Author: ProHoster

A distribution kit for creating network storages OpenMediaVault 7.0 is available

After almost two years since the formation of the last significant branch, a stable release of the OpenMediaVault 7.0 distribution has been published, which allows you to quickly deploy network storage (NAS, Network-Attached Storage). The OpenMediaVault project was founded in 2009 after a split in the camp of the developers of the FreeNAS distribution, as a result of which, along with the classic FreeNAS based on FreeBSD, a branch was created, the developers of which set […]

SMIC ramps up processing of 300mm silicon wafers amid US sanctions

The Chinese company SMIC remains the largest national contract chip manufacturer and is among the top ten global leaders. This circumstance to some extent contributed to the introduction of sanctions against SMIC by the American authorities and their foreign policy allies, but some sources are convinced that the Chinese company continues to develop an advanced device even in such difficult conditions. Image source: SMIC Source: 3dnews.ru

IBM built AI attack protection into FCM flash drives

IBM announced that its latest fourth-generation FlashCore Modules (FCM4) server flash drives have built-in malware protection running at the firmware level. The new technology is tightly integrated with Storage Defender. Now FCM analyzes the entire data flow in real time, and then uses an AI model to identify suspicious transactions. Previously, protection in storage […]

Apple sued for too expensive iCloud and monopolization of cloud storage for iOS

A class action lawsuit was filed against Apple in the District Court for the Northern District of California. The reason was allegations that Apple created an illegal monopoly in the field of cloud services for iOS devices and inflated the cost of iCloud cloud storage services, which is contrary to the principles of fair competition and laws governing monopoly activities in the United States. Image source: Mohamed_hassan / Pixabay Source: […]

Varda Space showed what returning from orbit to Earth looks like in first person

Aerospace startup Varda Space Industries has published a video clearly demonstrating what the return of a space capsule from orbit to Earth looks like. The company's engineers attached a camera to the capsule, thanks to which everyone can literally observe the entire process from a first-person view, from separation from the carrier to entry into the atmosphere and subsequent landing. Image source: Varda Space […]

The Galileo probe found signs of oceans and oxygen on Earth

Using the Galileo probe, astronomers discovered signs of continents and oceans on Earth, as well as the presence of oxygen in its atmosphere. This “discovery” plays a key role in the development of methods for analyzing and interpreting data on exoplanets and opens new opportunities for searching and studying potentially habitable worlds. Image source: Ryder H. Strauss/arXiv, The […]

GParted and GParted Live 1.6

GParted 1.6 and GParted Live 1.6 have been released. GParted (GNOME Partition Editor) is a partition editor, as well as a system for changing the drive structure (MBR, GPT). The editor supports most file systems and partition types, but its performance depends on the presence of file system drivers in the kernel. In GParted 1.6, the insertion of an empty 1 MB area when moving partitions is removed, […]

Damn Small Linux 2024 released

The DSL 2024 distribution has been released, which is a rebirth of the old Linux distribution for weak x86 computers. The distribution is based on AntiX 23 i386. All applications included in the distribution are selected according to the following criteria: functionality, small size and number of dependencies. DSL 2024 has a large number of console applications. DSL 2024 currently comes with two window managers: Fluxbox and JWM. DSL is supplied […]

GitHub has enabled token leak protection for the API by default

GitHub announced that by default, for all public repositories, a mechanism will be enabled to protect against the entry into repositories of confidential data that was inadvertently left in the code by developers. For example, it happens that configuration files with DBMS passwords, tokens or API access keys end up in the repository. Previously, scanning was carried out in passive mode and made it possible to detect leaks that had already occurred […]

More than 100 thousand repositories with malicious code were identified on GitHub

Security researchers from Apiiro have identified the activity of attackers posting modified clones of various project repositories on GitHub, in which small changes are made aimed at committing malicious actions. As a rule, a malicious repository is created with the same name, but attached to a different organization (“github.org/org1/proj” -> “github.org/org2/proj”), or with a name slightly different from the original (typesquatting), with the expectation that the victim […]

ArtPrompt - an attack on AI systems that allows you to bypass filters using ASCII images

A team of researchers from the University of Washington, University of Illinois, and University of Chicago has identified a new method to bypass restrictions on processing dangerous content in AI chatbots built on large language models (LLM). The attack is based on the fact that the language models GPT-3.5, GPT-4 (OpenAI), Gemini (Google), Claude (Anthropic) and Llama2 (Meta) successfully recognize and take into account text formatted as ASCII graphics in queries. So […]