A new version of Xfire is available for download, bringing support for microblogging service Twitter and the lengthening list of compatible games.
For those who discover it, remember that Xfire is an instant messaging software designed for players who works under Windows environment.
Free and French, the application shows which contacts are online and see what game they are playing, to reach his contacts in part, to have access to details of a server, chat without leaving the game, chatting on a text or aloud, download the latest mods, patches and video presentations, to make screenshots and video captures, and create profiles with the automatic statistics for games.
In this grinding menu 1118, the management of microblogging service Twitter to post and read tweets from Xfire, the possibility of disseminating the microphone and the game simultaneously on Windows Vista and Windows 7 (for comment the current game for example), improving the provision in the options window and the resolution of a desire to connect to MSN after a change of password.
In addition, support for new video games, including Around the Word in 80 Days, Call of Duty: Modern Warfare 2, Championship Manager 2010, Dreamkiller Left 4 Dead 2, Manhunt 2, Mercenary Wars, Star Trek : DAC, Star Wars: The Force Unleashed and The Sims 3: World
Download Xfire
Sunday, December 6, 2009
Microsoft will fix Internet Explorer
Microsoft delivers a preview of its next Patch Tuesday with an update bound for all versions of Internet Explorer and for all supported versions of Windows.
Publication of exploit code requires a security vulnerability affecting Internet Explorer Web browser has done much talk in recent days. This vulnerability is present in a reference pointer invalid IE. It is possible to access an object CSS / Style after it has been deleted. The vulnerability can be exploited to execute arbitrary code remotely.
In his explanations forced Microsoft had made it clear that only versions 6 and 7 of Internet Explorer are vulnerable to the operating systems Windows 2000, Windows XP and Windows Vista. The notice of Microsoft security has not changed at this level, however, Tuesday, December 8 update will also meet at least a vulnerability in IE8 and Windows 7 included. We must therefore conclude that this is another problem that the "spread on the public square."
For the month of December, six security bulletins will be published to fill a total of twelve vulnerabilities in Windows, Microsoft Office and Internet Explorer so. Three ballots will be marked critical and three important.
Publication of exploit code requires a security vulnerability affecting Internet Explorer Web browser has done much talk in recent days. This vulnerability is present in a reference pointer invalid IE. It is possible to access an object CSS / Style after it has been deleted. The vulnerability can be exploited to execute arbitrary code remotely.
In his explanations forced Microsoft had made it clear that only versions 6 and 7 of Internet Explorer are vulnerable to the operating systems Windows 2000, Windows XP and Windows Vista. The notice of Microsoft security has not changed at this level, however, Tuesday, December 8 update will also meet at least a vulnerability in IE8 and Windows 7 included. We must therefore conclude that this is another problem that the "spread on the public square."
For the month of December, six security bulletins will be published to fill a total of twelve vulnerabilities in Windows, Microsoft Office and Internet Explorer so. Three ballots will be marked critical and three important.
Silent Hunter 5 resurfaced in image / video
Through a long message on the official game forums, a community leader of Ubisoft Bucharest has come on technical developments implemented by developers on Silent Hunter 5. The information and data focus primarily on the number of polygons used to represent a particular scene, a particular vessel.
It is also about the quality of textures or interiors of submarines, but also news in the rendering of water and much better environmental management. Thus, developers have a true integrated management system of dynamic meteorology, which depends on the climatic zone, the sea state and season! As interesting as they are for the expert, these details do not necessarily speak for everyone, as developers have they thought about integrating a pretty unusual set of catch and a nice video to show everything.
It is also about the quality of textures or interiors of submarines, but also news in the rendering of water and much better environmental management. Thus, developers have a true integrated management system of dynamic meteorology, which depends on the climatic zone, the sea state and season! As interesting as they are for the expert, these details do not necessarily speak for everyone, as developers have they thought about integrating a pretty unusual set of catch and a nice video to show everything.
Phishing: PayPal trapped by her own emails
This is Ted Demme ... so PayPal is the target of phishing he becomes paranoid. The electronic payment service has actually described one of his own emails as fraudulent.
Under the guise of confirming bank information of users of service type attack invites users to follow a link to a page counterfeit, which they must enter their bank details. It is exactly this type of email has recently received Randy Abrams, in charge of education at antivirus editor, but this time it was an email actually legitimately from PayPal.
According to this expert in security and many other colleagues, the real letters should instead invite users to perform the steps in their own way, never include a link, thus ensuring they make the right website. Mr. Abrams has responded to PayPal reminding them this basic rule.
The only answer he received such a letter thanking them for transferring this "suspicious email". PayPal acknowledges further that he has identified "phishing". "By alerting you make a difference," adds the email. But PayPal is unable to differentiate between a real email phishing and legitimate, even when the sender is.
Under the guise of confirming bank information of users of service type attack invites users to follow a link to a page counterfeit, which they must enter their bank details. It is exactly this type of email has recently received Randy Abrams, in charge of education at antivirus editor, but this time it was an email actually legitimately from PayPal.
According to this expert in security and many other colleagues, the real letters should instead invite users to perform the steps in their own way, never include a link, thus ensuring they make the right website. Mr. Abrams has responded to PayPal reminding them this basic rule.
The only answer he received such a letter thanking them for transferring this "suspicious email". PayPal acknowledges further that he has identified "phishing". "By alerting you make a difference," adds the email. But PayPal is unable to differentiate between a real email phishing and legitimate, even when the sender is.
ViewSonic VCP08 based on Windows XP
Smartphone ViewSonic VCP08 based on the Windows XP, on ktoroy we have mentioned earlier. The model has a QWERTY-keyboard, numeric keypad, 2 megapixel camera, WiFi, slot for memory cards format microSD, and the two displays: a 2-inch TFT external and internal 4.3-inch touchscreen TFT with a resolution of 800x480 pixels. Also available Intel Atom Z500 processor with a frequency of 800 MHz, 512 MB RAM, 8 GB hard drive, battery 1200 mAh, 3.5-mm jack for headphones.
The photographs shows that the device has a very large size, compared with the model of Nokia N97. Cost ViewSonic VCP08 in Europe and the U.S. is about $ 800.
The photographs shows that the device has a very large size, compared with the model of Nokia N97. Cost ViewSonic VCP08 in Europe and the U.S. is about $ 800.
Subscribe to:
Posts (Atom)