Archive for November, 2011
Please join with me in 2 minutes silence today at 11:00am (11th hour of the 11th day of the 11th month of the year 2011) to remember those who made the ultimate sacrifice for our country.
Remembrance Day (also known as Poppy Day and Armistice Day) is a memorial day observed in Commonwealth countries since the end of World War I to remember the members of their armed forces who have died in the line of duty. This day, or alternative dates, are also recognised as special days for war remembrances in many non-Commonwealth countries. Remembrance Day is observed on 11 November to recall the official end of World War I on that date in 1918; hostilities formally ended “at the 11th hour of the 11th day of the 11th month” of 1918 with the German signing of the Armistice (“at the 11th hour” refers to the passing of the 11th hour, or 11:00 a.m.)
The day was specifically dedicated by King George V on 7 November 1919 as a day of remembrance of members of the armed forces who were killed during World War I. This was possibly done upon the suggestion of Edward George Honey to Wellesley Tudor Pole, who established two ceremonial periods of remembrance based on events in 1917.
The red remembrance poppy has become a familiar emblem of Remembrance Day due to the poem “In Flanders Fields“. These poppies bloomed across some of the worst battlefields of Flanders in World War I, their brilliant red colour an appropriate symbol for the blood spilled in the war.
Wikipedia article: http://en.wikipedia.org/wiki/Remembrance_Day
Anyone watching James Bond or 1950′s war documentaries may be led to believe that in order to receive useful intelligence, a foreign agency or home-grown threat needs a network of all-charming, ever-discreet spies. Well, you’d be wrong. The chances are – you’re already feeding them all of the information they need via your social media profiles.
Foreign Governments and terrorist cells no longer have a need to hack into secure systems for information, as they – and you for that matter – can get everything they need completely legally. This alarming wake-up call comes courtesy of Data Defender Ltd, a London-based data protection agency who are battling the war against cyber attacks.
Graeme Batsman, the company’s Security Director, explains how we’re all at fault:
“Let me give you an example – say a foreign Government want details on the numbers, skills and location of a certain aspect of the British Military. All they need to do is get onto Facebook, LinkedIn and Twitter”, says Graeme. He expands “For example, on LinkedIn there’s a group dedicated to Royal Marine Personnel – from that you can get a list of names as well as their rank, where they studied, their unit and photo. The next stop is over to Facebook to find out their location, religious beliefs, political party memberships and spouse’s name, often without being a friend. When you’re armed with this, a quick search for them on Twitter is likely to reveal exactly what their up to – as members of the Armed Forces are known to regularly post their location, even while on a foreign tour of duty”.
It’s highly likely that foreign authorities have teams that are dedicated to sifting through and researching such information on social media websites to enhance their foreign military statistics. It’s all laid out in front of them, has no cost and is one hundred percent legal; so why not? One example is China, with over 2 million military members – and huge teams dedicated to cyber intelligence and rumoured to engage in cyber warfare.
However, the other worry is terrorists, both in the UK and abroad. Many have already been shut down for using social media to find and target soldiers for kidnapping. As soon as they have their name through LinkedIn they can head to the free online BT Phone Directory to get their home address. That’s all that they need, and they got it free, legally and in less than 30 minutes.
The point that Graeme Batsman and his team are trying to get across is that anyone should think twice before posting even the most minor of details online, particularly if they hold a Government or Defence-based job.
“It takes just the smallest clues to help contribute to their wider plan. Even a name or a company address is fodder for these guys to advance and find out more. We urgently advise everyone to practise vigilance and integrity when using social media”, says Graeme.
6306 different keyphrases were used to find my site in October 2011, here are the top 10 with the amount of times they were used plus their overall usage percentage. As you can see my “Minecraft” posts played a keypart in driving traffic to this site. If you fancy checking out my minecraft server YAMS short for ”Yet Another Minecraft Server” you can signup at the forums here (http://www.darrenstraight.com/minecraft) and get yourself whitelisted, we are an ever increasing Minecraft Community and we are certainly proud of being a family friendly Minecraft server.
|6306 different keyphrases||Search||Percent|
|desperate dan||368||2.7 %|
|there was an error opening this document. access denied||301||2.2 %|
|minecraft demo download||227||1.6 %|
|yet another minecraft server||155||1.1 %|
|yams minecraft||153||1.1 %|
|excel 2010 easter egg||133||0.9 %|
|minecraft beta 1.8 download||117||0.8 %|
|minecraft demo||99||0.7 %|
|easter egg excel 2010||94||0.6 %|
|super mario||94||0.6 %|
|Other phrases||11706||87 %|
Epic Games, Inc., creators of the billion-dollar “Gears of War” franchise and the award-winning Unreal Engine 3, announce Make Something Unreal Live, an independent game development competition co-sponsored by Train2Game, the UK’s premier game development distance learning resource. This unprecedented event will take place over the course of six months and culminate in a spectacular real-time conclusion at Gadget Show Live 2012, the premier consumer show taking place from April 11-15, 2012 in Birmingham, UK. The winner of Make Something Unreal Live will receive a commercial Unreal Engine 3 license for iOS.
Winners of the Train2Game and Epic Game Jam, happening November 4-6 at the University of Bedfordshire, will compete in the event next April. In both competitions, all games will be developed for iOS devices using Epic’s Unreal Development Kit (UDK), the free edition of Unreal Engine 3 which has been installed on more than 1 million unique machines.
Following this week’s game jam, development teams will benefit from a six-month incubation period in which a range of senior industry veterans will nurture projects by reviewing key milestones, providing guidance and shaping scope. During this time, talent will prepare for the final showdown at the Gadget Show Live, where more than 100,000 attendees will watch them bring to life Unreal Engine 3-powered creations in real time.
“We are looking forward to working with Epic Games and Train2Game to bring a completely new element into the Games Zone at GSL 2012,” said Gadget Show Live Event Director Matt Hodgins. “A huge number of our visitors are into gaming, and will undoubtedly be excited to see how new games are developed and brought to life at the event.”
“Once they’re out there in the real world, our students will flourish based on their ability to create fantastic experiences under pressure,” said Train2Game Course Director, Tony Bickley, “this is one of the best opportunities they’ve had so far to prove themselves and create something they can be proud of that will springboard their burgeoning careers in gaming.”
“In a mere five days, these developers will kickstart their careers in an intense competition that will ultimately result in one team walking away a professional studio, with a full source Unreal Engine 3 license for iOS in hand,” said Mike Gamble, European territory manager, Epic Games.
Epic Games is known for its legendary Make Something Unreal Contest game development competitions, which utilize the Unreal Engine 3 toolset and reward grand prize winners with a commercial license granting full access to Epic’s high-end game engine technology. The $1 Million Intel Make Something Unreal Contest concluded in 2010, with multiple teams going on to release commercial games based on projects made for the competition. Developed by grand prize-winning team KTX Software and published by THQ, “The Haunted: Hells Reach” was released for PC on October 24.
Tickets for The Gadget Show Live are now on sale at www.gadgetshowlive.net.
Vulnerability researchers are being invited by Secunia, the leading provider of vulnerability intelligence and vulnerability management tools, to participate in a new programme launched today under which Secunia, independently of any software vendor, will confirm vulnerability discoveries and handle coordination with the vendor on the researchers’ behalf.
The programme, entitled The Secunia Vulnerability Coordination Reward Programme (SVCRP) is open to any researcher who has discovered vulnerability in any software and would like a third party to confirm their findings and handle the co-ordination process with the software vendor for them. As part of the programme, Secunia will offer rewards to researchers who contact them with vulnerabilities they have found and who wish Secunia to coordinate them with the vendor. This comprehensive programme is designed to be complementary to those run by other organisations and will cover all vulnerabilities as long as they meet Secunia’s criteria.
Carsten Eiram, Chief Security Specialist at Secunia, explains, “The fun part of vulnerability research is the actual process of discovering and understanding the vulnerabilities as well as creating proof of concepts or exploits; and not the sometimes extensive coordination and liaison process that follows with the vendor in order to fix the problem. Under the new programme we will both confirm vulnerability discoveries and handle the coordination process, allowing researchers to focus on the more exciting aspects of vulnerability research.”
Information on the SCVRP is available at http://secunia.com/community/research/svcrp
He continued, “Other major vulnerability coordination offerings exist but most have a business model wrapped around them. SVCRP is designed to be a complementary service to these. Most other schemes pay researchers for their discoveries, and, while these offerings are excellent for researchers, the companies are, naturally, very selective in which vulnerabilities they wish to purchase and coordinate. This leaves a huge gap for researchers, who either do not want to sell their vulnerabilities or discover vulnerabilities not fulfilling the requirements of the existing initiatives, but who would still like an independent third party to confirm their discoveries and handle coordination.
Some of these researchers have in the past turned to Secunia for help on an informal basis and we now want to encourage even more researchers to allow us to help coordinate their vulnerability discoveries by providing this reward incentive.”
The main benefit to independent researchers is that Secunia offers the expertise to assess and validate the vulnerability, and saves them time and effort in coordinating directly with the vendor to fix the vulnerability, thus allowing them to deal with other priorities as well as giving added weight to their findings.
Benefits to vendors include the fact that vulnerability discoveries from the researchers will be confirmed in great detail by Secunia to determine the core problem in the code. As a result, vendors will receive very precise information about the vulnerability, and Secunia will also work with them to find a complete fix, providing feedback and helping them confirm that their new patches are properly addressing the vulnerabilities prior to release. This should mean quicker investigation and thorough fix of the software problem. In addition, both researchers and vendors will benefit from having a trusted and independent third party such as Secunia to act as an intermediary.
Users will benefit since, as Secunia is able to undertake comprehensive and extensive coordination of vulnerabilities discovered by the researcher, there is likely to be an increase in the number being coordinated with the vendor. This should in turn lead to a greater number of complete solutions to software problems, ultimately leading to more reliable software and therefore more efficient working.
All classes of vulnerability across most products are eligible for the SVCRP programme as long as the following criteria are met:-
- The vulnerability affects a stable product
- The vulnerability affects the latest version of the product
- The product is actively supported by the vendor
- The vulnerability is not already publicly known
- Secunia Research is able to confirm the reported vulnerability.
No Secunia customers will receive any advance notification about the vulnerabilities coordinated by Secunia, whether they are internal discoveries or vulnerabilities coordinated via this reward incentive. All customers, as well as the community at large, will receive the information simultaneously when the Secunia advisory is published. Researchers will continue to receive any payments to which they are entitled from vendors for coordinating vulnerabilities. Secunia will confirm the vulnerabilities through testing in their extensive and independent laboratory testing facilities, but will not receive any money or other reward from vendors either for confirming or for coordinating the vulnerability on behalf of the researcher.
The rewards on offer will range from top-of-the range merchandise to two major annual rewards such as free hotel accommodation and entry to an IT security conference chosen from a list of the most popular global security conferences. The latter rewards will be given for the first time in January 2012. One reward will be given to the researcher who coordinates the most interesting vulnerability as judged by Secunia in the form of a prize under the Most Interesting Coordination Report category. Criteria will include complexity, impact, level and level of detail. The other will be given to the researcher who has been consistently coordinating correct, clearly detailed vulnerability reports that are quick and easy to confirm as judged by Secunia. The researcher will be given the title, ‘Most Valued Contributor’ by Secunia. Other rewards will be continuously given to researchers coordinating their discoveries through Secunia based on their individual performance.
There is no charge or enrolment process for researchers to participate in the programme, which forms part of several initiatives from Secunia to benefit the community.
Believe it or not, at this moment in time there’s a Minecraft Clone called Crafted on the Apple App Store, the game is a cross between Minecraft and Terraria, in the sense that it’s basically Minecraft but in 2D and it can be yours 69p / 99c.
I’ve added some screenshots below that I’ve taken. I wonder if anything will be filled (Lawsuit) against this as infringement of copyright or if Mojang will embrace this. This is what the creator of Crafted has to say, quoted from the Minecraft forums and he main website/blog located at http://craftedpixels.wordpress.com/
Additional Information for Mojang AB: If you want this game to get removed, drop me a line and I will remove it immediately. Thanks. Every texture is redrawn by me (although they seem ripped off), and the sounds are from freesound.org.
Updated 21:40: Latest news from Domp, the creator/developer of Crafted.
Everyone is complaining about the textures of Crafted. Although they are all remade by me, it still looks like they are stolen from minecraft. I’m honest, I don’t like this.
I’m going to change all ripped-off textures from Crafted so it won’t look like a complete ripoff. After that, Crafted will be a complete new looking game. Please understand that this will take 1 or 2 days.