Agregátor RSS

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Bleeping Computer - 7 Duben, 2026 - 17:51
An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers to steal Microsoft account credentials. [...]
Kategorie: Hacking & Security

Fotky z jiného světa. Prohlédněte si první zveřejněné záběry z průletu za Měsícem

Živě.cz - 7 Duben, 2026 - 17:25
Když se NASA v úterý odpoledne pochlubila prvními snímky obletu Měsíce z palubní zrcadlovky, sociální sítě se zaplnily komentáři typu: „A fakt to není ilustrace z AI?“ Některé záběry totiž vypadají opravdu až surrealisticky a Měsíc místy spíše jako CGI. NASA je ale federální agentura, která musí ...
Kategorie: IT News

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

The Hacker News - 7 Duben, 2026 - 17:15
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024. "Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Jak vygenerovat video zdarma. Google Veo 3.1 si může vyzkoušet každý i bez placení

Živě.cz - 7 Duben, 2026 - 16:45
Google na webu vids.new zpřístupnil svůj generátor videí i bezplatným účtům. Kdokoliv si může každý měsíc vytvořit až deset osmisekundových klipů v rozlišení 720p a se stereo zvukem. Novinka funguje na nejpokročilejším modelu Veo 3.1 a video vytvoří čistě podle textového zadání, případně může ...
Kategorie: IT News

Why Your Automated Pentesting Tool Just Hit a Wall

Bleeping Computer - 7 Duben, 2026 - 16:01
Automated pentesting tools deliver strong early results, then quickly plateau. Picus Security explains how the "PoC cliff" leaves major attack surfaces untested and creates a dangerous validation gap. [...]
Kategorie: Hacking & Security

MIT Mined Bacteria for the Next CRISPR—and Found Hundreds of Potential New Tools

Singularity HUB - 7 Duben, 2026 - 16:00

An AI system unearthed a trove of CRISPR-like proteins in minutes instead of weeks or months.

CRISPR is a breakthrough technology with humble origins. Scientists first discovered the powerful gene editor in bacteria that were using it as a weapon against invading viruses called phages. Phages can wipe out up to a quarter of a bacterial population in a day. Under assault, bacteria have evolved a hefty arsenal of defenses in a relentless arms race.

These bacterial immune systems often chop up the DNA or RNA of invading viruses and are relatively easy to manufacture, making them alluring targets for scientists developing genetic engineering tools. CRISPR is just one example. There are many more. But traditional methods of searching for them are slow and labor-intensive, leaving most CRISPR-like proteins unexplored.

Now, MIT scientists have released an AI called DefensePredictor that can root out new bacterial defense systems in five minutes, instead of weeks or months. As proof of concept, DefensePredictor churned through hundreds of thousands of proteins in multiple strains of Escherichia coli (E. coli). Over 600 proteins not previously linked to immune defense popped up. Added to a vulnerable strain of bacteria, a subset of these protected them against attack.

E. coli harbors a much broader landscape of antiphage defense than previously realized, expanding the likely number of systems by multiple orders of magnitude,” wrote the team.

These systems might hold secrets about how immunity evolved. And because the proteins may work in different ways, they could be a goldmine for next-generation precision molecular tools.

Unrivaled Success

Around three decades ago, Japanese scientists discovered a curious, repetitive DNA sequence in E. coli. Other researchers soon realized it was widespread across bacterial species and matched viral DNA sequences—suggesting it could be part of the bacteria’s immunity against phages.

The system now known as CRISPR stores snippets of DNA from past infections and uses protein “scissors” to cut apart matching viral DNA during reinfection. Intrigued by its precision, scientists repurposed CRISPR into a variety of gene editing tools and launched a gene therapy revolution.

CRISPR is the most famous, but a range of bacterial defense systems have transformed genetic engineering. One, containing an enzyme that cuts specific sequences of foreign DNA, is widely used to add genetic material into cells. Another encodes a balance of toxins and antitoxins that can trigger bacterial death after phage infection. This one has been adapted into a kill switch to prevent engineered microbes or genetically modified crops from spreading uncontrollably.

Researchers are also exploring the use of newly discovered systems—with video game-like names like Zorya and Thoeris—as molecular sensors and programmable signaling in synthetic biology.

There are likely more undiscovered tools in the universe of bacterial defense, and scientists have ways of hunting them down. Some defense genes are grouped close to one another, so a known gene could guide the discovery of others. Researchers have also found genes by screening libraries of free-floating circular genome fragments across bacterial populations.

Over 250 systems have been painstakingly validated. But plenty more could escape current detection methods if, for example, their components are spread across the genome.

“The full repertoire of antiphage defense systems in bacteria remains unknown,” wrote the team. “We currently lack the tools to systematically identify systems with high speed, sensitivity, and specificity.”

AI Discoverer

The new DefensePredictor algorithm bridges that gap.

At its core is a protein language model called ESM-2. Proteins are made of 20 molecular “letters” that combine into strings and fold into complex 3D shapes. Similar to large language models, algorithms like ESM-2 learn the language of proteins and can predict their structure and purpose based on sequence alone.

ESM-2 and other similar algorithms have already helped scientists decipher mysterious proteins in bacteria, viruses, and other microorganisms previously unknown to science. Researchers hope their unique shapes could inspire antibiotics, biofuels, or even be used to build synthetic organisms.

To build their AI, the team first established a training ground. With a previous model, DefenseFinder, they screened roughly 17,000 microbial genomes for genes related—and unrelated—to defense systems. They translated these genes into corresponding proteins and built up a database with some 15,000 antiphage proteins and 186,000 proteins unrelated to defense.

These numbers are far too staggering for a human to tackle, but the AI took the work in stride. Alongside ESM-2, the model used several algorithms to distinguish between defense and non-defense proteins. Eventually DefensePredictor learned some general characteristics that make a protein more likely to be part of the immune system. (Like other language models, it’s hard to fully understand the system’s reasoning, which the team is still trying to unpack.)

When tested on 69 strains of E. coli, DefensePredictor surfaced a treasure trove of over 600 new defense-related proteins, including more than 100 that were different than any yet discovered. Although some were encoded near one another or in circular DNA—like previous findings—nearly half weren’t. They were instead littered across the genome yet may still work together.

To test the results, the team engineered a highly vulnerable E. coli strain to express candidate defense proteins—predicted to work either alone or as part of a system—and exposed them to two dozen aggressive phages. Nearly 45 percent of the proteins offered protection against at least one phage.

Beyond E. coli, the scientists expanded their search to 1,000 more microorganisms and found thousands of potential defense proteins unlike anything seen before. “New immune mechanisms remain to be found,” wrote the team.

The race is on. Also published this week, a Pasteur Institute team combined multiple AI models to look for antiphage systems in protein sequences. Across over 32,000 bacterial genomes, the model predicted nearly 2.4 million antiphage proteins—most previously unknown. They released an atlas of AI-predicted bacterial immunity proteins for others to explore.

“The diversity of antiphage defense systems is vast and largely untapped,” they wrote.

Microorganisms harbor a colossal repertoire of biological tools we’re only just beginning to uncover at scale. More species are constantly found thriving in diverse environments, from pond scum to boiling sulfuric springs to the crushing pressure of the Mariana Trench. Every new genome scientists discover and pick apart, now with AI’s help, could be hiding the next CRISPR.    

The post MIT Mined Bacteria for the Next CRISPR—and Found Hundreds of Potential New Tools appeared first on SingularityHub.

Kategorie: Transhumanismus

Z vyřazené brněnské šaliny vzniká unikátní vlakotramvaj na baterky. AŽD ji již brzy otestuje u Jičína

Živě.cz - 7 Duben, 2026 - 15:45
Odborníci z AŽD otestují na Jičínsku upravenou bateriovou vlakotramvaj • Vyřazená brněnská šalina proto projde rozsáhlou přestavbou pro železnici • Tento inovativní projekt nabídne levnější alternativu ke klasickým vlakům
Kategorie: IT News

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

The Hacker News - 7 Duben, 2026 - 14:46
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. "A purpose-built Python scanner continuously sweeps major cloud IP ranges for vulnerable targets, automatically installing malicious nodes via ComfyUI-Manager if no exploitable node is already Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

I chytré vysavače mají noční můry. Vysvětlíme, proč nemají rády zrcadla a bojí se tmavých koberců

Živě.cz - 7 Duben, 2026 - 14:45
Robotické vysavače dnes působí skoro chytře. Umějí si zmapovat byt, vyhnout se překážkám a vrátit se přesně do stanice. Přesto je dokážou rozhodit věci, které člověku připadají úplně banální, jako je tmavý koberec nebo velké zrcadlo. Není to tím, že by byly hloupé. Jen svět kolem sebe nevnímají ...
Kategorie: IT News

Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny

Computerworld.com [Hacking News] - 7 Duben, 2026 - 14:18

Nvidia’s recent acquisition of SchedMD, the company behind the Slurm workload manager, is raising concerns among AI industry executives and supercomputing specialists who fear the chip giant could use its new position to favour its own hardware over competing chips, whether through code prioritization or roadmap decisions.

The concern, as industry sources frame it, is straightforward: Nvidia now controls scheduling software that also runs on hardware from its rivals, including AMD and Intel. A vendor that controls workload scheduling software has significant leverage over how efficiently competing hardware performs within shared computing environments — whether it exercises that leverage or not, Reuters reported, citing five anonymous sources, three of whom work in the AI industry and two with knowledge of supercomputer operations.

Analysts who spoke to InfoWorld said Nvidia’s open-source commitment — the company said during the acquisition announcement that it would “continue to develop and distribute Slurm as open-source, vendor-neutral software” — may not be sufficient protection.

“Slurm’s open-source foundation offers safeguards such as transparent code, forking ability, and community governance, but SchedMD’s control gives Nvidia soft power rather than hard lock-in,” said Manish Rawat, semiconductor analyst at TechInsights. Rawat said Nvidia could subtly shape the roadmap, prioritising GPU-aware scheduling and topology optimisations that favour its own hardware, and that integration timelines already showed faster support for the CUDA ecosystem compared to alternatives such as AMD’s ROCm or Intel’s oneAPI – creating what he described as a “best-supported path effect.”

What is Slurm, and why does it matter

Slurm, originally developed at Lawrence Livermore National Laboratory, runs on roughly 60% of the world’s supercomputers. The software is in active use at major AI companies, including Meta Platforms, French AI startup Mistral, and Anthropic for elements of AI model training, Reuters reported.

Government supercomputers used for weather forecasting and national security research also depend on it. Nvidia acquired Slurm developer SchedMD in December 2025 and described the deal as a push to strengthen its open-source ecosystem and help users adopt newer AI techniques alongside traditional supercomputing work.

Is the concern valid?

Dr. Danish Faruqui, CEO of Fab Economics, a US-based AI hardware and datacenter advisory, said the risk was real.

“The skepticism that Nvidia may prioritize its own hardware in future software updates, potentially delaying or under-optimizing support for rivals, is a feasible outcome,” he said. As the primary developer, Nvidia now controls Slurm’s official development roadmap and code review process, Faruqui said, “which could influence how quickly competing chips are integrated on new development or continuous improvement elements.”

Owning the control plane alongside GPUs and networking infrastructure such as InfiniBand, he added, allows Nvidia to create a tightly vertically integrated stack that can lead to what he described as “shallow moats, where advanced features are only available or performant on Nvidia hardware.”

One concrete test of that, industry observers say, will be how quickly Nvidia integrates support for AMD’s next-generation chips into Slurm’s codebase compared with how quickly it integrates its own forthcoming hardware and networking technologies, such as InfiniBand.

Does the Bright Computing precedent hold?

Analysts point to Nvidia’s 2022 acquisition of Bright Computing as a reference point, saying the software became optimized for Nvidia chips in ways that disadvantaged users of competing hardware. Nvidia disputed that characterization, saying Bright Computing supports “nearly any CPU or GPU-accelerated cluster.”

Rawat said the comparison was instructive but imperfect. “Nvidia’s acquisition of Bright Computing highlights its preference for vertical integration, embedding Bright tightly into DGX and AI Factory stacks rather than maintaining a neutral, multi-vendor orchestration role,” he said. “This reflects a broader strategic pattern — Nvidia seeks to control the full-stack AI infrastructure experience.”

However, he said Slurm presented a fundamentally different challenge. “Deeply entrenched in supercomputing centers and academia, and effectively community-governed, Slurm carries high switching costs,” Rawat said. “Nvidia may influence but is unlikely to replicate the same tightly integrated control in markets dominated by established, neutral, and community-driven platforms.”

The open-source safety valve and its limits

Faruqui acknowledged that Slurm’s open-source licensing under a GNU GPL v2.0 licence offers some protection, including the community’s right to fork the project if Nvidia’s stewardship is seen as biased. But he cautioned that the option carried its own risks. “Slurm’s open-source status provides a safety valve with its limitations, but it is not a complete shield against vendor-neutrality,” he said.

The acquisition brought many of the world’s leading Slurm developers inside Nvidia, he noted, meaning a community-led fork would struggle to sustain the same pace of development.

Rawat described the situation as “a strategic dependency risk, not a crisis,” and said organisations should diversify GPU procurement, benchmark workloads across multiple vendor ecosystems, and develop internal expertise to modify or switch orchestration tools if needed.

Faruqui recommended that enterprise buyers negotiating Slurm support agreements seek service-level guarantees that apply equally to non-Nvidia hardware, covering response times, bug fixes, and feature parity across heterogeneous clusters. On architecture, he said organisations should consider containerising AI workloads to isolate applications from the underlying scheduler, making migration to alternative schedulers such as Flux or Kubernetes more feasible if required.

The article originally appeared in InfoWorld.

Kategorie: Hacking & Security

Apple’s Mac grabs 11% of US enterprise market share

Computerworld.com [Hacking News] - 7 Duben, 2026 - 14:01

It’s not just your imagination; you are seeing more Macs being used in business environments these days — and that trend is expected to continue.

The latest Omdia/Informa US PC market data found that Apple took an 11% share of the US enterprise market last year. “For full-year 2025…, the biggest story at the vendor level was Apple, which has been making market share gains in US businesses, reaching an 11% share in full year 2025: up 2.4 percentage points from 2024,” said Kieren Jessop, research manager at Omdia:

Selected data points include :

  • Across all segments (education, consumer, business) Macs grabbed 15.7% share in the last quarter of 2025.
  • The Mac achieved an overall 16% market share across the year.
  • Mac growth hit 11.2% in 2025 compared to industry average growth of 3.3%.

The data shouldn’t mask that enterprises are still dominated by Windows devices, but does give us a fairly useful temperature showing where the industry heat is right now.

What drove growth? 

The MacBook Air maintained its place on the throne as “Most Popular Notebook,” Jessop said. Apple, now in its 50th year,  also boosted memory to 16GB while pruning $100 off the cost of the ‘Air during the year. Those moves helped keep sales healthy. 

There may be more to come, Jessop suggested, particularly as the MacBook Neo enters public consciousness: “The $599 Neo extends that value trajectory and is expected to significantly disrupt the entry-level segment,” he said.

The Neo (reviewed here) is most certainly an inflection point for intense competition, the analyst noted. Available at just $499 in the weak education market, and $599 everywhere else, the new Mac aims squarely at entry-level users. The thing is, it breaks into this part of the market at the same time as widely-reported component cost increases kick in.

“Looking ahead, the outlook for 2026 is significantly more cautious,” said Jessop, predicting huge price increases in RAM and storage components. “Memory and storage costs have risen 40%–70% since the start of 2025,” he said. 

PC sales will feel the geopolitical heat

Climbing component prices are unlikely to change trajectory anytime soon, with the problem made worse by the growing conflagration in the Middle East. Oil is used in everything, from ferrying finished products around to creating the casing around cabling and manufacturing equipment of all kinds. Shortage in this one raw material will inevitably pour problems across the industry.

“Omdia expects at least a further 60% increase in mainstream PC memory and storage costs in Q1 2026,” the analyst said, predicting the greatest impacts on the sub-$500 segment, which includes most education and entry-level consumer devices. To put that into context, Omdia is currently forecasting a $90 to $165 increase in PC build costs  due to component shortages. These steep increases are expected to affect everyone, and while some of the larger manufacturers might be able to swallow a hit against margins, others will be unable to do the same. 

Apple is knocking on the door

We learned last week that Apple is moving quite aggressively, allegedly purchasing memory at top dollar prices and choosing to handle the pain. This secures its own supply, of course, but also makes it harder for others to buy the memory they need at a price they can afford.

The competitive threat it is putting in place is quite real. “As thinner margins and lower allocation priority constrain the low-end market, smaller vendors are especially at risk of being squeezed out of the market,” Jessop said.

Looking ahead, what seems most likely is that Windows systems comparable to the MacBook Air will begin to see increase prices, a move that will make the lower-cost Mac even more competitive. That’s particularly true across enterprises that need to deploy new kit, but face their own existential cost and supply chain-related challenges.

We have to wait and see how these forces play out, but it seems plausible to think Apple is nowhere near hitting the ceiling of its enterprise market share gains. The combination of its own strategies (from its various platforms, OSes, and Apple Silicon) and market reality seems to be forming a structural advantage the company should be able to exploit for years. 

“Apple’s vertical integration (own silicon, own OS) gives it more levers than competitors reliant on third-party chips and Microsoft licensing,” Hexnode CEO Apu Pavithran told me recently.

It’s almost as if years of carving out its own independent place means Apple now has in place strengths its competitors do not possess.

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

Netflix a 30 nejoblíbenějších filmů a seriálů v dubnu 2026. Mimoni, Bridgertonovi, One Piece, Olověné děti…

Živě.cz - 7 Duben, 2026 - 13:45
Tyto filmy a seriály jsou teď na českém Netflixu nejoblíbenější. Nerozlišujeme žánr, stáří ani hodnocení na filmových webech. Jde o souhrnnou oblíbenost za poslední týdny, kterou zjišťuje web FlixPatrol.
Kategorie: IT News

The Hidden Cost of Recurring Credential Incidents

The Hacker News - 7 Duben, 2026 - 13:30
When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million. Avoiding even one major incident is enough to justify most security investments, but that headline figure obscures the more persistent problems caused by recurring credential [email protected]
Kategorie: Hacking & Security

8 advanced ways Vivaldi boosts your productivity

Computerworld.com [Hacking News] - 7 Duben, 2026 - 12:00

Switching browsers is almost akin to switching to a new operating system — or, for a more physical analogy, moving into a completely new office where everything’s unfamiliar.

Most of us spend so much time in our browsers and handle so much work in that environment that in many ways, the browser essentially is the desktop these days. It’s arguably even more consequential than the operating system beneath it (or the physical office around it), given how much of our workdays — and beyond — end up revolving around that area.

It’s probably no surprise, then, that most of us don’t change browsers all that often. Unless your primary portal to the web is leaving you unsatisfied in a seriously striking way, it’s easier just to stick with what you know than to take the time to explore and adapt to some daunting new alternative.

As someone who’s been stuck in that rut for the better part of two decades, though, lemme tell ya: If you haven’t explored your browser options lately, you’re missing out on some incredibly interesting and advantageous productivity upgrades.

I’ve recently made a switch from Chrome to a newer, more off-the-beaten-path contender called Vivaldi. At a time when most mainstream browsers are focused on cramming AI features of questionable usefulness (and even more questionable consequences) into every nook and cranny, Vivaldi is actively making a point to avoid that and instead come up with a steady stream of clever interface enhancements that actually help you get stuff accomplished more efficiently (and without the very real risk of hallucination-induced embarrassment).

The Vivaldi browser is both fresh and familiar — with some truly interesting touches.

JR Raphael

Let me show you some of the specific Vivaldi advances that won me over.

First, a few foundational notes

Before we dive into my favorite Vivaldi features, we need to get a few quick basics out of the way.

First and foremost: Vivaldi is available to download for Windows, Mac, or Linux, on the desktop front, and also for both Android and iOS on mobile. Vivaldi’s mobile experience is quite nice, and I’d actually been using the Vivaldi Android app as my primary browser for several months before making the leap on the desktop side — but since the desktop is inevitably where the more powerful and ambitious features come into play, it’s where we’ll devote our attention in this overview.

Second: It’s free. No cost, no catches.

As for how Vivaldi manages to maintain a completely free offering — always an important question to consider — the company behind the browser says it makes its money via a combination of partner deals (with services like search engines and bookmark organizers), partnerships with websites that Vivaldi highlights in certain areas of its interface, and completely optional one-off or recurring donations from its users.

Third, and perhaps most notably: None of that involves any manner of tracking, profile, or personal data sharing — quite the contrary, in fact, as we’ll explore more in a moment — and none of it has any lasting effect on your browser experience if you choose to disable or delete the associated elements.

Got it? Good. Now, let’s get into the good stuff.

Vivaldi advantage #1: Shortcuts galore

The best part about using Vivaldi, for me, has been the immense system of step-saving shortcuts it adds into your day-to-day browsing adventures.

At the simplest level, that includes a Quick Commands menu that lets you perform practically any browser function — switching tabs, finding bookmarks, searching the web and/or your history, opening specific URLs, and so much more — simply by pressing Ctrl (or ⌘) and E and then either typing your query or typing a couple characters to find the command you want.

So, for instance, you might hit Ctrl-E and then type ex and hit Enter to open the Vivaldi Extensions page — or hit Ctrl-E and type pi to find the option for pinning and unpinning a tab.

Vivaldi’s Quick Commands menu is your key to next-level web work efficiency.

JR Raphael

And that’s barely scratching the surface of what’s available in this interface. Other potentially useful commands that are never more than a couple characters away include:

  • Capturing a screenshot
  • Moving a tab to a new window
  • Renaming your current tab
  • Closing all the tabs to the right of your current tab
  • Copying the current page address
  • Hiding all images in whatever page you’re viewing
  • Muting or unmuting your current tab
  • Translating the page you’re seeing
  • And moving in and out of a clutter-free reading mode

The list of options is absolutely massive, and you can even customize it and change the order in which different types of commands are prioritized so that it takes fewer characters to find what you need.

Once you start to learn the commands that are most relevant to you, you’ll be flying around your browser — and your work day — like never before.

Vivaldi advantage #2: Command Chains

What’s without a doubt the most powerful part of that Quick Command system we just went over is the ability Vivaldi gives you to create your own custom “Command Chains” — sequences of browser-based actions that you cluster together and can then trigger with a chosen command from that same Quick Command menu.

It’s a tough concept to explain succinctly, but once you wrap your head around some specific examples, you’ll see what it’s all about — and understand why I’ve been so excited to embrace it.

So, first: Like many keyboard-caressing creatures, I have a handful of specific workflows I find myself facing repeatedly throughout my weeks. One such example is writing my Android Intelligence newsletter, which always starts out with my opening a particular page within my newsletter sending service, opening the “Newsletter Outline” Google Doc that I use to plan and organize each issue, opening the Trello board that I use to collect interesting ideas and articles for potential inclusion, and opening the RSS feed reader that I rely on to follow a slew of subject-specific news sources.

Traditionally, with Chrome, that’s meant I open one tab after another and manually navigate to each of those websites every time I’m ready to work on the newsletter. Now, with Vivaldi, I just hit Ctrl-E and then type AI to open all the sites together as a part of a custom Command Chain I created for that purpose.

My “AI” Vivaldi Command Chain is configured to open a series of specific websites together within a single window.

JR Raphael

I’ve got similar sorts of Command Chains for every other common workflow, and even ones that provide quick ways to open individual web pages I find myself pulling up often. But effective as those are, they’re relatively simple examples of what a Command Chain can accomplish.

In addition to opening specific web pages, Command Chains can perform practically any browser function imaginable — switching tabs, closing or moving tabs, reloading tabs, entering or exiting a full-screen viewing mode, deleting your browsing data, capturing screenshots of entire pages or specific areas within a page, you name it. You can even build in custom delays within your sequences, if you need to have a brief pause between two particular actions you’re performing.

Command Chains can perform all sorts of browser actions to accomplish any kind of goal.

JR Raphael

It’s essentially a custom automation system within your browser, in other words, and a way to reduce almost anything you find yourself doing often down to a couple quick keystrokes.

Or, if you’d rather…

Vivaldi advantage #3: Mouse gestures

Maybe you’re more of a mouse person than a keyboard warrior. If so, Vivaldi has a really interesting system of mouse gestures that can save you some serious time.

You trigger the gestures by either holding down your right mouse button or holding down your Alt key and then moving your mouse in a specific path — in a line straight downward to open a new tab, for instance, or in an “L” shape to close your current tab.

Vivaldi’s mouse gestures are an interesting extra shortcut option.

JR Raphael

Vivaldi has a whole host of those sorts of actions active and available out of the box, but the real power comes into play when you start to expand and customize those commands. You can create any mouse gesture you like for any of the basics, and you can add in your own new mouse gestures for any standard browser action as well as for any Command Chain you’ve created.

And if that still isn’t enough…

Vivaldi advantage #4: Custom keyboard commands

All Command Chain craziness aside, Vivaldi has a sprawling set of single-step keyboard shortcuts also available for browser-level actions. And unlike Chrome and other more traditional browsers, it offers you the option to both change any standard shortcut to anything else you’d like and to add in new shortcuts for browser actions you use frequently and want an easier way to access.

So, for instance, you might set it up so that Ctrl-X opens the Vivaldi Extensions page or Ctrl-Alt-S captures a screenshot and saves it to your system clipboard. The list of possibilities is positively mind-blowing, and it’s all about making your browser work the way that’s best for you.

Vivaldi’s list of keyboard shortcuts is staggering — and completely customizable.

JR Raphael

As an added bonus tip, take note that you can always use the built-in keyboard shortcut of Ctrl-F1 to view all of your current keyboard shortcuts — and, of course, you can also change that shortcut to something else, if you’d rather.

Vivaldi advantage #5: Web Panels

Another feature that’s been an immediate highlight for me is Vivaldi’s Web Panels. These are almost like small web-based widgets that you keep in a panel to the right of your browser and can then call up quickly anytime to view and interact with alongside any other page you’re viewing.

That’s perfect for the type of tool you’re typically accessing as a supplement to something else — like your notes, your calendar, a timer, a thesaurus, maybe even an LLM like Gemini or ChatGPT.

Web Panels are like on-demand widgets at the side of your browser.

JR Raphael

Whatever the case may be, all you’ve gotta do is add the site in as a Vivaldi Web Panel, and it’ll always be available to pop up with a single click on that sidebar.

And — for the real magical moment of all these pieces coming together — you can also create a custom keyboard shortcut for any of your Web Panels and then summon it without ever taking your fingers off your keyboard.

Whew! Anyone else workin’ up a bit of a sweat here?

Vivaldi advantage #6: Tab Tiling

Chrome recently added in the option to start up a split view and see any two web pages together, side by side, within a single tab in your desktop browser.

I thought that was pretty crafty and surprisingly useful. And then I saw Vivaldi’s vastly superior version.

Tab Tiling is like Chrome’s split view on steroids. It lets you bring multiple web pages together into a single tab, in all sorts of different configurations, simply by dragging and dropping ’em wherever you want — or, alternatively, right-clicking on a link and choosing to open it as a tiled tab from there.

Tab Tiling creates a whole new way to work on the web.

JR Raphael

It’s the kind of creative versatility the browser world has been missing for far too long and the type of productivity advantage you won’t want to give up once you get in the habit of having it.

Vivaldi advantage #7: Privacy, privacy, everywhere

Aside from all the surface-level practical advantages, Vivaldi excels in an area that’s increasingly important to lots of professionals these days — and that’s privacy.

Specifically:

  • The browser includes built-in access to the Proton VPN service, which you can enable or disable anytime with a quick click. It’s completely free to use, too, without any limits (and with the option to upgrade to Proton’s paid premium plan for a variety of extras, if you want).
  • It includes a native ad and tracker blocking system that’s off by default and can be enabled either web-wide or on a case-by-case basis.
  • And it has a location override setting that makes it simple to protect your actual geographic location by choosing any other location, which websites will then be shown when they try to sense your whereabouts.

Being able to override your perceived location right within your browser is a pretty powerful advantage.

JR Raphael

The best part about all of these features is the way they’re implemented and the choice that approach affords you. You can decide where, when, and how you want to use any of them. Nothing is forced on you or enabled by default.

And on that note, last but not least…

Vivaldi advantage #8: Extreme customization

In addition to all the specific standouts we’ve gone over, what’s refreshing about Vivaldi is how much control it gives you over practically every facet of your browser experience — something that is not the case with Chrome or other more traditional browsers.

Every interface detail you can think of can be customized and changed within Vivaldi’s settings, ranging from the appearance of the address bar to the specific contents and layout of the menus.

Vivaldi lets you control even the tiniest of details about your browsing experience — if you’re so inclined.

JR Raphael

If there’s some element of your browser you don’t like or you think should work differently, odds are, Vivaldi will let you adjust it to your exact specifications.

More than anything, remember: Adapting to a new browser isn’t easy. Follow my approach on making that change, though, and you might just find yourself delighted by your new virtual office, as I’ve been, rather than just quietly accepting the way you’ve always known it.

Kategorie: Hacking & Security

V létě vyrábí elektřinu, v zimě teplo. Harvardský vynález zvládá obojí díky přepínání bez jakékoli elektroniky

Živě.cz - 7 Duben, 2026 - 11:42
Nové dvourežimové solární zařízení z Harvardu umí vyrábět elektřinu i teplo • Funguje bez elektroniky čistě na základě fyzikálních principů změny skupenství • Systém se dokáže automaticky přepínat podle aktuální okolní teploty
Kategorie: IT News

Virtuální Bastlírna vol. 61: Recyklujete svoje nepovedené 3D-tisky?

AbcLinuxu [zprávičky] - 7 Duben, 2026 - 10:48
Protože je už po aprílu, můžou strahováci opět zveřejnit program další Virtuální Bastlírny, aniž by připravená témata působila dojmem, že jde o žert. Vězte tedy, že v úterý 14. dubna (změna!!!) od 20:00 proběhne VB, kde se setkají bastlíři, technici, učitelé i nadšenci do techniky a kde i vy se můžete zapojit do družného hovoru, jako by všichni seděli u pomyslného piva. Co mají bastlíři tento měsíc na srdci? Pravděpodobně by nás musel zasáhnout meteorit a výpadek internetu, aby Petr P. nezmínil KiCAD 10. A pro emulátory disket Gotek vznikl open-source firmware. Co ale hardware? Do bastlířských doupat už se blíží dostupné metody pro recyklaci filamentů, v Česku je nový superrychlý výrobce plošňáků, Ikea už prodává Matter zásuvky a ve volné přírodě se již vyskytly pokusy o použití x86 motherboardů jako PCI-E breakout boardů pro Raspberry Pi. Čímž se pomalu blíží bizarnosti! Nevěřící zraky padnou na rtuťové kabely, průšovský aprílový žertík nebo třeba kuličkový šroub bez kuliček. Příští Virtuální Bastlírna se pod taktovkou projektu MacGyver studentského klubu SiliconHill bude konat v úterý 14. dubna (změna!!!) od 20:00 minimálně do 22:00 (ale obvykle končí o dost později). Odkaz na konferenci se před samotnou akcí objeví na bastlířské wiki.
Kategorie: GNU/Linux & BSD

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

The Hacker News - 7 Duben, 2026 - 10:38
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a host. The efforts have been codenamed GPUBreach, GDDRHammer, and GeForge. GPUBreach goes a step further than GPUHammer, demonstrating for the first time that Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security
Syndikovat obsah