Recent Posts

Pages: 1 2 [3] 4 5 ... 10
21
Huawei again hides chip specs from prying eyes

Quad-core mystery chip with an in-built AI accelerator emerges.


(Image credit: OrangePi)

Huawei and OrangePi have announced a joint venture in the OrangePi Kunpeng Pro development board. The Raspberry Pi alternative runs not only a quad-core 64-bit Arm processor but also an AI processor that's integrated into the same package, but Huawei and OrangePi aren't releasing the specifics of the processor. In fact, the name of the chip has been hidden in the official renders, a practice that we've seen from Huawei in the past as it seeks to avoid prying Western eyes. However, we dug into the documentation to confirm that the chip is based on a custom Huawei Kunpeng CPU design. It features new tech that we haven't seen from Kunpeng processors before, showing that Huawei's Kunpeng line of chips is advancing into the AI realm.

The single-board computer includes tools and capabilities suitable for consumers, developers, and students. It comes with the [color-blue]openEuler OS[/color] preinstalled, along with the openGauss database and a suite of internet, productivity, and software development packages.


The OrangePi Kunpeng Pro development board (Image credit: OrangePi)

The Kunpeng Pro development board uses a custom Huawei Kunpeng CPU that's paired with an AI FPGA processor. Huawei has been under severe sanctions from the U.S. government, limiting its access to certain chips and chip-making technologies. Therefore, OrangePi and Huawei aren't revealing the specific model number of the Kunpeng CPU, but we do know that it is a quad-core ARM model.

Both the CPU and FPGA are placed in the same chip package, but it isn't clear if the CPU and FPGA are separate chiplets under the same heatspreader or if they are integrated onto the same die. Regardless of whether the FPGA and CPU reside on chiplets or the same die, this represents a new capability for Huawei's custom Kunpeng chip designs.

The AI processor provides 8 TOPS of AI computing power. For the sake of comparison, the Qualcomm Snapdragon X Elite and Apple M4 neural engines are rated for 45 TOPS and 38 TOPS, respectively. OrangePi and Huawei have equipped the Kunpeng Pro development board with two HDMI ports supporting 4K displays, a Type-C power interface, Wi-Fi 5, and Gigabit Ethernet.

The full specifications are:




OrangePi Kunpeng Pro is available only through Chinese retailers at this time. Pricing starts at 1,076 yuan (approximately $148.92 USD.) IT Home lists four available packages of the OrangePi Kunpeng Pro.



source
22
Linux is often the default choice for many IoT devices, but with a recent backdoor threat, we look at why an RTOS can better deliver security and minimalism.

Linux – the biggest name in open-source operating systems – is in crisis after a “trusted” contributor was discovered to have inserted a backdoor in a software package that could have resulted in a massive software supply chain attack.

This is particularly concerning for the Internet of Things (IoT) considering that Linux accounts for about 70% of all device operating systems. For developers, this infiltration suggests that Linux and its subsystems are getting so big that malicious code can be easily injected without notice. One safeguard is to return to operating system (OS) basics and other, simpler alternatives.

Let’s look at why, in this moment of cybersecurity, real-time operating systems (RTOS) are the safer bet amidst Linux’s expanding threat surface.

What just happened in Linux?

This incident marks one of the biggest ecosystem breaches in recent memory for Linux. In late March, a developer uncovered a remote code execution vulnerability in a software package part of XZ Utils, a library for compressing and decompressing files. Alerted by failing SSH logins and high CPU utilization, developers soon realized that the flaw enabled remote attackers to bypass authentication and gain complete system access.

Even more concerning? The backdoor was initiated by a “trusted” collaborator who had been working on the open-source project for several years.


It’s worth taking a step back and considering why this matters in IoT. Of course, when developing a device or system, one of the earliest and most crucial decisions developers make is deciding the type of OS. Linux is often the default choice for many devices and projects, from Android smartphones to smart TVs, thanks to its advanced memory and processing power.

However, these are two features that devices don’t always need.

The case for RTOS

The truth is that many devices don’t need to run on Linux. It’s often the industry preference, sure, but this doesn’t mean it’s the right choice. For example, running simple devices like connected doorbells on a full-fledged Linux OS would have seemed crazy a couple of decades ago due to resource constraints. Now, it’s part and parcel of modern IoT.

This hack should serve as a wake-up call that not every device warrants Linux. Basic devices like sensors or monitors – and, yes, even doorbells – usually serve one function at a time. They can therefore benefit from the resource efficiency and focused functionality of RTOS.

In Linux and other general-purpose operating systems, programs are loaded dynamically after boot, often with the ability to run in separate memory and file spaces under different user accounts. This isolation is beneficial when running multiple applications concurrently on a shared server, as one user’s programs cannot interfere with another’s, and hardware access is shared equally through the operating system.

In contrast, RTOS operates by compiling applications and tasks directly into the system with minimal separation between memory spaces and hardware. Since the primary goal of an IoT device is typically to serve a single application, possibly divided into multiple tasks, this lack of separation is not an issue. Additionally, because the application is compiled into the RTOS, it is ready to run after a very short boot and initialization process.


The ‘how-to’ process using FreeRTOS for a connected device. (Image: Amazon AWS)
This is relevant in IoT because device developers usually know two key pieces of information:

   • How many tasks will be running?

   • How much memory do these applications/processes need?

Therefore, armed with this insight, developers can determine if RTOS is a good fit. Usually, regardless of whether we’re talking about Zephyr, Azure RTOS, or Free RTOS, the ability to guarantee predictable and low-latency task execution makes these systems an attractive choice.

Additionally, Linux adds many more layers of complexity. For example, I’ve seen camera devices where developers didn’t have enough expertise to properly configure and minimize the Linux installation/distribution, leading to potential security risks. Again, selecting the right OS from the start can save unnecessary development hurdles in the long run.

A trade-off worth making

The discovery of this critical vulnerability in a core Linux package, introduced by a trusted contributor no less, demonstrates the escalating security risks facing IoT ecosystems. For developers, this incident underscores the importance of approaching OS selection with security as the top priority. While Linux offers unparalleled functionality, that power often comes at the cost of increased complexity that requires significant expertise to properly configure and harden the installation.


Every IoT device has a unique URL for automatic location over the Internet, and RTOS with an IoT
platform allows secure, authenticated, and extremely low bandwidth peer-to-peer connections to be
established even when the device is deployed behind a NAT firewall. (Image: Nabto)
On the other hand, RTOS is designed from the ground up with security and minimalism in mind. By focusing solely on executing discrete tasks with low latency, rather than multi-process and multi-user multitasking, RTOS offers a reduced attack surface with clear visibility into the limited codepaths. Moreover, since the application is compiled directly into the RTOS, and due to the nature of many microcontrollers, it is extremely difficult – if not impossible – to inject random code for execution through techniques like stack overflows. This is because the only code that can run is located in the system’s flash memory. Consequently, the compile-time integration of components further minimizes potential vulnerabilities.

Of course, RTOS by nature trades some functionality for security. But for the vast majority of IoT use cases that require simple, dedicated operation rather than multi-purpose computing, this kind of system can provide real-time performance and security essentials.

The expanding threat landscape for Linux shows that, particularly for IoT, this separation of security and functionality may be a trade-off worth making.

source
23
Huawei / Your luxury room with a home theater on wheels. Huawei Aito M9.
« Last post by javajolt on May 12, 2024, 09:48:46 AM »


Huawei Aito M9, is a large luxury crossover with a luxury interior, sports car-like acceleration,
home theater, outdoor theater, auto-doors, some of the largest screens in the industry,
headlight projection, three rows of full seats, and more.

source
24
As more PC owners avoid Windows 11 than ever before

Quote
Despite the serious disadvantages, people are still flocking to Windows 10

   ► The number of people using Windows 10 increased in April 2024

   ► Some 14,000,000 PC users turned to the 9-year-old operating system

   ► The increase came at the expense of its successor, Windows 11

   ► PC users flocked to Windows 10 despite the incoming end of support

   ► It will cost as much as $427 (£337.29) to continue using Windows 10

Microsoft cannot kill Windows 10.

The US company has already confirmed that it will end support for Windows 10 in October 2025 — cutting off millions of PCs from essential security updates and bug fixes. Without these critical software patches, Windows 10 users will be vulnerable to attacks from hackers and other data breaches.

Due to the popularity of Windows 10, Microsoft has confirmed plans to extend its Extended Security Updates (ESU) subscription to everyday users for the first time. Previously reserved for enterprise customers, the annual plan could cost as much as £330 to unlock an extra three years of important security updates.

Many assumed the fast-approaching deadline — not to mention, the threat of having to spend hundreds on software updates — would spur millions of PC users still relying on Windows 10 to finally make the switch to its successor, Windows 11.

But the number of people using Windows 10 every day is increasing, according to the latest figures from Statcounter. The popular website, which monitors and analyses global web traffic to calculate the popularity of devices, web browsers, and operating system, has recorded a rise in the number of people using Windows 10.

PCs powered by this almost decade-old operating system topped 70% for the first time since late 2023.

The increase recorded in April 2024 was roughly 1%, Statcounter shows. During the same time frame, Windows 11's market share dipped slightly to 25.69%, suggesting the increase in people using Windows 10 came at the expense of its successor. That's a serious blow for Microsoft.

Microsoft has previously confirmed there are roughly 1.4 billion Windows PCs worldwide. At that scale, a 1% increase in people flocking to Windows 10 equates to an astonishing 14,000,000 PC users.

With the launch of a new operating system, we'd typically expect to see the number of devices powered by its predecessor declining over time. This happens as users voluntarily switch to the latest software to get their hands on exciting new features or a stylish new appearance and as more devices with the latest operating system preinstalled are sold.

It's rare to see an older operating system regain traction in its twilight years — especially with the threat of the end of support and a new fee looming less than 18 months away.

Those who want to keep using Windows 10 until 2028 will need to spend as much as $427, roughly £337.29 converted, to continue to receive critical patches for security flaws and compatibility issues in Windows 10, Microsoft has confirmed.

If you missed the memo, Microsoft will end support for Windows 10, which was released worldwide in July 2015 and was widely marketed at the time as the “final” iteration of Windows, on October 14, 2025.

Known as Extended Security Updates (ESU), this subscription unlocks up to three years of additional support for ageing operating systems, extending the lifecycle of Windows 10 until the end of 2028. ESU was previously reserved for businesses to offer 36 months of additional time to update their entire fleet of PCs and ready proprietary software to work with the latest operating system from Microsoft.

Windows 10 marks the first time Microsoft will offer Extended Security Updates to anyone.

Microsoft has published the cost of Windows 10 ESU for enterprise users, with the first year setting you back $61 (£48.19). To incentivise Windows 10 users to upgrade to the next iteration of the desktop operating system, Microsoft will double the cost every year. The full breakdown of costs is as follows:

   • Windows 10 ESU — $61 (£48.19) for first year

   • Windows 10 ESU — $122 (£96.39) for second year

   • Windows 10 ESU — $244 (£192.78) for third and final year

This is not the cost for consumers, with Microsoft promising that pricing for the average Windows 10 user “will be shared at a later date.” However, we're likely to see the same pricing structure, with costs doubling each year to try to push people to finally switch away from Windows 11.


Windows 11 reworks the design of the operating system and brings the iconic Start Menu to the center
of the screen for the first time MICROSOFT PRESS OFFICE
Microsoft describes the optional Extended Security Updates subscription as “a last resort option for customers who need to run certain legacy Microsoft products past the end of support.” It offers a maximum of 36 months of additional security updates and emergency bug fixes.

“Extended Security Updates are not intended to be a long-term solution but rather a temporary bridge,” the Redmond-based company explains in a blog post. “You can purchase ESU licenses for Windows 10 devices that you don’t plan to upgrade to Windows 11 starting in October 2024, one year before the end of support date.”

Businesses who are subscribed to a cloud-based solution like Intune or Windows Autopatch will enjoy a 25% discount on Extended Security Updates. Microsoft is offering an even more generous discount to schools, with the first year of ESU dropping to just $1 (79p), this doubles to $2 for year two and $4 for the final year.

Prices have risen sharply for Windows users looking to put off the upgrade to the next major operating system release from Microsoft. When it introduced the ESU plan was introduced for Windows 7, Microsoft charged £9.57 for the first year, rising to £19.15 in the second year.

That cost was per device, so things can become pretty pricey if you have a few devices, like a laptop, desktop PC, or tablet.

Some industry watchers had speculated that Microsoft would be forced to offer extended support for Windows 10 at no extra cost due to the vast number of PCs still powered by the operating system.

However, despite the widespread usage, Microsoft is seemingly set on charging for the privilege.

This has allowed rival Google to take advantage of the situation to bolster its own market share of desktop PCs by offering a free upgrade for all Windows 10 users to its ChromeOS system, which is based on the world's most popular web browser and boasts years of security updates and support.

There’s no guarantee that your current PC will be able to upgrade to Windows 11. With this rebooted operating system, Microsoft introduced several strict system requirements.

Windows 11 only officially supportsIntel’s 8th Generation (known as Coffee Lake) or Zen 2 CPUs and newer, leaving millions of devices sold with Windows 10 preinstalled unable to upgrade.

Following a public backlash, Microsoft did add a number of exceptions to its list of supported chipsets, including the 7th Generation Intel Core i7-7820HQ – a processor that was used in the Surface Studio 2, an all-in-one desktop machine that cost £3,549 at launch back in 2018.

Nevertheless, this marks the first time that Microsoft has enforced such specific processor requirements with its operating system upgrade.

In comparison, Windows 8 and Windows 10 only stipulated a 1GHz processor, at least 1GB of RAM, and 16GB of available storage. Windows 11 requires an Intel processor first launched in October 2017 as well as 4GB of RAM and 64GB of storage.

According to Microsoft, the stricter silicon requirements enable a better experience for those running Windows 11, with a 60% reduction in malware thanks to the requirements that “enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI) and Secure Boot.” It also claims a “99.8% crash-free experience” on machines with components from its list of supported hardware.

source
25
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic triad of people, process, and technology to examine -- in depth -- every component of DevSecOps.

In the book, you'll learn why DevSecOps is as much about people and collaboration as it is about technology and how it impacts every part of our cybersecurity systems.

You'll explore the shared responsibility model at the core of DevSecOps, as well as the people, processes, and technology at the heart of the framework. You'll also find:

   • An insightful overview of DevOps and DevSecOps principles and practices

   • Strategies for shifting security considerations to the front end of the development cycle

   • Ways that the standard security model has evolved over the years and how it has impacted our approach to cybersecurity

A need-to-read resource for security leaders, security engineers, and privacy practitioners across all industries, The DevSecOps Playbook will also benefit governance, risk, and compliance specialists who seek to better understand how a transformed approach to cybersecurity can impact their business for the better.

Follow this link to get your copy of 'The DevSecOps Playbook: Deliver Continuous Security at Speed' for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]

source
26


Microsoft has been saying for a while now that it has been working on a mobile game store to compete with the Google Play Store and Apple's iOS App Store. Today, we got a time frame for when that store will actually become available.

Bloomberg reports that Microsoft Xbox President Sarah Bond revealed that its mobile game store will launch sometime in July. Bond made that announcement as part of an interview during the Bloomberg Technology Summit. A video of her remarks was also posted on the Bloomberg Live X (formerly Twitter) account.





Bond said that the store will be released on the web first, rather than as an actual mobile app store. Bond stated the web-based store would be able to reach a bigger audience and more devices.

At first, the mobile game store will offer games that are currently owned like Microsoft. That would include games like the popular Candy Crush titles from King, which Microsoft acquired when it bought Activision Blizzard in October 2023. It would also likely include games like Minecraft and Call of Duty Mobile.

Bon said there is a plan to release third-party mobile games via the new store at some point but details of how that will work have yet to be revealed. Bond also suggested that Microsoft would like to sometime in the future extend the store beyond the web, which may mean it could launch an actual third-party gaming app store for Android and iOS.

Bond didn't offer an actual name for the web-based store, She also didn't state if there will be any testing of the store for Xbox Insiders before it officially goes live.

source
27
Huawei / US further restricts chip sales to Huawei by revoking export licenses
« Last post by javajolt on May 08, 2024, 05:53:57 PM »


The US government has revoked some licenses that allowed American chip companies to export semiconductors to Huawei. This reflects an ongoing effort by the Biden administration to limit the Chinese tech company's access to key technologies.

The Commerce Department (via CNBC) said that it is continually assessing how export controls can protect national security and how the geopolitical landscape and the technology industry are evolving. As part of that review, the US has revoked certain licenses for the sale of chips and related technologies to Huawei.

While the Commerce Department did not specify which licenses or companies were affected, this is the latest move by the Biden administration to crack down on Huawei.

Quote
As part of this process, as we have done in the past, we sometimes revoke export licenses. But we can confirm that we have revoked certain licenses for exports to Huawei

It also comes after former President Trump placed Huawei on a trade blacklist in 2019, citing security concerns. That blacklist prohibited US companies from selling technology, such as 5G network equipment, to Huawei without proper authorization.

In 2020, the US tightened those restrictions by requiring foreign firms using American manufacturing equipment to obtain a license before exporting semiconductors to Huawei. Now, by revoking some previous licenses, the administration is signaling that it does not want Huawei to have access to even limited supplies of US-made or US-connected chips. This will put further pressure on the Chinese technology company, which has developed its own chips in response to sanctions but still relies on foreign suppliers for some components.

The license revocation will also affect chipmakers that supply Huawei. Companies like Intel and Qualcomm, which still sell some chips to Huawei under license, have warned that their revenues could take a bigger hit as Huawei ramps up internal production and captures more of the domestic Chinese market with self-sufficient devices.

On the other hand, Apple is witnessing a substantial decrease in iPhone shipments in China, with a 33% reduction in February from the previous year. The company's struggle began with Huawei's resurgence in the premium smartphones like Mate 60 Pro.

source
28


Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address. The researchers believe it affects all VPN applications when connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.

Reading, dropping, or modifying VPN traffic

The effect of TunnelVision is “the victim's traffic is now decloaked and being routed through the attacker directly,” a video demonstration explained. “The attacker can read, drop or modify the leaked traffic and the victim maintains their connection to both the VPN and the Internet.”



The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network. A setting known as option 121 allows the DHCP server to override default routing rules that send VPN traffic through a local IP address that initiates the encrypted tunnel. By using option 121 to route VPN traffic through the DHCP server, the attack diverts the data to the DHCP server itself. Researchers from Leviathan Security explained:

Quote
Our technique is to run a DHCP server on the same network as a targeted VPN user and to also set our DHCP configuration to use itself as a gateway. When the traffic hits our gateway, we use traffic forwarding rules on the DHCP server to pass traffic through to a legitimate gateway while we snoop on it.

We use DHCP option 121 to set a route on the VPN user’s routing table. The route we set is arbitrary and we can also set multiple routes if needed. By pushing routes that are more specific than a /0 CIDR range that most VPNs use, we can make routing rules that have a higher priority than the routes for the virtual interface the VPN creates. We can set multiple /1 routes to recreate the 0.0.0.0/0 all traffic rule set by most VPNs.

Pushing a route also means that the network traffic will be sent over the same interface as the DHCP server instead of the virtual network interface. This is intended functionality that isn’t clearly stated in the RFC. Therefore, for the routes we push, it is never encrypted by the VPN’s virtual interface but instead transmitted by the network interface that is talking to the DHCP server. As an attacker, we can select which IP addresses go over the tunnel and which addresses go over the network interface talking to our DHCP server.


A malicious DHCP option 121 route that causes traffic to never be encrypted by the VPN process.

We now have traffic being transmitted outside the VPN’s encrypted tunnel. This technique can also be used against an already established VPN connection once the VPN user’s host needs to renew a lease from our DHCP server. We can artificially create that scenario by setting a short lease time in the DHCP lease, so the user updates their routing table more frequently. In addition, the VPN control channel is still intact because it already uses the physical interface for its communication. In our testing, the VPN always continued to report as connected, and the kill switch was never engaged to drop our VPN connection.

The attack can most effectively be carried out by a person who has administrative control over the network the target is connecting to. In that scenario, the attacker configures the DHCP server to use option 121. It’s also possible for people who can connect to the network as an unprivileged user to perform the attack by setting up their own rogue DHCP server.

The attack allows some or all traffic to be routed through the unencrypted tunnel. In either case, the VPN application will report that all data is being sent through the protected connection. Any traffic that’s diverted away from this tunnel will not be encrypted by the VPN and the Internet IP address viewable by the remote user will belong to the network the VPN user is connected to, rather than one designated by the VPN app.

Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.

The most effective fixes are to run the VPN inside of a virtual machine whose network adapter isn’t in bridged mode or to connect the VPN to the Internet through the Wi-Fi network of a cellular device. The research, from Leviathan Security researchers Lizzie Moratti and Dani Cronce, is available here.

source
29

Credit: A. Strode/Shutterstock

Now that so many of us are signed up to cloud storage services, USB drives aren't as ubiquitous as they once were, but they still have their uses. One of those uses is running an entire computer system entirely on the USB stick, which you can then bring anywhere. Your files and apps are always with you rather than being left at home or at the office, and if you're at a new desk you don't have to spend time getting everything set up the way you want—just plug in the drive, and you're up and running.

How it works

Of course you can't take an entire PC around with you on a USB stick—you need a monitor, a keyboard, a motherboard, and everything else. That said, all of the software and storage can be handled on a portable USB drive: As long as you have access to a computer with a spare USB slot, you can run your portable PC.

There's no interference with the existing setup on the computer you're using either, so you can borrow one from a colleague or a friend without causing them any hassle. You reboot the PC, tell it to load up your USB stick rather than what's on the internal drive, and your operating system appears. When you're done, shut down the computer, unplug your USB drive, and you've left no trace behind.


All you need to set this up is a USB drive. Credit: Lifehacker

It's great if you're always moving between locations, and want to have access to the same desktop interface wherever you go. It can also be useful if you're trying to troubleshoot problems with your hardware setup, or if you want to try out different operating systems without installing anything permanently on your computer.

You do need to bear in mind some caveats, though. A USB drive isn't as fast or as capable as a full desktop or laptop system, so you're limited to basic computing tasks. This doesn't work on Macs either, because of their different architecture—if you need to run a separate system on macOS, the best approach is setting up a virtual machine.

Choosing an OS

When it comes to picking an operating system for your USB PC, you can use Windows if you'd like to—via a third-party tool such as WinToUSB — though you will need a paid license for it, and the user experience isn't the best. A better idea is to go for a flavor of Linux: Not only is the software free to use, it's also more lightweight, which means you're not putting as much stress on the USB drive and everything should run more smoothly.

If you're new to Linux, it's an open source desktop OS that comes in a wide variety of flavors known as distros. It doesn't offer the same kind of broad software selection or hardware support as Windows or macOS, but all the core computing apps are covered: You can browse the web, check your email, do some work, edit images, and plenty more on Linux.


Puppy Linux is one of your options here. Credit: Puppy Linux

When it comes to choosing the distro you want to use, it's really up to you: Just about any version of Linux can be run fairly easily from a USB stick. Make sure you look for a feature called "persistence" in the distro documentation, though—this means you're going to be able to save settings and files to the USB drive, rather than starting up fresh with a clean slate every time you boot it up.

Ideally, you want to choose a distro that's lightweight and basic, to give you the smoothest operation possible. Puppy Linux and Linux Lite are often recommended for this particular purpose, while Tails is great if security is a priority—it automatically connects to the Tor network when you go online. Ubuntu is an excellent choice too, offering a polished interface and plenty of help documentation.

Getting started

Head to the official website for your Linux distro of choice, then look for an ISO download—this is essentially the operating system in its entirety. Downloads like this can often run to several gigabytes in size, so you might have to wait a while. It's also worth checking in the distro's documentation to see if there are any notes or recommendations regarding USB installation.

Next, you need a program to put the ISO on the USB drive for you—not just to copy over the file, but to make the drive bootable. There are a few options here, including Rufus, but we've gone for Etcher for this guide: It's really simple to use, and you can run it on both Windows and macOS (and, indeed, Linux).


Etcher can flash a drive for you in minutes. Credit: Lifehacker

Fire up Etcher, and you'll see there are three stages: Pick Flash from file to pick the ISO from disk, then Select target to choose a USB drive connected to your computer, and then click Flash to complete the operation. As far as USB drives go, a capacity of at least 8GB is recommended, plus the fastest read/write speeds you can find—you might find more requirements listed on the pages of the distro you've chosen.

With all that taken care of, you can use your USB drive by putting it in a spare USB port on any computer, then restarting the computer and choosing to boot from the USB stick. How this is done varies, but it usually involves pressing a key to choose a boot device while the computer's starting up—look for a message on screen or check the documentation that came with the computer, if you're not sure.

source
30
Return to the Windows of yesterday or a month ago


(Image credit: xM4ddy)
Many Windows 11 users are up in arms after Microsoft added unremovable ads to its start menu in its latest update. Thankfully, a solution has arrived in "Oh F*ck Go Back" (OFGB), a program that allows users to disable every flavor of ad on the operating system with the click of the mouse.

OFGB comes from Maddy (@xM4ddy), a programmer who drives Arch Linux daily rather than Windows and was inspired to build the novelty tool for Windows anyway. The program presents a simple-to-use GUI that itemizes the ads you can remove, highlighting how many ads we enjoy on Windows now. Each checkbox clicked safely edits the registry for you, saving users undue confusion and the risk of breaking their OS with a typo. The program has found moderate levels of virality through Reddit and Twitter reposts and has even attracted a few thousand users. We could reach her for comment, asking about her reasons for leaving Windows behind, the tool's existence, and what life is like on the Linux side of the fence. Some responses have been minimally edited for clarity.

"I think the most important thing the tool has done is getting people to talk about ads and their place in paid software like Windows," said Maddy about OFGB. She continued, saying the program "is getting people to consider taking a look at alternative software like Linux. Remember, competition is good for consumers." Running Linux would make removing ads from your operating system a breeze; a brief trip to the console might solve the problem. "I only made this after Windows gave me an error when I ran 'sudo pacman -R ads.'"

We asked Maddy why, as a Linux user, she felt the need to build this tool for Windows. She responded, "I was getting more and more annoyed by ads in random places and decided to try to find an easy fix. After coming across a .reg file by Shawn Brink, I found my answer. After thinking more about it, I figured it may be accessible to more people if there was a GUI so that less tech-savvy people could easily set the registry keys without needing any knowledge of the registry."

Our next question for Maddy was about Windows and Linux and what prompted her to leave. "I switched over to Linux when I started programming and getting into tech when I was younger. What drew me to it was the customization it provided and the open-source nature. I was also enamored with other people's beautiful Linux setups," said Maddy. When asked if Windows could win her back, Maddy laughed, "Windows lost me a long time ago by adding more and more telemetry, ads, and the lack of easily configurable options. As soon as the last few programs that I just can't get away from are running right under Wine or Proton I plan to ditch it completely."

Our huge thanks to Maddy for her comments on her project. If you want to clean up the ads on your Windows 11 computer, you can find OFGB version 0.2 on GitHub. Windows' most recent update is undoubtedly less than popular as it brought ads and bugs that break your VPNs - a problem that has yet to be solved. If you want to follow Maddy into the wondrous world of Arch Linux, it recently beat Windows 11 in gaming performance testing, along with a few other more user-friendly Linux distros.

source
Pages: 1 2 [3] 4 5 ... 10