Windows Notepad Finally Supports Unix, Mac OS Line Endings

Microsoft’s text editing app, Notepad, which has been shipping with Windows since version 1.0 in 1985, now supports line endings in text files created on Linux, Unix, Mac OS, and macOS devices. “This has been a major annoyance for developers, IT Pros, administrators, and end users throughout the community,” Microsoft said in a blog post today. The Register reports: Notepad previously recognized only the Windows End of Line (EOL) characters, specifically Carriage Return (CR, r, 0x0d) and Line Feed (LF, n, 0x0a) together. For old-school Mac OS, the EOL character is just Carriage Return (CR, r, 0x0d) and for Linux/Unix it’s just Line Feed (LF, n, 0x0a). Modern macOS, since Mac OS X, follows the Unix convention. Opening a file written on macOS, Mac OS, Linux, or Unix-flavored computers in Windows Notepad therefore looked like a long wall of text with no separation between paragraphs and lines. Relief arrives in the current Windows 10 Insider Build. Notepad will continue to output CRLF as its EOL character by default. It’s not changing its stripes entirely. But it will retain the formatting of the files it opens so users will be able to view, edit and print text files with non-Windows line ends. Microsoft has thoughtfully provided an out for Windows users counting on the app’s past inflexibility: the new behavior can be undone with a registry key change.


Eight New Meltdown-Like Flaws Found

An anonymous reader quotes Reuters:
Researchers have found eight new flaws in computer central processing units that resemble the Meltdown and Spectre bugs revealed in January, a German computing magazine reported on Thursday. The magazine, called c’t, said it was aware of Intel Corp’s plans to patch the flaws, adding that some chips designed by ARM Holdings, a unit of Japan’s Softbank, might be affected, while work was continuing to establish whether Advanced Micro Devices chips were vulnerable… The magazine said Google Project Zero, one of the original collective that exposed Meltdown and Spectre in January, had found one of the flaws and that a 90-day embargo on going public with its findings would end on May 7…
“Considering what we have seen with Meltdown and Spectre, we should expect a long and painful cycle of updates, possibly even performance or stability issues,” said Yuriy Bulygin, chief executive officer of hardware security firm Eclypsium and a former Intel security researcher. “Hopefully, Meltdown and Spectre led to improvements to the complicated process of patching hardware.”
Neowin now reports that Intel “is expected to release microcode updates in two waves; one in May, and the other in August.”


Microsoft’s ‘Meltdown’ Patch For Windows 10 Contains a Fatal Flaw

An anonymous reader quotes BleepingComputer: Microsoft’s patches for the Meltdown vulnerability have had a fatal flaw all these past months, according to Alex Ionescu, a security researcher with cyber-security firm Crowdstrike. Only patches for Windows 10 versions were affected, the researcher wrote today in a tweet. Microsoft quietly fixed the issue on Windows 10 Redstone 4 (v1803), also known as the April 2018 Update, released on Monday. “Welp, it turns out the Meltdown patches for Windows 10 had a fatal flaw: calling NtCallEnclave returned back to user space with the full kernel page table directory, completely undermining the mitigation,” Ionescu wrote. Ionescu pointed out that older versions of Windows 10 are still running with outdated and bypass-able Meltdown patches. Wednesday Microsoft issued a security update, but it wasn’t to backport the “fixed” Meltdown patches for older Windows 10 versions. Instead, the emergency update fixed a vulnerability in the Windows Host Compute Service Shim (hcsshim) library (CVE-2018-8115) that allows an attacker to remotely execute code on vulnerable systems.


GitHub Accidentally Exposes Some Plaintext Passwords In Its Internal Logs

GitHub has sent an email to some of its 27 million users alerting them of a bug that exposed some user passwords in plaintext. “During the course of regular auditing, GitHub discovered that a recently introduced bug exposed a small number of users’ passwords to our internal logging system,” said the email. “We have corrected this, but you’ll need to reset your password to regain access to your account.” ZDNet reports: The email said that a handful of GitHub staff could have seen those passwords — and that it’s “unlikely” that any GitHub staff accessed the site’s internal logs. It’s unclear exactly how this bug occurred. GitHub’s explanation was that it stores user passwords with bcrypt, a stronger password hashing algorithm, but that the bug “resulted in our secure internal logs recording plaintext user passwords when users initiated a password reset.” “Rest assured, these passwords were not accessible to the public or other GitHub users at any time,” the email said. GitHub said it “has not been hacked or compromised in any way.”


Foxconn Will Drain 7 Million Gallons of Water Per Day From Lake Michigan to Make LCD

Earlier this week, the Wisconsin Department of Natural Resources granted permission to Taiwanese tech manufacturer Foxconn, best known for assembling Apple’s iPhones, to siphon off seven million gallons of water per day from Lake Michigan, despite protests from conservation groups. From a report: The massive diversion of water from the lake will be used to produce LCD screens at the company’s planned $10 billion, 20 million square foot manufacturing plant set to be built in Mount Pleasant, Wisconsin. Nearly 2.7 million gallons of the water — about 39 percent of the daily intake from the factory — will be lost in the process, primarily from evaporation. The remaining water will be treated and returned to the lake basin. Wisconsin’s DNR noted in a statement that the requested withdrawal will “only amount to a 0.07 percent increase in the total surface water withdrawals from Lake Michigan.” For environmentalists in the region, the issue is not so much the diversion for the Foxconn factory itself but rather the precedent it will set for how the lake water can be used. “If we allow this to happen, it’s going to happen all over the basin, with other states and then it’s going to be the thirsty states and nations to come,” Jennifer Giegerich, the government affairs director for the Wisconsin League of Conservation Voters, warned during a public hearing about the diversion, according to the Wisconsin Gazette.


More Than 1 Million Kids Had Their Identities Stolen in 2017

More than 1 million children were victims of identity fraud in 2017, a new study from Javelin Strategy & Research found, costing a total of $2.6 billion.


Suspicious Event Hijacks Amazon Traffic For 2 hours, Steals Cryptocurrency

Amazon lost control of some of its widely used cloud services for two hours on Tuesday morning when hackers exploited a known Internet-protocol weakness that allowed them to redirect traffic to rogue destinations, according to media reports.


1.1.1.1: Cloudflare’s New DNS Attracting ‘Gigabits Per Second’ of Rubbish

Cloudflare’s new speed and privacy enhancing domain name system (DNS) servers, launched on Sunday, are also part of an experiment being conducted in partnership with the Asia Pacific Network Information Center (APNIC). The experiment aims to understand how DNS can be improved in terms of performance, security, and privacy.


Malware Attack on Vendor To Blame for Delta and Sears Data Breach Affecting ‘Hundreds

Delta Air Lines and Sears Holding on Thursday disclosed a data breach that may have exposed the payment card details of hundreds of thousands of online customers. From a report: The breach originated at a software vendor called [24]7, which provides Sears, Delta, and other businesses with online chat services. Less than 100,000 Sears customers were supposedly impacted, according to Sears. A Delta spokesperson said hundreds of thousands of travelers are potentially exposed. Gizmodo has learned the breach was the result of a malware attack, and that the unauthorized access involved payment card numbers, CVV numbers, and expiration dates, in addition to customers’ names and addresses. In a statement, [24]7 said the breach occurred on September 27th of last year and was contained roughly two weeks later. In a statement, Sears said it was first notified about the breach in mid-March. Credit card companies have been notified, and law enforcement is likewise investigating the incident. “Customers using a Sears-branded credit card were not impacted,” Sears said. “In addition, there is no evidence that our stores were compromised or that any internal Sears systems were accessed by those responsible.”


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

AbuseIPDB Contributor Badge