@greybeard It tends to amaze me how badly some people seem to misunderstand this concept. Mind you, i honestly feel that browser marketers don't do the cause any good by choosing wilfully ambiguous names like "Private" or "Incognito" mode ... for the type of user disinclined to actually read fine-print nor otherwise investigate for themselves, such ambiguity is dangerous.
Iirc in V over the years the forum has seen many discussions on just this point.
As nice as it would be to have FOSS everything, more important is how the company is run. FOSS doesn't mean squat if the company doesn't really believe in it. Look at android. Technically, it's FOSS, but Google treats in a very closed manner and tracks the users to the N-th degree.
Vivaldi on the other hand isn't FOSS, other than making attempts to open source (open tech like html, js + making some of the source available). But more importantly it listens to users and treats them right, and I think I value that a lot more.
You can let Windows export it: after opening the certificate, go to the Details tab where there’s a Copy to File... button.
Alternatively, you can let a third party parse it, and download it from them; e.g. https://www.ssllabs.com/ssltest/analyze.html?d=forum.vivaldi.net
I think ads (in the form we know them) have had their day. I see an increase in the use of affiliate links, subscription/donation methods, and sponsored content these days and I think this coupled with the use of ad blockers is scaring the businesses whose sole purpose is just to put ads on pages and get clicks.
@Parigot-Manchot You have full access to the code now. It is all legible, being constructed of common plain-text-readable web technologies. You just may not appropriate it and issue it as your own - cuz, you know; it wasn't your idea.
Interesting opinion, though, "proprietary software are not recommended." The vast majority of software companies across the globe will be sad to learn this. I suppose they will all be going out of business now. You are welcome to this opinion, and welcome to follow whatever course you feel is wisest.
At present, Jon will not be giving away his work, nor that of the staff he is paying out of his own personal pocket, nor offering people the opportunity to dilute the income stream he will need to recoup his losses.
And some millions of us will still use the best browser, irrespective of its licensing. You have a lovely day, and thank you for your interest in Vivaldi!
Very old news, but all you can do is close your Yahoo accounts, links and search functions.
Webmasters blocking Yahoo IP ranges is pointless as the email service which "had" the rootkit does not browse websites.
It only affects people with Yahoo IDs that connect in to it. It does not work the other way round.
Yahoo is now owned by another company (https://verizon.yahoo.com), who if upholding the pre-existing deal with the NSA, are likely to also be doing it with all their other communication.
In which case now you need to block all Verizon, Yahoo and AOL IPs.
In the real world, millions of people are forced to use Yahoo because it is what their ISP has given them. British Telecom are the biggest UK ISP and have used Yahoo for many years, meaning that most of the UK has a Yahoo account they are forced to keep even if they don't use.
Not all DNS providers were affected by the issue. I do remember reading about dnschanger about 6 years ago. "DNSCrypt is a protocol that authenticates communications between a DNS client and a DNS resolver" HTTPS is similar for fetching web content (DNS is like a "phone book of the internet")
That The Register post is a follow up to this one http://www.theregister.co.uk/2013/02/04/dns_changer_guilty_plea/ and they are talking about it starting with a cyber gang bust by the FBI & others https://www.fbi.gov/news/stories/international-cyber-ring-that-infected-millions-of-computers-dismantled
Also there are 2 different kinds of DNS servers, IPv4 servers & IPv6 servers.
@edwardp Did every update failed? If yes, you have to:
Launch and run cmd As administrators
Enter the following commands:
a. net stop wuauserv
b. net stop bits
c. net stop cryptsvc
Check in services.msc if the Windows Update service is running.
Go to C:\Windows\SoftwareDistribution\Download and delete the files. (if you want you can backup the files).
Go to Control Panel and launch Windows Update. This will force Windows Update to search for new updates.
If the updates installation fails again:
a. download a new Windows 7 kit and install over the existing windows installation. Warning: Before doing this do a back-up to your files.
b. If the updates installation fails again, after doing step 6.a., call Microsoft support.
Hope that will help you.
@KyrtaP Glad to hear that it worked.
I never had any trouble with it to date, and use it only occasionally as I don't often download programs from dodgy sites. Always go the program author's original site of possible - other sites (even well known ones) often include PUPs (potentially unwanted programs), which can sometimes turn out to be quite malicious.
Malwarebytes update the databases frequently, so Fix that before running a scan.
Happier status news. I discovered from a link in the page whose link you PM'd me [Ayespy, thanks], that when viewed from within my Win10 VM [coz in my native Linux, MS redirects to an alternative page without this important info], this happens:
...& the result of clicking that button:
[as you can see, it's still in progress in my 2nd Win10 VM, although it successfully finished a couple of hours ago in my primary Win10 VM]. The problem i posted about in creating this thread afflicted only my primary Win10 VM, not the other, & consequently the problem is now solved... via this major OS upgrade of whose existence i did not previously know [given i live in Linux, i stopped following Windoze news a long time ago, & only launch these VMs rarely].
So now i've eliminated the significant problem, AND now have the very latest & finest in OS spyware that MS & NSA can provide; "Windows 10 Creators Update", = Version 1703, OS Build 15063.13. . 👅
Tower & Lappy = Maui Linux 17.03 x64 Plasma 5.9.3.