Recent Posts

Pages: [1] 2 3 ... 10
1

Image Credit: Stocksnapper / Dreamstime.com

Windows 7 introduced a useful hidden feature called God Mode, which provides access to all admin tools and control options in one place. Since Microsoft hasn't fully removed the Control Panel from Windows 11, God Mode remains functional in the company's newest operating system -- and you can use it in Windows 10 too.

To enable God Mode, you simply need to create a folder and rename it using a specific command. In addition to the standard God Mode, there are several alternative modes you can activate. Here’s what you need to do.

To activate God Mode, right-click a blank area of the desktop and select New > Folder. Highlight this folder, press F2 and name it:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Hit enter. Open that folder and you’ll have instant access to a wide range of system settings.

If one God Mode isn’t enough for you, there are a number of other modes available. Follow the same process as above, but use one of the following alternative strings:

Default Programs.{17cd9488-1228-4b2f-88ce-4298e93e0966}

My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}

Network.{208D2C60-3AEA-1069-A2D7-08002B30309D}

All Networks For Current Connection.{1FA9085F-25A2-489B-85D4-86326EEDCD87}

Programs and Features.{15eae92e-f17a-4431-9f28-805e482dafd4}

Power Settings.{025A5937-A6BE-4686-A844-36FE4BEC8B6D}

Printers.{2227A280-3AEA-1069-A2DE-08002B30309D}

Icons And Notifications.{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}

Firewall and Security.{4026492F-2F69-46B8-B9BF-5654FC07E423}

All NET Frameworks and COM Libraries.{1D2680C9-0E2A-469d-B787-065558BC7D43}

Application Connections.{241D7C96-F8BF-4F85-B01F-E2B043341A4B}

Administrative Tools.{D20EA4E1-3957-11d2-A40B-0C5020524153}

Credentials and Logins.{1206F5F1-0569-412C-8FEC-3204630DFB70}

Speech Recognition.{58E3C745-D971-4081-9034-86E34B30836A}


That's all there is to it!

source
2
This just-released tool can get the job done

A new version of the popular Rufus utility once again bypasses Microsoft's strict hardware compatibility requirements for Windows 11 upgrades. But the way it's implemented might make some people nervous.


The latest Rufus release replaces the Windows Setup executable
with this wrapper. Screenshot by Ed Bott/ZDNET
Microsoft really, really, really doesn't want you to upgrade your old Windows 10 PC to Windows 11. That's the logic behind the strict hardware compatibility requirements the company imposed when it launched the new operating system in 2021. If you try to install Windows 11 on a computer with a CPU from 2018 or earlier, you get an error message, along with a suggestion that maybe you should buy a new PC.

The result, of course, is a thoroughly predictable cat-and-mouse game between Redmond and the Windows enthusiast community. The owners of those "incompatible" PCs find ways to work around those restrictions, and Redmond finds a way to make those workarounds more difficult.

With the public release of the most recent feature update to Windows 11, version 24H2, Microsoft tightened the compatibility checks that Windows Setup runs when performing an upgrade. Those new restrictions blocked one widely used workaround, which used the open-source Rufus utility to create installation media that allows Windows 11 upgrades on incompatible hardware.

The new restrictions lasted for less than one week, as the community discovered that you could work around Microsoft's compatibility blocks by manually entering a series of commands to tweak the registry. And now the developer of Rufus, Pete Batard, has released a new beta version of the utility that automates that process.

On the surface, the Rufus 4.6 beta doesn't look any different from its predecessor. When you select the option to bypass the Windows 11 hardware compatibility checks, it replaces the official Windows 11 compatibility appraiser, Appraiserres.dll, with a 0-byte file, just as the earlier version did; and it offers the same handful of additional customization options. But to work around the 24H2 restrictions, it performs a few additional tricks of its own.

The most noteworthy change is that creating installation media renames the official Windows Setup program, Setup.exe, to Setup.dll and adds a new custom program called Setup.exe. It also adds an $OEM$ subfolder in the Sources folder, containing additional subfolders and one file.

Double-clicking the newly created Setup.exe file produces this permission dialog, which shows that the file is a Windows Setup Wrapper, signed by Akeo Consulting, which is the corporate parent of Rufus.

So, what does that file do? You can see for yourself by inspecting the code on GitHub. Running that wrapper makes the necessary registry edits to bypass compatibility checks, then calls the original Windows Setup program.

As Batard notes in the comments on this code, this approach might arouse some suspicions.

Quote
Obviously, the fact that we "inject" a setup executable may leave people uncomfortable about the possibility that we might use this as a malware vector, which is also why we make sure that the one we sign and embed in Rufus does get built using GitHub Actions and can be validated to not have been tampered through SHA-256 validation …

In a separate discussion, Batard emphasizes that "Rufus only goes with the official bypasses that Microsoft themselves included, and not with an overreaching approach of disabling all hardware checks."

That approach should provide a level of security that installations using these bypasses won't be disabled in the future, he adds:

Quote
Rufus is working within Microsoft's framework, with bypasses that Microsoft included for the installer, and, therefore, as has been the case ever since the release of Windows 11, I expect that the bypasses that Microsoft allows [will] not render a machine inoperative...

The new workaround should succeed with almost any PC capable of running Windows 10. Some oddball configurations, including very old CPUs from the Windows Vista era, might be blocked because of restrictions that are tied to the way Windows 11 operates and are independent of the compatibility requirements.

So, for now at least, you can once again use the Rufus installer to perform a Windows 11 upgrade on unsupported hardware.

Your move, Microsoft.

source
3


A reverse proxy is a server configured on a local area network (LAN) to direct traffic, primarily web browser requests. It's similar to a proxy server in that client requests are intercepted and handled by the server when connecting to other destinations. It's how proxies (and VPNs) can get around geographical restrictions by routing traffic through different locations. Instead of communicating directly with the end server, traffic is passed through a proxy and the same happens with a reverse proxy, but instead of handling outbound traffic from clients on the LAN, the reverse proxy handles external inbound requests.

What are forward and reverse proxies?

Intercepting requests as the middleman



So, instead of the proxy protecting specific clients on the network, a reverse proxy sits in front of servers available to the outside world. When an inbound request passes to or through the router (depending on where the reverse proxy server is running), it's intercepted by the reverse proxy when specified rules match. This prevents the external client and your server from directly communicating with one another, which can help bolster security and accessibility. When using reverse proxies, the client sending the request will be none the wiser and assume they're connecting directly to the destination server.

A reverse proxy is a great addition to a homelab setup where you need external access. Instead of opening up ports on your router, a reverse proxy limits access to specific services on a device. It's very much like an extra router within the LAN. This is great for opening up access to multiple devices without sacrificing security. Using a single entry point for traffic can allow quick changes, check logs for issues, and easier general management.

Where a reverse proxy can be useful

Creating your dream homelab



Let's say you wish to set up a Jellyfin server and host a Vaultwarden instance to manage all your passwords. Accessing either instance internally is easy with an IP and port, but what if you wish to access the two servers when not at home? Sure, you could configure your network to allow inbound traffic and open up ports to the system but I'd recommend against this. Instead, a reverse proxy can be used with a dynamic domain name service (DDNS). You can create a myfamilynetwork.com domain for your LAN and configure the DDNS to update the service with your dynamic IP.

That allows any device to connect to your LAN using the domain and a reverse proxy can then take specific requests and transfer them to each server. For instance, jellyfin.myfamilynetwork.com can be directed to the Jellyfin server and vaultwarden.myfamilynetwork.com can go to the Vaultwarden server. Even if they're on the same system, a reverse proxy can use an IP and port, allowing you to configure multiple services on a single server. When configuring an app or attempting to load either server through a browser, using either domain name will load everything up.

There are some other benefits to using a reverse proxy server, including load balancing and data encryption. For internal-only access, a reverse proxy can work with a DNS server on the LAN to configure various servers and services for specific domains, such as network.lan.

source
4

Warning—you are being tracked.getty

If you’re worried your phone might be spying on you, sharing your data and location without you realizing, then a new report this week will make alarming reading.

“You can’t say no to Google’s surveillance,” the Cybernews research team warns, describing a secretive stream of data they say continually transmits from a new phone to Google’s servers. Even more “concerning,” they say, “the phone periodically attempts to download and run new code, potentially opening up security risks.”

The Cybernews team took a “brand-new [Pixel 9 pro XL] with a new Google account and default settings” and rooted it to enable a man-in-the-middle data interception. The team “proxied the inbound and outbound traffic and used a custom security certificate to decrypt and examine the communications,” albeit rooting the phone disabled some features and so the intercepted data was not complete.

Because the testing took place with a new, default account, the team did not test to see the effect that user changes to privacy and security settings might have. But just as we’ve seen with browsers and apps—given most users maintain broadly default settings, it’s imperative those offer a good degree of out of the box protection.

“Every 15 minutes,” they say, the “Pixel 9 Pro XL sends a data packet to Google. The device shares location, email address, phone number, network status, and other telemetry.” This data, they found, is sent “to various Google endpoints, including Device Management, Policy Enforcement, and Face Grouping.”

There are clear sensitivities with contact details, device and network details, and other telemetry. But location data is especially sensitive, given the intrusive nature of such tracking data and the inferences this can provide about our lives.


Google’s data captureCybernews

We saw this sensitivity play out in Google’s welcome move to stop collating user timelines from Google Maps and instead maintain data on-device only. Worse, Cybernews says, “location data is included in the request even when GPS is disabled – the phone then relies on nearby Wi-Fi networks to estimate the location.”

There are multiple reasons why the collection of this data might be required to enable certain features, with Cybernews giving the example of the “newly introduced Car Crash Detection,” as one of these. There are also the diagnostic and services streams that flow from a device, and it’s unclear how this phone was setup. But the watchword is transparency and what users can reasonably be expected to know is taking place.

Cybernews also raises the concern that communication takes place “with services the user didn’t explicitly consent to.” The example given is the Photos app, which they say they did not open nor take photos, but “the Pixel periodically contacted endpoints associated with Google Photos’ Face Grouping feature without asking for consent.”

Beyond the location and other data collection, Cybernews also claims the device reached out to Google for new code to execute, opening up security risks. This security risk is much more of a stretch than than the data capture, and there is no evidence of any vulnerability to third-party code, especially with Play Protect enabled on the device. That said, one can never rule out the more sophisticated adversaries hijacking such openings for their own purposes.

The data egress is more tangible. The data Cybernews says it captured off-device, and the frequency with which that was being sent, certainly warrants some transparency. That said, this is a Google device in the hands of a user with a Google account, and there’s no suggestion any of this data was transmitted to any third-party. But given Google’s mixed record on privacy and data harvesting, users will likely have concerns. I have asked Google for their comments on the new report and its findings.

Meanwhile, the researchers warn that “the deep integration of surveillance systems in [Google’s] ecosystem may leave users vulnerable to privacy violations.” And while this test was specifically for the new Pixel Pro devices, it’s clearly a wider issue.

In response to the Cybernews report, a Google spokesperson told me that “user security and privacy are top priorities for Pixel. You can manage data sharing, app permissions and more during device setup and in your settings. This report lacks crucial context, misinterprets technical details and doesn't fully explain that data transmissions are needed for legitimate services on all mobile devices regardless of the manufacturer, model or OS, such as software updates, on-demand features and personalized experiences.”

Updated on October 8 with Google’s response to the Cybernews report.

source
5
Users are reporting network connectivity issues after installing the Windows 11 24H2 update.


Image: Zulkarnieiev Denis/Shutterstock.com

The list of problems caused by the Windows 11 24H2 update just keeps getting longer and longer. Not only is it causing blue screen crashes and making mouse cursors disappear, but the update also leaves behind a massive cache of undeletable files in its wake.

And now, according to Windows Report, the annual 2024 update to Windows 11 is interrupting internet connections.

One affected user wrote the following in a Microsoft forum post:

Quote
“After updating to the new [Windows 11 24H2], some computers experienced network problems with both cable and Wi-Fi. They connect but do not get network access and get an IP address starting with 169… resulting in no internet or network connection. I have updated the drivers and firmware and reset the network settings. The MAC addresses of the devices have not changed. Does anyone know what could be causing this?”

Several other users promptly replied that they were experiencing the same. Updating drivers/firmware and resetting network settings both failed to resolve the problems. These internet connection issues occur on both private computers and on Windows 11 PCs connected to servers.

In addition, some users report that their Windows 11 systems were still able to connect to the internet without issue after the first restart following the installation of 24H2, but started experiencing internet connectivity issues after the next restart.

What you can do if you’re affected

If the Windows 11 2024 Update is causing you internet connectivity problems, there’s only one solution as of this writing: undo the update and roll back to Windows 11 23H2.

A rollback appears to solve the issue in most cases, but there’s also a chance this workaround won’t work. As one user said: “We tried rolling back to 23H2, but it didn’t work. So far we have ‘burnt’ several machines requiring a complete rebuild from scratch. We are blocking 24H2.”

How to roll back Windows 11 updates.

source
6
Windows updates are supposed to solve existing bugs, but they can also cause new problems. For this reason, Microsoft introduced the Known Issue Rollback (KIR) three years ago.


Image: Microsoft

In addition to closing security gaps, the monthly Windows updates are used in particular to solve errors and problems that have arisen in the meantime. In practice, however, it is not uncommon for the updates to cause new problems.

There are many reasons for this, ranging from errors in quality assurance to the fact that, unlike Apple computers, the software and hardware used in Windows systems is extremely heterogeneous.

This is why Microsoft introduced the so-called Known Issue Rollback (KIR) three years ago. If it turns out that an installed update is causing problems on a large number of computers, Microsoft sends a KIR update afterwards.

This either restores the affected Windows systems to the state they were in before the faulty update or distributes a corrected update version straight away. You don’t have to take any action, as the problem is automatically fixed via the Windows update. The KIR rollback is only used for non-security-related errors, not for updates to close security gaps.


Windows generally allows installed updates to be uninstalled manually in the event of problems. However, this does not apply to all updates. Microsoft

In principle, Windows updates can also be uninstalled manually via the Settings app: For Windows 10 via Update & Security > Windows Update > Show update history > Uninstall updates. For Windows 11, this is done via Windows Update > Update history > Uninstall updates. However, this option is not available for all updates.

There is also the basic option of not installing updates for the operating system immediately, but waiting a few days instead. This will at least prevent you from being affected by widespread update problems. In such cases, Microsoft would ideally have already rectified the error via a known issue rollback before you encounter it.

In Windows 10, the Windows update can be postponed by one week (“Update pause for 7 days”) or until a specific date via “Advanced options.” In Windows 11, the function is called “Suspend updates.” It is particularly useful to pause updates if you are urgently dependent on your computer in the following days and cannot afford any update problems.

source
7

A new and dangerous AI threat for all Gmail users is seen in the wild
SOPA Images/LightRocket via Getty Images


Update, Oct. 12, 2024: This story, originally published Oct. 11, includes details of a new anti-scam alliance initiative from Google to help users fight fraudsters.

Google has implemented increasingly sophisticated protections against those who would compromise your Gmail account—but hackers using AI-driven attacks are also evolving. According to Google’s own figures, there are currently more than 2.5 billion users of the Gmail service. No wonder, then, that it is such a target for hackers and scammers. Here’s what you need to know.

The Latest AI-Driven Gmail Attack Is Scary Good

Sam Mitrovic, a Microsoft solutions consultant, has issued a warning after almost falling victim to what is described as a “super realistic AI scam call” capable of tricking even the most experienced of users.

It all started a week before Mitrovic realized the sophistication of the attack that was targeting him. “I received a notification to approve a Gmail account recovery attempt,” Mitrovic recounts in a blog post warning other Gmail users of the threat in question. The need to confirm an account recovery, or a password reset, is a notorious phishing attack methodology intended to drive the user to a fake login portal where they need to enter their credentials to report the request as not initiated by them.

Unsurprisingly, then, Mitrovic wasn’t falling for this and ignored the notification that appeared to originate from the U.S. and a missed phone call, pertaining to be from Google in Sydney, Australia, some 40 minutes later. So far, so relatively straightforward and easy to avoid. Then, almost exactly a week later, the fun started in earnest—another notification request for account recovery approval followed by a telephone call 40 minutes later. This time, Mitrovic didn’t miss the call and instead picked up: an American voice, claiming to be from Google support, confirmed that there was suspicious activity on the Gmail account.

“He asks if I’m traveling,” Mitrovic said, “when I said no, he asks if I logged in from Germany, to which I reply no.” All of this to engender trust in the caller and fear in the recipient. This is when things turned dark fast and really rather clever in the overall scheme of phishing things. The so-called Google support person informed Mitrovic that an attacker had accessed his Gmail account for the past 7 days, and had already downloaded account data. This rang alarm bells as Mitrovic recalled the recovery notification and missed call from a week earlier.

Googling the phone number he was being called from while speaking, Mitrovic discovered that it did, indeed, lead to Google business pages. This alone is a clever tactic likely to fool plenty of unsuspecting users caught up in the panic of the moment, as it wasn’t a Google support number but rather about getting calls from Google Assistant. “At the start of the call, you'll hear the reason for the call and that the call is from Google. You can expect the call to come from an automated system or, in some cases, a manual operator,” the 100% genuine page helpfully informs the reader.

Lessons To Be Learned From This Gmail Hack Near Miss

Mitrovic did the right thing, or at least the next best thing to hanging up, and asked the supposed support guy to send an email confirmation—an email which arrived soon after, from a Google domain and looking for all intents and purposes genuine. AT this point he noticed the to field contained a cleverly disguised address that wasn’t actually a Google domain but could, once again, easily fool those not of a technical bent.

The real giveaway for Mitrovic, however, was when the caller said hello and after no response said hello again. “At this point I released it as an AI voice as the pronunciation and spacing were too perfect,” Mitrovic said.

It’s well worth reading the original blog from Mitrovic as it contains much more technical detail and detective work that I don’t have the space to cover in this report. Knowledge is everything, and the threat intelligence provided by this consultant is genuinely invaluable for anyone who might find themselves in a similar situation: forearmed is forewarned.

It’s almost a certainty that the attacker would have continued to a point where the so-called recovery process would be initiated, in truth this would be a cloned login portal capturing user credentials and likely the use of some kind of session cookie stealing malware to bypass two-factor authentication if that was in place.

Google Launches The Global Signal Exchange To Fight Scammers

Google has announced that it has joined forces with the Global Anti-Scam Alliance and the DNS Research Federation to form a new initiative in the battle against scammers. The Global Signal Exchange will act as an intelligence-sharing platform when it comes to scams and fraud, providing real-time insight into the cybercrime supply chain. As the first founding member of the Global Signal Exchange, Google hopes that the platform will become, in effect, a global clearinghouse for the kind of intelligence signals that are connected to bad actors and their attacks.

Amanda Storey, senior director of trust and safety at Google said that the collaboration “leverages the strengths of each partner.” With GASA having an extensive existing network of interested stakeholders and the DNS Research Foundation a data platform with more than 40 million existing signals, “GSE aims to improve the exchange of abuse signals, enabling faster identification and disruption of fraudulent activities across various sectors, platforms and services.”

The ultimate goal, Google confirmed, is to create a solution that not only operates at the almost unthinkable scale of the internet itself but does so in an efficient and, above all, user-friendly way. This means that qualifying organizations will be able to use it to hit back at scammers. Google already has plenty of experience in this field, with a long-established history of entering into partnerships to help fight fraud. Indeed, as part of the testing of the new Global Signal Exgcnage, Google shared more than 100,000 malicious URLs and consumed a staggering million scam signals for analysis. “We'll start by sharing Google Shopping URLs that we have actioned under our scams policies,” Nafis Zebarjadi, Google’s account security product manager said, “and as we gain experience from the pilot, we will look to add data soon from other relevant Google product areas.”

The Global Signal Exchange, or at least the engine that drives it, runs on the Google Cloud to enable all participants to share and consume intelligence signals while “benefiting from Google Cloud Platform's Al capabilities to find patterns and match signals smartly,” Storey concluded.

Staying Safe From The Most Advanced Of Gmail Scams

AI deepfakes are not just used for porn and politics, they are used to perpetrate seemingly straightforward account takeovers such as in this case. Stay calm if you are approached by someone claiming to be from Google support, they won’t phone you so there’s a massive red flag right away, and no harm will come to you if you hang up. Use the tools at your disposal, ironically Google search itself and your Gmail account, to make checks during the call if you are concerned its could be genuine and ignoring it could cause harm. Search for the phone number, see where it’s really coming from. Check your Gmail activity to see what, if any, devices other than your own have been using the account. Take note of what Google says about staying safe from attackers using Gmail phishing scams. Most importantly, never let yourself be rushed into making a knee-jerk reaction, no matter how much urgency is injected into a conversation. It’s that sense of urgency that the attackers rely upon to swerve your normal good judgement and click a link or give up credentials.

source
8


Hurricanes often leave a path of physical damage to impacted regions, power blackouts and cell service outages that could last for days after a storm hits.

As Florida residents prepared for impact from Hurricane Milton, several satellite connection options were made available for the latest iPhone and Android models to facilitate contact with loved ones and emergency personnel in the face of outages.

Here's how you would connect, if needed.

iPhone

With iPhone 14 or more recent models, users can connect devices to a satellite to text emergency services, request roadside assistance, message friends and family and share locations, even without cellular and Wi-Fi coverage, according to Apple.

However, because satellites are located hundreds of miles away from Earth and move rapidly the user experience may be impacted by the low bandwidth, according to the company.

"In ideal conditions with a direct view of the sky and the horizon, a message might take 30 seconds to send. It might take over a minute to send under trees with light or medium foliage," the company notes on its website.

Apple recommends being outside with a clear view of the horizon, moving away from obstructions such as trees, sending shorter messages and updating to the latest IOS for best results.

To connect to a satellite, swipe down from the top right corner of your iPhone to open Control Center, then tap the Cellular button on the right. Tap Satellite, then choose a satellite feature.

Ahead of a storm and for emergencies at large, Apple recommends having emergency contacts and important medical information added to your Medical ID within the Health app.

Android

For Android users hoping to connect to Google's satellite services, the models with the capability include the Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, and the Pixel 9 Pro Fold.

Called Satellite SOS, "This feature will be activated once all the necessary software and APIs are updated and the service is registered with the satellite network," according to Google.

The company says users will be notified once the feature is active but the status can be checked in the settings app.

On the Pixel models listed above, if you need to contact emergency services without a mobile or Wi-Fi network, dial 911 and you'll find an option to use Satellite SOS in the dialer.

Tap Satellite SOS and then press start, from there you'll fill out the emergency questionnaire.

To set up emergency contacts to receive updates on your location and status when using Satellite SOS, Android users should go to the phone's Personal Safety app.

Starlink

In a collaboration with T-Mobile, Elon Musk's Starlink is offering direct-to-cell service for areas impacted by the recent hurricanes.

"We have accelerated the rollout of Starlink direct to cell phone connectivity for areas affected by the hurricanes," Musk wrote on X early Wednesday morning. "This is being provided free of charge by SpaceX and TMobile to help those in need," he added.



New users can activate Starlink for free and the service will work for carriers outside of T-Mobile, according to Musk.

If a phone connects to a Starlink satellite, it will have one to two bars of signal and show "T-Mobile SpaceX" in the network name, according to SpaceX.



"Users may have to manually retry text messages if they don't go through at first, as this is being delivered on a best-effort basis," the company wrote on X.

"The service works best outdoors, and occasionally works indoors near a window," SpaceX added.

source
9
Force it to sell Chrome, Android which could change the tech landscape as we know it


(Image credit: Shutterstock)
Things could change for Google in a big way in the near future. Apparently, the U.S. Department of Justice might ask a federal judge to force Google to sell parts of its business, as reported by CBS News. While it's still early to make any kind of proclamation about the future of Google, if the company is forced to sell off portions of its business due to being too dominant, it could change the tech landscape as we know it.

Not only might the DOJ make Google sell off pieces, but federal prosecutors also said the judge could ask the court to open the data it uses to power its popular search engine and AI products to competitors. Google obviously has some key secrets that make its search engine work (secrets the company stays ahead of with consistent algorithm changes). Having these made public would cause a significant shift in how search rankings work.

Google also has very lucrative deals with companies like Apple and Samsung, which keep its search engine as the default option and allow it to further control the market. Google currently has deals with Samsung to share revenue from the Play Store and with Apple for search traffic on Safari.

The DOJ isn't happy about these deals and may squash them. It also aims to stop Google from using its products like Chrome, Google Play, and Android to give its Search and related services a competitive advantage. Whether that happens by forcing Google to sell those parts of its business or by limiting how the company can leverage its other products remains to be seen.

"For more than a decade, Google has controlled the most popular distribution channels, leaving rivals with little-to-no incentive to compete for users," the antitrust enforcers wrote. "Fully remedying these harms requires not only ending Google's control of distribution today, but also ensuring Google cannot control the distribution of tomorrow."

In a response, Google's vice president of regulatory affairs, Lee-Anne Mulholland said in response to the filing that the DOJ was "already signaling requests that go far beyond the specific legal issues."

As you might expect, the Google representative cited "Government overreach" and "negative unintended consequences for American innovation and America's consumers." Whether this is a case of overreaching will be determined as more filings and information come out, but it's certainly something for everyone in the tech industry to keep an eye on.

This is far from Google's first run-in with the U.S. government, as District Judge Amit Mehta ruled that Google's search engine has been illegally exploiting its dominance in August. Between that ruling and the potential for the DOJ to ask a federal judge to force Google to sell parts of its business, it appears that the search giant is in for a fight if it wants to keep operating the way it has been.

source
10
Linux, MacOS and Windows users: Ever longed for consistent file management across all desktop operating systems? Spacedrive is out of this world.


Jack Wallen/ZDNET

The file manager -- that ubiquitous app everyone takes for granted -- is usually the last thing on your device you ever think about, but one of the first things you use. File managers help us keep our files and folders organized, assist in locating documents, and make it easy to open files.

Imagine your digital life without a file manager.

But here's the thing: Most people stick with whatever file manager their operating system offers. In some cases, that's fine. The MacOS Finder, for example, is a pretty good file manager. But what if you could use the same file manager across all your desktop operating systems -- one that offers far more features than the file manager you're using now?

That would be out of this world, right?

Thanks to Spacedrive, this dream scenario is very much possible. I've installed Spacedrive on both Linux and MacOS and found it to be an absolute gem. Spacedrive is also available for Windows 10 and 11, which I have not tried.

One thing to keep in mind is that Spacedrive is very much in the alpha release stage (version .4.2 is what I have installed on my machines), so it's not 100% complete. Certain features are listed as "coming soon" -- such as Cloud Drives, key management, backups, and extensions -- but what you do get (even in the alpha stage) is quite impressive.

Here's a rundown of Spacedrive features:

   • Libraries: Combine different directories into Drives, so you can categorize those folders

   • Locations: Shortcuts to directories

   • Network file drop: Connect another machine to Spacedrive so you can easily send a file from one machine to another.

   • Themes

   • Favorites and recents

   • Dashboard overview: At-a-glance information about drive space on your machine

   • Tags

   • Trash

Spacedrive has a modern, user-friendly, and well-designed UI that looks and behaves the same, regardless of platform, so you don't have to switch gears when switching operating systems Using Spacedrive for a week convinced me that it's one of the best file managers I've encountered. It has all the features I need without feeling bloated. 

And the ability to easily send files between operating systems is a huge plus for me. (This is possible even without creating a network share via Samba.)

Let me show you a few of the tricks currently available in Spacedrive.

Peers

Peers simplifies the process of sharing files between computers. Once you've connected a peer, you can right-click (or two-finger tap) a file and click Share > PEER NAME (Where PEER NAME is the name of the peer you've created), and then -- once you accept the incoming file on the destination computer -- you can save the file to any location you want.

To add a peer (aka node), go to Settings > Network, scroll to the bottom, and you should see any instances of Spacedrive on your network. Click Connect on any instance and you should then see the new node listed under Peers in the sidebar.


Adding a new node to Spacedrive makes it easy to send files from
one machine to another. Screenshot by Jack Wallen/ZDNET


If you don't see a node listed, you can type the IP address of the machine in question and click Submit. As long as Spacedrive is installed on the node, it'll connect.

Libraries

Let's say you have specific folders all related to work, home, school, a hobby, music, pictures, or whatever. You can create a new library and then add as many folders to that library (called locations) as you need. You can create as many libraries as you need and associate as many folders to each library. When you switch to a different library, the folders you've added to it will be listed under Locations.

To create a library, open Settings > Libraries and click Add Library. When prompted, give the library a name and click "Create a Library."


Make sure to name your new library something that will indicate
clearly what it's for. Screenshot by Jack Wallen/ZDNET


To add a folder as a location to the library, click Add Location under Locations, navigate to the folder in question, and (when prompted) click Add.


If you click Advanced Settings, you can enable or disable features
like no system files, no hidden files, no git files, git ignore, and only
images. Screenshot by Jack Wallen/ZDNET


Adding libraries and locations makes it very easy to access all the folders and files associated with a particular project or subject. Do note that you can also encrypt libraries from within the settings section of the library in question.

As I mentioned, Spacedrive is very much in the alpha stage, so I don't recommend using it if you prefer your software to be bug-free and predictable. Eventually, however, Spacedrive will be available as a full release and you can bet it will become my default file manager on all my desktop operating systems.

source
Pages: [1] 2 3 ... 10