news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
News: Intel Optane SSD DC P4800X opens new frontiers in datacenter storage
news posted a topic in Upcoming News
Intel's potentially revolutionary 3D Xpoint memory technology arrives today on board the Optane SSD DC P4800X. We dive in to see how this first Optane product has the potential to reshape the computing landscape. Read more: http://techreport.com/review/31608/intel-optane-ssd-dc-p4800x-opens-new-frontiers-in-datacenter-storage -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser. -
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=5382ed4170&e=0c004f9c13) Today we have some news regarding the first product that Intel will ship leveraging 3D Xpoint memory technology, the new Intel Optane SSD DC P4800X. The SSD DC P4800X resembles some of Intel’s previous enterprise storage products, but most assuredly, this product is virtually all new, from its controller to its memory storage media... Intel Optane SSD DC P4800X Enterprise Storage Featuring 3D Xpoint Memory Technology Debuts (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=a54d0990ff&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=c5f4873be2&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=e49cba7035&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=18e53956b5&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=6f4c325f92&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=da95b064cb&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=ab9737e2c4&e=0c004f9c13 ============================================================
-
Package : sitesummary Version : 0.1.8+deb7u2 Debian Bug : 852623 The fix for CVE-2016-8743 in apache2 2.2.22-13+deb7u8 (DLA-841-1) caused #852623 in sitesummary, breaking the sitesummary-upload functionality. To address this sitesummary-upload needs to be changed to send CRLF (\r\n) line endings to be compliant with the apache security fixes for HTTP requests. For Debian 7 "Wheezy", these problems have been fixed in version 0.1.8+deb7u2. We recommend that you upgrade your sitesummary packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -- cheers, Holger
-
Cooler Master MasterAir Maker 8 Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=21a8beb916&e=872093acb5 http://www.kitguru.net Cooler Master MasterAir Maker 8 Review Cooler Master have earned a strong reputation in the CPU cooling sector, and not just because of the Hyper 212 EVO. Today we are looking at a monster, double-140mm fan behemoth – the MasterAir Maker 8. It uses 3DVC (3D Vapour Chamber) technology and utilises a whopping 8 heatpipes. Is this the pinnacle of high-end air cooling? Read the review here: http://www.kitguru.net/components/cooling/dominic-moass/cooler-master-masterair-maker-8-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=21a8beb916&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0740-1 Rating: important References: #1028848 Cross-References: CVE-2017-5029 CVE-2017-5030 CVE-2017-5031 CVE-2017-5032 CVE-2017-5033 CVE-2017-5034 CVE-2017-5035 CVE-2017-5036 CVE-2017-5037 CVE-2017-5038 CVE-2017-5039 CVE-2017-5040 CVE-2017-5041 CVE-2017-5042 CVE-2017-5043 CVE-2017-5044 CVE-2017-5045 CVE-2017-5046 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: Chromium was updated to 57.0.2987.98 to fix security issues and bugs. The following vulnerabilities were fixed (bsc#1028848): - CVE-2017-5030: Memory corruption in V8 - CVE-2017-5031: Use after free in ANGLE - CVE-2017-5032: Out of bounds write in PDFium - CVE-2017-5029: Integer overflow in libxslt - CVE-2017-5034: Use after free in PDFium - CVE-2017-5035: Incorrect security UI in Omnibox - CVE-2017-5036: Use after free in PDFium - CVE-2017-5037: Multiple out of bounds writes in ChunkDemuxer - CVE-2017-5039: Use after free in PDFium - CVE-2017-5040: Information disclosure in V8 - CVE-2017-5041: Address spoofing in Omnibox - CVE-2017-5033: Bypass of Content Security Policy in Blink - CVE-2017-5042: Incorrect handling of cookies in Cast - CVE-2017-5038: Use after free in GuestView - CVE-2017-5043: Use after free in GuestView - CVE-2017-5044: Heap overflow in Skia - CVE-2017-5045: Information disclosure in XSS Auditor - CVE-2017-5046: Information disclosure in Blink The following non-security changes are included: - Address broken rendering on non-intel cards Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2017-353=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-57.0.2987.98-8.1 chromedriver-debuginfo-57.0.2987.98-8.1 chromium-57.0.2987.98-8.1 chromium-debuginfo-57.0.2987.98-8.1 chromium-debugsource-57.0.2987.98-8.1 References: https://www.suse.com/security/cve/CVE-2017-5029.html https://www.suse.com/security/cve/CVE-2017-5030.html https://www.suse.com/security/cve/CVE-2017-5031.html https://www.suse.com/security/cve/CVE-2017-5032.html https://www.suse.com/security/cve/CVE-2017-5033.html https://www.suse.com/security/cve/CVE-2017-5034.html https://www.suse.com/security/cve/CVE-2017-5035.html https://www.suse.com/security/cve/CVE-2017-5036.html https://www.suse.com/security/cve/CVE-2017-5037.html https://www.suse.com/security/cve/CVE-2017-5038.html https://www.suse.com/security/cve/CVE-2017-5039.html https://www.suse.com/security/cve/CVE-2017-5040.html https://www.suse.com/security/cve/CVE-2017-5041.html https://www.suse.com/security/cve/CVE-2017-5042.html https://www.suse.com/security/cve/CVE-2017-5043.html https://www.suse.com/security/cve/CVE-2017-5044.html https://www.suse.com/security/cve/CVE-2017-5045.html https://www.suse.com/security/cve/CVE-2017-5046.html https://bugzilla.suse.com/1028848 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2017:0558-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0558.html Issue date: 2017-03-17 CVE Names: CVE-2017-5428 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. Security Fix(es): * A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5428) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Chaitin Security Research Lab via Trend Micro's Zero Day Initiative as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1433202 - CVE-2017-5428 Mozilla: integer overflow in createImageBitmap() (MFSA 2017-08) 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-52.0-5.el7_3.src.rpm x86_64: firefox-52.0-5.el7_3.x86_64.rpm firefox-debuginfo-52.0-5.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-52.0-5.el7_3.i686.rpm firefox-debuginfo-52.0-5.el7_3.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-52.0-5.el7_3.src.rpm aarch64: firefox-52.0-5.el7_3.aarch64.rpm firefox-debuginfo-52.0-5.el7_3.aarch64.rpm ppc64: firefox-52.0-5.el7_3.ppc64.rpm firefox-debuginfo-52.0-5.el7_3.ppc64.rpm ppc64le: firefox-52.0-5.el7_3.ppc64le.rpm firefox-debuginfo-52.0-5.el7_3.ppc64le.rpm s390x: firefox-52.0-5.el7_3.s390x.rpm firefox-debuginfo-52.0-5.el7_3.s390x.rpm x86_64: firefox-52.0-5.el7_3.x86_64.rpm firefox-debuginfo-52.0-5.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-52.0-5.el7_3.ppc.rpm firefox-debuginfo-52.0-5.el7_3.ppc.rpm s390x: firefox-52.0-5.el7_3.s390.rpm firefox-debuginfo-52.0-5.el7_3.s390.rpm x86_64: firefox-52.0-5.el7_3.i686.rpm firefox-debuginfo-52.0-5.el7_3.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-52.0-5.el7_3.src.rpm x86_64: firefox-52.0-5.el7_3.x86_64.rpm firefox-debuginfo-52.0-5.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-52.0-5.el7_3.i686.rpm firefox-debuginfo-52.0-5.el7_3.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5428 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2017-08 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYzGGjXlSAg2UNWIIRAiy9AKCpeaKmIcfQkfh/0cfKBmmf75ZYFACfdNsp /cWFCFUcYQADTjlNKWGSlN0= =pZC8 -----END PGP SIGNATURE----- --
-
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0738-1 Rating: important References: #1028848 Cross-References: CVE-2017-5029 CVE-2017-5030 CVE-2017-5031 CVE-2017-5032 CVE-2017-5033 CVE-2017-5034 CVE-2017-5035 CVE-2017-5036 CVE-2017-5037 CVE-2017-5038 CVE-2017-5039 CVE-2017-5040 CVE-2017-5041 CVE-2017-5042 CVE-2017-5043 CVE-2017-5044 CVE-2017-5045 CVE-2017-5046 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: Chromium was updated to 57.0.2987.98 to fix security issues and bugs. The following vulnerabilities were fixed (bsc#1028848): - CVE-2017-5030: Memory corruption in V8 - CVE-2017-5031: Use after free in ANGLE - CVE-2017-5032: Out of bounds write in PDFium - CVE-2017-5029: Integer overflow in libxslt - CVE-2017-5034: Use after free in PDFium - CVE-2017-5035: Incorrect security UI in Omnibox - CVE-2017-5036: Use after free in PDFium - CVE-2017-5037: Multiple out of bounds writes in ChunkDemuxer - CVE-2017-5039: Use after free in PDFium - CVE-2017-5040: Information disclosure in V8 - CVE-2017-5041: Address spoofing in Omnibox - CVE-2017-5033: Bypass of Content Security Policy in Blink - CVE-2017-5042: Incorrect handling of cookies in Cast - CVE-2017-5038: Use after free in GuestView - CVE-2017-5043: Use after free in GuestView - CVE-2017-5044: Heap overflow in Skia - CVE-2017-5045: Information disclosure in XSS Auditor - CVE-2017-5046: Information disclosure in Blink The following non-security changes are included: - Address broken rendering on non-intel cards Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-353=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-353=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (x86_64): chromedriver-57.0.2987.98-105.2 chromedriver-debuginfo-57.0.2987.98-105.2 chromium-57.0.2987.98-105.2 chromium-debuginfo-57.0.2987.98-105.2 chromium-debugsource-57.0.2987.98-105.2 - openSUSE Leap 42.1 (x86_64): chromedriver-57.0.2987.98-105.2 chromedriver-debuginfo-57.0.2987.98-105.2 chromium-57.0.2987.98-105.2 chromium-debuginfo-57.0.2987.98-105.2 chromium-debugsource-57.0.2987.98-105.2 References: https://www.suse.com/security/cve/CVE-2017-5029.html https://www.suse.com/security/cve/CVE-2017-5030.html https://www.suse.com/security/cve/CVE-2017-5031.html https://www.suse.com/security/cve/CVE-2017-5032.html https://www.suse.com/security/cve/CVE-2017-5033.html https://www.suse.com/security/cve/CVE-2017-5034.html https://www.suse.com/security/cve/CVE-2017-5035.html https://www.suse.com/security/cve/CVE-2017-5036.html https://www.suse.com/security/cve/CVE-2017-5037.html https://www.suse.com/security/cve/CVE-2017-5038.html https://www.suse.com/security/cve/CVE-2017-5039.html https://www.suse.com/security/cve/CVE-2017-5040.html https://www.suse.com/security/cve/CVE-2017-5041.html https://www.suse.com/security/cve/CVE-2017-5042.html https://www.suse.com/security/cve/CVE-2017-5043.html https://www.suse.com/security/cve/CVE-2017-5044.html https://www.suse.com/security/cve/CVE-2017-5045.html https://www.suse.com/security/cve/CVE-2017-5046.html https://bugzilla.suse.com/1028848 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
The Wine development release 2.4 is now available. What's new in this release (see below for details): - Built-in implementation of cryptographic hashes. - Mono engine updated with upstream fixes. - More Direct3D command stream work. - Simulated bold and italic in DirectWrite. - Improvements to the XML reader. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/2.x/wine-2.4.tar.xz http://mirrors.ibiblio.org/wine/source/2.x/wine-2.4.tar.xz Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 2.4 (total 32): 10858 BlueByte Game Channel fails to install 14371 cleanup undefined members in vartest 29133 Gómez PEER fails to update 30378 Xuzhou network client crashes at start 33987 Secret Files 3 demo shows only some parts of background in ConfigTool 36599 winhttp/tests/winhttp.c: test_secure_connection() fails under valgrind 36600 valgrind shows a possible leak in winhttp/tests/winhttp.c 36608 valgrind shows a definite leak in xmllite/tests/writer.c 37436 Aliens vs. Predator (2010, Steam) crashes when loading save game 38793 Lotus Smartsuite 3.1 installer reports insufficient disk space 39685 Multiple applications crash on startup, need unimplemented function msvcr120.dll.??0event ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ (Rollcage Redux v1.3.8, ARC client, Playstation Now) 40798 ACDSee Pro 9 (64-bit) needs msvcr120.dll.??0event ( -at -) Concurrency ( -at -) ( -at -) QEAA ( -at -) XZ 40910 The Next BIG Thing can't save the game (needs native xmllite) 41340 Unhandled page fault for Polaris Office Installer 41472 kolotibablo needs ntoskrnl.exe.KeAcquireInStackQueuedSpinLock 41684 unimplemented function uiautomationcore.dll.UiaClientsAreListening called in 32-bit code 41832 Galactic Civ 3 - ships are not visible 41951 Unimplemented function bcrypt.dll.BCryptDuplicateHash prevents DOOM from running 42209 Native Instruments Native Access 1.0.25 (R37) crashes on unimplemented function concrt140.dll.??1_ReentrantBlockingLock ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ 42239 Kontact 5.6 needs api-ms-win-crt-time-l1-1-0.dll._Wcsftime 42450 Unimplemented copy from WINED3D_LOCATION_TEXTURE_RGB to WINED3D_LOCATION_TEXTURE_SRGB for depth/stencil buffers. 42510 InternetOpenUrl does not send query parameters for HTTPS urls 42557 NVIDIA GeForce GT 525M detected as GeForce GTX 470 42559 Adobe Reader DC: No longer installs (Unimplemented function msi.dll.MsiGetComponentPathExW) 42575 Multiple applications need msvcp140.dll.?_LogScheduleTask ( -at -) _TaskEventLogger ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAEX_N ( -at -) Z 42576 Poedit crashes on start on unimplemented function msvcp140.dll.?_Reset ( -at -) _ContextCallback ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) AAEXXZ 42578 WSAStringToAddress fails to parse IP v6 addresses with port number 42586 Adobe Reader DC crashes on startup (needs GetCurrentPackageFullName stub) 42603 Steep (Ubisoft) needs iphlpapi.dll.NotifyUnicastIpAddressChange 42625 Flushing file (int 0x21, ah=0x68) fails with access denied error in 16-bit code (affects QuickBooks 5.0) 42639 Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x7eff5a34) 42641 winetricks ie8_kb2936068 installer fails with error ---------------------------------------------------------------- Changes since 2.3: Akihiro Sagawa (2): iexplore: Follow translation version info to detect native IE. Use CP 1200 (Unicode) for Win32/Win64 version info. Alex Henrie (1): crypt32/tests: Print an error if CertOpenStore fails. Alexandre Julliard (6): gdi32: Add more helper functions for RGB to pixel conversions. gdi32: Fix color conversion when blitting to 1-bpp by matching pixels instead of color values. gdi32: Add support for DIBINDEX colors in 1-bpp blits. gdi32: Map the black and white entries to the DIB color table after dithering. gdi32/tests: Remove workarounds for old Windows versions in the DIB tests. user32/tests: Re-enable a test about window positions. Alistair Leslie-Hughes (10): dplayx: Skip over unknown DataTypes guids in EnumAddressTypes. dplayx/tests: Free IDirectPlayLobby objects. include: Add msstkppg.h. ole32/tests: Stop crash on XP. oledb32: Ignore IRunnableObject in IDataSourceLocator_QueryInterface. dpnet/tests: Stop thread test from failing. odbccp32: Implement SQLInstallDriverEx. oledb32: Support DBTYPE_NUMERIC in IDataConvert GetConversionSize. dpnet/tests: Show that async handlers are per object. dpnet/tests: Add EnumHosts synchronous tests. Andrew Wesie (1): ntdll: Save rdi and rsi in raise_func_trampoline. André Hentschel (3): iphlpapi: Add stub for NotifyUnicastIpAddressChange. iphlpapi: Flesh out NotifyIpInterfaceChange arguments. opencl: Fix some spec file entries. Austin English (4): ntoskrnl.exe: Add KeAcquireInStackQueuedSpinLock stub. ntoskrnl.exe: Add KeWaitForMultipleObjects stub. dhcpcsvc: Add DhcpCApiInitialize and DhcpCApiCleanup stubs. setupapi: Add SetupDiEnumDriverInfoA/W stubs. Bruno Jesus (9): mciavi32: Trace MCIAVI_CreateWindow. mciavi32: Implement MCI_BREAK. winmm: Dispatch MCI_BREAK to the driver. wininet: Forward InternetGetConnectedState to Ex function. include: Add missing connection check flags to wininet.h. iphlpapi/tests: Test route type and protocol in GetIpForwardTable. wininet/test: Improve tests for InternetGetConnectedStateEx. kernel32/tests: Add 64bit number tests for FormatMessage[A|W]. wined3d: Recognize GeForce 940M. Daniel Lehman (2): msvcrt: Add Concurrency::event stubs. msxml3: Don't QI for IPersistStream in internal_parse. Fabian Maurer (1): comctl32/taskdialog: Move TaskDialogIndirect and its tests into own source files. François Gouget (6): ddraw/tests: Spelling fixes in comments and an ok() message. ntdll/tests: A spelling fix in an ok() message. scrobj: Make scriptlet_typelib_CreateInstance() static. schedsvc/tests: Add the current process id to the test summary line. advapi32/tests: Trace the display name if CreateService() unexpectedly succeeds. ddraw: Make ddraw_destroy_swapchain() static. Hans Leidekker (8): webservices: Implement WS_HEAP_PROPERTY_REQUESTED_SIZE and WS_HEAP_PROPERTY_ACTUAL_SIZE. webservices: Protect messages with a critical section. webservices: Protect channels with a critical section. webservices: Protect proxies with a critical section. webservices: Protect writers with a critical section. webservices: Protect errors with a critical section. webservices: Protect heaps with a critical section. webservices: Protect readers with a critical section. Henri Verbeet (30): wined3d: Map buffers in wined3d_device_process_vertices(). wined3d: Explicitly pass d3d_info and gl_info to context_stream_info_from_declaration(). wined3d: Send sub-resource update calls through the command stream. wined3d: Check rectangle alignment in wined3d_surface_blt(). wined3d: Merge wined3d_texture_check_block_align() into wined3d_texture_check_box_dimensions(). usp10/tests: Add a latn shaping test with ligatures. usp10/tests: Add a ligature and diacritic to the syrc shaping test. usp10: Take the script direction into account when applying OpenType features. usp10: Properly determine the glyph run direction when shaping Script_Arabic. usp10/tests: Add shaping tests for fLogicalOrder and fRTL. wined3d: Use wined3d_texture_blt() in surface_upload_from_surface(). wined3d: Validate blit parameters in wined3d_texture_blt(). wined3d: Send blits through the command stream. wined3d: Send sub-resource copy calls through the command stream. wined3d: Send resource copy calls through the command stream. wined3d: Abort on invalid instructions in shader_generate_main(). wined3d: Abort on invalid instructions in shader_get_registers_used(). usp10: Do not fall back to presentation form B if the contextual feature exists in ContextualShape_Arabic(). usp10: Introduce an enumeration for script types. usp10: Use bsearch() to lookup the script range in get_char_script(). wined3d: Validate instruction lengths in shader_sm4_read_instruction() (AFL). wined3d: Don't read modifiers for opcodes with "read_opcode_func" set (AFL). usp10: Use heap_alloc_zero() instead of HeapAlloc() with HEAP_ZERO_MEMORY. usp10: Use heap_alloc() instead of HeapAlloc(). usp10: Use heap_free() instead of HeapFree(). wined3d: Avoid device_invalidate_state() in wined3d_texture_set_lod(). wined3d: Create and destroy surface DCs through the CS. wined3d: Pass a context to blit_shader.blit_surface(). wined3d: Only copy source/destination rectangles when needed in arbfp_blit_surface(). wined3d: Modify resource locations in wined3d_surface_blt() instead of the blitters. Hugh McMaster (1): regedit/tests: Add some line concatenation tests. Huw D. M. Davies (5): wined3d: Zero-initialize count. gdi32/tests: Combine the matching macros into a single function. shell32/tests: Return early if the shell folder creation fails in order to avoid a compiler warning. shell32/tests: Ignore the compressed attribute. krnl386.exe16: Fix mask values. Jacek Caban (15): ntdll: Don't modify LockCount in RtlLeaveCriticalSection if section is not acquired. wininet: Propagate WSAEWOULDBLOCK result from content decoding reads. wininet: Pass blocking mode to HTTPREQ_Read. wininet: Propagate WSAEWOULDBLOCK from read_http_stream. wininet: Rewrite asynchronous read to try to fill whole buffer and not buffer additional data unless requested. wininet: Rewrite InternetReadFileEx for http protocol to make use of non-blocking reads. wininet: Reimplemented InternetQueryDataAvailable on top of async_read. wininet: Merge InternetReadFile and InternetReadFileEx implementations. wininet: Get rid of no longer needed BLOCKING_WAITALL. wininet: Get rid of no longer needed blocking_mode_t. wininet/tests: Added more HTTP read tests. wininet: Always use non-blocking reads in HTTP_ReceiveRequestData. wininet: Get rid of no longer needed get_avail_data from data stream implementations. rpcrt4: Get rid of manual_listen_count and use binary state instead. rpcrt4/tests: Added more server listening tests. Jactry Zeng (1): devenum: Implement IMoniker::GetClassID(). Julian Rüger (3): po: Update German translation. readme: Update German translation. readme: Fix typo in German translation. Józef Kucia (52): wined3d: Bind unordered access views even if they are not used by current shaders. d3d11/tests: Add test for UAV counters. d3d11/tests: Use 256-byte aligned offsets for bufinfo test. wined3d: Implement SM5 bufinfo instruction. d3d11: Print FIXME() about ignoring initial UAV count values only when necessary. d3d11/tests: Accept additional value as expected result in test_tgsm(). oledb32/tests: Do not use pointer to freed memory (Coverity). wined3d: Introduce wined3d_device_get_compute_shader(). d3d11: Implement d3d11_immediate_context_CSGetShader(). wined3d: Introduce wined3d_device_get_cs_cb(). d3d11: Implement d3d11_immediate_context_CSGetConstantBuffers(). wined3d: Introduce wined3d_device_get_cs_resource_view(). d3d11: Implement d3d11_immediate_context_CSGetShaderResources(). wined3d: Introduce wined3d_device_get_cs_sampler(). d3d11: Implement d3d11_immediate_context_CSGetSamplers(). wined3d: Introduce wined3d_device_get_constant_buffer() helper function. wined3d: Introduce wined3d_device_get_shader_resource_view() helper function. wined3d: Introduce wined3d_device_get_sampler() helper function. wined3d: Make sure that "tgsm_count" is not decreased while adding TGSM declarations. wined3d: Fix parsing of SM5 "_opc" flag. wined3d: Add FIXME() messages for unhandled shader bytecode UAV flags. wined3d: Create dummy cube array textures. wined3d: Avoid FIXME() message for unhandled cube map arrays. d3d11/tests: Add test for cube maps. wined3d: Add support for seamless cube map filtering. d3d11: Fix typo in TRACE() message. d3d11/tests: Add test for unbinding shader resource view. wined3d: Recognize SM4 umul opcode. wined3d: Implement SM4 umul instruction. wined3d: Recognize SM4 dcl_index_range opcode. d3d10core/tests: Add test for cube maps. d3d10core/tests: Add test for unbinding shader resource view. d3d11/tests: Fix render target format in test_resinfo_instruction(). d3d10core/tests: Fix render target format in test_resinfo_instruction(). wined3d: Simplify computation of "num_textures_used" in ATI fragment pipeline. wined3d: Get rid of incorrect usage of "tex_unit_map". wined3d: Move legacy texture image unit range allocation to wined3d_gl_limits_get_texture_unit_range(). wined3d: Introduce shader_glsl_load_program_resources() helper function. wined3d: Use layout qualifiers to bind GLSL images. wined3d: Use layout qualifiers to bind GLSL uniform blocks. wined3d: Do not use texture unit mapping for SM4+ shaders. wined3d: Allow using more than MAX_COMBINED_SAMPLERS texture image units. wined3d: Introduce context_get_tex_unit_mapping() helper function. wined3d: Use layout qualifiers to bind GLSL samplers. wined3d: Add support for samplers in geometry shaders. d3d9/tests: Add test for vertex textures. wined3d: Use context_get_tex_unit_mapping() in context_bind_shader_resources(). wined3d: Get rid of redundant WARN() from context_load_shader_resources(). d3d11/tests: Add basic test for texturing on feature level 9. wined3d: Store GL sampler limits as array. wined3d: Recompute sampler count before allocating sampler range for compute shaders. wined3d: Fix off-by-one error in wined3d_gl_limits_get_texture_unit_range(). Ken Thomases (2): winemac: Discard key repeat events after a modifier key has been pressed. wineps.drv: Set the AP_D_InputSlot CUPS option if no input slot is specified. Louis Lenders (1): kernel32: Add stub for GetCurrentPackageFullName. Mark Jansen (1): msi: Use the correct type when calculating feature cost. Matteo Bruni (15): ddraw: Keep a ddraw object reference in d3d7 vertex buffers. d3d9/tests: Skip test_vshader_input() if PS 3.0 isn't supported. d3d9/tests: Fix pixel shader version check in test_pointsize(). ddraw/tests: Add a ddraw4 vertex buffer refcount test. ddraw/tests: Add a ddraw7 vertex buffer refcount test. wined3d: Don't advertise unsupported shader versions. d3d9/tests: Skip UpdateTexture tests if texture filtering isn't supported. wined3d: Use the MAX_TEXTURES define in a few more places. d3d9/tests: Ignore test_vshader_input() "no color attribute" test result on WARP. wined3d: Fix the TRACE in wined3d_texture_remove_buffer_object(). d3d9/tests: Fix test_updatetexture() on GPUs not supporting WINED3DFMT_R32_FLOAT. ddraw: Take user clip planes into account in d3d7 ComputeSphereVisibility(). ddraw/tests: Cleanup and extend d3d7 ComputeSphereVisibility() tests. ddraw: Fix d3d6 version of ComputeSphereVisibility(). ddraw/tests: Port test_compute_sphere_visibility() to ddraw4. Michael Müller (8): kernel32: Add stub for GetCurrentPackageFamilyName. cabinet: Set index of folder in FDICopy callback. bcrypt: Add builtin HMAC implementation. bcrypt: Use builtin MD5/SHA1 implementation. bcrypt: Add a builtin sha256 implementation. bcrypt: Add a builtin sha384/sha512 implementation. bcrypt: Always use builtin hash implementation. bcrypt: Implement BCryptDuplicateHash. Nikolay Sivov (49): xmllite/reader: Improve input stream encoding detection. xmllite/reader: Always return node type from Read(). xmllite/reader: Reset node type to XmlNodeType_None on EOF. xmllite/reader: Implement IsEOF(). xmllite/reader: Improve the way nesting level returned by GetDepth() is updated. d3d9: Remove reference to IWineD3DDevice. ddraw: Remove referenced to IWineD3D* interfaces. xmllite/reader: Return proper name for xml declaration PI. xmllite/reader: Return empty value for elements. xmllite/reader: Fix prefix returned after moving back to element. xmllite/reader: Return qualified names for attributes. xmllite/reader: Enforce maximum element depth limit. gdi32/tests: Test that otmfsType field is cleaned up from reserved bits. gdi32: Cleanup otmfsType bit mask from reserved bits. xmllite/tests: A couple of newline normalization tests for text nodes. xmllite/reader: Fix GetValue() for comments. xmllite/reader: Return empty string for namespace uri for some nodes. xmllite/reader: Return local element names from the stack, instead of input buffer. xmllite/reader: Return qualified element names from the stack, instead of input buffer. xmllite/tests: Fix a memory leak (Valgrind). xmllite/reader: Return prefixes from namespace stack. xmllite/tests: Some tests for reader position. xmllite/reader: Remove redundant parameter. xmllite/reader: Improve returned reader position for elements and attributes. xmllite/reader: Fix reader position returned for xml declaration node. xmllite/reader: Return static empty string as xml declaration node value. xmllite/reader: Explicitly return empty static string as local name for nodes without names. xmllite/reader: Explicitly return empty string as qualified name for some node types. xmllite/reader: Return correct error for multiple colons in qualified name. xmllite/reader: Fix position methods return values in closed reader state. xmllite/reader: Improve line number up[censored] when switching to the next line. xmllite/reader: Improve returned position for whitespace text nodes. wlanapi/tests: Always free interface list (Valgrind). comdlg32: Take nMaxFile into account when converting A->W. xmllite/reader: Enter error state on parsing error. xmllite/reader: Reset reader nesting depth on error. dwrite: Added support for oblique simulation in bitmap rendering mode. inetcomm/tests: Fix test stream leak (Valgrind). msctf/tests: Fix test object leak (Valgrind). schedsvc: Fix xml buffer leak (Valgrind). usp10/tests: Fix a buffer leak (Valgrind). dwrite: Added support for bold simulation. dwrite: Use version neutral variable name. dwrite: Fix a typo to actually return kerning pair adjustments. msxml3/tests: A bit more tests for IPersist* interfaces. msxml3/saxreader: Handle NULL interface input in parse(). xmllite/reader: Always return local name from element structure. xmllite/reader: For elements without a prefix return same string for both local and qualified names. xmllite/reader: Return same string for local and qualified names for attributes when appropriate. Owen Rudge (2): gdiplus: Check for null in GdipGetFontHeight. gdiplus/tests: Add tests for invalid parameter handling for GdipGetFontHeight. Paul Gofman (4): d3dx9/tests: Add test for out of bounds array selector in effect. d3dx9: Set dirty flag on parameter change. d3dx9/tests: Extend test effect and add checks to test_effect_preshader(). d3dx9/tests: Factor out op results test helper function from test_effect_preshader(). Pierre Schweitzer (1): iphlpapi: Flags in IP_ADAPTER_ADDRESSES_LH can be used as a bit field. Piotr Caban (11): msvcp140: Add _ContextCallback implementation. msvcp140: Add _ContextCallback tests. msvcp140: Add __crtCreateThreadpoolTimer implementation. msvcp140: Add __crtSetThreadpoolTimer implementation. msvcp140: Add __crtCreateThreadpoolWait implementation. msvcp140: Add __crtSetThreadpoolWait implementation. msvcr: Add _Wcsftime implementation. msvcr: Fix strftime spec file entry. msvcp140: Add _TaskEventLogger class implementation. msvcp140/tests: Add _TaskEventLogger tests. msvcr: Add __crtUnhandledException implementation. Sebastian Lackner (18): ntdll: Use FD_CLOEXEC instead of hardcoded values. ntoskrnl.exe: Add KeReleaseInStackQueuedSpinLock stub. ntdll: Implement FileAccessInformation class in NtQueryInformationFile. rasapi32: Set *lpcDevices in RasEnumDevicesA. include: Avoid typedef for tls_data. webservices: Unlock critical section before returning. webservices: Don't set is_addressed when an error occurred. webservices: Return the correct HRESULT on error. webservices: Fix uninitialized variable in WsWriteArray. server: Explicitly mark memory as undefined in mem_alloc wrapper. schedsvc: Simplify and standardize the heap_xxx() declarations. bcrypt: Unify the object length handling. bcrypt: Return error when requesting BCRYPT_HASH_LENGTH for unsupported object. bcrypt/tests: Move common tests to a helper function. bcrypt/tests: Add basic tests for BCryptDuplicateHash. bcrypt: Remove a FIXME which no longer applies. vcomp/tests: Use ULL macro to define 64-bit constants. krnl386.exe16: Ignore access denied error when flushing file. Stefan Dösinger (1): ddraw/tests: Rewrite SrcColorKey32BlitTest. Vincent Povirk (1): mscoree: Update Wine Mono to 4.7.0. -- Alexandre Julliard julliard ( -at -) winehq.org
-
EpicGear Morpha X Modular Gaming Mouse Review @ Hardware Asylum
news posted a topic in Upcoming News
Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,Maybe one of the coolest mice since the R.A.T. well, maybe not, the r.a.t. was pretty darn cool but not "this" cool.Subject: EpicGear Morpha X Modular Gaming Mouse Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/input_device/epicgear_morphaxQuote: What if you could tweak and tune your mouse to fit your style instead of the other way around? In this review I’ll be looking at the Morpha X Modular Gaming Mouse from EpicGear.A news posting would be appreciated.ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved -
SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0732-1 Rating: important References: #1027527 #1028391 Cross-References: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5409 CVE-2017-5410 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: This update for MozillaFirefox to ESR 45.8 fixes the following issues: Security issues fixed (bsc#1028391): - CVE-2017-5402: Use-after-free working with events in FontFace objects - CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping - CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP - CVE-2017-5401: Memory Corruption when handling ErrorResult - CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters - CVE-2017-5404: Use-after-free working with ranges in selections - CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports - CVE-2017-5408: Cross-origin reading of video captions in violation of CORS - CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service - CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 Bugfixes: - fix crashes on Itanium (bsc#1027527) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-MozillaFirefox-13034=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-MozillaFirefox-13034=1 - SUSE Manager 2.1: zypper in -t patch sleman21-MozillaFirefox-13034=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-MozillaFirefox-13034=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-MozillaFirefox-13034=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-MozillaFirefox-13034=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-MozillaFirefox-13034=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-MozillaFirefox-13034=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-MozillaFirefox-13034=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): MozillaFirefox-45.8.0esr-68.1 MozillaFirefox-translations-45.8.0esr-68.1 - SUSE Manager Proxy 2.1 (x86_64): MozillaFirefox-45.8.0esr-68.1 MozillaFirefox-translations-45.8.0esr-68.1 - SUSE Manager 2.1 (s390x x86_64): MozillaFirefox-45.8.0esr-68.1 MozillaFirefox-translations-45.8.0esr-68.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-devel-45.8.0esr-68.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-45.8.0esr-68.1 MozillaFirefox-translations-45.8.0esr-68.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): MozillaFirefox-45.8.0esr-68.1 MozillaFirefox-translations-45.8.0esr-68.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): MozillaFirefox-45.8.0esr-68.1 MozillaFirefox-translations-45.8.0esr-68.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-debuginfo-45.8.0esr-68.1 MozillaFirefox-debugsource-45.8.0esr-68.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): MozillaFirefox-debuginfo-45.8.0esr-68.1 MozillaFirefox-debugsource-45.8.0esr-68.1 References: https://www.suse.com/security/cve/CVE-2017-5398.html https://www.suse.com/security/cve/CVE-2017-5400.html https://www.suse.com/security/cve/CVE-2017-5401.html https://www.suse.com/security/cve/CVE-2017-5402.html https://www.suse.com/security/cve/CVE-2017-5404.html https://www.suse.com/security/cve/CVE-2017-5405.html https://www.suse.com/security/cve/CVE-2017-5407.html https://www.suse.com/security/cve/CVE-2017-5408.html https://www.suse.com/security/cve/CVE-2017-5409.html https://www.suse.com/security/cve/CVE-2017-5410.html https://bugzilla.suse.com/1027527 https://bugzilla.suse.com/1028391 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=af285fea89&e=0c004f9c13) Ghost Recon: Wildands takes gamers back to squad-based tactical shooter country, albeit this time we’re dropping in hot, to cartel-controlled Bolivia. Our mission is to gather intel to systematically take down each cartel leader until the head of the snake is dispatched. Ditching the futuristic theme of the previous Ghost Recon installment, Wildlands is firmly set in the present and brings a new, completely open-world setting to the franchise, in what Ubisoft is calling "one of the biggest games it has ever published." That’s a promise we can attest to. It’s also one of the most immersive and visually stunning games the company has made with the widest variety of richly detailed locations and environments for players to test their skills in... Ghost Recon: Wildlands Review - PC Gameplay And Performance (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=398ac77fd7&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=7335f7e107&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=584c17310d&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=3ac361a3ee&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=eac90712b6&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=d1bacfda0b&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f77d1a9af1&e=0c004f9c13 ============================================================
-
-------- V-MODA FORZA METALLO EARPHONES REVIEW ( -at -) APH NETWORKS ---------------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: V-MODA Forza Metallo Earphones Review ( -at -) APH Networks * Description: The V-MODA Forza Metallo is a pair of very well built, fashionable earphones with decent audio quality. * Link: http://aphnetworks.com/reviews/v-moda-forza-metallo * Image: http://aphnetworks.com/review/v-moda-forza-metallo/006.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://www.linkinbox.com/newsletter/confirm/remove/c77c84bd425t5
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Logitech G900 Chaos Spectrum ( -at -) LanOC Reviews <https://lanoc.org/review/input-devices/7462-logitech-g900-chaos-spectrum> *DESCRIPTION:* So I recently had the chance to check out the G533 wireless headset from Logitech and I was impressed with its performance. While testing it, I have also been checking out Logitech’s newest wireless gaming mouse, the G900 Chaos Spectrum. While some people may prefer to stay wired for performance reasons, the gap between wired and wireless is getting smaller. With that, there are a lot more people looking at wireless devices for the added convenience. For me, I’ve been using wireless headsets for my Coms for a while now just because it is easier than getting tangled in the cord. The G900 has a great optical sensor and it shares a lot of features with Logitech’s mice so I’m excited to put it to the test today and see what it is all about. *ARTICLE URL:* https://lanoc.org/review/input-devices/7462-logitech-g900-chaos-spectrum *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/logitech_g900/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/logitech_g900/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
[CentOS-announce] CESA-2017:0527 Moderate CentOS 6 tomcat6 Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:0527 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0527.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: f64287823394f3d9d740b227a937b1de4ce02fbb1ae8889739b05ed65c940d00 tomcat6-6.0.24-105.el6_8.noarch.rpm d0591d641d9b3108a67690f13904d4e2365e8c5a8934eda37078e28e22ecb009 tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm edfa8cf02e4ef510fefd95b3d20fbac303a21d0db2102cf7d54b74aad8167551 tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm 60f0a75029377fd15564dd2f22ab6d13bc92883d72e262c55058d602e2528da1 tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm 2c65091e26bb0bc15e257f2b4551fc5273b0593d29c40a3b9c6fcbc17cf81d23 tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm 27fb7034a285f3251ce6b436795ad8ab2035e7f21c26e82d01200bfb50bc8061 tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm a54a224d39d3f4fd84209fa80b2854c59e239dd62b66f9126d4465550ade826d tomcat6-lib-6.0.24-105.el6_8.noarch.rpm 9821af169505129d5db326cd237121850c4238f9bc1da963ba8ae4fc2678e11f tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm 4e3673601b91c8466cf84702176570e572ff786c083e59e0ad2bf609d06a4e79 tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm x86_64: f64287823394f3d9d740b227a937b1de4ce02fbb1ae8889739b05ed65c940d00 tomcat6-6.0.24-105.el6_8.noarch.rpm d0591d641d9b3108a67690f13904d4e2365e8c5a8934eda37078e28e22ecb009 tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm edfa8cf02e4ef510fefd95b3d20fbac303a21d0db2102cf7d54b74aad8167551 tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm 60f0a75029377fd15564dd2f22ab6d13bc92883d72e262c55058d602e2528da1 tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm 2c65091e26bb0bc15e257f2b4551fc5273b0593d29c40a3b9c6fcbc17cf81d23 tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm 27fb7034a285f3251ce6b436795ad8ab2035e7f21c26e82d01200bfb50bc8061 tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm a54a224d39d3f4fd84209fa80b2854c59e239dd62b66f9126d4465550ade826d tomcat6-lib-6.0.24-105.el6_8.noarch.rpm 9821af169505129d5db326cd237121850c4238f9bc1da963ba8ae4fc2678e11f tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm 4e3673601b91c8466cf84702176570e572ff786c083e59e0ad2bf609d06a4e79 tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm Source: c645432afdc6023fe17ffcb90158a66e3742e6201fc27806cae722102c226ab9 tomcat6-6.0.24-105.el6_8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
iClever BTS05 & BTS06 Waterproof Bluetooth Speakers Review @ ThinkComputers.org
news posted a topic in Upcoming News
iClever BTS05 & BTS06 Waterproof Bluetooth Speakers Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/iclever-bts05-bts06-waterproof-bluetooth-speakers-review/ Image URL: http://www.thinkcomputers.org/reviews/iclever_speakers/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/iclever_speakers/small.jpg Quote: "Bluetooth speakers are great, they allow you to share music with a group of friends. They are great for parties, at the beach, BBQs and more! iClever has sent us over two of their Bluetooth speakers, which are waterproof. Being waterproof means that you can keep the party going even in the rain and if someone happens to spill something on the speaker it will not break. The two speakers we are taking a look at today are the BTS05 and BTS06. Let’s jump in and see what they are about." -
[security-announce] SUSE-SU-2017:0718-1: important: Security update for xen
news posted a topic in Upcoming News
SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0718-1 Rating: important References: #1002496 #1012651 #1013657 #1013668 #1014298 #1014507 #1015169 #1016340 #1022871 #1023004 #1024183 #1024834 #907805 Cross-References: CVE-2014-8106 CVE-2016-10013 CVE-2016-10024 CVE-2016-10155 CVE-2016-9101 CVE-2016-9776 CVE-2016-9911 CVE-2016-9921 CVE-2016-9922 CVE-2016-9932 CVE-2017-2615 CVE-2017-2620 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that solves 12 vulnerabilities and has one errata is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183) - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834) - CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004) - CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805) - CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507) - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169) - CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169) - CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340). - CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix (bsc#1012651). - CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668) - CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657) - A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871) - CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298) This non-security issue was fixed: - bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-xen-13030=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-xen-13030=1 - SUSE Manager 2.1: zypper in -t patch sleman21-xen-13030=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-xen-13030=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-xen-13030=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-xen-13030=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): xen-4.2.5_21-35.1 xen-doc-html-4.2.5_21-35.1 xen-doc-pdf-4.2.5_21-35.1 xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 xen-libs-32bit-4.2.5_21-35.1 xen-libs-4.2.5_21-35.1 xen-tools-4.2.5_21-35.1 xen-tools-domU-4.2.5_21-35.1 - SUSE Manager Proxy 2.1 (x86_64): xen-4.2.5_21-35.1 xen-doc-html-4.2.5_21-35.1 xen-doc-pdf-4.2.5_21-35.1 xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 xen-libs-32bit-4.2.5_21-35.1 xen-libs-4.2.5_21-35.1 xen-tools-4.2.5_21-35.1 xen-tools-domU-4.2.5_21-35.1 - SUSE Manager 2.1 (x86_64): xen-4.2.5_21-35.1 xen-doc-html-4.2.5_21-35.1 xen-doc-pdf-4.2.5_21-35.1 xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 xen-libs-32bit-4.2.5_21-35.1 xen-libs-4.2.5_21-35.1 xen-tools-4.2.5_21-35.1 xen-tools-domU-4.2.5_21-35.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64): xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 xen-libs-4.2.5_21-35.1 xen-tools-domU-4.2.5_21-35.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64): xen-4.2.5_21-35.1 xen-doc-html-4.2.5_21-35.1 xen-doc-pdf-4.2.5_21-35.1 xen-libs-32bit-4.2.5_21-35.1 xen-tools-4.2.5_21-35.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586): xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1 xen-libs-4.2.5_21-35.1 xen-tools-domU-4.2.5_21-35.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64): xen-debuginfo-4.2.5_21-35.1 xen-debugsource-4.2.5_21-35.1 References: https://www.suse.com/security/cve/CVE-2014-8106.html https://www.suse.com/security/cve/CVE-2016-10013.html https://www.suse.com/security/cve/CVE-2016-10024.html https://www.suse.com/security/cve/CVE-2016-10155.html https://www.suse.com/security/cve/CVE-2016-9101.html https://www.suse.com/security/cve/CVE-2016-9776.html https://www.suse.com/security/cve/CVE-2016-9911.html https://www.suse.com/security/cve/CVE-2016-9921.html https://www.suse.com/security/cve/CVE-2016-9922.html https://www.suse.com/security/cve/CVE-2016-9932.html https://www.suse.com/security/cve/CVE-2017-2615.html https://www.suse.com/security/cve/CVE-2017-2620.html https://bugzilla.suse.com/1002496 https://bugzilla.suse.com/1012651 https://bugzilla.suse.com/1013657 https://bugzilla.suse.com/1013668 https://bugzilla.suse.com/1014298 https://bugzilla.suse.com/1014507 https://bugzilla.suse.com/1015169 https://bugzilla.suse.com/1016340 https://bugzilla.suse.com/1022871 https://bugzilla.suse.com/1023004 https://bugzilla.suse.com/1024183 https://bugzilla.suse.com/1024834 https://bugzilla.suse.com/907805 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0714-1 Rating: important References: #1028391 Cross-References: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5409 CVE-2017-5410 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Desktop 12-SP2 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: This update for MozillaFirefox to ESR 45.8 fixes the following issues: Security issues fixed (bsc#1028391): - CVE-2017-5402: Use-after-free working with events in FontFace objects - CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping - CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP - CVE-2017-5401: Memory Corruption when handling ErrorResult - CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters - CVE-2017-5404: Use-after-free working with ranges in selections - CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports - CVE-2017-5408: Cross-origin reading of video captions in violation of CORS - CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service - CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-392=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-392=1 - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-392=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-392=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-392=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-392=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-392=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-392=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-392=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-devel-45.8.0esr-102.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-devel-45.8.0esr-102.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): MozillaFirefox-45.8.0esr-102.1 MozillaFirefox-debuginfo-45.8.0esr-102.1 MozillaFirefox-debugsource-45.8.0esr-102.1 MozillaFirefox-translations-45.8.0esr-102.1 References: https://www.suse.com/security/cve/CVE-2017-5398.html https://www.suse.com/security/cve/CVE-2017-5400.html https://www.suse.com/security/cve/CVE-2017-5401.html https://www.suse.com/security/cve/CVE-2017-5402.html https://www.suse.com/security/cve/CVE-2017-5404.html https://www.suse.com/security/cve/CVE-2017-5405.html https://www.suse.com/security/cve/CVE-2017-5407.html https://www.suse.com/security/cve/CVE-2017-5408.html https://www.suse.com/security/cve/CVE-2017-5409.html https://www.suse.com/security/cve/CVE-2017-5410.html https://bugzilla.suse.com/1028391 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
ATK 2.24.0, the last major version of the stable version of ATK has just been released. About ATK ========= GNOME provides support for accessibility devices using the ATK library. This library defines a set of interfaces to which graphical interface components adhere. This allows, for instance, screen readers to read the text of an interface and interact with its controls. ATK support is built into GTK+ and the rest of the GNOME platform, so any application using GTK+ will have reasonable accessibility support for free. Nonetheless, you should be aware of accessibility issues when when developing your applications. Although GTK+ interfaces provide reasonable accessibility by default, you can often improve how well your program behaves with accessibility tools by providing additional information to ATK. If you develop custom widgets, you should ensure that they expose their properties to ATK. News (compared against 2.22.0) ============================== * * Build, MSVC * Bug 764983: MSVC Builds: Add a Common Autotools Module for Introspection * Bug 764983: MSVC Builds: Generate the Introspection Build Commands * Several clean-ups and updates * Support Visual Studio 2017 * Bugfixing: * Bug 772236: change id of the atkobject chapter needed case-insensitive filesystems * Bug 764883: Add some missing argument (out) annotations * Docs: * Fix typo on AtkText boundaries doc * Translation support: * Use Unicode apostrophe in a translatable string * Add more options to XGETTEXT_OPTIONS in po/Makevars * Add Language headers to po files Contributors: ------------- Murray Cumming, Piotr Drąg, Chun-wei Fan, Alejandro Piñeiro Iglesias, Rico Tzschichholz Translations: ------------- Piotr Drąg (po), gogo (hr), Ask Hjorth Larsen (da), David King (en_GB), Jordi Mas (ca), Cédric Valmary (oc), Fabio Tomat (fur), GNOME Translation Robot (gd) Download ======== https://download.gnome.org/sources/atk/2.24/atk-2.24.0.tar.xz (731K) sha256sum: bb2daa9a808c73a7a79d2983f333e0ba74be42fc51e3ba1faf2551a636487a49 -- Alejandro Piñeiro Iglesias _______________________________________________
-
ASUS ROG SWIFT PG258Q 240hz G-SYNC 24.5in Gaming Monitor Review
news posted a topic in Upcoming News
ASUS ROG SWIFT PG258Q 240hz G-SYNC 24.5in Gaming Monitor Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=b86c968e02&e=872093acb5 http://www.kitguru.net ASUS ROG SWIFT PG258Q 240hz G-SYNC 24.5in Gaming Monitor Review Gaming monitors are clearly going through a bit of a growth spurt, and ASUS is a company particularly focusing on this area. The ROG SWIFT PG258Q is a 24.5in screen with a whopping 240Hz top refresh and NVIDIA G-Sync, plus a host of other features specifically tailored for serious gamers. Read the review here: http://www.kitguru.net/peripherals/james-morris/asus-rog-swift-pg258q-240hz-g-sync-24-5in-gaming-monitor-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=b86c968e02&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news. -
Looks like the HyperX team is at it again and has come out with a new improved version of the HyperX Cloud Revolver S Headset. This is their flagship highest end headset and is made purely for the gamer in all of us. As most of you probably already know HyperX is the gaming division of Kingston and they are known world wide for the quality gaming products they bring to the table... Article Title: HyperX Cloud Revolver S Gaming Headset Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/hyperx-cloud-revolver-s-gaming-headset-review_192511 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : wireshark Version : 1.12.1+g01b65bf-4+deb8u6~deb7u7 CVE ID : CVE-2017-5596 CVE-2017-5597 CVE-2017-6467 CVE-2017-6468 CVE-2017-6469 CVE-2017-6470 CVE-2017-6471 CVE-2017-6472 CVE-2017-6473 CVE-2017-6474 It was discovered that Wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for ASTERIX, DHCPv6, LDSS, IAX2, WSP and RTMPT and the NetScaler and K12 file parsers, that could lead to various crashes, denial-of-service, or execution of arbitrary code. For Debian 7 "Wheezy", these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u7. We recommend that you upgrade your wireshark packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJYyzxDAAoJEPZk0la0aRp9z+wQAKDFTMaMTgHsvwqiJjMaYsp2 rbJ+PlXsvYLaz6WkY+CZI6OHw++D9VEXgpqOa5OF+OS8l9kvJM05rYbxxxqPjVvq 4b2PYWyfsp/0yrm0SxS1WzhBLBdiDqOHSzop/hYv5E7mUKrwGXORP4VhLg9MY30f CWajIv+pFT+BR6PGEd0Sakz3N7iDYLQprayEEPbYuyQsVXLE1Bx/CQwqQwl8sQ4X lmXSjEEnjnhG8pXz8RrkBTAwFJGxuD4HiqtMAQ750ksCJYGd1JMC1XzdJBLlbS/K bxTIKkDos4YDr5sAgZ/EYswkkvf/SNtzTwZDqhQuGStkqPLBNEEUOzuYjSiGyLjO Kag3KRrcOboaaZnG5I2E746uQlnCqGpqDZa1PF6o2tnAv9s/+H17GMGxXyIXmmSv MXiqw4GdxWN7wv83o7qrMeLWP1zLKHTTT2lpuUHZJMUbJ89K5H/WXtwh10nnoEyl yG87671xm3YWrtYN8WAupDdSSrO1SftX4xh+F5pBivz/ZJpsf+WPqEP6TNjd2SsH pungceDxEEIUR3DUZ2XN4MpbeFZlr6GDGp82HjqQKEtQdda+3/cpDsHHv1sahDYA xMO7HRkZO6KI+cprHqZr7O3XGlPvMaGnvl8woBdYuGpM6SQhdXXdkxOxiep7bbXt IdRFrbsWDj/TYwvUbPTg =JF7t -----END PGP SIGNATURE-----
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Mad Catz RAT 8 Gaming Mouse Link: https://www.techpowerup.com/reviews/Mad_Catz/RAT_8 Brief: The Mad Catz RAT 8 is the new flagship mouse for Mad Catz's line of ergonomic mice. It offers a lot of customization options to make it a perfect fit for your hand and comes equipped with a best-in-class sensor and well-rounded software suite for a price of $100.
-
GNOME Online Accounts provides interfaces so that applications and libraries in GNOME can access the user's online accounts. It has providers for Google, ownCloud, Facebook, Flickr, Windows Live, Pocket, Foursquare, Microsoft Exchange, Last.fm, IMAP/SMTP, Jabber, SIP and Kerberos. Overview of changes in 3.23.92 ============================== * Bugs fixed: 778416 live: Re-title it as "Microsoft" 778417 Capitalize "Account" in the dialog's title 779548 Don't leak the name_owner and result in dbus_proxy_reload_properties_sync * Updated translations: Croatian Danish Icelandic Italian Kazakh Korean Lithuanian Bugs: https://bugzilla.gnome.org/enter_bug.cgi?product=gnome-online-accounts Design: https://wiki.gnome.org/Design/SystemSettings/OnlineAccounts Download: http://download.gnome.org/sources/gnome-online-accounts/3.23/ Git: http://git.gnome.org/browse/gnome-online-accounts Website: https://wiki.gnome.org/Projects/GnomeOnlineAccounts Happy hacking, Debarshi _______________________________________________
-
GNOME Online Accounts provides interfaces so that applications and libraries in GNOME can access the user's online accounts. It has providers for Google, ownCloud, Facebook, Flickr, Windows Live, Pocket, Foursquare, Microsoft Exchange, Last.fm, IMAP/SMTP, Jabber, SIP and Kerberos. Overview of changes in 3.23.92 ============================== * Bugs fixed: 778416 live: Re-title it as "Microsoft" 778417 Capitalize "Account" in the dialog's title 779548 Don't leak the name_owner and result in dbus_proxy_reload_properties_sync * Updated translations: Croatian Danish Icelandic Italian Kazakh Korean Lithuanian Bugs: https://bugzilla.gnome.org/enter_bug.cgi?product=gnome-online-accounts Design: https://wiki.gnome.org/Design/SystemSettings/OnlineAccounts Download: http://download.gnome.org/sources/gnome-online-accounts/3.23/ Git: http://git.gnome.org/browse/gnome-online-accounts Website: https://wiki.gnome.org/Projects/GnomeOnlineAccounts Happy hacking, Debarshi _______________________________________________
-
Tenda AC6 AC1200 Smart Dual-Band Wireless Router Review @ Bigbruin.com
news posted a topic in Upcoming News
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:* Tenda AC6 AC1200 Smart Dual-Band Wireless Router *Link:*http://bigbruin.com/content/tenda-ac6_1*_ _* ** *Image (250x250):*http://bigbruin.com/images/articles/757/promo_3.jpg* * ** *Quote:* * * The Tenda AC6 offers good range and throughput, and would make for a decent choice for people that didn't rely on wired connections for transferring files. Features like the high powered amplifiers, four large external antennas, and beam forming technology will help carry the signal throughout a typical house with plenty of bandwidth for a typical family. The 100Mbps wired ports are a downer since they would limit traffic on the LAN and WAN. Best regards, Jason www.bigbruin.com <http://www.bigbruin.com/> --