Mcafee Foundstone Fsl Update

Total Page:16

File Type:pdf, Size:1020Kb

Mcafee Foundstone Fsl Update 2018-OCT-18 FSL version 7.6.61 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 24301 - Mozilla Firefox ESR Vulnerabilities Prior To ESR 60.2.2 Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2018-12386, CVE-2018-12387 Description Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. Observation Mozilla Firefox ESR is a popular web browser. Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. The flaws lie in multiple components. Successful exploitation could allow an attacker to execute arbitrary codes in the system. 24302 - Mozilla Firefox ESR Vulnerabilities Prior To ESR 60.2.2 Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2018-12386, CVE-2018-12387 Description Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. Observation Mozilla Firefox ESR is a popular web browser. Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. The flaws lie in multiple components. Successful exploitation could allow an attacker to execute arbitrary codes in the system. 139097 - Oracle Solaris 11.3.35.6.0 Update Is Not Installed (Third Party Components) Category: SSH Module -> NonIntrusive -> Solaris Patches and Hotfixes Risk Level: High CVE: CVE-2017-3463, CVE-2017-3464, CVE-2017-3465, CVE-2017-3467, CVE-2017-3468, CVE-2017-3529, CVE-2017-3599, CVE-2017-3600, CVE-2017-3633, CVE-2017-3634, CVE-2017-3635, CVE-2017-3637, CVE-2017-3638, CVE-2017-3639, CVE- 2017-3640, CVE-2017-3642, CVE-2017-3643, CVE-2017-3644, CVE-2017-3645, CVE-2017-3647, CVE-2017-3648, CVE-2017- 3649, CVE-2017-3651, CVE-2017-3652, CVE-2017-3653, CVE-2017-3731, CVE-2017-3732, CVE-2017-3737, CVE-2017-3738, CVE-2017-5838, CVE-2017-5839, CVE-2017-5840, CVE-2017-5841, CVE-2017-5842, CVE-2017-5844, CVE-2017-5845, CVE- 2017-7544, CVE-2018-0495, CVE-2018-0739, CVE-2018-10392, CVE-2018-10393, CVE-2018-10963, CVE-2018-12359, CVE- 2018-12360, CVE-2018-12362, CVE-2018-12363, CVE-2018-12364, CVE-2018-12365, CVE-2018-12366, CVE-2018-12368, CVE- 2018-12372, CVE-2018-12373, CVE-2018-12374, CVE-2018-1336, CVE-2018-14339, CVE-2018-14340, CVE-2018-14341, CVE- 2018-14342, CVE-2018-14343, CVE-2018-14344, CVE-2018-14367, CVE-2018-14368, CVE-2018-14369, CVE-2018-2562, CVE- 2018-2565, CVE-2018-2573, CVE-2018-2576, CVE-2018-2583, CVE-2018-2586, CVE-2018-2590, CVE-2018-2591, CVE-2018- 2600, CVE-2018-2612, CVE-2018-2622, CVE-2018-2640, CVE-2018-2645, CVE-2018-2646, CVE-2018-2647, CVE-2018-2665, CVE-2018-2667, CVE-2018-2668, CVE-2018-2696, CVE-2018-2703, CVE-2018-2755, CVE-2018-2758, CVE-2018-2759, CVE- 2018-2761, CVE-2018-2762, CVE-2018-2766, CVE-2018-2767, CVE-2018-2769, CVE-2018-2771, CVE-2018-2773, CVE-2018- 2775, CVE-2018-2776, CVE-2018-2777, CVE-2018-2778, CVE-2018-2779, CVE-2018-2780, CVE-2018-2781, CVE-2018-2782, CVE-2018-2784, CVE-2018-2786, CVE-2018-2787, CVE-2018-2810, CVE-2018-2812, CVE-2018-2813, CVE-2018-2816, CVE- 2018-2817, CVE-2018-2818, CVE-2018-2819, CVE-2018-2839, CVE-2018-2846, CVE-2018-2922, CVE-2018-3054, CVE-2018- 3056, CVE-2018-3058, CVE-2018-3060, CVE-2018-3061, CVE-2018-3062, CVE-2018-3064, CVE-2018-3065, CVE-2018-3066, CVE-2018-3070, CVE-2018-3077, CVE-2018-3081, CVE-2018-5146 Description The scan detected that the host is missing the following update: SRU 11.3.35.6.0 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://support.oracle.com/rs?type=doc&id=2437228.1 https://support.oracle.com/epmos/faces/DocumentDisplay? _afrLoop=507462766511768&id=1448883.1&_afrWindowMode=0&_adf.ctrl-state=98kg3qcn0_33#aref_section26 139100 - Oracle Solaris 11.4 Update Is Not Installed (Third Party Components) Category: SSH Module -> NonIntrusive -> Solaris Patches and Hotfixes Risk Level: High CVE: CVE-2016-6352, CVE-2016-7044, CVE-2016-7045, CVE-2016-7162, CVE-2016-7163, CVE-2016-7166, CVE-2016-7445, CVE-2016-7553, CVE-2016-7957, CVE-2016-7958, CVE-2016-7976, CVE-2016-7977, CVE-2016-7978, CVE-2016-7979, CVE- 2016-8864, CVE-2016-9013, CVE-2016-9014, CVE-2016-9179, CVE-2016-9185, CVE-2017-10788, CVE-2017-11109, CVE-2017- 11112, CVE-2017-11113, CVE-2017-12176, CVE-2017-12177, CVE-2017-12178, CVE-2017-12179, CVE-2017-12180, CVE-2017- 12181, CVE-2017-12182, CVE-2017-12183, CVE-2017-12184, CVE-2017-12185, CVE-2017-12186, CVE-2017-12187, CVE-2017- 12982, CVE-2017-14039, CVE-2017-14040, CVE-2017-14041, CVE-2017-14151, CVE-2017-14152, CVE-2017-14164, CVE-2017- 2292, CVE-2017-2592, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3140, CVE-2017-5334, CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-5429, CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE- 2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017- 5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5455, CVE-2017-5456, CVE-2017-5459, CVE-2017-5460, CVE-2017-5461, CVE- 2017-5462, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467, CVE-2017-5468, CVE-2017-5469, CVE-2017- 5715, CVE-2017-5754, CVE-2017-7407, CVE-2017-7511, CVE-2017-7555, CVE-2017-8291, CVE-2017-8786, CVE-2017-8932, CVE-2017-9083, CVE-2017-9110, CVE-2017-9111, CVE-2017-9112, CVE-2017-9113, CVE-2017-9114, CVE-2017-9115, CVE- 2017-9116, CVE-2017-9406, CVE-2017-9408, CVE-2018-1166, CVE-2018-3263, CVE-2018-3264, CVE-2018-3265, CVE-2018- 3266, CVE-2018-3267, CVE-2018-3268, CVE-2018-3269, CVE-2018-3270, CVE-2018-3271, CVE-2018-3272, CVE-2018-3273, CVE-2018-3274, CVE-2018-3275, CVE-2018-3665 Description The scan detected that the host is missing the following update: SRU 11.4 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://support.oracle.com/rs?type=doc&id=2433412.1 https://support.oracle.com/epmos/faces/DocumentDisplay? _afrLoop=507462766511768&id=1448883.1&_afrWindowMode=0&_adf.ctrl-state=98kg3qcn0_33#aref_section26 194308 - Fedora Linux 27 FEDORA-2018-1fc39f2d13 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2012-6706, CVE-2017-11423, CVE-2017-12374, CVE-2017-12375, CVE-2017-12376, CVE-2017-12377, CVE-2017- 12378, CVE-2017-12379, CVE-2017-12380, CVE-2017-6418, CVE-2017-6419, CVE-2017-6420, CVE-2018-0202, CVE-2018- 1000085, CVE-2018-14679, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378 Description The scan detected that the host is missing the following update: FEDORA-2018-1fc39f2d13 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2018/10/?count=200&page=1 Fedora Core 27 clamav-0.100.2-2.fc27 194309 - Fedora Linux 27 FEDORA-2018-94315e9a6b Update Is Not Installed Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2017-1000405, CVE-2017-12193, CVE-2017-15115, CVE-2017-16532, CVE-2017-16538, CVE-2017-16644, CVE- 2017-16647, CVE-2017-16649, CVE-2017-16650, CVE-2017-17448, CVE-2017-17449, CVE-2017-17450, CVE-2017-17558, CVE- 2017-17712, CVE-2017-17741, CVE-2017-17852, CVE-2017-17853, CVE-2017-17854, CVE-2017-17855, CVE-2017-17856, CVE- 2017-17857, CVE-2017-17862, CVE-2017-17863, CVE-2017-17864, CVE-2017-18232, CVE-2017-8824, CVE-2018-1000004, CVE-2018-1000026, CVE-2018-10021, CVE-2018-10322, CVE-2018-10323, CVE-2018-1065, CVE-2018-10840, CVE-2018- 10853, CVE-2018-1108, CVE-2018-1120, CVE-2018-11506, CVE-2018-12232, CVE-2018-12633, CVE-2018-12714, CVE-2018- 12896, CVE-2018-13053, CVE-2018-13093, CVE-2018-13094, CVE-2018-13095, CVE-2018-13405, CVE-2018-14633, CVE-2018- 14678, CVE-2018-14734, CVE-2018-15471, CVE-2018-17182, CVE-2018-18021, CVE-2018-3620, CVE-2018-3639, CVE-2018- 3646, CVE-2018-5332, CVE-2018-5333, CVE-2018-5344, CVE-2018-5391, CVE-2018-5750, CVE-2018-5803, CVE-2018-7757, CVE-2018-7995, CVE-2018-8043 Description The scan detected that the host is missing the following update: FEDORA-2018-94315e9a6b Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2018/10/?count=200&page=2 Fedora Core 27 kernel-4.18.12-100.fc27 kernel-headers-4.18.12-100.fc27 194313 - Fedora Linux 28 FEDORA-2018-9f4381d8c4 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2018-10322, CVE-2018-10323, CVE-2018-10840, CVE-2018-10853, CVE-2018-1108, CVE-2018-1120, CVE-2018- 11506, CVE-2018-12232, CVE-2018-12633, CVE-2018-12714, CVE-2018-12896, CVE-2018-13053, CVE-2018-13093, CVE-2018- 13094, CVE-2018-13095, CVE-2018-13405, CVE-2018-14633, CVE-2018-14678, CVE-2018-14734, CVE-2018-15471, CVE-2018- 17182, CVE-2018-17972, CVE-2018-3620, CVE-2018-3639, CVE-2018-3646, CVE-2018-5391 Description The scan detected that the host is missing the following update: FEDORA-2018-9f4381d8c4 Observation Updates often remediate critical security problems that should be quickly addressed.
Recommended publications
  • Thesis Final8
    REFRAMING INTERACTIVE DIGITAL NARRATIVE: TOWARD AN INCLUSIVE OPEN-ENDED ITERATIVE PROCESS FOR RESEARCH AND PRACTICE A Dissertation Presented to The Academic Faculty By Hartmut Koenitz In Partial Fulfillment Of the Requirements for the Degree Doctor of Philosophy in Digital Media Georgia Institute of Technology August, 2010 Copyright © Hartmut Andreas Koenitz 2010 Reframing Interactive Digital Narrative: Toward An Inclusive Open-Ended Iterative Process For Research And Practice Approved by: Dr. Janet Murray, Advisor Dr. Kenneth Knoespel School of Literature, Communication Ivan Allen College and Culture Georgia Institute of Technology Georgia Institute of Technology Dr. Mads Haahr Dr. Jay Bolter Department of Computer Science School of Literature, Communication Trinity College Dublin and Culture Georgia Institute of Technology Date Approved: June 30, 2010 Dr. Celia Pearce School of Literature, Communication and Culture Georgia Institute of Technology It is a waste of energy and resources to make applications that merely imitate media that exist in other forms, such as print, television, and film. Pamela Jennings, 1996 To my Parents ACKNOWLEDGEMENTS First and foremost I want to acknowledge the help, dedication and commitment of my advisor Janet Murray. Her relentless criticism and simultaneous encouragement sharpened both my wit and the focus of my arguments. Jay Bolter gave me the courage to start this project and provided not only lucid intellectual advice, but also a shoulder to lean on and a voice of sanity in the darkest hours of this thesis. Celia Pearce gave me a new appreciation of games and encouraged me to include installation pieces I would have otherwise overlooked. Kenneth Knoespel always took my mind to exciting and unforeseen places and made me think outside the box.
    [Show full text]
  • The MTASC Compiler
    The MTASC compiler ...the Open Source Harmony Nicolas Cannasse – Spark Europe MTASC ? ● What is MTASC ? An AS2 commandline compiler ● What is it doing ? ...compiling ● What is it not doing ? ...help you to be rich Past ● Before : SWF decompiler, obfuscator ● December 2003 : ASML ● April 2004 : Motion Types ● October 2004 : MTASC ● Give back to the community RoadMap ● Started on 20 October 2004 ● Beta 1 on 25 October 2004 ● Version 1.0 on 26 January 2005 ● (more versions following) ● Version 1.10 on 14 Sept 2005 During this time... The FAME platform : use MTASC together with Eclipse... a Full Featured IDE May 2005 : OSFlash.org !!! an OS community for Flash A sample Using MTASC ● c:\work\Test.as : class Test { static function main( mc : MovieClip ) { mc.createTextField("tf",0,0,300,300); mc.tf.text = "Hello World !"; } } ● Compile using : mtasc -swf test.swf -main -cp c:\work Test.as MTASC -trace Feature ● Redirect trace() calls in your application mtasc -trace my.Class.myTrace ... ● Add debug informations : trace("something") => my.Class.myTrace ("something","Test::foo","Test.as",4); ● Remove traces easily mtasc -trace no ... The Present ● MTASC is stable : try it ! ● The fastest AS2 compiler out there ● Make your everyday life Better ● 1.11 might be last version ? The Future ● New Challenges : ActionScript 3 ? AVM2 : new better virtual machine ● Why MTASC is successful ? ● It's all about innovation The haXe Programming Language ● A programming language for the web web : HTML/CSS/JS/Flash/PHP/Perl/SQL... ● What is haXe ? a programming
    [Show full text]
  • A Web-Oriented Programming Language
    haXe A Web-oriented Programming Language OSCON 2006 Nicolas Cannasse http://haxe.org [email protected] First Rule haXe == Simple What is haXe ? It's simple ! Crossplatform : Linux, Windows, OSX, BSD Multiplatform : JS, Neko, SWF Easy to get started : let's do it Hello World class Hello { static function main() { trace(''Hello World !''); } } Outputs Javascript : hello.js Flash SWF : hello.swf Neko bytecode : hello.n Hello World Let's try it ! haXe == Simple One single language for your whole website... Simplify the whole development process. ...if you need it. haXe == Simple One standard crossplatform library + Platform-specific libraries : (root package) : core library js.* / flash.* / neko.* : platform-specific libraries haxe.* : standard library components, crossplatform haXe == Simple Created to simplify your life Anything complicated ? ...fill a bug-report Simple does not mean featureless Second Rule haXe == Powerful haXe == Powerful QUESTION : « What is your favorite programming language » haXe == Powerful Dynamicly typed ? This is good Some people like staticly typed They have some points too... typos, documentation, refactoring... But people don't like to write... haXe == Powerful public static HashMap attributesHash( String xmlData ) { try { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); Document doc = factory.newDocumentBuilder().parse(xmlData); Element element = doc.getElementById("id"); NamedNodeMap attrs = element.getAttributes(); int numAttrs = attrs.getLength(); HashMap hattribs = new HashMap();
    [Show full text]
  • Technical Notes All Changes in Fedora 13
    Fedora 13 Technical Notes All changes in Fedora 13 Edited by The Fedora Docs Team Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their respective owners. Abstract This document lists all changed packages between Fedora 12 and Fedora 13.
    [Show full text]
  • Evaluating the Haxe Programming Language
    Evaluating the Haxe Programming Language Performance comparison between Haxe and platform-specific languages Bachelor of Science Thesis in Software Engineering and Management STEPAN STEPASYUK YAVOR PAUNOV University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering Göteborg, Sweden, June 2013 The Author grants to Chalmers University of Technology and University of Gothenburg the non- exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Evaluating the Haxe Programming Language Performance comparison between Haxe and platform-specific languages STEPAN STEPASYUK, YAVOR PAUNOV. © STEPAN STEPASYUK, June 2013. © YAVOR PAUNOV, June 2013. Examiner: RICHARD TORKAR University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 Department of Computer Science and Engineering Göteborg, Sweden June 2013 Evaluating the Haxe Programming Language Performance comparison between Haxe and platform-specific languages Stepan Stepasyuk Yavor Paunov Gothenburg University Gothenburg University Department of Computer Science and Engineering Department of Computer Science and Engineering Gothenburg, Sweden Gothenburg, Sweden [email protected] [email protected] Abstract 2.
    [Show full text]
  • Daniel Lucio May 15Th, NCCU, Durham, NC
    Introduction to Parallel Programming Daniel Lucio May 15th, NCCU, Durham, NC 1 Outline 1. Parallelism vs Concurrency? 2. Parallel paradigms 2.1.Shared-Memory 2.2.Distributed-Memory 3. Design Models 3.1.Task Decomposition 3.2.Data Decomposition 4. Methodologies 5. Design Factor Scorecard 6. What’s Not Parallel? 7. Programing Paradigms 7.1.Message Passing Interface 7.2.OpenMP 8. Anything else? SURA Workshop, May 2012 2 Introduction to Parallel Programming Outline 1. Parallelism vs Concurrency? 2. Parallel paradigms 2.1.Shared-Memory 2.2.Distributed-Memory 3. Design Models 3.1.Task Decomposition 3.2.Data Decomposition 4. Methodologies 5. Design Factor Scorecard 6. What’s Not Parallel? 7. Programing Paradigms 7.1.Message Passing Interface 7.2.OpenMP 8. Anything else? SURA Workshop, May 2012 3 Introduction to Parallel Programming Concurrency or Parallelism? A concurrent program or algorithm is one where operations can occur at the same time. For instance, a simple integration, where numbers are summed over an interval. The interval can be broken into many concurrent sums of smaller sub-intervals. Concurrency is a property of the program. Parallel execution is when the concurrent parts are executed at the same time on separate processors. The distinction is subtle, but important. And, parallel execution is a property of the machine, not the program. SURA Workshop, May 2012 4 Introduction to Parallel Programming Concurrency or Parallelism? A system is said to be concurrent if it can support two or more actions in progress at the same time. A system is said to be parallel if it can support two or more actions executing simultaneously.
    [Show full text]
  • Developpementweb-OS-1
    Développement Web Open Source haXe et les outils « open source » Première partie Le Web aujourd’hui • HTML • Java script • CSS • Flash • PHP • Java •… haXe Langage Web Universel Les différentes technologies actuelles Navigateur Web Client HTML CSS Flash Java script Action script Serveur BDD (MySQL…), système de fichiers… Php Java Ruby / Python … La vision haXe ☺ Navigateur Web Client HTML CSS Flash haXe Serveur BDD (MySQL…), système de fichiers… haXe Historique de haXe • Motion-Twin© développe des jeux Flash et des sites de jeux • Flash Action Script MotionTypes • MotionTypes MTASC ( Client Flash) • MotionTypes MotionScript Neko (Serveur ) • Arrivée de AS3 (Flash Player 9) haXe • http://ncannasse.free.fr/?p=64 haXe langage universel Web • Compilateur en ligne de commande • Compatible Windows / Mac OS / Linux • Multi plateforme: JS, Neko, SWF (Flash6-9) • Syntaxe à la C++ /Java / JS / Action Script • Concepts inspirés de Java / Action Script / OCaml… • Possibilités d’extension (Php…) Concepts haXe • Librairies standard (communes) + Librairies spécifiques aux différentes plateformes • Typage fort + Inférence de types • Paramètres de types (Arrays, Lists, Hashs) et fonctions paramétrées • « Delegate » automatique • Compilation Conditionnelle • Infos Debug supplémentaires • Remoting Exemple de code class Main { static function main() { var s : String = "HelloWorld !"; var a = new Array<String>(); for ( i in 0...s.length ) a.push( s.substr( i, 1 ) ); var s2 = a.join( "" ); #if js trace( s2 + " in JS" ); #else flash trace( s2 + " in Flash"
    [Show full text]
  • Title of Presentation
    haXe for Flash Game Dev. Nicolas Cannasse, Motion-Twin http://ncannasse.fr March 8, 2010 WARNING !!! code(); // ahead ! Compiler ? Compiler ? Compiler ? Compiler ? Before haXe : MTASC haXe@FGS D.R.Y. Don't Repeat Yourself DRY DRY DRY Type Inference Data Structures • AS : Array, Dictionary, Vector – (+) native speed – (-) not customizable • Algorithms ~= Data Structures • How to express your own (abstract) DS ? Generics class Foo { var arr : Array<Sprite>; function new() { arr = new Array(); } } Generics Generics in use http://lab.polygonal.de haXe@FGS K.I.S.S. Keep it Simple, Stupid Enums Enums Enums Enums Enums In action ! PBJ Assembler Iterators Iterators Iterators Iterators Iterators • Use them as you wish – By simply adding .iterator() method • Optimized for common cases – Array, Vector, .... • Iterator + Generics + Functional = Lambda haXe@FGS I.N.M.S. I Need More Speed ! Compiler Speed • hxFormat Benchmark – 64 files , 10.000 lines, 300KB • haXe : 0.31s • AS3 conversion • MXMLC : 3.3s Inlining Inline In Action ! Back to Generics Generics • The issue with Generics • The solution : haxe.rtti.Generic • Tradeoff Poll What is the most fast way to read/write data ? A) Array B) Vector C) ByteArray D) SomethingElse Poll What is the most fast way to read/write data ? A) Array B) Vector C) ByteArray D) SomethingElse Poll What is the most fast way to read/write data ? A) Array B) Vector C) ByteArray D) Alchemy Global Memory Alchemy flash.Memory // Quake Fast Inverse Square Root function invSqrt( x : Float ) : Float { var half = 0.5 * x; flash.Memory.setFloat(0,x); var i = flash.Memory.getI32(0); i = 0x5f3759df - (i>>1); flash.Memory.setI32(0,i); x = flash.Memory.getFloat(0); x = x * (1.5 - half*x*x); return x; } flash.Memory • classic invSqrt : 92.61 • « optimized » invSqrt : 56.71 (+62%) • flash.Memory invSqrt : 11.72 (+686%) – ~8 times faster ! – ~same time as a DIV ! flash.Memory In Action ! Summary In case you were sleeping..
    [Show full text]
  • Development Tendencies of Programming Languages S.J
    Journal of Engineering and Technology DEVELOPMENT TENDENCIES OF PROGRAMMING LANGUAGES S.J. Mahmudova* Department of Software Engineering, Institute of Information Technology of ANAS, Baku, Azerbaijan. ABSTRACT The study presents the information on software engineering (SE) and the knowledge spheres covered by SE. The development stages of programming and the problems encountered in this field are explored. Various programming languages are used to create software for problems. Programming is the process of developing software for a computer. One of the main goals of modern software engineering is to create software products for different problem-oriented areas and to ensure its effectiveness throughout the life cycle. In a broad spectrum, programming means the creation process of software. This includes analyzing and managing the issue, scheduling and designing the program, developing algorithms and data structures, and writing, executing, testing, documenting, configuring, completing and accompanying the program texts. The point is that although the programming languages are powerful and multifunctional, syntax for none of these languages is currently perfect and universal. Hence the programming languages are constantly developing. Broadcasting multi-core processors, cloud programming, portable techniques (digital video camera, music player, mobile phones, GPS navigators, Notebook, İpad, etc.) as well as distributed architecture have created new problems for manufacturers. The information on programming languages are presented, the comparative
    [Show full text]
  • March 2014 | Bdpatoday
    NBDPA Local Chapter Edition Special Edition: 2014 Women’s History Month March 2014 | Volume 39.03 AT&T Stadium, North Texas—Every spring, Bracketologists worldwide try robotics, big data to do their best to outfox the NCAA Men's Basketball Committee in selecting, seeding, and filling out regional brackets for the NCAA & bracketology Division-I Men's Basketball In this Championship, also known as “The Issue: Mashing ‘The Big Big Dance”. Statistical algorithms cover Dance’ with Big Data See NCAA on page 9 Bracketology + BIG DATA #FinalFour pages 5 + 7 FIRST Robotics #robotics page 10 Government Relations: NIST Cybersecurity Framework and DHS helps partnership for new C³ Voluntary Program #GovRel pages 12 + 13 BDPA Member and Alumni Careers & Internships ▲Crashing the Dance uses artificial intelligence techniques to predict how #BDPA14 the NCAA Men's Basketball Committee selects and seeds teams for the page 17 tournament. Over the last five seasons, Crashing the Dance has successfully The Internet of Everything: predicted 95% of the at-large teams and 85% of seeds within one of their actual Series (IoE) continues with seed lines. Cisco Systems and PTTV graphic: ©GettyImages bt ICT industry news for emerging markets www.bdpatoday.org Chapter News- as- a - Service The more viewpoints we have,THE FURTHER WE CAN SEE. At Northrop Grumman, diversity isn’t just a policy, it’s a principle. We bring together people of diff erent cultures, experiences, ideas, genders—thousands of perspectives working toward a single goal: global security. We’re successfully protecting the planet—not just because of our individual talents but because of our collective strengths.
    [Show full text]
  • The Haxe Compiler
    Part I The Core Language Chapter 1: Introducing haXe Chapter 2: Installing and Using haXe and Neko Chapter 3: Learning the Basics Chapter 4: Controlling the Flow of Information Chapter 5: Delving Into Object-Oriented Programming Chapter 6: Organizing Your Code Chapter 7: When Things Go Wrong COPYRIGHTED MATERIAL cc01.indd01.indd 1 112/27/072/27/07 99:21:58:21:58 AAMM cc01.indd01.indd 2 112/27/072/27/07 99:21:59:21:59 AAMM Introducing haXe The Internet is a fantastic invention. As developers, we determine its future and shape its usefulness through our own developments. This book will hopefully help to refine this path, as we seek to make the Internet ever more perfect. In this chapter, you will acquire a broad perspective of: ❑ Current issues with developing for the Internet. ❑ What are haXe and Neko? ❑ How haXe and Neko can alleviate issues with Internet development. A Problem with Internet Development The IT developer, regardless of skills and title, can often be perceived as sitting somewhere along a scale depicting the transition from the creative to the logical. On the creative end of the scale, you might see those who design website layouts, digital illustrations, animations or presentations, while on the purely logical side, you might see the database administrators or server - side architects. Of course, most people located under the developer umbrella sit somewhere in between and cover more than a little speck along this line. The term developer tends to describe those who deal with some form of programming language. The highly creative ones might use ActionScript or JavaScript to accomplish their development needs, while the very logical may be restricted to using PL/SQL or C, perhaps.
    [Show full text]
  • Login and Networking Services for Online Multiplayer Games
    Chithra Prabha Peachi Muthu Login and Networking Services for Online Multiplayer Games Helsinki Metropolia University of Applied Sciences Master’s Degree in Engineering Information Technology Master’s Thesis in Information Technology 14 October 2015 PREFACE The research started in 2012, exploring networking features for an online multiplayer game. Initially an understanding of the requirements of the login services required to involve a higher number of users online was explored. Multiplayer Game development using unity tool was experimented. Login and Networking services for a unity game were implemented. Also, various networking features supported in a unity game were studied. The possibility of using login and networking services supported in an IP Multimedia Subsystem (IMS) for online games was studied. IMS is one of the established frame- works available for communication and messaging applications for millions of users. A study was carried out to analyse the usage of authentication methods using the SIP protocol for games. The main objective of the research was to study the networking needs in the multiplayer game, implement the secure login services, and check for the possibilities of using the IMS Platform Architecture with the SIP Protocol for login services in multiplayer games. In the study the Authentication and Messaging methods in SIP were compared with the login and networking services supported by the Azure Platform and Photon Gaming Plat- form, as these platforms are very actively being used in the multiplayer games developed using the Unity tool. The research gives details of ways to implement login services and networking features using the unity game development tool, and compares it with the usage of the SIP pro- tocol for login services.
    [Show full text]