Sunday, November 4, 2012

El desarrollador del primer Zelda para Wii U podría ser…

Nuevo rumor relacionado con Wii U: El desarrollador del primer juego de Zelda para la consola podría ser Retro Studios, la desarrolladora de la genial trilogía Metroid Prime o del mítico Donkey Kong Country Returns. Es una pista que habría dejado caer Shigeru Miyamoto, creador de la franquicia, en una entrevista recogida por ONM. En este sentido ya existen muchas especulaciones jugosas sobre la aventura de Link: adéntrate en nuestro informe y babea ante sus detalles tan ambiciosos como épicos.

“La posibilidad de que Retro Studios haga un nuevo Zelda con una buena propuesta no es una idea descabellada, ya que todo es posible”, ha explicado Miyamoto (vía Examiner). El gran problema de tamaña producción serían inconvenientes geográficos: Retro Studios está en América y Nintendo en Japón, y ésta cree que para un título así se necesita una comunicación constante y lo más directa posible.
Wii U

“Aunque Retro Studios está cualificada, Nintendo querría tener un contacto muy directo con la compañía que crease este Zelda. Teniendo en cuenta que está localizada fuera de Japón, la distancia y las diferencias entre husos horarios complicaría mucho la comunicación”.

A parte de este impedimento, no sería descabellado que Retro Studios se encargase de desarrollador el primer juego de Zelda para Wii U. Al fin y al cabo hasta la fecha todos sus lanzamientos son intentos con éxito de reavivar franquicias de la Gran N como Metroid o Donkey Kong. ¿Por qué no hacerlo con Link?

En este sentido, que Nintendo Wii U se quede sin una aventura de Zelda dentro de su catálogo inicial no es mala noticia. Si echamos un vistazo rápido encontramos títulos imprescindibles para los primeros fans de la consola, como Super Mario Bros. U o Zombi U. ¿No nos crees? Ya sospechábamos que eras un escéptico y por eso te hemos preparado un vídeo con los mejores juegos que están por llegar para la plataforma.

Por Daniel Cáceres

PS4: ¡¿La sucesora de PS3 copiará la Kinect de 360?!

PS4, la oficiosa sucesora de PS3, podría copiar a la Xbox 360 de Microsoft. Concretamente se ha detectado una pista que apuntaría a que Sony estaría trabajando en una cámara muy parecida a Kinect (vía 3DJuegos). Concretamente el indicio se ha hallado en una oferta laboral donde se busca a alguien para que participe en el desarrollo de una cámara capaz de determinar la posición de personajes u objetos. ¿Cuándo se podría revelar tanto la consola como su invento? Haz clic aquí para averiguarlo.

¿Y si es un trabajo para mejorar PlayStation Eye? Imposible porque la cámara actual de PlayStation 3 no puede determinar la posición de objetos o personas como la Kinect de Xbox 360. Al menos eso es lo que nos garantiza PlayStationLifeStyle En todo caso podríamos estar ante una segunda aversión o ante algo más intricado.
Ahora la siguiente pregunta que se nos plantea es: ¿será la Kinect de Sony una cámara para PS3 o pasaremos directamente a su sucesora, PS4? Hace unos meses apostaríamos por la segunda, pero te recordamos que en unas semanas sale otro periférico revolucionario para la consola actual de Sony: Wonderbook. ¿Qué sentido tiene sacar un libro de esta índole si piensas dejar de apoyar a tu plataforma al poco tiempo?

Otro asunto que ha preocupado a PLS es un apartado de la oferta laboral donde ese menciona que la Kinect de Sony estaría dirigida a la producción de juegos para una masa casual. ¿Y si PS4 se torna una suerte de Wii U, es decir, una generadora constante de títulos centrados a un público demasiado familiar?
Un nuevo misterio ha nacido y decenas de preguntas han surgido. Mientras esperamos a una posible respuesta, que bien podría llegar de cara a la E3 de 2013, te dejamos con una imagen que bien podría indicarte la tecnología que utilizará el curioso Kinect de Sony. Haz clic aquí para echarle un buen ojo.

Por Daniel Cáceres

Wireless Video Surveillance

Wireless security camera systems allow you to install a camera where trenching or cabling for internet may be impractical or expensive. Based upon location, systems can be configured for different distances.
Wireless systems are convenient for any application but can be especially helpful for the special needs of oil & gas well sites, law enforcement, border control, parks & recreation, gas pump convenience stores, construction sites, parking lots, remote gates, ranches, etc.

WiFi Wireless Security Camera Systems

Wifi wireless systems transmit secure, encryted digital video and audio to an internet router or network using high frequency signals. When combined with a Sniper Cloud camera, bandwidth usage is minimized because video is uploaded on demand as opposed to constant streaming.
Digital WiFi systems have a wider transmission range allowing for higher quality images than Analog wireless systems.
Utilizing a combination of antennas, you can configure a WiFi wireless systems for ranges up to 15 miles.
  • 200 Foot Range
    (camera with built-in WiFi + wireless router)
    WiFi wireless - 200 ft range
  • 5 Mile Range
    (camera + 2 WiFi antennas + wireless router)
    WiFi wireless - 5 mile range
  • 15 Mile Range
    (camera + 4 WiFi antennas + wireless router)
    WiFi wireless - 15 mile range

--------------

4G Wireless Security Camera Systems

4G wireless surveillance cameras work with a cellular data plan to transmit video and audio to the internet. When combined with a Sniper Cloud camera, data usage is minimized because video is uploaded on demand as opposed to constant streaming.
4G video streaming requires a strong signal. At times of cell tower congestion, a weaker signal could mean a temporary reduction in the number of users that can simutaneously access the camera, and can affect the speed of video transmission.
Security is provided by the cellular data plan provider. Most major cellular companies use mutual authentication, 128 bit encryption and airlinkciphering to protect your data transmissions.
  • Works within 4G service areas for AT&T, Verizon, or T-Mobile
    (camera with built-in 4G modem + data plan)
    4G wireless security camera
------------
 

Analog Wireless (FM Radio) Security Camera Systems

An Analog wireless system uses radio frequencies to transmit video and audio signals. The wireless camera has a wide transmission range with distances up to 500 feet or more when not obstructed (Line of Sight). Obstructions such as windows, walls, trees, etc. will shorten the transmission range.
Analog wireless signals are not encrypted, and therefore are not secure. The signals can experience interference from cell phones, microwave ovens, video games, etc. If this is not of concern, then an Analog wireless system is a good choice because of the low cost of cameras when compared to digital camera options.
  • 500 Foot Range
    (camera with built-in FM modulator + receiver cabled to DVR)
    Wireless analog camera using FM radio
 
resource:

How to set up your home wireless network


How to set up your home wireless network

You can use a wireless network (WLAN) to share Internet access, files, printers, game consoles, and other devices among all the computers in your home. After you’ve completed the initial wireless router setup and added your computers and devices to the network, you can use your home network to surf the web or to play online games—whether you're sitting in your living room or relaxing in your backyard.
It's easier than ever to set up a wireless network, especially now that Internet access and routers (like Linksys wireless routers and D-link wireless routers) have become widely available.
Man with a laptop in a hammock

What you’ll need to set up your wireless network

  • An operating system that supports wireless networking
    The Windows 7 operating system fully supports wireless networking. For Windows Vista users, we recommend installing Windows Vista Service Pack 2 before setting up your wireless network. For Windows XP users, we recommend installing Windows XP Service Pack 3. Use Windows Update to check whether you need the service pack and to install it. Click the Start button, click All Programs, click Windows Update, and then click Check for updates. Although the service packs for Windows Vista and Windows XP are not required for wireless networking, they can make things much easier and can help protect you against hackers, worms, and other Internet intruders.
  •  
  • A broadband (DSL or cable) Internet connection
    To set up a wireless network, you need a broadband or high-speed Internet connection (not a dial-up connection) provided by an Internet service provider (ISP), usually for a monthly fee. Two common broadband technologies are Digital Subscriber Line (DSL) and cable technology. These require a DSL modem or a cable modem (often provided by your ISP). After you have an ISP and a modem, you're ready to connect to the Internet.

    Set up a new connection to the Internet:
  • A wireless router, a DSL modem, or a cable modem with built-in wireless networking support
    The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Newer DSL and cable modems come with integrated wireless networking capability and are called modem routers. If the modem router you received or purchased from your ISP already has wireless capability built in, you do not need to purchase a separate wireless router. Just follow the instructions provided by your ISP for activating your wireless connection.

    If you do need to purchase a wireless router, be sure that you buy a wireless router and not a wireless access point. The Linksys router is a popular router for wireless networks because it’s simple to set up. There are many routers to choose from, for example:





    Picture of a Linksys wireless routerPicture of a D-Link wireless routerPicture of a Cisco wireless routerPicture of an ASUS wireless router
    Linksys wireless routersD-Link wireless routersCisco wireless routersASUS wireless routers
    While you're looking for a wireless router or other wireless equipment in stores or on the Internet, you might notice that you can choose equipment that supports four different wireless networking technologies: 802.11a, 802.11b, 802.11g, and 802.11n. We recommend 802.11g (Wireless-G) or 802.11n (Wireless-N) because they offer excellent performance and are compatible with almost everything.

    NOTE: If you do not want to buy a wireless router or if you want to connect computers or devices temporarily for a specific purpose, like sharing devices or games, you can set up a temporary wireless network without a router. This is called an ad hoc network.

    Set up an ad hoc network:
  • A computer with built-in wireless networking support or a wireless network adapter
    If you have a newer computer, you may already have built-in wireless capabilities. If this is the case, you don’t need a wireless network adapter. Here’s how to check whether your computer has wireless support installed:


    Windows 7 and Windows Vista

    • Click Start, click Control Panel, and then click Network and Internet. If you see any of these words listed, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless capability installed.

    Windows XP

    1. Click Start, right-click My Computer, and then click Properties
    2. In the System Properties window, click the Hardware tab.
    3. Near the top of this window, click the Device Manager button.
    4. In the Device Manager window, there is a list of hardware components which are installed on the computer. Press the Plus sign (+) to the left of the icon to open the Network adapters item in the list. The Network adapters section of the window expands to reveal a list of all network adapters installed on the computer.
    5. If you see any of these words in the list of installed network adapters, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless network support installed.

    If your desktop or laptop computer does not have built-in wireless support, you need to purchase a network adapter to wirelessly connect your computer to your wireless router. If you need an adapter for a desktop computer, buy a USB wireless network adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.

    NOTE: To make setup easy, choose a network adapter made by the same vendor that made your wireless router. For example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from Linksys, Actiontec, D-Link, Netgear, Microsoft, and Buffalo. If you have a desktop computer, make sure that you have an available USB port where you can plug in the wireless network adapter. If you don't have any open USB ports, buy a USB hub to add additional ports.


  • A copy of your router setup instructions
    Before you begin setting up your wireless network, it’s a good idea to make sure that you have the copy of the setup instructions provided by the router manufacturer or your ISP. If you do not have a copy, visit the manufacturer’s website for get instructions on how to set up your router. All routers vary, and you may need to consult the instructions to set up your wireless network using your specific router.
Shopping list
After you have everything you need, follow these five steps to set up your wireless network.

1. Connect to the Internet

Make sure that your Internet connection and your DSL or cable modem are working. Your wireless network depends on this connection.

2. Connect your wireless router

These are the steps for connecting a stand-alone wireless router to your DSL modem or cable modem. If you have a modem router, follow your ISP’s instructions for connecting your network.
Since you'll be temporarily disconnected from the Internet, print these instructions before you go any further.
First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
Wireless router setup mapNext, connect your router to your modem:
Note: The instructions below apply to a Linksys wireless router. The ports on your router may be labeled differently, and the images may look different on your router. Check the documentation that came with your equipment for additional assistance. Or do a Bing search on “[your manufacturer/model] wireless router setup” to find images and instructions.
  • If you currently have your computer connected directly to your modem: Unplug the network cable from the back of your computer, and plug it into the port labeled Internet, WAN, or WLAN on the back of your router.
  • If you do not currently have a computer connected to the Internet: Plug one end of a network cable (included with your router) into your modem, and plug the other end of the network cable into the Internet, WAN, or WLAN port on your wireless router.
  • If you currently have your computer connected to a router: Unplug the network cable connected to the Internet, WAN, or WLAN port from your current router, and plug this end of the cable into the Internet, WAN, or WLAN port on your wireless router. Then, unplug any other network cables, and plug them into the available ports on your wireless router. You no longer need your original router, because your new wireless router replaces it.
Wireless modem lightsNext, plug in and turn on your cable or DSL modem. Wait a few minutes to give it time to connect to the Internet, and then plug in and turn on your wireless router. After a minute, the Internet, WAN, or WLAN light on your wireless router should light up, indicating that it has successfully connected to your modem.

3. Configure your wireless router

Wireless cablesUsing the network cable that came with your wireless router, you should temporarily connect your computer to one of the open network ports on your wireless router (any port that isn't labeled Internet, WAN, or WLAN). If you need to, turn your computer on. It should automatically connect to your router.
Next, open Internet Explorer and type in the URL or address to configure your router.
NOTE: Do this on the computer that you are using to set up your wireless network. The computer automatically links you to the router’s page. If you type the router’s URL on a different computer, typing the address in the navigation bar will not take you to your router’s configuration page.
On the router configuration page, you might be prompted for a password. The address and password you use varies depending on what type of router you have, so refer to the instructions included with your router or on the manufacturer’s website.
For quick reference, this table shows the default addresses, user names, and passwords for some common router manufacturers. If the address is not listed here, you can read the documentation that came with your router or go to the manufacturer's webpage to find it. There may be multiple website addresses you can use.
RouterAddressUsernamePassword
3Comhttp://192.168.1.1adminadmin
D-Linkhttp://192.168.0.1adminadmin
Linksyshttp://192.168.1.1adminadmin
Microsoft Broadbandhttp://192.168.2.1adminadmin
Netgearhttp://192.168.0.1adminpassword
Actiontechttp://192.168.0.1usernamepassword
Internet Explorer shows your router's configuration page, along with the modem IP address and other information. Most of the default settings should be fine, but you need to configure three things:
  • Your wireless network name, known as the SSID. This name identifies your network, and it appears in a list of available wireless networks. You should change the default SSID that your ISP provided and give your network a unique name that none of your neighbors are using. This helps you identify your network, and it can help keep your wireless network secure by preventing it from overlapping with other wireless networks that might be using the default SSID.
  • Wi-Fi Protected Access (WPA or WPA2), which can help protect your wireless network. It’s important to help secure your wireless network by setting up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key, and all information sent across your network is encrypted so that only computers with the key to decrypt the information can read it. This can help prevent attempts to access your network and files without your permission. Wi Fi Protected Access (WPA or WPA2) is the recommended wireless network encryption method. Wireless encryption (WEP) is not as secure. Windows 7, Windows Vista Service Pack 2, and Windows XP Service Pack 3 support WPA2.

    When you set up most routers (stand-alone routers and modem routers), you are asked to provide a pass phrase that the router uses to generate several keys. Make sure that your pass phrase is unique and long (you don't need to memorize it). Some routers and modem routers now come with a function called Quick Security Setup (or QSS) that automatically issues you a key when you press a button on the router.

    Be sure to keep a hard copy and a digital copy of your network security key and pass phrase, in case you lose or misplace them. You can recover a lost network key or reset it on your router, but these are complicated processes that are different for every router and they sometimes entail setting up your network again.
  • Your administrative password, which controls your wireless network. Just like any other password, it should not be a word that you can find in the dictionary, and it should be a combination of letters, numbers, and symbols. Be sure to save a hard copy and a digital copy of this password, too, because you'll need it if you ever have to change your router's settings.
The exact steps you follow to configure these settings will vary depending on the type of router you have. After each configuration setting, be sure to click Save Settings, Apply, or OK to save your changes.
Get more help making your network secure.
Now, before connecting your computers and devices to the network, you should disconnect the wireless network cable from your computer.

4. Connect your computers, printers, and other devices to the wireless network

You can connect multiple computers, printers, and many other peripheral devices, such as an Xbox, Xbox 360, TV, cell phone, iTouch, or iPad, to your network. Before you connect them to your network, make sure that the computer or device you want to add has built-in wireless networking or a network adapter. Many newer devices have built-in wireless capability. If the computer or device you want to add does not have built-in wireless network support, plug the network adapter into your USB port and place the antenna on top of your computer (in the case of a desktop computer) or insert the network adapter into an empty PC card slot (in the case of a laptop). Windows automatically detects the new adapter and may prompt you to insert the CD that came with your adapter. The on-screen instructions guide you through the configuration process.
Use the following links to find step-by-step instructions for adding your specific computer or device to your network using your operating system. There are instructions for each operating system, and they show you how to automatically or manually add wired (Ethernet) or wireless computers and how to add computers running Windows 7, Windows Vista, or Windows XP. There are also instructions for adding printers and both wired and wireless devices.

5. Share files, printers, and more

Now that your computers and devices are connected, you can begin sharing files, printers, games, and much more. One of the top reasons for setting up a home network is to share a printer. Another is to share files. The steps for doing this, however, aren’t always obvious, so here are instructions to get you started:

Share a printer Share files
File and printer sharing: Frequently asked questions


Troubleshooting

After your wireless network is set up, Windows can help you troubleshoot network connection problems.
Get more help setting up, securing, and using a wireless network:
http://www.microsoft.com/athome/organization/wirelesssetup.aspx

Introduction to Wi-Fi Network Security

A consideration on any computer network, security is especially important on Wi-Fi wireless networks. Hackers can easily intercept Wi-Fi network traffic over open air and extract information like passwords and credit card numbers. Several Wi-Fi network security technologies have been developed to combat hackers, of course, although some of these technologies can be defeated more easily than others.


Network Data Encryption

Network security protocols usually use encryption technology. Encryption scrambles data sent over network connections to hide information from humans while still allowing computers to properly decipher the messages. Many forms of encryption technology exist in the industry.

Network Authentication

Authentication technology for computer networks verifies the identity of devices and people. Network operating systems like Microsoft Windows and Apple OS-X include built-in authentication support based on user names and passwords. Home network routers also authenticate administrators by requiring them to enter separate login credentials.

Ad Hoc Wi-Fi Network Security

Traditional Wi-Fi network connections go through a router or other wireless access point. Alternatively, Wi-Fi supports a mode called ad hoc wireless that allows devices to connect directly to each other in peer to peer fashion. Lacking a central connection point, the security of ad hoc Wi-Fi connections tends to be low. Some experts discourage the use of ad-hoc Wi-Fi networking for this reason.

Common Wi-Fi Security Standards

Most Wi-Fi devices including computers, routers and phones support several security standards. The available security types and even their names vary depending on a device's capabilities.

WEP stands for Wired Equivalent Privacy. It is the original wireless security standard for Wi-Fi and is still commonly used on home computer networks. Some devices support multiple versions of WEP security
  • WEP-64-bit key (sometimes called WEP-40)
  • WEP 128-bit key (sometimes called WEP-104)
  • WEP 256-bit key
and allow an administrator to choose one, while other devices only support a single WEP option. WEP should not be used except as a last resort, as it provides very limited security protection.

WPA stands for Wi-Fi Protected Access. This standard was developed to replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home networking while another version, WPA-Enterprise, is designed for corporate networks. WPA2 is an improved version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 also exists in Personal/PSK and Enterprise forms.

802.1X provides network authentication to both Wi-Fi and other types of networks. It tends to be used by larger businesses as this technology requires additional expertise to set up and maintain. 802.1X works with both Wi-Fi and other types of networks. In a Wi-Fi configuration, administrators normally configure 802.1X authentication to work together with WPA/WPA2-Enterprise encryption. 802.1X is also known as RADIUS.

Network Security Keys and Passphrases

WEP and WPA/WPA2 utilize encryption keys, long sequences of hexadecimal numbers. Matching key values must be entered into a Wi-Fi router (or access point) and all client devices wanting to join that network. In network security, the term passphrase can refer to a simplified form of encryption key that only uses alphanumeric characters instead of hexadecimal values. However, the terms passphrase and key are often used interchangeably.

Configuring Wi-Fi Security on Home Networks

All devices on a given Wi-Fi network must use matching security settings. On Windows 7 PCs, the following values must be entered on the Security tab of Wireless Network Properties for a given network:
  • Security type refers to authentication options including Open, Shared, WPA-Personal and –Enterprise, WPA2-Personal and –Enterprise, and 802.1X. The Open option utilizes no authentication, while Shared utilizes WEP for authentication.

  • Encryption type options available depend on the Security type chosen. Besides None, which can be only used with Open networks, the WEP option can be used with either WEP or 802.1X authentication. Two other options, called TKIP and AES, refer to specialized encryption technologies usable with the WPA family of Wi-Fi security standards.

  • An encryption key or passphrase can be specified in the Network security key field when required.

  • The Key Index, a value between 1 and 4, refers to the position of the matching key stored on the wireless router (access point). Many home routers allow four different encryption keys numbered 1 through 4 to be configured in order to support legitimate clients without forcing them to all use a common key.

WiFi Profile Manager 8 Sets Your Preferred Networks in Windows 8

Advertisement
  1. WiFi Profile Manager 8 Sets Your Preferred Networks in Windows 8


    By Whitson Gordon
    Ever run into a situation where you have multiple wireless networks available, but one is clearly better than the other? WiFi Profile Manager 8 lets you tell your computer which networks are better, so Windows doesn’t automatically stick you with the wrong one.

Use Microsoft Word for Emergency Image Editing


Use Microsoft Word for Emergency Image Editing


by Shep McAllister
Say you need to make some quick edits to a photo or screenshot, but you’re on a public or work computer with no image editors installed. Where can you turn?