Showing posts with label firmware. Show all posts
Showing posts with label firmware. Show all posts

Monday, 13 May 2013

Magic Lantern Creates Firmware to Make The Canon 5D Mark III Capable of Shooting Video at 24 fps RAW




It's plain for all to see that the Canon 5D Mark III may be the prefered DSLR for videographers all over the world, but things are going to become a lot more interesting. The individuals behind Magic Lantern have successfully struck gold and now the 5D Mark III can shoot 24 fps RAW video at resolutions as much as 1,920 x 820 pixels using 1000X memory cards. If you're unfamiliar with Magic Lantern, it's an open source firmware that brings further abilities to Canon's EOS cameras. The capability to shoot RAW video at 24 fps enhances dynamic range and resolution, in addition, it allows extra flexibility during post-production. In line with the team at Magic Lantern, more work is necessary before the feature is ready to be deployed. So until then, you're invited to check out the web link below and watch the RAW vs. H.264 videos.

Update: We only now received news from Magic Lantern that Canon's Mark II is also capable of 24 fps with the newest firmware. Nic from the Dev team said "After some further testing it's clear the older, cheaper Mark II should be able to record at the lower resolutions of 1880x840 in full-frame mode."



You can follow me on Twitter, add me to your circles on Google+ or Subscribe to me on Facebook or YouTube. You can also check my Everything Tech blog or my Computer Fixed UK website to keep yourself updated with what is happening in the ever-changing world of technology

Thursday, 21 March 2013

Another iPhone Security Vulnerability Discovered in iOS 6.1.3


Following yesterday's release of iOS 6.1.3, which fixed two bugs allowing the iPhone's passcode lock to be bypassed, another passcode security flaw has been discovered.

The vulnerability, which only affects the iPhone 4, involves the Voice Dial command, as demonstrated in the video below from YouTube user videosdebarraquito.

iPhoneinCanada tested the method in the video using an iPhone 4 running iOS 6.1.3 and found that the security flaw does indeed exist, giving a potential intruder access to both contacts and photos.

Like the previous passcode vulnerability, the current hack involves a complicated set of steps that includes initiating Voice Dial command and quickly ejecting the phone's SIM card.



When the SIM card is removed, the phone opens the recent call log, which gives access to the contact list. In the contact list, adding a photo also gives access to all of the pictures on the device.

The previous passcode vulnerability was discovered in mid-February, and it took Apple more than a month to push a fix. An update for the current bypass could follow a similar timeline, but the vulnerability can be fixed by disabling Voice Dial from the Passcode Lock menu.

At this time, the vulnerability has only been shown to work with the iPhone 4. We were unable to reproduce the results with an iPhone 5 with Siri disabled, though the bug may potentially affect the pre-Siri iPhone 3GS as well.

Update 1:07 PM: iPhoneblog.de reports that it has reproduced the issue on an iPhone 5 with Siri disabled, although we have still been unable to do


You can follow me on Twitter, add me to your circles on Google+ or Subscribe to me on facebook or YouTube. You can also check my website and blog to keep yourself updated with what is happening in the ever changing world of technology