Valkyria Revolution trades in cult-classic status for wasted promise

Dynasty Warriors-inspired follow-up is too simple and too broken.

Enlarge / Every so often, you get a flash of what the game was going for—and it could have been interesting!

Valkyria Revolution, despite its name and approximately similar art style, isn’t really a sequel to 2008’s incredible Valkyria Chronicles (or its slightly less incredible PSP sequels). In tone and gameplay, the differences between the two series are night and day, and Revolution looks considerably poorer for the comparison.

The new game, like its predecessors, takes place on the continent of "Europa"—shaped just like real-world Europe, but divided into fictional fantasy countries like Jutland and the Ruzi Empire. If you don’t recognize those two nations from Chronicles, that’s because Revolution takes place in an entirely new continuity.

That the sister series just happens to have nearly identical settings—as well as reuse terms like Valkyria and “ragnite”—is confusing and poorly justified. Taking control for the first time and meeting the game’s gang of barely introduced misfits didn’t do much to clear up why Valkyria Revolution needs to share so much DNA with its “predecessor.” My best, most cynical guess is that Valkyria Revolution was made to siphon off some of Chronicles’ cult status—not to mention the attention of fans still fiending for a true follow-up.

Read 21 remaining paragraphs | Comments

Black-hole mergers may reveal dark past of cannibalism

Voracious black holes can be distinguished from picky eaters.

Enlarge (credit: A. Bohn et al.)

Now that we can detect gravitational waves, a new generation of stargazers is turning its attention to the Universe and using observatories that can be disrupted by a passing rabbit. Gravitational-wave detectors are going to give us an entirely new view of our place in the cosmos.

As with all new techniques, we are still in the age of crude and not-very-sensitive. That means we can only search for the biggest and baddest of events: black-hole mergers. So far, LIGO has detected three and a half mergers—the third merger is right on the edge of the detection limit, so it is provisional. But those black holes have been larger than expected, which raises an intriguing question: is that their first merger, or have they grown through previous mergers?

Now (arXiv version) scientists have determined how to figure out if black holes are first-time cannibals or recidivist cannibals.

Read 14 remaining paragraphs | Comments

Microsoft bringing EMET back as a built-in part of Windows 10

The built-in exploit mitigations are getting stronger and easier to configure.

Enlarge / The new security analytics dashboard. (credit: Microsoft)

The Windows 10 Fall Creators Update will include EMET-like capabilities managed through a new feature called Windows Defender Exploit Guard.

Microsoft's EMET, the Enhanced Mitigation Experience Toolkit, was a useful tool for hardening Windows systems. It used a range of techniques—some built in to Windows, some part of EMET itself—to make exploitable security flaws harder to reliably exploit. The idea being that, even if coding bugs should occur, turning those bugs into actual security issues should be made as difficult as possible.

With Windows 10, however, EMET's development was essentially cancelled. Although Microsoft made sure the program ran on Windows 10, the company said that EMET was superfluous on its latest operating system. Some protections formerly provided by EMET had been built into the core operating system itself, and Windows 10 offered additional protections far beyond the scope of what EMET could do.

Read 6 remaining paragraphs | Comments

Scientists come up with neural mechanism—and possible fix—for chronic pain

Study in mice reveals how brain circuitry goes haywire after peripheral nerve damage.

Enlarge / Ow. (credit: Getty | Paul Bradbury)

Chronic, aching pain after an injury or operation may be all in your head. Researchers now think they’ve figured out exactly how brain wiring goes haywire to cause persistent pain—and how to fix it.

In mice with peripheral nerve damage and chronic pain from a leg surgery, a broken circuit in a pain-processing region of mammalian brains caused hyperactive pain signals that persisted for more than a month. Specifically, the peripheral nerve damage seemed to deactivate a type of interconnected brain cells, called somatostatin (SOM) interneurons, which normally dampen pain signals. Without the restraints, neurons that fire off pain signals—cortical pyramidal neurons—went wild, researchers report in Nature Neuroscience.

But the circuitry could be repaired, the researchers found. Just by manually activating those pain-stifling SOM interneurons, the researchers could shut down the rodents’ chronic pain and keep the system working properly—preventing centralized, chronic pain from ever developing.

Read 14 remaining paragraphs | Comments

OnePlus 5 is now shipping for $479 and up

OnePlus 5 is now shipping for $479 and up

Gone are the days when OnePlus relied on flash sales and invite systems to sell its smartphones. Just about a week after unveiling the OnePlus 5 and starting to take pre-orders, the company is now selling the phone outright. It’s available from the OnePlus website for $479 and up, and orders placed today are expected […]

OnePlus 5 is now shipping for $479 and up is a post from: Liliputing

OnePlus 5 is now shipping for $479 and up

Gone are the days when OnePlus relied on flash sales and invite systems to sell its smartphones. Just about a week after unveiling the OnePlus 5 and starting to take pre-orders, the company is now selling the phone outright. It’s available from the OnePlus website for $479 and up, and orders placed today are expected […]

OnePlus 5 is now shipping for $479 and up is a post from: Liliputing

Ohio Gov. Kasich’s website, dozens of others defaced using year-old exploit

“High risk” exploit patch was issued in May of 2016.

Enlarge

The official website of Ohio Governor John Kasich and the site of Ohio First Lady Karen Kasich were defaced on June 25 by a group calling itself Team System DZ. The group is a known pro-Islamic State "hacktivist" group that has repeatedly had its social media accounts suspended for posting IS propaganda videos and other activity. Kasich's site was but one of a number of state and local government websites that were hijacked by Team System DZ early this week, all of which had one thing in common: they were running on an outdated version of the DotNetNuke (DNN) content management platform.

DNN Platform is a popular content management system (particularly with state and local governments) based on Windows Server and the ASP.NET framework for Microsoft Internet Information Server. DNN Platform is open source and available for free—making it attractive to government agencies looking for something low cost that fits into their existing Windows Server-heavy organizations. A review of the HTML source of each of the sites attacked by Team System DZ showed that they were running a vulnerable version of the content management system DNN Platform—version 7.0, which was released in 2015.

A critical security update issued by DNN in May of 2016 warned that an attacker could exploit vulnerabilities to create new "superuser" accounts through the content management system, giving them unfettered remote access to modify websites. DNN urged customers to upgrade to the latest version of the software at the time. A May 2015 alert also warned that an attacker could use the software's Installation Wizard page for some server configurations to create new user accounts on the Windows Server host.

Read 4 remaining paragraphs | Comments

Walmart sued after teen steals machete and kills her Uber driver

Lawsuit: Walmart let teen steal weapons, pass security before killing driver.

Enlarge (credit: Mike Mozart / Flickr)

There has been a lot of media coverage about Uber driver misdeeds—drunk driving, drivers stealing from their passengers, and even cases of drivers murdering and raping customers. But Uber drivers can also be victims of their passengers.

The family of an Uber driver murdered on the job in Illinois is taking Walmart to court. In a Cook County lawsuit, (PDF) the family of driver Grant T. Nelson alleges that the retail giant was negligent when it allowed the murder suspect to steal a machete and a knife before walking past security personnel without being stopped. That was right before she hailed an Uber outside the Skokie store at 3am on May 30.

Moments after picking up the alleged thief—a 16-year-old girl named Eliza Wasni—police say the 37-year-old Nelson was stabbed to death by Wasni after exiting the Walmart parking lot.

Read 7 remaining paragraphs | Comments

Deals of the Day (6-27-2017)

Deals of the Day (6-27-2017)

TRENDnet’s TEW-828DRU is a tri-band wireless router with four gigabit Ethernet jacks (plus one Ethernet input), a USB 3.0 port and a USB 2.0 port that you can use to share files over a home network, and a dual-core 1 GHz processor. It typically sells for around $200, but today Newegg is selling this AC3200 […]

Deals of the Day (6-27-2017) is a post from: Liliputing

Deals of the Day (6-27-2017)

TRENDnet’s TEW-828DRU is a tri-band wireless router with four gigabit Ethernet jacks (plus one Ethernet input), a USB 3.0 port and a USB 2.0 port that you can use to share files over a home network, and a dual-core 1 GHz processor. It typically sells for around $200, but today Newegg is selling this AC3200 […]

Deals of the Day (6-27-2017) is a post from: Liliputing

Cox: Supreme Court Suggests That Pirates Shouldn’t Lose Internet Access

Last week the Supreme Court ruled that convicted sex offenders can’t be barred from social media, as that would violate their free speech rights. Internet provider Cox Communications argues that if this is the case, then pirating subscribers should certainly not be disconnected from the Internet solely based on copyright holder complaints.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

December 2015 a Virginia federal jury held Internet provider Cox Communications responsible for the copyright infringements of its subscribers.

The ISP refused to disconnect alleged pirates and was found guilty of willful contributory copyright infringement. In addition, it was ordered to pay music publisher BMG Rights Management $25 million in damages.

Cox has since filed an appeal and this week it submitted an additional piece of evidence from the US Supreme Court, stating that this strongly supports its side of the argument.

Last week the Supreme Court issued an important verdict in Packingham v. North Carolina, ruling that it’s unconstitutional to bar convicted sex offenders from social media. The Court described the Internet as an important tool for people to exercise free speech rights.

While nothing in the ruling refers to online piracy, it could turn out to be crucial in the case between Cox and BMG. The Internet provider now argues that if convicted criminals have the right to use the Internet, accused file-sharers should have it too.

“Packingham is directly relevant to what constitute ‘appropriate circumstances’ to terminate Internet access to Cox’s customers. The decision emphatically establishes the centrality of Internet access to protected First Amendment activity..,” Cox writes in its filing at the Court of Appeals.

“As the Court recognized, Internet sources are often ‘the principal sources for knowing current events, checking ads for employment, speaking and listening in the modern public square, and otherwise exploring the vast realms of human thought and knowledge’.”

Citing the Supreme Court ruling, Cox notes that the Government “may not suppress lawful speech as the means to suppress unlawful speech.” This would be the case if entire households lost Internet access because a copyright holder accused someone of repeated copyright infringements.

“The Court’s analysis strongly suggests that at least intermediate scrutiny must apply to any law that purports to restrict the ability of a class of persons to access the Internet,” ISP writes (pdf).

In its case against BMG, Cox was held liable because it failed to take appropriate action against frequent pirates, solely based on allegations of piracy monitoring outfit Rightscorp. Cox doesn’t believe these one-sided complaints should be enough for people to be disconnected from the Internet.

If convicted sex offenders still have the right to use social media, accused pirates should not be barred from the Internet on a whim, the argument goes.

“And if it offends the Constitution to cut off a portion of Internet access to convicted criminals, then the district court’s erroneous interpretation of Section 512(i) of the DMCA — which effectively invokes the state’s coercive power to require ISPs to terminate all Internet access to merely accused infringers — cannot stand,” Cox writes.

Whether the Court of Appeals will agree has yet to be seen, but with the stakes at hand this issue is far from resolved. In addition to the case between BMG and Cox, the MPAA recently filed a lawsuit against Grande Communications, which centers around the same issue.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Matthew Keys’ guilty verdict and sentence to stand, 9th Circuit rules

“Keys made the CMS far weaker by taking and creating new user accounts.”

Matthew Keys, seen here in 2016, before he was ordered to prison. (credit: Cyrus Farivar)

A federal appeals court has upheld the conviction and sentence of the California journalist who was found guilty under a federal anti-hacking law last year.

On Monday, the 9th US Circuit Court of Appeals ruled that it was not persuaded by arguments made by Matthew Keys’ defense attorneys. In a hearing earlier this month, his lawyers said that while their client may have handed over a username and password that resulted in a brief defacement of one Los Angeles Times article, this did not constitute actual "damage" as described in the Computer Fraud and Abuse Act.

As Ars reported earlier, Keys was accused of giving out a username and password for his former employer KTXL Fox 40's content management system (CMS) to members of Anonymous and instructing people there to "fuck some shit up." Ultimately, that December 2010 incident resulted in someone else using those credentials to alter a headline and sub-headline on a Los Angeles Times article. (Both Fox 40 and the Times are owned by the Tribune Media Company.) The changes lasted for 40 minutes before editors reversed them.

Read 6 remaining paragraphs | Comments