Author: ProHoster

A non-free fork of the GPL has been created.

An alliance of leading IT companies consisting of Oracle, Apple, Nvidia and MicroSoft has published the text of a non-free license created on the basis of GPL v3. The goals of this initiative include reducing transaction costs for large software vendors, a unified licensing space, and simplifying the accession agreement for end users. The first software licensed under the new terms was the Berkley UNIX source code, formerly owned by SCO Unix, […]

New facts about the origin of cut

New facts have emerged in the origins of the cut command in Unix. As you know, until recently it was believed that cut appeared for the first time in AT&T System III UNIX in 1982. However, British scientists, relying on the lost library of Peter I, claim that A.S. Pushkin in “Poltava” writes for the first time about this particular team, in his lines “Mazepa’s face is tormented by the cat.” […]

Nitrux 3.4.0 distribution is available. NX Desktop will not be transferred to KDE Plasma 6

The release of the Nitrux 3.4.0 distribution kit, built on the Debian package base, KDE technologies and the OpenRC initialization system, has been published. The project offers its own NX Desktop, which is an add-on to KDE Plasma. Based on the Maui library for the distribution, a set of typical user applications is developed that can be used on both desktop systems and mobile devices. For installation […]

Xiaomi is preparing Redmi Turbo 3 – a mid-range smartphone with high performance

Redmi brand president Thomas Wang announced that Xiaomi is preparing to launch the flagship Redmi Turbo series of smartphones. Representatives of this family will feature increased performance and will occupy an intermediate position between the Redmi K and Redmi Note series. The first representative of the series will be called Redmi Turbo 3. Image source: GSMArena.com Source: 3dnews.ru

Samsung will upgrade its Bixby voice assistant with generative AI

Samsung plans to introduce generative artificial intelligence (AI) technologies into the Bixby voice assistant, which will increase the attractiveness of the developer’s devices for users, CNBC reported, citing the company’s top manager. The Bixby smart assistant is used on all Samsung devices - from smartphones and smart watches to home appliances. Earlier it became known about the company’s plans to equip all […]

The Linux.org.ru project changes its license to non-free

The coordinator of the Linux.org.ru project, Maxim “maxcom” Valyansky, announced a change in the license of the source code of the forum engine from the free Apache License 2.0 to the LOLX license (Linux.org.ru Original License xD). The new license is not free according to FSF, OSI and Debian criteria. Linux.org.ru activists plan to soon create a fork under the GNU AGPL 3.0 license, which will develop independently […]

Microsoft open sourced Xbox One

Microsoft has open sourced the Xbox One. Among the open sources is the OS from Xbox One. MS took this step to port Xbox and Kinect games to Linux, FreeBSD, mobile platforms and macOS through emulation. This will dramatically increase the number of GamePass subscribers, resulting in increased subscription revenue. This step allows you to save Kinect games to your PC. […]

GNOME is dropping support for Wayland

The GNOME developers decided to drop support for Wayland because, in their words, "it makes support difficult and confusing for users (after all, they have to choose between X11 and Wayland)." Currently, Wayland has many problems (for example, non-working SSDs). Source: linux.org.ru

Vulnerability in the io_uring subsystem that allows you to gain root privileges

A vulnerability (CVE-2024-0582) has been identified in the io_uring asynchronous I/O interface provided by the Linux kernel, which could allow an unprivileged user to gain root privileges on the system. To exploit the vulnerability, normal local access to the system is sufficient, without the need to manipulate namespaces. A working exploit is now publicly available, and a second technique for exploiting the vulnerability has been described in detail. The vulnerability is caused by contacting an already released […]