Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. news

    Shotwell 0.25.90

    A new unstable release! Shotwell is available for download at https://download.gnome.org/sources/shotwell/0.25/ Or for Ubuntu 16.x at the UNSTABLE PPA: https://launchpad.net/~yg-jensge/+archive/ubuntu/shotwell-unstable (soon) Changes from this version: Shotwell 0.25.90 - 27 Feb 2017  * Remove obsolete option to create new folders on Picasa web albums  * Update Google API keys  * Fix Youtube upload by porting to libgdata  * Use embedded thumbnails in RAW files when default developer is set to     Camera  * Remove accidental raw development while importing  * Fix "Export" menu accidently being labelled as "Save As" Bugs fixed in this release:  - https://bugzilla.gnome.org/show_bug.cgi?id=717305  - https://bugzilla.gnome.org/show_bug.cgi?id=718248  - https://bugzilla.gnome.org/show_bug.cgi?id=777910 All contributors to this release:  - Jens Georg  - ÃœøрþÑÂûðò ÃÂøúþûøћ  - Piotr Drąg  - Jiri Grönroos Added/updated translations  - fi, courtesy of Jiri Grönroos  - pl, courtesy of Piotr Drąg  - sr, courtesy of ÃœøрþÑÂûðò ÃÂøúþûøћ  - sr ( -at -) latin, courtesy of Miroslav Nikolić _______________________________________________
  2. news

    Rygel 0.33.90

    A new unstable release of Rygel! Download source tarball here: http://download.gnome.org/sources/rygel/0.33/ 0.33.90 ======= Server:  - Add hack for XBMC on original XBox hardware Settings UI:  - Fix compilation with Vala master MediaExport:  - Improve start-up speed by not re-querying mime types every time Bugs fixed in this release:  - https://bugzilla.gnome.org/show_bug.cgi?id=777703  - https://bugzilla.gnome.org/show_bug.cgi?id=778778 All contributors to this release:  - ÃœøрþÑÂûðò ÃÂøúþûøћ  - Samuel CUELLA  - Matteo Settenvini  - Kjartan Maraas  - Jens Georg  - Inaki Larranaga Murgoitio  - Fran Dieguez  - Claude Paroz  - Chao-Hsiung Liao  - Baurzhan Muftakhidinov  - Ask Hjorth Larsen Added/updated translations  - da, courtesy of Ask Hjorth Larsen  - eu, courtesy of Iñaki Larrañaga Murgoitio  - fr, courtesy of Claude Paroz  - gl, courtesy of Fran Dieguez  - kk, courtesy of Baurzhan Muftakhidinov  - nb, courtesy of Kjartan Maraas  - sr, courtesy of ÃœøрþÑÂûðò ÃÂøúþûøћ  - sr ( -at -) latin, courtesy of Miroslav Nikolić  - zh_TW, courtesy of Chao-Hsiung Liao -------- What is Rygel? Rygel is a home media solution that allows you to easily share audio, video and pictures, and control of media player on your home network. In technical terms it is both a UPnP AV MediaServer and MediaRenderer implemented through a  plug-in mechanism. Interoperability with other devices in the market is achieved  by conformance to very strict requirements of DLNA and on the fly  conversion of media to formats that client devices are capable of handling. More information at our project home page: http://www.rygel-project.org _______________________________________________
  3. SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0570-1 Rating: important References: #1000195 #1002496 #1013657 #1013668 #1014490 #1014507 #1015169 #1016340 #1022627 #1022871 #1023004 #1024183 #1024186 #1024307 #1024834 #1025188 Cross-References: CVE-2016-10155 CVE-2016-9101 CVE-2016-9776 CVE-2016-9907 CVE-2016-9911 CVE-2016-9921 CVE-2016-9922 CVE-2017-2615 CVE-2017-2620 CVE-2017-5579 CVE-2017-5856 CVE-2017-5898 CVE-2017-5973 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 13 vulnerabilities and has three fixes is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188). - CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183). - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834) - CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186). - CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307). - CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004) - A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871) - CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627). - CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490) - CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507) - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169) - CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169) - CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668). - CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657) These non-security issues were fixed: - bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3 - bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-297=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-297=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-297=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (x86_64): xen-debugsource-4.5.5_06-22.11.2 xen-devel-4.5.5_06-22.11.2 - SUSE Linux Enterprise Server 12-SP1 (x86_64): xen-4.5.5_06-22.11.2 xen-debugsource-4.5.5_06-22.11.2 xen-doc-html-4.5.5_06-22.11.2 xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 xen-kmp-default-debuginfo-4.5.5_06_k3.12.69_60.64.32-22.11.2 xen-libs-32bit-4.5.5_06-22.11.2 xen-libs-4.5.5_06-22.11.2 xen-libs-debuginfo-32bit-4.5.5_06-22.11.2 xen-libs-debuginfo-4.5.5_06-22.11.2 xen-tools-4.5.5_06-22.11.2 xen-tools-debuginfo-4.5.5_06-22.11.2 xen-tools-domU-4.5.5_06-22.11.2 xen-tools-domU-debuginfo-4.5.5_06-22.11.2 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): xen-4.5.5_06-22.11.2 xen-debugsource-4.5.5_06-22.11.2 xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 xen-kmp-default-debuginfo-4.5.5_06_k3.12.69_60.64.32-22.11.2 xen-libs-32bit-4.5.5_06-22.11.2 xen-libs-4.5.5_06-22.11.2 xen-libs-debuginfo-32bit-4.5.5_06-22.11.2 xen-libs-debuginfo-4.5.5_06-22.11.2 References: https://www.suse.com/security/cve/CVE-2016-10155.html https://www.suse.com/security/cve/CVE-2016-9101.html https://www.suse.com/security/cve/CVE-2016-9776.html https://www.suse.com/security/cve/CVE-2016-9907.html https://www.suse.com/security/cve/CVE-2016-9911.html https://www.suse.com/security/cve/CVE-2016-9921.html https://www.suse.com/security/cve/CVE-2016-9922.html https://www.suse.com/security/cve/CVE-2017-2615.html https://www.suse.com/security/cve/CVE-2017-2620.html https://www.suse.com/security/cve/CVE-2017-5579.html https://www.suse.com/security/cve/CVE-2017-5856.html https://www.suse.com/security/cve/CVE-2017-5898.html https://www.suse.com/security/cve/CVE-2017-5973.html https://bugzilla.suse.com/1000195 https://bugzilla.suse.com/1002496 https://bugzilla.suse.com/1013657 https://bugzilla.suse.com/1013668 https://bugzilla.suse.com/1014490 https://bugzilla.suse.com/1014507 https://bugzilla.suse.com/1015169 https://bugzilla.suse.com/1016340 https://bugzilla.suse.com/1022627 https://bugzilla.suse.com/1022871 https://bugzilla.suse.com/1023004 https://bugzilla.suse.com/1024183 https://bugzilla.suse.com/1024186 https://bugzilla.suse.com/1024307 https://bugzilla.suse.com/1024834 https://bugzilla.suse.com/1025188 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  4. SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0571-1 Rating: important References: #1000195 #1002496 #1005028 #1012651 #1014298 #1014300 #1015169 #1016340 #1022871 #1023004 #1024834 Cross-References: CVE-2016-9921 CVE-2016-9922 CVE-2017-2615 CVE-2017-2620 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 ______________________________________________________________________________ An update that solves four vulnerabilities and has 7 fixes is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834). - CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004). - A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871) - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169 These non-security issues were fixed: - bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3 - bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd - bsc#1005028: Fixed building Xen RPMs from Sources Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-296=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-296=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-296=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64): xen-debugsource-4.7.1_06-31.1 xen-devel-4.7.1_06-31.1 - SUSE Linux Enterprise Server 12-SP2 (x86_64): xen-4.7.1_06-31.1 xen-debugsource-4.7.1_06-31.1 xen-doc-html-4.7.1_06-31.1 xen-libs-32bit-4.7.1_06-31.1 xen-libs-4.7.1_06-31.1 xen-libs-debuginfo-32bit-4.7.1_06-31.1 xen-libs-debuginfo-4.7.1_06-31.1 xen-tools-4.7.1_06-31.1 xen-tools-debuginfo-4.7.1_06-31.1 xen-tools-domU-4.7.1_06-31.1 xen-tools-domU-debuginfo-4.7.1_06-31.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): xen-4.7.1_06-31.1 xen-debugsource-4.7.1_06-31.1 xen-libs-32bit-4.7.1_06-31.1 xen-libs-4.7.1_06-31.1 xen-libs-debuginfo-32bit-4.7.1_06-31.1 xen-libs-debuginfo-4.7.1_06-31.1 References: https://www.suse.com/security/cve/CVE-2016-9921.html https://www.suse.com/security/cve/CVE-2016-9922.html https://www.suse.com/security/cve/CVE-2017-2615.html https://www.suse.com/security/cve/CVE-2017-2620.html https://bugzilla.suse.com/1000195 https://bugzilla.suse.com/1002496 https://bugzilla.suse.com/1005028 https://bugzilla.suse.com/1012651 https://bugzilla.suse.com/1014298 https://bugzilla.suse.com/1014300 https://bugzilla.suse.com/1015169 https://bugzilla.suse.com/1016340 https://bugzilla.suse.com/1022871 https://bugzilla.suse.com/1023004 https://bugzilla.suse.com/1024834 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  5. Title: TerraMaster F2-220 Small Business/Home Cloud Storage NAS Server Review ( -at -) NikKTech Description: Performance, low power consumption, easy to navigate operating system and a very good price tag are the things TerraMaster has brought to the table with their latest F2-220 Small Business/Home Cloud Storage NAS Server. Article Link: http://www.nikktech.com/main/articles/peripherals/network/nas-servers/7505-t erramaster-f2-220-small-business-home-cloud-storage-nas-server-review Image Link: http://www.nikktech.com/main/images/pics/reviews/terra_master/f2_220/terra_m aster_f2_220a.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  6. SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0568-1 Rating: important References: #1019550 #1022219 #1022255 #1022257 #1022260 #1022263 #1022264 #1022265 Cross-References: CVE-2016-10158 CVE-2016-10159 CVE-2016-10160 CVE-2016-10161 CVE-2016-10166 CVE-2016-10167 CVE-2016-10168 CVE-2016-7478 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for php53 fixes the following security issues: - CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite loop, causing denial of service (bsc#1019550) - CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c in PHP allowed remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. (bsc#1022219) - CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive. (bsc#1022255) - CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. (bsc#1022257) - CVE-2016-10161: The object_common1 function in ext/standard/var_unserializer.c in PHP allowed remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. (bsc#1022260) - CVE-2016-10166: A potential unsigned underflow in gd interpolation functions could lead to memory corruption in the PHP gd module (bsc#1022263) - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx() could lead to php out of memory even on small files. (bsc#1022264) - CVE-2016-10168: A signed integer overflow in the gd module could lead to memory corruption (bsc#1022265) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-php53-12997=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-php53-12997=1 - SUSE Manager 2.1: zypper in -t patch sleman21-php53-12997=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-php53-12997=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-php53-12997=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-php53-12997=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-php53-12997=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-php53-12997=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-php53-12997=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): apache2-mod_php53-5.3.17-101.1 php53-5.3.17-101.1 php53-bcmath-5.3.17-101.1 php53-bz2-5.3.17-101.1 php53-calendar-5.3.17-101.1 php53-ctype-5.3.17-101.1 php53-curl-5.3.17-101.1 php53-dba-5.3.17-101.1 php53-dom-5.3.17-101.1 php53-exif-5.3.17-101.1 php53-fastcgi-5.3.17-101.1 php53-fileinfo-5.3.17-101.1 php53-ftp-5.3.17-101.1 php53-gd-5.3.17-101.1 php53-gettext-5.3.17-101.1 php53-gmp-5.3.17-101.1 php53-iconv-5.3.17-101.1 php53-intl-5.3.17-101.1 php53-json-5.3.17-101.1 php53-ldap-5.3.17-101.1 php53-mbstring-5.3.17-101.1 php53-mcrypt-5.3.17-101.1 php53-mysql-5.3.17-101.1 php53-odbc-5.3.17-101.1 php53-openssl-5.3.17-101.1 php53-pcntl-5.3.17-101.1 php53-pdo-5.3.17-101.1 php53-pear-5.3.17-101.1 php53-pgsql-5.3.17-101.1 php53-pspell-5.3.17-101.1 php53-shmop-5.3.17-101.1 php53-snmp-5.3.17-101.1 php53-soap-5.3.17-101.1 php53-suhosin-5.3.17-101.1 php53-sysvmsg-5.3.17-101.1 php53-sysvsem-5.3.17-101.1 php53-sysvshm-5.3.17-101.1 php53-tokenizer-5.3.17-101.1 php53-wddx-5.3.17-101.1 php53-xmlreader-5.3.17-101.1 php53-xmlrpc-5.3.17-101.1 php53-xmlwriter-5.3.17-101.1 php53-xsl-5.3.17-101.1 php53-zip-5.3.17-101.1 php53-zlib-5.3.17-101.1 - SUSE Manager Proxy 2.1 (x86_64): apache2-mod_php53-5.3.17-101.1 php53-5.3.17-101.1 php53-bcmath-5.3.17-101.1 php53-bz2-5.3.17-101.1 php53-calendar-5.3.17-101.1 php53-ctype-5.3.17-101.1 php53-curl-5.3.17-101.1 php53-dba-5.3.17-101.1 php53-dom-5.3.17-101.1 php53-exif-5.3.17-101.1 php53-fastcgi-5.3.17-101.1 php53-fileinfo-5.3.17-101.1 php53-ftp-5.3.17-101.1 php53-gd-5.3.17-101.1 php53-gettext-5.3.17-101.1 php53-gmp-5.3.17-101.1 php53-iconv-5.3.17-101.1 php53-intl-5.3.17-101.1 php53-json-5.3.17-101.1 php53-ldap-5.3.17-101.1 php53-mbstring-5.3.17-101.1 php53-mcrypt-5.3.17-101.1 php53-mysql-5.3.17-101.1 php53-odbc-5.3.17-101.1 php53-openssl-5.3.17-101.1 php53-pcntl-5.3.17-101.1 php53-pdo-5.3.17-101.1 php53-pear-5.3.17-101.1 php53-pgsql-5.3.17-101.1 php53-pspell-5.3.17-101.1 php53-shmop-5.3.17-101.1 php53-snmp-5.3.17-101.1 php53-soap-5.3.17-101.1 php53-suhosin-5.3.17-101.1 php53-sysvmsg-5.3.17-101.1 php53-sysvsem-5.3.17-101.1 php53-sysvshm-5.3.17-101.1 php53-tokenizer-5.3.17-101.1 php53-wddx-5.3.17-101.1 php53-xmlreader-5.3.17-101.1 php53-xmlrpc-5.3.17-101.1 php53-xmlwriter-5.3.17-101.1 php53-xsl-5.3.17-101.1 php53-zip-5.3.17-101.1 php53-zlib-5.3.17-101.1 - SUSE Manager 2.1 (s390x x86_64): apache2-mod_php53-5.3.17-101.1 php53-5.3.17-101.1 php53-bcmath-5.3.17-101.1 php53-bz2-5.3.17-101.1 php53-calendar-5.3.17-101.1 php53-ctype-5.3.17-101.1 php53-curl-5.3.17-101.1 php53-dba-5.3.17-101.1 php53-dom-5.3.17-101.1 php53-exif-5.3.17-101.1 php53-fastcgi-5.3.17-101.1 php53-fileinfo-5.3.17-101.1 php53-ftp-5.3.17-101.1 php53-gd-5.3.17-101.1 php53-gettext-5.3.17-101.1 php53-gmp-5.3.17-101.1 php53-iconv-5.3.17-101.1 php53-intl-5.3.17-101.1 php53-json-5.3.17-101.1 php53-ldap-5.3.17-101.1 php53-mbstring-5.3.17-101.1 php53-mcrypt-5.3.17-101.1 php53-mysql-5.3.17-101.1 php53-odbc-5.3.17-101.1 php53-openssl-5.3.17-101.1 php53-pcntl-5.3.17-101.1 php53-pdo-5.3.17-101.1 php53-pear-5.3.17-101.1 php53-pgsql-5.3.17-101.1 php53-pspell-5.3.17-101.1 php53-shmop-5.3.17-101.1 php53-snmp-5.3.17-101.1 php53-soap-5.3.17-101.1 php53-suhosin-5.3.17-101.1 php53-sysvmsg-5.3.17-101.1 php53-sysvsem-5.3.17-101.1 php53-sysvshm-5.3.17-101.1 php53-tokenizer-5.3.17-101.1 php53-wddx-5.3.17-101.1 php53-xmlreader-5.3.17-101.1 php53-xmlrpc-5.3.17-101.1 php53-xmlwriter-5.3.17-101.1 php53-xsl-5.3.17-101.1 php53-zip-5.3.17-101.1 php53-zlib-5.3.17-101.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-101.1 php53-imap-5.3.17-101.1 php53-posix-5.3.17-101.1 php53-readline-5.3.17-101.1 php53-sockets-5.3.17-101.1 php53-sqlite-5.3.17-101.1 php53-tidy-5.3.17-101.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-101.1 php53-5.3.17-101.1 php53-bcmath-5.3.17-101.1 php53-bz2-5.3.17-101.1 php53-calendar-5.3.17-101.1 php53-ctype-5.3.17-101.1 php53-curl-5.3.17-101.1 php53-dba-5.3.17-101.1 php53-dom-5.3.17-101.1 php53-exif-5.3.17-101.1 php53-fastcgi-5.3.17-101.1 php53-fileinfo-5.3.17-101.1 php53-ftp-5.3.17-101.1 php53-gd-5.3.17-101.1 php53-gettext-5.3.17-101.1 php53-gmp-5.3.17-101.1 php53-iconv-5.3.17-101.1 php53-intl-5.3.17-101.1 php53-json-5.3.17-101.1 php53-ldap-5.3.17-101.1 php53-mbstring-5.3.17-101.1 php53-mcrypt-5.3.17-101.1 php53-mysql-5.3.17-101.1 php53-odbc-5.3.17-101.1 php53-openssl-5.3.17-101.1 php53-pcntl-5.3.17-101.1 php53-pdo-5.3.17-101.1 php53-pear-5.3.17-101.1 php53-pgsql-5.3.17-101.1 php53-pspell-5.3.17-101.1 php53-shmop-5.3.17-101.1 php53-snmp-5.3.17-101.1 php53-soap-5.3.17-101.1 php53-suhosin-5.3.17-101.1 php53-sysvmsg-5.3.17-101.1 php53-sysvsem-5.3.17-101.1 php53-sysvshm-5.3.17-101.1 php53-tokenizer-5.3.17-101.1 php53-wddx-5.3.17-101.1 php53-xmlreader-5.3.17-101.1 php53-xmlrpc-5.3.17-101.1 php53-xmlwriter-5.3.17-101.1 php53-xsl-5.3.17-101.1 php53-zip-5.3.17-101.1 php53-zlib-5.3.17-101.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): apache2-mod_php53-5.3.17-101.1 php53-5.3.17-101.1 php53-bcmath-5.3.17-101.1 php53-bz2-5.3.17-101.1 php53-calendar-5.3.17-101.1 php53-ctype-5.3.17-101.1 php53-curl-5.3.17-101.1 php53-dba-5.3.17-101.1 php53-dom-5.3.17-101.1 php53-exif-5.3.17-101.1 php53-fastcgi-5.3.17-101.1 php53-fileinfo-5.3.17-101.1 php53-ftp-5.3.17-101.1 php53-gd-5.3.17-101.1 php53-gettext-5.3.17-101.1 php53-gmp-5.3.17-101.1 php53-iconv-5.3.17-101.1 php53-intl-5.3.17-101.1 php53-json-5.3.17-101.1 php53-ldap-5.3.17-101.1 php53-mbstring-5.3.17-101.1 php53-mcrypt-5.3.17-101.1 php53-mysql-5.3.17-101.1 php53-odbc-5.3.17-101.1 php53-openssl-5.3.17-101.1 php53-pcntl-5.3.17-101.1 php53-pdo-5.3.17-101.1 php53-pear-5.3.17-101.1 php53-pgsql-5.3.17-101.1 php53-pspell-5.3.17-101.1 php53-shmop-5.3.17-101.1 php53-snmp-5.3.17-101.1 php53-soap-5.3.17-101.1 php53-suhosin-5.3.17-101.1 php53-sysvmsg-5.3.17-101.1 php53-sysvsem-5.3.17-101.1 php53-sysvshm-5.3.17-101.1 php53-tokenizer-5.3.17-101.1 php53-wddx-5.3.17-101.1 php53-xmlreader-5.3.17-101.1 php53-xmlrpc-5.3.17-101.1 php53-xmlwriter-5.3.17-101.1 php53-xsl-5.3.17-101.1 php53-zip-5.3.17-101.1 php53-zlib-5.3.17-101.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): apache2-mod_php53-5.3.17-101.1 php53-5.3.17-101.1 php53-bcmath-5.3.17-101.1 php53-bz2-5.3.17-101.1 php53-calendar-5.3.17-101.1 php53-ctype-5.3.17-101.1 php53-curl-5.3.17-101.1 php53-dba-5.3.17-101.1 php53-dom-5.3.17-101.1 php53-exif-5.3.17-101.1 php53-fastcgi-5.3.17-101.1 php53-fileinfo-5.3.17-101.1 php53-ftp-5.3.17-101.1 php53-gd-5.3.17-101.1 php53-gettext-5.3.17-101.1 php53-gmp-5.3.17-101.1 php53-iconv-5.3.17-101.1 php53-intl-5.3.17-101.1 php53-json-5.3.17-101.1 php53-ldap-5.3.17-101.1 php53-mbstring-5.3.17-101.1 php53-mcrypt-5.3.17-101.1 php53-mysql-5.3.17-101.1 php53-odbc-5.3.17-101.1 php53-openssl-5.3.17-101.1 php53-pcntl-5.3.17-101.1 php53-pdo-5.3.17-101.1 php53-pear-5.3.17-101.1 php53-pgsql-5.3.17-101.1 php53-pspell-5.3.17-101.1 php53-shmop-5.3.17-101.1 php53-snmp-5.3.17-101.1 php53-soap-5.3.17-101.1 php53-suhosin-5.3.17-101.1 php53-sysvmsg-5.3.17-101.1 php53-sysvsem-5.3.17-101.1 php53-sysvshm-5.3.17-101.1 php53-tokenizer-5.3.17-101.1 php53-wddx-5.3.17-101.1 php53-xmlreader-5.3.17-101.1 php53-xmlrpc-5.3.17-101.1 php53-xmlwriter-5.3.17-101.1 php53-xsl-5.3.17-101.1 php53-zip-5.3.17-101.1 php53-zlib-5.3.17-101.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-debuginfo-5.3.17-101.1 php53-debugsource-5.3.17-101.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): php53-debuginfo-5.3.17-101.1 php53-debugsource-5.3.17-101.1 References: https://www.suse.com/security/cve/CVE-2016-10158.html https://www.suse.com/security/cve/CVE-2016-10159.html https://www.suse.com/security/cve/CVE-2016-10160.html https://www.suse.com/security/cve/CVE-2016-10161.html https://www.suse.com/security/cve/CVE-2016-10166.html https://www.suse.com/security/cve/CVE-2016-10167.html https://www.suse.com/security/cve/CVE-2016-10168.html https://www.suse.com/security/cve/CVE-2016-7478.html https://bugzilla.suse.com/1019550 https://bugzilla.suse.com/1022219 https://bugzilla.suse.com/1022255 https://bugzilla.suse.com/1022257 https://bugzilla.suse.com/1022260 https://bugzilla.suse.com/1022263 https://bugzilla.suse.com/1022264 https://bugzilla.suse.com/1022265 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  7. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* GTX 1080 Founders Edition SLI Testing ( -at -) LanOC Reviews <https://lanoc.org/review/video-cards/7454-gtx-1080-founders-edition-sli-testing> *DESCRIPTION:* Well while I have the Crush project build apart I painted the two GTX 1080’s and after that, I had a little extra time. To fill that time I went ahead and put the two cards on our testbench and ran them through our standard test suite to see how they perform. I put all of the results together and today I’m tossing the up for anyone who wants to see how the 1080’s compare in SLI to a single GTX 1080, two RX 480’s, or two GTX 1070’s. As always with our SLI/Crossfire articles, it is mostly just the results with very little content beyond that, so you can use the information to form your own opinions. *ARTICLE URL:* https://lanoc.org/review/video-cards/7454-gtx-1080-founders-edition-sli-testing *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/gtx_1080_sli/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/gtx_1080_sli/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org MSN/Skype: wes ( -at -) lanoc.org Phone: 419-605-0828 ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  8. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Biostar Racing Z270GT4 Link: https://www.techpowerup.com/reviews/Biostar/Z270GT4 Brief: Everyone likes saving a buck or two on their technology purchases, and Biostar is all about providing you with those options. For all you mATX lovers on a budget who want a bit more for features, but not a bigger price, Biostar's Gaming Z170GT4 just might be exactly what you are looking for.
  9. Patriot LX Series micro SDXC Class 10 256 GB Flash Memory Review at Modders-Inc Display problems? View this newsletter in your browser. ( http://www.modders-inc.com/?email_id=307&user_id=837&urlpassed=W3ZpZXdfaW5fYnJvd3Nlcl9saW5rXQ%3D%3D&controller=stats&action=analyse&wysija-page=1&wysijap=subscriptions ) Modders-Inc.com We have a new review online and a post in your news would be greatly appreciated. Patriot LX Series micro SDXC Class 10 256 GB Flash Memory Review ( http://www.modders-inc.com/?email_id=307&user_id=837&urlpassed=aHR0cDovL3d3dy5tb2RkZXJzLWluYy5jb20vcGF0cmlvdC1seC1zZXJpZXMtbWljcm8tc2R4Yy1jbGFzcy0xMC0yNTYtZ2ItZmxhc2gtbWVtb3J5LXJldmlldy8%3D&controller=stats&action=analyse&wysija-page=1&wysijap=subscriptions ) Much like Mary Poppins bag of wonders, Patriot too has a method of fitting a substantial amount of goodness in a small space with the release of their 256GB LX Series SDXC class 10 memory card. Featuring an impressive 256GB of storage and boasting this as an “ultra high speed†card for QHD video production and high resolution photos. However, … Read more. ( http://www.modders-inc.com/?email_id=307&user_id=837&urlpassed=aHR0cDovL3d3dy5tb2RkZXJzLWluYy5jb20vcGF0cmlvdC1seC1zZXJpZXMtbWljcm8tc2R4Yy1jbGFzcy0xMC0yNTYtZ2ItZmxhc2gtbWVtb3J5LXJldmlldy8%3D&controller=stats&action=analyse&wysija-page=1&wysijap=subscriptions )
  10. TITLE: Creative Sound BlasterX Siege M04 Review ( -at -) Vortez CONTENT: The Creative Sound BlasterX team designed and built the Siege M04 from the ground up after spending many years researching the habits of gamers from all over the world. Internally, the Siege M04 has at its core the renowned PWM 3360 sensor which is supported by a fast 32bit MCU. It features an ergonomically designed shape suitable for palm grips, on-board memory, 7 programmable buttons including a sniper button/dpi toggle, and a fingerprint resistant surface with textured rubber grips at the sides. As it is 2017, this premium mouse also features Creative's Aurora Reactive (as seen on the Creative Sound BlasterX Katana) lighting that has 6 different lighting effects, and a total of 7 points where the RGB LED lighting can be customised. LINK: https://www.vortez.net/review.php?id=1271 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  11. openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0563-1 Rating: important References: #1013236 Cross-References: CVE-2016-5203 CVE-2016-5204 CVE-2016-5205 CVE-2016-5206 CVE-2016-5207 CVE-2016-5208 CVE-2016-5209 CVE-2016-5210 CVE-2016-5211 CVE-2016-5212 CVE-2016-5213 CVE-2016-5214 CVE-2016-5215 CVE-2016-5216 CVE-2016-5217 CVE-2016-5218 CVE-2016-5219 CVE-2016-5220 CVE-2016-5221 CVE-2016-5222 CVE-2016-5223 CVE-2016-5224 CVE-2016-5225 CVE-2016-5226 CVE-2016-9650 CVE-2016-9651 CVE-2016-9652 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. Description: This update to Chromium 55.0.2883.75 fixes the following vulnerabilities: - CVE-2016-9651: Private property access in V8 - CVE-2016-5208: Universal XSS in Blink - CVE-2016-5207: Universal XSS in Blink - CVE-2016-5206: Same-origin bypass in PDFium - CVE-2016-5205: Universal XSS in Blink - CVE-2016-5204: Universal XSS in Blink - CVE-2016-5209: Out of bounds write in Blink - CVE-2016-5203: Use after free in PDFium - CVE-2016-5210: Out of bounds write in PDFium - CVE-2016-5212: Local file disclosure in DevTools - CVE-2016-5211: Use after free in PDFium - CVE-2016-5213: Use after free in V8 - CVE-2016-5214: File download protection bypass - CVE-2016-5216: Use after free in PDFium - CVE-2016-5215: Use after free in Webaudio - CVE-2016-5217: Use of unvalidated data in PDFium - CVE-2016-5218: Address spoofing in Omnibox - CVE-2016-5219: Use after free in V8 - CVE-2016-5221: Integer overflow in ANGLE - CVE-2016-5220: Local file access in PDFium - CVE-2016-5222: Address spoofing in Omnibox - CVE-2016-9650: CSP Referrer disclosure - CVE-2016-5223: Integer overflow in PDFium - CVE-2016-5226: Limited XSS in Blink - CVE-2016-5225: CSP bypass in Blink - CVE-2016-5224: Same-origin bypass in SVG - CVE-2016-9652: Various fixes from internal audits, fuzzing and other initiatives The default bookmarks override was removed. The following packaging changes are included: - Switch to system libraries: harfbuzz, zlib, ffmpeg, where available. - Chromium now requires harfbuzz >= 1.3.0 Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2016-1496=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-55.0.2883.75-2.1 chromium-55.0.2883.75-2.1 References: https://www.suse.com/security/cve/CVE-2016-5203.html https://www.suse.com/security/cve/CVE-2016-5204.html https://www.suse.com/security/cve/CVE-2016-5205.html https://www.suse.com/security/cve/CVE-2016-5206.html https://www.suse.com/security/cve/CVE-2016-5207.html https://www.suse.com/security/cve/CVE-2016-5208.html https://www.suse.com/security/cve/CVE-2016-5209.html https://www.suse.com/security/cve/CVE-2016-5210.html https://www.suse.com/security/cve/CVE-2016-5211.html https://www.suse.com/security/cve/CVE-2016-5212.html https://www.suse.com/security/cve/CVE-2016-5213.html https://www.suse.com/security/cve/CVE-2016-5214.html https://www.suse.com/security/cve/CVE-2016-5215.html https://www.suse.com/security/cve/CVE-2016-5216.html https://www.suse.com/security/cve/CVE-2016-5217.html https://www.suse.com/security/cve/CVE-2016-5218.html https://www.suse.com/security/cve/CVE-2016-5219.html https://www.suse.com/security/cve/CVE-2016-5220.html https://www.suse.com/security/cve/CVE-2016-5221.html https://www.suse.com/security/cve/CVE-2016-5222.html https://www.suse.com/security/cve/CVE-2016-5223.html https://www.suse.com/security/cve/CVE-2016-5224.html https://www.suse.com/security/cve/CVE-2016-5225.html https://www.suse.com/security/cve/CVE-2016-5226.html https://www.suse.com/security/cve/CVE-2016-9650.html https://www.suse.com/security/cve/CVE-2016-9651.html https://www.suse.com/security/cve/CVE-2016-9652.html https://bugzilla.suse.com/1013236 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  12. openSUSE Security Update: Security update of chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0565-1 Rating: important References: #1022049 Cross-References: CVE-2017-5006 CVE-2017-5007 CVE-2017-5008 CVE-2017-5009 CVE-2017-5010 CVE-2017-5011 CVE-2017-5012 CVE-2017-5013 CVE-2017-5014 CVE-2017-5015 CVE-2017-5016 CVE-2017-5017 CVE-2017-5018 CVE-2017-5019 CVE-2017-5020 CVE-2017-5021 CVE-2017-5022 CVE-2017-5023 CVE-2017-5024 CVE-2017-5025 CVE-2017-5026 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 21 vulnerabilities is now available. Description: Google chromium was updated to 56.0.2924.87: * Various small fixes * Disabled option to enable/disable plugins in the chrome://plugins - Changed the build requirement of libavformat to library version 57.41.100, as included in ffmpeg 3.1.1, as only this version properly supports the public AVStream API 'codecpar'. It also contains the version update to 56.0.2924.76 (bsc#1022049): - CVE-2017-5007: Universal XSS in Blink - CVE-2017-5006: Universal XSS in Blink - CVE-2017-5008: Universal XSS in Blink - CVE-2017-5010: Universal XSS in Blink - CVE-2017-5011: Unauthorised file access in Devtools - CVE-2017-5009: Out of bounds memory access in WebRTC - CVE-2017-5012: Heap overflow in V8 - CVE-2017-5013: Address spoofing in Omnibox - CVE-2017-5014: Heap overflow in Skia - CVE-2017-5015: Address spoofing in Omnibox - CVE-2017-5019: Use after free in Renderer - CVE-2017-5016: UI spoofing in Blink - CVE-2017-5017: Uninitialised memory access in webm video - CVE-2017-5018: Universal XSS in chrome://apps - CVE-2017-5020: Universal XSS in chrome://downloads - CVE-2017-5021: Use after free in Extensions - CVE-2017-5022: Bypass of Content Security Policy in Blink - CVE-2017-5023: Type confusion in metrics - CVE-2017-5024: Heap overflow in FFmpeg - CVE-2017-5025: Heap overflow in FFmpeg - CVE-2017-5026: UI spoofing. Credit to Ronni Skansing - Enable VAAPI hardware accelerated video decoding. - Chromium 55.0.2883.87: * various fixes for crashes and specific wesites * update Google pinned certificates Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2017-272=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-56.0.2924.87-5.1 chromium-56.0.2924.87-5.1 References: https://www.suse.com/security/cve/CVE-2017-5006.html https://www.suse.com/security/cve/CVE-2017-5007.html https://www.suse.com/security/cve/CVE-2017-5008.html https://www.suse.com/security/cve/CVE-2017-5009.html https://www.suse.com/security/cve/CVE-2017-5010.html https://www.suse.com/security/cve/CVE-2017-5011.html https://www.suse.com/security/cve/CVE-2017-5012.html https://www.suse.com/security/cve/CVE-2017-5013.html https://www.suse.com/security/cve/CVE-2017-5014.html https://www.suse.com/security/cve/CVE-2017-5015.html https://www.suse.com/security/cve/CVE-2017-5016.html https://www.suse.com/security/cve/CVE-2017-5017.html https://www.suse.com/security/cve/CVE-2017-5018.html https://www.suse.com/security/cve/CVE-2017-5019.html https://www.suse.com/security/cve/CVE-2017-5020.html https://www.suse.com/security/cve/CVE-2017-5021.html https://www.suse.com/security/cve/CVE-2017-5022.html https://www.suse.com/security/cve/CVE-2017-5023.html https://www.suse.com/security/cve/CVE-2017-5024.html https://www.suse.com/security/cve/CVE-2017-5025.html https://www.suse.com/security/cve/CVE-2017-5026.html https://bugzilla.suse.com/1022049 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  13. MSI Z270 Gaming M7 Motherboard Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=ca6b02d5a4&e=872093acb5 http://www.kitguru.net MSI Z270 Gaming M7 Motherboard Review MSI’s Gaming motherboard range, signified by the MSI Dragon, has proven very popular since it was first introduced . MSI’s recent lineup has consisted of an M3, M5 and M7, with the M7 being the top of the Gaming series – second in MSI’s Z270 portfolio only to XPower. Today we put MSI’s Z270 Gaming M7 on test to see what MSI’s high-end gaming motherboard has to offer. Read the review here: http://www.kitguru.net/components/motherboard/ryan-martin/msi-z270-gaming-m7-motherboard-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=ca6b02d5a4&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  14. Calyos may also produce stand-alone loop heat pipe coolers ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=564bde27bf&e=872093acb5 http://www.kitguru.net Calyos may also produce stand-alone loop heat pipe coolers By now you have probably seen some of the coverage from our visit to Calyos HQ in Brussels, Belgium. What we want to focus on today, though, is the NSG-S0 – a chassis with integrated cooling for your CPU and graphics card. What makes the NSG-S0 special is the fact that it is completely fanless, and thus completely silent. Read the review here: http://www.kitguru.net/components/cooling/dominic-moass/kitguru-looks-at-the-calyos-nsg-s0-fanless-chassis/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=564bde27bf&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  15. Calyos may also produce stand-alone loop heat pipe coolers ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=564bde27bf&e=872093acb5 http://www.kitguru.net Calyos may also produce stand-alone loop heat pipe coolers By now you have probably seen some of the coverage from our visit to Calyos HQ in Brussels, Belgium. What we want to focus on today, though, is the NSG-S0 – a chassis with integrated cooling for your CPU and graphics card. What makes the NSG-S0 special is the fact that it is completely fanless, and thus completely silent. Read the review here: http://www.kitguru.net/components/cooling/dominic-moass/kitguru-looks-at-the-calyos-nsg-s0-fanless-chassis/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=564bde27bf&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  16. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : shadow Version : 4.1.5.1-1+deb7u1 CVE ID : CVE-2017-2616 Debian Bug : 855943 Tobias Stoeckmann discovered that su does not properly handle clearing a child PID. A local attacker can take advantage of this flaw to send SIGKILL to other processes with root privileges, resulting in denial of service. For Debian 7 "Wheezy", these problems have been fixed in version 4.1.5.1-1+deb7u1. We recommend that you upgrade your shadow packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJYs2TMAAoJEPZk0la0aRp92h4P/AiI4RyMXC+6zWLWSNeAC2nM ubVHSCqJ0X+Ywn4YB0qm88BIni+xXFoZUuQS01qXW3vPPn2xLdR5apSwMAfhRyE6 NJAKQQplSARx33l5gdT+S1f2lqiga64OHeGq8cAXmV8LYL2xrfGf8ZjzRt3pS1fP 3vH17QfLEKlMVCN07ZeSu/lOQ8nPA5KKdpQg7NUfiheJT0TxdTch4zhDPEgwu3hr Ll/BSakluZiPUyQ7wMb/EwQcas64/5W/GE71FqDSi71vWZC0cijjxAx+ilcNCy4U zSHRVq+m35JiCyr5h2CEwWIef/Ot4kwdOPoGUP8zeYt8Stm5jsmSW7o1JFyiHq9d OaFi6+oWAJwVT3Mwra9+Gju2PL6BIuqiaeG1CZEpnWDnlZaMNsSf0wl0jnzzttFy qo+pX4rFbCqVUanf92ppNkFKQo0GNbyrRUA/DglXpctlD6K9y+GagV1ZF1RIHIjR eQlXgK5Uyx1F79SGupkZf/aHRJxgjd+lnPJR6mKOCfhazHLY7aQxU/JsS2BidVUn v91V4+tIHGHDoXfZom2EhLPKZTINgdhLQnzgr1ReOLZTS8jlG44VpBeDaGNak2f2 FVNu/oZfw/1QeEM1nov3Cjg9h1ZJhYH57d5ZphaOPUaoeG67Um275uFkEizEc9gI cLdDVx0wfRF5eLoTbaOV =ydYJ -----END PGP SIGNATURE-----
  17. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Trying The SteamVR Beta On Linux Feels More Like An Early Alpha ( -at -) Phoronix Direct Link: http://www.phoronix.com/scan.php?page=article&item=steamvr-linux-beta&num=1 Summary: "This past week Valve brought SteamVR on Linux into public beta. With watching the constant hype around VR on Windows, I was quite excited to finally give VR a try with having lined up an HTC Vive for testing and currently Oculus or others not offering current Linux support. I was thinking that I would have some large GPU/driver comparisons and such completed this weekend, but once actually setting up the hardware and software, I realized that wasn't going to be feasible in such short time. So for those interested in the Linux VR space, here are some of my first impressions and why I would consider the current SteamVR more like an alpha release than beta, just yet another struggle Linux gamers face, and another obstacle to overcome if Linux is to be a more serious competitor to Windows in the gaming space." Please feel free to contact us with any questions or comments you may
  18. -------- TESORO EXCALIBUR SE SPECTRUM MECHANICAL KEYBOARD REVIEW ( -at -) APH NETWORKS ------------------------------------------------------------ Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Tesoro Excalibur SE Spectrum Mechanical Keyboard Review ( -at -) APH Networks * Description: The Tesoro Excalibur SE Spectrum is not a keyboard you can easily show off at a LAN party when it comes to bling, but it is definitely a durable product with substance you can enjoy for a long time. * Link: http://aphnetworks.com/reviews/tesoro-excalibur-se-spectrum * Image: http://aphnetworks.com/review/tesoro-excalibur-se-spectrum/004.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  19. news

    SCALE 15x Tutorials

    With only a few days left until SCALE 15x kicks off, now is a great time to remind ourselves about some of the educational sessions on tap this week. Each class has prerequisites so please come prepared. Thursday: Ignite Workshop helps those wanting to improve their presentation skills to deliver a concise, effective talk. Join us on Thursday and brush up those public speaking talents. One class member will be selected to speak during UpSCALE on Saturday night. http://www.socallinuxexpo.org/scale/15x/presentations/ignite-workshop?utm_source=phplist161&utm_medium=email&utm_content=text&utm_campaign=SCALE+15x+Tutorials Friday: Take your Docker project to the next level through Container deployment, scaling, and orchestration with Docker Swarm. Attendees will gain a deep understanding of the Docker native orchestration abilities provided by SwarmKit, both in theory and in practice. http://www.socallinuxexpo.org/scale/15x/presentations/container-deployment-scaling-and-orchestration-docker-swarm?utm_source=phplist161&utm_medium=email&utm_content=text&utm_campaign=SCALE+15x+Tutorials Friday: Intro to Kubernetes will show you how to deploy, scale, update, and manage container-based solutions using Kubernetes. Hands-on instruction and examples are provided. http://www.socallinuxexpo.org/scale/15x/presentations/intro-kubernetes-hands-workshop?utm_source=phplist161&utm_medium=email&utm_content=text&utm_campaign=SCALE+15x+Tutorials Friday: If you would like to improve the quality and security of your code – and who wouldn’t – join the Improving security and reliability with libFuzzer and OSS-Fuzz tutorial. Familiarity with a UNIX shell and C/C++ is a must. http://www.socallinuxexpo.org/scale/15x/presentations/improving-security-and-reliability-libfuzzer-and-oss-fuzz?utm_source=phplist161&utm_medium=email&utm_content=text&utm_campaign=SCALE+15x+Tutorials Saturday/Sunday: Linux Installfest and Beginner Training will be held both March 3rd & 4th. Come early to get a seat and bring a computer capable of meeting the class requirements. Details: http://www.socallinuxexpo.org/scale/15x/presentations/linux-installfest-and-beginner-training-0?utm_source=phplist161&utm_medium=email&utm_content=text&utm_campaign=SCALE+15x+Tutorials --
  20. <http://www.eteknix.com> Cougar Immersa Vs Megara Headset Head-to-Head Review Gaming headsets are not created equally, they come in all kinds of shapes, sizes, colours, with varying ranges of features, performance and so much more. With that in mind, today we want to put two headsets from Cougar head-to-head, not to find out which one is the best of the two, but to find out what each of them is best or worst at, and hopefully help you pick which one is best suited to your needs. URL - http://www.eteknix.com/cougar-immersa-vs-megara-headset-head-head-review/ --
  21. <http://www.eteknix.com> Synology DiskStation Manager (DSM) 6.1 Review When it comes to reviews, I am mostly doing hardware based reviews, and while my regular NAS reviews show a lot of the software too, they don't go into that much detail. Today is different as I'll be taking a closer look at Synology's latest DSM version, 6.1. The new Synology DSM 6.1 was in the final Release Candidate state when I started this review and at the time it's published, DSM 6.1 will be live <https://www.synology.com/en-us/dsm/6.1> . URL - http://www.eteknix.com/synology-diskstation-manager-dsm-6-1-review/ --
  22. <http://www.eteknix.com> Roccat Suora FX Mechanical Gaming Keyboard Review Roccat is one of the coolest names in the peripherals market, having created many truly fantastic headsets, keyboards and mice over the years. Now they're back again with their slick new Suora FX gaming keyboard, which packs in mechanical switches, RGB lighting, macro engine, and all the other usual high-end thrills you would expect from a competitive gaming keyboard. URL - http://www.eteknix.com/roccat-suora-fx-mechanical-gaming-keyboard-review/ --
  23. CentOS Errata and Security Advisory 2017:0323 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0323.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 019a5946e25b89c2d0ee356e588f0fa0899a8e0742d7fb54ff075c8ba2085d41 kernel-2.6.18-419.el5.i686.rpm 04999d388f09b47faad898788ddb48706ae83e941ba8d4f8b3d0922b0d757937 kernel-debug-2.6.18-419.el5.i686.rpm bce1ad740f84730eac3e6ad8153c4748e45485fea938ddcb512c8fab5200bec6 kernel-debug-devel-2.6.18-419.el5.i686.rpm 2029c432d99fb27611918b74a087d4280b13d5b08a80211b30fb7d61ee6b427f kernel-devel-2.6.18-419.el5.i686.rpm 44c69f8dc8622d48b018ca658b6ffebb2ab9a4bde2e2ab996bf55c8395c32bb4 kernel-doc-2.6.18-419.el5.noarch.rpm f50709be8b7678576e31dd4f0be48a56373ea9dff41de1518f1f1a72344487a4 kernel-headers-2.6.18-419.el5.i386.rpm a95b656d0a233a9c65b503524ae9153052ca16f1932140e7d8bd0a5a9d020969 kernel-PAE-2.6.18-419.el5.i686.rpm 913b066902e9a694cd8dacfed10cccad3828ea117705df72b31c44e0174f534e kernel-PAE-devel-2.6.18-419.el5.i686.rpm 1df361995538b14778060829f9bdc2506b91fe56135570e53f0b6c8d348998ab kernel-xen-2.6.18-419.el5.i686.rpm 626c4071b7811031ed605c17e54fd1185765d38d2912bf377a23d3486836e729 kernel-xen-devel-2.6.18-419.el5.i686.rpm x86_64: 6c4558babe0b37022c1999231ad64116767001ef414bd8b65d66918a56dcaed1 kernel-2.6.18-419.el5.x86_64.rpm e7dec9fb687ef00bb29351361e7e5365b324046a9223f8fe363a809f6344c597 kernel-debug-2.6.18-419.el5.x86_64.rpm 687f5550c5a35526c37f213f303b635078e9cdfa13534a84f7be88d2d37b5954 kernel-debug-devel-2.6.18-419.el5.x86_64.rpm dd57d4ca8c328a0701a4bdf2c571ba16d28cfadfda4d7329a1d89b74d2a45f1b kernel-devel-2.6.18-419.el5.x86_64.rpm 44c69f8dc8622d48b018ca658b6ffebb2ab9a4bde2e2ab996bf55c8395c32bb4 kernel-doc-2.6.18-419.el5.noarch.rpm ab01f7fe8a199ec0debbbe8ee672eb3d9ad7191305b75d5b4afdff957b15f569 kernel-headers-2.6.18-419.el5.x86_64.rpm f846028137b73dc155e20b78ad9726ed54936ca4953743cad43d35907229962a kernel-xen-2.6.18-419.el5.x86_64.rpm 1f37799de9f2a3910ce1ca37be50b325943e9842051a633e6ba1d041ac784dd9 kernel-xen-devel-2.6.18-419.el5.x86_64.rpm Source: c37156be43391a11612a558e2b9732fdf37da0002d0eeb0d4aecd57bcd497cce kernel-2.6.18-419.el5.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
  24. TITLE: AZIO ARMATO Review ( -at -) Vortez CONTENT: Inside they have chosen to use the quiet/tactile Cherry MX Brown switches accompanied by red LED lighting and a selection of lighting effects. So it would seem that Azio are targeting those that consider LED back-lighting as a purely functional, no-nonsense feature. The red LED lighting is then set against a black anodized brushed aluminium top plate, that is then matched with a striking red mesh spanning from side-to-side. Despite its minimalistic design ethic, the Armato affords the gamer a selection of dedicated macro keys, media keys, FN commands, along with 100% anti-ghosting, ensuring that this keyboard provides competitive performance. LINK: https://www.vortez.net/review.php?id=1270 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  25. TITLE: AZIO ARMATO Review ( -at -) Vortez CONTENT: Inside they have chosen to use the quiet/tactile Cherry MX Brown switches accompanied by red LED lighting and a selection of lighting effects. So it would seem that Azio are targeting those that consider LED back-lighting as a purely functional, no-nonsense feature. The red LED lighting is then set against a black anodized brushed aluminium top plate, that is then matched with a striking red mesh spanning from side-to-side. Despite its minimalistic design ethic, the Armato affords the gamer a selection of dedicated macro keys, media keys, FN commands, along with 100% anti-ghosting, ensuring that this keyboard provides competitive performance. LINK: https://www.vortez.net/review.php?id=1270 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
×