Re-enacting TRON on the Apple IIgs

TRON is a science fiction classic, hitting cinemas in the midst of the burgeoning home computer era. It’s the film that created the famous light cycle, which spawned many video game recreations in the following years. Many years ago now, [Daniel] decided to flex his programming muscles by coding a version of the game for the Apple IIgs, with accidentally excellent results.

In the film, the characters find an escape from the light cycle game by forcing another player to crash into the walls of the play area. The resulting explosion left a hole, allowing the players to exit the …read more

Continue reading Re-enacting TRON on the Apple IIgs

Re-enacting TRON on the Apple IIgs

TRON is a science fiction classic, hitting cinemas in the midst of the burgeoning home computer era. It’s the film that created the famous light cycle, which spawned many video game recreations in the following years. Many years ago now, [Daniel] decided to flex his programming muscles by coding a version of the game for the Apple IIgs, with accidentally excellent results.

In the film, the characters find an escape from the light cycle game by forcing another player to crash into the walls of the play area. The resulting explosion left a hole, allowing the players to exit the …read more

Continue reading Re-enacting TRON on the Apple IIgs

Security Boulevard’s 5 Most Read Stories for the Week, August 13-17

A new week, a new crop of security stories. Last week, lack of user privacy, man-in-the-attack, dumb privacy rules and Intel CPUs vulnerabilities made the headlines. In addition, we discussed how to get smarter about securing smart technologies. Be su… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, August 13-17

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information. The vulnerability, known as Foreshadow or L1 Terminal Fault (L1TF), has three v… Continue reading New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Risks Limited With Latest Apache Bug, Optionsbleed

The risks surrounding the latest Apache bug, called Optionsbleed, are limited given it can only be attacked under certain conditions. Apache, and many Linux distributions, have patched the flaw. Continue reading Risks Limited With Latest Apache Bug, Optionsbleed

Yahoo Retires ImageMagick After Bugs Leak Server Memory

Researcher Chris Evans reported a new bug and showed how also used a previously known flaw in ImageMagick to leak Yahoo server data and steal images and authentication secrets. Continue reading Yahoo Retires ImageMagick After Bugs Leak Server Memory

Cloudflare Bug Leaks Sensitive Data

Cloudflare has fixed an issue where its customer traffic was leaking memory that included sensitive information including authentication cookies, POST data and more. Continue reading Cloudflare Bug Leaks Sensitive Data