Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: file Clear Filter

How to Free Up Your iPhone's Storage by Deleting Data You Don't Need

If you've owned your iPhone for a long time, you know the f when you're about to snap a photo, download an app or update your phone, when suddenly a notification pops up warning you that your iPhone storage is almost full. Maybe you've frantically tried to figure out how to free up as much space as possible without just nuking everything. But don't panic. There are several ways to regain storage space from your iPhone that don't involve starting from scratch. From offloading apps to using the c

Proposal: GUI-first, text-based mechanical CAD inspired by software engineering

Most mechanical CAD tools (SolidWorks, Fusion, FreeCAD) still lock all modeling into opaque binary files. That makes it hard to track changes, collaborate with Git, or automate builds. I’ve written a proposal for an alternative paradigm: - GUI-first, like KiCad - visual modeling is the default - Text-based source files (YAML/JSON) — readable, diffable, Git-friendly - Separation of source and result - .step, .stl and previews are built artifacts - Parametric logic is explicit - slot width =

Mastodon is improving profiles and getting ready for quote posts

is a news editor covering technology, gaming, and more. He joined The Verge in 2019 after nearly two years at Techmeme. Mastodon 4.4 is out now, and it brings a bunch of changes for things like profiles and lists and also lays the groundwork for quote posts. With profiles, you can now feature specific hashtags so that people can see all the posts you’ve tagged with those hashtags, the Mastodon says. Mastodon is also making a change to how pinned posts work: you can still pin up to five posts o

Launch HN: Morph (YC S23) – Apply AI code edits at 4,500 tokens/sec

Hey HN, I’m Tejas at Morph. We’ve built a blazing-fast model for applying AI-generated code edits directly into your files at 4,500+ tokens/sec. No more slow full-file rewrites or brittle search-and-replace hacks. Why? AI spits out code that can’t reliably be inserted into existing code. Full file rewrites, brittle search-and-replace hacks are too slow, expensive, or error-prone. Morph's approach: - Your agent outputs edits “lazily”, referencing unmodified lines in the existing file (ex: // .

Show HN: Modernized file manager and program manager from Windows 3.x

Heirloom apps Lightly modernized classics for Windows Heirloom Program Manager An alternative to the Start menu for launching shortcuts. This is a reimplementation of the classic Program Manager. Heirloom File Manager Browse, organize, and manipulate files. An alternative to File Explorer for basic tasks. This direct derivative of the classic Windows File Manager adds the following features: High-DPI screen support Recycle Bin Bookmarks Drag and drop Create and extract zip archives

Portability of Tar Features

Please note that this article is focused merely on read-wise format compatibility. In other words, it establishes how tar files should be written in order to achieve best probability that it will be read correctly afterwards. It does not investigate what formats the listed tools can write and whether they can correctly create archives using specific features. This naturally raised more questions on how portable various tar formats actually are. To verify that, I have decided to analyze the stan

Topics: file format gnu pax tar

Take Two: Eshell

30 Jun 2025 Charles Choi This is a contribution to the Emacs Carnival 2025-06: Take Two collection of posts on Christian Tietze’s blog. My first take with Eshell many years back did not leave a good impression. My early expectations was that it should act like any other shell, only to be unpleasantly surprised by it. It took a long time for me to warm up to Eshell. Upon reflection, it was because I wasn’t ready for it. Now Eshell is an inseparable part of my Emacs experience. Paradoxically th

Show HN: Semcheck – AI Tool for checking implementation follows spec

Semcheck Semcheck is a tool that uses large language models to verify that your implementation matches your specification. Define semantic rules to describe how your code should align with your specification, then let Semcheck handle the comparison. Use it as a final check before committing or merging code. Features Non-intrusive: no changes required to existing code or specification files Bring Your Own Model: supports OpenAI, Anthropic, Gemini, Cerebras and Ollama (local) Supports remote

Google Messages could give profile pages a dash of Material 3 Expressive personality (APK teardown)

Edgar Cervantes / Android Authority TL;DR In addition to other areas of the Google Messages app, Google is testing Material 3 Expressive design changes for the profile section. The profile section will soon feature updated buttons that change shape and include tap animations. Android 16 is here, but most of its Material 3 Expressive changes will be coming with the Android 16 QPR1 release later in the year. However, that doesn’t stop apps from updating themselves with Material 3 Expressive ele

Ubuntu 25.10 Raises RISC-V Profile Requirements

Canonical is bullish in promoting Ubuntu for RISC-V devices, be it enthusiast-orientated hardware like DeepComputing’s RISC-V tablet, single-board computers, or embedded equipment. But with a new long-term support (LTS) release looming, it’s rethinking the kind of RISC-V hardware it wants to support going forward. A recent bug report filed against Ubuntu’s upgrading tool confirmed a major change with regards to the RISC-V requirements for the upcoming Ubuntu 25.10 release — most existing RISC-

Max, a Real Programmer

The Story of Max, a Real Programmer Sun 29 June 2025 This is a story about Imagebin. Imagebin is the longest-lived software project that I still maintain. I'm the only user. I use it to host images, mainly to include in my blog, sometimes for sharing in other places. Imagebin's oldest changelog entry is dated May 2010, but I know it had already existed for about a year before I had the idea of keeping a changelog. Here's an image hosted by Imagebin: For years Imagebin was wide open to the pu

Topics: code err file just max

What to build instead of AI agents

Paul: Today, the scene is owned by Hugo, a brilliant mind who advises and teaches teams building LLM-powered systems, including engineers from Netflix, Meta, and the U.S. Air Force. He runs a course on the LLM software development lifecycle, focusing on everything from retrieval and evaluation to agent design, and all the intermediate steps in between. Enough talking, I’ll let him dig into today’s controversial topic: “Stop building AI agents”. ↓🎙️ P.S. I agree with him. 🤫 Hugo: I've taught

Forminator plugin flaw exposes WordPress sites to takeover attacks

The Forminator plugin for WordPress is vulnerable to an unauthenticated arbitrary file deletion flaw that could enable full site takeover attacks. The security issue is tracked as CVE-2025-6463 and has a high-severity impact (CVSS 8.8 score). It impacts all versions of Forminator up to 1.44.2. Forminator Forms is a plugin developed by WPMU DEV. It offers a flexible, visual drag‑and‑drop builder to help users create and embed a wide range of form-based content on WordPress sites. According to

Celebrate Independence Day with up to 70% off pCloud lifetime plans

Cloud storage is pretty much a must–have these days, but if there’s one thing none of us need in life it’s yet another monthly or annual subscription. This 4th July you can declare your independence from ongoing cloud fees by taking advantage of a pCloud lifetime plan – with savings as high as 70% … Premium cloud features pCloud offers all the usual cloud storage features you expect, as well as some you won’t find elsewhere. Fully automatic backups pCloud Backup keeps all your documents and

How to clear the cache on your Windows 11 PC (and why you shouldn't wait to do it)

Kyle Kucharski/ZDNET If your computer desktop looks a little chaotic and you're noticing some performance slowdown, it might be time to do a cleanup. The best way to keep things running smoothly is to ensure you're running the most updated version of Windows (you'd be surprised how many folks' devices are several updates behind). But if you're up-to-date, there are other things you can do to optimize. Also: This compact Windows PC outperforms the M4 Mac Mini in key areas - and it's on sale Wi

Play Fortnite? You can claim part of Epic's $245 million settlement payout - for one more week

Jakub Porzycki/NurPhoto via Getty Images More than 500,000 Fortnite players are in line to receive a cash payment from Epic Games after the Federal Trade Commission ruled that the game maker tricked customers into making unwanted purchases. Some people have already received payments, but there's still an opportunity for new claims. Also: Apple's $95 million Siri settlement claims are ending soon - how to secure your payout The $245 million settlement, first announced two years ago, accused th

Play Fortnite? You can get part of Epic's $245 million settlement payout - here's how

NurPhoto / Getty Images More than 500,000 Fortnite players are in line to receive a cash payment from Epic Games after the Federal Trade Commission ruled that the game maker tricked customers into making unwanted purchases. Some people have already received payments, but there's still an opportunity for new claims. Also: Apple's $95 million Siri settlement claims are ending soon - how to secure your payout The $245 million settlement, first announced two years ago, accused the publisher of us

New FileFix attack runs JScript while bypassing Windows MoTW alerts

A new FileFix attack allows executing malicious scripts while bypassing the Mark of the Web (MoTW) protection in Windows by exploiting how browsers handle saved HTML webpages. The technique, was devised by security researcher mr.d0x Last week, the researcher showed how the first FileFix method worked as an alternative to 'ClickFix' attacks by tricking users into pasting a disguised PowerShell command into the File Explorer address bar. The attack involves a phishing page to trick the victim in

Pbf2sqlite: Reading OpenStreetMap into a SQLite Database

pbf2sqlite A simple command line tool for reading OpenStreetMap .osm.pbf files into a SQLite database. Usage: pbf2sqlite DATABASE [OPTION ...] Options: read FILE Reads .osm or .osm.pbf FILE into the database rtree Add R*Tree indexes addr Add address tables graph Add graph table The command pbf2sqlite test.db read country.osm.pbf reads the OSM PBF file country.osm.pbf and creates in the database test.db the tables. OSM data can be obtained from a provider such as Geofabrik.

Topics: add database file osm pbf

OpenFLOW – Quickly make beautiful infrastructure diagrams local to your machine

OpenFLOW - Isometric Diagramming Tool OpenFLOW is a powerful, open-source Progressive Web App (PWA) for creating beautiful isometric diagrams. Built with React and the Isoflow library, it runs entirely in your browser with offline support. Features 🎨 Isometric Diagramming - Create stunning 3D-style technical diagrams - Create stunning 3D-style technical diagrams 💾 Auto-Save - Your work is automatically saved every 5 seconds - Your work is automatically saved every 5 seconds 🔒 Privacy-First

Nimtable: Open-source web UI to browse and manage Apache Iceberg tables

Nimtable: The Control Plane for Apache Iceberg™ A lightweight, easy-to-use platform to monitor, optimize, and govern your Iceberg-based lakehouse. Overview Nimtable helps you easily manage and explore Apache Iceberg catalogs. With a web-based platform designed for clarity and simplicity, Nimtable makes it easy to browse tables, run queries, analyze file distributions, and optimize storage layouts. Key Features 🌟 Multi-Catalog Support Connect to REST Catalog, AWS Glue, AWS S3 Tables, and Po

Judge rules Apple must face antitrust lawsuit brought by the US DOJ

The US Department of Justice's antitrust lawsuit against Apple will progress. US District Judge Julien Neals of New Jersey denied the tech company's motion to dismiss the lawsuit brought over its "walled garden" approach to smartphone software. "We believe this lawsuit is wrong on the facts and the law, and we will continue to vigorously fight it in court," a spokesperson from Apple said. The DOJ and several states filed the lawsuit against Apple in March 2024. Their argument was that Apple had

Tinder is mandating face checks for California residents

Tinder is requiring new users in California to verify their identities by using facial recognition, according to a report by Axios . The policy goes into effect today as a test program. The obvious reason behind this is to make sure people are who they say they are. Dating apps, after all, are a haven for scammers . The platform's Face Check feature prompts users to make a short video selfie. The face scan confirms the identity of the user by matching biometric indicators with profile photos. I

The Journey of Bypassing Ubuntu's Unprivileged Namespace Restriction

Recently, Ubuntu introduced sandbox mechanisms to reduce the attack surface, and they seemed unbreakable. However, after carrying out in-depth research, we found that the implementation contained some issues, and bypassing it was not as difficult as expected. This post will explain how we began our research at the kernel level and discovered a bypass method. We will also share some interesting stories from the process. 1. Introduction 1.1. Ubuntu’s New Sandbox Model After years of serving as

Show HN: Sink – Sync any directory with any device on your local network

sink sync any directory with 2 windows machines over your local network. no emailing yourself stuff. no cloud. no flash drives. no bs. note: this is still a veeery big wip, as there are many features that I have planned to added; you can see this on the bottom of this readme. i built this to solve a specific problem: syncing files on a locked-down school laptop where python was one of the only things i was allowed to run. features automatically finds other computers running sink on you

Structured Output with LangChain and Llamafile

2 minutes read This article shows how one can teach Llamafile to handle structured outputs like JSON. If you’re already familiar with LangChain, you’ll know that popular models like OpenAI include their own implementations of with_structured_output. Using it is straightforward: All we need is to derive a new class from Pydantic’s BaseModel. The rest happens transparently. You don’t need to teach the LLM anything. Using Llamafile This isn’t currently possible with Llamafile, which I’m using i

Hackers turn ScreenConnect into malware using Authenticode stuffing

Threat actors are abusing the ConnectWise ScreenConnect installer to build signed remote access malware by modifying hidden settings within the client's Authenticode signature. ConnectWise ScreenConnect is a remote monitoring and management (RMM) software that allows IT admins and managed service providers (MSPs) to troubleshoot devices remotely. When a ScreenConnect installer is built, it can be customized to include the remote server the client should connect to, what text is shown in the di

Getting ready to issue IP address certificates

We're almost ready to issue certificates for IP address SANs from Let's Encrypt's production environment. They'll only be available under the shortlived profile (which has a 6-day validity period), and that profile will remain allowlist-only for a while. Please note: We have more work to do before we're ready to launch this feature for the public. We don't yet have a timeline, and aren't ready to accept allowlist requests. Here's a sample staging certificate, and a site using it: Please speak