Language Selection

English French German Italian Portuguese Spanish

Morpheus put to sleep

Filed under
Gaming

At the end of the film The Matrix Revolutions, two of movie's heroes--Neo (Keanu Reeves) and Trinity (Carrie-Anne Moss)--perish. Now a third leading character in the Matrix sci-fi film series has bitten the dust--in the Matrix Online game.

In a press release sent out this afternoon, Sega and Warner Bros. Interactive Entertainment announced that "the unthinkable has happened--Morpheus is dead." The captain of the human hovership Nebuchadnezzar, Morpheus, named after the Greek god of sleep, was played in the films and in the Matrix Online by Laurence Fishburne.

Morpheus' end apparently was the culmination of one of the Matrix Online's "live events." The typically week-long narratives see staff at the game's developer, Monolith Productions, controlling characters to advance the story of the MMORPG.

This week's live event was appropriately called "The Hunt for Morpheus," and began with the titular character "setting off virus-encoded bombs around The Matrix MegaCity, threatening the very fabric of The Matrix," according to the release.

Understandably worried, the Machines that control the Matrix dispatched a super-agent, called the Assassin, to whack Morpheus. "The Assassin was able to catch up by bending the rules of the Matrix," said Sega and WBIE. "In the end, Morpheus was trapped and even he could not escape the hail of bullets that ensued."

While generating understandable publicity, the WBIE/Sega statement hints that Morpheus' death may not in fact be permanent. "It is now up to the players of The Matrix Online to solve the mystery of this giant cliffhanger," read the release, implying there is more to the story.

But whatever the outcome of the Matrix Online's live event, Morpheus will return to games. He is featured prominently in Atari's The Matrix: Path of Neo, due out later this year for Xbox, GameCube, and PlayStation 2.

Gamespot.

More in Tux Machines

Leftovers: Software

today's howtos

Leftovers: OSS

Security Leftovers

  • Secure Server Deployments in Hostile Territory, Part II
    There are a few other general security practices I put in place. First, as I mentioned before, because each host has a certificate signed by an internal trusted CA for Puppet, we take advantage of those certs to require TLS for all network communications between hosts. Given that you are sharing a network with other EC2 hosts, you want to make sure nobody can read your traffic as it goes over this network. In addition, the use of TLS helps us avoid man-in-the-middle attacks.
  • Hackers Can Disable a Sniper Rifle—Or Change Its Target
    At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
  • Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet
    Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac. It is documented here by iOS and OS X guru Stefan Esser. It's all possible thanks to an environment variable called DYLD_PRINT_TO_FILE that was added in Yosemite. It specifies where in the file system a component of the operating system called the dynamic linker can log error messages. If the environment variable is abused with a privileged program, an attacker can modify arbitrary files owned by the powerful user account root – files like the one that lists user accounts that are allowed administrator privileges.