Remove Development Remove Linux Remove Operating Systems Remove Wireless
article thumbnail

Technology Short Take 177

Scott Lowe

In this Technology Short Take, I have links on things ranging from physical network designs to running retro operating systems as virtual machines. Eduard Tolosa discusses binding wireless network adapters to systemd-nspawn containers. Nikhil shares a framework for selecting a Linux distribution. The first one is here.

Linux 60
article thumbnail

How to use your Oculus Quest 2 to play any PC VR game wirelessly

The Verge

That’s great if you want a way to play games like Half-Life: Alyx , but the obvious downside is that you’re now physically tethered to a PC — so much for the wireless freedom that the Quest 2 advertises. Enable developer settings. If you want to load files onto your Quest 2, you’ll need a developer account.

Wireless 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Linux Migration: Other Users’ Stories, Part 4

Scott Lowe

This post is part of a series of posts sharing other users’ stories about their migration to Linux as their primary desktop OS. As I mentioned in part 1 of the series , there seemed to be quite a bit of pent-up interest in using Linux as your primary desktop OS. Q: Why did you switch to Linux? is awesome).

Linux 60
article thumbnail

Mozilla is joining the Mobile OS game

CTOvision

A Spanish wireless network, Telefónica, has begun selling the Linux-driven smartphone that is called the ‘ZTE Open’ This phone runs the new Firefox OS, and can be purchased for only $90, it even comes with a pre-paid balance of $40 worth of phone calls. The Firefox OS is a HTML5 developed ecosystem.

Mobile 213
article thumbnail

The Wireless Attack Toolkit

CTOvision

By BryanHalfpap Wireless security is all about implementation. How much and what you leak depends on your wireless driver, operating system, and the networks that you’ve connected to in the past. That’s why I delete wireless network connections that are unencrypted when I am done using them (if I use them at all).

Wireless 242
article thumbnail

Technology Short Take #83

Scott Lowe

Here’s a quick post on nftables , the (eventual) Linux replacement for iptables. Turns out there’s a security vulnerability in some of the wireless keyboard and mice out there. Check out this blog on work done to bring firmware updates into the land of Linux. Operating Systems/Applications.

Linux 60
article thumbnail

Technology Short Take #83

Scott Lowe

Here’s a quick post on nftables , the (eventual) Linux replacement for iptables. Turns out there’s a security vulnerability in some of the wireless keyboard and mice out there. Check out this blog on work done to bring firmware updates into the land of Linux. Operating Systems/Applications.

Linux 60