Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 03/04/2025 in News

  1. This week, Microsoft made it very clear that it wants to block the popular BYPASSNRO workaround, used to skip the internet and Microsoft Account requirement checks during the Windows 11 installation OOBE (initial setup), although thankfully, the script can still be created using Registry edits. Microsoft has its reasons why it wants people to use a Microsoft Account instead of local accounts. The company explained in detail all about it back in 2024. Naturally, when things like this happen, enthusiasts go digging for ways to work around such issues. Interestingly, as it turns out, another bypass method had already existed for a while now and it is finally becoming popular. This new method was discovered by a user ThePineapple and they have also published a detailed step-by-step guide on how to implement it. They explain: The bypass uses a CXH (cloud experience host) URI (Uniform Resource Identifier) string during the OOBE to invoke the hidden local account setup screen. The detailed guide is given below: After typing WinJS.A, press Tab to auto-complete Application. After typing res, press Tab to auto-complete restart. 5. Exit the Developer Console After entering the command, press Enter to execute it. Press Escape to exit the Developer Console and return to the OOBE interface. Note: If the Escape key doesn't close the Console, click anywhere on the screen to ensure the console is focused and then press the key again. 6. Local Account Setup The Secondary Keyboard Layout screen will refresh, and a Windows 10-style local account setup screen will appear. Enter your desired username, password, and security questions and click Next. 7. Complete the Setup The Setup will go black and will then log you in to your newly created account. Allow Windows 11 a few moments to configure the user. Continue with the remaining privacy setting prompts. Once finished, you will have successfully created a local account in Windows 11. A video guide has also been shared although you may want to turn down the volume first: You can view the project here on its GitHub repo. Thanks to d5aqoëp for the tip!!!! Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    10 points
  2. Last week, Microsoft made a major announcement as it blocked the popular BYPASSNRO workaround on Insider builds, used to skip the internet and Microsoft Account requirement checks during the Windows 11 installation OOBE (initial setup). Microsoft has its reasons why it wants people to use a Microsoft Account instead of local accounts. The company explained in detail all about it back in 2024, and on the announcement blog post itself, it noted that the change was being made to "enhance security and user experience of Windows 11." Microsoft wrote: Following this announcement, enthusiasts and smart Windows users started looking for ways in which they could work around and circumvent this. That is when we picked up on this newish method proposed by the user ThePineapple. We say newish since it already existed for the last six months or so, but no one had noticed it as the BYPASSNRO script has been so popular. The trick involves using a CXH URI string to trigger a hidden local account during the OOBE. We covered it in its dedicated article here. There is also a PowerShell script that can help in this regard. Meanwhile, another user has discovered yet another way to bypass this. This is similar to the BYPASSNRO one but involves going to the Registry and tweaking it. Upon finding this, Neowin looked around and found that Microsoft's own official documentation explains how this works. The company notes that by default, the HideOnlineAccountScreens value is set to "false" such that the sign-in page appears during the OOBE. So for the bypass to work, one has to change it to "true". Microsoft notes that this is "primarily for enterprises" for running unattended installs, but it should work for all users. Neowin also noticed that there is also an option to hide the wireless network setup option too using HideWirelessSetupInOOBE. Again, the default value is "false" so that this page appears, but users can flip it to "true". Source: Microsoft (link1, link2) Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    7 points
  3. New tinnitus treatment emerges from blocking back-channels in the ear By Michael Irving March 14, 2025 The discovery of a strange mechanism between the ear and the brain could lead to a new potential tinnitus treatment If some speakers in your sound system were broken, you might try to compensate by cranking up the volume on the ones that still work. It turns out that the brain does the same thing when damaged hair cells in the ear lead to hearing loss – and this could be causing your tinnitus. Sensory hair cells are tiny structures in the cochlea that wave like blades of grass in the wind – but in this case, it’s the pressure of sound waves that gets them moving. When they do, they create electrical signals that are funneled through nerve fibers to the brain, to process what you’re hearing. But a small percentage of these nerves actually run in the opposite direction, from the brain to the cochlea. Scientists have long been puzzled by the function of these backwards channels, and it’s hard to study their activity while people or animals are awake. In the new study, scientists at the University of Southern California (USC) used an intriguing imaging tool to see what’s going on in there. The technique is called optical coherence tomography (OCT), which involves creating a 3D image of tissue using light waves. It’s currently used to scan the retina to diagnose conditions like glaucoma, but the team adapted it for use in the ear. “OCT lets us look down the ear canal, through the eardrum and bone into the cochlea, and measure how it’s working – non-invasively and without pain,” said John Oghalai, lead author of the study. “What’s exciting about this is it lets us study how the brain is controlling the cochlea in real time.” The researchers genetically engineered mice to have impaired hearing, by disabling some of the nerves that carry signals from their ears to their brains. They then used OCT to monitor the activity of the cochlea, and found that it was working harder than usual. “As humans age and our hair cells die off, we start to lose our hearing,” said Oghalai. “These findings suggest that the brain can send signals to the remaining hair cells, essentially telling them to turn up the volume.” As useful as this mechanism might be to compensate for hearing loss, the team suggests that it might have unwanted side effects: namely, it could contribute to conditions like tinnitus. The brain cranking the cochlea’s volume could produce that annoying ringing associated with tinnitus, like the hiss you hear when turning a speaker up too loud with nothing playing. On the positive side, the team now plans to test drugs that could block these backwards nerve fibers as a potential treatment for tinnitus, and related conditions like hyperacusis, where everyday sounds seem uncomfortably loud. The research was published in the Journal of Neuroscience. Source
    6 points
  4. The most recent Windows 11 builds pack quite a lot of new stuff, with one particular thing being not so great, especially for Windows enthusiasts. Microsoft's operating system is infamous for enforcing an active internet connection and a Microsoft Account during its setup. Still, for the last three years, it has been possible to bypass that by executing the oobe\bypassnro in Command Prompt during the initial setup. Now, Microsoft is cracking down on that. Windows 11 builds 26200.5516 and 26120.3653 remove the bypassnro.cmd script from the operating system. Microsoft says the change is to ensure that "all users exit setup with internet connectivity and a Microsoft Account." Yes, Microsoft does not want you to use its operating system without an account. In the most recent Windows 11 builds, attempts to execute the bypassnro command return the following error: Fortunately, not all hope is lost. Enthusiasts quickly discovered that it is still possible to restore the script. Here is how: On the Windows 11 setup screen, press Shift + F10 and type regedit and press Enter. Go to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE. Click Edit > New > DWORD (32-bit) and rename the new value to BypassNRO. Open the value and change its value data to 1. Restart your system. You can now setup your computer without an active internet connection or a Microsoft Account. Of course, OOBE\bypassnro is not the only way to skip some of Windows 11's requirements. Still, it is one of the easiest and most popular ones, so quite a lot of users will be upset about its demise. Luckily, for now, it is possible to bring it back. There is just no info on whether this method will last. Source: @phantomofearth X Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    5 points
  5. Zorin OS 17.3 has been announced today, promising new features centered around privacy and an enhanced user experience. Zorin Group kicked off its announcement by pointing out that Windows 10 is reaching its end of life this October. Zorin Group is positioning its Ubuntu-based distro as the "ideal replacement," especially for devices that can’t handle Windows 11’s system requirements. If you’re in that boat, though, Paul also suggests giving Linux Mint a shot. With 17.3, there is now an expanded database containing over 150 alternatives to Windows applications. Zorin OS allows you to run Windows applications thanks to the Wine compatibility layer, but there's nothing better than native applications on native platforms. Now, when you launch a Windows installer for an app, Zorin OS 17.3 will suggest native alternatives. For example, Obsidian, the popular "file over app" note-taking application, ships with variants for Linux, macOS, and Windows. If you try to run the Windows .exe file on Zorin OS 17.3, the system will recommend the Linux version. You've probably heard about the recent controversial policy changes Mozilla made. If you somehow haven't, here's a brief recap: Last month, Mozilla modified its Terms of Use for Firefox, stating that by using Firefox, you granted it a "nonexclusive, royalty-free license" to utilize information input through the browser. That's not all. In the Mozilla Bedrock project, the following code block was also removed: This did not sit well with many, and Zorin Group is one of them. That's why, in 17.3, Zorin OS is ditching Firefox as its default browser in favor of a lightly modified Brave. Zorin Group says the following requirements were set when considering a replacement for Firefox: Moving on, the Zorin Connect app has received a redesigned interface that adapts to your Android device's theme, alongside other improvements. For example, the "Remote Input" functionality now includes new features like middle-click, compose and send text, and a gyroscope mouse option. Other improvements to the Zorin Connect app include the following: If you're a touchscreen user, you'll notice that in 17.3, you can now open the on-screen keyboard from the panel once you enable the "Screen Keyboard Button in Panel" option under "Interface" in Zorin Appearance. Other changes Zorin OS brings include updates to pre-installed apps. The latest NVIDIA 570 drivers are now included in the .iso files, bringing support for the newest NVIDIA RTX 5000 series graphics cards. Zorin Group promises software updates and patches until June 2027 for users of the Zorin OS 17 version series. For existing Zorin OS users, there are two recommended ways to get Zorin OS 17.3. If you're on Zorin OS 17, you can upgrade to 17.3 using the Software Updater. If you're on version 16, you'll need to follow this guide on how to upgrade. As with other Zorin OS versions, 17.3 comes in three editions: Pro (which costs $47.99), Core, and Education. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    5 points
  6. Rufus, the highly popular utility used for creating bootable media, has received its latest update today. The application received its last update back in October. That was a stable update, and it was a major one too, as it added a bypass for unsupported systems on Windows 11 24H2. Rufus has, for the longest time, helped users workaround these problems. For example, the app, alongside others like Ventoy, allows skipping the requirements like internet connectivity and Microsoft Account (MSA) during Windows 11 installs. So for those pissed about the recent dumping of BYPASSNRO script in Windows 11 24H2, Rufus can still do as it automatically makes the necessary Registry edits to re-create the BYPASSNRO file. Interestingly, users can also use another Registry trick for the same, and this method is actually officially endorsed by Microsoft itself. The latest version of Rufus adds a mechanism to automatically detect and download updated Secure Boot DBXs from the official UEFI repo. Zstd compression support is now here, and in terms of bug fixes, there a quite a few too. A memory leak issue related to the user interface has been fixed, and a DLL sideloading vulnerability has been addressed. The version also drops ARM 32-bit support. The full changelog is given below: To download the update, head over to the Neowin software stories page or the official GitHub repo of Rufus. Keep in mind, though, that this is a beta release. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    4 points
  7. I used (almost) every edition of Microsoft's operating system and fondly remember some of its iconic first-party programs. My intrigue for computing started when my parents brought home our first Windows 3.1 family PC and transitioned to an offline-only Windows 95 build with its iconic Start menu, obsessed with drawing shapes in Paint and writing homework in Wordpad. However, it significantly picked up when we graduated to Windows 98 SE with a dial-up Internet connection and a heavy investment into yearly hardware upgrades. Having access to the World Wide Web from age 10 was formative to an incredible degree, influencing me throughout my life. Now, as Microsoft turns 50 years old, I'm looking back at three programs that played a powerful role in shaping who I am today — do you remember them all, or were you occupied with others? Let me know in the comments while I overcome my pre-millennium nostalgia. MSN Messenger MSN Messenger 6.2 running with escargot.chat. (Image credit: Windows Central | Ben Wilson) I can draw a clear picture from where I am now to the dawn of MSN Messenger, which shows how I met some of my closest friends and developed my career; it was that important. It eventually became the most popular instant messenger in my environment, replacing ICQ and, particularly, AOL Instant Messenger (AIM) once I convinced my friends to sign up for a ".NET Passport" from Microsoft. Having a small pool of peers didn't stop me from using it in the early days, and some of my strongest memories involve the basic (and ugly) layout of MSN Messenger 1.0+ before Windows XP repackaged it with a Luna-style UI. However, some stubborn holdouts forced me to keep a copy of the multi-networked Trillian app installed on my PC. Without that, I'd have lost contact with the contrarians who refused to ditch Yahoo! Messenger or whatever already-doomed platform it might have been back then. In the end, everyone migrated to what became Windows Live Messenger, and it was a mandatory mainstay on my daily desktop until everyone broke off to Skype and elsewhere. Still, I fondly recall memories circa 2003 when Microsoft's instant messenger had connected me to lifelong friends and introduced me to mutual connections that would shape my entire career. Where is it now? Discord runs on PC, mobile, and even Xbox. (Image credit: Getty Images | SOPA Images) Officially, Windows Live Messenger is dead; a part of Microsoft's ever-growing graveyard. Its intended replacement was Skype, but it never felt quite the same to me, while TeamSpeak and Ventrilo better served VOIP services for my friends. Unofficially, the instant messenger lives on within a fan-made MSN Messenger project called escargot.chat — a replacement for the login service that unfortunately remains insecure (so don't use your usual passwords.) It's a fun toy to play with, but it doesn't have much staying power beyond that. Modern replacements like Discord, Telegram, and WhatsApp are supported on multiple devices with easier access, so MSN Messenger doesn't have much reason to stick around outside nostalgic fancy. Microsoft FrontPage Official art for Microsoft FrontPage 2000. (Image credit: Microsoft | Internet Archive) Before the modern age of smartphones and cellular data, "going on the computer" felt more like an active journey to the Internet — a place you left once you shut off your Windows PC or your 56k dial-up modem dropped its time-limited connection. In that era, personal websites were booming. They often resembled blogs or diaries, but there were corners of the web that hosted ultra-niche hobbyist pages or dedicated fan zones for particular video games, sharing tips, tricks, and cheat codes that I would send to the family printer to waste some ink. I was lucky to attend a school that took personal computing seriously, and basic HTML was a brief segment of that class. As a pre-teen, building tables with bracketed code was mildly entertaining, but slow to satisfy. Thankfully, Microsoft FrontPage was a gateway to expressing my earliest designs of garish font choices and clashing background colors. Everything I made in Frontpage was awful, but it was mine, and that was the appeal — sharing knowledge of hidden clothing colors in Habbo Hotel, surrounded by animated .gif images of dancing hamsters. Bliss. Where is it now? Squarespace is a modern website builder. (Image credit: Getty Images | Justin Sullivan) Web development has become easier as these WYSIWYG (what you see is what you get) apps, including successors like Adobe Dreamweaver, are now mainstays alongside browser-based page builders and editable templates. While blogs are still popular on the modern Internet, social media has pulled most of their appeal to casual users on platforms like Facebook and professionally-driven LinkedIn. FrontPage doesn't make sense for Microsoft to maintain now that demand is lower, and it would take a significant effort for it to evolve beyond the usefulness of existing competitors like Squarespace and Wix. Windows Movie Maker Windows Movie Maker running on Windows XP. (Image credit: Microsoft | Reddit) I developed an obsession with Windows Movie Maker years before the launch of streaming platforms like Google Video and its predecessor, YouTube. It was still exciting to throw together homemade videos with images and clips from my hard drive alongside cliché animated titles set to awful bit-crushed .mp3 music ripped from a CD. Those old enough to remember the days of Microsoft's .wmv (Windows Media Video) format might share similar memories of their "My Received Files" folder filling up with cheesy compilations shared across MSN Messenger in an aggressively compressed codec that resembled the garbled mess of RealPlayer's thankfully retired .rv format. Nevertheless, it felt like a breakthrough in creativity at the time. I spent many weeks creating stop-motion animations with LEGO figures and a basic Logitech QuickCam, all set to movie soundtracks recorded with an awful 3.5mm microphone pointed at my television. I might have apologized to my friends and family members who suffered through my 240p flicks, but truthfully, I regret nothing. Windows (Live) Movie Maker had such a significant influence on me that it led to me spending almost all of my savings on a MiniDV camcorder and a PCIe FireWire adapter to rip all the footage. Where is it now? DaVinci Resolve 19 running on Windows 11. (Image credit: Windows Central) Windows Live Movie Maker still sort of exists as a spiritual successor within Clipchamp, but only because Microsoft acquired the web-based video editor in 2021. Clipchamp has an incredible number of competitors, as freemium options in CapCut and DaVinci Resolve offer powerful toolsets with paid memberships expanding even further, so there's little reason for Microsoft to keep Windows Movie Maker around separately. Even the .wmv format has become deprecated, as .webm and modern codecs for .mp4 like AV1 and H.265 take over as standardized replacements across the Internet. A glimse of Microsoft's booth during my trip to MWC Barcelona 2025. (Image credit: Windows Central | Ben Wilson) Clearly, my affinity for Windows and Microsoft in general hasn't faded, as evidenced by where I am today. While I might cling to rose-tinted nostalgia for bygone mascots like Clippy, I still love following the company and its continued efforts in the PC space, for better or worse. Stick with us for more celebrations and criticisms of Microsoft's 50-year history as we continue to speculate, report, and analyze practically everything the company does in its various categories. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    4 points
  8. VMware Workstation users report that the software's automatic update functionality is broken after Broadcom redirected the download URL to its generic support page, triggering certificate errors. The software contains a feature that checks for new updates on startup (if configured) and can be manually triggered by clicking Help > Software Updates. This will cause the program to connect to the software update server at https://softwareupdate.broadcom.com/cds to check for and download software updates. However, this URL now redirects to Broadcom's generic support page, https://support.broadcom.com/, causing the application to issue certificate validation errors and rendering its built-in update mechanism unusable. "A certificate error occurred while connecting to the update server. Check your Internet settings or contact your system administrator," reads the VMware Workstation error. Error when attempting to check for updates Source: BleepingComputer Users are now forced to log in and manually check Broadcom's website for updates, download the correct version, and install it themselves, making it frustrating for customers who expect a seamless experience. "To update your VMware Workstation Pro, you'll need to manually download the latest installer from the Broadcom support portal. It's worth noting that this change has caused frustration among users, as it was implemented without prior notice," reads a post to the Broadcom community forums. While VMware Workstation continues to function, this broken update system may cause users to miss important bug fixes or security patches, especially when it is not apparent that the automatic update feature is broken until you try to use it. Broadcom has not yet issued a public statement or workaround for the issue, and BleepingComputer has confirmed it is still broken in VMware Workstation 17.6.3, the latest software version. BleepingComputer contacted Broadcom with questions about the change but has not received a response. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    4 points
  9. It has been almost a year since Google started to implement changes on YouTube to block content blockers on the platform. The fight against adblockers started in 2023 with "Ad blockers are not allowed by YouTube" banners being shown to affected users. Google has been testing new implementations since then, including server-side ads that break adblockers, or by throwing jabs against competing browsers like Firefox. A new banner Reports on Reddit and other online forums suggest that Google has started to intensify its fight against content blockers once again on YouTube. The new banner resembles the old. It is shown to users when they use content blockers. The text is slightly different, as it now says "Ad blockers violate YouTube's Terms of Service". The options are identical to last year's banner: allow ads on YouTube or subscribe to YouTube Premium. No word on YouTube Premium Lite, a cheaper subscription option that promises fewer ads on YouTube as well though. Not everyone appears to be affected by this. Google, is likely testing the waters on a small percentage of YouTube visitors to collect data and make sure that false positives are low. Affected users report issues on non-Chrome browsers for the most part. Opera and Firefox seem to be affected specifically by this. I tested YouTube video playback in several browsers with native or extension-based content blockers and it worked in all of them. Affected users may try a few things to get back on track. First thing they may want to do is update the content blocker and its filter lists, if such an option is provided. If that does not work, loading YouTube in private browsing mode may help, as it uses a separate profile for the loading. Just make sure that the content blocker is allowed to run in private browsing mode. The next option is to test different browsers to see if they let you get around the blockage. Another option is to use Bing Videos to play YouTube videos. Not the most elegant of solutions, but it seems to come without any ads. If all of those fail, you may want to give third-party frontends and apps a try. Invidious appears to be working again for now, and apps like NewPipe for Android are also alive and kicking. Closing Words The cat and mouse game between content blockers and Google's anti-ad-blocking on YouTube could intensify again in the coming months. Users with content blockers may be blocked from time to time when they try to play videos on YouTube. Now You: do you watch videos on YouTube regularly? Did you run into any content blocks or use YouTube Premium? Let us know in the comments below. (via Neowin) Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    4 points
  10. Update 3/9/25: After receiving concerns about the use of the term 'backdoor' to refer to these undocumented commands, we have updated our title and story. Our original story can be found here. The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence. This was discovered by Spanish researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco of Tarlogic Security, who presented their findings yesterday at RootedCON in Madrid. "Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices," reads a Tarlogic announcement shared with BleepingComputer. "Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls." The researchers warned that ESP32 is one of the world's most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant. Slide from the RootedCON presentation Source: Tarlogic Discovering undocumented commands in ESP32 In their RootedCON presentation, the Tarlogic researchers explained that interest in Bluetooth security research has waned but not because the protocol or its implementation has become more secure. Instead, most attacks presented last year didn't have working tools, didn't work with generic hardware, and used outdated/unmaintained tools largely incompatible with modern systems. Tarlogic developed a new C-based USB Bluetooth driver that is hardware-independent and cross-platform, allowing direct access to the hardware without relying on OS-specific APIs. Armed with this new tool, which enables raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware that allow low-level control over Bluetooth functions. ESP32 memory map Source: Tarlogic In total, they found 29 undocumented commands, collectively characterized as a "backdoor," that could be used for memory manipulation (read/write RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection. Espressif has not publicly documented these commands, so either they weren't meant to be accessible, or they were left in by mistake. The issue is now tracked under CVE-2025-27840. Script that issues HCI commands Source: Tarlogic The risks arising from these commands include malicious implementations on the OEM level and supply chain attacks. Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the commands might be possible via malicious firmware or rogue Bluetooth connections. This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access. In general, though, physical access to the device's USB or UART interface would be far riskier and a more realistic attack scenario. "In a context where you can compromise an IOT device with as ESP32 you will be able to hide an APT inside the ESP memory and perform Bluetooth (or Wi-Fi) attacks against other devices, while controlling the device over Wi-Fi/Bluetooth," explained the researchers to BleepingComputer. "Our findings would allow to fully take control over the ESP32 chips and to gain persistence in the chip via commands that allow for RAM and Flash modification." "Also, with persistence in the chip, it may be possible to spread to other devices because the ESP32 allows for the execution of advanced Bluetooth attacks." BleepingComputer has contacted Espressif for a statement on the researchers' findings, but a comment wasn't immediately available. Update 3/8/25: Added statement from Tarlogic. Update 3/9/25: Added CVE-ID Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    4 points
  11. Mozilla has just released a major update for Firefox on desktop platforms. Version 136 is now available on Windows, macOS, and Linux, offering users many new features, such as long-anticipated vertical tabs, an updated sidebar, new tab page improvements, and more. Here is the changelog: Fixes and other changes include the following: You can find the rest of the changelog in the official release notes, including Developer Information, Enterprise Release Notes, Web Platform changes, and more. Existing users can update Firefox by heading to Menu > Help > About Firefox, while everyone else can get the browser from the official website or the Microsoft Store (for Windows 10 and 11 users). Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    4 points
  12. Karlston

    Thunderbird Pro and Thundermail announced: what you need to know

    When Mozilla announced plans to drop the email client Thunderbird about ten years ago, some users feared that this could be the end of the popular open source email client. Things have turned out different though. The project is thriving, thanks to an increasing number of donations that it is receiving. This allowed the team to expand Thunderbird to mobile platforms, for the first time in history. A suitable candidate was found in K9-Mail for Android, which has since then be renamed to Thunderbird Mobile. A version for iOS is also in the works, but not yet available. Recently, plans were announced to create new services. The first reactivates Firefox Send, a file transfer service. The second, Thunderbird Appointment, is an entirely new service. Thunderbird Business Development and Community Manager Ryan Sipes announced two major additions to the portfolio on Friday. Thundermail, an email service. Thunderbird Pro, a list of services (Appointment, Send, and Assist). Here is what we know about the plans: Thundermail The team wants to offer email accounts to users and expand its services this way. Users can sign up for a Thundermail email account and use it in Thunderbird and also on the web. This is another first for the Thunderbird team, as web-based email services were never offered. Unlike competitors like Gmail or Outlook, Thundermail will be "100% open source". The service is developed and built by the Thunderbird team as well as contributors. The main goal is to provide a "better service than the other providers out there" and one core feature is the alignment of the email service with the project team's values. Thunderbird Pro Thunderbird Pro unifies different services under its hood. The three starting services are the following ones: Appointment: a scheduling service that is designed to simplify meetings. Users may send a link to someone, which the recipient may use to pick a time on the sender's calendar for the meeting. Send: a revived version of Firefox Send. Email is still limiting file attachments, and Send aims to go around this similarly to how Google Drive or OneDrive help Gmail and Outlook customers get around the limitations. Assist: an AI, powered by Flower AI, which introduces AI features. None are mentioned specifically at this point and the team is clear that this will be entirely optional to use. Processing may be done on the user's device, or online using Nvidia's confidential compute feature. Monetization Monetization plays a central role, as the services costs money to run and maintain. The Thunderbird team plans to give "consistent community contributors" free access to the new services. Others will have to pay a subscription for access. Once a sustainable userbase is established, a free tier may be introduced. This may have some limitations, like less storage for Thunderbird Send. Closing Words The newly announced mail service and Thunderbird Pro will be completely optional. Thunderbird users do not have to use them. The creation of an email service expands Thunderbird further and helps it compete with Gmail or Outlook more directly. Especially the ability to manage emails on the web could attract new users who do not want to install a dedicated email client. The services may help as well, but it is too early to tell how successful or niche they will be. All in all, these plans may help the Thunderbird team establish a second revenue pillar next to donations, which will benefit the entire community, if successful. Now you: what is your take on this? Would you sign up for a Thunderbird email service or the announced services? Let us know how you feel about it in the comment section below. (via Sören Hentzschel) Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    3 points
  13. The popular "bypassnro" command, which let users to skip connecting to the Internet and signing into a Microsoft Account, is being removed. Microsoft has confirmed that it's removing a popular command line that allowed users to bypass connecting to the internet and signing into a Microsoft Account when setting up a new Windows 11 PC. When Windows 11 version 22H2 launched, Microsoft made it so that both Windows 11 Home and Windows 11 Pro required an internet connection and Microsoft Account during setup, but users quickly discovered workarounds. The most popular workaround is the command "bypassnro", which when entered into a command prompt while in the Windows setup experience would enable the ability to skip connecting to the internet, therefore bypassing the Microsoft Account requirement. As noted in the latest Windows 11 preview build, the company is removing the command to "ensure that all users exit setup with internet connectivity and a Microsoft Account." This change will be controversial among Windows users who don't want to use a Microsoft Account on Windows 11. Going forward, there will be no easy way to bypass this requirement on a new Windows 11 PC. There are still ways to bypass these requirements, including setting up an unattend.xml installation, which bypasses the setup phase, but this requires a lot more work and includes creating a new Windows installation image from scratch. Currently, it's also possible to manually re-add the bypassnro command to your system by typing the following into a command prompt: "reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /v BypassNRO /t REG_DWORD /d 1 /f shutdown /r /t 0" It's unclear how long this will work, as Microsoft may be planning to remove the registry value that enabled the command to work in a future build. Windows 11 PCs that have already been setup without a Microsoft Account will be unaffected. This change only affects the Windows 11 install and setup experience, which is where the OS requires an internet connection and Microsoft Account to progress. The removal of the bypassnro command is now in testing with the latest Windows 11 beta build, which means it will likely roll out to the production versions of Windows 11 in the coming weeks. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  14. Do you want to fully automate the Windows 11 installation process? If yes, you can create an answer file, and here's how. On Windows 11, you can create an answer (or autounattend.xml) file to install the operating system without going through every step during the setup and Out-of-box Experience (OOBE), and in this guide, I'll show you how. When you want to perform a clean installation of Windows 11, you typically have to complete the Windows Setup process, which takes care of the installation settings, including language preferences, product key, and partition layout. Also, after the installation, you have to complete the Out-of-box Experience to configure settings like keyboard layout, account, and privacy settings. Although this process is relatively straightforward, you still have to spend time managing the installation and answering questions. If you want to automate the process, you can create an answer file with instructions to complete every on-screen prompt, which you can integrate onto a bootable media. Then, during the setup, the system can automatically read the answers to install Windows 11. In this how-to guide, I'll explain the steps to create an answer file to install Windows 11 on your computer. Create an answer file for an unattended install of Windows 11 Creating an answer file to do an unattended installation of Windows 11 isn't complicated. You have to install the DISMTools app, use the easy-to-use wizard to create the unattended file, and finally, integrate the ".xml" file into the Windows 11 bootable media. It's important to note that you can use different tools to complete this process, but I have found that using the DISMTools offers the simplest experience for creating this file. However, it's a third party, non-Microsoft tool. As such, use it at your own risk. Install DISMTools To install DISMTools on Windows 11, use these steps: Open Start. Search for Command Prompt, right-click the top result, and choose the Run as administrator option. Type the following command to install the tool (preview) and press Enter: winget install CodingWondersSoftware.DISMTools.Preview (Image credit: Mauro Huculak) Once you complete the steps, you can use the tool's wizard to create an answer file to do an unattended installation of Windows 11 without tedious steps. Create answer file To create an unattended file to install the operating system, use these steps: Open Start. Search for DISMTools and click the top result to open the app. Click the Next, Next, and Finish buttons to process the initial setup. Click on Tools and choose the "Unattended answer file creator" option. (Image credit: Mauro Huculak) Click the Yes button to download the .NET 9 Runtime (if applicable). (Image credit: Mauro Huculak) Click the Next button to start the wizard. Select the "Configure these settings now" option. Choose the system language, locale, keyboard layout, and location. (Image credit: Mauro Huculak) Click the Next button. Choose the "x64" option for processor architecture, since that's the only supported architecture for Windows 11. (Optional) Check the "Bypass System Requirements" option in the "Windows 11 settings" to create a file to install the operating system on unsupported hardware. (Optional) Check the "Bypass Network Connection" option in the "Windows 11 settings" to create a local account during the setup. Check the "Let Windows set a random computer name" option because if you're using the same file on different devices, you will avoid conflicts with the same computer name. (Image credit: Mauro Huculak) Click the Next button. Choose the "Set a time zone manually" option. Select your current time zone. (Image credit: Mauro Huculak) Click the Next button. Clear the "I want to configure these settings during the installation" option to manually configure the EFI and Recovery Partition. Choose the "Configure settings for disk 0" option and use the default configuration. (Image credit: Mauro Huculak) Quick note: The default configuration will create a 300MB EFI partition using GPT and a 1GB Recovery Partition. Click the Next button. Choose the "Use a generic product key option to skip this" option. Select the product key for the edition of Windows 11. (Image credit: Mauro Huculak) Quick note: If you're installing the operating system on a device that previously had Windows 10 or 11, the installation will reactivate automatically. Otherwise, you will have to activate the system after the installation. Click the Next button. Clear the "I want to configure these settings during installation" option. Confirm the local account name and password. (Image credit: Mauro Huculak) Quick tip: You can always check the "Ask for a Microsoft account interactively" option to configure a Microsoft account during setup. However, to make the experience totally automated, it's best to create a local account and then link it to a Microsoft account after the installation. Choose the Administrators option from the "Account group" setting. Click the Next button. Select the "Passwords should never expire" option. (Image credit: Mauro Huculak) Click the Next button. Check the Disable policy option. (Image credit: Mauro Huculak) Click the Next button. Select the "No, I plan on using the target installation on a real system" option. (Image credit: Mauro Huculak) Quick note: If you choose the Yes option, you can select the option to support VMware, VirtualBox, etc. Click the Next button. Clear the "I want to configure the settings installation" option. (Option 1) Select the "Configure settings for wireless network now" option. Confirm the wireless network settings, including SSID and password. (Option 2) Select the "Skip configuration" option if the device will connect using the Ethernet connection. (Image credit: Mauro Huculak) Click the Next button. Clear the "I want to configure the settings installation" option. Select the Disable telemetry option. (Image credit: Mauro Huculak) Click the Next button. Click the Next button again to skip the script configuration. Click the Next button one more time to skip the configuration of additional components. Click the Next button one last time. Save the unattended file on your computer as autounattend.xml. Click the Close button. After you complete the steps, you will end up with an answer that you have to integrate into the Windows 11 installation media to perform an unattended setup. Integrate file to Windows 11 To integrate the answer to Windows 11 installation media, use these steps: Open the Windows 11 download page. Click the "Download now" button to save the file on the device under the "Create Windows 11 Installation Media" section. (Image credit: Mauro Huculak) Double-click the MediaCreationTool.exe file to launch the tool. Click the Accept button to agree to the terms. (Optional) Clear the "Use the recommended options for this PC" option. (Image credit: Mauro Huculak) Select the correct language and edition of Windows 11. Click the Next button. Select the "USB flash drive" option. (Image credit: Mauro Huculak) Click the Next button. Select the removable storage from the list. (Image credit: Mauro Huculak) Quick tip: If the device is not on the list, click the "Refresh drive list" option to make it available. Click the Next button. Click the Finish button. Open File Explorer. Open the autounattend.xml file location. Right-click the file and select the Copy option. (Image credit: Mauro Huculak) Open the Windows 11 USB location from File Explorer. Right-click the Paste to copy the autounattend.xml to the installation media. (Image credit: Mauro Huculak) Once you complete the steps, you can now use the USB bootable media to perform an unattended installation of the operating system. It's important to note that you may come across two names for the XML file, including "autounattend.xml" and "unattend.xml." The "autounattend.xml" file is usually the name of the answer file that you would integrate inside the Windows 11 USB flash drive within the root directory. On the other hand, the "unattend.xml" file is used to automate deployments. Also, it's usually placed inside the "C:\Windows\Panther\Unattend" folder. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  15. Here are 10 interesting facts about the history of Windows from version 1.0 to 11. As Microsoft celebrates its 50th anniversary, let's take a trip down memory lane. Windows has evolved dramatically over the decades, but some intriguing facts remain unknown to many. Here are some insights into its history that might surprise you. 1. Windows' original name was Interface Manager Before it became known as "Windows," Microsoft's graphical user interface was initially called "Interface Manager." (Source and 2) Microsoft Interface Manager doesn't roll off the tongue as well as Windows, does it? (Image credit: BetaWiki) It was announced under that name in 1983, but it was later changed to "Windows" before its release in 1985. The company made the decision to ditch the "Interface Manager" name for the "Windows" name because it better reflected the core functionality of the operating system, which was based on the concept of graphical "windows" on the screen, a key feature of the user interface at the time. At the end of the day, "Windows" was considered a more user-friendly and descriptive name for the software's core feature (the use of windows to organize and display information). 2. Windows 95 was the first version to require a product key Although MS-DOS (Microsoft Disk Operating System) had a serial number, Windows 1.0, 2.0, and 3.x didn't require a product key. Windows 95 introduced the product key, something that's just a regular part of Windows life now. (Image credit: Mauro Huculak) It wasn't until Windows 95 that Microsoft implemented the product key for activation. However, even Windows 98 had a basic product key system. Users were required to enter the product key during installation, but it wasn't strictly enforced. Often, you were able to use the same key on multiple computers. On Windows XP and higher releases, we started to see significant changes with "Product Activation." This system required users to not only enter the product key but also activate the operating system with Microsoft. The activation process involved generating a unique hardware-based ID that was linked to the product key. Here's an interesting fact: Did you know that 111–1111111 and 000–0000007 are valid product keys for Windows 95? I came across this information . 3. Windows once ran on top of MS-DOS Before Windows 95, the operating system wasn't a standalone system. If we look back, versions like Windows 1.0, 2.0, and 3.x were merely graphical interfaces running on top of MS-DOS. In the early days, when you turned on a computer, MS-DOS would load first. Also, one had to manually launch the graphical interface by typing "win" in the command line console. These early versions relied heavily on MS-DOS for file access, memory management, and hardware communication, and Windows only provided a visual layer for interacting with the computer. Windows 95 was the first version where Windows became a standalone operating system, although it still had some underlying dependencies on MS-DOS. It incorporated MS-DOS 7.0 but ultimately superseded the MS-DOS platform. However, the complete separation from MS-DOS truly happened with the Windows NT operating system line (including Windows NT 3.1, Windows 2000, Windows XP, and later versions). These were built on a completely different kernel and were designed to be independent of MS-DOS from the ground up. 4. The Briefcase folder: The original cloud sync feature No cloud, only Briefcase! (Image credit: Mauro Huculak) Before cloud storage, Briefcase was a built-in tool for . It was particularly handy for users working on both desktops and laptops. The Briefcase was a special folder to store copies of your files. If you wanted to synchronize the files, you would connect the two computers (either by network or by using a removable storage device) and then use this special folder to update the files. The Briefcase would compare the files on the two computers and then copy any changes from one computer to the other. However, because the Briefcase was designed for a time when removable media and offline work were more common, and with the rise of cloud storage solutions (like OneDrive and Google Drive), it became obsolete and was eventually removed. Briefcase lasted through XP and all the way up to Windows 7. (Image credit: Mauro Huculak) The Briefcase was originally introduced with the release of Windows 95, and it was a feature on XP, Vista, and 7, but it became deprecated on Windows 8. Although it was disabled by default, the feature was part of the original release of Windows 10. However, it was removed and completed with the launch of version 1703. 5. No true user profile before Windows XP Configuring users on Windows 95. (Image credit: Mauro Huculak) Before Windows XP, the operating system did not support true user profiles. Although Windows 95 introduced profiles as an optional feature, they only stored personalized settings like wallpaper and desktop preferences. Also, they didn't offer robust security or separate data storage for each user. Windows 98 was fundamentally designed as a single-user operating system. Fun fact. Windows 95 and 98 stored the "My Documents" folder in the root of "C." My Documents used to be housed in the root of your 😄 drive. (Image credit: Mauro Huculak) While it had a login prompt, it didn't provide the kind of security and separation of users that operating systems like Windows NT or later versions offered. Microsoft implemented full user accounts with separate settings and permissions with the release of Windows NT, which laid the groundwork for modern multi-user management, as seen inside the operating system today. Windows 3.x and earlier versions, including MS-DOS, didn't have user profiles. 6. Apps from Windows 1.0 are still present on Windows 11 Paint has had a glow up since the old days. (Image credit: Mauro Huculak) Some of the graphical apps introduced in Windows 1.0 still exist on Windows 11. Although they've been modernized, their core functions remain unchanged. Calculator – This is the default calculator, but over the years, it has become an advanced calculator with different modes to perform scientific, graphic, programming, and other calculations. Paint – Originally called "Paintbrush," it started as a monochrome editor and is now a full-color image editor with new AI-powered features. Notepad – A simple yet essential text editor that has remained a staple, but it's now also powered by AI. Clock – What began as a basic time display has evolved into an alarm, world clock, and focus tool. However, Windows 11 also includes the Clock app. Control Panel – Though many settings have migrated to the modern Settings app, the Control Panel is still there for advanced tweaks. 7. Format app has had the same code for over 30 years The format tool as it was on Windows XP. (Image credit: Mauro Huculak) The "Format" dialog that is still available on File Explorer was originally written by Dave Plummer, a now-retired Microsoft engineer, and he has revealed that the code behind this interface remained pretty much unchanged for nearly 30 years. According to Dave, the tool's interface was supposed to be a temporary solution as the development team was busy porting countless lines of code from Windows 95 to Windows NT. However, it appears that was one of the things that no one cared to revise later on, and after three decades, the code for the interface still remains unchanged. However, while the interface still remains the same, Microsoft is working on updating the FAT32 support to lift the 32GB limit and increase the compatibility up to 2TB. This long-overdue change modernizes the formatting process for larger storage devices. It still looks basically the same, though Microsoft is trying to update it underneath. (Image credit: Mauro Huculak) Also, if you're wondering why the FAT volumes were limited to 32GB, then you may have to blame Dave, too. According to him, he also had to decide the limit for the "cluster slack," and based on his decision, volumes using the FAT32 file system were limited to 32GB. 8. TrueType fonts were introduced on Windows 3.1 Before Windows 3.1, font rendering was clunky and inconsistent. The introduction of TrueType fonts in 1992 changed everything. This feature allowed for high-quality text rendering, making Windows a game-changer for desktop publishing and document creation. Today, TrueType is still widely used in Windows and other operating systems. Furthermore, Apple was the company that licensed TrueType to Microsoft for free to help ensure its widespread adoption. 9. Ctrl + Alt + Delete was a debugging tool created by IBM The "Ctrl + Alt + Del" shortcut was created by David Bradley, an IBM engineer, in the early 1980s. It was originally designed as a quick method to reboot IBM PCs immediately without warnings for debugging purposes during the development process. (He never expected to become widely known.) Microsoft then adopted the "Ctrl + Alt + Del" shortcut to trigger a secure attention sequence (SAS) on Windows NT. In the end, Bill Gates once admitted he wished it had been a single button instead, but it was too late to change it. This is how the shortcut changed over the years: Windows 3.x & 9x (1990s): Soft reboot command (could restart your computer immediately). Windows NT & XP (2000s): Opens Task Manager (or login screen in domains). Windows Vista, 7, 8, and 10: Opens the security screen with Lock, Log off, Change a password, and Start Task Manager options. Windows 11: Opens the security screen with Lock, Switch user, Sign out, and Task Manager options. The shortcut has been part of the operating system history for decades, evolving from a developer tool into a core system function. Although the software giant has introduced new ways to access Task Manager and security options, this shortcut remains a legacy feature that continues to define the Windows user experience. 10. Windows 1.0 required a minimum of 256KB of RAM You used to be able to run a whole operating system on this type of memory. Incredible. (Image credit: Mauro Huculak) Windows 1.0, released on November 20, 1985, the system required a minimum of 256KB of RAM for versions 1.01 and 1.02. However, on versions 1.03 and 1.04, the requirement was increased to 320KB. For context, 1GB is equivalent to 1,048,576KB, and nowadays, the minimum memory size for Windows 11 is 4GB, which means 4,194,304KB. However, 16GB (or 16,777,216KB) is usually the recommended size. In addition, the minimum storage space required was 720KB, and a hard drive was recommended but not required. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  16. Following the release of the latest performance-focused update for its browser, Vivaldi Technologies is dropping another update, which is quite a big one. Thanks to a new partnership with Proton, Vivaldi now has a built-in VPN from a well-known, privacy-focused provider, which does not require additional downloads, installations, or updates. Vivaldi is not the first browser to offer a built-in VPN for its users (Microsoft Edge used to have one, and Opera has a built-in VPN). However, Vivaldi places a big focus on privacy and security, hence the choice of Proton with its privacy protections, advanced features, and over 11,500 servers across 117 countries. Here is what Vivaldi says in the announcement about its partnership with Proton: By integrating Proton VPN into its browser, Vivaldi offers private, no-logs connections with a convenient user experience that does not require installing additional extensions or applications. Just click the VPN button in the upper-right corner of the screen, sign in with your Vivaldi account, and hit "Connect." You can also select the target country or server. Proton VPN is available for free for all users with Vivaldi accounts. While there are no bandwidth limits, certain features are only available with a paid version (Proton VPN itself has a free tier). Also, for now, Proton VPN for Vivaldi is only available on desktop computers. You can download Vivaldi from the official website. More information about Vivaldi's partnership with Proton is available here. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  17. Karlston

    The Best Password Managers to Secure Your Digital Life

    Keep your logins locked down with our favorite password management apps for PC, Mac, Android, iPhone, and web browsers. Password managers are the vegetables of the internet. We know they’re good for us, but most of us are happier snacking on the password equivalent of junk food. For nearly a decade, that’s been “123456” and “password”—the two most commonly used passwords on the web. The problem is, most of us don’t know what makes a good password and aren’t able to remember hundreds of them anyway. The safest (if craziest) way to store your passwords is to memorize them all. (Make sure they are long, strong, and secure!) Just kidding. That might work for Memory Grand Master Ed Cooke, but most of us are not capable of such fantastic feats. We need to offload that work to password managers, which offer secure vaults that can stand in for our memory. The best password manager offers convenience and, more importantly, helps you create better passwords, which makes your online existence less vulnerable to password-based attacks. Read our guide to VPN providers for more ideas on how you can upgrade your security, as well as our guide to backing up your data to make sure you don’t lose anything if the unexpected happens. Updated March 2025: We've updated our review of Dashlane based on recent testing, added NordPass back, and have more details on the status of passkey support. Why Not Use Your Browser? Most web browsers offer at least a rudimentary password manager. (This is where your passwords are stored when Google Chrome or Mozilla Firefox ask if you’d like to save a password.) This is better than reusing the same password everywhere, but browser-based password managers are limited. In recent years, Google has improved the password manager built into Chrome, and it's better than the rest, but it's still not as full-featured or widely supported as a dedicated password manager like those below. WIRED readers have also asked about Apple’s password manager, which syncs through iCloud and has some nice integrations with the Safari web browser. There’s nothing wrong with Apple’s system. It doesn’t have some of the nice extras you get with dedicated services, but it handles securing your passwords and syncing them between Apple devices. The main problem is that if you have any non-Apple devices, you won’t be able to sync your passwords to them. All in on Apple? Then this is a viable, free, built-in option worth considering. What Are Passkeys? A concerted effort to get rid of passwords began roughly two days after the password was invented. Passwords are a pain—you’ll get no argument here—but we don’t see them going away in the foreseeable future. The latest effort to eliminate the password comes from the FIDO Alliance, an industry group aimed at standardizing authentication methods online. Does this sound a little bit like the infamous xkcd 927? Yes, yes it does. But thanks to the monopolistic nature of devices, it might work this time. Apple supports the FIDO specs and coined the term passkeys, which has caught on. Passkeys are generated cryptographic keys managed by your device (usually your phone). They’re easy to create—you don’t need to do anything, your device handles the details. Your passkeys are stored on your device and protected by either biometrics or PINs. Since passkeys are generated key pairs instead of passwords, there's nothing to remember. If you are familiar with GPG keys, they're somewhat similar in that there's a public and private key; the website you want to log in to has a public key and sends it to your device. Your device compares that to the private key it has and you're signed in (or not if the keys don't match). While passkeys aren't a radical departure, they're still an improvement by virtue of being a preinstalled tool for people who aren't going to read this article and immediately sign up to use one of the services below. If millions of people suddenly stop using 12345678 as a password, that's a win for security. Almost all of the apps we've suggested here can store passkeys, which means you can store your passkeys right alongside your passwords. Our two favorites, Bitwarden and 1Password, can generate, save, store, and sync passkeys. You can even log in to Bitwarden using a passkey, which pretty much eliminates the need for a password at all. Once you have a passkey stored, it will automatically sync to all your devices the same way Bitwarden and 1Password sync your passwords. When you return to that site, your password manager will log you in using the passkey you generated. Think of passkeys as credit cards next to the cash (passwords) in your wallet. It's possible that one day passkeys will work everywhere and there will be no passwords, no password managers. In the mean time we think it's better to stick with a password manager, even if all you're doing with that manager is storing passkeys. Password Manager Perks (and Tips) A good password manager stores, generates, and updates passwords for you with the press of a button. If you’re willing to spend a few dollars a month, a password manager can sync your passwords across all of your devices. Here’s how they work. Only one password to remember: To access all of your passwords, you only have to remember one password. When you type that into the password manager, it unlocks the vault containing all of your actual passwords. Only needing to remember one password is great, but it means there’s a lot riding on that password. Make sure it’s a good one. If you’re having trouble coming up with that one password to rule them all, check out our guide to better password security. You might also consider using the Diceware method for generating a strong master password. Apps and extensions: Most password managers are full systems, rather than a single piece of software. They consist of apps or browser extensions for each of your devices (Windows, Mac, Android phones, iPhone, and tablets), which have tools to help you create secure passwords, safely store them, and evaluate the security of your existing passwords. All that information is then sent to a central server where your passwords are encrypted, stored, and shared between devices. Fixing compromised passwords: While password managers can help you create more secure passwords and keep them safe from prying eyes, they can’t protect your password if the website itself is breached. That doesn’t mean they don’t help in this scenario though. All the cloud-based password managers we discuss offer tools to alert you to potentially compromised passwords. Password managers also make it easier to quickly change a compromised password and search through your credentials to ensure you didn’t reuse any compromised passwords. You should disable auto form-filling: Some password managers will automatically fill in and even submit web forms for you. This is super convenient, but for additional security, we suggest you disable this feature. Automatically filling forms in the browser has made password managers vulnerable to attacks in the past. For this reason, some, like 1Password, require you to opt into this feature. We suggest you do not. Don’t panic about hacks: Software has bugs, even your password manager. The question is not what to do if it becomes known that your password manager has a flaw, but what you do when it becomes known that your password manager has a flaw. The answer is, first, don’t panic. Normally bugs are found, reported, and fixed before they’re exploited in the wild. Even if someone does manage to gain access to your password manager’s servers, you should still be fine. All of the services we list store only encrypted data, and none of them store your encryption key, meaning all an attacker gets from compromising their servers is encrypted data. Best for Most People Bitwarden Photograph: Bitwarden Bitwarden (9/10, WIRED Recommends) is secure, open source, and free with no limits. The applications are polished and user-friendly, making the service the best choice for most users. Did I mention it’s open source? That means the code that powers Bitwarden is freely available for anyone to inspect, seek out flaws, and fix. In theory, the more eyes on the code, the more airtight it becomes. Bitwarden was also audited for 2023 by a third party to ensure it’s secure. You can install it on a local server for easy self-hosting if you prefer to run your own cloud. There are apps for Android, iOS, Windows, macOS, and Linux, as well as extensions for all major web browsers. Bitwarden also supports Windows Hello and Touch ID on its desktop apps for Windows and macOS, giving users the added security of those biometric authentication systems. The web interface (which I frequently use) recently underwent a redesign, which makes it much cleaner and easier to use. Bitwarden supports passwordless authentication, meaning you can log in with a one-time code, biometric authentication, or a security key. Bitwarden also has excellent support for passkeys, including the ability to log into Bitwarden with a passkey, which means you don't need to use your username or password even to open your vault. There’s also some extras, like a feature to securely share files (called Bitwarden Send), an authenticator app (paid only), and an extremely active and helpful community. I like Bitwarden’s semi-automated password fill-in tool. If you visit a site you’ve saved credentials for, Bitwarden’s browser icon shows the number of saved credentials from that site. Click the icon, and it will ask which account you want to use and then automatically fill in the login form. This makes it easy to switch between usernames and avoid the pitfalls of autofill. If you simply must have your fully automated form-filling feature, Bitwarden supports that as well. Bitwarden offers paid upgrade accounts. The cheapest of the bunch, Bitwarden Premium, is $10 per year. That gets you 1 GB of encrypted file storage and two-factor authentication with devices like YubiKey, FIDO U2F, and Duo, plus a password hygiene and vault health report. You also get priority customer support with a paid account. After signing up, download the app for Windows, macOS, Android, iOS, or Linux. There are also browser extensions for Firefox, Chrome, Safari, Edge, Vivaldi, and Brave. Best Upgrade 1Password Courtesy of 1Password What sets 1Password apart from the other options in this list is the number of extras it offers. Like other password managers, 1Password has apps for every major platform, including macOS, iOS, Android, Windows, Linux, and ChromeOS. There’s even a command-line tool that will work anywhere. There are plug-ins for your favorite web browser, which makes it easy to generate and edit new passwords on the fly. I still find BitWarden to be a more economical choice for most people, but 1Password has some very nice features you won't find elsewhere. If you frequently travel across national borders, you’ll appreciate my favorite perk: Travel Mode. This mode lets you delete any sensitive data from your devices before you travel and then restore it with a click after you’ve crossed a border. This prevents anyone, including law enforcement at international borders, from accessing your complete password vault. It's worth noting that 1Password uses a combination of two keys to unlock your account: your password and an additional generated secret key. While that does add a layer of security that will protect against weak passwords, it also means part of what you need to unlock your passwords is something you did not create. 1Password does make sure you have this key as an item in your “emergency kit,” but I still prefer pairing a self-generated password with a Yubikey. In addition to being a password manager, 1Password can act as an authentication app like Google Authenticator. For added security, it creates a secret key to the encryption key it uses, meaning no one can decrypt your passwords without that key. The downside is that if you lose this key, no one, not even 1Password, can decrypt your passwords. (This can be mitigated by setting up a custom group with the “Recover Accounts” permission.) 1Password also offers tight integration with other mobile apps. Rather than copying and pasting passwords from your password manager to other apps (which puts your password on the clipboard, at least for a moment), 1Password is integrated with many apps and can autofill. This is more noticeable on iOS, where inter-app communication is more restricted. After signing up, download the app for Windows, macOS, Android, iOS, Chrome OS, or Linux. There are also browser extensions for Firefox, Chrome, Brave, and Edge. Best Full-Featured Manager Dashlane Courtesy of Dashlane Dashlane offers most of what you'll find in our other picks. The company doesn’t offer a desktop app, but I primarily use passwords in the web browser anyway, and Dashlane has add-ons for all the major browsers, along with iOS and Android apps. If a desktop app is important to you, that omission is something to be aware of, but in my testing, it isn't a big deal. Dashlane uses the same AES 256-bit encryption in a zero-knowledge system, which means passwords are only ever decrypted on your device. Dashlane uses multifactor authentication if you want, via an authenticator app or a hardware key like the Yubikey. Dashlane is considerably more expensive than Bitwarden or 1Password, but that extra money does get you some additional security features, like Site Breach Alerts, which let you know if any web services you use have leaked your data. Dashlane also actively monitors the darker corners of the web, looking for leaked or stolen personal data, and it alerts you if your information has been compromised. There's even a Phishing Alert system that will stop you from entering credentials on a site with a spoofed URL. This last feature is incredibly useful if you happen to be setting up less tech-savvy relatives or friends with a password manager. Dashlane's phishing protection can save them from themselves. Dashlane also offers a VPN through Hotspot Shield VPN. I have not tested the Dashlane integration, but in testing Hotspot Shield on its own, I've always found it too slow to recommend in my VPN guide. Setup and migration to Dashlane from another password manager is simple, and you’ll use a secret key to encrypt your passwords, much like BitWarden’s setup process. In practice, Dashlane is very similar to the others on this list. Dashlane offers a 30-day free trial, so you can test it out before committing. After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge. Best for Bundled Services NordPass Photograph: Nordpass You might know Nord better for its VPN service, but the company also offers a password manager, NordPass, and a pretty nice online storage system, NordLocker. A part of the appeal of NordPass comes in bundling it with the company's other services for some compelling deals. As a password manager, NordPass offers everything you need. It uses a zero-knowledge setup in which all data is encrypted on your device before it’s uploaded to the company’s servers. Unlike most services here, NordPass uses XChaCha20 for encryption. It would require a deep dive into cryptography to get into the differences, but the short story is that it's just as secure and maybe slightly faster. There’s also a personal information storage feature to keep your address, phone number, and other personal data safe and secure, but easy to access. NordPass also offers an emergency access feature, which allows you to grant another NordPass user emergency access to your vault. It works just like the same feature in 1Password, allowing trusted friends or family to access your account if you cannot. Other nice features include support for two-factor authentication to sign in to your account, as well as security tools to evaluate the strength of your passwords and alert you if any of your data is compromised. Note that NordPass Premium is theoretically $3 a month, but there are always sales that bring that much lower. The downside, and my one gripe about all Nord services, is that there is no monthly plan. As noted above, the best deal comes in combining NordPass, NordVPN, and NordLocker for a bundled deal. After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge. Best DIY Options (Self-Hosted) Want to retain more control over your data in the cloud? Sync your password vault yourself. The services below do not store any of your data on their servers. This means attackers have nothing to target. Instead of storing your passwords, these services use a local vault to store your data, and then you can sync that vault using a file-syncing service like Dropbox, NextCloud, or Edward Snowden’s recommended service, SpiderOak. There are two services to keep track of in this scenario, making it a little more complex. But if you’re already using a file-syncing file service, this can be a good option. Enpass Courtesy of Enpass Enpass does not store any data on its servers. Syncing is handled through third-party services. Enpass doesn’t do the syncing, but it does offer apps on every platform. That means once you have syncing set up, it works just like any other service. And you don’t have to worry about Enpass being hacked, because your data isn’t on its servers. Enpass supports syncing through Dropbox, Google Drive, OneDrive, iCloud, Box, Nextcloud, or any service using WebDAV. Alas, SpiderOak is not currently supported. You can also synchronize your data over a local WLAN or Wi-Fi network. All of the features you expect in a password manager are here, including auto-generating passwords, breach-monitoring, biometric login (for devices that support it), auto-filling passwords, and options to store other types of data, like credit cards and identification data. There’s also a password audit feature to highlight any weak or duplicate passwords in your vault. One extra I particularly like is the ability to tag passwords for easier searching. Enpass also makes setting up the syncing through the service of your choice very easy. Enpass recently added support for passkeys. Enpass is free to use on Windows, Mac, and Linux. The mobile version syncs up to 25 items in one vault for free. For more than that, you’ll want to sign up for the paid service. After signing up, download the app for Mac, Windows, Linux, Android, and iOS, and grab the browser extensions for Chrome, Vivaldi, Edge, and Firefox. KeePassXC Courtesy of KeePassXC KeePassXC works like Enpass above. It stores your passwords in an encrypted digital vault that keeps you secure with a master password, a key file, or both. You sync that database file yourself using a file-syncing service. Once your file is in the cloud, you can access it on any device that has a KeePassXC client. Like Bitwarden, KeePassXC is open source, which means its code can be and has been inspected for critical flaws. If you’re an advanced user and comfortable handling your own issues and support, KeePassXC makes a great choice. The downside of KeePassXC is that it doesn’t have official mobile clients. However, third-party apps are available for iOS and Android. Download the desktop app for Windows, macOS, or Linux and create your vault. There are also extensions for Firefox, Edge, and Chrome. The project does not offer apps for phones. Instead, it recommends KeePass2Android or Strongbox for iPhone. Other Good Password Managers Courtesy of Keeper Password managers are not a one-size-fits-all solution. Our top picks cover most use cases and are the best choices for most people, but your needs may be different. Fortunately, there are plenty of good password managers out there. Here are some more we’ve tested and like. Keeper offers a variety of security-related tools, including a password manager. Keeper works much like 1Password and others, storing only your encrypted data, and it offers two-factor authentication for logging in to your account. Like Dashlane, Keeper has a lot of extras, including dark-web monitoring, meaning it will check publicly posted data to make sure yours isn’t available. RoboForm has most of the same features as the rest on this list, but it lacks some of the things that differentiate our top picks, like Bitwarden’s open source aspect and 1Password’s travel features. I’ve been testing the free plan for a while and haven’t run into any problems. There are apps for every common platform, and it’s easy to use. RoboForm recently completed an independent security audit and came out looking good. Pass is a command-line wrapper around GPG (GNU Privacy Guard), which means it is only for the nerdiest users. It supports managing encrypted .gpg files in Git, and third-party mobile apps are available. It’s not for everyone. For years, this was my password manager of choice, but eventually, Bitwarden's ease of use won me over. LastPass has had more bad security breaches than any other service on this page, which led us to remove it from our top picks. Since then, the company has changed hands and appears to be better security-wise, which is good because many people still use it. That said, there is nothing about LastPass that makes it a more compelling choice than Bitwarden, 1Password, or the others mentioned in this guide. How We Test The best and most secure cryptographic algorithms are all available via open source programming libraries. On the one hand, this is great, as any app can incorporate these ciphers and keep your data safe. Unfortunately, any encryption is only as strong as its weakest link, and cryptography alone won’t keep your passwords safe. This is what I test for: What are the weakest links? Is your master password sent to the server? Every password manager says it isn’t, but if you watch network traffic while you enter a password, sometimes you find, well, it is. I also dig into how mobile apps work: Do they, for example, leave your password store unlocked but require a PIN to get back in? That’s convenient, but it sacrifices too much security. No password manager is perfect, but the ones above represent the best I’ve tested. They’re as secure as they can be while remaining easy to use. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  18. See the evolution of the Start menu from Windows 95 through 11. In celebration of Microsoft's 50th anniversary in 2025, it's an appropriate moment to look at the evolution of one of its most iconic features. Of course, I'm referring to the Start menu for Windows. The menu was originally introduced in 1995, and it has undergone significant transformations, adapting to user needs and advances in technology. The company has worked on many different menus over the decades. However, the Start menu available on Windows 10 is arguably (by far) the best approach as it combines modern ideas with a hint of classic elements and the best selection of customization options. Thirty years is a long time for any feature to be around, so let's look at how the Start menu has evolved over the years. Windows 95: The birth of the Start menu On August 24, 1995, Microsoft introduced the Start menu as a central hub for accessing programs, documents, and system settings with the launch of Windows 95. This innovation replaced the "Program Manager," offering a more intuitive and organized user experience. In contrast, the "Program Manager" was technically something we can refer to today as a folder containing a list of items with sub-containers to access the different programs with no real organization. Windows 3.1 Program Manager. (Image credit: Mauro Huculak) An interesting fact is that the Taskbar (and Start button) also arrived alongside the Start menu with the release of Windows 95. The menu was simple, with a pop-up in a cascading format, providing access to programs, documents, and system settings. Also, it had a left-hand sidebar that contained the "Windows 95" text. Windows 95 Start menu. (Image credit: Mauro Huculak) The "Programs" folder provided a hierarchical list of installed applications, making it easy to launch programs. The "Documents" folder displayed a list of recently opened files, allowing for quick access to frequently used documents. The "Settings" folder provided access to the Control Panel, which allows users to configure their system. This menu also provided quick access to the Printers and Taskbar settings. The Taskbar settings also included a few customization options for the Start menu, but the settings were limited. The "Find" option enabled users to search for files and folders on their computer. However, the search didn't occur in the Start menu. Instead, the option would open the "Find" app on Windows 95. The "Run" command allowed users to directly execute programs or open files by typing their names (just like we do today). The "Shutdown" option provided a convenient way to turn off the computer. Windows 98: Refinement and expansion Although the Start menu for Windows 98 didn't look significantly different from the original design, the menu incorporated a new "Log off" option for the new multi-user functionality. Windows 98 Start menu. (Image credit: Mauro Huculak) In addition, Microsoft added an option to access the "Windows Update" service through Internet Explorer to scan and download the available system updates. Furthermore, the Start menu added a "Favorites" submenu to complement Internet Explorer's presence in the operating system. Windows Me: Minor adjustments Microsoft launched the Windows Millennium Edition (ME) in 2000, but the design of the Start menu didn't receive any significant changes. Windows Me Start menu. (Image credit: Mauro Huculak) The menu was identical to the version in Windows 98; the only difference was the branding on the side that indicated the name of the operating system. This was the last time we had seen this version of this menu. It's important to note that the classic version of the menu was an option until Windows Vista. Windows XP: A new era Windows XP was launched in 2001, and it unveiled a redesigned Start menu with a two-column layout. The left column featured pinned and recently used apps, while the right provided access to user-specific folders ("My Documents," "My Pictures," "My Computer," and "Control Panel") and system functionalities. This design aimed to streamline navigation and enhance productivity. Windows XP Start menu. (Image credit: Mauro Huculak) A prominent user account picture was displayed at the top of the left column, adding a touch of personalization. The left column dynamically displayed frequently used programs, making it easier to access commonly used apps. However, users could also pin apps to this section for quick access. The "All Programs" menu, accessible from the left column, provided a hierarchical list of all installed apps. The shutdown option was conveniently located at the bottom of the right column, making it easy to turn off or restart the computer. On Windows XP, Microsoft introduced the "Luna" visual style, which gave the Start menu a more modern and polished look with rounded corners and vibrant colors. Windows XP classic Start menu design. (Image credit: Mauro Huculak) However, the operating system also allowed users to revert to the "classic" Start menu style for those who wanted a more traditional experience. Windows Vista: Enhanced search and organization In 2007, Microsoft launched Windows Vista, a version of the operating system that also included a new Start menu version with search integration, allowing users to locate files and programs quickly without having to jump to another experience. Windows Vista Start menu. (Image credit: Mauro Huculak) However, the interface and elements of the new menu were pretty much identical to the design of Windows XP. The menu featured a two-column layout. The left column featured pinned and recently used apps, while the right provided access to user-specific folders and system settings. In this release, the user account menu was located at the top-right corner, and elements like "My Documents" and "My Computer" dropped the "My" suffixed. So, the items became "Documents," "Computer," etc. Windows 7: Just tweaks In 2009, Windows 7 was released with an updated version of the Start menu that was identical to the one available in Vista. However, it added "Jump Lists," offering quick access to recent documents and tasks directly from the Start menu. Windows 7 Start menu. (Image credit: Mauro Huculak) Also, the power options removed the "Lock" item and added it to the "Shut down" menu. Furthermore, on Windows 7, you were able to change the power button action, something that wasn't available on Vista. Finally, in this version of the operating system, Microsoft also removed the ability to switch to the classic Start menu. Windows 8 and 8.1: A bold departure Things changed drastically in 2012 when the company released Windows 8. This version ditched the Start menu for a Start screen that covered the entire desktop and removed the Start button. Windows 8.1 Start screen. (Image credit: Mauro Huculak) This shift aimed to create a unified experience across touch and mouse-keyboard devices but received mixed feedback. This is one of the biggest mistakes Microsoft made for the operating system. This full-screen approach was a core element of Microsoft's vision for a touch-centric operating system. The Start screen was dominated by "Live Tiles," which represented applications and websites. These tiles could display dynamic, real-time information like weather updates, news headlines, and social media feeds. Also, tiles came in various sizes, allowing users to customize the layout and prioritize information. In addition, the Start screen introduced the "Metro" (later "Modern") design language, which is characterized by clean (flat interfaces), bold typography, and a focus on content rather than visual chrome. One of the many problems was that the Start screen was heavily optimized for touch input, with large, easily tappable tiles. This design philosophy aimed to provide a consistent and intuitive experience across touch-enabled devices. However, this change was a significant source of user frustration, particularly for those using desktop computers with a mouse and keyboard. Since this version of the operating system didn't include a Start button either, Microsoft added the Charms bar, a sidebar that appeared with a swipe from the right side of the screen or by moving the mouse to the upper or lower right-hand corners of the screen. This bar contained common functions like search, settings, and share. Windows 8.1 Charms bar. (Image credit: Mauro Huculak) In a way, the Windows 8 Start screen represented a radical shift in the user interface, prioritizing touch interaction and live information. While it aimed to modernize the experience, it faced significant criticism for its departure from familiar desktop elements. Then, in 2013, Windows 8.1 was launched; this time around, the company didn't bring back the Start menu. However, the Start button was reintroduced, linking users back to the Start Screen. Windows 10: Merging legacy and modern design Windows 10, launched in 2015, brought back the Start menu, combining the classic menu with modern Live Tiles in a customizable two-pane design, similar to the menus for Windows 7 and Vista. This hybrid approach was aimed at desktop and touch users, balancing familiarity with innovation with a traditional left-hand column and a tile-based right-hand section. Windows 10 Start menu. (Image credit: Mauro Huculak) The left column featured an alphabetical list of all installed apps, making it easy to find programs. The left rail included access to the profile settings and quick access to folders (such as Documents, Pictures, File Explorer, and Settings). In this section, you can also find the power options (Shutdown, Restart, Sleep). The right column displayed Live Tiles, allowing users to pin frequently used apps and receive dynamic updates. Using the context menu in the Start menu, it was possible to resize, rearrange, and group Live Tiles. You were also able to turn tiles on or off, giving you control over the information displayed. Windows 10 addressed the widespread criticism of Windows 8 by bringing back the familiar Start menu, and the hybrid design provided a balance between traditional navigation and modern tile-based access. Windows 10 full-screen Start menu. (Image credit: Mauro Huculak) Furthermore, this version offered (perhaps) the most control over the appearance and functionality of the Start menu I've ever seen on Windows. You even had an option to show a full-screen version of the Start menu. It's important to note that on Windows 10, Microsoft began to decouple search from the Start menu. Although you can start a search from the menu, in this version of the operating system, Windows Search has its own entry in the Taskbar and home interface. This also continues to be true on Windows 11. Windows 10 search results. (Image credit: Mauro Huculak) On Windows 7 and Vista, the search occurred within the Start menu experience. Windows Vista search. (Image credit: Mauro Huculak) Windows 11: A centered and simplified design In 2021, Microsoft launched Windows 11, which also introduced a centered Taskbar and a revamped Start menu that brought a significant visual overhaul to the menu, and it's safe to say they've generated a range of reactions. One of the most noticeable changes was the centered Start button and Taskbar items, giving Windows 11 a more modern and streamlined look. Windows 11 Start menu. (Image credit: Mauro Huculak) Some have argued about this placement, as it deviates from the traditional left-aligned Start button. As a result, changing the alignment to the left is one of the first configurations that users usually apply to a new setup. Start menu left alignment. (Image credit: Mauro Huculak) The Start menu itself features a simplified layout, with pinned apps at the top and a "Recommended" section below, displaying recently opened files and applications. Also, Live Tiles have been replaced with more traditional static icons, and this menu emphasizes rounded corners and a cleaner, more minimalist aesthetic. You can also pin as many apps as you want by creating scrollable pages in the menu, and you can even organize apps in groups. However, many users who were accustomed to the Windows 10 Start menu have expressed frustration with the lack of customization. A common criticism is the limited customization options compared to previous versions. For example, you can't resize the menu, remove the "Recommended" section, and it's no longer possible to show Live Tiles. Another aspect of the Start menu is that Microsoft has been using it to push even more advertisements. Although the company has been known to promote apps from partners, you only used to notice this in new installations. However, on Windows 11, the "Recommended" section is also used to promote apps from the Microsoft Store dynamically. Also, in the user menu, the company uses this area to promote its cloud services by luring users into backing up their files to OneDrive and Microsoft 365 subscriptions. Start menu with account manager. (Image credit: Mauro Huculak) One thing you will notice about this menu is that it has a horizontal design, while the previous menus had a vertical design. Although the Start menu for Windows 11 lacks customization options, you will continue to find familiar elements, such as the box to access Windows Search, the profile menu, power options, the ability to show folders, and the "All" menu to access all your installed apps. Over the past three decades, Microsoft's Start Menu has continually been trying to adapt, reflecting the company's commitment to evolving with user needs and advances in technology. However, the company did not always get it right. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  19. Kali Linux has released version 2025.1a, the first version of 2025, with one new tool, desktop changes, and a theme refresh. Kali Linux is a distribution created for cybersecurity professionals and ethical hackers to red team exercises, penetration testing, security audits, and research against networks. As is typical for the year's first version, the Kali Team has released new visual elements, including wallpapers and desktop environments. Note that the strange version number is because the developers stated they found a last-minute bug in 2025.1, which required a fix and rebuild. This led to the release of 2025.1a as the first release of 2025. New tool added to Kali Linux 2025.1 As with every release, Kali Linux comes with a new tool toy to play with. Unfortunately, the team said this release is mostly focused on updates, so only one tool was included this time: hoaxshell - Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell In addition to Hoaxshell, Kali says they upgraded the Kernel version to 6.12. Annual theme refresh With the year's first version, the Kali Team introduces a theme update consisting of new wallpapers and changes to the boot and login experience. "Just like our previous releases, the first one of the year, 20XX.1, has our annual theme refresh, a tradition that keeps our interface as modern as our tools," reads the Kali 2025.1a announcement. "This year, we are excited to unveil our latest theme, thoughtfully designed to enhance the user experience from the moment you start up." "Expect notable updates to the boot menu, login screen, and a stunning selection of desktop wallpapers for both Kali and Kali Purple editions." New Kali desktop wallpaper in version 2025.1 Source: Kali This Kali version also comes with five new wallpapers and three additional backgrounds in the Community Wallpapers package. New desktop changes This release also comes with desktop changes, including Plasma 6.2 and Xfce 4.20. "On our end, we have updated all themes to align with the new environment, featuring refreshed window and desktop visuals. And our favorite new addition from KDE? Floating panels!," explains the Kali Team. Floating panels in KDE Source: Kali The release also includes new keyboard shortcuts to help you navigate the desktop more efficiently. How to get Kali Linux 2025.1 To start using Kali Linux 2025.1, you can upgrade your existing installation, select a platform, or directly download ISO images for new installs and live distributions. For those updating from a previous version, you can use the following commands to upgrade to the latest version. echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list sudo apt update && sudo apt -y full-upgrade cp -vrbi /etc/skel/. ~/ [ -f /var/run/reboot-required ] && sudo reboot -f If you are running Kali on the Windows Subsystem for Linux, upgrade to WSL2 for a better experience, which includes the ability to use graphical apps. You can check the WSL version used by Kali with the 'wsl -l -v' command in a Windows command prompt. Once done upgrading, you can check if the upgrade was successful by using the following command: grep VERSION /etc/os-release You can view the complete changelog for Kali 2025.1 on Kali's website. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  20. Nvidia has a new graphics driver for download, and it's packed full of support for upcoming games, DLSS 4 in more games, ongoing bug fixes for the RTX 50 series graphics cards, and more. The upcoming The Sims rival inZOI is receiving day-one support with the driver. Interestingly, players will find an experimental 'Nvidia ACE autonomous game characters' setting in-game, letting its NPCs turn "smart" using "higher levels of artificial intelligence." Meanwhile, Nvidia DLSS 4 Multi Frame Generation support has been added to Assassin’s Creed Shadows, Half-Life 2 RTX Demo, The Last of Us Part II Remastered, and Warhammer 40,000: Darktide. Moreover, GeForce RTX 5090, 5080, and 5070 Ti notebooks also have official driver support in this version. RTX 50 series users facing issues with black screens and resetting overclock issues will also want to try and upgrade to this driver. Here are all the fixed issues in version 572.83: Open issues Nvidia is still working on are the following: The Nvidia 572.83 driver is now available for download in the Nvidia app and GeForce Experience. Standalone links can be found here, and here are the official release notes (PDF). Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  21. This past week, Microsoft released the Patch Tuesday updates for the month of March, 2025. On Windows 10, they were delivered via KB5053606 / KB5053596 / KB5053594 / KB5053618 and on Windows 11 via KB5053598/ KB5053602. The updates had a few known issues that Microsoft was already tracking. However, Neowin noticed today that the company has, since then, added a new bug involving Copilot. Microsoft says that the Copilot app would automatically uninstall itself and un-pin from the taskbar before doing so. Those who do not like Copilot or do not care about it would probably not mind the bug too much. The tech giant has added that the recently unveiled Microsoft 365 Copilot app is not affected by this. It has also offered a workaround for people affected by this issue and that involves manually downloading the app from the Store and pinning it to the Taskbar. Microsoft writes: Thus both Windows 10 and Windows 11 users have been hit with this Copilot bug with the latest Patch Tuesday. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  22. Popular Windows configuration utility NTLite received a couple of updates this week and they bring several changes and improvements. Support for Windows UEFI CA 2023 certificates has been added following Microsoft's recent PowerShell script update. Another security-related change has been made with the inclusion of Microsoft Pluton support. If you wondering where you heard that recently, it may have been with AMD's latest chipset driver update. The new NTLite update also improves Windows 11 24H2 updates compatibility and brings back unattended Windows product key activation option though the developer has cautioned against using generic keys. Besides those there are several other changes. The full changelogs are given below: You can download the latest NTLite version, 2025.03.10349, from Neowin's software stories page or from its official website. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  23. The DISMTools app lets you interact with DISM through a GUI instead of using commands, and here's how to get started. On Windows 11 (and 10), DISMTools is a free, non-Microsoft open-source graphical user interface (GUI) designed to enhance and simplify the use of Microsoft's Deployment Imaging Service and Management Tool (DISM). The DISM tool is primarily available as a command-line utility for servicing and preparing Windows images, but its complexity can be a barrier for many users. DISMTools tries to overcome this complexity friction by providing an accessible front-end that streamlines the management of Windows Imaging (WIM) files and related tasks. In addition, the developer aims to provide an alternative to other solutions that may lack functionality or reserve certain features for paid customers. DISMTools key features DISMTools introduces a project-based approach, allowing you to manage mounted images, create unattended answer files, convert images, and more, which improves organization and workflow when working with the DISM command-line tool. You can also work with the image locally available on your computer (online) or another location (offline), giving you an easy way to manage any installation of the operating system. This tool also uses the DISM API and DISM executable to improve performance while scanning an image, and this approach allows you to use any version of a Windows image from 7 through 10 and 11. In addition, the tool shines in the more intuitive interface and rich information when serving an image compared to using the command-line option. You can easily get image information and add and remove app packages, features, drivers, and more. It's even possible to generate and print image information for future reference. Furthermore, you can perform operations like image conversion from ".esd" to ".wim," you can create a custom Windows 11 ISO file, and it even offers a wizard to create unattended answer files, which you can use to install the operating system hands-free. How to install DISMTools To install DISMTools on Windows 11, use these steps: Open Start. Search for Command Prompt, right-click the top result, and choose the Run as administrator option. (Option 1) Type the following command to install the tool (preview) and press Enter: winget install CodingWondersSoftware.DISMTools.Preview (Image credit: Mauro Huculak) (Option 2) Type the following command to install the tool (stable) and press Enter: winget install CodingWondersSoftware.DISMTools.Stable Once you complete the steps, the tool will be available like any other app from the Start menu. How to get started with DISMTools The DISMTools allows you to perform many different operations, but these are the basics: Open Start. Search for DISMTools and click the top result to open the utility. Click the Next button. Choose the tool preferences, such as color, language, font, etc. (Image credit: Mauro Huculak) (Optional) Select the location to save the logs and choose the level of errors and warning messages. Click the Next button. (Image credit: Mauro Huculak) Continue with the on-screen directions. After you complete the steps, you will find different options for starting to work with DISMTools. For example, you can create a new or resume working on an existing project. Working with projects You can also go directly to manage an online or offline image. The "Manage online installation" opens the Windows image locally available on the current installation. If you choose the "Manage offline installation" option, you will have the option to select one of the available images. To start with a new project, click the "New project" option, choose the name and a location to store the project, and click the "OK" button. (Image credit: Mauro Huculak) Inside the project, click the "Mount image" button. On the page, choose the install.wim (or install.esd) image using the "Source" setting. You also have to specify the destination mount directory in the "Destination" setting. (Image credit: Mauro Huculak) In addition, in the "Options" section, you need to select the edition of the operating system that you want to customize by specifying the index number (if applicable). If you're mounting an ISO file, you may want to check the "Mount with read only permissions" option. Otherwise, you may not be able to mount the image. Finally, click the "OK" button to mount the image. On the main project page, you have different tools to perform a number of operations, including adding and removing packages, features, apps, drivers, and more. (Image credit: Mauro Huculak) It's important to note that making changes to the locally available image doesn't make changes to the current installation. You're only modifying the operating system image. Any modifications will be applied when the image is deployed to the system. Therefore, changes made to the offline image do not affect your current installation. Available tools In addition to working on projects, the DISMTools includes a number of tools to perform different actions, such as converting an image using the ESD format to WIM. (Image credit: Mauro Huculak) The install.ESD (Electronic Software Download) is a highly compressed and encrypted version of the install.WIM (Windows Imaging Format) file. As a result, directly opening and manipulating an install.ESD file is not possible. However, the DISMTools provides a functionality to convert the install.ESD format to install.WIM enables users to modify the Windows image. One of the tools (I personally find interesting) is the option to create an unattended file. The "unattended file" (typically named autounattend.xml) allows for automating the Windows 11 setup process. This eliminates the need for user interaction during installation, making it ideal for large-scale deployments or users who want a streamlined installation experience. (Image credit: Mauro Huculak) The only caveat is that the creation of the file can be a tedious process. However, the DISMTools includes an easy-to-follow wizard to create the autounattend.xml file. Other things DISMTools, though still under development, offers a comprehensive graphical interface for interacting with the Deployment Image Servicing and Management (DISM) command-line tool. It enables you to manage both online and offline Windows images, making it easier to complete tasks such as adding or removing features, packages, and drivers. However, as of its current version, DISMTools does not seem to support the 'RestoreHealth' functionality, which is used to repair the operating system image (a capability available through specific DISM command-line operations). This tool is designed primarily for network administrators and developers who require efficient management of images. Regardless, its user-friendly interface makes it accessible to a broader audience, allowing anyone interested to utilize its features. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  24. 1985 is calling, and it has some lessons for Windows 8 Editor’s note: Ahead of Microsoft’s 50th’s anniversary, we’ve fixed the layout on this story — which we originally published in 2012 when Windows 8 launched. Now’s a good time to revisit our look at an operating system that helped shape personal computing over the years. Two years ago today, when Windows 1.0 celebrated its 25th birthday, we didn’t yet know what the future of Windows would hold. Now that Windows 8 is on the market, the original is more relevant than ever before. Today, Windows 1.0 turns 27, and despite the many ways computing has changed since its debut, the two operating systems have some surprising similarities. Let’s take a look at just how far we’ve come since Windows 1.0… and where Microsoft is retracing its own footsteps with the latest version of Windows. On November 10th, 1983, Microsoft announced Windows. For $99, it came with a notepad, calendar, clock, cardfile, terminal application, file manager, a game of Reversi, Windows Write, and Windows Paint. The original press materials, prepared using Windows Write, had this quote from Bill Gates: “Windows provides unprecedented power to users today and a foundation for hardware and software advancements of the next few years. It is unique software designed for the serious PC user, who places high value on the productivity that a personal computer can bring.” Windows 1.0 looked like this: As chronicled in the December 1983 issue of BYTE Magazine, Windows was an attempt to make the desktop operating system relatively affordable. When most computers were still primarily text-based, the hardware requirements for a desktop operating system were expensive: the Apple Lisa started at nearly $10,000, and a competing Visi On system required an expensive hard disk with a whopping 2.2MB of free space, as well as 512KB of RAM. Windows promised the same features with a pair of cheaper double-sided floppy disk drives instead, and half the memory. It took two more years for Windows to be released – long enough for the industry to write it off as “vaporware,” a term ironically coined a year earlier by a Microsoft engineer. (Tandy Trower, the product manager who finally shipped the OS, recounts his story here.) Microsoft knew how to laugh at itself, though. On November 20th, 1985, the company shipped the operating system, and the very next evening, Microsoft held a roast for itself at the Comdex expo in Las Vegas. InfoWorld editor Stewart Alsop presented Bill Gates with a Golden Vaporware award, lampooning the missed release dates. John C. Dvorak famously joked that when Microsoft announced Windows, Steve Ballmer still had hair. Microsoft tossed dry ice into buckets of water in a failed attempt (given the dry Las Vegas air) to provide some genuine vapor. However, shipping Windows wasn’t enough. You see, Windows 1.0 was trying to sell businesses and customers on a radical new paradigm – the graphical user interface (GUI) – at a time when arguably only one company, Apple, had made headway with that environment.* Sound familiar? It should. Now Microsoft is attempting to enter the touchscreen tablet space with Windows 8 and the Surface RT, at a time when arguably only Apple’s iPad has made more than a dent in the marketplace. And it’s hardly the only parallel. Like Windows 8, the original Windows attempted to simplify computing without jettisoning legacy applications. Where Windows 8 has the familiar desktop waiting beneath its Metro UI, Windows 1.0 ran on top of the popular MS-DOS. In fact, you needed to install Windows 1.0 atop an existing installation of MS-DOS 2.0. Microsoft planned to call the operating system “Interface Manager” until shortly before the 1983 announcement. Also like Windows 8, the original version of Microsoft’s operating system had a potential problem getting software developers to build for the new paradigm. In November 1983, shortly after the Windows reveal, InfoWorld’s John Markoff rooted out an issue right away: a significant number of programs would “misbehave” in the windowed mode, and take up the entire screen. The New York Times questioned the value of windowed environments, period, in a 1984 editorial. When InfoWorld asked IT managers at a number of companies about whether they would adopt Windows in February 1986, these were the replies they received. Then as now, companies seemed happy enough with what they had, and worried about how Windows might have a fragmented user experience if software manufacturers don’t follow standards. Then as now, critics suggested that users would really want extra hardware (then, a mouse; now, a touchscreen) in order to get the most out of the operating system. 27 years later, Windows 8 has the challenge of selling Live Tiles and touchscreens to people who don’t necessarily need them to stay competitive. Then, Microsoft promised that Windows sales would be a “slow burn.” We may be there again. And amusingly enough, part of that new UI is a tiled interface that directly hearkens back to its ancestor. You’re probably familiar with how you can drag windowed programs on top of one another so that they overlap, yes? That functionality was removed from Windows 1.0 by the time it shipped. Instead, applications would appear tiled, each one automatically resizing itself to fit the available space. Stories differ as to whether that was a conscious decision by Microsoft or whether a secret agreement with Apple caused them to remove overlapping windows, but the overlap returned in Windows 2.0 and sparked an Apple lawsuit along the way. And yet, Windows 8 brings back the tiled interface with Windows Snap, and not all apps are functional when resized to smaller proportions. No wonder the Windows logo is back to square one. Windows 1.0 launched to optimistic but middling reviews, and didn’t end up fulfilling its promise to be an affordable, powerful OS. Popular Science liked the idea, but called it relatively slow, noting that “it takes up to 15 seconds to switch from one program to another.” Multitasking was a memory hog, too: “my 640-kilobyte computer couldn’t hold more than two medium-sized programs in memory at once,” complained the publication. Creative Computing worried about the dearth of compatible graphics cards, and was uncertain whether Windows was a valuable upgrade over DOS. InfoWorld led with the headline “Windows Requires Too Much Power” and gave it a 4.5 (out of 10) score. “It makes such intense demands on the computer’s processing power that it’s just not appropriate for an ordinary 8088-based IBM PC or compatible,” wrote the publication. And The New York Times said that “running Windows on a PC with 512K of memory is akin to pouring molasses in the Arctic.” It turned out that you really did need that extra memory and that expensive hard disk drive to run Windows at a reasonable pace, and some even suggested a RAM disk like Intel’s Above Board. It took two more versions of Windows for the operating system to catch on. We shouldn’t kid ourselves, though: in the 80s, the PC industry was a wild west, and those days are long gone. The issues that stymied Windows 1.0 when Microsoft was young won’t necessarily block today’s operating system from success, not when every major computer company is churning out compatible Windows 8 machines and the appeal of touchscreens has already been proven. In 1985, Windows 1.0 launched into a market about to boom, one that was just waiting for the right operating system to unify a host of different computer hardware. There were several competing platforms, and one of them could have stood up. But if Windows 8 fails, there will still be a huge number of computers waiting for the next version of the now-familiar operating system. Unless you believe that the PC itself will make way for mobile devices, of course. *The Xerox Star, VisiCorp’s Visi On, IBM’s TopView and Digital Research’s GEM were also-rans. Allegedly, Bill Gates saw a demo of Visi On at Comdex 1982, and was originally inspired to develop Windows for fear of losing IBM’s business to Visi On instead. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  25. Karlston

    Stardock announces Fences 6, beta now available to download

    Stardock released its first Fences® 6 beta today – a major update to its popular Windows desktop organization software with over 20 million downloads. Fences is the easiest way to organize your desktop workflow by neatly organizing apps, files, and icons on the desktop. Fences 6 introduces tabs, a feature that allows you to place multiple fence groups together in a tabbed experience for a modern layout. With the ability to dynamically add and remove tabs, Fences 6 continues to elevate the bar as the best desktop organizational tool for Windows. Also new in Fences 6 is the ability to apply a color tint to all the icons on your desktop. This simple but innovative feature allows you to use a single hue for all your desktop icons to create a distraction-free layout or to help any individual Fence stand out. When combined with many of the quality-of-life updates like improved navigation for Folder Portals™, Fences 6 is another big step forward for functionality and personalization. Fences is used by thousands of businesses every day, from healthcare to law offices and finance organizations. To help these businesses deploy organized dashboards of desktop icons, Fences 6 for Business adds additional tooling to create templated deployments with multiple configurations ready out of the box. And with Stardock also offering customized deployment configurations with each enterprise rollout, Fences 6 is the most configurable, deployable, and scalable version of Fences ever. Top New Features in Fences 6: Tabs let you stack a fence on top of each other for a modern workflow. Icon tint allows you to apply a uniform color hue to all of your desktop icons to personalize your desktop and reduce distractions. A new color picker tool makes it easy to pick the perfect color for a Fence group or icon tint color. Folder Portal navigation has been overhauled to provide a more natural workflow. Full Arm support means that Fences 6 is ready for the newest generation of devices powered by ARM CPUs. And many more quality-of-life improvements "Fences 6 is our biggest leap forward for the productivity tool," said Brad Sams, General Manager of Stardock Software. "Fences is widely recognized as the best way to organize your desktop and with the new features in Fences 6, it is now the best tool for managing not only your desktop but every desktop within your organization.” The Fences 6 beta is available today, starting at $8.99 for a limited time and is also included in the award-winning Object Desktop package. Object Desktop includes programs such as Start11, Groupy, SoundPackager, DeskScapes and Multiplicity. Disclaimer: Neowin's relationship to Stardock Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  26. While search engines use sponsored links, Copilot and similar AI assistants haven't yet found a strong monetization method. To address this, Microsoft Advertising is introducing new ad formats specifically for Copilot's chat interface. These new ad formats are interactive and adapt based on user input. The first format is called Microsoft Advertising Showroom ads. People generally visit showrooms to ask questions and understand the product. Microsoft is trying to emulate the same with Microsoft Advertising Showroom ads. Using this immersive ad experience, users can explore what they are searching for. For example, when a user starts asking questions about a particular product to purchase, they will be presented with this new Showroom ads experience. Rich sponsored content will showcase the product benefits, and users can also further ask questions about the product in this new experience. In the future, brand agents will be integrated into the Showroom ads, which will allow users to connect directly with a virtual brand representative. Microsoft is planning to start a pilot of the Showroom ads in April with select clients. You can check out the demo of this experience below. The second ad format is called Dynamic filters. When users are searching for products, product ads will appear based on the query. This new ad format will allow users to easily narrow down the product they are looking for based on their individual preferences. Dynamic filters will begin piloting in English language markets this March. These new ad formats represent a significant step in the evolution of advertising for chat-based UIs. By leveraging interactive and adaptive experiences, Microsoft is exploring ways to effectively monetize AI assistants while delivering value to both users and advertisers. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  27. Nvidia's assurances about the integrity of its GPU lineup have been called into question once again. Previously, the company had stated that "no other Nvidia GPUs" were affected by the problem of missing rendering units (ROP), one of the key specs directly affecting gaming performance. However, recent reports from German Heise Online and HardwareLuxx suggest that RTX 50-series laptop GPUs may also be suffering from similar problems. According to the reports, Nvidia has reached out to laptop manufacturers to ask them to verify the ROP counts in their systems. This development has raised concerns among consumers, who were led to believe that the issue was isolated to a specific subset of Nvidia's desktop GPUs. In response to these reports, Nvidia's GeForce global PR director, Ben Berraondo, told The Verge that "All partners continue to run checks as part of our standard testing procedure" and that Nvidia will reach out to the German publications to discuss the matter further. Pressed for a more detailed response, Berraondo said: "Nope," as in none of the laptop GPUs are vulnerable to the missing ROP issue. Adding to the confusion, Heise and HardwareLuxx have stated that the testing will lead to some delay in the release of some of the RTX 50 series laptops. Specifically, they point out that some laptops are likely to ship in April or May, although originally announced release dates in March. Also, Nvidia officially confirmed that missing ROPs are a "rare issue" that hits GeForce RTX 5090/5090D and 5070 Ti only and just 0.5% of the related GPUs are involved. Sources: Heise Online, HardwareLuxx, The Verge Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  28. If you are one of the lucky owners (or unlucky, considering the staggering amount of issues plaguing these cards) of one of Nvidia's new RTX 50 graphics cards, you might want to download the latest hotfix driver. Nvidia released version 572.75 to address two important issues in the lineup. The first patch fixes the problem with the RTX 5080 and 5090 not being able to operate at proper clock speeds after overclocking and rebooting your system. The second bug affects the entire RTX 50 series, and it causes the graphics cards to crash to a black screen. Interestingly, this is not the first black screen issue in the RTX 50 lineup. Several days ago, Nvidia released another hotfix to resolve a bug causing RTX 50-powered PCs to boot into a black screen. Here is the changelog for Nvidia GeForce Hotfix Display Driver 572.75: The new hotfix is based on the latest driver 572.70, which arrived earlier this week with the RTX 5070 support and a fix for the aforementioned bug with PCs booting into a black screen when connected to monitors via DisplayPort. Downloading the latest hotfix will get you all the fixes and changes included in driver 572.70 as well. You can get Nvidia GeForce Hotfix Display Driver 572.75 on the official support website. Release notes are available on the same page. As usual, changes in 572.75 will be included in the next Game Ready WHQL driver in the upcoming days or weeks. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    3 points
  29. Earlier today, we published a story about how Microsoft is trying to convince users to ditch Office and embrace Microsoft 365. The company says it can "prove with numbers" that the latter is the better choice for its customers. Meanwhile, on the OS side of things, Microsoft is busy persuading folks on Windows 10 to upgrade to 11. From time to time, it keeps talking about features and things you won't have if you don't move to Windows 10. In the most recent such example, Microsoft highlighted how upgrading to Windows 11 via a clean install would improve PC security. Ironically, Microsoft keeps making it harder to upgrade with pesky things like removing the OOBE/BYPASSNRO workaround for online Windows 11 installs, although thankfully, it still offers an official bypass for that; and third-party tools like Rufus also work. However, not every system will be able to upgrade to 11, and Microsoft is aware of that. It does allow installing Windows 11 on unsupported hardware, but the company does not officially recommend it. The company, in fact, actively discourages it, which is also clear from its actions. Instead, Microsoft insists users get a new PC for Windows 11. Towards the end of last month, Microsoft published a new blog post on its website on how to deal with this issue. It is a checklist of things users must keep in mind when dealing with a Windows 10 device that can't update to 11, as it may not be eligible for the upgrade. This is relevant since the end of support date for Windows 10 is nearing. In the article, Microsoft has once again reiterated that upgrading to a new Windows 11 PC is the best way forward, but before doing so, it is important to "responsibly" recycle the old PC, says Microsoft. It writes: You can find the blog post here on Microsoft's official website. Neowin's Paul Hill has already written a detailed guide on how to deal with this issue. ESET, meanwhile, recommends switching over to Linux. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    2 points
  30. Alcohol makes male fruit flies sexier by stimulating the production of sex pheromones. Fruit flies (Drosophila melanogaster) are tremendously fond of fermented foodstuffs. Technically, it's the yeast they crave, produced by yummy rotting fruit, but they can consume quite a lot of ethanol as a result of that fruity diet. Yes, fruit flies have ultra-fast metabolisms, the better to burn off the booze, but they can still get falling-down drunk—so much so, that randy inebriated male fruit flies have been known to court other males by mistake and fail to mate successfully. Then again, apparently adding alcohol to their food increases the production of sex pheromones in male fruit flies, according to a new paper published in the journal Science Advances. That, in turn, makes them more attractive to the females of the species. "We show a direct and positive effect of alcohol consumption on the mating success of male flies," said co-author Ian Keesey of the University of Nebraska, Lincoln. "The effect is caused by the fact that alcohol, especially methanol, increases the production of sex pheromones. This in turn makes alcoholic males more attractive to females and ensures a higher mating success rate, whereas the success of drunken male humans with females is likely to be questionable." Fruit flies are the workhorses of modern genetics research, used to study everything from cancer to sleep disorders. They make excellent model systems because they share so many genes with humans, plus they are cheap, easy to breed, and can be genetically altered easily. Many years ago, I had the privilege of visiting the University of California, San Francisco laboratory of behavior geneticist Ulrike Heberlein, who spent years getting fruit flies drunk in an "Inebriometer" to learn about the various genes that influence alcohol tolerance. (Heberlein is now scientific program director and laboratory head at the Howard Hughes Medical Institute's Janelia Farm Research Campus.) Driven to drink? For instance, Heberlein co-authored a 2012 paper discussing experimental results that suggested romantic rejection (i.e., "social defeat") could drive male fruit flies to drink. She paired virgin males with females who had already mated for an hour at a time, three times a day, for four straight days. (Mated females will vehemently reject advances from other males, often aggressively so.) Then the males were placed in an alcohol-drinking assay, where they would drink more than twice as much alcohol as male fruit flies in the control group who had successfully mated. Ian Keesey of the University of Nebraska, Lincoln, studies fruit flies. Credit: Anna Schroll/CC BY-SA In terms of a mechanism, the rejection seems to decrease levels of a neuropeptide in the brain, which increases after mating, leading Heberlein et al. to conclude that drinking the ethanol activates reward centers in the fruit fly brain. The end goal is to find equivalent mechanisms in the human brain to guide future interventions into human drug and alcohol addiction and abuse. While their latest findings are generally consistent with this and other fruit fly studies, Keesey and his co-authors offer an alternative hypothesis to explain these alcohol-related behaviors in fruit flies. They concluded that fruit flies "are attracted to ethanol (and methanol) not as a means to cope with the negative psychological effects of mate rejection, but rather that flies are driven toward these alcohols to increase their chances for subsequent mating success," they wrote. In other words, rejected male fruit flies chug down alcohol as a strategy to get girls to like them. The researchers studied the behavioral responses of male fruit flies using an experimental apparatus called a Flywalk, in which 15 fruit flies in individual glass tubes lined up in parallel were exposed to odors (including ethanol and methanol) and monitored for their responses to those odors. They also employed imaging techniques to visualize what was happening in those tiny fruit fly brains. The results: In keeping with prior research, male fruit flies who had not yet mated were more drawn to alcohol. Those that consumed methanol showed a marked increase in the levels of pheromones known to be involved with the elaborate fruit fly courtship rituals. And males who had access to natural sources of methanol, like fermented oranges, were more successful in attracting females than males who did not. Of course, when it comes to alcohol, there can be too much of a good thing. Keesey et al. also found that too much methanol can kill the flies. "What is unique about our results is that we found not just one, but three neural circuits that we were able to show actually balance each other in terms of this risk assessment, that is, attraction and aversion," said Keesey. "This means that the flies have a control mechanism that allows them to get all the benefits of alcohol consumption without risking alcohol intoxication. That different neural pathways with opposite valence for the same odor are combined to balance attraction and aversion based on physiological state is a rarity." So male fruit flies, essentially, know when they've reached the optimal level of inebriation to attract more females and successfully mate, before they become so intoxicated that they repulse the females, or approach other males by mistake. Science Advances, 2025. DOI: 10.1126/sciadv.adi9683 (About DOIs). Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357 RIP Matrix | Farewell my friend
    2 points
  31. Tracking new features in Windows 11 preview builds is not always easy, even for enthusiasts, with new stuff popping up in different channels with no particular order and gradual rollouts (I have complained about this in one of my articles). Now, with Windows 11 in its fourth year, Microsoft is finally launching a dedicated Windows roadmap. Microsoft announced the new Windows Roadmap website in a post on the Tech Community forum. The company says the goal here is to make it easier for users to see what features are currently available to everyone, what is there in the Insider program, what is rolling out gradually, and more. Also, the site will help you learn how to access new features, what is coming to different device types (Copilot+ PCs or regular PCs), and check updates on certain things, among other things. Another great thing about Windows Roadmap is that it shows estimated release dates for each feature, so you can better understand when to expect new features or changes. There are also filters for specific versions, like 23H2 and 24H2, insider channels, and more. Each entry has a detailed description, additional notes, and a link to its announcement post as well. As of right now, the Windows Roadmap website primarily focuses on the consumer side of Windows 11 because that is where Microsoft ships the most changes, new features, and improvements. However, Microsoft says that the current version is just the beginning, so expect more changes as the company evaluates feedback from users. You can access the Windows Roadmap website here. The current version hosts plenty of features like Super Resolution in the Photos app, File Explorer improvements, Click to Do, Reall, improved Windows Search (now rolling out as part of the latest non-security update), and more. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  32. Earlier this month, Microsoft removed a Windows 11 24H2 upgrade block related to gaming. Sadly for those who were affected by a Dirac Audio-related issue, Microsoft today "confirmed" that it has not been able to resolve the bug. The company had opened this issue back in December 2024 when it put the compatibility safeguard hold in place. Microsoft had explained: However, even after all this time, Microsoft has not been able to resolve the issue, as the status of the bug has now been changed to "confirmed" from "mitigated". Thus, users affected by this problem will have to wait longer. It seems the driver that was supposed to fix the issue is not yet out, so perhaps the fault is not entirely Microsoft's either. You can find the issue here on Microsoft's Windows Health Dashboard site. In the rare case that you have still not been offered Windows 11 24H2 without any compatibility block, you can try this Registry/Group Policy hack to update immediately. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  33. Karlston

    The Quantum Apocalypse Is Coming. Be Very Afraid

    What happens when quantum computers can finally crack encryption and break into the world’s best-kept secrets? It’s called Q-Day—the worst holiday maybe ever. One day soon, at a research lab near Santa Barbara or Seattle or a secret facility in the Chinese mountains, it will begin: the sudden unlocking of the world’s secrets. Your secrets. Cybersecurity analysts call this Q-Day—the day someone builds a quantum computer that can crack the most widely used forms of encryption. These math problems have kept humanity’s intimate data safe for decades, but on Q-Day, everything could become vulnerable, for everyone: emails, text messages, anonymous posts, location histories, bitcoin wallets, police reports, hospital records, power stations, the entire global financial system. “We’re kind of playing Russian roulette,” says Michele Mosca, who coauthored the most recent “Quantum Threat Timeline” report from the Global Risk Institute, which estimates how long we have left. “You’ll probably win if you only play once, but it’s not a good game to play.” When Mosca and his colleagues surveyed cybersecurity experts last year, the forecast was sobering: a one-in-three chance that Q-Day happens before 2035. And the chances it has already happened in secret? Some people I spoke to estimated 15 percent—about the same as you’d get from one spin of the revolver cylinder. The corporate AI wars may have stolen headlines in recent years, but the quantum arms race has been heating up too. Where today’s AI pushes the limits of classical computing—the kind that runs on 0s and 1s—quantum technology represents an altogether different form of computing. By harnessing the spooky mechanics of the subatomic world, it can run on 0s, 1s, or anything in between. This makes quantum computers pretty terrible at, say, storing data but potentially very good at, say, finding the recipe for a futuristic new material (or your email password). The classical machine is doomed to a life of stepwise calculation: Try one set of ingredients, fail, scrap everything, try again. But quantum computers can explore many potential recipes simultaneously. So, naturally, tech giants such as Google, Huawei, IBM, and Microsoft have been chasing quantum’s myriad positive applications—not only for materials science but also communications, drug development, and market analysis. China is plowing vast resources into state-backed efforts, and both the US and the European Union have pledged millions in funding to support homegrown quantum industries. Of course, whoever wins the race won’t just have the next great engine of world-saving innovation. They’ll also have the greatest code-breaking machine in history. So it’s normal to wonder: What kind of Q-Day will humanity get—and is there anything we can do to prepare? If you had a universal picklock, you might tell everyone—or you might keep it hidden in your pocket for as long as you possibly could. From a typical person’s vantage point, maybe Q-Day wouldn’t be recognizable as Q-Day at all. Maybe it would look like a series of strange and apparently unconnected news stories spread out over months or years. London’s energy grid goes down on election day, plunging the city into darkness. A US submarine on a covert mission surfaces to find itself surrounded by enemy ships. Embarrassing material starts to show up online in greater and greater quantities: classified intelligence cables, presidential cover-ups, billionaires’ dick pics. In this scenario, it might be decades before we’re able to pin down exactly when Q-Day actually happened. Then again, maybe the holder of the universal picklock prefers the disaster-movie outcome: everything, everywhere, all at once. Destroy the grid. Disable the missile silos. Take down the banking system. Open all the doors and let the secrets out. Suppose you ask a classical computer to solve a simple math problem: Break the number 15 into its smallest prime factors. The computer would try all the options one by one and give you a near-instantaneous answer: 3 and 5. If you then ask the computer to factor a number with 1,000 digits, it would tackle the problem in exactly the same way—but the calculation would take millennia. This is the key to a lot of modern cryptography. Take RSA encryption, developed in the late 1970s and still used for securing email, websites, and much more. In RSA, you (or your encrypted messaging app of choice) create a private key, which consists of two or more large prime numbers. Those numbers, multiplied together, form part of your public key. When someone wants to send you a message, they use your public key to encrypt it. You’re the only person who knows the original prime numbers, so you’re the only person who can decrypt it. Until, that is, someone else builds a quantum computer that can use its spooky powers of parallel computation to derive the private key from the public one—not in millennia but in minutes. Then the whole system collapses. The algorithm to do this already exists. In 1994, decades before anyone had built a real quantum computer, an AT&T Bell Labs researcher named Peter Shor designed the killer Q-Day app. Shor’s algorithm takes advantage of the fact that quantum computers run not on bits but on qubits. Rather than being locked in a state of 0 or 1, they can exist as both simultaneously—in superposition. When you run an operation on a handful of qubits in a given quantum state, you’re actually running that same operation on those same qubits in all their potential quantum states. With qubits, you’re not confined to trial and error. A quantum computer can explore all potential solutions simultaneously. You’re calculating probability distributions, waves of quantum feedback that pile onto each other and peak at the correct answer. With Shor’s algorithm, carefully designed to amplify certain mathematical patterns, that’s exactly what happens: Large numbers go in one end, factors come out the other. In theory, at least. Qubits are incredibly difficult to build in real life, because the slightest environmental interference can nudge them out of the delicate state of superposition, where they balance like a spinning coin. But Shor’s algorithm ignited interest in the field, and by the 2010s, a number of projects were starting to make progress on building the first qubits. In 2016, perhaps sensing the nascent threat of Q-Day, the US National Institute for Standards and Technology (NIST) launched a competition to develop quantum-proof encryption algorithms. These largely work by presenting quantum computers with complex multidimensional mazes, called structured lattices, that even they can’t navigate without directions. In 2019, Google’s quantum lab in Santa Barbara claimed that it had achieved “quantum supremacy.” Its 53-qubit chip could complete in just 200 seconds a task that would have taken 100,000 conventional computers about 10,000 years. Google’s latest quantum processor, Willow, has 105 qubits. But to break encryption with Shor’s algorithm, a quantum computer will need thousands or even millions. There are now hundreds of companies trying to build quantum computers using wildly different methods, all geared toward keeping qubits isolated from the environment and under control: superconducting circuits, trapped ions, molecular magnets, carbon nanospheres. While progress on hardware inches forward, computer scientists are refining quantum algorithms, trying to reduce the number of qubits required to run them. Each step brings Q-Day closer. That’s bad news not just for RSA but also for a dizzying array of other systems that will be vulnerable on Q-Day. Security consultant Roger A. Grimes lists some of them in his book Cryptography Apocalypse: the DSA encryption used by many US government agencies until recently, the elliptic-curve cryptography used to secure cryptocurrencies like Bitcoin and Ethereum, the VPNs that let political activists and porn aficionados browse the web in secrecy, the random number generators that power online casinos, the smartcards that let you tap through locked doors at work, the security on your home Wi-Fi network, the two-factor authentication you use to log in to your email account. Experts from one national security agency told me they break the resulting threats down into two broad areas: confidentiality and authentication. In other words, keeping secrets and controlling access to critical systems. Chris Demchak, a former US Army officer who is a professor of cybersecurity at the US Naval War College and spoke with me in a personal capacity, says that a Q-Day computer could let an adversary eavesdrop on classified military data in real time. “It would be very bad if they knew exactly where all of our submarines were,” Demchak says. “It would be very bad if they knew exactly what our satellites are looking at. And it would be very bad if they knew exactly how many missiles we had and their range.” The balance of geopolitical power in, say, the Taiwan Strait could quickly tilt. Beyond that real-time threat to confidentiality, there’s also the prospect of “harvest now, decrypt later” attacks. Hackers aligned with the Chinese state have reportedly been hoovering up encrypted data for years in hopes of one day having a quantum computer that can crack it. “They wolf up everything,” Demchak told me. (The US almost certainly does this too.) The question then becomes: How long will your sensitive data remain valuable? “There might be some needles in that haystack,” says Brian Mullins, the CEO of Mind Foundry, which helps companies implement quantum technology. Your current credit card details might be irrelevant in 10 years, but your fingerprint won’t be. A list of intelligence assets from the end of the Iraq War might seem useless until one of those assets becomes a prominent politician. The threat to authentication may be even scarier. “Pretty much anything that says a person is who they say they are is underpinned by encryption,” says Deborah Frincke, a computer scientist and national security expert at Sandia National Laboratories. “Some of the most sensitive and valuable infrastructure that we have would be open to somebody coming in and pretending to be the rightful owner and issuing some kind of command: to shut down a network, to influence the energy grid, to create financial disruption by shutting down the stock market.” Illustration: Nicholas Law The exact level of Q-Day chaos will depend on who has access to the first cryptographically relevant quantum computers. If it’s the United States, there will be a “fierce debate” at the highest levels of government, Demchak believes, over whether to release it for scientific purposes or keep it secret and use it for intelligence. “If a private company gets there first, the US will buy it and the Chinese will try to hack it,” she claims. If it’s one of the US tech companies, the government could put it under the strict export controls that now apply to AI chips. Most nation-state attacks are on private companies—say, someone trying to break into a defense contractor like Lockheed Martin and steal plans for a next-generation fighter jet. But over time, as quantum computers become more widely available, the focus of the attacks could broaden. The likes of Microsoft and Amazon are already offering researchers access to their primitive quantum devices on the cloud—and big tech companies haven’t always been great at policing who uses their platforms. (The soldier who blew up a Cybertruck outside the Trump International Hotel in Las Vegas early this year queried ChatGPT to help plan the attack.) You could have a bizarre scenario where a cybercriminal uses Amazon’s cloud quantum computing platform to break into Amazon Web Services. Cybercriminals with access to a quantum computer could use it to go after the same targets more effectively, or take bigger swings: hijacking the SWIFT international payments system to redirect money transfers, or conducting corporate espionage to collect kompromat. The earliest quantum computers probably won’t be able to run Shor’s algorithm that quickly—they might only get one or two keys a day. But combining a quantum computer with an artificial intelligence that can map out an organization’s weakness and highlight which keys to decrypt to cause the most damage could yield devastating results. And then there’s Bitcoin. The cryptocurrency is exquisitely vulnerable to Q-Day. Because each block in the Bitcoin blockchain captures the data from the previous block, Bitcoin cannot be upgraded to post-quantum cryptography, according to Kapil Dhiman, CEO of Quranium, a post-quantum blockchain security company. “The only solution to that seems to be a hard fork—give birth to a new chain and the old chain dies.” But that would require a massive organizational effort. First, 51 percent of Bitcoin node operators would have to agree. Then everyone who holds bitcoin would have to manually move their funds from the old chain to the new one (including the elusive Satoshi Nakamoto, the Bitcoin developer who controls wallets containing around $100 billion of the cryptocurrency). If Q-Day happens before the hard fork, there’s nothing to stop bitcoin going to zero. “It’s like a time bomb,” says Dhiman. That bomb going off will only be the beginning. When Q-Day becomes public knowledge, either via grim governmental address or cheery big-tech press release, the world will enter the post-quantum age. It will be an era defined by mistrust and panic—the end of digital security as we know it. “And then the scramble begins,” says Demchak. All confidence in the confidentiality of our communications will collapse. Of course, it’s unlikely that everyone’s messages will actually be targeted, but the perception that you could be spied on at any time will change the way we live. And if NIST’s quantum-proof algorithms haven’t rolled out to your devices by that point, you face a real problem—because any attempts to install updates over the cloud will also be suspect. What if that download from Apple isn’t actually from Apple? Can you trust the instructions telling you to transfer your crypto to a new quantum-secure wallet? Grimes, the author of Cryptography Apocalypse, predicts enormous disruptions. We might have to revert to Cold War methods of transmitting sensitive data. (It’s rumored that after a major hack in 2011, one contractor purportedly asked its staff to stop using email for six weeks.) Fill a hard drive, lock it in a briefcase, put someone you trust on a plane with the payload handcuffed to their wrist. Or use one-time pads—books of pre-agreed codes to encrypt and decrypt messages. Quantum-secure, but not very scalable. Expect major industries—energy, finance, health care, manufacturing, transportation—to slow to a crawl as companies with sensitive data switch to paper-based methods of doing business and scramble to hire expensive cryptography consultants. There will be a spike in inflation. Most people might just accept the inevitable: a post-privacy society in which any expectation of secrecy evaporates unless you’re talking to someone in person in a secluded area with your phones switched off. Big Quantum is Watching You. The best-case scenario looks something like Y2K, where we have a collective panic, make the necessary upgrades to encryption, and by the time Q-Day rolls around it’s such an anticlimax that it becomes a joke. That outcome may still be possible. Last summer, NIST released its first set of post-quantum encryption standards. One of Joe Biden’s last acts as president was to sign an executive order changing the deadline for government agencies to implement NIST’s algorithms from 2035 to “as soon as practicable.” Already, NIST’s post-quantum cryptography has been rolled out on messaging platforms such as Signal and iMessage. Sources told me that sensitive national security data is probably being locked up in ways that are quantum-secure. But while your email account can easily be Q-proofed over the internet (assuming the update doesn’t come from a quantum imposter!), other things can’t. Public bodies like the UK’s National Health Service are still using hardware and software from the 1990s. “Microsoft is not going to upgrade some of its oldest operating systems to be post-quantum secure,” says Ali El Kaafarani, the CEO of PQShield, a company that makes quantum-resistant hardware. Updates to physical infrastructure can take decades, and some of that infrastructure has vulnerable cryptography in places it can’t be changed: The energy grid, military hardware, and satellites could all be at risk. And there’s a balance to be struck. Rushing the transition risks introducing vulnerabilities that weren’t there before. “How do you make transitions slow enough that you can be confident and fast enough that you don’t dawdle?” asks Chris Ballance, CEO of Oxford Ionics, a quantum computing company. Some of those vulnerabilities might even be there by design: Memos leaked by Edward Snowden indicate that the NSA may have inserted a backdoor into a pseudorandom number generator that was adopted by NIST in 2006. “Anytime anybody says you should use this particular algorithm and there’s a nation-state behind it, you’ve got to wonder whether there’s a vested interest,” says Rob Young, director of Lancaster University’s Quantum Technology Centre. Then again, several people I spoke to pointed out that any nation-state with the financial muscle and technical knowledge to build a quantum device that can run Shor’s algorithm could just as easily compromise the financial system, the energy grid, or an enemy’s security apparatus through conventional methods. Why invent a new computing paradigm when you can just bribe a janitor? Long before quantum technology is good enough to break encryption, it will be commercially and scientifically useful enough to tilt the global balance. As researchers solve the engineering challenge of isolating qubits from the environment, they’ll develop exquisitely sensitive quantum sensors that will be able to unmask stealth ships and map hidden bunkers, or give us new insight into the human body. Similarly, pharma companies of the future could use quantum to steal a rival’s inventions—or use it to dream up even better ones. So ultimately the best way to stave off Q-Day may be to share those benefits around: Take the better batteries, the miracle drugs, the far-sighted climate forecasting, and use them to build a quantum utopia of new materials and better lives for everyone. Or—let the scramble begin. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  34. Microsoft has released an interesting Dev Channel update today with a new build, 26200.5510, under KB5054148. The release is meant as a transitionary update as the company explains that the Dev channel is "jumping ahead" to 26200 series. Microsoft writes: Thus the new build does not have any new changes or improvements but it does note some new known issues: You can find the official blog post here on Microsoft's website. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  35. Isar Aerospace's first Spectrum rocket will launch from Andøya Spaceport in Norway. Seven years ago, three classmates at the Technical University of Munich believed their student engineering project might hold some promise in the private sector. At the time, one of the co-founders, Daniel Metzler, led a team of 40 students working on rocket engines and launching sounding rockets. Josef Fleischmann was on the team that won the first SpaceX Hyperloop competition. Together with another classmate, Markus Brandl, they crafted rocket parts in a campus workshop before taking the leap and establishing Isar Aerospace, named for the river running through the Bavarian capital. Now, Isar's big moment has arrived. The company's orbital-class first rocket, named Spectrum, is set to lift off from a shoreline launch pad in Norway as soon as Monday. The three-hour launch window opens at 12:30 pm local time in Norway, or 7:30 am EDT in the United States. "The launch date remains subject to weather, safety and range infrastructure," Isar said in a statement. Isar's Spectrum rocket rolls out to its launch pad in Norway. Credit: Isar Aerospace Isar said it received a launch license from the Norwegian Civil Aviation Authority on March 14, following the final qualification test on the Spectrum rocket in February to validate its readiness for flight. Notably, this will be the first orbital launch attempt from a launch pad in Western Europe. The French-run Guiana Space Center in South America is the primary spaceport for European rockets. Virgin Orbit staged an airborne launch attempt from an airport in the United Kingdom in 2023, and the Plesetsk Cosmodrome is located in European Russia. No guarantees Success is never assured on the inaugural launch of a new rocket. Isar is the first in a wave of European launch startups to arrive at this point. The company developed the Spectrum rocket with mostly private funding, although Isar received multimillion-euro investments from the European Space Agency, the German government, and the NATO Innovation Fund. All told, Isar says it has raised more than 400 million euros, or $435 million at today's currency exchange rate, more than any other European launch startup. “We are approaching the most important moment of our journey so far, and I would like to thank all our team, partners, customers and investors who have been accompanying and trusting us," said Daniel Metzler, Isar's co-founder and CEO, in a statement. Most privately-developed rockets have failed to reach orbit on the first try. Several US launch companies that evolved in a similar mold as Isar—such as Rocket Lab, Firefly Aerospace, and Astra—faltered on the way to orbit on their rockets' first flights. "With this mission, Isar Aerospace aims to collect as much data and experience as possible on its in-house developed launch vehicle. It is the first integrated test of all systems," said Alexandre Dalloneau, Isar's vice president of mission and launch operations. "The test results will feed into the iterations and development of future Spectrum vehicles, which are being built and tested in parallel," Isar said in a statement. Look familiar? Isar Aerospace's Spectrum rocket is powered by nine first stage engines arranged in an "octaweb" configuration patterned on SpaceX's Falcon 9 rocket. Credit: Isar Aerospace/Wingmen Media Europe has struggled to regain its footing after SpaceX took over the dominant position in the global commercial launch market, a segment led for three decades by Europe's Ariane rocket family before SpaceX proved the reliability of the lower-cost, partially reusable Falcon 9 launcher. The continent's new Ariane 6 rocket, funded by ESA and built by a consortium owned by multinational firms Airbus and Safran, is more expensive than the Falcon 9 and years behind schedule. It finally debuted last year. One ton to LEO Isar's Spectrum rocket is not as powerful as the SpaceX's Falcon 9 or Arianespace's Ariane 6. But even SpaceX had to start somewhere. Its small Falcon 1 rocket failed three times before tasting success. Spectrum is somewhat larger and more capable than Falcon 1, with performance in line with Firefly's Alpha rocket. The fully assembled Spectrum rocket stands about 92 feet (28 meters) tall and measures more than 6 feet (2 meters) in diameter. The expendable launcher is designed to haul payloads up to 1 metric ton (2,200 pounds) into low-Earth orbit. Spectrum is powered by nine Aquila engines on its first stage, and one engine on the second stage, burning a mixture of propane and liquid oxygen propellants. There are no customer satellites aboard the first Spectrum test flight. The rocket will climb into a polar orbit from Andøya Spaceport in northern Norway, but Isar hasn't published a launch timeline or the exact parameters of the target orbit. While modest in size next to Europe's Ariane launcher family, Isar's Spectrum is the largest German rocket since the V-2, the World War II weapon of terror launched by Nazi Germany against targets in Great Britain, Belgium, and other places. In the 80 years since the war, German industry developed a handful of small sounding rockets, and manufactured upper stages for Ariane rockets. But German governments have long shunned spending on launchers at levels commensurate with the nation's place as a top contributor to ESA. France took the lead in the continent's postwar rocket industry, providing the lion's share of funding for Ariane, and taking responsibility for building engines and booster stages. Now, 80 years to the week since the last V-2 launch of World War II, Germany again has a homegrown liquid-fueled rocket on the launch pad. This time, it's for a much different purpose. As a first step, Isar and other companies in Europe are vying to inject competition with Arianespace into the European launch market. This will begin with small government-funded satellites that otherwise would have likely launched on rideshare flights by SpaceX or Arianespace. In 2022, the German space agency (known as DLR) announced the selection of research and demo payloads slated to fly on Spectrum's second launch. The Norwegian Space Agency revealed a contract earlier this month for Isar to launch a pair of satellites for the country's Arctic Ocean Surveillance program. Within the next few days, ESA is expected to release an "invitation to tender" for European industry to submit proposals for the European Launcher Challenge. This summer, ESA will select winners from Europe's crop of launch startups to demonstrate their rockets can deliver the agency's scientific satellites to orbit. This is the first time ESA has experimented with a fully commercial business model, with launch service contracts to private companies. Isar is a leading contender to win the launcher challenge, alongside other European companies like Rocket Factory Augsburg, HyImpulse, MaiaSpace, and others. Previously, ESA has provided billions of euros to Europe's big incumbent rocket companies for development of new generations of Ariane rockets. Now, ESA wants follow the path of NASA, which has used fixed-price service contracts to foster commercial cargo and crew transportation to the International Space Station, and most recently, privately-owned landers on the Moon. "Whatever the outcome, Isar Aerospace's upcoming Spectrum launch will be historic: the first commercial orbital launch from mainland Europe," Josef Aschbacher, ESA's director general, posted on X. "The support and co-funding the European Space Agency has given Isar Aerospace and other launch service provider startups is paying off for increased autonomy in Europe. Wishing Isar Aerospace a great launch day with fair weather and most importantly, that the data they receive from the liftoff will speed next iterations of their rockets." Toni Tolker-Nielsen, ESA's acting director of space transportation, called this moment a "paradigm shift" for Europe's launcher strategy. "In the last 40 years, we have had these ESA-developed launchers that we have been relying on," Tolker-Nielsen told Ars in an interview. "So we started with Ariane 1 up to Ariane 6. Vega C came onboard. And it's been working like that for the last 40 years. Now, we are moving into in the '30s, and the next decades, to have privately-developed launchers." Isar Aerospace's first Spectrum rocket will lift off from the remote Andøya Spaceport in Norway, a gorgeous location that might be the world's most picturesque launch site. Nestled on the western coast of an island inside the Arctic Circle, Andøya offers an open path over the Norwegian Sea for rockets to fly north, where they can place satellites into polar orbit. The spaceport is operated by Andøya Space, a company 90 percent owned by the Norwegian government through the Ministry for Trade, Industry, and Fisheries. Until now, Andøya Spaceport has been used for launches of suborbital sounding rockets. The geography of Norway permits northerly launches from Andøya Spaceport. Credit: Andøya Space No better time than now Isar's first launch comes amid an abrupt turn in European strategic policy as the continent's leaders struggle with how to respond to moves by President Donald Trump in his first two months in office. In recent weeks, the Trump administration put European leaders on their heels with sudden policy reversals and unpredictable statements on Ukraine, NATO, and the US government's long-term backstopping of European security. Friedrich Merz, set to become Germany's next chancellor, said last month that Europe should strive to "achieve independence" from the United States. "It is clear that the Americans, at least this part of the Americans, this administration, are largely indifferent to the fate of Europe." Last week, Merz shepherded a bill through German parliament to amend the country's constitution, allowing for a significant increase in German defense spending. The incoming chancellor said the change is "nothing less than the first major step towards a new European defense community." The erosion of Europe's trust in the Trump administration prompted rumors that the US government could trigger a "kill switch" to turn off combat capabilities of F-35 fighter jets sold to US allies. This would have previously seemed like a far-fetched conspiracy theory, but some European officials felt compelled to make statements denying the kill switch reports. Still, the recent turbulence in trans-Atlantic relations has some US allies rethinking their plans to buy more US-made fighter jets and weapons systems. "Reliable and predictable orders should go to European manufacturers whenever possible," Merz said. Robert Habeck, Germany's vice chancellor and economics minister, tours Isar Aerospace in Ottobrunn, Germany, in 2023. : German Economics Minister Robert Habeck (Bündnis 90/Die Grünen) walks past a prototype rocket during a visit to the space company Isar Aerospace. Credit: Marijan Murat/picture alliance via Getty Images This uncertainty extends to space, where it is most apparent in the launch industry. SpaceX, founded and led by Trump ally Elon Musk, dominates the global commercial launch business. European governments have repeatedly turned to SpaceX to launch multiple defense and scientific satellites over the last several years, while Europe encountered delays with its homegrown Ariane 6 and Vega rockets. Until 2022, Europe and Russia jointly operated Soyuz rockets from the Guiana Space Center in South America to deploy government and commercial payloads to orbit. The partnership ended with Russia's invasion of Ukraine. Europe's flagship Ariane 5 rocket retired in 2023, a year before its replacement—the Ariane 6—debuted on its first test flight from the Guiana Space Center. The first operational flight of the Ariane 6 delivered a French military spy satellite to orbit March 6. The smaller Vega C rocket successfully launched in December, two years after officials grounded the vehicle due to an in-flight failure. ESA funded development of the Ariane 6 and Vega C in partnership with ArianeGroup, a joint venture between Airbus and Safran, and the Italian defense contractor Avio. For the moment, Europe's launcher program is back on track to provide autonomous access to space, a capability European officials consider a strategic imperative. Philippe Baptiste, France's minister for research and higher education, said after the Ariane 6 flight earlier this month that the launch was "proof" of European space sovereignty. "The return of Donald Trump to the White House, with Elon Musk at his side, already has significant consequences on our research partnerships, on our commercial partnerships," Baptiste said in his remarkably pointed prepared remarks. "If we want to maintain our independence, ensure our security, and preserve our sovereignty, we must equip ourselves with the means for strategic autonomy, and space is an essential part of this." The problem? Ariane 6 and Vega C are costly, lack a path to reusability, and aren't geared to match SpaceX's blistering launch cadence. If Europe wants autonomous access to space, European taxpayers will have to pay a premium. Isar's Spectrum also isn't reusable, but European officials hope competition from new startups will produce fresh launch options, and perhaps stimulate an inspired response from Europe's entrenched launch companies. "In today's geopolitical climate, our first test flight is about much more than a rocket launch: Space is one of the most critical platforms for our security, resilience and technological advancement," Metzler said. "In the next days, Isar Aerospace will lay the foundations to regain much needed independent and competitive access to space from Europe." Tolker-Nielsen, in charge of ESA's space transportation division, said this is the first of many steps for Europe to develop a thriving commercial launch sector. "This launch is a milestone, which is very important," he said. "It's the first conclusion of all this work, so I will be looking carefully on that. I cross my fingers that it goes well." Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  36. Karlston

    Microsoft Edge gets timezone fixes and security patches

    Microsoft Edge 134 has been updated to a new version in the Stable Channel. Not much is present in version 134.0.3124.83 apart from fixes for recent time zone changes and patches for security vulnerabilities. Here is the changelog: As for security patches, the latest update packs important Chromium fixes. The patched vulnerabilities have been reported to be exploited in the wild (one is flagged as critical), so users are urged to update their browsers as soon as possible: You can update Microsoft Edge to the latest version by heading to edge://settings/help. You can also continue using the browser as is, and it will update itself in the background. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  37. Karlston

    The Art of the Perfect Nap

    Done wisely, naps can be a valuable way to boost your focus and energy. A sleep researcher explains how to get it right. THIS ARTICLE IS republished from The Conversation under a Creative Commons license. You’re in the middle of the afternoon, eyelids heavy, focus slipping. You close your eyes for half an hour and wake up feeling recharged. But later that night, you’re tossing and turning in bed, wondering why you can’t drift off. That midday snooze which felt so refreshing at the time might be the reason. Naps have long been praised as a tool for boosting alertness, enhancing mood, strengthening memory, and improving productivity. Yet for some, they can sabotage nighttime sleep. Napping is a double-edged sword. Done right, it’s a powerful way to recharge the brain, improve concentration, and support mental and physical health. Done wrong, it can leave you groggy, disoriented, and struggling to fall asleep later. The key lies in understanding how the body regulates sleep and wakefulness. Most people experience a natural dip in alertness in the early afternoon, typically between 1 pm and 4 pm. This isn’t just due to a heavy lunch—our internal body clock, or circadian rhythm, creates cycles of wakefulness and tiredness throughout the day. The early afternoon lull is part of this rhythm, which is why so many people feel drowsy at that time. Studies suggest that a short nap during this period—ideally followed by bright light exposure—can help counteract fatigue, boost alertness, and improve cognitive function without interfering with nighttime sleep. These “power naps” allow the brain to rest without slipping into deep sleep, making it easier to wake up feeling refreshed. But there’s a catch: Napping too long may result in waking up feeling worse than before. This is due to “sleep inertia”—the grogginess and disorientation that comes from waking up during deeper sleep stages. Once a nap extends beyond 30 minutes, the brain transitions into slow-wave sleep, making it much harder to wake up. Studies show that waking from deep sleep can leave people feeling sluggish for up to an hour. This can have serious implications if they then try to perform safety-critical tasks, make important decisions, or operate machinery, for example. And if a nap is taken too late in the day, it can eat away from the “sleep pressure build-up”—the body’s natural drive for sleep—making it harder to fall asleep at night. When Napping Is Essential For some, napping is essential. Shift workers often struggle with fragmented sleep due to irregular schedules, and a well-timed nap before a night shift can boost alertness and reduce the risk of errors and accidents. Similarly, people who regularly struggle to get enough sleep at night—whether due to work, parenting, or other demands—may benefit from naps to bank extra hours of sleep that compensate for their sleep loss. Nonetheless, relying on naps instead of improving nighttime sleep is a short-term fix rather than a sustainable solution. People with chronic insomnia are often advised to avoid naps entirely, as daytime sleep can weaken their drive to sleep at night. Certain groups use strategic napping as a performance-enhancing tool. Athletes incorporate napping into their training schedules to speed up muscle recovery and improve sports-related parameters such as reaction times and endurance. Research also suggests that people in high-focus jobs, such as health care workers and flight crews, benefit from brief planned naps to maintain concentration and reduce fatigue-related mistakes. NASA has found that a 26-minute nap can improve performance of long-haul flight operational staff by 34 percent, and alertness by 54 percent. How to Nap Well To nap effectively, timing and environment matter. Keeping naps between 10 and 20 minutes prevents grogginess. The ideal time is before 2 pm—napping too late can push back the body’s natural sleep schedule. The best naps happen in a cool, dark, and quiet environment, similar to nighttime sleep conditions. Eye masks and noise-canceling headphones can help, particularly for those who nap in bright or noisy settings. Despite the benefits, napping isn’t for everyone. Age, lifestyle, and underlying sleep patterns all influence whether naps help or hinder. A good nap is all about strategy—knowing when, how, and if one should nap at all. For some it’s a life hack, improving focus and energy. For others, it’s a slippery slope into sleep disruption. The key is to experiment and observe how naps affect your overall sleep quality. Done wisely, naps can be a valuable tool. Done poorly, they might be the reason you’re staring at the ceiling at midnight. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  38. New approach punishes AI companies that ignore "no crawl" directives. On Wednesday, web infrastructure provider Cloudflare announced a new feature called "AI Labyrinth" that aims to combat unauthorized AI data scraping by serving fake AI-generated content to bots. The tool will attempt to thwart AI companies that crawl websites without permission to collect training data for large language models that power AI assistants like ChatGPT. Cloudflare, founded in 2009, is probably best known as a company that provides infrastructure and security services for websites, particularly protection against distributed denial-of-service (DDoS) attacks and other malicious traffic. Instead of simply blocking bots, Cloudflare's new system lures them into a "maze" of realistic-looking but irrelevant pages, wasting the crawler's computing resources. The approach is a notable shift from the standard block-and-defend strategy used by most website protection services. Cloudflare says blocking bots sometimes backfires because it alerts the crawler's operators that they've been detected. "When we detect unauthorized crawling, rather than blocking the request, we will link to a series of AI-generated pages that are convincing enough to entice a crawler to traverse them," writes Cloudflare. "But while real looking, this content is not actually the content of the site we are protecting, so the crawler wastes time and resources." The company says the content served to bots is deliberately irrelevant to the website being crawled, but it is carefully sourced or generated using real scientific facts—such as neutral information about biology, physics, or mathematics—to avoid spreading misinformation (whether this approach effectively prevents misinformation, however, remains unproven). Cloudflare creates this content using its Workers AI service, a commercial platform that runs AI tasks. Cloudflare designed the trap pages and links to remain invisible and inaccessible to regular visitors, so people browsing the web don't run into them by accident. A smarter honeypot AI Labyrinth functions as what Cloudflare calls a "next-generation honeypot." Traditional honeypots are invisible links that human visitors can't see but bots parsing HTML code might follow. But Cloudflare says modern bots have become adept at spotting these simple traps, necessitating more sophisticated deception. The false links contain appropriate meta directives to prevent search engine indexing while remaining attractive to data-scraping bots. "No real human would go four links deep into a maze of AI-generated nonsense," Cloudflare explains. "Any visitor that does is very likely to be a bot, so this gives us a brand-new tool to identify and fingerprint bad bots." This identification feeds into a machine learning feedback loop—data gathered from AI Labyrinth is used to continuously enhance bot detection across Cloudflare's network, improving customer protection over time. Customers on any Cloudflare plan—even the free tier—can enable the feature with a single toggle in their dashboard settings. A growing problem Cloudflare's AI Labyrinth joins a growing field of tools designed to counter aggressive AI web crawling. In January, we reported on "Nepenthes," software that similarly lures AI crawlers into mazes of fake content. Both approaches share the core concept of wasting crawler resources rather than simply blocking them. However, while Nepenthes' anonymous creator described it as "aggressive malware" meant to trap bots for months, Cloudflare positions its tool as a legitimate security feature that can be enabled easily on its commercial service. The scale of AI crawling on the web appears substantial, according to Cloudflare's data that lines up with anecdotal reports we've heard from sources. The company says that AI crawlers generate more than 50 billion requests to their network daily, amounting to nearly 1 percent of all web traffic they process. Many of these crawlers collect website data to train large language models without permission from site owners, a practice that has sparked numerous lawsuits from content creators and publishers. The technique represents an interesting defensive application of AI, protecting website owners and creators rather than threatening their intellectual property. However, it's unclear how quickly AI crawlers might adapt to detect and avoid such traps, potentially forcing Cloudflare to increase the complexity of its deception tactics. Also, wasting AI company resources might not please people who are critical of the perceived energy and environmental costs of running AI models. Cloudflare describes this as just "the first iteration" of using AI defensively against bots. Future plans include making the fake content harder to detect and integrating the fake pages more seamlessly into website structures. The cat-and-mouse game between websites and data scrapers continues, with AI now being used on both sides of the battle. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  39. A parrot called the budgerigar controls its vocalizations with a flexible system. Human speech arises courtesy of some significant neural horsepower. Different areas of the brain are involved in determining the meaning that's desired, finding the words to express it, and then converting those words to a specific series of sounds—and all that comes before the correct sequence of nerve impulses is sent to the muscles that produce the final output. Humans are far from alone in the animal kingdom with an impressive range of vocalizations, though. That raises the prospect that we can understand a bit more about our own speech by studying how vocalization is managed in different animals. One group of species that's especially interesting is birds. They're distant relatives compared to other animals with interesting vocal capabilities, like whales and elephants, and their brains have some notable differences from ours. They also show a range of behaviors, from complex songs to vocal mimicry to whatever it is that you want to call what parrots do. Thanks to a newly released study, however, we now have evidence that these different types of vocalization are the product of different control systems in the brain. The study relied on electrodes placed in the brains of parrots and songbirds and tracked the behavior of neurons in a region that controls vocalization. It showed that the two relied on different types of control, with parrots having a system that operates similarly to the one used by humans. Timing isn’t everything The work focused on two species of birds. One is the zebra finch, a songbird that learns to produce a short song it uses each year, in part by listening to what its peers are singing. The second is the budgerigar, a small parrot that's often kept as a pet. Budgerigars are both impressive vocal mimics and also have complex vocalizations called warbles that are a mix of noisy and harmonic calls. Due to past work, we've already identified the brain structure that controls the activity of the key vocal organ, the syrinx, located in the bird's throat. The new study, done by Zetian Yang and Michael Long of New York University, managed to place fine electrodes into this area of the brain in both species and track the activity of neurons there while the birds were awake and going about normal activities. This allowed them to associate neural activity with any vocalizations made by the birds. For the budgerigars, they had an average of over 1,000 calls from each of the four birds carrying the implanted electrodes. For the zebra finch, neural activity during song production showed a pattern that was based on timing; the same neurons tended to be most active at the same point in the song. You can think of this as a bit like a player piano central organizing principle, timing when different notes should be played. "Different configurations [of neurons] are active at different moments, representing an evolving population ‘barcode,’" as Yang and Long describe this pattern. That is not at all what was seen with the budgerigars. Here, instead, they saw patterns where the same populations of neurons tended to be active when the bird was producing a similar sound. They broke the warbles down into parts that they characterized on a scale that ranged from harmonic to noisy. They found that the groups of neurons tended to be more active whenever the warble was harmonic, and different groups tended to spike when it got noisy. Those observations led them to identify a third population, which was active whenever the budgerigars produced a low-frequency sound. In addition, Yang and Long analyzed the pitch of the vocalizations. Only about half of the neurons in the relevant region of the brain were linked to pitch. However, the half that was linked had small groups of neurons that fired during the production of a relatively narrow range of pitches. They could use the activity of as few as five individual neurons and accurately predict the pitch of the vocalizations at the time. Structural similarities Both of these birds use a specific region of the brain to control the muscles of the syrinx to produce a series of sounds. But they organize that process completely differently. The zebra finch has neurons that trigger the right muscles for a given time within the song—even if a similar sound needs to be produced earlier or later. By contrast, the budgerigar organizes things so that the same neurons fire whenever a similar tone needs to be produced; the timing of the tone within a warble is apparently handled elsewhere. "Our finding of a ‘universal’ motor representation in the budgerigar forebrain indicates that AAC neurons do not represent the individual vocalizations per se," Yang and Long write, "but instead the underlying motor processes that generate those vocalizations." That's in keeping with the budgerigar's warbles, which are more tonally complex than a typical songbird vocalization and aren't repeated with the same sort of consistency as the zebra finch's song. And that's similar to how the last step in human speech production is handled; earlier steps in the process break down our vocalizations into individual sounds, and a specific region of the brain is devoted to producing the right anatomical configuration to produce them. It's important to emphasize that this doesn't mean the budgerigar's warbles are like language; we don't currently know what's upstream of this translation step in these birds and whether that has any parallels in humans. The other big open question is what drove the budgerigar and its relatives to develop a system so unlike that of the zebra finch. It's possible that complex calls were being selected for, and the ancestors of parrots evolved this system to fill that need. But it's equally possible that this organization came about for some other reason or entirely by chance, and the birds simply started using it to produce more complex calls. Nature, 2025. DOI: 10.1038/s41586-025-08695-8 (About DOIs). Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  40. Today is a good day for Vivaldi users. This highly customizable and powerful browser has just been updated to version 7.2, with a major focus on performance and personalization. Vivaldi 7.2 delivers several performance updates that make browsing the internet faster. For starters, there is now a faster and smarter address bar. Vivaldi says the new version is "fine-tuned for speed and precision," resulting in the browser showing you search results, bookmarks, browsing history, and other data much faster than before while still allowing you to customize the bar. Next, we have faster page loading thanks to improved and optimized connection handling. Vivaldi promises that after this update, some users will have their pages loading twice as fast. Vivaldi 7.2 also has some improvements for keyboard shortcuts. Now, users can make a list of priority shortcuts to override any website-specific controls. The browser's integrated Mail and Calendar now lets you create calendar events from emails and web pages. Just right-click anything and select Add to Calendar > Event. Other changes in Vivaldi 7.2 include a new currency widget on the Dashboard, workspace support for Quick Commands, and the ability to reorder mail accounts for extra customization. Besides listing all the changes and improvements in Vivaldi 7.2, developers reminded users that in the world of tech monopoly with its dangers of over-reliance on dominant players, Vivaldi offers a privacy-focused, personalized browser. This comes right after Mozilla, another privacy-focused company, changed its privacy policy regarding user data. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  41. Karlston

    Top 10 Most Pirated Movies of The Week – March 17, 2025

    Every week we take a close look at the most pirated movies on torrent sites. What are pirates downloading? 'Captain America: Brave New World' tops the chart, followed by 'The Gorge'. 'The Electric State' completes the top three. The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. Downloading content without permission is copyright infringement. These torrent download statistics are only meant to provide further insight into piracy trends. All data are gathered from public resources. This week we have two newcomers on the list. “Captain America: Brave New World” is the most shared title. The most torrented movies for the week ending on March 17 are: Movie Rank Rank last week Movie name IMDb Rating / Trailer Most downloaded movies via torrent sites 1 (2) Captain America: Brave New World 6.0 / trailer 2 (3) The Gorge 6.8 / trailer 3 (…) The Electric State 6.1 / trailer 4 (5) Moana 2 6.9 / trailer 5 (1) Anora 7.6 / trailer 6 (4) Mufasa: The Lion King 6.7 / trailer 7 (7) The Brutalist 7.7 / trailer 8 (9) The Substance 7.3 / trailer 9 (…) Sonic the Hedgehog 3 6.9 / trailer 10 (6) A Complete Unknown 7.5 / trailer Note: We also publish an updating archive of all the list of weekly most torrented movies lists. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  42. Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to retrieve the decryption key and unlock files for free. Nugroho developed the decryptor after being asked for help from a friend, deeming the encrypted system solvable within a week, based on how Akira generates encryption keys using timestamps. The project ended up taking three weeks due to unforeseen complexities, and the researcher spent $1,200 on GPU resources to crack the encryption key, but eventually, he succeeded. Using GPUs to brute force keys Nugroho's decryptor does not work like a traditional decryption tool where users supply a key to unlock their files. Instead, it brute-forces encryption keys (unique for each file) by exploiting the fact that the Akira encryptor generates its encryption keys based on the current time (in nanoseconds) as a seed. An encryption seed is data used with cryptographic functions to generate strong, unpredictable encryption keys. Since the seed influences the key generation, keeping it secret is critical to prevent attackers from recreating encryption or decryption keys through brute force or other cryptographic attacks. Akira ransomware dynamically generates unique encryption keys for each file using four different timestamp seeds with nanosecond precision and hashes through 1,500 rounds of SHA-256. Four timestamps used for generating keys Source: tinyhack.com These keys are encrypted with RSA-4096 and appended at the end of each encrypted file, so decrypting them without the private key is hard. The level of timing precision in the timestamps creates over a billion possible values per second, making it difficult to brute force the keys. Also, Nugroho says that Akira ransomware on Linux encrypts multiple files simultaneously using multi-threading, making it hard to determine the timestamp used and adding further complexity. CPU threads handling file encryption at different times Source: tinyhack.com The researcher narrowed down the possible timestamps to brute-force by looking at log files shared by his friend. This allowed him to see when the ransomware was executed, the file metadata to estimate the encryption completion times, and produce encryption benchmarks on different hardware to create predictable profiles. Initial attempts using an RTX 3060 were far too slow, with a ceiling of only 60 million encryption tests per second. Upgrading to an RTC 3090 didn't help much either. Eventually, the researcher turned to using RunPod & Vast.ai cloud GPU services that offered enough power at the right price to confirm the effectiveness of his tool. Specifically, he used sixteen RTX 4090 GPUs to brute-force the decryption key in roughly 10 hours. However, depending on the amount of encrypted files that need recovery, the process may take a couple of days. The researcher noted in his write-up that GPU experts could still optimize his code, so performance can likely be improved. Nugroho has made the decryptor available on GitHub, with instructions on how to recover Akira-encrypted files. As always, when attempting to decrypt files, make a backup of the original encrypted files, as there's a possibility that files can be corrupted if the wrong decryption key is used. BleepingComputer has not tested the tool and cannot guarantee its safety or effectiveness, so use it at your own risk. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  43. Earlier today, we covered the incident of Microsoft Defender flagging the Winring0 driver inside PC monitoring and fan control apps as malicious. Although at first glance it may seem like an obvious false positive, turns out there is more to the story. However, that is not the case with a couple of Visual Studio Code (VSCode) extensions that were earlier removed by Microsoft from the Visual Studio marketplace after they were marked as potentially harmful. The problem mainly occurred as there was a lot of obfuscation in the code of two themes namely "Material Theme – Free" and "Material Theme Icons – Free". Obfuscated code is a technique fairly commonly used by threat actors so it is natural that Microsoft was on red alert about it. Turns out though, that the obfuscation was not out of any ill intent and after realizing this, Microsoft's Scott Hanselman, the Vice President at Microsoft for Developer Community, has thoroughly apologized for the inconvenience and the two extensions have since been restored on the marketplace. Hanselman writes: You can find the issue here on the Visual Studio Marketplace's official GitHub repo. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  44. Gamers Nexus (2.42M subscribers) March 14, 2025 Video length: 29m 00s In this hardware news episode, NVIDIA addresses the supply and demand situation by saying it has sold "2x" the amount of RTX 50 series GPUs as 40 series. Also related to NVIDIA, there have been rumors of missing ROPS on upcoming laptops, rumors of RTX 5050 and 5060 or 5060 Ti GPUs, and news of its hotfix to resolve flickering and stability issues. In other news, Meta says it's not a pirate, Thermal Grizzly is selling 9800X3D CPUs that are pre-delidded, and EA releases source code for early Command and Conquer games. 00:00 - Recapping the Week 01:37 - NVIDIA Updates on Supply & GDC 05:47 - Rumor: NVIDIA RTX 5050, 5060 07:23 - NVIDIA Laptop ROPs Concern 13:44 - Thermal Grizzly Selling Delidded 9800X3D CPUs 15:52 - CPU-Z Missing ROPs Report 17:16 - Meta Employs Interesting Legal Strategy 20:52 - NVIDIA Addresses Black Screen Issues 22:14 - Rumor: Valve Working on VR Headset Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  45. It's the second Tuesday of the month, which means it's Patch Tuesday time again. As such, today, Microsoft is rolling out the monthly security update (also called "B release") for February 2025 on Windows Server 20H2 and Windows 10 for the latest supported versions, 20H2, 21H2, and 22H2. The new updates are being distributed under KB5053606, bumping up the builds to 19044.5608 and 19045.5608. You can find standalone links to download the new update on the Microsoft Update Catalog at this link. The major highlight of the release is security patches. This release has the following known issues: Known issues in this update Symptom Workaround Following the installation of the October 2024 security update, some customers report that the OpenSSH (Open Secure Shell) service fails to start, preventing SSH connections. The service fails with no detailed logging, and manual intervention is required to run the sshd.exe process. This issue is affecting both enterprise, IOT, and education customers, with a limited number of devices impacted. Microsoft is investigating whether consumer customers using Home or Pro editions of Windows are affected. Customers can temporarily resolve the issue by updating permissions (ACLs) on the affected directories. Follow these steps: Open PowerShell as an Administrator. Update the permissions for C:\ProgramData\ssh and C:\ProgramData\ssh\logs to allow full control for SYSTEM and the Administrators group, while allowing read access for Authenticated Users. You can restrict read access to specific users or groups by modifying the permissions string if needed. Use the following commands to update the permissions: $directoryPath = "C:\ProgramData\ssh" $acl = Get-Acl -Path $directoryPath $sddlString = "O:BAD:PAI(A;OICI;FA;;;SY)(A;OICI;FA;;;BA)(A;OICI;0x1200a9;;;AU)" $securityDescriptor = New-Object System.Security.AccessControl.RawSecurityDescriptor $sddlString $acl.SetSecurityDescriptorSddlForm($securityDescriptor.GetSddlForm("All")) Set-Acl -Path $directoryPath -AclObject $acl Repeat the above steps for C:\ProgramData\ssh\logs. Microsoft is actively investigating the issue and will provide a resolution in an upcoming Windows update. Further communications will be provided when a resolution or additional workarounds are available. Devices that have certain Citrix components installed might be unable to complete installation of the January 2025 Windows security update. This issue was observed on devices with Citrix Session Recording Agent (SRA) version 2411. The 2411 version of this application was released in December 2024. Affected devices might initially download and apply the January 2025 Windows security update correctly, such as via the Windows Update page in Settings. However, when restarting the device to complete the update installation, an error message with text similar to “Something didn’t go as planned. No need to worry – undoing changes” appears. The device will then revert to the Windows updates previously present on the device. This issue likely affects a limited number of organizations as version 2411 of the SRA application is a new version. Home users are not expected to be affected by this issue. Citrix has documented this issue, including a workaround, which can be performed prior to installing the January 2025 Windows security update. For details, see Citrix’s documentation. Microsoft is working with Citrix to address this issue and will update this documentation once a resolution is available. The Windows Event Viewer might display an error related to SgrmBroker.exe, on devices that have installed Windows updates released January 14, 2025 or later. This error can be found under Windows Logs > System as Event 7023, with text similar to ‘The System Guard Runtime Monitor Broker service terminated with the following error: %%3489660935’. This error is only observable if the Windows Event Viewer is monitored closely. It is otherwise silent and does not appear as a dialog box or notification. SgrmBroker.exe refers to the System Guard Runtime Monitor Broker Service. This service was originally created for Microsoft Defender, but it has not been a part of its operation for a very long time. Although Windows updates released January 14, 2025 conflict with the initialization of this service, no impact to performance or functionality should be observed. There is no change to the security level of a device resulting from this issue. This service has already been disabled in other supported versions of Windows, and SgrmBroker.exe presently serves no purpose. Note: There is no need to manually start this service or configure it in any way (doing so might trigger errors unnecessarily). Future Windows updates will adjust the components used by this service and SgrmBroker.exe. For this reason, please do not attempt to manually uninstall or remove this service or its components. No specific action is required, however, the service can be safely disabled in order to prevent the error from appearing in Event Viewer. To do so, you can follow these steps: Open a Command Prompt window. This can be accomplished by opening the Start menu and typing 'cmd'. The results will include “Command Prompt” as a System application. Select the arrow to the right of “Command Prompt” and select “Run as administrator”. Once the window is open, carefully enter the following text: sc.exe config sgrmagent start=disabled A message may appear afterwards. Next, enter the following text: reg add HKLM\System\CurrentControlSet\Services\SgrmBroker /v Start /d 4 /t REG_DWORD Close the Command Prompt window. This will prevent the related error from appearing in the Event Viewer on subsequent device start up. Note that some of these steps might be restricted by group policy set by your organization. We are working on a resolution and will provide an update in an upcoming release. Some of the older Windows 10 versions have also received updates today, which have been listed below with their respective release notes (KB) linked as well as links to download them at Microsoft's Update Catalog: Version KB Build Download Support 1809 KB5053596 17763.7009 Update Catalog Long-Term Servicing Channel (LTSC) 1607 KB5053594 14393.7876 Update Catalog 1507 KB5053618 10240.20947 Update Catalog It is noteworthy that Windows 10 20H2 and Windows 10 1909 reached the end of servicing. Non-LTSC editions of 21H2 have also reached the end of servicing. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  46. Microsoft's Copilot will no longer help you pirate Windows 11, but the AI assistant does have a new interface on Windows 11 and macOS. Mobile World Congress ran throughout last week, giving us another glimpse of what's on the way for consumer tech. Lenovo unveiled a solar powered concept PC and a concept laptop with an 18.1-inch foldable display. We also saw devices that will actually hit store shelves, such as the Lenovo Yoga Pro 9i Aura Edition. Outside of Mobile World Congress, Microsoft blocked its Copilot AI assistant from helping people pirate Windows 11. Copilot also got a non-pirate related update on Windows 11 and macOS. Microsoft blocks (some) Windows 11 pirates Microsoft Copilot will no longer provide a guide on how to activate Windows without a license. (Image credit: Future | Daniel Rubino) Pirating Windows 11 just got incrementally more difficult. Earlier this month, it was discovered that Microsoft Copilot would share advice on how to activate Windows 11 without a license. Now, if you ask the AI assistant about activating Windows, Copilot will ask if you would like to talk about something else. "Want to talk about something else? I'm not able to discuss that topic, but I'm always happy to chat about other things! What else is on your mind?" said Copilot to me when I asked about activating Windows 11. When pushed on the topic, Copilot said the following: "Unfortunately, I can't assist with bypassing licensing requirements for Windows 11. Using unlicensed software can have significant risks, including security vulnerabilities and lack of support from Microsoft. However, there are legitimate ways to acquire a Windows 11 license. Sometimes there are discounts or programs that can help, especially for seniors, students, or through certain promotions. If budget is a concern, there are also free operating systems like Linux that could be an alternative. If you'd like, I can help you explore some of these options!" Pirating Windows has never been difficult. Copilot helping people pirate Windows 11 was only newsworthy due to irony. Lenovo concept PCs The Lenovo ThinkBook "codename Flip" is a concept PC with an 18.1-inch foldable display. (Image credit: Future) Lenovo is the torchbearer when it comes to innovative devices these days. Plenty of PC makers try new things, but Lenovo is likely the boldest when it comes to new form factors. On that note, Lenovo unveiled the ThinkBook "codename Flip" at Mobile World Congress (MWC). That device has an 18.1-inch foldable display. That screen can flip around for sharing or stand tall. The resulting vertical screen makes the ThinkBook Flip rather top heavy. It is a concept device, so Lenovo will have to play around with the exact shape and weight distribution before shipping a device with a similar display. The Lenovo Yoga Solar PC is a concept device with built-in solar panels. (Image credit: Future) Another concept device, the Lenovo Yoga Solar PC, has solar panels in its lid. Those panels use back contact cell technology that improves efficiency. Lenovo claims the Yoga Solar PC can get one hour of playback after 20 minutes of charging in the sun. I also think the solar panels look pretty cool, but I suppose that's subjective. Lenovo Yoga Pro 9i Aura Edition An NVIDIA GeForce RTX 5070 powers the new Lenovo Yoga 9i Aura Edition. (Image credit: Windows Central | Ben Wilson) Lenovo announced more than concept devices at Mobile World Congress. The PC maker also unveiled its Yoga Pro 9i Aura Edition (Gen 10). That laptop is powered by up to an Intel Core Ultra 9 285H and up to an NVIDIA RTX 5070 laptop GPU. Those specs should be enough for heavy duty creative work. The Aura Edition branding indicates the PC meets standards for software, hardware, and AI features. The latest Yoga Pro 9i Aura Edition has a 16-inch screen that reaches up to 1,600 nits. That screen has a double layer of OLED pixels and is possibly the brightest laptop screen available. Our Cale Hunt stays on top of the best laptops with bright screens and has not found a brighter laptop display than that of the Yoga Pro 9i Aura Edition. Copilot app update An updated Copilot app on Windows 11 has native elements and is a significant improvement over the previous app. (Image credit: Windows Central) Microsoft previewed a new Copilot app this week on Windows 11. The app is built using Microsoft's native app UI framework, which is great news. When Microsoft launched its new dedicated Copilot app for Windows last year, many were disappointed to find out it was just the Copilot web view in a wrapper. The new new Copilot app that is in preview is a native app with a better interface. It also launches quicker and performs better than its predecessor. Microsoft launched its new Copilot app for Mac slightly before the Windows version entered preview. Windows Central Podcast Our Daniel Rubino and Zac Bowden talk tech each week during the Windows Central Podcast. In the most recent episode, they discuss the death of Skype, Lenovo's intriguing devices from Mobile World Congress, and updates to Microsoft's Copilot apps. You can tune into the Windows Central Podcast each week on YouTube or catch up through your favorite podcast platform. Listen on Spotify Listen on Apple Podcasts Listen on Pocket Casts Subscribe via RSS Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  47. Recently, Google completed the removal of Manifest V2-based extensions in Google Chrome, causing plenty of extensions to stop working and generating a tidal wave of frustrated customers. While the change affects all extensions that have not been upgraded to Manifest V3, the biggest noise is generated among uBlock Origin users, a popular content-blocking extension for modern browsers. The good news is that despite the change, it is still possible to make uBlock Origin and other MV2 extensions work in Chrome. They not only work but they can also be downloaded from the Chrome Web Store. All you need is a few simple tricks. Here is how to restore uBlock Origin in Chrome. Enable uBlock Origin in Chrome: Go to chrome://extensions and find uBlock Origin in the list of installed extensions. There you will see a message stating that the extension was turned off because it is no longer supported. In the bottom-right corner of the extension card, there is a small grayed-out toggle. Click it to turn on uBlock Origin in Chrome. Chrome will warn you not to enable extensions. Dismiss the warning. Note that you can do the same in Edge. Microsoft's browser still lets you turn on the extension, even though MV2-based extensions are on their way out in Microsoft Edge as well. Download and install uBlock Origin in Chrome: This section is for those who do not have uBlock Origin installed. It also applies to other MV2-based extensions that Chrome no longer allows installing. Method 1: Launch Chrome and click this link to the Chrome Web Store. Find the "Add to Chrome" button—it should be inaccessible and grayed out. Right-click the button and select "Inspect." Chrome will open its developer tools on the "Elements" tab with div class="VfPpkd-dg12Hf-ppH1rf-sM5MNb" highlighted. Click a small arrow to the left of it to expand the section. At the end of the button class section, find "disabled" and click it. Change "disabled" to "enabled," and Chrome will turn the "Add to Chrome" button back on. Click the button to download and install uBlock Origin in Google Chrome. Note that Chrome will turn off uBlock Origin the next time you launch the browser. When this happens, go to extensions and turn it back on, as described in the previous section of this guide. Method 2 is a bit more complicated as it requires manual installation. It is better suited for power users who want more control over their extensions or keep a certain release without updating to newer versions: Go to the extension's official GitHub repository and download the latest extension release for Chromium. You can also download one of the previous versions if necessary. Extract the downloaded archive wherever it is convenient. Launch Chrome and go to chrome://extensions. Toggle on Developer mode. Click "Load unpacked." Find the folder with the extracted uBlock Origin files and click "Select folder." uBlock Origin will show up in the list of all extensions. Note that there will be an "Errors" button because the extension is Manifest V2-based, which is now deprecated. Keep in mind that all those measures are only temporary. While there is no exact information on when exactly MV2 extensions will stop working with no way to bring them back, it will happen sooner or later. In such a case, switching to Firefox (it does not plan to ditch MV2-based extensions) or MV3 extensions like uBlock Origin Lite might be a better option. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  48. Nvidia has released a new graphics driver under version 572.70 WHQL. Today's release adds support for the RTX 5070 graphics card, optimizations and DLSS 4 support for FragPunk, and DLSS support for GTA V Enhanced. It also packs the recent hotfix for black screen issues. Here is the changelog: Driver 572.70 WHQL does not contain any gaming-related fixes. However, as mentioned above, it resolves problems with PCs powered by Nvidia's graphics cards booting into a black screen when connected to certain monitors via DisplayPort. Known issues in the update include the following: Nvidia 572.70 WHQL is available for PCs with 64-bit Windows 10 and 11 and the following graphics cards: Architectures RTX Series GTX Series TITAN Series Blackwell Ada Lovelace Ampere Turing Pascal Maxwell GeForce RTX 50 Series GeForce RTX 40 Series GeForce RTX 30 Series GeForce RTX 20 Series GeForce GTX 16 Series GeForce GTX 10 Series GeForce GTX 900 GeForce GTX 700 GeForce GTX TITAN X TITAN RTX TITAN V TITAN Xp TITAN X (Pascal) You can download Nvidia's latest driver from the official website or the Nvidia app. Full release notes are available here (PDF). Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  49. After launching a new Copilot app for Mac last week, Windows is now getting the same treatment with a new native app experience. Microsoft is previewing a brand-new Copilot app for Windows 11 that utilizes the company's native app UI framework for a more cohesive experience. The new Copilot for Windows, which appears to be rolling out in preview for Insiders, introduces a sidebar for different chats, mica blur effects, and native context menus and buttons that ultimately makes the app more aligned with Windows 11's design language. The company launched its new dedicated Copilot app for Windows a couple of months ago, but the app was initially just a web view of the Microsoft Copilot website. Now, it looks like Windows is getting its own fully fledged Copilot experience, complete with a native interface that is faster to launch, smoother to use, and better to look at. Functionally, the app is the same. But it's way prettier now. (Image credit: Windows Central) I was unhappy with the original web view version of Copilot for Windows, but this new experience is a major step up. The app is now a joy to use, and I'm actually finding myself more inclined to use the app for AI related tasks. Also good news is the app doesn't appear to have suffered any feature losses with the update, either. You can still use the Copilot app to chat using text with Microsoft's AI assistant, and Copilot Voice is here too. Copilot will save all your chats in the sidebar, and you can start a new chat at any point by pressing the new chat button. Copilot Voice is still here and works like a charm. (Image credit: Windows Central) There are a couple of settings, including the option to enable or disable starting the app when Windows boots, and turning on or off the alt+spacebar shortcut for the quick access version of Copilot. These were both options present in the older web view version of the app. Microsoft launched its new Copilot app for Mac last week, which introduced a beautiful native Copilot experience to the Mac platform. While it's odd that the company launched this experience first on Mac, it's good to see Windows getting the same treatment. This new Copilot for Windows app is rolling out in preview for Insiders in all channels. The app update is version 1.25023.106.0, and you can grab it from the Microsoft Store. In the meantime, let us know your thoughts on the new native Windows UI version of Copilot below! Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
  50. AMD released a new chipset driver last month for Ryzen CPUs and their accompanying AM5 and AM4 socket motherboards. The new driver package, version 7.02.13.148, brings multiple new drivers, indicated as "new program added", including one for Pluton which improves support for the Microsoft Pluton co-processor. If you are wondering, Pluton further improves chip-level security over what is offered by the TPM (Trusted Platform Module) or PTT (Platform Trust Technology) in the case of Intel. The new AMD Copilot+ PCs come with Pluton enabled, and thus a couple of new "null drivers" have been added for devices where Pluton is not enabled. The new chipset driver also brings a new "AMD Application Compatibility Database Driver" which may help improve application compatibility and system stability across Windows 11 and Windows 10. The effort matches AMD's intent to do the same for fixing its display "driver issues" using the new AMD Image Inspector tool. This new driver, although similar sounding, is different from the "AMD Software Compatibility Tool" that helps users find and install the right drivers for their system. You can find the full changelog given below: The full breakdown of the new drivers is given below: Windows 10 Windows 11 Change Details AMD Ryzen Power Plan / AMD Processor Power Management Support 8.0.0.13 8.0.0.13 No change AMD PCI Device Driver 1.0.0.90 1.0.0.90 No change AMD I2C Driver 1.2.0.126 1.2.0.126 No change AMD UART Driver 1.2.0.119 1.2.0.119 No change AMD GPIO2 Driver 2.2.0.134 2.2.0.134 No change PT GPIO Driver 3.0.3.0 3.0.3.0 No change AMD PSP Driver 5.38.0.0 5.38.0.0 Bug Fixes AMD IOV Driver 1.2.0.52 Not Applicable No change AMD SMBUS Driver 5.12.0.44 5.12.0.44 No change AMD AS4 ACPI Driver 1.2.0.46 Not Applicable No change AMD SFH I2C Driver 1.0.0.86 1.0.0.86 No change AMD USB Filter Driver 2.1.11.304 Not Applicable No change AMD SFH Driver 1.0.0.341 1.0.0.341 No change AMD CIR Driver 3.2.4.135 Not Applicable No change AMD MicroPEP Driver 1.0.44.0 1.0.44.0 No change AMD Wireless Button Driver 1.0.0.6 1.0.0.6 No change AMD PMF-6000 Series Driver 24.0.5.0 24.0.5.0 No change AMD PPM Provisioning File Driver 8.0.0.48 8.0.0.48 Bug Fixes AMD USB4 CM Driver 1.0.0.42 Not Applicable No Change AMD AMS Mailbox Driver 4.5.0.120 4.5.0.120 Bug Fixes AMD S0i3 Filter Driver 1.1.0.3 1.1.0.3 Win10 OS Support Added AMD 3D V-Cache Performance Optimizer Driver 1.0.0.10 1.0.0.10 Bug Fixes AMD SFH1.1 Driver 1.1.0.24 1.1.0.24 Bug Fixes AMD PMF-7040 Series Driver 24.2.5.0 24.2.5.0 No Change AMD Interface Driver (AMD PCI, AMD SMBuS, AMD Hetero, AMD RCEC) 2.0.0.22 2.0.0.22 New program support added AMD PMF-7736 Series Driver Not Applicable 24.1.20.0 No Change AMD PMF-8000Series Driver 25.5.22.0 25.5.22.0 Bug Fixes AMD Provisioning for OEM 1.0.0.6 1.0.0.6 No change AMD PMF Ryzen AI 300 Series Driver 1 Not Applicable 25.6.25.0 Bug Fixes AMD Application Compatibility Database Driver 1.0.0.3 1.0.0.3 New product added AMD NULL Driver for Microsoft Pluton Security Processor 1 1.0.0.0 Not Applicable New product added AMD NULL Driver for Microsoft Pluton Security Processor 2 Not Applicable 1.0.0.2 New product added You can download the driver from here on AMD's official website. Do note that the driver no longer supports Windows 10 on the latest generation of AMD mobile chips. Source Hope you enjoyed this news post. Thank you for appreciating my time and effort posting news every day for many years. News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of February): 874 RIP Matrix | Farewell my friend
    2 points
×
×
  • Create New...