Language Selection

English French German Italian Portuguese Spanish

Ryan "Icculus" Gordon Has Some New Tools

Filed under
Gaming

Ryan "Icculus" Gordon doesn't have any new Linux game ports to report on for now, but he does have some announcements concerning some open-source development tools he's been working on recently for some of the Linux ports of the Humble Indie Bundle game titles.

In the first finger update in a while (aside from really just announcing Humble Indie Bundles), Gordon shares his open-source (zlib-licensed) tools he worked on for the Shank Linux game port, among other projects. The spawned open-source tools include MojoShader, TheoraPlay, and MojoDDS.

Rest here




More in Tux Machines

today's howtos

Oracle Desperate

Leftovers: OSS and Sharing

Security Leftovers

  • Friday's security updates
  • Judge Says The FBI Can Keep Its Hacking Tool Secret, But Not The Evidence Obtained With It
    Michaud hasn't had the case against him dismissed, but the government will now have to rely on evidence it didn't gain access to by using its illegal search. And there can't be much of that, considering the FBI had no idea who Michaud was or where he resided until after the malware-that-isn't-malware had stripped away Tor's protections and revealed his IP address. The FBI really can't blame anyone but itself for this outcome. Judge Bryan may have agreed that the FBI had good reason to keep its technique secret, but there was nothing preventing the FBI from voluntarily turning over details on its hacking tool to Michaud. But it chose not to, despite his lawyer's assurance it would maintain as much of the FBI's secrecy as possible while still defending his client. Judge Bryan found the FBI's ex parte arguments persuasive and declared the agency could keep the info out of Michaud's hands. But doing so meant the judicial playing field was no longer level, as he acknowledged in his written ruling. Fortunately, the court has decided it's not going to allow the government to have its secrecy cake and eat it, too. If it wants to deploy exploits with minimal judicial oversight, then it has to realize it can't successfully counter suppression requests with vows of silence.
  • Researcher Pockets $30,000 in Chrome Bounties
    Having cashed in earlier in May to the tune of $15,500, Mlynski pocketed another $30,000 courtesy of Google’s bug bounty program after four high-severity vulnerabilities were patched in the Chrome browser, each worth $7,500 to the white-hat hacker.