ESR Announces The Open Sourcing Of The World's First Text Adventure

An anonymous reader writes:
Open source guru Eric S. Raymond added something special to his GitHub page: an open source version of the world’s first text adventure. “Colossal Cave Adventure” was first written in 1977, and Raymond remembers it as “the origin of many things; the text adventure game, the dungeon-crawling D&D (computer) game, the MOO, the roguelike genre. Computer gaming as we know it would not exist without ADVENT (as it was known in its original PDP-10 incarnation…because PDP-10 filenames were limited to six characters of uppercase)…

“Though there’s a C port of the original 1977 game in the BSD game package, and the original FORTRAN sources could be found if you knew where to dig, Crowther & Woods’s final version — Adventure 2.5 from 1995 — has never been packaged for modern systems and distributed under an open-source license. Until now, that is. With the approval of its authors, I bring you Open Adventure.”
Calling it one of the great artifacts of hacker history, ESR writes about “what it means to be respectful of an important historical artifact when it happens to be software,” ultimately concluding version control lets you preserve the original and continue improving it “as a living and functional artifact. We respect our history and the hackers of the past best by carrying on their work and their playfulness.”

“Despite all the energy Crowther and Woods had to spend fighting ancient constraints, ADVENT was a tremendous imaginative leap; there had been nothing like it before, and no text adventure that followed it would be innovative to quite the same degree.”

Read more of this story at Slashdot.



Source: Slashdot – ESR Announces The Open Sourcing Of The World’s First Text Adventure

ASUS Computex 2017 Press Conference Live Blog

We are live from ASUS’ press conference at Computex 2015. As usual, the company will announce a number of new products that it will start to sell in the coming months and quarters. Products announced by ASUS usually represent the industry’s trends, so if you want to take a glimpse at the near future of personal computing, join in.

 



Source: AnandTech – ASUS Computex 2017 Press Conference Live Blog

US Senators Propose Bug Bounties For Hacking Homeland Security

An anonymous reader quotes CNN:
U.S. senators want people to hack the Department of Homeland Security. On Thursday, Senators Maggie Hassan, a Democrat and Republican Rob Portman introduced the Hack DHS Act to establish a federal bug bounty program in the DHS… It would be modeled off the Department of Defense efforts, including Hack the Pentagon, the first program of its kind in the federal government. Launched a year ago, Hack the Pentagon paved the way for more recent bug bounty events including Hack the Army and Hack the Air Force… The Hack the DHS Act establishes a framework for bug bounties, including establishing “mission-critical” systems that aren’t allowed to be hacked, and making sure researchers who find bugs in DHS don’t get prosecuted under the Computer Fraud and Abuse Act. “It’s better to find vulnerabilities through someone you have engaged with and vetted,” said Jeff Greene, the director of government affairs and policy at security firm Symantec. “In an era of constrained budgets, it’s a cost-effective way of identifying vulnerabilities”… If passed, it would be among the first non-military bug bounty programs in the public sector.

Read more of this story at Slashdot.



Source: Slashdot – US Senators Propose Bug Bounties For Hacking Homeland Security

Exploring DynamIQ and ARM’s New CPUs: Cortex-A75, Cortex-A55

Another year, another TechDay, and another ARM facility (this time in Cambridge, UK)—can only mean new ARM IP. Over the span of several days, we got an in-depth look at its latest technologies, including DynamIQ, the Mali-G72 GPU, the Cortex-A75, and (yes, finally) the successor to the A53: Cortex-A55.



Source: AnandTech – Exploring DynamIQ and ARM’s New CPUs: Cortex-A75, Cortex-A55

Walt Mossberg's Last Column Calls For Privacy and Security Laws

70-year-old Walt Mossberg wrote his last weekly column Thursday, looking back on how “we’ve all had a hell of a ride for the last few decades” and revisiting his famous 1991 pronouncement that “Personal computers are just too hard to use, and it isn’t your fault.”
Not only were the interfaces confusing, but most tech products demanded frequent tweaking and fixing of a type that required more technical skill than most people had, or cared to acquire. The whole field was new, and engineers weren’t designing products for normal people who had other talents and interests. But, over time, the products have gotten more reliable and easier to use, and the users more sophisticated… So, now, I’d say: “Personal technology is usually pretty easy to use, and, if it’s not, it’s not your fault.” The devices we’ve come to rely on, like PCs and phones, aren’t new anymore. They’re refined, built with regular users in mind, and they get better each year. Anything really new is still too close to the engineers to be simple or reliable.
He argues we’re now in a strange lull before entering an unrecognizable world where major new breakthroughs in areas like A.I., robotics, smart homes, and augmented reality lead to “ambient computing”, where technology itself fades into the background. And he uses his final weekly column to warn that “if we are really going to turn over our homes, our cars, our health and more to private tech companies, on a scale never imagined, we need much, much stronger standards for security and privacy than now exist. Especially in the U.S., it’s time to stop dancing around the privacy and security issues and pass real, binding laws.”

Read more of this story at Slashdot.



Source: Slashdot – Walt Mossberg’s Last Column Calls For Privacy and Security Laws

'Rime' creators will remove anti-tampering code if it's cracked

Game studios that use digital rights management (DRM) tools tend to defend it to the death, even after it’s been cracked. It prevents ‘casual’ piracy and cheating, they sometimes argue. However, Rime developer Tequila Works is taking a decidedly diff…

Source: Engadget – ‘Rime’ creators will remove anti-tampering code if it’s cracked

Leaked 'Standing Rock' Documents Reveal Invasive Counterterrorism Measures

An anonymous reader writes:
“A shadowy international mercenary and security firm known as TigerSwan targeted the movement opposed to the Dakota Access Pipeline with military-style counterterrorism measures,” reports The Intercept, decrying “the fusion of public and private intelligence operations.” Saying the private firm started as a war-on-terror contractor for the U.S. military and State Department, the site details “sweeping and invasive” surveillance of protesters, citing over 100 documents leaked by one of the firm’s contractors.

The documents show TigerSwan even havested information about the protesters from social media, and “provide extensive evidence of aerial surveillance and radio eavesdropping, as well as infiltration of camps and activist circles… The leaked materials not only highlight TigerSwan’s militaristic approach to protecting its client’s interests but also the company’s profit-driven imperative to portray the nonviolent water protector movement as unpredictable and menacing enough to justify the continued need for extraordinary security measures… Internal TigerSwan communications describe the movement as ‘an ideologically driven insurgency with a strong religious component’ and compare the anti-pipeline water protectors to jihadist fighters.”
The Intercept reports that recently “the company’s role has expanded to include the surveillance of activist networks marginally related to the pipeline, with TigerSwan agents monitoring ‘anti-Trump’ protests from Chicago to Washington, D.C., as well as warning its client of growing dissent around other pipelines across the country.” They also report that TigerSwan “has operated without a license in North Dakota for the entirety of the pipeline security operation.”

Read more of this story at Slashdot.



Source: Slashdot – Leaked ‘Standing Rock’ Documents Reveal Invasive Counterterrorism Measures

Veteran Security Analyst Warns Windows 10, Even With Tracking Off, Still Tracks Too Much

Veteran Security Analyst Warns Windows 10, Even With Tracking Off, Still Tracks Too Much
Microsoft has gone to great lengths to foster adoption of its Windows 10 operating system, and for good reason. In addition to it likely being one of the best iterations of the Windows OS in a long time–with better security, support for DX12 and host of other features–it’s clearly also a platform for MSFT to better track its customer base

Source: Hot Hardware – Veteran Security Analyst Warns Windows 10, Even With Tracking Off, Still Tracks Too Much

White House Seriously Considering Banning Laptops on All International Flights to the US

Following a ban of in cabin electronic devices that are “larger than a smartphone” on flights coming to the US from locations in eight majority-Muslim countries, it appears the White House wants to expand its curious policy. This morning, U.S. Homeland Security Secretary John Kelly told Fox News’ Chris Wallace that he…

Read more…



Source: Gizmodo – White House Seriously Considering Banning Laptops on All International Flights to the US

Seven Science Journals Have A Dog On Their Editorial Board

An anonymous reader writes:
A professor of health policy at Australia’s Curtin University got seven different science journals to put his dog on their editorial board. The dog is now associate editor for the Global Journal of Addiction & Rehabilitation Medicine, and sits on the editorial board of Psychiatry and Mental Disorders. The professor says he feels sorry for one researcher who recently submitted a paper about how to treat sheath tumors, because “the journal has sent it to a dog to review.” The official profile of the dog lists its research interests as “the benefits of abdominal massage for medium-sized canines” and “avian propinquity to canines in metropolitan suburbs.”

An Australian news site points out that career-minded researchers pay up to $3,000 to get their work published in predatory journals so they can list more publications on their resumes. “While this started as something lighthearted,” says the dog-owning professor, “I think it is important to expose shams of this kind which prey on the gullible, especially young or naive academics and those from developing countries.”

Read more of this story at Slashdot.



Source: Slashdot – Seven Science Journals Have A Dog On Their Editorial Board