110, CVE-2017-3514: Windows peering issue - S8169011, CVE-2017-3526: Resizing XML parse trees - S8170222, CVE-2017-3533: Better transfers of files - S8171121, CVE-2017-3539: Enhancing jar checking - S8171533, CVE-2017-3544: Better email transfer - S8172299: Improve class processing * New features - PR3347: jstack.stp should support AArch64 * Import of OpenJDK 7 u141 build 0 - S4717864: setFont() does not update Fonts of Menus already on screen - S6474807: (smartcardio) CardTerminal.connect() throws CardException instead of CardNotPresentException - S6518907: cleanup IA64 specific code in Hotspot - S6869327: Add new C2 flag to keep safepoints in counted loops. - S7112912: Message "Error occurred during initialization of VM" on boxes with lots of RAM - S7124213: [macosx] pack() does ignore size of a component; doesn't on the other platforms - S7124219: [macosx] Unable to draw images to fullscreen - S7124552: [macosx] NullPointerException in getBufferStrategy() - S7148275: [macosx] setIconImages() not working correctly (distorted icon when minimized) - S7154841: [macosx] Popups appear behind taskbar - S7155957: closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java hangs on win 64 bit with jdk8 - S7160627: [macosx] TextArea has wrong initial size - S7167293: FtpURLConnection connection leak on FileNotFoundException - S7168851: [macosx] Netbeans crashes in CImage.nativeCreateNSImageFromArray - S7197203: sun/misc/URLClassPath/ClassnameCharTest.sh failed, compile error - S8005255: [macosx] Cleanup warnings in sun.lwawt - S8006088: Incompatible heap size flags accepted by VM - S8007295: Reduce number of warnings in awt classes - S8010722: assert: failed: heap size is too big for compressed oops - S8011059: [macosx] Support automatic ( -at -) 2x images loading on Mac OS X - S8014058: Regression tests for 8006088 - S8014489: tests/gc/arguments/Test(Serial|CMS|Parallel|G1)HeapSizeFlags jtreg tests invoke wrong class - S8016302: Change type of the number of GC workers to unsigned int (2) - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does not compile. - S8024669: Native OOME when allocating after changes to maximum heap supporting Coops sizing on sparcv9 - S8024926: [macosx] AquaIcon HiDPI support - S8025974: l10n for policytool - S8027025: [macosx] getLocationOnScreen returns 0 if parent invisible - S8028212: Custom cursor HiDPI support - S8028471: PPC64 (part 215): opto: Extend ImplicitNullCheck optimization. - S8031573: [macosx] Checkmarks of JCheckBoxMenuItems aren't rendered in high resolution on Retina - S8033534: [macosx] Get MultiResolution image from native system - S8033786: White flashing when opening Dialogs and Menus using Nimbus with dark background - S8035568: [macosx] Cursor management unification - S8041734: JFrame in full screen mode leaves empty workspace after close - S8059803: Update use of GetVersionEx to get correct Windows version in hs_err files - S8066504: GetVersionEx in java.base/windows/native/libjava/java_props_md.c might not get correct Windows version 0 - S8079595: Resizing dialog which is JWindow parent makes JVM crash - S8080729: [macosx] java 7 and 8 JDialogs on multiscreen jump to parent frame on focus - S8130769: The new menu can't be shown on the menubar after clicking the "Add" button. - S8133357: 8u65 l10n resource file translation update - S8146602: jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test fails with NullPointerException - S8147842: IME Composition Window is displayed at incorrect location - S8147910: Cache initial active_processor_count - S8150490: Update OS detection code to recognize Windows Server 2016 - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is enabled - S8161195: Regression: closed/javax/swing/text/FlowView/LayoutTest.java - S8161993: G1 crashes if active_processor_count changes during startup - S8162603: Unrecognized VM option 'UseCountedLoopSafepoints' - S8162876: [TEST_BUG] sun/net/www/protocol/http/HttpInputStream.java fails intermittently - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java failed with "Error while cleaning up threads after test" - S8167179: Make XSL generated namespace prefixes local to transformation process - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections - S8169589: [macosx] Activating a JDialog puts to back another dialog - S8170307: Stack size option -Xss is ignored - S8170316: (tz) Support tzdata2016j - S8170814: Reuse cache entries (part II) - S8171388: Update JNDI Thread contexts - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with error: The bitwise mask Frame.ICONIFIED is not setwhen the frame is in ICONIFIED state - S8171952: [macosx] AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog test fails as DummyButton on Dialog did not gain focus when clicked. - S8173931: 8u131 L10n resource file update - S8174844: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8175087: [bsd] Fix build after "8024900: PPC64: Enable new build on AIX (jdk part)" - S8175163: [bsd] Fix build after "8005629: javac warnings compiling java.awt.EventDispatchThread..." - S8176044: (tz) Support tzdata2017a * Import of OpenJDK 7 u141 build 1 - S8043723: max_heap_for_compressed_oops() declared with size_t, but defined with uintx * Import of OpenJDK 7 u141 build 2 - S8011123: serialVersionUID of java.awt.dnd.InvalidDnDOperationException changed in JDK8-b82 * Backports - S6515172, PR3362: Runtime.availableProcessors() ignores Linux taskset command - S8022284, PR3209: Hide internal data structure in PhaseCFG - S8023003, PR3209: Cleanup the public interface to PhaseCFG - S8023691, PR3209: Create interface for nodes in class Block - S8023988, PR3209: Move local scheduling of nodes to the CFG creation and code motion phase (PhaseCFG) - S8043780, PR3369: Use open(O_CLOEXEC) instead of fcntl(FD_CLOEXEC) - S8157306, PR3209: Random infrequent null pointer exceptions in javac - S8173783, PR3329: IllegalArgumentException: jdk.tls.namedGroups - S8173941, PR3330: SA does not work if executable is DSO - S8174729, PR3361: Race Condition in java.lang.reflect.WeakCache * Bug fixes - PR3349: Architectures unsupported by SystemTap tapsets throw a parse error - PR3370: Disable ARM32 JIT by default in jdk_generic_profile.sh - PR3379: Perl should be mandatory - PR3390: javac.in and javah.in should use ( -at -) PERL ( -at -) rather than a hardcoded path * CACAO - PR2732: Raise javadoc memory limits for CACAO again! * AArch64 port - S8177661, PR3367: Correct ad rule output register types from iRegX to iRegXNoSp - Get ecj.jar path from gcj, use the gcc variant that provides Java to build C code to make sure jni.h is available. - S8167104, CVE-2017-3289: Additional class construction - S6253144: Long narrowing conversion should describe the - S6328537: Improve javadocs for Socket class by adding - S6978886: javadoc shows stacktrace after print error - S6995421: Eliminate the static dependency to - S7027045: (doc) java/awt/Window.java has several typos in - S7054969: Null-check-in-finally pattern in java/security - S7072353: JNDI libraries do not build with javac -Xlint:all - S7092447: Clarify the default locale used in each locale - S7103570: AtomicIntegerFieldUpdater does not work when - S7187144: JavaDoc for ScriptEngineFactory.getProgram() - S8000418: javadoc should used a standard "generated by - S8000666: javadoc should write directly to Writer instead of - S8000970: break out auxiliary classes that will prevent - S8001669: javadoc internal DocletAbortException should set - S8011402: Move blacklisting certificate logic from hard code - S8011547: Update XML Signature implementation to Apache - S8012288: XML DSig API allows wrong tag names and extra - S8017325: Cleanup of the javadoc tag in - S8017326: Cleanup of the javadoc tag in - S8019772: Fix doclint issues in javax.crypto and - S8020688: Broken links in documentation at - S8021108: Clean up doclint warnings and errors in java.text - S8022120: JCK test api/javax_xml/crypto/dsig/TransformService/index_ParamMethods - S8025409: Fix javadoc comments errors and warning reported by - S8026021: more fix of javadoc errors and warnings reported by - S8037099: [macosx] Remove all references to GC from native - S8038184: XMLSignature throws StringIndexOutOfBound[censored]ception - S8038349: Signing XML with DSA throws Exception when key is - S8049244: XML Signature performance issue caused by - S8050893: (smartcardio) Invert reset argument in tests in - S8059212: Modify sun/security/smartcardio manual regression - S8068279: (typo in the spec) - S8068491: Update the protocol for references of - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs - S8076369: Introduce the jdk.tls.client.protocols system - S8139565: Restrict certificates with DSA keys less than 1024 - S8140422: Add mechanism to allow non default root CAs to be - S8140587: Atomic*FieldUpdaters should use Class.isInstance - S8149029: Secure validation of XML based digital signature - S8151893: Add security property to configure XML Signature - S8161228: URL objects with custom protocol handlers have port - S8163304: jarsigner -verbose -verify should print the - S8164908: ReflectionFactory support for IIOP and custom - S8165230: RMIConnection addNotificationListeners failing with - S8166393: disabledAlgorithms property should not be strictly - S8166591: [macos 10.12] Trackpad scrolling of text on OS X - S8166739: Improve extensibility of ObjectInputFilter - S8167356: Follow up fix for jdk8 backport of 8164143. Changes - S8167459: Add debug output for indicating if a chosen - S8168861: AnchorCertificates uses hardcoded password for - S8169688: Backout (remove) MD5 from - S8169911: Enhanced tests for jarsigner -verbose -verify after - S8170131: Certificates not being blocked by - S8173854: [TEST] Update DHEKeySizing test case following - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on - S8000351, PR3316, RH1390708: Tenuring threshold should be - S8153711, PR3315, RH1284948: [REDO] JDWP: Memory Leak: - S8170888, PR3316, RH1390708: [linux] Experimental support for - PR3318: Replace 'infinality' with 'improved font rendering' - PR3324: Fix NSS_LIBDIR substitution in - S8165673, PR3320: AArch64: Fix JNI floating point argument + S6604109, PR3162: - Add -fno-delete-null-pointer-checks -fno-lifetime-dse to try to directory to be specified versions of IcedTea This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-629=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): java-1_7_0-openjdk-1.7.0.141-42.3.1 java-1_7_0-openjdk-accessibility-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-debugsource-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-devel-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-devel-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-headless-1.7.0.141-42.3.1 java-1_7_0-openjdk-bootstrap-headless-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-debugsource-1.7.0.141-42.3.1 java-1_7_0-openjdk-demo-1.7.0.141-42.3.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-devel-1.7.0.141-42.3.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-headless-1.7.0.141-42.3.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.141-42.3.1 java-1_7_0-openjdk-src-1.7.0.141-42.3.1 - openSUSE Leap 42.2 (noarch): java-1_7_0-openjdk-javadoc-1.7.0.141-42.3.1 References: https://www.suse.com/security/cve/CVE-2017-3289.html https://www.suse.com/security/cve/CVE-2017-3509.html https://www.suse.com/security/cve/CVE-2017-3511.html https://www.suse.com/security/cve/CVE-2017-3512.html https://www.suse.com/security/cve/CVE-2017-3514.html https://www.suse.com/security/cve/CVE-2017-3526.html https://www.suse.com/security/cve/CVE-2017-3533.html https://www.suse.com/security/cve/CVE-2017-3539.html https://www.suse.com/security/cve/CVE-2017-3544.html https://bugzilla.suse.com/1034849 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  24. MSI GTX 1080 Gaming X Plus 8GB Review ------------------------------------------------------------ http://mailchi.mp/kitguru/msi-gtx-1080-gaming-x-plus-8gb-review?e=872093acb5 http://www.kitguru.net MSI GTX 1080 Gaming X Plus 8GB Review The GTX 1080 has been out since mid-2016 and in the wake of a number of high-end releases, including the GTX 1080 Ti and the Titan Xp, Nvidia has refreshed the GTX 1080 to keep it competitive and in the minds of consumers. MSI’s Gaming X Plus is the first of the refreshed GTX 1080s KitGuru has had a chance to assess. Read the review here: https://www.kitguru.net/components/graphic-cards/ryan-martin/msi-gtx-1080-gaming-x-plus-8gb-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=205e3d63ad&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  25. Title: G.SKILL RIPJAWS KM570 MX Mechanical Gaming Keyboard Review ( -at -) NikKTech Description: Developed for gamers not looking to spend much on a mechanical gaming keyboard the latest RIPJAWS KM570 MX model by G.SKILL has actually very little to be jealous from its more expensive adversaries. Article Link: https://www.nikktech.com/main/articles/peripherals/keyboards/7822-g-skill-ri pjaws-km570-mx-mechanical-gaming-keyboard-review Image Link: http://www.nikktech.com/main/images/pics/reviews/g_skill/km570_mx/gskill_km5 70_mxa.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
×