Month: March 2009

Review: Dead Space (Xbox 360)

Posted by – March 31, 2009

Dead Space Box Art

Dead Space Box Art

First off I should state that I’m not generally one to play the survival horror genre, although I have played and thoroughly enjoyed many of them such as System Shock 1&2.  I’ve also completed the game twice within short succession in order to write this review.

The general outline is that you are an engineer named Issac (named after Isaac Asimov) who is sent to a mining ship with a small crew to fix their communications systems as the ship went into radio silence and hasn’t responded to any forms of communication.  You then become stranded on this ship, and you notice that there are creatures lurking about (called Necromorphs) that want to kill you, and turn you into one of them.

Space zombies!  Yes, I know almost every space horror game has these now but considering how much polish EA put into Dead Space, it’s really not an issue.  It doesn’t seem like an old idea.  And the different forms that you find all over the ship make it a lot more interesting than fighting the same 3 enemy models over and over.  A big part of this is the fact that you have to attack the limbs.  Use your Plasma Cutter to hack the legs off, so they crawl towards you, then blow their head and arms off with the line cutter.  It’s quite fun, and also creepy because you can fire blindly into their chest and cut their legs off, but they’ll still scramble across the floor trying to kill you.

Although I can’t really say I was scared by this game (although the 2nd playthrough was surprisingly more spooky for some reason) but it did have some elements that made it spooky.  Take for instance the main religion of the game universe Unitology.  There are people in the game that WANT this all to happen, as it’s part of what should happen according to their idea of God’s Divine Plan(TM).  This personally filled me with frustration because these people don’t know what they’re doing sentencing these people to their deaths in the name of a fictional character.  Sort of like the frustration I have in the real world, where all these wars are started over which religion is more peaceful as they try to bring about the end of the world.

The lack of ammo in the harder difficulties definitely made me walk a little slower, and swear a bit more when I get jumped by three or four baddies as I fire wildly into the mass of limbs.  This definitely helped set the mood and made for a better gaming experience overall.  So if you want to get the most out of the story, don’t hesitate to bump up to a higher difficulty level on your first playthrough.

Overall I have to say I’m quite impressed with the game.  It was more than I expected and although I play’d it twice in a row I didn’t find it difficult to do so at all.  I’d advise you to at least give this game a shot, and if your into the survival horror genre you’re going to definately want to play the hell out of this one.

Fixed: RSS Feed

Posted by – March 28, 2009

It was brought to my attention of a good friend of mine that the RSS feed was broken.  The problem seemed to ahve been caused by a wordpress update that required a change to the .htaccess but it wasn’t writeable.

It’s fixed now, so everyone can enjoy some good syndication.  If you notice any more issues please let me know.

Special thanks to Gzaector, or iamjrich or dododestructor or whatever he wants to use fulltime now.

Burn-E or How Pixar is Awesome

Posted by – March 16, 2009

Whether you’ve seen Wall-E or not, and whether you enjoyed the movie or not you probably agree that some of the best movies of the last two decades came out of Pixar Animation Studios.

When Pixar was bought out by Disney, I among many others were worried that like so many takeovers, the larger less creative company will absorb the smaller one and thus break up the team and thought process and kill all the skills and talent they had.  However Disney did a great thing, they pretty much let Pixar do it’s own thing like they did before, and it’s treated them well because they’ve come out with some great movies since then.

However, I wanted to state how Pixar was awesome, because even after Wall-E was made and ready to ship out Pixar made a few extras including a short which introduced us to BURN-E.  Whether it was intentional marketing move, or whether some employees were just playing around with the renderfarm I don’t know.  The fact that they actually made additional content just for the release is awesome.  It’s a shame you don’t see that more often, and it’s one way to tell that Pixar is going to be around for quite some time.

Without further delay, here’s the BURN-E short on Youtube.

Setting Up SSH Tunnels With Putty

Posted by – March 3, 2009

Always ensure secure network connections.

Always ensure secure network connections.

I’ve been playing around with VPN’s and ssh tunnels to try and get my ipod touch to use something secure when I’m connecting to random wireless networks.  Needless to say it’s not working so great.  I want my itouch to tunnel everything through ssh to my server at home, but Apple hasn’t ever thought of that nor can I find any application to do so (and probably won’t as it would need to run in the background which Apple doesn’t allow, at least when your not jailbroken).  It’s leaving me little choice but to jailbreak or else I can’t have secure connections without setting up a VPN over IPsec which is about as fun as it sounds.

So while I was toying around with different things, it occurred to me that many people don’t know how to secure their traffic and prevent people form listening in.  I’m going to show you how you can take a windows PC or laptop, and route web traffic through a shell account you have ssh access to.  I’ll then show you how to setup FireFox and the SwitchProxy extension to use the tunnel efficiently, as well as the basic premise to make any program you have access the tunnel as well.

First I guess I should explain just why you’d want to go to the trouble of doing all this.  Well, whenever you use someone else’s connection whether it be a wireless access point at a coffee shop, shopping mall, neighbor’s or even plugged into a school’s network the bulk of your web traffic is sent as plain text.  This means anyone who wants to can probably listen in on anything you say to your friends on an IM client, or even check your email if your not enforcing SSL.  Even on a WPA or WEB enabled wireless connection your data would be easy enough to sniff if the  attacker has time enough to crack the key.  I know many people who even go to a coffee shop and setup their own laptop to act like an access point, collecting all the information for anyone who connects to it, in a classic man-in-the-middle attack.

Alright, so the first thing you need to do is open Putty.  If you don’t have Putty already get it, it’s one of if not the best terminal program for Windows!  Alright now that it’s open to go ‘SSH > Tunnels’ on the left hand menu.  In this section, click on the radio button marked ‘Dynamic’ and put ‘9999’ (or any port of your choosing, providing it’s not in use) in the ‘Source port’ text box, click “Add”.

Setting Up The SSH Tunnel in Putty.

Setting Up The SSH Tunnel in Putty.

Now go to the ‘Session’ Menu on the left side again, and enter the server information.  Then Name it, and click save.  it should look something like this:

Saving the Session in Putty.

Saving the Session in Putty.

Alright so now that the session is saved with your tunnel settings your now ready to go.  Login to your shell, and just leave it there for now (you can do anything you’d normally do, except leave [which will close the tunnel]), and open FireFox.  Go to Tools > Options, then select the ‘Advanced’ Tab and click on ‘Settings’ where it says “Connection: Configure how FireFox connects to the Internet”.

Firefox connection settings, to put in the address of the SSH tunnel.

Firefox connection settings, to put in the address of the SSH tunnel.

Now select “Manual Proxy Configuration” and for the “SOCKS Host” enter ‘localhost’ and ‘9999’ for the port (unless you specified something else earlier).  Accept all changes.  Your now browsing the web through FireFox securely through your new SSH tunnel.  Keep in mind if you close your Putty terminal you’ll get ‘connection refused’ messages until you either reconnect to the shell or you go into your settings and remove the proxy.

Firefox Proxy Settings.

Firefox Proxy Settings.

Now that you have the basic premise of how to setup your SSH tunnel through Putty, we’re going to install the SwitchProxy Firefox extention to make the switch to secure browsing simple and quick.  SO go ahead and grab a copy of SwitchProxy from the Mozilla Add-on website.  Install it, then restart FireFox (as required).  You’ll now notice that in the bottom right corner it’ll say “Proxy: None”.  You’ll also notice an annoying toolbar, which you can right-click on and remove luckily.

Alright, so right-click the bottom right corner, and select “Manage Proxies”, click “Add” then select “Standard”, name it, enter ‘localhost’ for the ‘SOCKS proxy’ and ‘9999’ for the port, and finally select “SOCKS v5″ and save changes.  You can now right-click SwitchProxy in the bottom corner, and select ‘SSH Tunnel” (or whatever you named it) and switch effortless back and forth between secure and default connections.

Adding the SSH tunnel to SwitchProxy.

Adding the SSH tunnel to SwitchProxy.

Phew.  That seemed like a bit of work, but it’s well worth it to have this setup for whenever you may find yourself in unknown territory.  Keep in mind you can set ‘localhost’ and port ‘9999’ as ANY proxy you find in any program you use in order to secure it.  Pidgin, MSN, AIM are all good candidates as are POP3 and IMAP mail clients if they aren’t (and even if they are) SSL enabled.

I hope this guide helps at least someone out there.  If anyone has an ideas on how to tunnel through on an ipod touch be sure to let me know.

Edit: You may also want to go into FireFox’s about:config (but entering it into the address bar) and changing network.proxy.socks_remote_dns to true.  This will send DNS requests to the tunnel as well for added anonymity.