• 2 Posts
  • 38 Comments
Joined 3 years ago
cake
Cake day: December 20th, 2021

help-circle




  • all the way from 1991 to 2024, I think the only other OS that has managed that is Windows

    It’s easy to forget about MacOS when it only has 15% desktop market share.

    Operating systems that started before 1991 that are still in active development (had a release in the last 12 months):

    • Multics (1969-)
    • MVS (1974-) via OS/390 (1995-) -> z/OS (2001-)
    • VMS (1977) via OpenVMS (1992-)
    • BSD (1978-) via 386BSD -> FreeBSD, NetBSD -> OpenBSD
    • HP-UX (1982-)
    • SunOS (1982-1994) via Solaris (1992-)
    • MacOS (1984-)
    • AIX (1986-)
    • RISC OS (1987-)

    Almost made it:

    • Minix (1987-2017)
    • Genera (1982-2021)
    • AmigaOS (1985-2021)
    • NeXTSTEP (1987-1997) via GNUStep (1993-2021)
    • IBM i (1988-2022)
    • SpartaDOS (1988-2022)











  • These are not Drew’s words, he is quoting something said by the project dev. The context that the previous commenter ommitted is:

    Following my email conversation with Vaxry, he appeared on a podcast to discuss toxicity in the Hyprland community. This quote from the interview clearly illustrates the attitude of the leadership:

    [A trans person] joined the Discord server and made a big deal out of their pronouns […] because they put their pronouns in their nickname and made a big deal out of them because people were referring to them as “he” [misgendering them], which, on the Internet, let’s be real, is the default. And so, one of the moderators changed the pronouns in their nickname to “who/cares”. […] Let’s be real, this isn’t like, calling someone the N-word or something.



  • The Kaspersky analysis noted that the malware contained comments in the shell scripts written in Ukrainian and Russian, and used malware components detected in previous malware campaigns since 2013 that presumably have been attributed to a specific group.

    FTA:

    Meanwhile, the postinst script contains comments in Russian and Ukrainian, including information about improvements made to the malware, as well as activist statements. They mention the dates 20200126 (January 26, 2020) and 20200127 (January 27, 2020).

    Having established how the infected Free Download Manager package was distributed, we decided to check whether the implants discovered over the course of our research have code overlaps with other malware samples. It turned out that the crond backdoor represents a modified version of a backdoor called Bew. Kaspersky security solutions for Linux have been detecting its variants since 2013.

    The Bew backdoor has been analyzed multiple times, and one of its first descriptions was published in 2014. Additionally, in 2017, CERN posted information about the BusyWinman campaign that involved usage of Bew. According to CERN, Bew infections were carried out through drive-by downloads.

    As for the stealer, its early version was described by Yoroi in 2019. It was used after exploitation of a vulnerability in the Exim mail server.