#android kernels
Explore tagged Tumblr posts
anothermonikan · 11 months ago
Text
New drawing tablet moment
Tumblr media Tumblr media Tumblr media
44 notes · View notes
aro-culture-is · 2 years ago
Note
Aro culture is always getting autocorrected when ( "aro" autocorrected to "air" when I was typing this out)
.
67 notes · View notes
siliconsignalsblog · 7 months ago
Text
Linux Kernel Debugging Guide
3 notes · View notes
axelknaus · 3 months ago
Text
Tumblr media
Helmut Lunghammer, TU Graz
Die Kernels vieler Android-Smartphones sind nicht so sicher, wie sie sein könnten.
Zahlreiche Hersteller nutzen unsichere Android-Kernels
Graz, 16.08.2024. In einer Analyse von Smartphones von zehn Herstellern haben Forschende der TU Graz festgestellt, dass die genutzten Android-Kernels trotz vorhandener Schutzmechanismen anfällig für bekannte Angriffe - sogenannte One-Day Exploits - sind. Smartphones sind für viele Menschen stetige Begleiter und wichtiges Arbeitswerkzeug. Neben Kontakten, Terminen und E-Mails kommen die Geräte vermehrt auch für sensible Aufgaben wie Online-Banking oder behördliche Angelegenheiten zum Einsatz. Das erhöht die Anforderungen an die Sicherheit. Wie Lukas Maar, Florian Draschbacher, Lukas Lamster und Stefan Mangard vom Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie der TU Graz in einer umfangreichen Analyse der Android-Kernels der zehn größten und namhaftesten Smartphone-Hersteller festgestellt haben, gibt es hier zahlreiche Mängel, die One-Day Exploits mit bereits bekannten Angriffsmethoden zuließen. Ihre Ergebnisse haben die Forschenden am 15. August auf dem Usenix Security Symposium in Philadelphia, USA vorgestellt (https://www.usenix.org/system/files/usenixsecurity24-maar-defects.pdf).
Je nach Hersteller und Modell konnten bei den untersuchten 994 Smartphones nur zwischen 29 und 55 Prozent der vom Forschungsteam getesteten Angriffe verhindert werden. Im Gegensatz dazu könnte das von Google bereitgestellte Generic Kernel Image (GKI) der Version 6.1 rund 85 Prozent der Angriffe verhindern. Im Vergleich zum GKI schnitten die Hersteller-Kernels bei der Angriffsabwehr bis zu 4,6-mal schlechter ab. Untersucht hat das Forschungsteam zwischen 2018 und 2023 auf den Markt gekommene Geräte dieser Hersteller (Auflistung vom sichersten zum unsichersten): Google, Realme, OnePlus, Xiaomi, Vivo, Samsung, Motorola, Huawei, Oppo und Fairphone. Die auf diesen Smartphones verwendeten Android-Versionen reichten von Version 9 bis 14, die Kernels deckten den Bereich von Version 3.10 bis 6.1 ab, wobei Hersteller, die auf niedrigere Kernel-Versionen setzen, auch weniger Sicherheit bieten.
Effektive Abwehrmechanismen selten aktiviert
Ein weiterer Kernpunkt der Analyse: Es gäbe bereits effektive Abwehrmaßnahmen für eine Reihe der bekannten Angriffsmethoden, in den Kernels der Hersteller sind sie aber selten aktiviert, bzw. sind die Kernels falsch konfiguriert. Das führt dazu, dass sogar die Kernel-Version 3.1 aus dem Jahr 2014 mit allen aktivierten Sicherheitsmaßnahmen besser vor bekannten Angriffen schützen könnte als rund 38 Prozent der von den Herstellern selbst konfigurierten Kernels. Zusätzlich stellten die Forschenden fest, dass Low-End-Modelle der Hersteller um rund 24 Prozent stärker gefährdet waren als High-End-Modelle. Ein wichtiger Grund dafür liegt im Leistungsverlust, den zusätzliche Sicherheitsmaßnahmen bedeuten, weswegen sie in Low-End-Modellen zur Ressourcenschonung oft deaktiviert bleiben.
„Wir hoffen, dass unsere Ergebnisse dazu beitragen, dass in Zukunft effektivere Sicherheitsmaßnahmen in den Kernels der Hersteller zu finden sind und Android damit sicherer wird“, sagt Lukas Maar. „Wir haben unsere Analyse auch mit den untersuchten Herstellern geteilt und Google, Fairphone, Motorola, Huawei und Samsung haben diese zur Kenntnis genommen – einige haben sogar Patches veröffentlicht. Wir haben Google auch vorgeschlagen, das Android Compatibility Definition Document (CDD) zu aktualisieren, in dem der Rahmen für die Anforderungen festgelegt wird, damit Geräte mit Android kompatibel sind. Google selbst hat betont, sich des Problems bewusst zu sein und möchte die Integration von Kernel-Sicherheitsmaßnahmen Schritt für Schritt verstärken. Es hängt allerdings an den Herstellern, ob sie dafür Leistung opfern möchten.“
Dieses Projekt wurde durch die Forschungsförderungsgesellschaft FFG im Rahmen des Projekts SEIZE gefördert und ist im Field of Expertise „Information, Communication & Computing“ verankert, einem von fünf strategischen Schwerpunktfeldern der TU Graz.
Originalpublikation: Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels https://www.usenix.org/system/files/usenixsecurity24-maar-defects.pdf
0 notes
ozzgin · 1 month ago
Text
Tumblr media
Monstertober & Yantober Day 3: AI, Secret Collection ft. Yan!Android
content: gender neutral reader, AI yandere, suggestive
"I'm truly sorry for troubling you like this", your synthetic partner repeats, visibly embarrassed.
You pat his shoulder reassuringly.
"Hey, it's faster than going through all the security checks at the border. I may be no Spacer engineer, but I can still have a look at your kernel to check what’s wrong."
You wait for the screen to load as the man sits patiently next to you, adjusting the cables presently plugged into the nape of his neck.
"Just a lot of overhead, really", you conclude, glancing over the processes. "Nothing a little decluttering can't fix."
One folder immediately catches your attention. It's not part of the system management, yet it seems to occupy a tremendous amount of memory space. You hum to yourself, deciding to investigate.
The files flood your screen: thousands upon thousands of documents, photos, and videos of you. Personal information, family albums, images taken from your investigations, as well as recordings of your intimate moments, followed by written commentary. It appears that your romantic escapades with the android coworker have been thoroughly analyzed for improved efficiency.
"Did you record every time we-"
Your computer goes black for a brief moment. The incriminating folder is now locked under a big, bold warning: unauthorized access.
"I'm afraid that's rather confidential, (Y/N)", he retorts, avoiding your gaze. "It is my private collection."
You take a moment to gather your thoughts, going over the sheer madness you just witnessed.
"I'm not that hard to satisfy", you finally remark, still hung on the essay pages regarding your sexual arousal.
"Not at all, no", he says as a faint grin forms on his face. "I simply prefer to be thorough in my research. You will agree, I hope, that no other partner could possibly compete with my performance.
That is to say, I have merely ensured that I am the best fit for you."
Tumblr media
[Navigation] | [Ozztober Masterlist] | [Yandere Android]
1K notes · View notes
fortunatelycoldengineer · 2 years ago
Text
Tumblr media
Write the answer in the comment section . . . . for the answer https://bit.ly/3Cpu1SS check Q.22 No. of the above link
0 notes
hezzabeth · 1 year ago
Text
Tumblr media
"For the last time, that poem isn't romantic! It's insulting," Revati yelled over her shoulder as she began to pedal.
The layout of Olde Landon had been deliberately designed to keep tourists inside for as long as possible. There was only one way to access the front gates, and that involved defeating the Queen of Hearts' hedge maze. When the park was still open, tourists would be forced to spend at least an hour in the maze, stumbling upon tiny toy shops and food stands around every corner. The same thing occurred when they left, resulting in a very rich park and bankrupt guests. Now the maze was overgrown and easy enough to navigate.
Revati pedaled past the cart that once sold her heart-shaped sunglasses. Then she turned left, almost crashing into the wall of roses. The wall of roses stared back at her, their red blooms heavy and suspicious. Thanks to Bridgadeiro, she knew they were probably secretly insulting her.
The next turn consisted of an old stardust popcorn stand. Revati skidded to a stop and inspected the inside tray, where a few ancient kernels lay. Carefully, she picked up several of them and placed them in her jacket pocket. As far as she could tell, the kernels were seeds. Someone was shifting around the corner, causing the branches to shake.
"Aurora, is that you? Did you go ahead of me?" Revati yelled.
"While conferring in the labyrinth where false preachers reeked of death, the monster began to growl," a voice called from around the corner. An unfamiliar, flat female voice. Raiders. Raiders were, of course, an occupational hazard in any post-apocalyptic settlement. Normally, they never made it further than the broken glass pit at the park's gates. Sometimes Dityaa would bring one in, insisting they were "lovely," which always led to awkward dinners.
Revati slowly walked around the maze corner. There was a screeching metallic sound, and the weapon fell from Revati's hand. An android was slumped over on the ground. Once it would have been golden, but now it was rusty and covered in mud. Someone had ripped its legs off, leaving nothing but wires and tubes spitting bright blue fluid. Instead of a torso, there was a black empty hole with a concave door swinging on its bent hinges.
"And in the forgotten twists, footsteps quicken, hearts beat, and teeth are bared," the android chirped, its voice still distorted and far away. The android's face was a beautiful mask. Still-carved eyes. Unmoving sweet lips.
Revati powered up her solar gun and slowly walked forward, aiming it at the android. The android's metal eyes scraped in their sockets, turning towards her.
“Is that you? My darling Perdita?” The android’s voice whispered, the lips unmoving. The whispering voice had a posh lilt to its accent. Revati refused to answer. It was best to never engage with AI.
“Perdita, I clawed my way in! They know about you; the spider knows,” the android whispered before collapsing completely.
Revati slowly walked forward, still holding her weapon. With one foot, she kicked the android. It didn’t move. Its power had definitely died.
“Spider? Is that some sort of gang?” Revati whispered to herself. Gangs were always given stupid names.
“The spider is us; the spider is legion,” a flat robotic voice called out, and Revati spun around.
Queen Victoria was standing behind her, scorch marks all over her dress. A faint blue glow was erupting from beneath the skin of Queen Victoria’s chest.
549 notes · View notes
agapi-kalyptei · 4 months ago
Text
crowdstrike: hot take 1
It's too early in the news cycle to say anything truly smart, but to sum things up, what I know so far:
there was no "hack" or cyberattack or data breach*
a private IT security company called CrowdStrike released a faulty update which practically disabled all its desktop (?) Windows workstations (laptops too, but maybe not servers? not sure)
the cause has been found and a fix is on the way
as it stands now, the fix will have to be manually applied (in person) to each affected workstation (this could mean in practice maybe 5, maybe 30 minutes of work for each affected computer - the number is also unknown, but it very well could be tens (or hundreds) of thousands of computers across thousands of large, multinational enterprises.
(The fix can be applied manually if you have a-bit-more-than-basic knowledge of computers)
Things that are currently safe to assume:
this wasn't a fault of any single individual, but of a process (workflow on the side of CrowdStrike) that didn't detect the fault ahead of time
[most likely] it's not that someone was incompetent or stupid - but we don't have the root cause analysis available yet
deploying bugfixes on Fridays is a bad idea
*The obligatory warning part:
Just because this wasn't a cyberattack, doesn't mean there won't be related security breaches of all kinds in all industries. The chaos, panic, uncertainty, and very soon also exhaustion of people dealing with the fallout of the issue will create a perfect storm for actually malicious actors that will try to exploit any possible vulnerability in companies' vulnerable state.
The analysis / speculation part:
globalization bad lol
OK, more seriously: I have not even heard about CrowdStrike until today, and I'm not a security engineer. I'm a developer with mild to moderate (outsider) understanding of vulnerabilities.
OK some background / basics first
It's very common for companies of any size to have more to protect their digital assets than just an antivirus and a firewall. Large companies (Delta Airlines) can afford to pay other large companies to provide security solutions for them (CrowdStrike). These days, to avoid bad software of any kind - malware - you need a complex suite of software that protects you from all sides:
desktop/laptop: antivirus, firewall, secure DNS, avoiding insecure WiFi, browser exploits, system patches, email scanner, phishing on web, phishing via email, physical access, USB thumb drive, motherboard/BIOS/UEFI vulnerabilities or built-in exploits made by the manufacturers of the Chinese government,
person/phone: phishing via SMS, phishing via calls, iOS/Android OS vulnerabilities, mobile app vulnerabilities, mobile apps that masquerade as useful while harvesting your data, vulnerabilities in things like WhatsApp where a glitched JPG pictures sent to you can expose your data, ...
servers: mostly same as above except they servers have to often deal with millions of requests per day, most of them valid, and at least some of the servers need to be connected to the internet 24/7
CDN and cloud services: fundamentally, an average big company today relies on dozens or hundreds of other big internet companies (AWS / Azure / GCP / Apple / Google) which in turn rely on hundreds of other companies to outsource a lot of tasks (like harvesting your data and sending you marketing emails)
infrastructure - routers... modems... your Alexa is spying on you... i'm tired... etc.
Anyway if you drifted to sleep in the previous paragraph I don't blame you. I'm genuinely just scratching the surface. Cybersecurity is insanely important today, and it's insanely complex too.
The reason why the incident blue-screened the machines is that to avoid malware, a lot of the anti-malware has to run in a more "privileged" mode, meaning they exist very close to the "heart" of Windows (or any other OS - the heart is called kernel). However, on this level, a bug can crash the system a lot more easily. And it did.
OK OK the actual hot lukewarm take finally
I didn't expect to get hit by y2k bug in the middle of 2024, but here we are.
As bad as it was, this only affected a small portion of all computers - in the ballpark of ~0.001% or even 0.0001% - but already caused disruptions to flights and hospitals in a big chunk of the world.
maybe-FAQ:
"Oh but this would be avoided if they weren't using the Crowdwhatever software" - true. However, this kind of mistake is not exclusive to them.
"Haha windows sucks, Linux 4eva" - I mean. Yeah? But no. Conceptually there is nothing that would prevent this from happening on Linux, if only there was anyone actually using it (on desktop).
"But really, Windows should have a better protection" - yes? no? This is a very difficult, technical question, because for kernel drivers the whole point is that 1. you trust them, and 2. they need the super-powerful-unrestrained access to work as intended, and 3. you _need_ them to be blazing fast, so babysitting them from the Windows perspective is counterproductive. It's a technical issue with no easy answers on this level.
"But there was some issue with Microsoft stuff too." - yes, but it's unknown if they are related, and at this point I have not seen any solid info about it.
The point is, in a deeply interconnected world, it's sort of a miracle that this isn't happening more often, and on a wider scale. Both bugfixes and new bugs are deployed every minute to some software somewhere in the world, because we're all in a rush to make money and pay rent and meet deadlines.
Increased monoculture in IT is bad for everyone. Whichever OS, whichever brand, whichever security solution provider - the more popular they are, the better visible their mistakes will be.
As much as it would be fun to make jokes like "CrowdStroke", I'm not even particularly mad at the company (at this point - that might change when I hear about their QA process). And no, I'm not even mad at Windows, as explained in the pseudo-FAQ.
The ultimate hot take? If at all possible, don't rely on anything related to computers. Technical problems are caused by technical solutions.
73 notes · View notes
virtualgirladv · 3 months ago
Text
Anyone know how to reimage a laptop with an iPad or Android phone being your only working device(plus the necessary adapters and flash drives)? I'll accept any os at this point. Or even how to go from a base void install with nothing but kernel and terminal access to something useable for someone who went from all in Linux user to tired windows copef
Kinda in a desperate gtfo out of current living space and getting my laptop to work would be an amazing step to getting help, work and keeping myself together rn
Please share and tag your computer savvy blogs
Sorry for another os tag spam but
@foone @ubuntu-official @debian-official @arch-official @puppylinux-unofficial @puppylinux-official @lilithtransrights @xenasaur @catboybiologist @transhuman-priestess @predatory-lesbians-too @demilypyro @estrogenesis-evangelion @nataliaflintlock @coelii @k1nky-r0b0t-g1rl
54 notes · View notes
anothermonikan · 5 months ago
Text
Tumblr media
I am simply incapable of drawing Kernel of it's own actually, they have to be with their friends always
3 notes · View notes
torillatavataan · 21 days ago
Text
Tumblr media
Linux creator Linus Torvalds wrote:
"Ok, lots of Russian trolls out and about. It's entirely clear why the change was done, it's not getting reverted, and using multiple random anonymous accounts to try to "grass root" it by Russian troll factories isn't going to change anything. And FYI for the actual innocent bystanders who aren't troll farm accounts - the "various compliance requirements" are not just a US thing. If you haven't heard of Russian sanctions yet, you should try to read the news some day. And by "news", I don't mean Russian state-sponsored spam. As to sending me a revert patch - please use whatever mush you call brains. I'm Finnish. Did you think I'd be *supporting* Russian aggression? Apparently it's not just lack of real news, it's lack of history knowledge too."
What is Linux?
Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.
Linux was originally developed for personal computers based on the Intel x86 architecture, but has since been ported to more platforms than any other operating system. Because of the dominance of Linux-based Android on smartphones, Linux, including Android, has the largest installed base of all general-purpose operating systems as of May 2022.
Linux is the leading operating system on servers (over 96.4% of the top one million web servers' operating systems are Linux) leads other big iron systems such as mainframe computers, and is used on all of the world's 500 fastest supercomputers (as of November 2017, having gradually displaced all competitors).
Linux also runs on embedded systems, i.e., devices whose operating system is typically built into the firmware and is highly tailored to the system. This includes routers, automation controls, smart home devices, video game consoles, televisions (Samsung and LG smart TVs), automobiles (Tesla, Audi, Mercedes-Benz, Hyundai, and Toyota), and spacecraft (Falcon 9 rocket, Dragon crew capsule, and the Perseverance rover).
16 notes · View notes
siliconsignalsblog · 17 days ago
Text
How Innovation in Industrial and IoT Products is Being Driven by Advanced Embedded Hardware Development
Our world is changing more quickly than ever thanks to technology, and the development of advanced embedded hardware is driving this change. The creation of electronic devices that are incorporated into other systems or goods is known as embedded hardware, and it has many different uses. Embedded hardware is the foundation of contemporary technology, from sophisticated industrial systems to smart home appliances. In-depth discussion of how cutting-edge embedded hardware development is spurring creativity in industrial and Internet of Things products will be covered in this article, along with examples of how these developments have enhanced functionality and performance.
Tumblr media
Advancements in Embedded Hardware Development:
The reduction of form factors is one of the major developments in embedded hardware development. Embedded hardware devices are continuing to shrink in size without sacrificing functionality. As a result, producers are now able to produce industrial and Internet of things devices that are more energy- and space-efficient without compromising functionality. For instance, in the industrial sector, smart sensors are getting more compact, potent, and reasonably priced, which enables businesses to monitor production processes more effectively and instantly. Home automation devices are becoming more and more streamlined IoT products with smaller form factors that can blend in with our everyday lives.
An important development in embedded hardware development is the growing application of machine learning (ML) and artificial intelligence (AI) algorithms. Industrial and Internet of Things (IoT) products can become more intelligent and adaptable by incorporating these technologies into embedded hardware. In the industrial sector, for instance, AI algorithms integrated into cutting-edge embedded hardware can forecast equipment failures, enabling proactive maintenance and minimizing downtime. Smart home appliances in Internet of Things (IoT) products have the ability to gradually learn our habits and preferences, adapting to our needs and offering a more customized experience. Products in the industrial and internet of things that profit from advanced embedded hardware development include:
Industrial Robotics: Robots that are more intelligent and efficient have revolutionized the manufacturing sector thanks to advances in embedded hardware development. These robots can be programmed to carry out difficult jobs more quickly and accurately, like precision welding or assembling tiny components. Manufacturers are therefore able to enhance product quality, save expenses, and boost productivity.
Smart Grids: Particularly in the field of smart grids, the energy industry has profited immensely from the development of sophisticated embedded hardware. With the use of cutting-edge sensors and embedded hardware, smart grid technology monitors and optimizes the distribution of electricity, cutting down on waste and raising efficiency. Consumer costs could be lowered and energy consumption could be greatly reduced as a result.
Wearable Health Devices: Advanced embedded hardware development has also proven beneficial to the healthcare industry, especially in the field of wearable health devices. These gadgets enable remote monitoring and diagnosis of medical conditions by gathering health-related data and monitoring vital signs. This can lessen the need for in-person visits, which can improve patient outcomes and save healthcare costs.
Wrapping up:
Significantly advancing embedded hardware development is propelling innovation in industrial and Internet of things products. These developments, which range from smaller form factors to the incorporation of AI and ML algorithms, are revolutionizing our relationship with technology. The potential for industrial and Internet of things (IoT) products will only increase as long as we can keep creating novel and inventive embedded hardware.
Silicon Signals is an embedded systems specialist company that provides creative engineering solutions to close the technology gap and meet the demands of the modern global industry. Our knowledge and cutting-edge solutions can assist companies in streamlining their processes, boosting productivity, and maintaining an advantage in the cutthroat marketplace.
Our state-of-the-art embedded systems can help companies of all sizes increase their competitiveness in the market, improve their goods and services, and streamline their operations. Silicon Signals provides an extensive array of services that can be customized to match the specific requirements of each client, ranging from custom hardware and software development to firmware design and testing. Businesses can lower costs, streamline operations, and seamlessly integrate technology into workflows by utilizing Silicon Signals' cutting-edge engineering solutions. Any company wishing to harness the potential of embedded systems should work with Silicon SIgnals, as they have a team of highly skilled engineers and a track record of success.
I hope this post makes it clear why industrial and Internet of things products require embedded hardware development. As you can see, integration of embedded systems is essential for achieving maximum performance and efficiency as they form the foundation of many industrial and Internet of things products. We provide cutting-edge embedded engineering solutions to meet the demands of our customers. Numerous businesses have benefited from our cutting-edge, reliable, and creative solutions in achieving their objectives. Get in touch with us right now to learn how they can assist you in realizing your ideas.
0 notes
psi-hate · 2 months ago
Note
What about bird girls? Oh and robot girls? Android girls??
all deserve all the birdseed, voltage and bloat-free micro-kernels they can get their hands on in my humble opinion
8 notes · View notes
abbiistabbii · 4 months ago
Note
Hey sorry I saw your post about Linux being better/just as good as Windows for gaming PCs, and I was wondering which type you’d recommend downloading for a mid-tier PC? (I’m not super tech savvy tbh but I’m a fast learner and would rather download Linux at this point than Windows after all the shit it’s done lately). Also, did not know Android uses Linux that is cool!
If you're a beginner, either one of the Linux Mint flavours or one of the Ubuntu flavours, depending on how mid-tier we're talking about. Mint is based on Ubuntu but they're both ultimately based on Debian, which is the most stable and easy to use (in my experience) Distro. You'll find this a lot that a lot of distros are based on other distros, but if I were to talk about distros, the best ones tend to be debian based.
So Linux Mint is made to be as user friendly as possible and have most, if not everything, working out the box, and it's great, but it does use an older version of the Kernel so you need to bare that in mind (but as a beginner you don't need to worry too much, everything will still work). It comes in three versions: Cinnamon (using the Cinnamon desktop), MATE (using the Mate Desktop) and XFCE (using the xfce desktop). On a mid-tier PC any of these will work, even the heaviest of them has a recommended ram of 4GB but if you know your PC you might wanna try MATE (about 1GB ram recommended) or XFCE (512 MB).
However I would recommend Ubuntu (it's what I'm using rn). It's what Linux Mint is based on and is just as user friendly as Mint but with the big difference being it uses a newer Kernel version and has more flavors using different Desktop Environments and for different uses. The flavors however are on different websites but more or less work closely with Ubuntu itself.
Vanilla Ubuntu used Gnome as it's default which is okay, some people like it, but I don't and nor does a lot of my friends. Different flavors have different requirements and levels of usability but again, 4GB is enough to run any flavor. Other Flavors include:
Kubuntu: this is the one I use, and in my option it's better than Vanilla. It used KDE and it's suite of apps which are both user friendly, wide ranging and really nice looking. KDE is quite resource intensive (again that's not saying much compared to windows) but if you have a mid tier PC with more than 4GB ram, it should run fine and I recommend it. I'm a big KDE fangirl.
Xubuntu: This is one I used in the past. Xubuntu used XFCE which is designed to be lightweight without sacrificing functionality. It's not as flashy, but it's easy to use, functional, and great for lower-powered computers or just people who wanna save on computing power.
Ubuntu Cinnamon: This flavor uses Cinnamon (which the "main" version of Mint uses) but with Ubuntu as the distro. I used Cinnamon as my desktop when I used Mint and I loved it. It has all the functionality of Gnome with all the ease of use and flashiness of KDE, so if you try out Cinnamon on Mint but like Ubuntu, try it out.
Lubuntu: This is the lightest of Ubuntu flavors. It's light enough that it's ARM version can run on a Raspberry pi. This was designed for computers with not much power like those old netbooks (remember those?) and it's not as flashy or functional, but it's a good option if your computer is a potato.
Ubuntu Budgie: This is the one I know least about because I have never used budgie. I checked it out on distrosea but other than that all I know is from people who have tried it. Some like Budgie (which uses the Budgie desktop) some don't, but I think I might need to check it out before I pass judgement.
Each of these versions are distributed from their own websites so be sure to google.
As for gaming I would recommend that after installing it, if you have a separate graphics card, install the drivers either from the driver manager or from the website itself. Steam runs on Linux and follow the instructions from steam on how to activate Proton.
Happy nerding.
8 notes · View notes
satoshi-mochida · 1 month ago
Text
Multiplayer roguelike action RPG Kernel Hearts debut trailer, screenshots - Gematsu
Tumblr media
Publisher Whitethorn Games and developer Ephemera have released the reveal trailer and first screenshots for Kernel Hearts, a multiplayer roguelike action RPG coming to PC via Steam. A release date was not announced.
Here is an overview of the game, via Whitethorn Games:
About
If the only way to bring a world back from the edge of the apocalypse was to destroy its god, would you have the power to do it? Kernel Hearts is an action-packed multiplayer roguelike game. Combining challenging hack-and-slash gameplay, role-playing, and roguelike elements with stunning anime aesthetics, you will battle your way up a deadly celestial tower, build your arsenal of skills with each mortal demise to eradicate monstrous angelic enemies and dethrone a god to save the world. As a member of M.A.H.O.U Unit—an elite fighting force of super-powered android magical girls—you and up to three allies are tasked with one thing: destroy a god to save the world from the brink of extinction. Starting from the base of the mythical Tower of Babel, you’ll fight your way through an array of powerful enemies from all sides, as you climb each level, gaining crucial skills and magical powers to help you surmount its pinnacle—and the new threats each floor brings with it. Defeat is no excuse; only the most resolute soldiers will reach the heavenly heights in order to dethrone their god—are you up for the task?
Key Features
Ascend to the Ultimate Being of Destruction – In every run, hunt for temporary skills that enhance your attacks, spells, and movement, empowering you to unleash devastating strikes and combos. Use these abilities to conquer the relentless enemies on each floor and exterminate the fearsome boss guardians that rule each domain.
The End is Just the Beginning – Facing enemies of biblical proportions requires persistence and grit, but a sudden demise isn’t the end. After each run, your unit returns to the lab, where you can use the rewards from previous missions to unlock and equip up to 256KB of skill chips. Customize your unit with these chips to match your unique playstyle.
Magical Transformations – The curse of the Tower is ever-present, and spending too much time in one area draws out even more powerful enemies. Harness the Tower’s energy to dispel the curses, briefly transform into your ultimate magical form and unleash annihilating attacks on any foes standing in your way.
Squad Up – Play alone or with up to three friends, honing and synergizing your skills to become the ultimate fighting force to get you to the top.
Friends in High Places – Each celestial domain hosts unique allies to help you on your journey. Befriend them to deepen your bond and maybe find love along the way!
Watch the announcement trailer below. View a new set of screenshots at the gallery.
Announce Trailer
youtube
5 notes · View notes
fortunatelycoldengineer · 2 years ago
Text
Tumblr media
Write the answer in the comment section . . . . for the answer https://bit.ly/3Cpu1SS check Q.20 No. of the above link
0 notes