[-] [email protected] 53 points 1 week ago

I've been using Firefox since the beginning, before that Mozilla, and before that Netscape Navigator.

But I think it's finally time to switch to Librewolf.

I don't want digital advertising of any kind, even if my privacy is "preserved" through fancy data-laundering.

[-] [email protected] 4 points 3 weeks ago

You could try VanillaOS 2.0 Beta which is a Debian-based immutable distro, planned for final release later this year.

[-] [email protected] 3 points 3 weeks ago

That’s kind of true, but MacOS and Mac OSX are 2 different things

Then Windows 3.0 and Windows 11 are two different things, so by that metric you can't include Windows either.

[-] [email protected] 5 points 3 weeks ago

all the way from 1991 to 2024, I think the only other OS that has managed that is Windows

It's easy to forget about MacOS when it only has 15% desktop market share.

Operating systems that started before 1991 that are still in active development (had a release in the last 12 months):

  • Multics (1969-)
  • MVS (1974-) via OS/390 (1995-) -> z/OS (2001-)
  • VMS (1977) via OpenVMS (1992-)
  • BSD (1978-) via 386BSD -> FreeBSD, NetBSD -> OpenBSD
  • HP-UX (1982-)
  • SunOS (1982-1994) via Solaris (1992-)
  • MacOS (1984-)
  • AIX (1986-)
  • RISC OS (1987-)

Almost made it:

  • Minix (1987-2017)
  • Genera (1982-2021)
  • AmigaOS (1985-2021)
  • NeXTSTEP (1987-1997) via GNUStep (1993-2021)
  • IBM i (1988-2022)
  • SpartaDOS (1988-2022)
[-] [email protected] 2 points 3 weeks ago

I think the post is supposed to link here: https://timemachiner.io/2022/06/18/windows-95-launch-video-reminds-us-how-90s-the-90s-were/

For some reason when I view the post it just links to a jpeg

[-] [email protected] 4 points 3 weeks ago

This is the Windows 95 launch video in my mind: https://www.youtube.com/watch?v=kemivUKb4f4

[-] [email protected] 8 points 4 weeks ago

He was in the airport, remember. Not in a local market.

[-] [email protected] 65 points 4 weeks ago

I lost my earbuds in a remote town in Chile, so tried buying a new pair at the airport before flying out.

...

True Apple lightning devices are more expensive to make.

...

I wish @Apple would devote an employee or two to cracking down on such a technological, psychological abomination as this.

He wants to take away a budget option from developing countries where people can't afford the expensive version of the proprietary technology, and he wants Apple to be the one to do it?

Fuck this guy.

[-] [email protected] 5 points 1 month ago

Why not post your blogs to a fediverse platform? Do they need to be on a separate hosted system? You'll probably get more people reading and engaging with your posts if you are just posting to a Mastodon instance rather than hosting on a separate web platform and hoping that people stumble across it.

[-] [email protected] 14 points 2 months ago

I didn't even mention Github, I just quoted from the video description.

[-] [email protected] 79 points 2 months ago

a really odd way of using Git

Git was literally designed for kernel development.

[-] [email protected] 0 points 2 months ago

What do you mean by security? Secure from whom?

There are of course different attributes of an OS design that affect different aspects of security depending on your threat model.

Are your application programmers malicious, or is all application code trusted? Are your users malicious or are they trusted? Do you need to guarantee physical security of the device? Is the device manufacturer malicious? etc.

Different threat models will result in designs that optimize for different types of security. Console OSes for example will tend to be designed around copy-protection of the software, assuming the user is malicious.

290
submitted 9 months ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

191
submitted 9 months ago by [email protected] to c/[email protected]

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

293
submitted 9 months ago by [email protected] to c/[email protected]

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›

drspod

joined 2 years ago