Back to home
Technology

Dev creates UEFI games compendium you have to beat in order to boot your computer — 10-month project will shut down your PC if you lose

Source

Tom's Hardware

Published

TL;DR

AI Generated

Alejandro Armas, a Linux enthusiast, has developed a collection of five UEFI games that users must beat in order to boot their computers. These games include challenges like math quizzes, insult sword fighting, and memory tests, with consequences like system shutdowns for losing. The games, available on the UEFIGame repository on GitHub, have been in development for about 10 months. These unique UEFI games provide a fun and interactive boot-time challenge for users, offering a different experience during computer startup.

Read Full Article

Similar Articles

MindsEye's sabotage mission is being slammed as dull and pointless

MindsEye's sabotage mission is being slammed as dull and pointless

Build A Rocket Boy accuses individuals of sabotaging MindsEye's launch, spending over €1 million on damaging efforts. The studio integrates the controversy into a new in-game mission, Blacklist, to showcase evidence of sabotage to players. However, reports describe the mission as lackluster and failing to deliver a compelling narrative. Critics attribute the launch issues to internal problems, such as management and design decisions, casting doubt on the sabotage claims. The saga continues as MindsEye's post-launch turmoil unfolds.

TweakTown
Save a huge $400 on this Acer Predator OLED gaming laptop with an RTX 5070 Ti and 32GB DDR5, now under $1,800 — big saving on Helios Neo 16S AI rig that ships with a 24-core Intel CPU, 1TB SSD, and a 240Hz refresh rate

Save a huge $400 on this Acer Predator OLED gaming laptop with an RTX 5070 Ti and 32GB DDR5, now under $1,800 — big saving on Helios Neo 16S AI rig that ships with a 24-core Intel CPU, 1TB SSD, and a 240Hz refresh rate

Best Buy is offering a $400 discount on the Acer Predator Helios Neo 16S AI gaming laptop, now priced at $1,799.99. This laptop features an RTX 5070 Ti GPU, 32GB DDR5 RAM, and a 16-inch OLED display with a 240Hz refresh rate. Powered by an Intel Core Ultra 9 275HX CPU, it is designed for high-performance gaming and multitasking. The laptop's slim design includes various ports, Wi-Fi 6E, Bluetooth 5.4, and a 1TB SSD. This deal provides a cost-effective option for gamers seeking top-notch specs in a portable package.

Tom's Hardware
Commodore 64 and ZX Spectrum receive clamshell makeover — iconic 8-bit legends join the handheld gaming wars

Commodore 64 and ZX Spectrum receive clamshell makeover — iconic 8-bit legends join the handheld gaming wars

Retro Games Ltd and Blaze Entertainment are releasing handheld gaming devices inspired by the Commodore 64 and ZX Spectrum home computers from the '80s. Priced at $129.99, the C64 Handheld and Spectrum Handheld aim to bring nostalgia with modern convenience, featuring a clamshell design, 4.3-inch IPS screens, quad-core processors, and 256 MB of DDR memory. Both devices come pre-loaded with 25 retro games and offer expandable storage via a microSD card slot. The handhelds also include USB Type-A ports for connecting peripherals and are set to ship on October 15, with a collector's edition available for $149.99.

Tom's Hardware
Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

A recent Linux exploit, CVE-2026-31431, allows local unprivileged users to gain root access instantly on most Linux distributions since 2017. The exploit affects popular distros like Ubuntu, RHEL, Suse, and Amazon Linux, as well as Windows' WSL2. The vulnerability, discovered by Xint Code researchers, involves a cryptography optimization flaw that grants administrator privileges through a devious attack on the AF_ALG socket. While a patch has been released, some distributions may still be vulnerable, requiring mitigation methods like disabling AF_ALG sockets. The exploit occurs in memory without leaving detectable traces on disk, making it challenging to detect with security software.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.