Hangover 0.4.0 to be Available

The release is based on the code base Wine 4.0 and allows to run Windows apps built for x86 and x86_64 architectures in Linux and Android environments
18 February 2019   1511

The developers of the Wine project have published the first public release of the Hangover emulator, which allows running 32-bit and 64-bit Windows applications built for x86 and x86_64 architectures in Linux and Android environments based on ARM64 architecture (Aarch64). The release is based on the code base Wine 4.0, which is reflected in the version number of Hangover 0.4.0. The emulation layer is based on the QEMU project.

Unlike Wine, the Hangover project provides significantly higher performance. Acceleration is achieved by transferring the emulation layer to the Win32 / Win64 API level, instead of emulating regular system calls with subsequent emulation of the Win32 / Win64 API based on them.

Currently, the project allows you to run only simple applications and games that use the Win64 and Win32 APIs. For Linux, support for Direct3D has been implemented, which is not yet available for Android due to incomplete support for OpenGL ES in Wine. To ensure the work, a regular installation of Wine is used, supplemented with a number of DLL libraries and layers. In a Linux environment, Windows applications run automatically when qemu is in the Wine directory ("C: \ x86 \ qemu-x86_64.exe.so"). In Android, it is proposed to use the cmd utility to run.

Tor Browser 9.0.7 to be Released

New version of browser, focused on security, has a lot of improvements, e.g., vulnerabilities at components Tor and NoScript are fixed
24 March 2020   196

A new version of Tor Browser 9.0.7 is available, aimed at ensuring anonymity, security and privacy. The browser is focused on ensuring anonymity, security and privacy, all traffic is redirected only through the Tor network. It is impossible to access directly through the regular network connection of the current system, which does not allow tracking the real IP of the user (in case of a hacked browser, attackers can gain access to the network system parameters, so products such as Whonix should be used to completely block possible leaks). Builds Tor Browser prepared for Linux, Windows, macOS and Android.

The new release updated components Tor 0.4.2.7 and NoScript 11.0.19, in which vulnerabilities were fixed. Tor eliminated the DoS vulnerability, which created too much CPU load when accessing Tor directory servers controlled by cybercriminals. NoScript resolves a problem that allows you to work around the launch of JavaScript code in the "Safest" protection mode by redirecting to the "data:" URI.

In addition, the Tor Browser developers have added additional protection and if the "Safest" mode is turned on, they automatically disable JavaScript at the javascript.enabled setting level in about: config. This change does not allow whitelisting sites in NoScript for selective cancellation of "Safest" (to return to the old behavior, you can manually change the javascript.enabled value). After the Tor developers make sure that no loopholes are accurately covered in NoScript to bypass Safest, additional protection may be removed.

Get more at the official website.