Creating a 2D game with Unity

Using the brand new Unity native 2D tools, you will learn how to make a small “Shoot’Em Up” (abbreviated to shmup thereafter) with this tutorial.

http://pixelnest.io/tutorials/2d-game-unity

result

What Comes Next Is the Future

What Comes Next Is the Future is the definitive documentary about the web, as told by the people who build it each day.

Their challenges and successes will help us better understand this thing called the web, and what lies ahead. A project by Matt Griffin – founder of Bearded, a Net Awards 2014 Agency of the Year nominee – What Comes Next Is the Future is an effort to capture the titanic shift in the web landscape that mobile devices have initiated.

http://www.futureisnext.com/

September 2, 2014
Categories: dev Tags: ,
HTML5 Page Visibility API

With the launching of this API we have welcomed two new document property which does two different functions. The first one is document.visibilityState and second one is document.hidden.

document.visibilityState holds four different values which are as below:

  • hidden: Page is not visible on any screen
  • prerender: Page is loaded off-screen and not visible to user
  • visible: Page is visible
  • unloaded: Page is about to unload (user is navigating away from current page)

Full article on http://code.tutsplus.com/articles/html5-page-visibility-api–cms-22021

DESIGNER’S GUIDE TO DPI

http://sebastien-gabriel.com/designers-guide-to-dpi/home

This guide is designed as a “get started” or introductory read for the starting to intermediate designer who wants to learn or get more knowledge about cross-DPI and cross-platform design from the very beginning.

No complex math and un-parsable graph, just straight forward explanations ordered in short sections for you to understand and apply directly to your design process.

Written by Sebastien Gabriel.

Get Your Hands Off My Laptop

http://www.cs.tau.ac.il/~tromer/handsoff/

Overview

We demonstrated physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels and are based on the observation that the “ground” electric potential in many computers fluctuates in a computation-dependent way. An attacker can measure this signal by touching exposed metal on the computer’s chassis with a plain wire, or even with a bare hand. The signal can also be measured at the remote end of Ethernet, VGA or USB cables.

Through suitable cryptanalysis and signal processing, we have extracted 4096-bit RSA keys and 3072-bit ElGamal keys from laptops, via each of these channels, as well as via power analysis and electromagnetic probing. Despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using Medium Frequency signals (around 2 MHz), or one hour using Low Frequency signals (up to 40 kHz).

Sistemic insecurity

Truecrypt – Disk encryption tool recommended by Mr.Snowden? Gone

http://www.theinquirer.net/inquirer/news/2347200/truecrypt-encryption-is-no-longer-secure-due-to-windows-xp-end-of-life

http://arstechnica.com/security/2014/05/truecrypt-security-audit-presses-on-despite-developers-jumping-ship/

Lavabit – Secure email provider, recommended by Mr. Snowden? Gone

http://www.theinquirer.net/inquirer/news/2345905/ladar-levinson-reveals-why-he-closed-lavabit

Crooks get your credit card, here’s how.

http://krebsonsecurity.com/2014/06/peek-inside-a-professional-carding-shop/

Government CyberTroops of some countries and big companies unite to highjack a powerfull bot network

http://krebsonsecurity.com/2014/06/backstage-with-the-gameover-botnet-hijackers/

Another security related blog: https://www.schneier.com/

And the NSA story, follow the links : http://arstechnica.com/security/2013/09/nsa-attains-the-holy-grail-of-spying-decodes-vast-swaths-of-internet-traffic/

 

Page Navigation Previous · Next