Do you remember back to when times were good? No impending doom or missile attacks or bomb threats, just sat down around a TV and watching a random group of people humiliate themselves while you sit at home and gloat that you could have done it better. Yes, I am talking about that old gem (pun intended) that is The Crystal Maze. I used to sit at home on a Sunday afternoon watching re-runs while removing the similar fake crystal curtain pole ends to pretend with.
The show was all about conquering the crystal maze with as many crystals (and contestants) as possible. The more crystals equalled more time and more people meant a higher chance of catching golden tickets in the final round. To get to the final round, a small team had to take on multiple challenges based in four different sections of “The Crystal Maze”. Each section would be similar to the others, but with a dissimilar theme; including Industrial, Aztec, Futuristic and Medieval.
The show finally came to and end in 1995 when the show wasn’t renewed for further seasons and the set remained unused and finally dismantled in 1999. That’s until some die hard fans took it upon themselves to start an IndieGoGo campaign to bring the show back to life. The trio launched the campaign in hopes to get just £500,000, but the public saw this and donated a huge £933,000 to make sure this happens.
Why such a big threshold? Well it’s not for a TV show, this time you can purchase a £50 ticket and run amock in the authentic remade set with Richard O’Brien narrating in certain spots and he may even be your host. It is being rebuilt in a secret part of London which is “easily accessible” according to the FAQ, let’s hope it doesn’t stay secret for much longer.
This is probably something a portion of our readers won’t actually know what we’re on about with this, so for those who are interested here is a video of the first episode, enjoy!
Working on a project is difficult, working on a project with multiple people is difficult, working on a project with multiple people, in multiple locations and with multiple devices is difficult. What I’m saying is working on something is difficult, anyone that’s ever programmed can attest to this. People often use things like Github, Microsoft’s Azura cloud or Amazons web service to keep your work up to date, this means that if you (or a friend) made a change to your work everyone would have access to the newly created work without any difficulty.
Google is going to try become a part of this market, with the announcement of its latest service, Cloud Source Repositories. The service is currently in beta and hopes to become a go-to for group projects and people who enjoy coding. In its description Google has stated that it will have a private Git repository, which will not only integrate and work with a majority of the existing tools but will also feature a high level of encryption, making sure that your files are secure and for your eyes only. With access to the Google Cloud Platform, and later in the year a new API launcher and a new cloud debugger, the system looks to provide you with all the tools you take for granted while guaranteeing you access to Google’s knowledge and support for your projects.
Do you use a cloud repository for your work? If so would you be tempted to try out Google’s new service or are you happy with your current one?
Thank you TechSpot for providing us with this information.
As part of their new #OpKKK campaign, the well known internet group ‘Anonymous’ has taken control of the Klu Klux Klans public twitter account in a bid to fight back against some recent actions.
The KKK’s USA branch decided to ‘call out’ Anonymous in a tweet, stating: “We are continuing to read Anonymous threats with much amusement. Still no action taken. #Cowards #HoodsON” in which Anonymous replied by swiftly taking control of the account just mere hours later.
This fight was originally sparked by the KKK stating they will take “lethal force” against Ferguson protestors in the aftermath of the upcoming grand jury decision regarding Ferguson police officer Darren Wilson. They did so by distributing flyers around the city marking their claims, this being easily completed due their headquarters being based only 75 miles south of the American town.
Reading “Attention: To the terrorists masquerading as “peaceful protestors”! We will use lethal force as provided under Missouri law to defend ourselves”. Now, Anonymous is known for many controversial take-overs and activist actions in their short history, sometimes in we’ve seen them band together for the good of the ‘common man’. This is another example how a bunch of computer-savvy tech enthusiasts can pit their minds together for good, no matter how illegal it may be.
On Wednesday, a KKK leader appeared on MCNBC to back-up their flyers threats, claiming they support the Ferguson locals and that this campaign had greatly boosted their recruitment drives. On Friday, Anonymous began their attack by doxing KKK members residing in the Ferguson/St. Louis region, then later on taking control of KKK’s twitter account in retaliation to the attacks.
Internet security is something that we [in a good way] get shoved towards us all the time, however it has been revealed that a number of D-Link routers have a vulnerable back-door gateway built into their firmware that can potentially allow unwanted users from gaining access to the units web management interface and therefore potentially the rest of your network.
Whilst looking through the firmware code for a DIR-100 router, a blogger from /dev/ttySO stumbled across the potentially fatal piece of coding that allows this access to be made. Using a specific string of code and connecting to the router via a wired or wireless connection, the reverse engineered back-door allowed the standard security authentication to be bypassed and full access granted.
To narrow down the vulnerability, only units that run on the DIR-100 firmware are known to be affected, however with many ISPs providing their users with D-Link equipment, both to residential and business customers, the potential for a security breach in the likes of public areas is unthinkable.
After some research it has been calculated that the following units are likely to be affected:
Additionally, several Planex routers also appear to use the same firmware:
Even more worryingly it has been reported that some versions of the DIR-615 may be affected as used by Virgin Mobile, although this has yet to be verified.
Whether or not this back door was supposed to placed within the firmware is yet to be disclosed by D-Link, however I’m sure their firmware coding teams will be hot on the case to ensure that this security breach doesn’t affect the reputation of D-Link in the long run and a major security outbreak runs wild.