More stories

  • in

    New to Linux? 4 things to focus on before you switch

    Jack Wallen / Elyse Betters Picaro / ZDNETAfter using Linux for a while, switching from one distribution to another becomes a fairly easy task. You know the landscape, and you understand the choices and how they are pieced together, so the decision becomes second nature.Also: The best-looking Linux desktop I’ve seen so far in 2025 — and it’s not even closeBut those early days can be filled with confusion, especially when trying to choose a distribution. The list goes on and on and on. In fact, my best guess is that there are over 1,000 Linux distributions available to use. That is a massive choice. Now, before your eyes jettison from their orbits, many of those distributions are so niche that you would never consider them, and some of them are built for servers, routers, and embedded systems. That still leaves a lot of distributions. Even if you narrow it down to only the main choices, you are still looking at 10 to 20 options. What do you do? Well, I have a suggestion.The first things to focus on if you’re new to LinuxThe desktop environmentThe desktop environment is your window into Linux, so why would you want to make that window challenging to open, clean, and see through? When you select a Linux distribution, the first thing you should focus on is which one appeals to you the most. Are you so accustomed to Windows that you want to start off with a desktop environment that looks very much like Windows 10 or 11? Or maybe you spent your formative years with Windows 98 or XP. You could be coming from MacOS, at which point aesthetics are probably important to you. If you start your journey on familiar ground, the beginning of that trip will be much more pleasant. Of course, it is not just about the look of the desktop. You also have to take into consideration how the desktop works. Also: The 4 best Linux desktops based on GNOME – and what I most like about each oneConsider GNOME, which is considered a rather elegant desktop metaphor. But when you see how GNOME functions, you realize just how different it is from what you have been using. Without modifications, there is not a desktop menu to use, and you also find yourself clicking the mouse so much that you might feel it is an inefficient UI (it is not really, but it can come off as such). And then there is KDE Plasma, which not only (sort of) resembles a Windows UI, but it is also highly configurable. You can go through every single Linux desktop environment to discover just how different and similar they can be. But that is the trick. Take the time to do this. Watch some videos of the desktop environments in action, so you can determine which one best suits your needs and personality. 2. Hardware detectionWhy hardware detection next? You could pick out the best-looking, most highly functioning desktop environment, but if the distribution is incapable of detecting all of your hardware, what good is it? Understand that most Linux distributions have become very good at hardware detection, and in most cases you will not have to bother installing drivers for most of what you need. Why not start yourself off with as little up-front, post-install work as possible? Also: Thinking about switching to Linux? 10 things you need to knowThe best Linux distributions for hardware detection are: Although Ubuntu and Mint are at the top of that list, you cannot go wrong with a rolling release (such as Arch, Manjaro, or Garuda). 3. Package managementPackage management is an important aspect of Linux because it is how you manage all aspects of installing, updating, and removing applications from your system. Every Linux distribution has a package manager, such as apt (Ubuntu-based distributions), dnf (Fedora-based distributions), pacman (Arch-based distributions), and zypper (openSUSE-based distributions). Most package managers now have outstanding GUIs, so you can manage software installation and updates without using the terminal.Also: The Linux tool you forgot about: How Synaptic makes software installation a breezeEven with these default package managers, I recommend making sure the distribution you choose also includes one of the universal package managers, Snap or Flatpak. On top of that, find a distribution that integrates the universal package manager into the GUI app store, so all your software needs are managed in a single location. 4. SecurityFinally, we have security. Most Linux distributions are quite secure, but you want to find a distribution that does not require too much work on your part to ensure those security systems are not so challenging to use that you have to be an elite Linux user to make heads or tails of them. For example, SELinux is a very powerful security tool, but with that power comes complexity. Most often, SELinux just works, but when there is an issue, it can be challenging to resolve. Fortunately, if you are using a distribution that includes SELinux (which is any based on Fedora) on the desktop, the chances of SELinux causing you problems are slim. I have placed security as the last thing to think about when selecting a Linux distribution because it is splitting hairs. Yes, there are some distributions that are more secure than others (like Qubes), but nearly all Linux distributions are more secure than the operating system you have been using (unless you are coming from a different distribution). Also: Leaving Windows 10 for Linux? 5 security differences to consider firstWhen choosing a Linux distribution, if you start at the top of this list and work your way down, you will find the decision is much easier than if you were just randomly looking or asking around on this vast world called the internet. Open Source More

  • in

    I saw every Samsung QLED TV releasing in 2025 – these standout features had me hooked

    Kerry Wan/ZDNETThe TV launch season is upon us, and Samsung is among the first brands to put out its 2025 lineup of visual goodness. I recently had the opportunity to scope out some new TVs at one of Samsung’s satellite laboratories in New Jersey, putting every upcoming model through the ringer and seeing just how well they stack up to the company’s early-year claims. Also: How to clear the cache on your TV (and why it makes such a big difference)Below are my initial takeaways (read: this isn’t a review) on the company’s Neo QLED 4K More

  • in

    Adobe brings four highly-requested Premiere Pro AI features out of beta

    Adobe Adobe has continually implemented AI features into its suite of applications to help creatives build and execute projects more seamlessly. Now, it’s bringing some of Adobe Premiere’s cutting-edge AI features out of beta so that more users can benefit. Also: I’ve tried lots of AI image generators, and Nvidia and MIT’s is the one […] More

  • in

    iOS 18.4 update draining your iPhone’s battery? Try these 6 fixes

    Apple / Elyse Betters Picaro / ZDNETAnother day, another iOS update for the iPhone, and this is quite a big one. iOS 18.4 brings with it a bunch of Apple Intelligence features, such as Priority Notifications, Visual Intelligence for iPhone 15 Pro handsets, the addition of a Visual Intelligence Action Button, and a handful of new emojis.Also: Apple Home finally gets robot vacuum support, thanks to Matter and iOS 18.4Who can resist new emojis! That one with the bags under its eyes will surely come in handy. Oh, and it also patches 62 security vulnerabilities, some of which are serious. Reactions to iOS 18.4 so farA new iOS release means that it is time to venture into the wilderness of social media to see what users have to say about the new release, especially relating to battery life. First, the good news. As far as iOS releases go, this one does not seem so bad. I have been using the release candidate for a few days, and it has been pretty solid. In fact, I would say this is one of the smoothest releases in a while. But let’s see what iOS users on social media have to say. Oooooft. More

  • in

    Clicked on a phishing link? Take these 7 steps ASAP to protect yourself

    ZDNETWhen you think of phishing emails, you probably think of the crude, grammatically flawed, easy-to-spot samples that go straight to your junk folder.I regret to inform you that those weak “spray and pray” campaigns are yesterday’s news. The crooks haven’t gotten smarter, but their tools have. Also: I clicked on four sneaky online scams on purpose – to show you how they workWith the help of generative AI, online scammers have become dramatically better at crafting and delivering phishing emails that look and sound convincing. Last year, a group of high-powered security researchers found that AI-based phishing tools have reduced the cost of these attacks by more than 95% — while making them brutally effective. One study showed that 60% of respondents fell victim to these automated attacks.Those tools can help a crook create hyper-targeted, meticulously personalized attacks that can be surprisingly difficult to spot, especially if you’re tired or distracted. Even certified security experts can be sucker-punched. Just ask Troy Hunt, creator of the “Have I Been Pwned” site. He was fooled by a sophisticated attacker who stole his Mailchimp mailing list. Listen to his explanation of what happened.Firstly, I’ve received a gazillion similar phishes before that I’ve identified early, so what was different about this one? Tiredness was a major factor. I wasn’t alert enough, and I didn’t properly think through what I was doing. The attacker had no way of knowing that (I don’t have any reason to suspect this was targeted specifically at me), but we all have moments of weakness, and if the phish times just perfectly with that, well, here we are. Secondly, reading it again now, that’s a very well-crafted phish. It socially engineered me into believing I wouldn’t be able to send out my newsletter, so it triggered “fear,” but it wasn’t all bells and whistles about something terrible happening if I didn’t take immediate action. It created just the right amount of urgency without being over the top. What to do if you click a phishing link So, what should you do if you click on one of those links and then discover, to your dismay, that it’s a fake site designed to capture your information? Maybe you realized that almost immediately because something seemed not quite right. Or maybe you’ve already entered some sensitive information. In either case, here’s what to do next. 1. Stop typing! If you haven’t yet entered any information, close the browser tab or mobile app immediately and consider clearing your cache to eliminate the possibility that the site was able to implant some tracking information. 2. When in doubt, disconnect If you’re concerned that the site might be more than a garden-variety phishing attempt and that it might be trying to install a remote access tool or another form of malware, disconnect from the network. You can turn on airplane mode on a mobile device or laptop; if you have a wired connection, unplug the Ethernet adapter. Also: Why delaying software updates is a terrible ideaOr just press the power button to shut down while you figure out your next steps. 3. If this is a work device, call your IT department Let them know what happened so they can check any necessary logs and begin looking for suspicious activity. Be honest. The more information you provide, the more likely they will be able to detect any intrusion and mitigate any damage. 4. Reset your password(s) and turn on 2FA If you gave the attackers your username and password for an account, you need to change that password as soon as possible, before they have a chance to lock you out. If you entered an email address, phone number, or other personal information that an attacker could use to pose as you, consider securing any accounts that are tied to that information. Create new, strong, unique passwords for those accounts. If you haven’t enabled multi-factor authentication (also known as 2-factor authentication or 2FA), do that now, especially for critical accounts. Also: Got a suspicious E-ZPass text? Don’t click the link (and what to do if you already did)If possible, do this cleanup work on a different PC, Mac, or mobile device than the one where you were phished, to avoid the possibility that the device has been compromised. 5. Scan for malware If this is a Windows device, run a full antivirus scan on the affected device to determine whether any malicious software was installed. If possible, use an offline scanner like the Emsisoft Emergency Kit More