Tag Archive for 2018

Windows 95 – There’s An App For That

Windows 95 - There's An App For ThatWith all the problems Microsoft (MSFT) Windows 10 has had lately – a few of us of a certain vintage may long for simpler days when we controlled what Windows did, not Redmond. Well, it’s time to relax because Windows 95 is now available as an app for Mac, Windows, and Linux.

The Verge writes that Slack developer Felix Rieseberg is responsible for this ingenious app. The operating system is encased in electron, a framework for building cross-platform apps with HTML and CSS.

Windows 95 desktopNow nostalgia lovers can play around with Windows 95 in an electron app. Mr. Rieseberg has published the source code and app installers for this project on Github, and classic apps like Solitaire, Wordpad, phone dialer, MS Paint, and Minesweeper all run as you’d expect. Sadly, Internet Explorer isn’t fully functional as it simply refuses to load pages. It does have floppy disk support.

As Mr. Rieseberg suggests, if you were hoping to run Doom, you’re probably better off doing it through an actual virtualization app, but it surprisingly does work. He admits it only worked well “by accident and was mostly a joke.”

The app is only 129MB in size. Once it’s running it surprisingly only takes up around 200MB of RAM, even when running all the old Windows 95 system utilities, apps, and games. If you run into any issues with the app you can always reset the Windows 95 instance inside the app and start over again.

Enjoy this trip down memory lane.

rb-

OK – Cut Windows 95 some slack, the 20something-year-old OS is the first step-up from 16-bit DOS to 32-bit Windows NT. But more importantly, it introduced the Windows graphical user interface that so many of us have a love/hate relationship with.

As you’d figure, running Windows 95 these days is mostly just for a laugh. Windows 95 is still popular after 20 years. The OS has appeared on the Apple Watch, Android Wear smartwatch, and even the Xbox One.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What’s Superposition and Entanglement?

What's Superposition and Entanglement?Quantum computers can achieve performance orders of magnitude faster than even today’s largest super computersQuantum computers can outperform classical computers by exploiting the quantum mechanical principles of superposition and entanglement.

It’s only when you look at the tiniest quantum particles – atoms, electrons, photons and the like – that you’ve seen these befuddling phenomena. They are perplexing because we don’t experience superposition and entanglement, in our day-to-day lives. They even challenged some of the greatest minds of the 20th century. Nobel prize-winning physicist Richard Feynman said, “Nobody understands quantum mechanics.” Einstein described quantum entanglement as “spooky action at a distance.

Superposition and entanglement allow quantum computers to perform unprecedented amounts of parallelism. They do not need the multiple replication of hardware  required in a classical computer to do the same work.

Quantum superposition

Quantum superpositionQuantum superposition is the phenomenon where a qubit can exist in multiple states or places at the exact same time. Something can be “here” and “there,” or “up” and “down” at the same time. The quantum superposition “up” and “down” is lost after a measurement. We are left with a particle in one known state. This doesn’t make intuitive sense but it’s one of the weird realities of quantum physics.

Quantum entanglement

Quantum entanglementQuantum entanglement is an extremely strong correlation between quantum particles. It is so strong that actions performed on one affect the other, even if placed at opposite ends of the universe. This seemingly impossible connection inspired Einstein to describe entanglement as “spooky action at a distance.

The transfer of state between quantum particles takes place at a speed of at least 10,000 times the speed of light, possibly even instantaneously, regardless of distance.

Live Science Quantum entanglement infographic
Source:LiveScience

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

Halloween Fails

Halloween FailsHalloween is here – giving techies a reason to dress up as your favorite tech-inspired costume or better yet costume fails. You won’t believe these incredible Halloween costume fails. When people get Halloween costume ideas from their job, things can get scary fast. … here is some proof!

Google Map Guides

Google Maps costume

Code Coding costume

Identity theft

Identity theft costume

Clippy

 

The Blue Screen of Death

BSOD costume

Error 404 Page

Costume not found costume

Computer Man

Computer guy halloween costume

 

iPug

iPug halloween costume

Cloud computing

 

Cloud computing halloween costume

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

All The Famous People You Shouldn’t Google

All The Famous People You Shouldn't GoogleIt’s the most dangerous celebrity time again. For its 12th annual survey of risky famous people online, cybersecurity firm McAfee recently crowned Ruby Rose the most dangerous celebrity on the internet. McAfee says that searching for Ruby Rose on the Intertubes was more likely to land users on websites that carry viruses or malware than any other celebrity in 2018.

Ruby Rose the most dangerous celebrity on the internetRuby Rose has played some dangerous characters, like an inmate in “Orange Is the New Black” and a scientist battling a prehistoric shark in “The Meg.” But the actress herself is now officially dangerous. Rose is a model and MTV VJ who may have gotten a burst of online interest when she was named to play Batwoman on an upcoming CW series. Ms.Rose unseated last year’s most dangerous celeb, Avril Lavigne.

The rest of the 10 most riskiest famous people

McAfee identified the riskiest celebrities around the world include:

  • Debra MessingJann Arden is the most dangerous celebrity to search online, in Canada.
  • Kim Kardashian is the most dangerous celebrity to search for online in the UK and Belgium in 2018.
  • In India, Bollywood actor Ileana D’Cruz is the riskiest.
  • Lucy Liu topped Australia’s list of the Most Dangerous Celebrities.
  • Diana Kruger was named the riskiest celerity in Germany.

McAfee says the survey highlights the danger of clicking on suspicious links. The cybersecurity firm urges internet users to think before they click and consider the risks associated with searching for downloadable content. They also urge users to apply updated security fixes. The company used its own site ratings to compile the celebrity list and used searches on Google, Bing, and Yahoo.

rb-

This is McAfee’s 12th annual dangerous celebrity search. I have covered this since 2009. Some of the riskiest celebs alumni include Heidi KlumBetty WhiteTom BradyEmma Watson, and Will Smith.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Protect Yourself from Facebook

Protect Yourself from FacebookJust in case you have been sleeping under a rock the past couple of weeks, social media giant Facebook (FB) was hacked again. In a presser on 10/12/2018, the social networker admitted that nearly 30 million Facebook users were hacked. This is on top of the 50 million user accounts that Mark Zuckerberg’s company allowed Cambridge Analytics to steal.

Facebook did not apologize for exposing its users’ informationDuring the presser, Facebook did not apologize for exposing its users’ information but noted that it was cooperating with the FBI, the US Federal Trade Commission, the Irish Data Protection Commission, and other authorities on the data breach.

The attack involved the capture of Facebook “access tokens,” or digital keys that allow websites to recognize who someone is and keep them logged in. Using accounts they already controlled, the attackers used an “automated technique” to exploit Facebook’s “View As” functionality and steal access tokens for some 400,000 people. Hackers then used friend lists from those 400,000 accounts to obtain access tokens for another 30 million people (Here’s how to find out if you were hacked). Facebook tracked this hack to a change it made to its video uploading feature over a year ago in July 2017, and how that change affected View As.

Facebook confirmed on Friday that the hack compromised the personal and contact information of 30 million users. The compromised personal data includes:

  • Information sharingName
  • Phone number
  • Email address
  • Username,
  • Gender,
  • Locale/language,
  • Relationship status,
  • Religion,
  • Hometown,
  • Self-reported current city,
  • Birthdate,
  • Device types used to access Facebook,
  • Education,
  • Work,
  • The last 10 places they checked into or were tagged in,
  • Website,
  • People or Pages they follow and,
  • The 15 most recent searches.

rb-

Mozilla Firefox web browserI have been warning about the dangers of Facebook since 2011. I use the Facebook Container extension for Firefox to helps prevent Facebook from tracking me around the web. The Facebook Container is an extension to the Desktop Firefox 57 and higher (it does not work on Firefox for mobile).

The Facebook Container is a tool to limit what data others can obtain from you. It works by isolating your Facebook identity into a separate container that makes it harder for Facebook to track your visits to other websites with third-party cookies.

When you install the extension it deletes the Facebook cookies on the computer and logs you out of Facebook. The next time you navigate to Facebook it will load in a new blue-colored browser tab (the “Container”).

Facebook containerYou can log in and use Facebook normally when in the Facebook Container. If you click on a non-Facebook link or navigate to a non-Facebook website in the URL bar, these pages will load outside of the container.

Clicking Facebook Share buttons on other browser tabs will load them within the Facebook Container. You should know that using these buttons passes information to Facebook about the website that you shared from.

Because you will be logged into Facebook only in the Container, embedded Facebook comments and Like buttons in tabs outside the Facebook Container will not work. This prevents Facebook from associating information about your activity on websites outside of Facebook to your Facebook identity.

 Facebook Share buttons passes information to Facebook about the website that you shared fromIn addition, websites that allow you to create an account or log in using your Facebook credentials will generally not work properly. Because this extension is designed to separate Facebook use from use of other websites, this behavior is expected.

It is important to know that this extension doesn’t prevent Facebook from mishandling the data that it already has, or permitted others to obtain, about you. Facebook still will have access to everything that you do while you are on facebook.com, including your Facebook comments, photo uploads, likes, any data you share with Facebook connected apps, etc.

It is important to remember that other ad networks will try to correlate your Facebook activities with your regular browsing.

In addition to using the Facebook Container extension, you can further protect yourself from Facebook by changing your Facebook settings, using Private Browsing, enabling Tracking Protection, and blocking third-party cookies.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.