
Asahi Linux: Stabiler Linux-Support für M1-Macs frühestens im Sommer
Die ersten Linux-Patches für Macs mit der ARM-CPU M1 sind verfügbar. Bis diese in stabilen Zweigen landen werden, dauert es aber noch. (Linux-Kernel, Mac)

Just another news site
Die ersten Linux-Patches für Macs mit der ARM-CPU M1 sind verfügbar. Bis diese in stabilen Zweigen landen werden, dauert es aber noch. (Linux-Kernel, Mac)
Babykameras sind oft nicht ausreichend gegen unbefugten Zugriff geschützt. Damit kann schnell das beruhigende Gefühl verschwinden, das sie vermitteln wollen. (Datensicherheit, Videoüberwachung)
Gleich drei neue Lifebook-U7-Modelle bekommen von Fujitsu Intels Tiger-Lake-Chips verpasst. Zudem ist hier viel Arbeitsspeicher erweiterbar. (Fujitsu, Notebook)
The Samsung Galaxy Chromebook 2 is a 2.7 pound convertible notebook with a 360-degree hinge, a touchscreen display, and an Intel Comet Lake processor. It’s also the first Chromebook to feature a QLED display using Samsung’s “quantum …
The Samsung Galaxy Chromebook 2 is a 2.7 pound convertible notebook with a 360-degree hinge, a touchscreen display, and an Intel Comet Lake processor. It’s also the first Chromebook to feature a QLED display using Samsung’s “quantum dot” technology to display more than a billion colors in vivid detail. First announced during the Consumer Electronics […]
The post Samsung Galaxy Chromebook 2 with QLED display now available for $549 and up appeared first on Liliputing.
Spezielle Halterungen sorgen dafür, dass Ryzen-CPUs nicht durch Adhäsionskräfte ungewollt aus dem Sockel gezogen werden. (AMD Zen, Prozessor)
Flussraubzüge, neue Fähigkeiten und Funktionsverbesserungen: Ubisoft hat das große Update 1.12 für Assassin’s Creed Valhalla veröffentlicht. (Assassin’s Creed Valhalla, Rollenspiel)
Vikings, voxels, and valor: Why we’re hooked on Steam’s newest Early Access success.
Fight it? Or tame it? In Valheim, you get to make this choice, and many others, over the span of a lengthy, randomly generated adventure.
Valheim is Steam's latest top-selling, out-of-nowhere indie game, and from some angles, it sure looks the part. Depending on what screenshots you stumble upon, you might get some serious PlayStation 1 nostalgia vibes, with characters, animals, and trees that look straight out of the first '90s Tomb Raider game.
We've seen this before when it comes to Steam Early Access hits, usually because a game maker spends more time on gameplay and depth, not screenshots. Hence, it's not surprising to notice similarities to other survival-creation fare like Minecraft and Rust, where glitchy simplicity is part of the charm. But starting and ending with the graphics in this epic, Viking-tinged tale misses the modern-gaming forest for the blocky-voxel trees.
To understand why the $20 Valheim has surpassed the 2 million sales mark in only 13 days, and why its Early Access buyers can't get enough of it, you have to scrape a few hours beneath the comparison-heady surface level. Get that far, and the game's allure becomes clearer. This is a survival game made by people who really like survival games—but don't necessarily like the genre's tedium.
Nur wenn wirklich moderne Technik zum Einsatz kommt, schafft United Internet es jetzt vielleicht noch, sein 5G-Netz auszurollen. Open RAN dürfte das nicht leisten können. Ein IMHO von Achim Sawall (5G, Nokia)
Einer Konferenz in N’Djamena sind auch Emmanuel Macron und Heiko Maas zugeschaltet
Researcher who got targets to automatically install his code gets $130,000 payout.
Enlarge (credit: Getty Images)
Last week, a researcher demonstrated a new supply-chain attack that executed counterfeit code on networks belonging to some of the biggest companies on the planet, Apple, Microsoft, and Tesla included. Now, fellow researchers are peppering the Internet with copycat packages, with more than 150 of them detected so far.
The technique was unveiled last Tuesday by security researcher Alex Birsan. His so-called dependency confusion or namespace confusion attack starts by placing malicious code in an official public repository such as NPM, PyPI, or RubyGems. By giving the submissions the same package name as dependencies used by companies such as Apple, Microsoft, Tesla, and 33 other companies, Birsan was able to get these companies to automatically download and install the counterfeit code.
Dependencies are public code libraries or packages that developers use to add common types of functionality to the software they write. By leveraging the work of thousands of their open source peers, developers are spared the hassle and expense of creating the code themselves. The developer’s code automatically downloads and incorporates the dependency, or any update to it, either from the developer’s local computer or from a public repository.