‘At the Washington Convention Center, Joe Sabia presents to the Video Gamers United crowd a novel idea for a horror apocalyptic video game. The game begins with a shot of the girl Elika’s mother dying of cholera. Soldiers barge in the family’s quarters and in an attempt for defense, Elika’s only brother gets killed with the back end of a rifle. Elika runs away and before she can get to safety, a bullet grazes her baby brother’s cheek…’
The Floatation Tank
Microwave Meditation for Busy Creatives
‘A floatation tank is a fiber-glass pod (above), big enough to get inside and stretch your arms and legs out without touching the sides. The tank is filled with a few inches of a super-saturated, epsom-salt solution. Before you get inside, you put in earplugs, so that when you close the door you are cocooned from the outside world. Then you turn off the light and lie back in the darkness.
‘The salt makes the water dense, so that when you lie down, you float. The water lifts and supports you, like the most comfortable bed in the world. And because it’s at body temperature, after a few minutes you don’t sense it any more. Not only that, gravity has disappeared. It’s like floating in space…’
After Receiving 65,000 Complaints, Microsoft Files Suit Against Tech Support Scammers
‘Tech support scammers have been around for a long time and are familiar to just about all of our readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers.
‘According to the company, more than 65,000 complaints have been made about tech support scams since May of this year alone. Bogus technicians, pretending to represent Microsoft, call the house offering fake tech support and trick people into paying hundreds of dollars to solve a non-existent issue. If successful in their ruse, the scammer then gains access to a person’s computer, which lets them steal personal and financial information and even install malware…’