Social

Retro-Computing in 2025: why old Machines are cool again

Retro-computing isn’t new. Enthusiasts have been restoring and emulating old systems for decades. But 2025 is different: retro machines are gaining serious attention in education, cybersecurity, and even enterprise experiments.

Reasons for the rise:

  • Educational value: Old systems strip computing down to the basics, forcing students to understand how hardware and software truly interact.

  • Security testing: Legacy protocols and systems still exist in industries like healthcare, aviation, and banking. Learning how they work helps modern engineers defend against vulnerabilities.

  • Cultural nostalgia: Just like vinyl records or vintage cameras, classic computers have aesthetic and cultural appeal.

Examples of Retro Systems in use

  • DEC VAX and PDP-11: Being revived in universities for teaching operating system concepts.

  • Commodore 64 & Amiga: Used in creative coding workshops to inspire young developers with pixel art and chiptune music.

  • IBM Mainframes (emulated): Explored by enterprises who still depend on legacy COBOL applications.

Even emulators like SIMH or FPGA recreations allow old hardware to live on in modern labs.

Why It Matters in 2025

  1. Bridging Generations – New engineers learn how computing evolved, while veterans pass on hard-earned knowledge.

  2. Cybersecurity Relevance – Many cyberattacks target outdated protocols. Training on retro systems builds better defenders.

  3. Sustainable Tech – Repurposing and emulating old systems fits into the global push for reducing electronic waste.

  4. Fun Factor – Let’s be honest: there’s something cool about coding on a green monochrome screen.

Some researchers argue retro-computing could play a role in resilient computing. Older machines are simpler, less dependent on cloud infrastructure, and in some cases more robust against modern attacks. In an age of supply chain concerns and AI-driven vulnerabilities, there’s value in “dumb but safe” machines.

[mai mult...]

When the Autopilot Fails: the Hidden Risks of AI in 2025

Artificial intelligence has rapidly become the co-pilot of our digital lives. From autonomous vehicles to automated cybersecurity tools and even AI-assisted air traffic systems, machine learning models are making decisions that directly impact safety, privacy, and trust. But as discussions at FrOSCon 2025 reminded us this August, AI autopilot systems are not foolproof — and their failures can have real consequences.

The concept of “autopilot” AI is appealing: machines that can drive us home, manage data center workloads, or automatically detect and block cyberattacks. Companies market these solutions as time-savers and risk reducers, arguing that automation removes human error from critical processes.

For example:

  • Autonomous vehicles are being tested globally with promises of safer roads.

  • Cybersecurity AI can respond to threats in milliseconds, far faster than human analysts.

  • Airline autopilot systems, already heavily AI-driven, are expanding to manage complex navigation with minimal pilot input.

What experts warn, however, is that AI doesn’t fail in the same way humans do.

  • Black-box logic: Many autopilot algorithms make decisions in ways that are not transparent. When something goes wrong, investigators struggle to explain why.

  • Edge cases: AI systems are trained on data, but rare scenarios — a child running onto the road, or an unusual cyberattack pattern — can confuse the model.

  • Overtrust: Humans tend to trust AI too much, leading to slower reactions when the system misses a critical threat.

In cybersecurity, this can mean that a false sense of security leaves networks open to breaches. In autonomous vehicles, it can literally cost lives.

Recent Incidents Highlight the Risk

While regulators haven’t yet published full reports for 2025, analysts point to multiple cases of autopilot misbehavior this year:

  • A self-driving taxi in San Francisco failed to recognize a construction worker’s hand signals, leading to a near collision.

  • An AI-driven stock trading bot in Asia executed a series of flawed trades after misclassifying a news headline, wiping millions off the market in minutes.

  • A European hospital’s AI monitoring system mistakenly flagged normal patient activity as critical, overwhelming staff with false alerts.

Each case highlights the same issue: AI is only as good as its training data and the safeguards around it.

Building Trustworthy Autopilot Systems

Experts suggest several ways to reduce risk:

  1. Human-in-the-loop – Keep humans actively supervising AI decisions, not just “on standby.”

  2. Explainability – Demand that AI vendors provide clearer reasoning for system outputs.

  3. Rigorous Testing – Test systems in extreme, rare, and adversarial conditions before deployment.

  4. Fail-safe modes – Ensure that when AI systems fail, they revert to safe defaults rather than risky behavior.

The Bottom Line

AI autopilot systems will continue to grow across industries in 2025 and beyond. But as appealing as they sound, they are not replacements for human judgment. The future of safe automation will depend not only on smarter algorithms but also on the humility to recognize AI’s limits.

In other words: the autopilot may be intelligent, but the pilot still matters.

[mai mult...]

Windows August 2025 Update

1. Windows Recall Enhancements

Windows Recall, the feature that allows users to “rewind” their PC activity, now includes more privacy and control options. Users can export or reset data with a simple click. In the European Economic Area (EEA), Microsoft also enables encrypted export, aligning with strict privacy requirements.

2. Click to do with AI

Microsoft expands Copilot’s role through a new “Click to Do” system. Users can now launch AI-driven actions for:

  • Reading assistance: Immersive Reader and Reading Coach help improve comprehension and language skills.

  • Writing support: Copilot provides suggestions and rewrites directly within supported apps.

  • Teams integration: Quick AI-powered actions inside Microsoft Teams, including smart replies and meeting scheduling.

3. AI Agent in Settings

The Settings app gains a conversational AI agent that can understand natural language. For example, you can type “make my PC run faster” and the agent will suggest (or even apply) the relevant changes. While initially available only on Copilot+ PCs, Microsoft plans to expand this to Intel and AMD devices later.

4. Quick Machine Recovery

A major addition for IT admins and advanced users: Windows can now perform a rapid recovery after boot failures, with diagnostic tools accessible remotely. This feature reduces downtime and simplifies troubleshooting.

5. Snap Layouts Improvements

Snap Layouts get smarter with inline hints, making it easier to arrange multiple windows without manually resizing them.

6. Unified Settings Search

The fragmented “Search” pages in Settings are now consolidated, creating a smoother navigation experience.

7. Gamepad Keyboard Layout

For gamers, a new controller-based keyboard layout allows PIN entry using a gamepad — a small but practical addition for Xbox and PC enthusiasts.

8. Black Screen of Death

In a visual change, Microsoft has replaced the traditional Blue Screen of Death (BSOD) with a Black Screen of Death. The new design is cleaner, removing unnecessary icons while retaining essential diagnostic information.

[mai mult...]

SVG Files: the hidden malware threat you might be overlooking

Unlike formats like PNG or JPEG, an SVG file isn’t just an image — it’s actually a text-based XML file that can include JavaScript, CSS, and external resource calls. This means that, if misused, SVGs can contain malicious scripts capable of:

  • Injecting malware into a website or application

  • Stealing cookies or session data from a user’s browser

  • Redirecting users to phishing pages or malicious sites

  • Running cross-site scripting (XSS) attacks to exploit web apps.

For example, a seemingly harmless logo.svg could contain embedded <script> tags that execute as soon as the file is loaded into the browser.

Real-World Attack Scenarios

  1. Website Upload Exploits
    Attackers upload an SVG with malicious JavaScript to a content management system (CMS) that doesn’t sanitize uploads. Once displayed, the script executes in visitors’ browsers.

  2. Phishing Campaigns
    SVGs can be sent via email or chat platforms, disguised as images. If the file is opened in a browser, the hidden code can redirect the victim to a credential-harvesting page.

  3. Supply Chain Injections
    Third-party icon libraries or SVG packs downloaded from unverified sources can be preloaded with malicious scripts, compromising any site that uses them.

How to Protect Against SVG-Based Attacks

  • Sanitize SVG files before use, stripping out all <script> and potentially harmful attributes

  • Disable inline JavaScript in SVGs entirely

  • Convert SVGs to safer formats like PNG before uploading to public-facing platforms

  • Use Content Security Policy (CSP) headers to limit what resources SVGs can access

  • Only source SVGs from trusted providers and scan them with antivirus or security tools.

[mai mult...]

OpenAI Launches GPT-5 – a new leap in Artificial Intelligence

GPT-5 is the next generation of Generative Pre-trained Transformer models, succeeding GPT-4 and built to understand, process, and generate content with unprecedented speed and accuracy. The model is already integrated into ChatGPT, available to both free users (with limitations) and subscribers on Pro and Enterprise plans.

Major Upgrades Over GPT-4

  1. Advanced Multimodal Capabilities
    GPT-5 can seamlessly handle text, images, audio, and video, enabling complex, multi-input workflows in a single conversation.

  2. Extended Context of Over 1 Million Tokens
    Compared to GPT-4’s 128K token limit, GPT-5 can manage massive projects, complex codebases, and large documents without losing coherence.

  3. GPT-5-Thinking Mode
    An optimized variant for deep reasoning and tackling highly technical challenges — ideal for developers, researchers, and engineers.

  4. Reduced “Hallucinations”
    The error rate in generated responses has been significantly lowered thanks to improved internal verification systems and cleaner training data.

  5. Boosted Performance
    Faster response times and optimized processing costs make smaller variants like GPT-5-mini and GPT-5-nano practical for embedded and on-device AI applications.

Plans and Pricing

  • Free Users: Limited GPT-5 access.

  • Pro (~$200/month): Full access to GPT-5-Pro and GPT-5-Thinking

  • Business & Enterprise: API integration, advanced tool calling, and dedicated support.

The launch of GPT-5 signals the start of a new era in AI, with transformative potential across industries such as software development, automated journalism, data analysis, healthcare, and education.

OpenAI describes GPT-5 as “the most intelligent, fastest, and most useful AI we’ve ever built”, emphasizing both its raw capabilities and improved safety features.

[mai mult...]