![](/static/0b35d4a1/assets/icons/icon-96x96.png)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
ITT: Rust programmers rewriting the joke in Rust.
ITT: Rust programmers rewriting the joke in Rust.
You could try VanillaOS 2.0 Beta which is a Debian-based immutable distro, planned for final release later this year.
That’s kind of true, but MacOS and Mac OSX are 2 different things
Then Windows 3.0 and Windows 11 are two different things, so by that metric you can’t include Windows either.
all the way from 1991 to 2024, I think the only other OS that has managed that is Windows
It’s easy to forget about MacOS when it only has 15% desktop market share.
Operating systems that started before 1991 that are still in active development (had a release in the last 12 months):
Almost made it:
deleted by creator
I think the post is supposed to link here: https://timemachiner.io/2022/06/18/windows-95-launch-video-reminds-us-how-90s-the-90s-were/
For some reason when I view the post it just links to a jpeg
This is the Windows 95 launch video in my mind: https://www.youtube.com/watch?v=kemivUKb4f4
So the training environment was not Touhou? So what does the training environment look like? I’d be interested to see that, and how it improved over time.
uh oh
the browser is just not there to compete
Have you even used it?
I didn’t even mention Github, I just quoted from the video description.
a really odd way of using Git
Git was literally designed for kernel development.
The article doesn’t contain the list, but I believe this is what they are referring to: https://carbonmajors.org/Entities
Is Hyprland violating someone’s copyright?
These are not Drew’s words, he is quoting something said by the project dev. The context that the previous commenter ommitted is:
Following my email conversation with Vaxry, he appeared on a podcast to discuss toxicity in the Hyprland community. This quote from the interview clearly illustrates the attitude of the leadership:
[A trans person] joined the Discord server and made a big deal out of their pronouns […] because they put their pronouns in their nickname and made a big deal out of them because people were referring to them as “he” [misgendering them], which, on the Internet, let’s be real, is the default. And so, one of the moderators changed the pronouns in their nickname to “who/cares”. […] Let’s be real, this isn’t like, calling someone the N-word or something.
KSMBD is also important in that placing such core server functionality right inside the kernel represents a significant potential attack surface for crackers. As one comment on Hacker News said “Unless this is formally proven or rewritten in a safer language, you’ll have to pay me in solid gold to use such a CVE factory waiting to happen.”
Words to live by.
The Kaspersky analysis noted that the malware contained comments in the shell scripts written in Ukrainian and Russian, and used malware components detected in previous malware campaigns since 2013 that presumably have been attributed to a specific group.
FTA:
Meanwhile, the postinst script contains comments in Russian and Ukrainian, including information about improvements made to the malware, as well as activist statements. They mention the dates 20200126 (January 26, 2020) and 20200127 (January 27, 2020).
…
Having established how the infected Free Download Manager package was distributed, we decided to check whether the implants discovered over the course of our research have code overlaps with other malware samples. It turned out that the crond backdoor represents a modified version of a backdoor called Bew. Kaspersky security solutions for Linux have been detecting its variants since 2013.
…
The Bew backdoor has been analyzed multiple times, and one of its first descriptions was published in 2014. Additionally, in 2017, CERN posted information about the BusyWinman campaign that involved usage of Bew. According to CERN, Bew infections were carried out through drive-by downloads.
As for the stealer, its early version was described by Yoroi in 2019. It was used after exploitation of a vulnerability in the Exim mail server.
AFAIK even legitimate ad clicks will first direct to an analytics platform before redirecting to the destination site, so that they can track click through rates and where the referral came from. So it is unlikely that ad links will actually go to the website you expect them to even in normal scenarios. It is actually this mechanism that the malicious ads described in the article are using to fake the display URL.
I started the video thinking “huh, that’s neat I guess” and then I was more and more impressed as the video went on. This would be pretty revolutionary in how it could change your workflow. It’s the kind of feature that would get me to switch from Gnome to KDE if it was only supported fully in the latter.
I’ve been using Firefox since the beginning, before that Mozilla, and before that Netscape Navigator.
But I think it’s finally time to switch to Librewolf.
I don’t want digital advertising of any kind, even if my privacy is “preserved” through fancy data-laundering.