Windows 95 in a Web Browser

Subject: General Tech | February 4, 2016 - 02:15 AM |
Tagged: windows 95, javascript

This one is quite interesting. We've seen DOSBox cross-compiled into JavaScript using emscripten before. For instance, The Internet Archive has been publishing a huge catalog of DOS-era games on their site, including John Carmack's Catacomb II. In case you're wondering, memory management is handled in emscripten by reserving a large, contiguous chunk of memory as an ArrayBuffer. The C application can do its typical memory management tricks because it sees an unmanaged chunk of memory.

microsoft-2016-safetoturnoff.png

This example is an image of Windows 95, complete with its default applications such as Minesweeper. It was ported by Andrea Faulds, who is a major contributor to PHP. The Windows 95 demo was apparently created in 2015, according to her personal website, but I just found out about it.

Who's a pretty boy? Is it you Fallout?

Subject: General Tech | February 3, 2016 - 02:46 PM |
Tagged: modding, gaming, fallout 4

[H]ard|OCP has put together a little guide on improving your Fallout 4 experience with the help of modders and the great people at Nexus Mods.  They describe the basics on how to install mods as there are steps you need to follow to ensure your mods successfully apply, whether installed manually or with the Nexus Mod Manager tool.  They explore several mods than greatly increase the size of textures, making them much better looking as well as adding weather and storms to the mix.  As long as you meet the graphics memory requirements which they mention you should not see much performance degradation when using these mods.  Soon Fallout 4 may be meeting or surpassing Skyrim's impressive mod community.

Of course immediately after [H] covered this topic Bethesda released a new patch which enables HBAO+ for all GPUs and extra debris effects specifically for NVIDIA GPUs.

14543944144L5SDRyj0t_1_3_l.gif

"Fallout 4 has been out for several months and it is possible that you might find the image quality lacking overall. We take some of the most popular and highly downloaded image quality mods and find out how we can improve the environment in Fallout 4. We modify for visual improvements to give you more immersive gameplay."

Here is some more Tech News from around the web:

Gaming

Source: [H]ard|OCP

Next on the list of companies which should know better is Malwarebytes, but it is not as bad as some say

Subject: General Tech | February 3, 2016 - 12:46 PM |
Tagged: security, Malwarebytes

Considering the business that Malwarebytes is in you can expect to see a lot of negative press about a gaping security hole in the near future and while there is a vulnerability it is not as bad as many will make it out to be.  The issue lies in that signature updates are done over HTTP and are unsigned, very bad practice but something which would be exploited on a single client connection as opposed to something you could use to create a wide spread infection.  The Register links to the Google Project Zero entry which was released today as the vulnerability was first reported to Malwarebytes 90 days ago and has not been addressed on the client side.

The actual concern you should have is that the original bug report also found vulnerabilities on the server side.  Malwarebytes did correct the server side issues almost immediately but neglected to follow through on the client side.  It is good of them to patch and offer bug bounties but a complete follow through is necessary if you are a security software peddler who wants their reputation to stay intact.

mb-logo.png

"The antivirus firm says it has addressed server-side vulnerabilities that were reported by Google Project Zero researcher Tavis Ormandy in November. However, security holes remain in the client-side software that runs on people's Windows PCs."

Here is some more Tech News from around the web:

Tech Talk

 

Source: The Register

Blender Foundation Releases Caminandes 3: Lamingos

Subject: General Tech | February 2, 2016 - 11:34 PM |
Tagged: Blender, open-source

The Blender Foundation guides development with a series of first-party short films, each of which are created with open-source software and released under a Creative Commons license. Despite their purpose, to promote open source software and highlight ways to improve Blender, they each have engaging traits that are uncommon in commercial films. Cosmos Laundromat opens with a fairly long shot of a sheep's attempt at hanging itself, while Sintel's ending will make you feel hollow when it reveals its meaning.

This short, Caminandes 3: Lamingos, above, is much lighter than Cosmos Laundromat or Sintel. It has more of the ironic, mischievous cartoon feel of Big Buck Bunny, their second Blender short film. It is about a Llama and a Penguin who are trying to eat some berries; unfortunately, they are both trying to eat the same ones.

blender-2016-caminandes3-llama.jpg

The two-and-a-half-minute short film can be downloaded and is free to use under a Creative Commons Attribution license. Its assets are also available, but only under a Blender Cloud subscription.

BitTorrent Talks Encryption, Improved Linux Support For Sync 2.3

Subject: General Tech | February 2, 2016 - 05:11 PM |
Tagged: file syncing, encryption, bittorrent sync, bittorrent

BitTorrent continues to support its file sharing and syncing application with the recent release of Sync 2.3.1. The 2.3.x update contains a number of bug fixes for stability, but the important news is the added support for encrypted folders and finally allowing selective file syncing on Linux systems. Additionally, the company put out a short brief on the information they collect and how they are securing your files synced by Sync which is available as a PDF.

BitTorrent Sync 2_3 Encrypted Folders.png

Sync 2.3 allows Windows users to run Sync as a service and Android users can move data to and from an SD card from within the app so long as they are running at least Android 5.0 or newer. Linux users also get a bit of love with support for selective file syncing (where you can choose which specific files to download locally and which to keep on the remote peers) though it appears that BitTorrent has limited this feature to its paid Sync Pro tier which is in line with other platforms. According to BitTorrent Inc. among the performance and bug fixes, the biggest UI change is a redesigned process for adding new folders.

On the security and privacy front, BitTorrent claims that it employs several security measures to keep your data safe. First though, the company allegedly only collects benign data including the program version, add folder errors, the amount of data transferred (directly and via relay server), number of peers, and share link and tracker statistics as well as few more things you can see in the brief linked above. All the data that they collect is reportedly sent in the clear so that users can verify what they are collecting on them.

To secure your files, BitTorrent uses SSL and AES-128 encryption to transfer files. In the case of Advanced folders, it generates a X.509 certificate (each folder is given it's own certificate) using a certificate authority and then uses a certificate chain to control user access and file modification permissions as well as a mechanism to revoke access. In the case of encrypted folders, Sync generates storage and session keys with the session keys complying with perfect forwards secrecy standards such that future session keys being cracked does not compromise past sessions. When using the encrypted folders option (which is useful when using a VPS as an off-site backup or to any machine that you do not fully own and control for that matter), data from your local machines is encrypted before being sent to the remote machine using AES 128 bit encryption (I wish they had gone with at least AES-256, but it's something). The data is then sent over SSL. Thus, the data on the remote machine is never in an unencrypted state which is a good thing for having a secure off-site backup. The encrypted folder can still be used as part of the mesh to speed up syncing among your machines, as well, while remaining secure.

I think the encrypted folders are a good addition to Sync, though the encryption bit-ness could be improved (a weak VPS' processor doesn't need to decrypt the data anyway so CPU time needed for the beefier algorithm should not matter...). In past coverage users have mentioned issues when syncing folders that they encrypted themselves before adding to Sync where the data could get corrupted when the peers became confused on changes made and what to sync. Hopefully this will help avoid that though they do still need to work on fixing user chosen pre-sync encryption. I am still using Sync to backup my photos and sync documents between my laptop and desktop and it works well for that sans the storage limits imposed by One Drive (and the uncertainty of my once-promised 25GB of free storage).

What do you think of the changes, and is their security good enough?

Source: BitTorrent

EVGA Winter 2016 Prize Pack and Giveaway!!

Subject: General Tech, Graphics Cards, Motherboards, Cases and Cooling | February 2, 2016 - 02:07 PM |
Tagged: Z170, PSU, power supply, motherboard, GTX 970, giveaway, ftw, evga, contest

For many of you reading this, the temperature outside has fallen to its deepest levels, making it hard to even bare the thought of going outdoors. What would help out a PC enthusiast and gamer in this situation? Some new hardware, delivered straight to your door, to install and assist in warming up your room, that's what!

PC Perspective has partnered up with EVGA to offer up three amazing prizes for our fans. They include a 750 G2 power supply (obviously with a 750 watt rating), a Z170 FTW motherboard and a GTX 970 SSC Gaming ACX 2.0+ graphics card. The total prize value is over $650 based on MSRPs!

All you have to do to enter is follow the easy steps in the form below. 

We want to thank EVGA for its support of PC Perspective in this contest and over the years. Here's to a great 2016 for everyone!

EVGA Winter 2016 Giveaway!!

 

Never heard of Skyrmions? One day you may have a drive full of them.

Subject: General Tech | February 2, 2016 - 01:36 PM |
Tagged: skyrmions

In the search for higher density data storage some rather arcane materials are being studied for their unique magnetic properties.  The latest research being conducted is with extremely thin multilayered films, in this specific case iridium-cobalt-platinum films.  These materials display the ability to create incredibly small magnetic features called skyrmions, an area where the magnetic field is rotated compared to the surrounding material and can be coerced to appear and disappear.  This is the essence of magnetic data storage, on a much smaller scale you see in current storage material.  There are certainly a lot of hurdles to overcome, the experiment described at Nanotechweb is the first to form skymirons at room temperature and they used an X-ray source as the write head.  It is still quite interesting to read about, even if we are a long way from seeing it considered for use in data storage.

pic1.jpg

"Researchers in France, Switzerland, the UK and Germany say they have observed nanoscale chiral skyrmions at room temperature for the first time. Skyrmions, which are quasi-particle magnetic spin configurations with a whirling vortex-like structure, could be used to make ultrahigh-density data storage technologies and nanodigital electronic devices with greatly improved data transfer speeds and processing power."

Here is some more Tech News from around the web:

Tech Talk

 

Source: Nanotechweb

Your Cat6 cabling not behaving as you would expect? Turns out that is not a Fluke

Subject: General Tech | February 1, 2016 - 04:49 PM |
Tagged: fluke, fail, cat6

The difference between Cat5(e) and Cat 6 will not be obvious for home users but is certainly noticeable in large business deployments.  Cat5 and 5e are capable of providing 100MHz whereas Cat6 is rated to 250MHz, assuming it is installed to specifications.  In addition to the increased frequency, Cat6 is has much greater protection against crosstalk and system noise which is far more important to many sysadmins. 

Previously we benefited from the honour system in place, many Cat 5 cables actually met the Cat 5e specification but it seems that this is not the case with Cat 6.  Hack a Day has heard word through a cable provider that Fluke noticed that 80% of the Cat 6 tested with their equipment does not meet specification, in many cases it does not even meet Cat 5e specs.  Since a Fluke line tester capable of analyzing network cabling to this degree of accuracy costs north of $10,000 not all companies are going to have their networks fully tested for compliance.  This may be why you are seeing odd behaviour on your network.

fluke_fail_250.jpg

"So they did some research and purchased a Fluke certification tester for a measly 12,000 US dollars. While they were purchasing the device, they ran across an interesting tidbit in the fluke knowledge base. Fluke said that 80% of the consumer Cat 6 cables they tested didn’t begin to meet the Cat 6 specification."

Here is some more Tech News from around the web:

Tech Talk

Source: Hack a Day

G.Skill Rolls Out Refreshed Mechanical Gaming Keyboards

Subject: General Tech | February 1, 2016 - 12:48 AM |
Tagged: ripjaws, RGB LED, mechanical keyboard, G.Skill, Cherry MX

Memory maker G.Skill recently announced a refresh of its mechanical keyboard line that tweaks the KM780 series and cuts $10 off of the MSRP pricing. The two new refreshed products are the Ripjaws KM780R RGB and KM780R MX.

GSkill KM780R-MX front.png

The new keyboards use an aluminum plate/base, Cherry MX switches, and a black anodized finish on the frame. The KM780R MX is backlit by red LEDs while the KM780R RGB can have custom per-key backlighting. Both feature a full QWERTY layout plus number pad as well as media playback keys, a LED volume level display, and six macro keys (three on-board key profiles). There is also USB and analog audio pass-through ports.

G.Skill is offering the new gaming keyboards in several models depending on your choice of key switch. Specifically, users can choose from Cherry MX blue, brown, or red switches. Connecting via USB, they employ anti-ghosting and full N-key rollover tech as well.

GSkill KM780R-RGB.png

The every so slightly cheaper KM780R series does away with its predecessors bundled extra gaming key caps and key removal tool. The KM780R MX has an MSRP of $120 while the KM780R RGB model has an MSRP of $159.99 (Note that the brown and red variants are actually $140 on Amazon right now, but the Cherry MX blue version is not on sale.)

While I have not used them, the original models from last year appear to have garnered quite a bit of praise in reviews (particularly from AnandTech). It seems like G.Skill has not changed much and the R variants are more of the same for a bit less, and that's probably a good thing. I'm looking forward to seeing full reviews though, of course.

Have you tried the memory giant's other products before?

Also read: Mechanical Keyboard Switches Explained and Compared by Scott Michaud @ PC Perspective

Source: G.Skill

Java Browser Plug-in Soon Killed Off by Oracle

Subject: General Tech | January 30, 2016 - 07:05 PM |
Tagged: web browser, web, shockwave flash, shockwave director, oracle, Java

After decades of semi-ubiquitous usage, Oracle has announced plans to stop providing the Java plug-in for web browsers. It will still be available in the upcoming Java 9 platform, but classified as a deprecated feature.

ie-wheeee-dead.jpg

This has nothing to do with JavaScript, which is a scripting language that web browsers use. JavaScript is not a plug-in, and it's very secure in terms of the machine the browsers run on. Pretty much all exploits that we see either trick the user to download and run a program, have them disclose sensitive information (passwords, identity, etc.) to the wrong people, try to make the browser impossible to use until it is shut down and restarted, or launch a plug-in that is the actual problem. The joke is “Java is to JavaScript as Car is to Carpet” -- but that's not true: cars often have carpets.

Java, Shockwave Director, and Shockwave Flash filled in a huge gap in Web standards during the late 90s and early 2000s. Plug-ins were about the only way to access files, per-pixel 2D animation functions, and even access to 3D graphics hardware. Web browsers can do almost all of that now, albeit file input and output is limited to individual files, because you don't want every website to be able to read and write files (and site-specific data lockers with APIs like IndexedDB and Web Storage) on the user's hard drive without the user's explicit control.

As such, browsers are trying to kill off native plug-ins. This could be a problem for games like Battlefield 3 and 4, which (Update Jan 30th @ 7:51pm: Used to... it's apparently been a while. Thanks wileecyte in the comments.) require plug-ins to launch the native application, but the browser vendors have been expressing their desires for quite some time. Even companies that are heavily invested in plug-ins for their products, like Oracle, are finally giving up.

Source: Ars Technica

So That's Where Jim Keller Went To... Tesla Motors...

Subject: General Tech, Processors, Mobile | January 29, 2016 - 05:28 PM |
Tagged: tesla, tesla motors, amd, Jim Keller, apple

Jim Keller, a huge name in the semiconductor industry for his work at AMD and Apple, recently left AMD before the launch of the Zen architecture. This made us nervous, because when a big name leaves a company before a product launch, it could either be that their work is complete... or they're evacuating before a stink-bomb detonates and the whole room smells like rotten eggs.

jim_keller.jpg

It turns out a third option is possible: Elon Musk offers you a job making autonomous vehicles. Jim Keller's job title at Tesla will be Vice President of Autopilot Hardware Engineering. I could see this position being enticing, to say the least, even if you are confident in your previous employer's upcoming product stack. It doesn't mean that AMD's Zen architecture will be either good or bad, but it nullifies the earlier predictions, when Jim Keller left AMD, at least until further notice.

We don't know who approached who, or when.

Another point of note: Tesla Motors currently uses NVIDIA Tegra SoCs in their cars, who are (obviously) competitors of Jim Keller's former employer, AMD. It sounds like Jim Keller is moving into a somewhat different role than he had at AMD and Apple, but it could be interesting if Tesla starts taking chip design in-house, to customize the chip to their specific needs, and take away responsibilities from NVIDIA.

The first time he was at AMD, he was the lead architecture of the Athlon 64 processor, and he co-authored x86-64. When he worked at Apple, he helped design the Apple A4 and A5 processors, which were the first two that Apple created in-house; the first three iPhone processors were Samsung SoCs.

Sharing is good ... until it starts eating your bandwidth

Subject: General Tech | January 29, 2016 - 02:32 PM |
Tagged: security, isp, wifi

ISPs have stumbled onto a new money making venture, renting out your wireless internet connection to third parties so that those companies can provide public WiFi to their customers.  Sources told The Inquirer that some ISPs already do this without informing their customers and that it will likely be a common industry practice by 2017.  Theoretically you are allowed to opt out but since your ISP may not have told their users they are doing this; how would the average customer know to request this be turned off?

This raises several concerns, especially here in North America thanks to our pathetic internet services.  Most users have a data cap and the ISPs have little reason to spend resources to properly monitor who is using the bandwidth, their customers or random passersby.  As well the speeds of most customers are low enough that they may see degradation of their service if numerous passersby connect to their WiFi.  Putting the monetary concerns to the side there are also serious security concerns.  Once a user has access to your WiFi router they are most of the way into your network and services such as UPnP and unprotected ports leave you vulnerable to attack.

Change the password your provider put on the router and consider reaching out to them to find out if you have been unwillingly sharing your bandwidth already, or if you might be doing so in the near future.

index.png

"Companies are going to be selling a lot more public Wi-Fi plans over the next few years and it's going to be home Wi-Fi users who'll be the backbone of the network, according to analysts from Juniper Research."

Here is some more Tech News from around the web:

Tech Talk

Source: The Register

Looks like we've got a rat, the browser formerly known as IE is spilling the beans

Subject: General Tech | January 28, 2016 - 02:25 PM |
Tagged: Privacy, microsoft, edge

Microsoft is revisiting an old issue with private browsing which we have seen too many times unfortunately.  In 2010 Firefox's private browsing broke and left site visits on your computer and in 2013 Chrome went through the same issue.  More recently it was discovered that when Chrome interacted with an NVIDIA GPU, sites could also be retrieved.  Now it is Edge's turn, the browser stores your page visits in tables under <user>\appdata\local\microsoft\windows\history even when using InPrivate Mode.  This will be resolved soon but for now if you are secretly ... ah, shopping for a loved one you might want to use a different browser, VPN or other measure.  There is more info over at The Inquirer

one.jpg

"BURGEONING ORWELLIAN nightmare corporation Microsoft has once again been found lacking in the security department, this time for the new and improved Edge browser in Windows 10."

Here is some more Tech News from around the web:

Tech Talk

Source: The Inquirer

Podcast #384 - Corsair Carbide 600Q, GDDR5X, a Dual Fiji Graphics card and more!

Subject: General Tech | January 28, 2016 - 01:38 PM |
Tagged: podcast, video, corsair, carbide, 600q, 600c, gddr5x, jdec, amd, Fiji, fury x, fury x2, scythe, Ninja 4, logitech, g502 spectrum, Intel, Tigerlake, nzxt, Manta

PC Perspective Podcast #384 - 01/28/2016

Join us this week as we discuss the Corsair Carbide 600Q, GDDR5X, a Dual Fiji Graphics card and more!

You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE.

The URL for the podcast is: http://pcper.com/podcast - Share with your friends!

Hosts: Ryan Shrout, Jeremy Hellstrom, Josh Walrath, and Allyn Malventano

Subscribe to the PC Perspective YouTube Channel for more videos, reviews and podcasts!!

Landlocked Homeworld; a glimpse at Kharak

Subject: General Tech | January 27, 2016 - 01:47 PM |
Tagged: gaming, Homeworld, Deserts of Kharak

The newest Homeworld game is a prequel covering how the fractious clans of Kharak fought over an ancient relic found in the deserts of their dying world, presumably the Mothership of the two previous Homeworld games.  From the trailers and descriptions provided in this Rock, Paper, SHOTGUN article the game will play very similarly to Homeworld, most of your assets will be restricted to hugging the ground but their is evidence of vertical terrain, flying units and perhaps even orbital units.  In exchange for that your carrier, the replacement Mothership in this game, it is mobile and heavily armed and so will play a big role in your strategy.  Read on to learn more about the game right here.

kharak3.jpg

"Homeworld: Deserts of Kharak [official site] is a prequel to the legendary Homeworld space real-time strategy games, but this time – heresy! – set on land, as the Kushan race battle angry clans to reclaim ancient technologies found on the sandy planet they currently call home."

Here is some more Tech News from around the web:

Gaming

Ever been so sick of a song you considered veering off the road to make it stop?

Subject: General Tech | January 27, 2016 - 01:24 PM |
Tagged: Usenix Enigma, security, iot

The good news is that this particular bug has been addressed but it does not make the vulnerability any less terrifying.  A mere 18 seconds of playtime on a compromised audio CD in your car is enough to insert the attack code and gain complete control over your cars computer controlled systems.  This particular vulnerability was discovered in 2010, long before the more recent vulnerabilities you would have seen all over various media.  You could shut off the engines, forcibly unlock the doors, interfere with steering and many other functions that could well cause serious damage at highway speeds or in other scenarios. 

When placing the blame, The Inquirer makes sure to point out that you should not look to the car companies as it is the software providers who are the source of the problem.  Thanks to various corporate policies no car company has access to all of the source code running in their products so a security audit will not help.  Even better is the inclusion of a government-mandated OBD-II port which allows complete control over your cars system; which you should not touch as simply plugging into it would be a crime in the USA.  There is some good news, this vulnerability resulted in Fiat Chrysler recalling 1.4 million cars at a cost of about a quarter of a billion dollars ... an expensive mistake that may convince them to change their software implementation processes.

enigma_logo_700x253.png

"The modern car's operating system is such a mess that researchers were once able to get complete control of a vehicle by playing a song laced with malicious code. Malware encoded in the track was executed after the file was loaded from a CD and processed by a buggy parser."

Here is some more Tech News from around the web:

Tech Talk

 

Source: The Register

New, from the company that brought you SuperFish ...

Subject: General Tech | January 26, 2016 - 12:13 PM |
Tagged: security, Lenovo, idiots

Lenovo chose the third most popular password of 2015 to secure its ShareIT for Windows application and for bonus points have made it hard coded, which there is utterly no excuse for in this day and age.  If you aren't familiar with the software, it is another Dropbox type app which allows you to share files and folders, apparently with anyone now that this password ridiculousness has been exposed.  As you read on at The Inquirer the story gets even better, files are transferred in the clear without any encryption and it even creates an open WiFi hotspot for you, to make sharing your files even easier for all and sundry.  There are more than enough unintentional vulnerabilities in software and hardware, we really don't need companies programming them in on purpose.  If you have ShareIT, you should probably DumpIT.

***Update***

We received word that there is an updated version of ShareIT available for those who do use the app and would like to continue to do so.

They can also access the latest versions which are posted and available for download on the Lenovo site. The updated Android version of SHAREit is also available for download on the Google Play store. Please visit the Lenovo security advisory page for the latest information and updates: (https://support.lenovo.com/us/en/product_security/len_4058)

10574265464_449a1b2b96_b.jpg

"HOLY COW! Lenovo may have lost its mind. The firm has created vulnerabilities in ShareIT that could be exploited by anyone who can guess that '12345678' could be a password."

Here is some more Tech News from around the web:

Tech Talk

Source: The Inquirer

Have you tried the Steam Controller yet?

Subject: General Tech | January 25, 2016 - 01:27 PM |
Tagged: input, Steam Controller

The claims seem suspect; how exactly can a Steam Controller replace a mouse and keyboard when gaming?  That suspicion is being tested over at The Tech Report who recently tried out Valve's new Steam Controller, comparing it not only to a standard PC input setup but also to a XBox controller.  For the test they used Rocket League, Team Fortress 2, Just Cause 3, and Helldivers with mixed results.  In the end the Steam Controller was just not as useful as the Logitech M570 trackball, wireless keyboard, and Xbox 360 controller the reviewer is used to.  That said, with a lot of practice and time spent tweaking your input profiles you could find the Steam Controller is for you ... if you want it.

steamdesk_thumb.png

"Valve's Steam Controller is supposed to obviate the mouse and keyboard for PC gaming in the living room. We put our thumbs on the Steam Controller's twin trackpads and took it for a spin to see whether it does the job."

Here is some more Tech News from around the web:

Tech Talk

Make yourself a WiFi camera remote

Subject: General Tech | January 25, 2016 - 12:40 PM |
Tagged: wifi, camera, DIY, iot

Hack a Day has posted a perfect example of how inexpensive and easy it is to build yourself useful things instead of shopping for expensive electronics.  If you have looked at the prices of cameras or adapters which allow you to wirelessly take a picture you have probably been disappointed, but you don't have to stay that way.  Instead, take an existing manual remote trigger, add in a WiFi enabled SoC module like the ESP8266 suggested in the video, download and compile the code and the next thing you know you will have a camera with wireless focus and shutter trigger.  Not too shabby for a ~$5 investment.

index.jpg

"It’s just ridiculous how cheap and easy it is to do some things today that were both costly and difficult just two or three years ago. Case in point: Hackaday.io user [gamaral] built a WiFi remote control for his Canon E3 camera out of just three parts"

Here is some more Tech News from around the web:

Tech Talk

 

Source: Hack a Day

If want great audio and don't care about the price; HiFiMAN HE-1000

Subject: General Tech | January 22, 2016 - 01:47 PM |
Tagged: hifiman, headphones, HE-1000, audio

HiFiMAN have been producing mid level and high end audio products for quite some time, straddling the line between affordable and audiophile quality.  The HE-1000 are of the aforementioned audiophile level, at $3000 you really have to have discerning ears to want to pick up these cans.  The headset is quite pretty, built with leather, wood, and aluminium with soft cloth for the earcups and a window blind design on the exterior which HiFiMAN claims has a positive effect on the audio quality.  techPowerUp tested these headphones out, you can read the description of their experience in the audio soundstage these headphones create in their review ... or not.

he-1000.jpg

"HiFiMAN is constantly developing their planar technology, and today, we will take a look at their latest state-of-the-art headphone. It is dubbed the HE-1000 and features a nanometer thick diaphragm, leather headband, and milled aluminum. We take HiFiMAN's most audacious and pricey headphone for a ride!"

Here is some more Tech News from around the web:

Audio Corner

 

Source: techPowerUp