• chevron_right

      Revivez l’expérience des anciens geeks avec PCjs

      news.movim.eu / Korben · Friday, 31 March, 2023 - 07:00 · 1 minute

    Mis au point par Jeff Parsons qui a eu le plaisir de découvrir l’informatique dans les années 70/80, PCjs est un code en javascript qui est capable d’émuler toute une série de matos et de logiciels comme la calculatrice TI-57, le premier Space Invaders (1978), évidemment Multiplan d’IBM (1982), Windows 1.0 jusqu’à 95 ou encore des jeux comme Wolfenstein 3D (1992) ou Dune II (1992).

    Cela va vous permettre de vive l’expérience de ces vieux coucous avec leurs CPU ultra pas rapides, des sons bippés à couper le souffle et leurs interfaces hautes en couleurs, tout ça sans avoir à quitter votre navigateur. Et oui car tout est accessible directement via ce site : https://www.pcjs.org .

    PCjs - émulateur de système d'exploitation vintage des années 80

    L’idée évidemment est de préserver un petit peu de ce patrimoine informatique et logiciel et bien sûr de se faire plaisir sans galérer à retrouver de vieilles disquettes ou même un logiciel de virtualisation compatibles.

    Voici tout ce que vous allez expérimenter sur PCjs :

    • Calculatrice programmable TI-57 (1978)
    • Ohio Scientific Challenger 1P (1978)
    • Space Invaders (1978)
    • Microsoft Adventure (1981)
    • DONKEY.BAS de PC DOS 1.00 (1981)
    • VisiCalc (1981)
    • Multiplan 1.0 (1982)
    • Executive Suite (1982)
    • PDP-11/70 avec RT-11 4.0 (1982)
    • CP/M-86 (1983)
    • COMPAQ Portable avec graphiques monochromes (1983)
    • Zork I: The Great Underground Empire
    • Exploring the IBM Personal Computer (1983)
    • Adventures in Math (1983)
    • Lotus 1-2-3 (1983)
    • Norton Utilities 2.0 (1983)
    • Fantasy Land EGA Demo (1984)
    • Microsoft Word 1.15 (1984)
    • Nine Princes in Amber (1985)
    • Rogue (1985)
    • Microsoft Windows 1.0 (« Premiere Edition »)
    • Microsoft Windows 1.1 sur CGA (1985)
    • Microsoft Windows 1.1 sur EGA (1985)
    • Balance of Power (1985)
    • IBM OS/2 1.0 (1987)
    • VGA Black Book Tests (par Michael Abrash)
    • Microsoft Windows/386 2.0 (1987)
    • Microsoft QuickPascal 1.00 (1989)
    • Microsoft Windows 3.0 (1990)
    • Life & Death II: The Brain (1990)
    • The Oregon Trail (1990)
    • Commander Keen (1991)
    • Wolfenstein 3D (1992)
    • Dune II (1992)
    • Microsoft Windows 3.1 (1992)
    • Microsoft Windows 95 (1995)
    PCjs - simulateur de machine de bureau MS-DOS et Windows 3.0

    Toutes les sources du projet sont sur Github et vous pouvez contribuer. Chacune de ces machines est codée entièrement en javascript et utilisent un format XML qui défini les composants à activer ou non, donc vous pouvez aussi vous approprier le truc et créer vos propres machines assez simplement.

    • chevron_right

      Ransomware crooks are exploiting IBM file exchange bug with a 9.8 severity

      news.movim.eu / ArsTechnica · Wednesday, 29 March, 2023 - 00:24 · 1 minute

    Ransomware crooks are exploiting IBM file exchange bug with a 9.8 severity

    Enlarge (credit: Getty Images )

    Threat actors are exploiting a critical vulnerability in an IBM file-exchange application in hacks that install ransomware on servers, security researchers have warned.

    The IBM Aspera Faspex is a centralized file-exchange application that large organizations use to transfer large files or large volumes of files at very high speeds. Rather than relying on TCP-based technologies such as FTP to move files, Aspera uses IBM’s proprietary FASP—short for Fast, Adaptive, and Secure Protocol—to better utilize available network bandwidth. The product also provides fine-grained management that makes it easy for users to send files to a list of recipients in distribution lists or shared inboxes or workgroups, giving transfers a workflow that’s similar to email.

    In late January, IBM warned of a critical vulnerability in Aspera versions 4.4.2 Patch Level 1 and earlier and urged users to install an update to patch the flaw. Tracked as CVE-2022-47986, the vulnerability makes it possible for unauthenticated threat actors to remotely execute malicious code by sending specially crafted calls to an outdated programming interface. The ease of exploiting the vulnerability and the damage that could result earned CVE-2022-47986 a severity rating of 9.8 out of a possible 10.

    Read 4 remaining paragraphs | Comments

    • chevron_right

      IBM pushes qubit count over 400 with new processor

      news.movim.eu / ArsTechnica · Wednesday, 9 November, 2022 - 22:43 · 1 minute

    IBM pushes qubit count over 400 with new processor

    Enlarge (credit: IBM )

    Today, IBM announced the latest generation of its family of avian-themed quantum processors, the Osprey. With more than three times the qubit count of its previous-generation Eagle processor, Osprey is the first to offer more than 400 qubits, which indicates the company remains on track to release the first 1,000-qubit processor next year.

    Despite the high qubit count, there's no need to rush out and re-encrypt all your sensitive data just yet. While the error rates of IBM's qubits have steadily improved, they've still not reached the point where all 433 qubits in Osprey can be used in a single algorithm without a very high probability of an error. For now, IBM is emphasizing that Osprey is an indication that the company can stick to its aggressive road map for quantum computing, and that the work needed to make it useful is in progress.

    On the road

    To understand IBM's announcement, it helps to understand the quantum computing market as a whole. There are now a lot of companies in the quantum computing market, from startups to large, established companies like IBM, Google, and Intel. They've bet on a variety of technologies, from trapped atoms to spare electrons to superconducting loops. Pretty much all of them agree that to reach quantum computing's full potential, we need to get to where qubit counts are in the tens of thousands, and error rates on each individual qubit are low enough that these can be linked together into a smaller number of error-correcting qubits.

    Read 14 remaining paragraphs | Comments