45w ago - Naughty Dog Community Strategist Eric Monacelli has shared a cinematic video today spotlighting Bill's Safe House in The Last of Us.
To quote: While we're still processing the awesome and inspiring reception from fans and critics at E3, we've been heads down working to make The Last of Us something to get really, really hyped about.
To that end, we're excited that our San Diego Comic-Con plans afforded us the opportunity to discuss our mocap process and share some new content.
It was really just a small glimpse into what we've been hard at work developing but we think you'll enjoy it greatly.
We first showed this video during our San Diego Comic Con panel. If you listen carefully at the onset of the video you'll hear the sounds of Infected hunting for Joel and Ellie. The pair manages to escape into the house of some guy in a gas mask. But are they safe?
Take a look:
The masked man is a new character named Bill. Bill knows Joel somehow and he owes Joel a favor. What for? Well, we're not talking about that yet but you'll definitely be hearing...
145w ago - Taking off on the PlayStation Move safe usage instructions, Androsko has expanded on them with some humorous warnings of his own about Sony's PS3 Motion Controller.
Check them out below, as always, simply click to enlarge the pics!
To quote from PlayStationLifeStyle.net (linked above): "In this satirical advisory banner by Kotaku, the editors are illustrating in a humorous manner of incorrect and correct techniques and methods to use the PS3 motion control device.
Going as far as even adding fine print advising gamers to "please use the wooden stake or silver dagger accessory sleeves for the PlayStation Move controller when confronted by a dracula during game play".
While the instructional banner is not exactly instruction, or even informative for that matter, it is sure to provide a good laugh for anyone regardless of whether or not they are planning to invest in the controller.
176w ago - It appears the RSA encryption scheme has fallen as cryptographers have broken [PDF] 768-bit keys via the widely used public-key algorithm.
An international team of mathematicians, computer scientists and cryptographers broke the key though NFS, or number field sieve, which allowed them to deduce two prime numbers that when multiplied together generated a number with 768 bits.
The discovery, which took about two-and-a-half years and hundreds of general-purpose computers, means 768-bit RSA keys can no longer be counted on to encrypt or authenticate sensitive communications.
To quote: "The latest milestone to fall is 768-bit RSA; in a paper posted on a cryptography preprint server, academic researchers have now announced that they factored one of these keys in early December.
Most modern cryptography relies on single large numbers that are the product of two primes. If you know the numbers, it's relatively easy to encrypt and decrypt data; if you don't, finding the numbers by brute force is a big computational challenge.
The paper describes how the process was done with commodity hardware, albeit lots of it."
237w ago - PCWorld reports today that security researchers have developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
However, the attack does not however work with the WPA2 standard states Dragos Ruiu, the PacSec conference's organizer who will be discussing it next week in Tokyo.
To quote: "Everybody has been saying, 'Go to WPA because WEP is broken,'" Ruiu said. "This is a break in WPA."
If WPA is significantly compromised, it would be a big blow for enterprise customers who have been increasingly adopting it, said Sri Sundaralingam, vice president of product management with wireless network security vendor AirTight Networks.
Although customers can adopt Wi-Fi technology such as WPA2 or virtual private network software that will protect them from this attack, there are still may devices that connect to the network using WPA, or even the thoroughly cracked WEP standard, he said.
Ruiu expects a lot more WPA research to follow this work. "Its just the starting point," he said. "Erik and Martin have just opened the box on a whole new hacker playground."