9 stories
·
0 followers

Microsoft releases Windows Terminal 1.0

1 Share

Microsoft revealed in May 2019 that it was working on an open source terminal application for Windows which it called Windows Terminal. The company released the first preview of Windows Terminal in June 2019 and regular updates in the months that followed.

Yesterday, the company announced that Windows Terminal 1.0 is available. The first stable version of the terminal application is available as a download from the Microsoft Store and from the GitHub repository.

The program requires Windows 10 version 18362.0 or higher (that is Windows 10 version 1903 or higher); it won't run on earlier versions of Windows 10.

Windows Terminal

windows terminal tabs

Windows Terminal supports multiple command line applications as well as tabs and panes. One of the main advantages of Windows Terminal is that it is possible to use multiple terminal applications from a single window.

Users can load PowerShell, the Command Prompt as well as other terminals including those provided by installed Windows Subsystem for Linux distributions next to each other. Options include displaying these as tabs or in a single tab as panes.

Another strength of Windows Terminal is that it supports customization options. These include changing backgrounds, color schemes, fonts, key bindings and more.

Windows Terminal makes use of GPU acceleration to render text. Microsoft notes that the feature improves the user experience significantly. The program supports Unicode and UTF-8 and features Microsoft's latest font, Cascadia Code. Interested users can check out variants of the font on the official GitHub repository.

Windows Terminal Preview

Microsoft launched a preview channel for Windows Terminal to showcase and test new features. The channel will receive monthly updates from June 2020 on according to Microsoft. Interested users can check out the Windows Terminal Preview page on the Microsoft Store or the GitHub releases page.

Closing Words

Windows Terminal is an open source terminal application for Windows to run one or multiple command line applications. The support for tabs and panes makes it an excellent tool for users, administrators or developers in particular, who use different command line applications regularly.

Windows Terminal is only available for recent versions of the company's Windows 10 operating system and only supplied as a Microsoft Store application.

Now You: Have you tried Windows Terminal?

Thank you for being a Ghacks reader. The post Microsoft releases Windows Terminal 1.0 appeared first on gHacks Technology News.

Read the whole story
digitalink2008
1585 days ago
reply
Share this story
Delete

Lifehacker Pack for Chrome: Our List of the Essential Extensions

1 Share

Lifehacker Pack for Chrome: Our List of the Essential Extensions

Google's Chrome browser is packed full of an incredible amount of extensions that add all sorts of functionality. It's tough to sift through the store to find what's useful though, so let us save you some time with this collection of the best Chrome extensions.

Read more...








Read the whole story
digitalink2008
3713 days ago
reply
Share this story
Delete

Let’s talk server monetisation!

2 Comments and 3 Shares

11 copy

Hello!

Let’s get one thing clear: we love it when Minecrafters host servers. Tiny or massive, running vanilla Minecraft or loads of mods, a heavily modded version, we think they’re all great. Playing with friends in persistent worlds is awesome. Everyone knows that.

Over the past week there’s been lots of discussion about Minecraft servers and your right to monetise them. Legally, you are not allowed to make money from our products. There has been one exception to this rule so far – Minecraft videos. We’re about to make a second exception – Minecraft servers.

Hosting servers can be expensive. We want to give hosts a way to cover their costs. That said, we don’t want our players to be exploited exploited, or to have a frustrating time unless they pay. The following rules, which may be tweaked at a later date, have been created with these those points in mind.

You are allowed to charge players to access your server
So long as the fee is the same for all players, you are allowed to charge for access to your server. You are not allowed to split your playerbase into paying, and non-paying users, nor can you restrict gameplay elements to different tiers of player.

Basically, if you’re charging for access to your server, you are selling a “ticket” and there can only be one type of ticket, regardless of no matter how much people are willing to spend.

You are allowed to accept donations
You are allowed to accept donations from your players. You can thank them publicly publicly, or in-game, but can’t give preferential treatment for donating. You are not allowed to restrict gameplay features in an attempt to make money.

You are allowed to provide in-game advertising or sponsorship opportunities
You

Running servers can be expensive, with that in mind, you
are allowed to put adverts in your Minecraft worlds to help with costs. If used Used within reason, adverts and sponsorship can be appropriate good ways to fund a server.

You are allowed to sell in-game items so long as they don’t affect gameplay
We don’t mind you selling items in game, but they must be purely cosmetic. Pets, hats, and particle effects are OK, but swords, invincibility potions, and man-eating pigs are not. We want all players to be presented with the same gameplay features, whether they decide to pay or not.

There is one exception to this rule – capes! We have a lot of fun making cool capes for extra-special members of our community and Minecon attendees. We’d like to keep them as exclusive as possible. So, yeah, no capes please,  even if you’re giving them away for free. for free or otherwise.

You cannot charge real-world cash for in-game currency
We don’t mind in-game you using currencies which are earned through playing, but you are not allowed to sell them for real-world cash. Remember – if the stuff you sell affects gameplay, we’re not cool with it.

Don’t pretend to be us. Provide us, and provide your customers with loads of info info!
If you do decide to monetise your server, you must clearly state that the purchase is not associated with Mojang, declare who the money is going to, and provide a purchase history and contact details. You should also check up on the legality of selling digital items in your specific region.

Thanks for reading!
As I hope you’ve noticed, these rules are making attempts to prevent Minecraft servers becoming “pay-to-win.” We hate the idea of server hosts restricting Minecraft’s features to players who have already bought our game! It seems really mean.

We’re hoping that these rules will give hosts opportunity to continue creating awesome Minecraft worlds, and for our players to enjoy them without being forced to spend.

I’m sure we’ll get loads of questions about this subject over the next few days. I’ll prepare a follow-up post once I’ve gathered your queries.

Have a good day!

Owen – @bopogamel, and your buddies at Mojang.

Read the whole story
digitalink2008
3755 days ago
reply
Share this story
Delete
2 public comments
jbloom
3755 days ago
reply
Seems very fair! As a former server owner in 2010-11 this is a great compromise.
Columbus, Ohio
digitalink2008
3755 days ago
There was really nothing i hated more that running my server and having to explain why I'm not like those other server ops trying to get rich quick off their players. I'm glad to see some ground rules. Though, I wonder how much teeth Mojang will put behind them.

Indoor Garden Ideas

1 Comment

With many of us living in overcrowded cities and towns, the craving for our own patch of natural green space can too often go unsatisfied. Many of us make do with the odd pot plant or window box, but in this piece we’ve rallied together 10 approaches to the indoor garden.

A narrow strip of landing space is utilized in this home with the installation of a long planter, enabling the planting of a path of bamboo that stretches up the staircase.
A narrow strip of landing space is utilized in this home with the installation of a long planter, enabling the planting of a path of bamboo that stretches up the staircase.

If you long to see the trees stretching their branches out over the countryside, then how about a mini version? A bonsai tree offers the same stunning silhouette as the beautiful green giants, and a mossy base creates a rolling hillside. The small scene in its entirety acts almost like a living snapshot.
If you long to see the trees stretching their branches out over the countryside, then how about a mini version? A bonsai tree offers the same stunning silhouette as the beautiful green giants, and a mossy base creates a rolling hillside. The small scene in its entirety acts almost like a living snapshot.

For something sturdier, that doesn't require the delicate touch of green fingers, how about a cactus cutaway like these? Simply section out part of your floor plan–however big or small–plant a few prickly friends and fill with pebbles for an attractive and clean finish.
For something sturdier, that doesn’t require the delicate touch of green fingers, how about a cactus cutaway like these? Simply section out part of your floor plan–however big or small–plant a few prickly friends and fill with pebbles for an attractive and clean finish.

This indoor balcony garden has a cascading mass of greenery that overhangs the space below. This kind of design looks great in an open plan space, over a mezzanine or even as part of a large hallway design.
This indoor balcony garden has a cascading mass of greenery that overhangs the space below. This kind of design looks great in an open plan space, over a mezzanine or even as part of a large hallway design.

Not many people have the space for this kind of interior landscaping, but it really does look stunning! Lit by skylights, a stream with freely swimming koi fish cuts through shrubs and quaint al fresco-style dining areas.
Not many people have the space for this kind of interior landscaping, but it really does look stunning! Lit by skylights, a stream with freely swimming koi fish cuts through shrubs and quaint al fresco-style dining areas.

Nestled in a light well, a grassy border decorates this long bathroom space. The lush green strip brings a sense of health and well being–a perfect pick me up for the early morning routine.
Nestled in a light well, a grassy border decorates this long bathroom space. The lush green strip brings a sense of health and well being–a perfect pick me up for the early morning routine.

This bathroom enjoys a fuller garden complete with palm trees for a tropical bathing experience; you can even take a shower beneath the fronds.
This bathroom enjoys a fuller garden complete with palm trees for a tropical bathing experience; you can even take a shower beneath the fronds.

Vertical gardens like this one use up minimal floor space, so you can enjoy a huge amount of greenery in a home that has very little square footage.
Vertical gardens like this one use up minimal floor space, so you can enjoy a huge amount of greenery in a home that has very little square footage.

This suspended garden looks delicate and pretty.
This suspended garden looks delicate and pretty.

Indoor salad gardens are practical in the kitchen.
Indoor salad gardens are practical in the kitchen.

For more regular updates from Home Designing, join us on Facebook.

If you are reading this through e-mail, please consider forwarding this mail to a few of your friends who are into interior design. Come on, you know who they are!

Related Posts:

Read the whole story
digitalink2008
3847 days ago
reply
Some great inspiration here.
Share this story
Delete

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

1 Share
A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on fourclassifiedGCHQdocumentspresented to the NSA and the other three partners in the English-speaking“Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.” Operations” (note: this document may take a couple of minutes to appear at the link).

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” world”, including “information ops (influence or disruption).” disruption)”.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing tothis studyshe published, Professor Coleman vehemently contested the assertion that “there isanythingterrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” Cell”, devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” attack”, while dissecting how human beings being can be manipulated using “leaders,” “trust,” “leaders”, “trust, “obedience” and “compliance”:


The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

The post How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations appeared first on The Intercept.

Read the whole story
digitalink2008
3856 days ago
reply
Share this story
Delete

"Limitless" is the Coolest Graffiti Time-Lapse You'll See

1 Comment

Submitted by: Unknown

Read the whole story
digitalink2008
3953 days ago
reply
wickedly cool graffiti time lapse
Share this story
Delete
Next Page of Stories