Home Blog Page 386

After 21 Years Doom Gets a New Level from its Co-Creator John Romero

After 21 Years Doom Gets a New Level from its Co-Creator John Romero

After 21 years of release, the popular seminal first person shooter, Doom gets a new level from its co-creator John Romero.

There are a huge number of dedicated fans are still engaged, with the DoomWorld modding community continuing to live on after two decades. These fans have been playing with and modding the original game for years, but now they’re about to get brand new level from its own co-creator.

Also Read : After 6,607 Failed Attempts, A Gamer Made Super Mario To Save The Princess In Less Than 5 Minutes

John Romero, who was a developer on Doom, Doom-2, and Final Doom, has decided to return to the franchise that made him famous and created a brand new level for the original game. As he posted on Twitter, the new level is called E1M8B, which is his version of E1M8, Phobos Anomaly, the final level of Doom’s first episode, Knee-Deep in the Dead. John Romero never made a map for Doom after 1995.

Also Read : 7-Year-Old Spends $6,000 Playing Jurassic World on Dad’s iPad

In the game’s readme file, Romero describes it as “My Boss level replacement for e1m8…22 years later.” Romero says that he made the level in two weeks during his spare time.

The level was created using Doom WAD, which is the modding tools Id Software released with Doom back in the 90’s. The level itself is available via this Dropbox link. You’ll need to own the original Doom and use ZDoom (or something similar) in order to play it. Additional instructions can be found here.

A new Doom game is set to be released later this year on PC, PlayStation 4, and Xbox One. John Romero is not involved with this upcoming game — he’s too busy making levels in the original Doom.

Also Read : The End of Pirated Games – Games Expected to Become Uncrackable by 2018

OnePlus Devs Post Official Guide to Root OnePlus Smartphones

How to root OnePlus smartphones

Do you think its the time to root OnePlus 2 smartphone in your hand. But don’t know how ? Don’t worry OnePlus Devs are here to help you to root OnePlus 2.

We all know that rooting is the ultimate way to unlock your Android phone’s full capabilities. One would usually need to browse around forums and sites to find working tutorials to do this task. But first time a manufacture has become a tutor to help their customers to root their phones.

OnePlus was stepped forward with such a bold move to help you by posting a video on YouTube that will guide you root OnePlus 2. It’s also worth mentioning that this method works for any OnePlus handset, so no customer is left behind here.

Also Read : Ocean is a Smartphone-Sized Powerful Linux Server thats Runs on Battery

The video lasts a bit over 8 minutes and provides step-by-step from absolute scratch, even making it easy for users who have never rooted a phone before. By the end of it, your phone has an unlocked bootloader, custom recovery loaded and SuperSU installed to give apps root from within Android. In this state, of course, the phone is ready to give custom ROMs a go. Just remember to keep a backup.

How to Root OnePlus Smartphones

The steps, in detail, are as follows. Keep in mind the files provided are for Windows. Mac and Linux users will need to get ADB going on their own before following along with the rest of the class. For starters, you’ll have to enable developer options on your phone.

In Settings, go to About Phone and click on Build Number repeatedly to unlock developer option.

Once you’ve unlocked the Developer Options menu, there are two options in there you’ll want to enable; OEM Unlock and USB Debugging.

• With those in gear, use the package provided by OnePlus on the video to install the Android SDK. This enables you to use ADB, the Android Debug Bridge.

Plug your phone into your computer via USB and open up a terminal window by typing “cmd” into the start menu.

Also Read : On 10th Anniversary of jQuery, jQuery 3.0 Beta Released

From there, you’ll be guided on using ADB to back up your phone and push the remaining files to it, then reboot. Keep in mind, this step will totally wipe your phone.

Once the files are all in place, you’re guided through booting Android into recovery and flashing the zip file for SuperSU.

Reboot, sign in and load up whatever you need from your backup and you’ll be good to go!

If you’d like to give it a spin, check out the youtube video below :

So happy rooting your OnePlus smartphone.

Also Read : Meet World’s Biggest SSD With 13TB Of Storage

On 10th Anniversary of jQuery, jQuery 3.0 Beta Released

10th Anniversary of jQuery, jQuery 3.0 Beta Released

Celebrating 10th anniversary,  popular JavaScript library jQuery has gone into a beta release stage with jQuery 3.0 version on 14th January 2016.

Among key features in version 3.0 is an updating of .data() implementation to more closely match the HTML5 dataset specification. “All keys are now converted from kebab-case to camelCase, regardless of access method, and digits no longer participate in the conversion,” said jQuery Core team member Timmy Willison in a blog post. JQuery.Deferred objects, meanwhile, have been updated to be compatible with the Promises/A+ and ECMAScript 2015 promises. This required changes to the .then() method.

Also Read : Soon Twitter will have 10,000-Character Tweets

Also, there have been “massive speedups” for some jQuery custom selectors. “Thanks to some detective work by Paul Irish at Google, we identified some cases where we could skip a bunch of extra work when custom selectors like :visible are used many times in the same document. That particular case is up to 17 times faster now,” said Willison.

Another change involves .show and .hide methods. Developers with jQuery 3.0 alpha had experimented with treating these methods like an inline-display-none-remover (.show()) and inline-display-none-adder (.hide()). “This had the advantage of simplifying these methods greatly and improving performance — it required much fewer calculations. However, this proved to be problematic for our users,” Willison said. “Removing inline display:none did not always show the element (if the element was hidden from the stylesheet, for example), and that is far too common. We realized we couldn’t provide a simple way for jQuery plug-ins, especially, to ensure that an element was shown.” Thusly, jQuery developers have reverted that change; changes that have been kept for show and hide methods should have less impact on code, he said.

Also Read : China Reportedly Starts Testing 5G Technology, will Commercialise it by 2020

A jQuery Migrate 3.0 plug-in is planned, to help identify compatibility issues in code. Developers anticipate some breaking changes with the upgrade, and jQuery’s builders dropped support for jQuery Compat to offer compatibility with more browsers but possibly at the expense of file size and performance. “On January 12, Microsoft dropped support for IE8, IE9, and IE10. We’re not going to go that far just yet, but we are dropping support for IE8. And with IE8, so goes jQuery Compat, gone before we even released a final version. There will only be one jQuery from now on,” Willison said.

Also Read : Hike Adds Quora And WordPress Founders as Investors and Advisors to Grow its User Base

Wikipedia Turns 15 Years Old Today

Wikipedia Turns 15 Years Old Today

The popular online encyclopedia, Wikipedia turns 15 years old today. In line with the celebration, founder Jimmy Wales envisions the service to be a ‘sum of all human knowledge.’ Wales stated that the aim of the free encyclopedia that can be edited by anyone is to “build a high quality record” of human history that “opens up a world of knowledge” to users. Wales further stated:

“When you think of the university-aged kids now, they haven’t known a world without Wikipedia, to them we are part of the infrastructure of the world.”

Also Read : The End of Pirated Games – Games Expected to Become Uncrackable by 2018

Wikipedia started as a complementary project for Nupedia in the year 2000, a free online encyclopedia where articles written and reviewed by the company’s experts can be found. And on January 15, 2001, Wikipedia was formally announced, with only one language supported, which was English. The number of articles available grew over time, which also paved the way for other languages to be supported.

By mid-2009, the service hosted over three million articles. Today, Wikipedia is home to more than 38 million articles, in over 290 different languages. According to the Wikimedia foundation, over 7,000 articles are created every day. Lastly, the service is non-profit, and only earns funds through donations. More recently, it has also started accepting Bitcoins, earning $140,000 in the first week.

Also Read : Microsoft Published Official Way to Hide Windows 10 Upgrade Prompts in Windows 7 and Windows 8.1

“It’s important that we sustain Wikipedia for the world, it’s a community project,” Wales said, talking about the future of the online encyclopedia. “There are billions more people coming online for the first time and we need to meet their needs. Many of them will do so using a mobile device, so we are investing in mobile because we need to be there for them.”

Time Warner Cable Gets Hacked, Upto 320,000 Customers’ Data could have been Stolen

Time Warner Cable Gets hacked

American cable telecommunications company Time Warner Cable Inc. announced late Wednesday, Jan. 6, that the company has been hacked, with up to 320,000 customers’ data potentially stolen.

The company does not yet know how the information was obtained since there is no evidence of a breach on its systems, but it believes the data was likely to have been stolen through malware or during phishing attacks. It is also possible that the customer information could have been stolen through data breaches of other companies that stored its customer information.

Also Read : Highly Destructive Malware Led Ukraine to Face World’s First Blackout Caused by Hackers

A spokesman for Time Warner Cable said the company was notified by the FBI that some of its customers’ email addresses and password information “may have been compromised.”

Time Warner is advising its customers about the hack in both emails and direct mail. The company is suggesting that customers change their email passwords.

As a precautionary measure, Time Warner Cable customers should immediately change their passwords, and avoid using the same passwords for multiple accounts.

Also Read : Now Nintendo 3DS XL can Run Windows 95

China Reportedly Starts Testing 5G Technology, will Commercialise it by 2020

China Reportedly Starts Testing 5G Technology

The Chinese Ministry of Industry and Information Technology (MIIT) began to research and test 5G technology Thursday with the aim of commercializing it by 2020.

“The purpose of the research and test is to support the formulation of global 5G standards and boost the development of the telecom industry,” said Cao Shumin, head of a 5G R&D team under the MIIT.

Research and test work will be completed by 2018 and domestic telecom service providers will try to commercialize the 5G technology in the following two years.

Also Read : Microsoft to Kill Off Internet Explorer 8,9 and10 on January 12th

“China has made progress in the research of some key areas regarding 5G technology,” said MIIT chief engineer Zhang Feng.

China has more than 905 million mobile Internet users and about 380 million are 4G users.

Highly Destructive Malware Led Ukraine to Face World’s First Blackout Caused by Hackers

Highly Destructive Malware Led Ukraine to Face World’s First Blackout
Image Source : ARS Technica

Cyber-criminals are now focusing on our energy infrastructure, recently researchers said that a highly destructive malware infected at least three regional power authorities in Ukraine led to a power failure that left hundreds of thousands of homes without electricity last week.

Ukrainian news service TSN first reported the power outage in the country on December 23. The report went on to say that the outage was the result of malware that disconnected electrical substations. On Monday, researchers from security firm iSIGHT Partners said they had obtained samples of the malicious code that infected at least three regional operators. They said the malware led to “destructive events” that in turn caused the blackout. If confirmed it would be the first known instance of someone using malware to generate a power outage.

Also Read : Now Nintendo 3DS XL can Run Windows 95

John Hultquist, head of iSIGHT’s cyber espionage intelligence practice, told Ars Technica:

“It’s a milestone because we’ve definitely seen targeted destructive events against energy before—oil firms, for instance—but never the event which causes the blackout.It’s the major scenario we’ve all been concerned about for so long.”

Security software developer ESET noted on its blog that a trojan from the BlackEnergy malware family — which was first discovered in 2007 — might have been used to inject malicious code into the Ukrainian power authorities’ systems. The latest version of the tool has been found to include a secure shell (SSH) utility that can grant access to affected users’ systems. ESET also reports that the Ukrainian power grid systems were infected using macro functions embedded in Microsoft Office documents.

Also Read : A Large Web Attack Knocks BBC Websites Offline for Hours

In 2014, the group behind BlackEnergy, which iSIGHT has dubbed the Sandworm gang, targeted the North Atlantic Treaty Organization, Ukrainian and Polish government agencies, and a variety of sensitive European industries. iSIGHT researchers say the Sandworm gang has ties to Russia, although readers are cautioned on attributing hacking attacks to specific groups or governments.

Also Read : Ransom32 is First JavaScript-Based Ransomware Affecting Windows, Mac and Linux

Ransom32 is First JavaScript-Based Ransomware Affecting Windows, Mac and Linux

Ransom32 is First JavaScript-Based Ransomware

A new Ransomware as a Service, or RaaS, called Ransom32 has been discovered that for the first time uses a ransomware written in Javascript to infect Mac, Windows as well as Linux machines.  the Ransom32 RaaS is a simple, but efficient, service where anyone can download and distribute their very own copy of the ransomware executable as long as they have a Bitcoin address.

Ransom32 is being traded on an underground TOR site, with the authors offering customized versions of the malware in return for a 25 percent cut of whatever money is generated. The Ransom32 RaaS is a simple, but efficient, service where anyone can download and distribute their very own copy of the ransomware executable as long as they have a Bitcoin address.

Also Read : Now Nintendo 3DS XL can Run Windows 95

Security expert Fabian Wosar from Emsisoft first reported about the new ransomware family, which embedded in a self-extracting WinRAR archive, is using the NW.js platform for infiltrating the victims’ computers, and then holding their files by encrypting them with 128-bit AES encryption.

Why Ransom32 Uses NW.js Framework?

Ransom32 is First JavaScript-Based Ransomware

NW.js is essentially a framework that allows you to develop normal desktop applications for Windows, Linux and MacOS X using JavaScript. It is based upon the popular Node.js and Chromium projects.

So while JavaScript is usually tightly sandboxed in your browser and can’t really touch the system it runs upon, NW.js allows for much more control and interaction with the underlying operating system, enabling JavaScript to do almost everything “normal” programming languages like C++ or Delphi can do. The benefit for the developer is that they can turn their web applications into normal desktop applications relatively easily. For normal desktop application developers, it has the benefit that NW.js is able to run the same JavaScript on different platforms. So a NW.js application only needs to be written once and is instantly usable on Windows, Linux and MacOS X.

Also Read : This Weird Trick will Speed Up iPhone in Less than 30 seconds

Because of this reason Ransom32 could easily be packaged for both Linux and Mac OS X. But the report says that at this point there is no such packages, which at least for the moment makes Ransom32 most likely Windows-only.

How to Protect Myself from Ransom32?

According to EMSISOFT, the best protection remains a solid and proven backup strategy. Using any top anti-malware or anti-virus program proved to be the second best defense.

Read more about Ransom32, check out the descriptive blog post from EMSISOFT.

Also Read : Ransomware In The Form Of A Fake Porn App Attacking Android Users