General Gaming Article |
- Skype’s Group Video Calling Feature is Now Free
- How to Physically Clean Your PC and More
- AOL Discovers Security Breach During Spam Investigation
- Stephen Elop Kicks Off New Position at Microsoft with a Q&A Session
- Testing the Speed Limit: Sapphire Launches First Overclocked Radeon R9 295X2 Graphics Card
- New Mexico Dig Unearths E.T. Cartridges and Other Atari 2600 Hardware
- AMD Catalyst 14.4 Drivers Snag WHQL Certification, Now Available to Download
- Newegg Daily Deals: Asus Radeon R9 270 Graphics Card, Intel Core i7 4771 Haswell, and More!
- Microsoft Warns of Zero-Day Bug in Internet Explorer
Skype’s Group Video Calling Feature is Now Free Posted: 28 Apr 2014 03:38 PM PDT |
How to Physically Clean Your PC and More Posted: 28 Apr 2014 01:45 PM PDT |
AOL Discovers Security Breach During Spam Investigation Posted: 28 Apr 2014 12:29 PM PDT |
Stephen Elop Kicks Off New Position at Microsoft with a Q&A Session Posted: 28 Apr 2014 11:51 AM PDT |
Testing the Speed Limit: Sapphire Launches First Overclocked Radeon R9 295X2 Graphics Card Posted: 28 Apr 2014 11:10 AM PDT |
New Mexico Dig Unearths E.T. Cartridges and Other Atari 2600 Hardware Posted: 28 Apr 2014 08:12 AM PDT |
AMD Catalyst 14.4 Drivers Snag WHQL Certification, Now Available to Download Posted: 28 Apr 2014 07:39 AM PDT AMD's latest drivers get rid of in-game flickering in Titanfall when running a CrossFire configurationIt takes a little longer for AMD to release driver updates since deciding to abandon a monthly refresh cycle. As such, it's been a little more than four months since the last batch of WHQL-certified Catalyst drivers hit the web, and if you've been getting antsy, you'll be happy to know the wait is over. AMD's Catalyst 14.4 drivers have gone gold and are now available to download in 32-bit and 64-bit flavors for Windows and Linux. If you're sitting pretty on a Windows box, the Catalyst 14.4 software suite requires Windows 7 Service Pack 1 to be installed (or a later version of Windows). In return, the new driver package adds support for AMD's dual-GPU Radeon R9 295X2 graphics cards. The driver package also addresses a handful of issues and offers a few performance bumps, such as flickering in Titanfall when running a CrossFire configuration and increasing CrossFire scaling by up to 34 percent in Anno 2070. There are a couple of known issues AMD is working to fix. One is that you might see a blue screen of death when encoding with Power Director 11, and the other is that driver installation could result in a black screen when installing on a dual AMD Radeon R9 295X configuration under Windows 8.1 (AMD suggests rebooting if this happens). You can download the drivers here and read the release notes here. |
Newegg Daily Deals: Asus Radeon R9 270 Graphics Card, Intel Core i7 4771 Haswell, and More! Posted: 28 Apr 2014 06:15 AM PDT Top Deal: Have you ever heard that people who own discrete graphics cards live longer, have better luck, and increase their chances of winning the lottery by 63 percent? Neither have we, but why take the unnecessary risk of not owning one when today's top deal is for an Asus Radeon R9 270 graphics card for $190 with free shipping (normally $220 - use coupon code: [EMCPFHF224]). Other Deals: Intel 730 Series 2.5-inch 240GB SATA 6Gb/s MLC Internal Solid State Drive for $225 with free shipping (normally $230 - use coupon code: [EMCPFHF26]) G.Skill Sniper Series 8GB (2 x 4GB) 240-Pin DDR3 1866 (PC3 14900) Desktop Memory for $72 with free shipping (normally $80 - use coupon code: [EMCPFHF33]) Intel Core i7-4771 Haswell 3.5GHz (3.9GHz Turbo) LGA 1150 84W Desktop Processor Intel HD Graphics for $300 with free shipping (normally $320 - use coupon code: [EMCPFHE44]) Adata S102 Pro Advanced 64GB USB 3.0 Flash Drive for $30 with free shipping (normally $35 - use coupon code: [EMCPFHE35]) |
Microsoft Warns of Zero-Day Bug in Internet Explorer Posted: 27 Apr 2014 10:19 PM PDT All versions affectedMicrosoft has warned Internet Explorer users of a remote code execution vulnerability (CVE-2014-1776 ) that is present in versions 6 through 11. The company is aware of limited, targeted attacks aimed at exploiting the vulnerability, the Redmond outfit said in a security advisory issued on Saturday. According to FireEye, the security firm that brought the bug to Microsoft's notice, it is aware of an ongoing attack targeting the said vulnerability in Internet Explorer 9 through Internet Explorer 11. The firm also pointed out that the targeted versions alone accounted for over a quarter of the overall browser market in 2013. "Threat actors are actively using this exploit in an ongoing campaign which we have named 'Operation Clandestine Fox,'" FireEye said in a blog post Saturday. "However, for many reasons, we will not provide campaign details. But we believe this is a significant zero day as the vulnerable versions represent about a quarter of the total browser market. We recommend applying a patch once available." Microsoft says that it is still investigating the issue and will, upon the completion of its probe, either release a fix as part of its monthly security update release process, or issue an out-of-band security update. In the meantime, IE users could use the workarounds suggested by Microsoft to thwart the attack. These include: deploying the Enhanced Mitigation Experience Toolkit (EMET) 4.1; setting Internet and Intranet security zone settings to "High", unregistering VGX.DLL; modifying the Access Control List on VGX.DLL to be more restrictive; and enabling Enhanced Protected Mode for IE11 and enabling 64-bit processes for Enhanced Protected Mode. "An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft said in the security advisory. "An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content." Follow Pulkit on Google+ |
You are subscribed to email updates from Maximum PC - All Articles To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |