Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sh Clear Filter

Linux Distros for Gaming: CachyOS Takes Over, According to ProtonDB

It’s summer. Usually everything is pretty quiet. There’s no reason to make waves unless you are on the beach. Just out of curiosity, I was checking a few days ago what happens to the Linux distros used for gaming, expecting no change at all from a few months ago. Boy, I was wrong. I told you last time that CachyOS was the fastest growing distro back in May 2025. You would expect such statements to tamper down over time: you can’t usually grow forever on a very competitive market. Well… until now

The FastLanes File Format [pdf]

To see all available qualifiers, see our documentation . Saved searches Use saved searches to filter your results more quickly We read every piece of feedback, and take your input very seriously. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

The POSIX specification of vi

Certain terminals do not have all the capabilities necessary to support the complete vi definition. When these commands cannot be supported on such terminals, this condition shall not produce an error message such as "not an editor command" or report a syntax error. The implementation may either accept the commands and produce results on the screen that are the result of an unsuccessful attempt to meet the requirements of this volume of POSIX.1-2024 or report an error describing the terminal-rel

Vet is a safety net for the curl | bash pattern

vet is a command-line tool that acts as a safety net for the common but risky curl | bash pattern. It lets you inspect remote scripts for changes, run them through a linter, and require your explicit approval before they can execute. Don't just run it, vet it. The Problem We've all seen this pattern for installing software: # This is convenient, but you're blindly trusting the remote script. curl -sSL https://example.com/install.sh | bash This is dangerous. The script could be malicious, th

Microsoft fixes SharePoint zero-day exploits used in cyberattacks and ransomware - how to patch them

Kiryl Pro motion / Getty Images Microsoft has patched three critical zero-day SharePoint security flaws that hackers have already exploited to attack more vulnerable organizations. Responding to the exploits, the software giant initially issued fixes just for SharePoint Server Subscription Edition and SharePoint Server 2019, and then eventually rolled out a patch for SharePoint Server 2016 as well. Designated as CVE‑2025‑53771 and CVE‑2025‑53770, the two vulnerabilities apply only to on‑premis

Donkey Kong Bananza review: Nintendo's latest 3D platformer is an instant classic

The best Nintendo games do two things. The first is introducing a delightful gaming mechanic — take Ultrahand in The Legend of Zelda: Tears of the Kingdom or Cappy in Super Mario Odyssey for some recent examples. The second is building a world around that mechanic for players to explore. Obviously games are more than one specific tool, and building a compelling game around a good mechanic is no small task. But when it all comes together, look out. You’ve got a game that people will remember for

Colodebug: A simple way to improve bash script debugging (2021)

COLODEBUG: a simple way to improve bash script debugging In this article, I will show you an easy-to-use, simple, and non-disruptive way to extend a GNU bash script by a few lines that can help make sense of its execution flow at runtime a fair bit easier. Using this method will also allow you to effortlessly add a “verbose” execution mode to scripts you create or extend. It also improves the usefulness of set -x aka xtrace mode. The method is compatible with zsh, and maybe also other advanced

Topics: bash dev script sd ssds

The VTuber world is in crisis over ‘owed’ donations

is a reporter who covers the business, culture, and communities of video games, with a focus on marginalized gamers and the quirky, horny culture of video game communities. On July 21st, 6,669-year-old demon queen Ironmouse, posted an 11-minute video explaining that she is leaving her talent management agency, VShojo. Ironmouse is a VTuber, or “virtual YouTuber” — a type of a streamer who doesn’t typically show their human face, instead creating elaborate digital personas to create content. “I

Vet is a safety net for the risky curl | bash pattern

vet is a command-line tool that acts as a safety net for the common but risky curl | bash pattern. It lets you inspect remote scripts for changes, run them through a linter, and require your explicit approval before they can execute. Don't just run it, vet it. The Problem We've all seen this pattern for installing software: # This is convenient, but you're blindly trusting the remote script. curl -sSL https://example.com/install.sh | bash This is dangerous. The script could be malicious, th

Zenbivy Light Bed Review: Still the Best Backcountry Sleep System

Zenbivy, renowned makers of outdoor bedding, have a clever quilt-and-sheet backcountry sleep system that gave me the best sleep I’ve ever had on the trail. The only problem with the original version was the weight, which was more than I generally like to carry on longer trips. Zenbivy has an ultralight version of its bed, but the fabrics aren't nearly as nice and soft as the original. This year Zenbivy updated its Light Bed, which sits between the ultralight and the regular (both of which were

Android’s Apple-inspired Handoff feature is moving closer to completion (APK teardown)

Google TL;DR Android’s Handoff functionality is taking shape, with new options for cross-device file sharing now visible. We also saw glimpses of app sharing, which could allow you to access apps installed on other devices. The toggles and buttons are not active, which suggests that Google may still modify how these features function. Apple’s ecosystem is one of its most compelling selling points, and Google is eyeing the same success by working on its adaptation in Android. Some of the feat

Surfshark vs. CyberGhost: Which VPN should you get?

Allison Murray/ZDNET Surfshark and CyberGhost are consistently ranked among the top VPNs. They are high-value yet relatively affordable VPNs, which is why most users love them. Also: NordVPN vs Surfshark One unique thing about Surfshark is that there's no cap on the number of devices you can connect. It shares a lot with NordVPN, especially from a security point of view. But it's not as streaming-centered as CyberGhost. Also, I had minor but persistent server connection issues with the app, b

Thawing vacuum-packed fish correctly (2024)

Thawing vacuum-packed fish correctly Improper thawing of vacuum-packed fish can lead to a foodborne illness. Learn how to do it safely. Looking for vacuum-packed fish is an excellent way to purchase fish in the grocery store. Vacuum packaging keeps the fish from drying out by preventing water loss; it also can ensure the fish is packaged at peak quality. Vacuum packaging, also called reduced oxygen packaging (ROP), limits oxygen and allows for extended shelf life in the freezer by reducing od

Are portable wind generators a viable alternative for solar power? My verdict after testing one at home

ZDNET's key takeaways The Shine Turbine kit is on sale for $279, while the Essentials Kit is on sale for $342. The kit includes everything you need to turn wind into electrical energy, and the turbine features a 12,000 mAh battery. There are limitations, which include the weight of the kit and the 40W of power it taps out at. View now at Shineturbine The Shine Turbine is on sale for $280, a $120 savings off its normal $400 price. You can also get the Shine Essentials kit on sale for $342. I

Americans Are Obsessed With Watching Short Video Dramas From China

My partner recently confessed something to me about his screen-time habits: When he’s giggling at his phone, he’s often watching short English-language soap operas that have begun showing up on his social feeds. The plots are basic, the acting is exaggerated, and the performers are stereotypically good-looking, but the constant twists and turns keep him spellbound and wanting more. I knew exactly where these videos were coming from. It’s been four years since I first heard about the exploding p

IBM shares drop as software revenue misses

IBM CEO Arvind Krishna appears at the World Economic Forum in Davos, Switzerland, on Jan. 16, 2024. IBM shares fell as much as 6% in extended trading on Wednesday after the tech conglomerate issued second-quarter results that topped Wall Street projections. Here's how the company did in comparison with LSEG consensus: Earnings per share: $2.80 adjusted vs. $2.64 expected $2.80 adjusted vs. $2.64 expected Revenue: $16.98 billion vs. $16.59 billion IBM's revenue increased nearly 8% year over

Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage

Hundreds of organizations around the world suffered data breaches this week, as an array of hackers rushed to exploit a recently discovered vulnerability in older versions of the Microsoft file-sharing tool known as SharePoint. The string of breaches adds to an already urgent and complex dynamic: Institutions that are longtime SharePoint users can face increased risk by continuing to use the service, just as Microsoft is winding down support for a platform in favor of newer cloud offerings. Mic

Show HN: TheProtector – Linux Bash script for the paranoid admin on a budget

theProtector Linux Bash Script for the Paranoid Admin on a Budget - real-time monitoring and active threat response TheProtector Linux security tool for the paranoid on a budget - not perfect but better than most TheProtector is comprehensive security monitoring for Linux systems. Built for DEfense Only What It Does TheProtector monitors your Linux system in real-time and actively responds to threats: Real-time Monitoring: Process execution and behavior analysis Network connections and

What to know about ToolShell, the SharePoint threat under mass exploitation

Government agencies and private industry have been under siege over the past four days following the discovery that a critical vulnerability in SharePoint, the widely used document-sharing app made by Microsoft, is under mass exploitation. Since that revelation, the fallout and the ever-increasing scope of the attacks have been hard to keep track of. What follows are answers to some of the most common questions about the vulnerability and the ongoing exploitation of it, which collectively is be

Shark Week 2025: How to Stream the All the Splashy Programming

Looking for sharks? You've paddled to the right place. Discovery Channel's Shark Week programming event is underway, bringing loads of shark-centric content for those who want to celebrate the iconic top predator. It's the kind of annual tradition that shines on the right screen. According to a press release, Shark Week 2025 will include 20 hours of new specials debuting Sunday, July 20, through Saturday, July 26. The first program up is Dancing with Sharks, which involves "an unprecedented und

Microsoft fixes three SharePoint zero-day exploits used in series of cyberattacks - how to patch them

Olemedia / Getty Images Microsoft has patched three critical zero-day SharePoint security flaws that have already been exploited by hackers to attack a larger number of vulnerable organizations. Responding to the exploits, the software giant initially issued fixes just for SharePoint Server Subscription Edition and SharePoint Server 2019 and then eventually rolled out a patch for SharePoint Server 2016 as well. Designated as CVE-2025-53771 and CVE-2025-53770, the two vulnerabilities apply only

Tesla set to report second-quarter earnings after the bell

Elon Musk, chief executive officer of SpaceX and Tesla, attends the Viva Technology conference at the Porte de Versailles exhibition center in Paris, June 16, 2023. Tesla will report second-quarter results after the close of regular trading on Wednesday. Here's what Wall Street expects, according to an average of estimates compiled by LSEG: Earnings per share : 43 cents : 43 cents Revenue: $22.74 billion Revenue in the period is expected to drop 11% from a year earlier, marking a second str

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

Olemedia / Getty Images Microsoft has patched two critical zero-day SharePoint security flaws that have already been exploited by hackers to attack vulnerable organizations. Responding to the exploits, the software giant has issued fixes for SharePoint Server Subscription Edition and SharePoint Server 2019, but is still working on a patch for SharePoint Server 2016. Designated as CVE-2025-53771 and CVE-2025-53770, the two vulnerabilities apply only to on-premises versions of SharePoint, so org

Hundreds of organizations breached by SharePoint mass-hacks

Security researchers say hackers have breached at least 400 organizations by exploiting a zero-day vulnerability in Microsoft SharePoint, signalling a sharp rise in the number of detected compromises since the bug was discovered last week. Eye Security, a Dutch cybersecurity firm that first identified the vulnerability in SharePoint, a popular server software that companies use to store and share internal documents, said it had identified hundreds of affected SharePoint servers by scanning the

Wallpaper Wednesday: More great phone wallpapers for all to share (July 23)

C. Scott Brown / Android Authority Welcome to Wallpaper Wednesday! In this weekly roundup, we’ll give you a handful of Android wallpapers you can download and use on your phone, tablet, or even your laptop/PC. The images will come from folks here at Android Authority as well as our readers. All are free to use and come without watermarks. File formats are JPG and PNG, and we’ll provide images in both landscape and portrait modes, so they’ll be optimized for various screens. For the newest wall

US nuclear weapons agency breached using Microsoft SharePoint hack

The US government agency in charge of designing and maintaining nuclear weapons was among those breached by a hack of Microsoft's SharePoint server software, Bloomberg reported. However, attackers weren't able to obtain any sensitive or classified information, according to an unnamed source with knowledge of the matter. The breach occurred at the National Nuclear Security Administration, an arm of the Energy Department responsible for producing and dismantling nuclear arms. "On Friday, July 18t

I'm Unsatisfied with Easing Functions

I'm unsatisfied with easing functions You've probably encountered easing functions before. If you're a creative coder, you've likely heard of them or used them. If you're a user, you've certainly interacted with them. They're everywhere, and they give a little more life to computer generated animations. Taking it easy For the uninitiated: let's say you've got a circle that you want to move from left to right over the course of a second. We can conceptualize this by converting the time into pr

US agency responsible for nuclear weapons was breached in Sharepoint hack [U]

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US. Update: Bloomberg reports that the National Nuclear Security Administration was among the organizations breached – see the end of the piece … Microsoft said that there were “active attacks targeting on-premises servers.” US fede

US nuclear weapons agency reportedly breached in Microsoft SharePoint attacks

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Hours after Microsoft revealed hacking groups affiliated with the Chinese government have been exploiting a flaw in its SharePoint software, Bloomberg News reports that the National Nuclear Security Administration has also been breached in the attacks. A single source tells Bloomberg that the department, which provides the Navy with nuclear reactors for submarines, was caught

Microsoft servers hacked by Chinese groups, says tech giant

Microsoft servers hacked by Chinese groups, says tech giant "Investigations into other actors also using these exploits are still ongoing," Microsoft said in a statement. The US tech giant has released security updates in response and has advised all on-premises SharePoint server customers to install them. China state-backed Linen Typhoon and Violet Typhoon as well as China-based Storm-2603 were said to have "exploited vulnerabilities" in on-premises SharePoint servers, the kind used by firms