Talk:Comparative study of field of view algorithms for 2D grid based worlds

From RogueBasin
(Difference between revisions)
Jump to: navigation, search
(Security note!)
 
Line 3: Line 3:
 
I strongly suggest thinking twice and be verry carefully with the PDF file provided in this article, until someone experienced has verified that this file indeed are safe to open!
 
I strongly suggest thinking twice and be verry carefully with the PDF file provided in this article, until someone experienced has verified that this file indeed are safe to open!
 
[[User:Solarnus|Solarnus]] 11:52, 23 February 2009 (CET)
 
[[User:Solarnus|Solarnus]] 11:52, 23 February 2009 (CET)
 +
 +
I can verify that the file is fine, with no issues whatsoever (although I'm not sure how strong my word is over here. I'm sure that if jice meant any malice, he would surely have been malicious a long time ago, or with his roguelikes. For that matter, downloading and compiling any "unknown" code (e.g. Angband source) or unsigned .exe (for Win) that is posted would be just as bad, if not worse. Given that nobody truly knows anybody in the world of the internet (meets excluded for the sake of a "point"), this could be seen as rampant paranoia.
 +
I stand by my verification. [[User:Scautura|Scautura]] 19:09, 24 February 2009 (CET)

Revision as of 20:09, 24 February 2009

There's a new exploit flowing through the net, allowing an attacker to hijack one's computer with the use of PDF files opened in Acrobat Reader 9 and earlier. All one have to do is open the infected PDF and the exploit code will be run. All platforms running Adobe's Acrobat Reader are vulnerable! References: Article on Adobe and Another article on shadowserver.com explaining how to prevent this kind of exploit.

I strongly suggest thinking twice and be verry carefully with the PDF file provided in this article, until someone experienced has verified that this file indeed are safe to open! Solarnus 11:52, 23 February 2009 (CET)

I can verify that the file is fine, with no issues whatsoever (although I'm not sure how strong my word is over here. I'm sure that if jice meant any malice, he would surely have been malicious a long time ago, or with his roguelikes. For that matter, downloading and compiling any "unknown" code (e.g. Angband source) or unsigned .exe (for Win) that is posted would be just as bad, if not worse. Given that nobody truly knows anybody in the world of the internet (meets excluded for the sake of a "point"), this could be seen as rampant paranoia. I stand by my verification. Scautura 19:09, 24 February 2009 (CET)

Personal tools