Recent Posts

Pages: 1 [2] 3 4 ... 10
11


RebornOS is built by a team of developers, artists, and other individuals with one important goal: to make Arch Linux as user-friendly as possible.

I can say, wholeheartedly, that the team has achieved that goal. RebornOS makes Arch Linux easy to use and, with the right desktop, an adventure in fun and elegance.

Did I say "right desktop?" I did. Why? During installation, you can choose from the following desktop environments:

   • Cinnamon

   • Budgie

   • GNOME

   • Xfce

   • MATE

   • Deepin

   • UKUI

   • LXDE

   • LXQt

   • Trinity

   • Regolith

   • Cutefish

   • Enlightenment

   • Openbox

   • i3

Of course, not all desktops are created equally and from the above list, you'll find some environments to be more user-friendly and elegant than others. I opted to go with the Deepin desktop environment because it's one of the more aesthetic desktops on the market. I would also put Cutefish on that list, but I've had some issues with Cutefish-based distributions lately. So, Deepin it is.

For those who are curious as to what the hardware requirements are, here's the list of minimum/recommend:

   • CPU - 1.2 GHz dual core/2.1 GHz quad core

   • RAM - 2 GB/4 GB

   • Storage - 20 GB/64 GB or more

Judging from the above, you shouldn't have any problem installing RebornOS on just about any computer purchased within the last 10 years.

As I said, RebornOS is based on Arch Linux but don't let that scare you away. Although Arch Linux itself can be a bit of a challenge, numerous distributions aim to simplify it. Some of those distributions succeed, while others seem to only go halfway. RebornOS goes all the way to the finish line with this task to create an operating system that anyone could start using and have next to no problems.

From the desktop, click the main menu to find all of the pre-installed applications, a searchable menu, the ability to list items by category or in alphabetical order, switch the menu from a pop-up to an overview-style, and even a right-click context menu so you can add items to favorites, send them to the desktop or the dock, set them to start at login, use a proxy, and even uninstall them.


The Deepin desktop menu makes locating your installed applications and controlling your machine a breeze.
Jack Wallen/ZDNET


The artists involved configured Deepin desktop to look fantastic out of the box. I was very pleased that they skipped the dark theme (as so many distributions seem to use as the default these days) and added the right amount of blur/transparency to make it all come together with a decidedly modern flare that isn't over the top.

As I said, you can install the desktop of your choosing but not every option found in RebornOS will be as beautiful as Deepin. The next closest options would be Budgie and Cutefish. Or, if you want something that's very straightforward and simple, go with Cinnamon, or MATE. If you want a desktop that offers more configuration options than you'll ever need, take a look at either Xfce or Enlightenment. If modern and minimal are your thing, go with GNOME. If you want tiling, there's i3. You get the picture… there's a desktop for everyone.

The only slight against RebornOS is the list of pre-installed software. You won't find an office suite, an email client, or an image editor. You will find apps like Calendar, File Manager, Firewall Configuration, MPV Media Player, Movie, and more. The good news is that there's the Pamac GUI app installer that makes installing/updating applications a breeze.

I did have a small issue with Pamac after the installation. When I tried to run the app, it refused to sync with the update databases and wouldn't show any applications available for installation. Fortunately, I knew how to update Arch manually (with the command sudo pacman -Syu). After running that command (and rebooting), I expected Pamac to behave exactly as expected. It did not.

Turns out, Pamac is fairly broken, so the solution is to install the bauh GUI with the command:

Code: [Select]
sudo pacman -Sy bauh
Once you've installed bauh, everything works as expected (except paman, which is a lost cause for the moment).


You can install any software found in numerous Arch repositories from bauh.
Jack Wallen/ZDNET


Outside of that one issue, RebornOS is a delight to use.  Anyone looking for a desktop distribution that makes Arch Linux easy, offers a desktop environment for all types of users and can be installed and used for free, I would highly recommend giving this take on Linux a try. Just remember to skip pamac and go straight to bauh, otherwise you'll wind up frustrated over an app that should make installing software easy is broken beyond repair.

source
12
Apple / Apple announces "Let Loose" iPad event for May 7, 2024
« Last post by javajolt on April 23, 2024, 05:38:20 PM »


Apple has sent out invitations for its next special event titled "Let Loose," alongside a graphic depicting an Apple Pencil. This suggests that the event will be where the highly anticipated new iPad Pro and iPad Air models will make an appearance after being rumoured for some time and new model numbers appearing in recent software betas.

Expectations for new iPads have been at a high ever since there was no event in October 2023. In recent years, iPad events have been held in the autumn months. However, given the lack of an event last year, many people were wondering what Apple's plans were for the device and when the eventual updates would come, given that the iPad Pro was last updated in October 2022 and the current iPad Air was released in March 2022.

The included image also appears to show an illustration of an Apple Pencil, which could be suggesting that the Pencil lineup will be getting a refresh. This would be appreciated, given the confusing nature of the current range (which Apple has had to provide a comparison table on its website). The Magic Keyboard might also see a refresh, considering that the existing model was released in 2020, giving it a long shelf life by Apple standards.

Finally, there are expected to be four iPad models announced at this event, which would be two new iPad Pro devices and two new iPad Air devices, including the first 12.9-inch iPad Air with a landscape-oriented front camera as seen in the 10th generation iPad, as well as an M2 chip.

Other updates to the iPad Pro are rumored to be a thinner enclosure, thinner bezels, a matte screen option, the aforementioned landscape-orientated front camera, and potentially the inclusion of MagSafe wireless charging.

The event will be live-streamed by Apple at 07:00 AM PT (15:00 BST, 10:00 ET) on Apple.com.

source
13

How Meta envisions an Xbox-branded VR headset. Image: Meta
Microsoft is teaming up with Meta to create a limited edition Meta Quest VR headset that’s “inspired by Xbox.” While both Microsoft and Meta aren’t sharing full details on this VR headset, it sounds like it’s simply going to be a skinned Meta Quest 3 (or future unannounced version) that comes bundled with an Xbox controller.

“We’re working together again [with Microsoft] to create a limited-edition Meta Quest, inspired by Xbox,” says Meta in an announcement today. It’s part of Meta opening up its operating system that powers its Quest VR headsets to third-party hardware makers. Asus and Lenovo are creating dedicated headsets that run the Meta Horizon OS, but the partnership with Microsoft sounds like it’s simply a limited-edition headset — much like how Microsoft creates limited-edition Xbox consoles.

In an Instagram post, Meta CEO Mark Zuckerberg says the version of the headset that is being teased today “comes out of the box with Xbox controllers and Game Pass, so you can immediately just start playing on a big screen anywhere you go.”

Microsoft has a mixed history with VR headsets on the Xbox side, which has led to the company partnering with Meta more closely recently. A document leak in 2012 detailing Xbox One plans showed that Microsoft had considered Kinect Glasses, codenamed Project Fortaleza. Those never came to life with the launch of the Xbox One console, but Microsoft then created a more powerful Xbox One X version that was supposed to be VR-capable.

“We’ve architected it such that something will be able to plug right in and work,” said Microsoft Gaming CEO Phil Spencer in 2016 about VR support for Project Scorpio, the codename for Xbox One X. The Xbox One X never had VR headset support despite the company shipping its Xbox One controllers with the Oculus Rift.

After the demise of Microsoft’s failed Windows Mixed Reality efforts, the company eventually pivoted toward partnering with Meta more closely. Quest owners can now use Word, Excel, and PowerPoint in VR, and Microsoft and Meta also partnered to bring Xbox Cloud Gaming to Quest VR headsets last year.

source
14


A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with Microsoft repositories, making the files appear trustworthy.

While most of the malware activity has been based around the Microsoft GitHub URLs, this "flaw" could be abused with any public repository on GitHub, allowing threat actors to create very convincing lures.

Abusing GitHub's file upload feature

Yesterday, McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft GitHub repository for the "C++ Library Manager for Windows, Linux, and MacOS," known as vcpkg, and the STL library.

The URLs for the malware installers, shown below, clearly indicate that they belong to the Microsoft repo, but we could not find any reference to the files in the project's source code.

Quote
http://github[.]com/microsoft/vcpkg/files/14125503/Cheat.Lab.2.7.2.zip

http://github[.]com/microsoft/STL/files/14432565/Cheater.Pro.1.6.0.zip

Finding it strange that a Microsoft repo would be distributing malware since February, BleepingComputer looked into it and found that the files are not part of vcpkg but were uploaded as part of a comment left on a commit or issue in the project.

When leaving a comment, a GitHub user can attach a file (archives, documents, etc), which will be uploaded to GitHub's CDN and associated with the related project using a unique URL in this format: 'http://www.github.com/{project_user}/{repo_name}/files/{file_id}/{file_name}.'

For videos and images, the files will be stored under the /assets/ path instead.

Instead of generating the URL after a comment is posted, GitHub automatically generates the download link after you add the file to an unsaved comment, as shown below. This allows threat actors to attach their malware to any repository without them knowing.


Download link auto-generated when adding a file to a comment Source: BleepingComputer

Even if you decide not to post the comment or delete it after it is posted, the files are not deleted from GitHub's CDN, and the download URLs continue to work forever.

As the file's URL contains the name of the repository the comment was created in, and as almost every software company uses GitHub, this flaw can allow threat actors to develop extraordinarily crafty and trustworthy lures.

For example, a threat actor could upload a malware executable in NVIDIA's driver installer repo that pretends to be a new driver fixing issues in a popular game. Or a threat actor could upload a file in a comment to the Google Chromium source code and pretend it's a new test version of the web browser.

These URLs would also appear to belong to the company's repositories, making them far more trustworthy.

Unfortunately, even if a company learns their repos are abused to distribute malware, BleepingComputer could not find any settings that allow you to manage files attached to your projects.

Furthermore, you can only protect a GitHub account from being abused in this way and tarnishing your reputation by disabling comments. According to this GitHub support document, you can only temporarily disable comments for a maximum of six months at a time.

However, restricting comments can significantly impact a project's development as it will not allow users to report bugs or suggestions.

Sergei Frankoff, of automated malware analysis service UNPACME, did a livestream on Twitch about this bug just last month, saying that threat actors were actively abusing it.



As part of our research into this bug, BleepingComputer could only find one other repo, httprouter, abused to distribute malware in this way, and it was the same 'Cheater.Pro.1.6.0.zip' as seen in Microsoft's URLs.

However, Frankoff told BleepingComputer that they discovered a similar campaign in March that utilizes the same LUA loader malware, which is called SmartLoader, disguised as the Aimmy cheat software.

Frankoff told BleepingComputer that SmartLoader is commonly installed alongside other payloads, such as the RedLine information-stealing malware.

BleepingComputer contacted both GitHub and Microsoft on Thursday about this abuse but did not receive a response.

At the time of this publication, the information-stealing malware is still being distributed through links associated with Microsoft's GitHub repository.

Update 4/21/24: GitHub has removed the malware linked to Microsoft's repositories. However, the malware associated with httprouter and Aimmy is still accessible.

source
15
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses.

It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Follow this link to get your copy of "Cybersecurity and Decision Makers" for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]

source
16
eBooks all to know / "Java All-in-One For Dummies, 7th Edition"
« Last post by javajolt on April 22, 2024, 02:26:46 PM »
A beginning coder’s resource for learning the most popular coding language

With Java All-in-One For Dummies, you get 8 books in one, for the most well-rounded Java knowledge on the market. Updated for Java 19, this book includes all the major changes to the programming language, so you won’t fall behind. Start by learning the basics of Java—you can do it, even if you’ve never written a line of code in your life. Then go in-depth, with all the info you need on object-oriented programming, Java FX, Java web development, and beyond. Grab a hot cup of java and settle in to learn some Java, with friendly For Dummies guidance!

   • Learn the basics of computer programming and get started with the Java language

   • Master strings, arrays, and collections

   • Discover the most recent Java updates and the latest in programming techniques

   • Launch or further your career as a coder with easy-to-follow instruction

This is the go-to Dummies guide for future and current coders who need an all-inclusive guide Java to take their knowledge to the next level.

Follow this link to get your copy of Java All-in-One For Dummies, 7th Edition for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]
17
eBooks all to know / The Cloud Computing Journey
« Last post by javajolt on April 22, 2024, 02:04:48 PM »

As the need for digital transformation and remote work surges, so does the demand for cloud computing.

However, the complexity of cloud architecture and the abundance of vendors and tools can be overwhelming for businesses. This book addresses the need for skilled professionals capable of designing, building, and managing scalable and resilient cloud systems to navigate the complex landscape of cloud computing through practical tips and strategies.

This comprehensive cloud computing guide offers the expertise and best practices for evaluating different cloud vendors and tools. The first part will help you gain a thorough understanding of cloud computing basics before delving deeper into cloud architecture, its design, and implementation.

Armed with this expert insight, you'll be able to avoid costly mistakes, ensure that your cloud systems are secure and compliant, and build cloud systems that can adapt and grow with the business.

By the end of this book, you’ll be proficient in leveraging different vendors and tools to build robust and secure cloud systems to achieve specific goals and meet business requirements.

Follow this link to get your copy of The Cloud Computing Journey for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]

source
18


When your PC misbehaves, the first thing that most of us do or are on the verge of doing is reinstalling the operating system. That's what most normal users would do, and that gets the job done and fixes the issue, most of the time. You might have seen different ways of repairing, resetting, or reinstalling Windows 11, such as using the Reset This PC option, using the Media Creation Tool to create a bootable disc or USB to format the PC, etc.

But there is another way that is way simpler and doesn't require you to have a USB or a disc at your disposal or go through some advanced steps to get your PC to a working state. You can use the "Fix Problems using Windows Update" feature, which does exactly what it says. This feature was quietly added with the Windows 11 Moment 5 update that rolled out earlier this month.

Reinstall Windows 11 using Windows Update

1️⃣ Click on the Start menu button on the bottom-left corner of the taskbar, and select Settings. You can also right-click on the Start menu button and select Settings from the list of options, or press the Win + I keys to access the Settings menu directly.

2️⃣ Select System from the left pane of the Settings menu.

     

3️⃣ On the right side, scroll down and click on Recovery.

     

4️⃣ On the next page, you will see the option Fix problems using Windows Update, which is described as a feature that
     would "Reinstall your current version of Windows (your apps, files, and settings will be preserved)".

     

5️⃣ Click on the Reinstall now button next to the Fix problems using Windows Update option.

     

6️⃣ A confirmation pop-up will appear. You can check the box next to Automatically restart my PC 15 minutes after installationoption and click OK.

     

7️⃣ After that, your PC will reboot and the repair will initiate.

This process of reinstalling Windows 11 using Windows Update is a safe and easy way to resolve issues if your PC is throwing tantrums, usually after you have installed a Windows update. Besides, it doesn't delete your files, apps, or settings.

Keep in mind that if you are using a PC or laptop that is controlled or managed by your work or school, the option to Fix problems using Windows Update won't be available on your PC. Moreover, the option may also be unavailable if your PC is running a version earlier than Windows 11 with the 2022 annual update, and should have the February 2024 optional update or above to get this feature working.

If you are old school and love how things looked in Windows 10, then you can check out our guide that details how you can get back the old Task Manager on Windows 11. You can also restore the old Notepad using our dedicated guide.

source
19


The maker of Tiny11, a third-party project that aims to make Windows 11 less bloated with unnecessary parts, released a new version of Tiny11 Builder, a special tool that lets you create a custom Windows 11 image tailored to your needs and preferences. The latest release makes it much easier to create a lightweight Windows 11 ISO without worrying about installing a system modified by unknown third parties.

Tiny11 Builder is no longer tied to a specific Windows 11 build. You can use it with any version, language, and architecture. According to the developer, who goes by the @NTDEV_ handle on X, the improvements in Tiny11 Builder were made possible thanks to the better scripting capabilities of PowerShell.

Tiny11 Builder is open-source, which allows everyone to peek under the hood to understand better how the thing works. It uses only Microsoft-made utilities, such as DISM or oscdimg.exe, which is a part of the Windows ADK:

Quote
My main goal is to use only Microsoft utilities like DISM, and no utilities from external sources. The only executable included is oscdimg.exe, which is provided in the Windows ADK and it is used to create bootable ISO images. Also included is an unattended answer file, which is used to bypass the Microsoft Account on OOBE and to deploy the image with the /compact flag. It's open-source, so feel free to add or remove anything you want! Feedback is also much appreciated.

Since the updated Tiny11 Builder uses PowerShell, you should set the execution policy to unrestricted before using the project. To do so, run PowerShell as Administrator and execute the Set-ExecutionPolicy unrestricted command.

You can download Tiny11 Builder from its GitHub repository. Before you proceed, remember that only the official Windows images from Microsoft are 100% safe. If you want to tinker with the OS beyond what Microsoft allows, you should accept potential risks and complications and keep in mind that only you are the one responsible for your system.

source
20

Google Play users warned of biometric verification change SOPA IMAGES/LIGHTROCKET VIA GETTY IMAGES
Google is sending emails to users notifying them about upcoming changes to the security settings for purchase verification on mobile devices. These changes will be implemented in the coming weeks and aim to enhance the security of Google Play purchases. The changes follow a recent verification update for Google Wallet users. Within that email, though, is a warning for all users looking to verify purchases using biometrics on their smartphones.

04/20 update below. This article was originally published on April 18.

Google Makes Changes To Google Play Biometric Verification

On the afternoon of April 18, I received an email from Google informing me that it’s possible to configure Google Play purchase verification to use biometrics on suitably equipped smartphones. “If you set biometrics,” the email stated, “it means that you'll be asked to verify that it's you with biometrics each time that you purchase Google Play.”


Google Play warns users of biometric device over-sharingGOOGLE/DAVEY WINDER
These settings, Google said, “only apply to purchases made through Google Play’s billing system.” When enabling the purchase verification biometric option, your Google Account password will no longer be required to confirm the configuration change. Instead, your fingerprint or face will be used.

Use Caution If Your Kids Have Their Fingerprints On Your Phone

This new Google Play email warns that the changes will be rolling out in the coming weeks and that Android owners should use caution if storing biometrics of children or others on their devices. “If you share your device and choose biometrics as your verification method,” Google said, “ensure that you're comfortable with all biometrics stored on your device being used for verification.” Otherwise, you could be leaving the door open for anyone with those fingerprints or faces stored on your phone to be able to pass purchase verification protections.

Google Wallet Gets More Like Apple With Tap-To-Pay

This follows recent news reports that new security settings for Google Wallet will also enable biometric verification as a requirement for every purchase. The verify it’s you alert will also pop up if using Wallet three minutes after you unlock your device. This will sound familiar to iPhone users as Apple Pay requires authentication before any tap-to-pay transaction. Android users will be able to disable verification when using the default transit card, even if the phone is locked.

04/20 update: As technology companies such as Google continue to push towards primary biometric authentication, we must ask ourselves whether the general public is truly comfortable with this approach. While some may be biased towards biometrics because of the benefits they bring over traditional passwords, we must also consider other factors. Biometrics are often used as a second factor in authentication, with our devices relying on our faces or fingerprints to grant access. However, just because we may be content to use biometrics to unlock our smartphones, this does not necessarily mean we want to use them for other purposes, such as logging into our bank accounts or making purchases online. It’s crucial that we examine the statistics to determine how consumers truly feel about biometric authentication.

A 2016 YouGov survey of adults in the U.S. found that 58% preferred passwords over fingerprints or facial recognition. Fast-forward to now and when NordVPN asked U.K. and U.S. residents about their biometric usage it found “50% of U.S. respondents still use at least one biometric technology (fingerprint, face, or eye scan) daily.” What’s more 29% don’t use any biometric technology at all. All of this tends to suggest there’s still a way to go to convince the average user of the security benefits biometrics can bring.

source
Pages: 1 [2] 3 4 ... 10