Leaderboard
Popular Content
Showing content with the highest reputation on 09/24/2023 in all areas
-
Please INSTALL Kaspersky BEFORE we continue this TALKING IN CIRCLES CHARADE. The only telemetry is an injected script that Kaspersky's own SETTINGS allow you to TURN OFF. @AstroSkipper - is this the intent of this thread? to just "wear down" any and all that have a different opinion? Germany vs Italy? "we will win all arguments with those that disagree with us by making it totally EXHAUSTING for opposing views to present their case." I'm done. NOT WORTH MY TIME. I do like Panda. Not enough to actually start using it on anything but a spare laptop. Hope the thread becomes USEFUL to SOMEBODY. But no, NOT TO ME. Not if it's just going to be a "EU-Divide" and two boxers returning to their corner when the bell rings. Only to jump into the center and dance around in circles while they PUMMEL each other. Ding ding. The bell has rung.2 points
-
2 points
-
Seeing you're strangely persistent with that whole idea, I'm starting to have doubts you know what you're going to face. Modding an AV would require advanced reverse engineering skills, since what you're offering is exactly what any AV would need to protect itself from (hacking)*. Now, I don't know about your personal skills, but I hope you'll manage! It would be interesting to see the result. *EDIT - And yes it also includes protecting its registry entries.2 points
-
Hello @Saxon! If you are permanently connected with your notebook to the internet and need a real-time protection, you can try Panda Antivirus Free. Here is a link to my article: https://msfn.org/board/topic/184730-antimalware-firewall-and-other-security-programs-for-windows-xp-working-in-2023-and-hopefully-beyond/?do=findComment&comment=1244402 Alternatively, if you are willing to buy a license, you can try Malwarebytes Antimalware. This older version is very light on resources: https://msfn.org/board/topic/184730-antimalware-firewall-and-other-security-programs-for-windows-xp-working-in-2023-and-hopefully-beyond/?do=findComment&comment=1248964 And this is a more recent version: https://msfn.org/board/topic/184730-antimalware-firewall-and-other-security-programs-for-windows-xp-working-in-2023-and-hopefully-beyond/?do=findComment&comment=1244368 Cheers, AstroSkipper2 points
-
You have no authority to do this. This thread is about security programs for XP that work. Kaspersky is one of them. That is not a "praise". This quote is, as you always like to do, taken out of context. If someone posts about the same programme (and by that I mean Kaspersky Antivirus) over and over again, one doesn't really have anything new to say here. I personally write about many different security programmes here. Hence, my advice: First read, then write! As you know, I am the creator of this thread, and I will fill it only with content, which I can justify to myself, thus to the best of my knowledge and conscience. And I can of course suggest whatever I want to. But I can remember very well when you demanded in one of your countless Chrome threads that no one may say anything about the age of 360Chrome and that this browser is obsolete. For that, you are right, you did not have the authority to do this. Anyway! Regarding this topic, TBH, it is crystal clear one can't reach the unteachable or motivated for other, known reasons anyway. But maybe, those who still associate anything meaningful with the term security in this day and age. IMHO, Kaspersky is simply said history, no further investigation will be done by me. And as I already recommended, Kaspersky should be avoided based on all the facts listed here and in the old antivirus thread. And this is only a recommendation and nothing else. That's why I listed Kaspersky here: Cheers, AstroSkipper2 points
-
New build of Serpent/UXP for XP! Test binary: Win32 https://o.rthost.win/basilisk/basilisk52-g4.8.win32-git-20230923-3219d2d-uxp-cd21720e06-xpmod.7z Win64 https://o.rthost.win/basilisk/basilisk52-g4.8.win64-git-20230923-3219d2d-uxp-cd21720e06-xpmod.7z source code that is comparable to my current working tree is available here: https://github.com/roytam1/UXP/commits/custom IA32 Win32 https://o.rthost.win/basilisk/basilisk52-g4.8.win32-git-20230923-3219d2d-uxp-cd21720e06-xpmod-ia32.7z source code that is comparable to my current working tree is available here: https://github.com/roytam1/UXP/commits/ia32 NM28XP build: Win32 https://o.rthost.win/palemoon/palemoon-28.10.7a1.win32-git-20230923-d849524bd-uxp-cd21720e06-xpmod.7z Win32 IA32 https://o.rthost.win/palemoon/palemoon-28.10.7a1.win32-git-20230923-d849524bd-uxp-cd21720e06-xpmod-ia32.7z Win32 SSE https://o.rthost.win/palemoon/palemoon-28.10.7a1.win32-git-20230923-d849524bd-uxp-cd21720e06-xpmod-sse.7z Win64 https://o.rthost.win/palemoon/palemoon-28.10.7a1.win64-git-20230923-d849524bd-uxp-cd21720e06-xpmod.7z Official UXP changes picked since my last build: - Issue #2026 Follow-up: Fill in missing BigInt64 cases in js::IsTypedArrayConstructor(). Hopefully fixes RSA errors on ProtonMail. (7392901a9b) - Issue #2282 - Performance observer safety checks. Both fixes from later revisions, without the Dispatch API changes. (470af6ba50) - Issue #2308 - Fix JSON BigInt regressions. https://bugzilla.mozilla.org/show_bug.cgi?id=1522433 (e9202b0b0f) - Issue #2308 & #1240 Follow-up - Introduce new increment and decrement operations. https://bugzilla.mozilla.org/show_bug.cgi?id=1508521 (5c8a6c5bb8) - Issue #2308 & #1240 Follow-up - Add BigInt support to JSOP_INC and JSOP_DEC. https://bugzilla.mozilla.org/show_bug.cgi?id=1526309 (e12e377e51) - Issue #2308 & #1240 Follow-up - Fill in missing JSOP_INC/DEC cases for Ion on Intel32/64. (2b637c564f) - Issue #2308 & #1240 Follow-up - Replace JSOP_POS in ++/-- with JSOP_TONUMERIC. https://bugzilla.mozilla.org/show_bug.cgi?id=1519135 (209d714434) - Issue #2308 & #1240 Follow-up - Fill in missing JSOP_INC/DEC cases for Doubles in Ion. (8f44226445) - Issue #2307 - Part 1: Extend masm with the pmovmskb SSE2 instruction. (ba51ff6a74) - Issue #2307 - Part 2: Move SIMD code generation to masm methods (20f39d9450) - Issue #2307 - Part 2b: Remove superfluous dev comment (b086ec848b) - Issue #2307 - Part 3: Remove SIMD.js support (50a4412750) - Issue #2307 - Part 3b: Fix build bustage. (45c19ce1c5) No official Pale-Moon changes picked since my last build. No official Basilisk changes picked since my last build. My changes picked since my last build: - Revert "dom/media: more eme fixes" (2c6336eddb) - Revert "configure: move MOZ_GMP define block after MOZ_EME" (7e50abda7d) - Revert "Issue #2301 - Make Gecko Media Plugins optional when not building EME or WebRTC" (119feb053c) - missing changes when reverting previous commit (6c3db876fc) - [libwebp] Fix next is invalid pointer when WebPSafeMalloc fails (e5aed07ec1) - [libwebp] Never send VP8_STATUS_SUSPENDED back in non-incremental. (293fa3120b) - wasm: follow-up rev 50a44127 (cd21720e06) Update Notice: - You may delete file named icudt*.dat inside program folder when updating from old releases. * Notice: From now on, UXP rev will point to `custom` branch of my UXP repo instead of MCP UXP repo, while "official UXP changes" shows only `tracking` branch changes.2 points
-
Interesting, it works in official Pale Moon as-is. Users that already use uBlock Origin do not need ηMatrix as the site can be unbroken the same way with uBlock Origin. I use native user agent not containing "Firefox" and that seems to work fine.1 point
-
@Dixel - I really think you are "intentionally" missing the point. The Kaspersky CVE Report pertains to a Unique ID String. Period. Nothing more, nothing less. That unique ID string is NOT buried inside a .dll that requires mods to remove. The .dll installed on your computer is identical to the .dll installed on my computer. My unique ID string is not the same as your unique ID string. I am not part of the Anti Kaspersky Agenda. My directives are not being blinded by that Agenda. Kaspersky did send a unique ID string and it was introduced in the fall of 2015. Kaspersky removed that unique ID string in June of 2019. Non-evasive (no modding) methods to prevent this were common knowledge in 2016. There is a setting right there in the Kaspersky GUI to disable this behavior. In Kaspersky 2016, it was in Settings -> Additional -> Network -> Inject scripts into web traffic to interact with web pages People that install with "defaults" would never see this - us here at MSFN are smarter than that, I would hope. uMatrix removes that "injection". I will verify but I have to assume that everybody's beloved uBO also removes it. I have Kasperky INSTALLED. Perhaps any and all discussions pertaining to Kaspersky should be limited to THOSE THAT HAVE IT INSTALLED? I'm done. Stick a fork in me.1 point
-
I don't think there's much point in keeping v117, even though it's newer in features, but eventually, in a few years both will be equally obsolete. But ESR will eliminate vulnerabilities found during the support period.1 point
-
I mainly know TrayIt!, but thanks for another application for minimizing programs to tray.1 point
-
The EU is divided on this. So too will MSFN Members be divided. This thread should not be about the loudest squeaking wheel getting the oil. It's an international forum not tied to any specific Government Agency's "perspective". When we (any one of us) act like it is, that is where POLITICS enter the picture and we need to AVOID that. PLEASE.1 point
-
1 point
-
I too was surprised to see that there was some sort of update. The good thing is that I have Nightly made portable with its own profile, so updating and corrupting the profile did not damage my data. I had to add a policy to block updates, but it affects all versions of Firefox.1 point
-
@Anbima Most likely the next week, new version is almost ready. But it will be no changes regarding languages since 16.13, so you not need to wait.1 point
-
Noted. And in that thread, you wrote this -- "where I was even courteous enough to provide a very rare installer for Kaspersky Free Antivirus 2019, which I had previously cleaned and thus decontaminated" So are we allowing MODDED versions or not? Because Kaspersky CAN be MODDED to be "safe and secure" and NO LONGER a concern with identifier strings. That is the angle I am coming from. I have not tested yet, all I've done thus far is create 4 partitions and installed XP *three times* so I have TIME INVESTED. IF, and it's a big IF, but IF Kaspersky (after removing telemetry and Unique ID String) is lean and mean compared to AVG, Avast, McAfee, Norton, MalwareBytes, then WE MUST consider it as the "superior" alternative for OLD HARDWARE. Again, a big IF, but if an XP installed with Kaspersky "idles" at 5% CPU utilization and 15% RAM utilization where an XP installed with McAfee "idles" at 20% CPU utilization and 40% RAM utilization, then who in their right mind would use McAfee. Purely hypothetically percentages at this stage.1 point
-
New NewMoon 27 Build! 32bit https://o.rthost.win/palemoon/palemoon-27.10.0.win32-git-20230923-e753cbebb0-xpmod.7z 32bit SSE https://o.rthost.win/palemoon/palemoon-27.10.0.win32-git-20230923-e753cbebb0-xpmod-sse.7z 32bit noSSE https://o.rthost.win/palemoon/palemoon-27.10.0.win32-git-20230923-e753cbebb0-xpmod-ia32.7z 64bit https://o.rthost.win/palemoon/palemoon-27.10.0.win64-git-20230923-e753cbebb0-xpmod.7z source repo: https://github.com/roytam1/palemoon27 repo changes since my last build: - [libwebp] backport missing patch from https://github.com/webmproject/libwebp/commit/067031eaed11e91d9914e1e872738c7bdf075e0b (113bf758b9) - import changes from `dev' branch of rmottola/Arctic-Fox: - Bug 1238935 - r=jonco (262e919be3) - Bug 1246658 part 3 - Rewrite MConstant's public interface to not expose js::Value directly. r=luke (44f1c7ac03) - Bug 1246331: Make unary decoding expect the real type, not the parent type; r=sunfish (fd159749d1) - Bug 1244571 - BaldrMonkey: Remove obsolete opcodes. r=luke (670ae82404) - Bug 1248488 - Odin: switch more integer immediates to variable-length u32s (r=sunfish) (c7e118cb58) - Bug 1248860 - Odin: remove Expr::InterruptCheck (r=bbouvier) (c9824a364d) - Bug 1248860 - Odin: move CompileArgs to ModuleGeneratorData (r=bbouvier) (5292a52fa9) - Bug 1248860 - Baldr: change function bodies to an expr list from expr (r=bbouvier) (f8fd39d1b0) - Bug 1248625 - Baldr: make string labels more regular (r=sunfish) (d14c7e6640) - Bug 1248625 - Change 'return false' to 'return nullptr' (r=me) (ae1f98f059) - Bug 1244889 - Remove toMIRType() and simdType() methods. r=bbouvier (0c281e9bc8) - Bug 1244889 - Rename Type:isVarType() out of the way. r=luke (b7e0812cab) - Bug 1244889 - Define a canonical subset of Type::Which. r=luke (4cb69fd6ec) - Bug 1244889 - Reduce dependency on wasm::ValType. r=luke (53f41aad5d) - Bug 1244889 - Reduce dependency on wasm::ExprType. r=luke (7353ebd8ed) - Bug 1244889 - Fix CheckCoercionArg and CheckReturnType. r=luke (4824150189) - Bug 1244889 - Remove SimdTypeToLength(). r=bbouvier (a2399e9e72) - Bug 1243647 - Fix -Wimplicit-fallthrough warnings by breaking at unintentional switch fallthroughs in AsmJS.cpp. r=bbouvier (cb851f375d) - Bug 1244889 - Amend wasm opcodes for unsigned I32x4 operations. r=bbouvier (ca05c907c8) - fix NetBSD build (again) (08b0f8f447) - Bug 1239007 - Replace nsIntRect by strongly-typed rects in a couple of nsCocoaUtils functions. r=mstange (501f73b896) - Bug 1239855 - Fix for widget positioning/sizing on hidpi displays under Gtk. r=emk (f37be964c0) - bug 1225970 dispatch an event to release the widget after draw r=roc (61fe380407) - Bug 1232219 (part 2) - Fix -Wunused warnings in widget/gtk/. r=karlt. (3415ffc27a) (2e9d0efbca) - import changes from `dev' branch of rmottola/Arctic-Fox: - Bug 1140558 - Part 2 - Make the testing deepEqual implementation shared properly in ObjectUtils.jsm. r=yoric (f1a217e34a) - Bug 1154773 - Change undefined property a.prototype. r=Yoric (8a4dc37d6c) - Bug 1202971 (part 1) - Fix compile warnings in libmar. r=rstrong. (30cdf015c2) - bug 1200360 - fix $(DEFINES) usage in modules/libmar/tool/moz.build. r=mshal (26f1c5640b) - Bug 903135 - Updates to libmar needed to support B2G MAR signature verification. r=bbondy (81612e2200) - Bug 1228332 - Fix a potentially uninitialized pointer read, flagged by static analysis. r=spohl (9cac770c90) - Bug 1202971 (part 2) - Fix compile warnings in toolkit/mozapps/update/tests. r=rstrong. (814f2b3b8b) - Bug 973933 - Fix libmar warnings. r=rstrong. a=Callek (e0c2d3edcc) - Bug 1232219 (part 1) - Fix -Wunused warnings in libmar/. r=bbondy. (dc046504df) - Bug 1228281 - [GTK3] add padding to buttons. r=karlt (fe8ca55f58) - Bug 1232219 (part 2.5) - Fix -Wunused warnings in parser/expat/lib/. r=hsivonen. (e4d10c5d68) - Bug 1232219 (part 3) - Fix remaining -Wunused warnings. r=glandium. (35c5f3c38e) - Bug 1232219 (follow-up) - Fix nsinstall.c bustage in SM(e) builds. r=me. (d62c12cf35) - Bug 1186815 (part 1) - Replace nsBaseHashtable::Enumerate() calls in modules/libjar/ with iterators. r=mwu. (6959b19fab) - Bug 1186815 (part 2) - Replace nsBaseHashtable::Enumerate() calls in modules/libjar/ with iterators. r=mwu. (02c6f50482) - Bug 1181444 (part 1.5) - Remove dead PLDHashOperator declarations. r=froydnj. (c956e03dc0) - Bug 1225407 - Replace nsInterfaceHashtable::EnumerateRead() call in SubstitutingProtocolHandler with an iterator. r=michal (aa71f5499c) - Bug 1187781 (part 1) - Replace nsBaseHashtable::EnumerateRead() calls in dom/xbl/ with iterators. r=mrbkap. (68f51d05ba) - Bug 1187781 (part 2) - Replace nsBaseHashtable::EnumerateRead() calls in dom/xbl/ with iterators. r=mrbkap. (1dfc261267) - Bug 1187781 (part 3) - Replace nsBaseHashtable::EnumerateRead() calls in dom/xbl/ with iterators. r=mrbkap. (922fc4e4ef) - Bug 1187781 (part 4) - Replace nsBaseHashtable::EnumerateRead() calls in dom/xbl/ with iterators. r=mrbkap. (7b1915053f) - Bug 1187781 (part 5) - Replace nsBaseHashtable::EnumerateRead() calls in dom/xbl/ with iterators. r=mrbkap. (5df4cc1d09) - Bug 1181444 (part 2) - Remove nsBaseHashtable::Enumerate(). r=froydnj. (c606342f1d) - Bug 1243912 - Remove unused Loader::RemoveEntriesWithURI declaration. r=njn (e59b2ef892) - Bug 1187137 (part 4) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (17fb17c48f) - Bug 1187137 (part 5) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (89d430cf98) - Bug 1187137 (part 6) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (37befe08c6) - Bug 1187137 (part 7) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin (a8227c4b3e) - Bug 1187137 (part 1) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=michal. (05f71a4a94) - Bug 1187137 (part 2) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=michal. (5defa991b5) - Bug 1187137 (part 3) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=michal. (f2e0a4be0f) - Bug 1187137 (part 8) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (11b77f3b67) - Bug 1187137 (part 9) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (7a6bd9a17e) - Bug 1230743 - telemtry for nsConnectionEntry hit rate r=hurley (a75d6ec52c) - Bug 1218297 - eventtokenbucket shutdown leak r=valentin (1723059684) - Bug 1239961 - Minimize amount of PR_Poll and PR_Read calls during shutdown. r=mcmanus (127259afb6) - Bug 1187137 (part 10) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (eee20459fb) - Bug 1187137 (part 11) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (864bc96862) - Bug 1187137 (part 12) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (4fd9540167) - Bug 1187137 (part 13) - Replace nsBaseHashtable::Enumerate() calls in netwerk/protocol/ with iterators. r=valentin. (65a01f4083) - Bug 1187151 (part 14) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=baku. (a71b4169a9) - Bug 1187141 - Replace nsBaseHashtable::Enumerate() calls in storage/ with iterators. r=mak. (d95fb168c9) - Bug 1187151 (part 11) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=khuey. (dda92d0455) - Bug 1187151 (part 10) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=khuey. (f59270049c) - Bug 1191460 Contextual Identity tests r=tanvi,r=ttaubert (03c079ede9) - Bug 1187151 (part 12) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=khuey. (0aa9356990) - Bug 1187151 (part 15) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=baku. (10e60a4b55) - Bug 1187151 (part 16) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=mccr8. (2ef1033aae) - Bug 1187151 (part 17) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=mccr8. (dc37dfc17b) - Bug 1241763: Don't fire dom-window-destroyed on outer windows. r=bz (ea30677af6) - Bug 1192128 - In DOM memory reporter, handle WindowID() being a uint64_t. r=mccr8. (b3f834b8f6) - Bug 1187151 (part 18) - Replace nsBaseHashtable::Enumerate() calls in dom/ with iterators. r=mccr8. (22d4fbe0f0) - Bug 1187138 (part 2) - Replace nsBaseHashtable::Enumerate() calls in toolkit/ with iterators. r=froydnj. (b4740ef44b) - Bug 1187138 (part 3) - Replace nsBaseHashtable::Enumerate() calls in toolkit/ with iterators. r=froydnj. (931eb9e813) - Bug 1187138 (part 4) - Replace nsBaseHashtable::Enumerate() calls in toolkit/ with iterators. r=froydnj. (a92fef3586) - Bug 1192189 - Fix assertion condition to use to-be-restyled element's composed document. r=dbaron (6c7733b7cc) - Bug 1187144 (part 10) - Replace nsBaseHashtable::Enumerate() calls in layout/ with iterators. r=heycam. (e93ad4330c) - Bug 1250525 - remove #IFDEF ENABLE_TESTS from dom/quota/ActorsParent.cpp. r=janv (22bc8fc0af) - Bug 1236632 - remove unused variable in FactoryOp::WaitForTransactions; r=janv (3c56b90fff) - Bug 1187116 (part 1) - Replace nsBaseHashtable::EnumerateRead() calls in dom/indexedDB/ with iterators. r=khuey. (f37ac71816) - Bug 1187116 (part 2) - Replace nsBaseHashtable::EnumerateRead() calls in dom/indexedDB/ with iterators. r=khuey. (6bf16c51fe) - Bug 1187116 (part 3) - Replace nsBaseHashtable::EnumerateRead() calls in dom/indexedDB/ with iterators. r=khuey. (351b7d5d34) - Bug 1187116 (part 4) - Replace nsBaseHashtable::EnumerateRead() calls in dom/indexedDB/ with iterators. r=khuey. (330678dde4) - Bug 1187116 (part 5) - Replace nsBaseHashtable::EnumerateRead() calls in dom/indexedDB/ with iterators. r=khuey. (43d20a7fa3) - Bug 1187116 (part 6) - Replace nsBaseHashtable::EnumerateRead() calls in dom/indexedDB/ with iterators. r=khuey. (d448d80726) - quick fix by revert of anticipated patch (00a093055d) - Bug 1186814 - Replace nsBaseHashtable::EnumerateRead() calls in extensions/spellcheck/ with iterators. r=ehsan. (ff78039ba0) (6ecfad14f8) - [libwebp] Fix next is invalid pointer when WebPSafeMalloc fails (591354ba98) - [libwebp] Never send VP8_STATUS_SUSPENDED back in non-incremental. (4f7b2e5ab1) - import changes from `dev' branch of rmottola/Arctic-Fox: - Bug 1228822 - Ensure we send out the window update when matching a pushed stream with a pull stream. r=mcmanus (0ced75ca0c) - Bug 1234591 - Use channel.asyncOpen2 within netwerk/test/unit/test_http2.js r=ckerschb (c9369b0517) - Bug 1249379 - H2 Push WindowUpdate not written to network r=hurley (8dec8b4c4a) - Bug 1249432 - less h2 parallel conns r=hurley (b2a6eeeac4) - Bug 1209184: Part 2 - [webext] Localize CSS files served from moz-extension: channels. r=jdm (1098b41a0d) - Bug 1242961 - nsStandardURL still allows to build valid nsIURIs longer than network.standard-url.max-length. r=valentin (f768b36113) (14c6a5dfac) - import changes from `dev' branch of rmottola/Arctic-Fox: - Bug 1249482 - OdinMonkey: Remove the needsBoundsCheck flag from the frontend. r=luke (5004e664a0) - Bug 1249513 - OdinMonkey: MIPS: Clean up long jump patching in asm.js. r=luke (18c7f026f5) - fix misspatch of 1234985 (0713b005b4) - Bug 1248598 part 1 - Some code changes required for the i64.const instruction. r=luke (7bb3eaa57f) - Bug 1247855: Resolve named functions and locals (r=luke) (e06d418fd1) - Bug 1249524 - Baldr: add the other (param) declaration form to the text format (r=mbx) (9492f57377) - Bug 1249523 - Baldr: add return (r=mbx) (36a4eca6a3) - Bug 1249316 - Baldr: move testing functions back into TestingFunctions.cpp (r=jandem) (7daf99a017) - Bug 1249531 - Baldr: add text format and encoding support for control operators (r=mbx) (6dee433349) - Bug 1248598 part 2 - Reject wasm i64 imports/exports as JS doesn't have an int64 type. r=luke (72603cdb3d) - Bug 1246658 part 4 - Replace MConstant's js::Value with a custom union. r=luke (1c78b526d2) - Bug 1246658 part 5 - Support int64 constants, add MIRType_Int64. r=luk (db94c230c6) - Bug 1246658 part 1 followup - Fix a bug introduced by the refactoring. (ec3d444596) - Bug 1248859 - OdinMonkey: MIPS: Fix replace retargetWithOffset. r=arai (dd117fcbf5) - Bug 1249525 - Baldr: accept - and $ in text names (r=sunfish) (64e4e1ddf8) - Bug 1249525 - Baldr: accept integer cases in float constants (r=sunfish) (90a8fbb5d5) - Bug 1248859 - OdinMonkey: MIPS: Implement thunkWithPatch and re/patchThunk. r=luke (722240c9b7) - Bug 1248859 - OdinMonkey: MIPS: Refactor callWithPatch via reative branch. r=luke (0684904686) - Bug 1248503 - Improve log output for MSimdBox and MSimdUnbox. r=nbp (6b65608504) - Bug 1248503 - Fix initial heap assertion. r=nbp (bcf704df34) - Bug 1249525 - Baldr: change order of load/store immediates/subexpressions (r=sunfish) (c2ec5329e2) - Bug 1240055: IonMonkey: When spewing info about range analysis, also spew truncation info, r=nbp (cf477cffce) - fix misspatch in symbol visibility (039e111b31) (e753cbebb0)1 point
-
Critical Update Notification tool is back! Today, thanks to @ward201185, CUN 4.0 has been revived! This patched tool can now be downloaded from WURv4 for users of Windows 98 in English. Support for Windows 2000 and other languages will come later.1 point
-
Perhaps you all still have some hope, I ported chinese browser Opra 96 (Chrome 110) to Vista. https://msfn.org/board/topic/184249-chrome-110-based-opera-i-ported-it-to-vista/1 point
-
Businesses you say ? Alive OS you say ? Well, looks like you've never been to a real business enviroment. Businesses in Western Europe use only official, unmodified and legal products with the latest updates. If you ever use this no-sanbox crack at your work place, they will sue the hell out of you and fire without pay ! Also write an awful recommendation, lol. Recently saw a huge batch of computers from one of our local businesses, made in 2016 with Win 10 stickers at our e-waste factory. What WIndows 7, lol ? It was completely outphased in 2014 or so. That being said, I surely don't know how they run businesses in Nicaragua. P.S. You don't own this forum.1 point
-
Please tell, how do you run the current chrome 110 on your favourite Win 7 ? (on-topic)1 point
-
There is a huge difference between officially supported and the one that runs using hacks. Yes, we know it runs fine with the no-sandbox hack on 8.1, win32 already wrote that, no need to write again. There is a huge difference between normal users and us, who are willing to take risks. Don't you think the normal users should be warned, at least ? So this puts Vista and 7/8/8.1 in the same shoes, but Vista moved away, and they are not, yet Windows 7 is abandonware, dropped by Microsoft almost 3 years ago. https://support.microsoft.com/en-us/windows/windows-7-support-ended-on-january-14-2020-b75d4580-2cc7-895a-2c9c-1466d9a53962 Then put Vista back , because it also runs Chrome with this hack, by this very logic !1 point
-
@Sampei.Nihira, if you read the above comments carefully, this hack doesn't help Windows 7 at all. Most importantly, on windows 7 this no-sandbox hack doesn't work anyways. So no launching the new Chrome at all.1 point
-
The advice to use --no-sandbox hack may lead to furious whining from "security oriented" users, not wanting to call them security freaks, so just leave it put very politely put, like I did. Officially it means danger: When the sandbox is disabled with this flag , websites can potentially execute malicious Javascript based exploits onto your computer. This exposes the user to Remote Code Execution (RCE) exploits that can execute arbitrary code on your computer. A Chromium based javascript exploit can potentially affect every single downstream application that is built using the Chromium engine. The 110 Chrome asks for GetProcessMitigationPolicy (which is win 10 and up only). And don't forget about this : The data execution prevention (DEP) policy of the process. The lpBuffer parameter points to a PROCESS_MITIGATION_DEP_POLICY structure that specifies the DEP policy flags. ProcessASLRPolicy The Address Space Layout Randomization (ASLR) policy of the process. Source : microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-getprocessmitigationpolicy So this is absolutely official - no more Chrome for 7/8/8.1. Not to mention a gazillion of games that do not start on 7/8/8.1 due to the missing functions and/or DX12. @Tripredacus, @Dave-H , would be wise to finally retire these OSes from the main section, no ?1 point
-
I know. Yes, deja vu. I'm having a really hard time imagining someone who would seriously consider using Yadnex, even if they "somehow" let the new chrome work.1 point
-
New build of Firefox 45ESR: Test binary: SSE https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220924-cf157e5f8-win32-sse.7z IA32 https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220924-cf157e5f8-win32-ia32.7z Win64 https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220924-cf157e5f8-win64.7z repo: https://github.com/roytam1/mozilla45esr Changes since my last build: - update NSS builtin certstore to Sep 2022 version from mozilla upstream. (a6e45483e) - partly import changes from tenfourfox: - 102ESR: rev EV roots, TLS roots, TLDs, tzdata, HSTS, pins (c47bef11f) (32adeaa21) - partly import changes from tenfourfox: - #651: M1767365+backbugs M1757604 M1497246 M1771774 M1776658 M1761981 M1773717 (bc6daa0ae) (c28b308ec) - d3d9: further lowered MaxTexture limit to 1024 to give chance for Radeon 9550 and GMA 965 to use hardware acceleration (54d374ceb) - backout bug1757604 part from rev c28b308e as it cause display issues (cf157e5f8)1 point
-
New build of Firefox 45ESR: Test binary: SSE https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220507-10489da23-win32-sse.7z IA32 https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220507-10489da23-win32-ia32.7z Win64 https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220507-10489da23-win64.7z repo: https://github.com/roytam1/mozilla45esr Changes since my last build: - zlib: CVE-2018-25032 fix, from https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 (6c0e009c8) - nss: update in-tree zlib to 1.2.11 (7a0284a6e) - nss: in-tree zlib CVE-2018-25032 fix, from https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 (26d53d99e) - partly import changes from tenfourfox: - fix floats in bailouts from POWER9 JIT project (branching adjust under separate investigation) (6cae6ac23) - better solution for #654 (0a9d355be) - #566 and #651: M1761026+backbugs, M1663508, M1719215 (700da3e99) - #651: update HSTS, pins, TLDs, TZ data (fbd13e3c8) (10489da23)1 point
-
New build of Firefox 45ESR: Test binary: SSE https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220326-9e05fb0f0-win32-sse.7z IA32 https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220326-9e05fb0f0-win32-ia32.7z Win64 https://o.rthost.win/gpc/files1.rt/firefox-45.9.34-20220326-9e05fb0f0-win64.7z repo: https://github.com/roytam1/mozilla45esr Changes since my last build: - imported changes from mozilla: - Bug 1754724 - Clear up some computations in expat code. r=farre, a=tritter (c084e1e9) - Bug 1754724 - Clear up some more computations in expat code. r=farre, a=tritter (1ff49f5a) - Bug 1754724 - Clear up even more computations in expat code. r=farre, a=tritter (4a180bbf) - Bug 1758062 - Convert parameters upfront. r=smaug, a=tritter (153b3922) (ab2c4b048) - update Twemoji to v14.0.1 based font. (8122fb2c6) - update libpixman from my UXP custom branch, with SSSE3 code compiled (without CONFIG['SSSE3_FLAGS'] support, so hackfixed) (9a9f88558) - import from UXP: - Issue #3039 - Add closure point to bounds calculation. (42fc0af32) - Issue #3039 - Increase the MAX_FONT_SIZE limit applied in cairo_ft_font to match the gfxFont size limit. (35164e286) - Issue #3039 - Reapply bug 624198 fix that got lost in an upstream update. (dda2b7972) - Issue #3039 - Don't try to pass a dash array of > 16 elements to ExtCreatePen. (3bb1c962e) (1bfb3a970) - [NSS] ported mozilla upstream changes: - Bug 1552254 internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3 (be6a9782) - Bug 1753535 - Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate. r=rrelyea (800111fa) - Bug 1756271 - Remove token member from NSSSlot struct. r=rrelyea (55052f78) - Bug 1396616 - Update nssUTF8_Length to RFC 3629 and fix buffer overrun. r=nss-reviewers,jschanck (2f2c8564) - Bug 1755264 - TLS 1.3 Illegal legacy_version handling/alerts. r=djackson (7d931c59) - Bug 1751305 - Remove expired explicitly distrusted certificates from certdata.txt. r=KathleenWilson (b722e523) - Bug 1751298 - Add Telia Root CA v2 root certificate. r=KathleenWilson (1fcbbd7e) - Bug 1754890 - Add two D-TRUST 2020 root certificates. r=KathleenWilson (f63fb86d) (9e05fb0f0)1 point