Language Selection

English French German Italian Portuguese Spanish

Neverwinter Nights: Infinite Dungeons Premium Module

Filed under
Reviews
Gaming

This week on PCBurn's Linux Game Review we're taking a look at Infinite Dungeons, BioWare's newest (and last) official module for Neverwinter Nights. It's a professionally crafted game expansion that aims to replicate the automatic dungeon generation game play of rogue style dungeon romps such as nethack or ADOM. Let's see how it stacks up.

With the recent cancellation of Neverwinter Nights support and future premium modules by Atari I decided to devote this weeks review to BioWare's latest add-on premium module. Neverwinter Nights Diamond package (all three core games plus the first three modules) has been going for around 20$ at gaming outlets recently. That makes it and the Infinite Dungeons module (which retails for 7.99$ per license download) a very affordable 27.99$(USD) total.
A large boss spider critter. The purple people eater? (it's deep purple colored)

Infinite Dungeons at first glance looks to be an excellent addition to NwN. It offers an on-the-fly dungeon generator similar to what you'll find in NetHack or Moria.

Each time you start the module and enter the dungeon for the first time, levels are created and populated for your adventurer to wander through.

Full Article.

More in Tux Machines

Security News

  • News in brief: DirtyCOW patched for Android; naked lack of security; South Korea hacked
  • Millions exposed to malvertising that hid attack code in banner pixels
    Researchers from antivirus provider Eset said "Stegano," as they've dubbed the campaign, dates back to 2014. Beginning in early October, its unusually stealthy operators scored a major coup by getting the ads displayed on a variety of unnamed reputable news sites, each with millions of daily visitors. Borrowing from the word steganography—the practice of concealing secret messages inside a larger document that dates back to at least 440 BC—Stegano hides parts of its malicious code in parameters controlling the transparency of pixels used to display banner ads. While the attack code alters the tone or color of the images, the changes are almost invisible to the untrained eye.
  • Backdoor accounts found in 80 Sony IP security camera models
    Many network security cameras made by Sony could be taken over by hackers and infected with botnet malware if their firmware is not updated to the latest version. Researchers from SEC Consult have found two backdoor accounts that exist in 80 models of professional Sony security cameras, mainly used by companies and government agencies given their high price. One set of hard-coded credentials is in the Web interface and allows a remote attacker to send requests that would enable the Telnet service on the camera, the SEC Consult researchers said in an advisory Tuesday.
  • I'm giving up on PGP
    After years of wrestling GnuPG with varying levels of enthusiasm, I came to the conclusion that it's just not worth it, and I'm giving up. At least on the concept of long term PGP keys. This is not about the gpg tool itself, or about tools at all. Many already wrote about that. It's about the long term PGP key model—be it secured by Web of Trust, fingerprints or Trust on First Use—and how it failed me.

OpenSUSE Ends Support For Binary AMD Graphics Driver

Bruno Friedmann has announced the end to AMD proprietary driver fglrx support in openSUSE while also announcing they don't plan to support the hybrid proprietary AMDGPU-PRO stack either. Friedmann wrote, "Say goodbye fglrx!, repeat after me, goodbye fglrx... [In regards to the newer AMDGPU-PRO stack] I will certainly not help proprietary crap, if I don’t have a solid base to work with, and a bit of help from their side. I wish good luck to those who want to try those drivers, I’ve got a look inside, and got a blame face." Read more

4 open source drone projects

Over the past few years, interest in both civilian and commercial use of drones has continued to grow rapidly, and drone hardware sits at the top of many people's holiday wish lists. Even just within the civilian side of things, the list of unmanned aerial devices which fit the moniker of drone seems to be constantly expanding. These days, the term seems to encompass everything from what is essentially a cheap, multi-bladed toy helicopter, all the way up to custom-built soaring machines with incredibly adept artificial intelligence capabilities. Read more

Fedora News

  • Elections 2016: Nominate community members to Fedora leadership
    With Fedora 25 out the door a couple of weeks ago, Fedora is once again moving ahead towards Fedora 26. As usual after a new release, the Fedora Elections are getting into gear. There are a fair number of seats up for election this release, across both the Fedora Engineering Steering Committee (FESCo) and the Fedora Council. The elections are one of the ways you can have an impact on the future of Fedora by nominating and voting. Nominate other community members (or self-nominate) to run for a seat in either of these leadership bodies to help lead Fedora. For this election cycle, nominations are due on December 12th, 2016, at 23:59:59 UTC. It is important to get nominations in quickly before the window closes. This article helps explain both leadership bodies and how to cast a nomination.
  • Endless Sky now available on Fedora
    Endless Sky is a 2D space trading and combat game similar to Escape Velocity. The game sets you as a beginning pilot, just having made a down payment on your very first starship. You’re given a choice between a shuttle, a freighter or a fighter. Depending on what ship you choose, you will need to figure out how to earn money to outfit and eventually upgrade your ship. You can transport passengers, run cargo, mine asteroids or even hunt pirates. It’s an open-ended game that blends the top-down action of a 2D space shooter with the depth and replayability of a 4X.
  • Analysis is confusing
    I’ve known of affinity mapping, and even tried to use sticky notes to figure out some of my data in the first UX project I did. Unfortunately, as I found out at the time, analysis of the data I get in UX research doesn’t really lend itself to being done alone. Much like statistics, I suspect. I’m not at all sure how UX consultants do their analyses, given this!