Types of backup and five backup mistakes to avoid

As humanity’s use of all kinds of technology has grown, terms like backup are no longer unfamiliar to the majority of people. Of course, the concept of a backup existed long before it came to be named as such. Whenever any important document or information was copied and stored in a place separate from the original for the purpose of ensuring the information would not be lost, the process of backing up was taking place. This way, if the original became damaged, it was possible to recover the information it contained by referring to the copy, which was kept in a different, safe location. When this notion was adopted by people and companies within a technological context, its original characteristics did not change – simply, new resources became available to make the backup process easier and faster.
In this article, we will look at the main types of backup operations, as well as at some of the most common mistakes that many of us may make while backing up our data. In short, there are three main types of backup: full, incremental, and differential.
Full backup
As the name suggests, this refers to the process of copying everything that is considered important and that must not be lost. This type of backup is the first copy and generally the most reliable copy, as it can normally be made without any need for additional tools.
Incremental backup
This process requires much more care to be taken over the different phases of the backup, as it involves making copies of the files by taking into account the changes made in them since the previous backup. For example, imagine you have done a full backup. Once you’ve finished, you decide that going forward you will do incremental backups, and you then create two new files. The incremental backup will detect that all the files in the full backup remain the same, and will only make backup copies of the two newly created files. As such, the incremental backup saves time and space, as there will always be fewer files to be backed up than if you were to do a full backup. We recommend that you do not try to employ this type of backup strategy using manual means.
Differential backup
A differential backup has the same basic structure as an incremental backup—in other words, it involves making copies only of new files or of files that underwent some kind of change. However, with this backup model, all the files created since the original full backup will always be copied again. For the same reasons as with incremental backups, we recommend that differential backups are also not carried out manually.
Where to store the backup
Once you have decided which type of backup is best suited to your needs, it is important to consider carefully where to store it. The types of media most commonly used for storing data have changed over the years. Backups have been variously done on punch card, floppy disk, optical media like CD, DVD and Blu-Ray, tape, external hard disk, cloud-based storage services, and more. One of the questions you need to consider when deciding where to save your backup copy is: How long am I going to need to keep this backup? Knowing the answer to that will make it easier to figure out which medium to store your files on.
To answer that question properly it would be necessary to know the specific needs of each individual business or home, so instead let’s look at two fictitious scenarios which will serve as examples of ways in which a backup can be of great value.
  • For businesses

The year is 2017 and the company ‘Fictitious Corp.’ starts its business day at 8 a.m. as usual. At around 11 a.m., one of the IT managers hears a strange sound coming from a nearby area. Just after hearing the noise, his phone rings and he answers it. After finishing the call, he realizes that the workstation is totally paralyzed and reads a message on the screen saying all the data are now encrypted. The same message is displayed on some of the other machines located in this and other areas of the business. Then he discovers that the company’s file server has crashed, caused by the same problem: the WannaCryptor ransomworm.
In this example, the company, which was dependent on its file server in order to be able operate, could have easily avoided its systems being paralyzed by the ransomware attack if it had maintained a full, offline and current backup of its file server.
  • A home-based example

Mr. Easygoing was watching TV from the comfort of his sofa at home when he suddenly felt a surge of nostalgia and got the urge to look at some photos of his wedding and his son’s birth. Just as he was opening the photos a downpour started. Once he finished looking through them, Mr. Easygoing went to the kitchen to fix something to eat, leaving the computer plugged in. Suddenly he heard the crash of a bolt of lightning, and the electricity went off. The next day, when the power was back on, he discovered that the computer’s hard disk was fried and that all the photos capturing his memories were lost.
Here, the incident occurred due to a power surge, but there are a great many other potential causes for data loss, and all of them can be protected against, at least to a great extent, by making regular backups. If you have any information you wouldn’t want to lose, a backup is an effective way to help prevent that from happening.

Common mistakes made while doing a backup
Now that we have looked at some of the issues around the importance of backups, let’s continue with some recommendations as well as some common mistakes made during the process.
  • Not doing a backup

This is without a doubt the most common mistake. Very often a backup was not done either due to not getting around to it or because of thinking the information wasn’t important—until it was lost.
  • Saving the backup copies on the same hardware as the original files

The idea of a backup is to make a copy for safekeeping. That copy must be stored in a location different from where the original files are kept. If they are stored on the same hardware and that hardware is damaged, the backup copies might be lost along with the originals.
  • Not testing the backup

Making a backup involves a series of processes. It isn’t enough to just create a copy – you also need to check the files to verify that the data you saved is actually accessible in case you need it. Indeed, testing your backups is just as important as backing up itself. Depending on the form of the backup, which is often a compressed file, it could become corrupted, in which case a new backup needs to be done.
  • Not running the backup regularly and sufficiently frequently

It is important to make backup copies regularly, especially if the information is frequently updated. Imagine, for example, that you are writing a book in a word processing document and you only make a backup copy on the first of each month. If the file is lost on the 15th of the month, you will only have a copy dating back to two weeks ago and you will have lost all the work you did in the interim.
  • Not labeling the backup files

After running your backups, keep a record of which archive is from which hardware. In case you need to recover the data, it will be essential to do so on the right equipment.
Conclusion
A data loss event can cost any of us dearly, and it goes without saying that backups should be part of everybody’s cyber-hygiene. In a way, backups are intended to protect the investment we make into the data, so let’s think ahead so that we don’t lose that investment.
Do you want to learn more? We have previously covered the issue of backup from several angles, including in a digestible white paper, ‘Options for backing up your computer’, which mainly dealt with the most common hardware and software resources involved in backup operations. We encourage you to give it a read.

Read Original Article...

WhatsApp discovers 'targeted' surveillance attack

Hackers were able to remotely install surveillance software on phones and other devices using a major vulnerability in messaging app WhatsApp, it has been confirmed.

WhatsApp, which is owned by Facebook, said the attack targeted a "select number" of users and was orchestrated by "an advanced cyber-actor".

A fix was rolled out on Friday.

On Monday, WhatsApp urged all of its 1.5 billion users to update their apps as an added precaution.

The surveillance software involved was developed by Israeli firm NSO Group, according to a report in the Financial Times.

Facebook first discovered the flaw in WhatsApp earlier in May.

WhatsApp promotes itself as a "secure" communications app because messages are end-to-end encrypted, meaning they should only be displayed in a legible form on the sender or recipient's device.

However, the surveillance software would have let an attacker read the messages on the target's device.

Some users of the app have questioned why the app store notes associated with the latest update are not explicit about the fix.

"Journalists, lawyers, activists and human rights defenders" are most likely to have been targeted, said Ahmed Zidan from the non-profit Committee to Protect Journalists.

Presentational grey line

How do I update WhatsApp?

Android

  • Open the Google Play store
  • Tap the menu at the top left of the screen
  • Tap My Apps & Games
  • If WhatsApp has recently been updated, it will appear in the list of apps with a button that says Open
  • If WhatsApp has not been automatically updated, the button will say Update. Tap Update to install the new version
  • The latest version of WhatsApp on Android is 2.19.134
iOS

  • Open the App Store
  • At the bottom of the screen, tap Updates
  • If WhatsApp has recently been updated, it will appear in the list of apps with a button that says Open
  • If WhatsApp has not been automatically updated, the button will say Update. Tap Update to install the new version
  • The latest version of WhatsApp on iOS is 2.19.51
Presentational grey line

How was the security flaw used?

It involved attackers using WhatsApp's voice calling function to ring a target's device.

Even if the call was not picked up, the surveillance software could be installed. According to the FT report, the call would often disappear from the device's call log.

WhatsApp told the BBC its security team was the first to identify the flaw. It shared that information with human rights groups, selected security vendors and the US Department of Justice earlier this month.

"The attack has all the hallmarks of a private company reportedly that works with governments to deliver spyware that takes over the functions of mobile phone operating systems,” the company said on Monday in a briefing document note for journalists.

The firm also published an advisory to security specialists, in which it described the flaw as: "A buffer overflow vulnerability in WhatsApp VOIP [voice over internet protocol] stack allowed remote code execution via specially crafted series of SRTCP [secure real-time transport protocol] packets sent to a target phone number.”

Prof Alan Woodward from the University of Surrey said it was a "pretty old-fashioned" method of attack.

"A buffer overflow is where a program runs into memory it should not have access to. It overflows the memory it should have and hence has access to memory in which malicious code can potentially be run," he explained.

"If you are able to pass some code through the app, you can run your own code in that area.

"In VOIP there is an initial process that dials up and establishes the call, and the flaw was in that bit. Consequently you did not need to answer the call for the attack to work."

Who is behind the software?

The NSO Group is an Israeli company that has been referred to in the past as a "cyber-arms dealer".

While some cyber-security companies report the flaws they find so that they can be fixed, others keep problems to themselves so they can be exploited or sold to law enforcement.

The NSO Group is part-owned by the London-based private equity firm Novalpina Capital, which acquired a stake in February.

NSO's flagship software, Pegasus, has the ability to collect intimate data from a target device, including capturing data through the microphone and camera, and gathering location data.

In a statement, the group said: "NSO's technology is licensed to authorised government agencies for the sole purpose of fighting crime and terror.
"The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions. We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system.

"Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies. NSO would not or could not use its technology in its own right to target any person or organisation."

Who has been targeted?

WhatsApp said it was too early to know how many users had been affected by the vulnerability, although it added that suspected attacks were highly-targeted.

According to the New York Times, one of the people targeted was a London-based lawyer involved in a lawsuit against the NSO Group.

Amnesty International, which said it had been targeted by tools created by the NSO Group in the past, said this attack was one human rights groups had long feared was possible.

"They're able to infect your phone without you actually taking an action," said Danna Ingleton, deputy programme director for Amnesty Tech. She said there was mounting evidence that the tools were being used by regimes to keep prominent activists and journalists under surveillance.

"There needs to be some accountability for this, it can't just continue to be a wild west, secretive industry."

On Tuesday, a Tel Aviv court will hear a petition led by Amnesty International that calls for Israel's Ministry of Defence to revoke the NSO Group's licence to export its products.

What are the unanswered questions?

"Using an app as an attack route is limited on iOS as they run apps in very tightly controlled sandboxes," said Prof Woodward. "We're all assuming that the attack was just a corruption of WhatsApp but analysis is still ongoing.

"The nightmare scenario would be if you could get something much more capable onto the device without the user having to do anything," he said.

The BBC has asked WhatsApp for clarification.
Read Original Article...

A CISCO ROUTER BUG HAS MASSIVE GLOBAL IMPLICATIONS

THE CISCO 1001-X series router doesn't look much like the one you have in your home. It's bigger and much more expensive, responsible for reliable connectivity at stock exchanges, corporate offices, your local mall, and so on. The devices play a pivotal role at institutions, in other words, including some that deal with hypersensitive information. Now, researchers are disclosing a remote attack that would potentially allow a hacker to take over any 1001-X router and compromise all the data and commands that flow through it.

And it only gets worse from there.

To compromise the routers, researchers from the security firm Red Balloon exploited two vulnerabilities. The first is a bug in Cisco’s IOS operating system—not to be confused with Apple's iOS—which would allow a hacker to remotely obtain root access to the devices. This is a bad vulnerability, but not unusual, especially for routers. It can also be fixed relatively easily through a software patch.

"It’s not a trust buoy."

The second vulnerability, though, is much more sinister. Once the researchers gain root access, they can bypass the router's most fundamental security protection. Known as the Trust Anchor, this Cisco security feature has been implemented in almost all of the company’s enterprise devices since 2013. The fact that the researchers have demonstrated a way to bypass it in one device indicates that it may be possible, with device-specific modifications, to defeat the Trust Anchor on hundreds of millions of Cisco units around the world. That includes everything from enterprise routers to network switches to firewalls.

In practice, this means an attacker could use these techniques to fully compromise the networks these devices are on. Given Cisco's ubiquity, the potential fallout would be enormous.

“We’ve shown that we can quietly and persistently disable the Trust Anchor,” says Ang Cui, the founder and CEO of Red Balloon, who has a history of revealing major Cisco vulnerabilities. “That means we can make arbitrary changes to a Cisco router, and the Trust Anchor will still report that the device is trustworthy. Which is scary and bad, because this is in every important Cisco product. Everything.”

Dropping Anchor

In recent years, security-minded companies have increasingly added "secure enclaves" to motherboards. Different solutions go by different names: Intel has SGX, Arm has the TrustZone, Apple has the secure enclave. And Cisco has the Trust Anchor.

They variously comprise either a secure part of a computer’s regular memory, or a discrete chip—a safe, secluded oasis away from the bedlam of the computer’s main processor. No user or administrator can modify the secure enclave, no matter how much control they have over the system. Because of its immutable nature, the secure enclave can watch over and verify the integrity of everything else.

Secure-computing engineers generally view these schemes as sound in theory and productive to deploy. But in practice, it can be dangerous to rely on a sole element to act as the check on the whole system. Undermining that safeguard—which has proven possible in many companies’ implementations—strips a device of critical protections. Worse still, manipulating the enclave can make it appear that everything is fine, even when it's very much not.

That's the case with the Cisco 1001-X. The Red Balloon team showed specifically that they could compromise the device's secure boot process, a function implemented by the Trust Anchor that protects the fundamental code coordinating hardware and software as a device turns on, and checks that it's genuine and unmodified. It's a crucial way to ensure that an attacker hasn’t gained total control of a device.



On Monday, Cisco is announcing a patch for the IOS remote-control vulnerability the Red Balloon researchers discovered. And the company says it will also provide fixes for all product families that are potentially vulnerable to secure-enclave attacks like the one the researchers demonstrated. Cisco declined to characterize the nature or timing of these fixes ahead of the public disclosure. It also disputed that the secure boot vulnerability directly impacts the Trust Anchor. According to its security bulletin, all fixes are still months away from release, and there are currently no workarounds. When the patches do arrive, Cisco says, they will "require an on-premise reprogramming," meaning the fixes can't be pushed remotely, because they are so fundamental.

“As a point of clarification, Cisco advertises several related and complementary platform security capabilities,” a spokesperson told WIRED in a written statement. “One of which that is relevant to this discussion is Cisco Secure Boot which provides a root of trust for system software integrity and authenticity. Another capability offered within certain Cisco platforms is the Trust Anchor module, which helps provide hardware authenticity, platform identity, and other security services to the system. The Trust Anchor module is not directly involved in the work demonstrated by Red Balloon.”

Cisco seems to make a distinction between its "Trust Anchor Technologies," "Trustworthy Systems," and "Trust Anchor module," that may explain why it only considers secure boot to be implicated in the research.

The Red Balloon researchers disagree, though. They note that Cisco’s patent and other documentation show that the Trust Anchor implements secure boot. If secure boot is undermined, the Trust Anchor is necessarily also defeated, because all of the tools are in a chain of trust together. You can see it visualized in this Cisco diagram.

“That’s why they call it an anchor! It’s not a trust buoy,” Cui says.

FPGA Tour

The researcher group, which also includes Jatin Kataria, Red Balloon’s principal scientist, and Rick Housley, an independent security researcher, were able to bypass Cisco’s secure boot protections by manipulating a hardware component at the core of the Trust Anchor called a “field programmable gate array.” Computer engineers often refer to FPGAs as “magic,” because they can act like microcontrollers—the processors often used in embedded devices‚ but can also be reprogrammed in the field. That means unlike traditional processors, which can't be physically altered by a manufacturer once they're out in the world, an FPGA's circuits can be changed after deployment.

FPGAs pull their programming from a file called the bitstream, which is usually custom-written by hardware makers like Cisco. To keep FPGAs from being reprogrammed by mischievous passersby, FPGA bitstreams are extremely difficult to interpret from the outside. They contain a series of complex configuration commands that physically dictate whether logic gates in a circuit will be open or closed, and security researchers evaluating FPGAs have found that the computational power required to map an FPGA’s bitstream logic is prohibitively high.

"This is proof that you can’t just rely on the FPGA to do magic for you."

But the Red Balloon researchers found that the way the FPGA was implemented for Cisco’s Trust Anchor, they didn’t need to map the whole bitstream. They discovered that when Cisco’s secure boot detected a breach of trust in a system, it would wait 100 seconds—a pause programmed by Cisco engineers, perhaps to buy enough time to deploy a repair update in case of a malfunction—and then physically kill the power on the device. The researchers realized that by modifying the part of the bitstream that controlled this kill switch, they could override it. The device would then boot normally, even though secure boot accurately detected a breach.

“That was the big insight,” Red Balloon’s Kataria says. “The Trust Anchor has to tell the world that something bad has happened through a physical pin of some sort. So we started reverse engineering where each pin appeared in the physical layout of the board. We would disable all the pins in one area and try to boot up the router; if it was still working, we knew that all of those pins were not the one. Eventually we found the reset pin and worked backward to just that part of the bitstream.”

The researchers did this trial-and-error work on the motherboards of six 1001-X series routers. They cost up to about $10,000 each, making the investigation almost prohibitively expensive to carry out. They also broke two of their routers during the process of physically manipulating and soldering on the boards to look for the reset pin.

An attacker would do all of this work in advance as Red Balloon did, developing the remote exploit sequence on test devices before deploying it. To launch the attack, hackers would first use a remote root-access vulnerability to get their foothold, then deploy the second stage to defeat secure boot and potentially bore deeper into the Trust Anchor. At that point, victims would have no reason to suspect anything was wrong, because their devices would be booting normally.

“The exposure from this research will hopefully remind the companies out there beyond just Cisco that these design principles will no longer stand as secure,” says Josh Thomas, cofounder and chief operating officer of the embedded device and industrial control security company Atredis. “This is proof that you can’t just rely on the FPGA to do magic for you. And it’s at such a low level that it’s extremely difficult to detect. At the point where you’ve overridden secure boot, all of that trust in the device is gone at that point.”

Even Bigger Problems

Thomas and the Red Balloon researchers say they are eager to see what types of fixes Cisco will release. They worry that it may not be possible to fully mitigate the vulnerability without physical changes to the architecture of Cisco’s hardware anchor. That could involve implementing an FPGA in future generations of products that has an encrypted bitstream. Those are financially and computationally more daunting to deploy, but would not be vulnerable to this attack.

And the implications of this research don't end with Cisco. Thomas, along with his Atredis cofounder Nathan Keltner, emphasize that the bigger impact will likely be the novel concepts it introduces that could spawn new methods of manipulating FPGA bitstreams in countless products worldwide, including devices in high-stakes or sensitive environments.

For now, though, Red Balloon’s Cui is just worried about all of the Cisco devices in the world that are vulnerable to this type of attack. Cisco told WIRED that it does not currently have plans to release an audit tool for customers to assess whether their devices have already been hit, and the company says it has no evidence that the technique is being used in the wild.

But as Cui points out, “Tens of thousands of dollars and three years of doing this on the side was a lot for us. But a motivated organization with lots of money that could focus on this full-time would develop it much faster. And it would be worth it to them. Very, very worth it.”

Read Original Article...

In some countries, many use the internet without realizing it

What is the internet? And who is an internet user? The questions may seem straightforward, but more than a decade of research in the United States and abroad suggests that some people who use the internet may not be aware that they’re doing so. Results from recent Pew Research Center surveys in the U.S. and 11 emerging economies show that confusion about what the internet is stems from two different – but related – sources.

Sizable shares in some countries report owning smartphones but not using 'the internet'First, many people who use smartphones are unaware that the apps and browsers on their devices involve using the internet. In the Center’s survey of emerging economies, as many as 38% of those who say they do not use the internet also indicate that they have a phone that connects to the internet. Due to differences in internet use across these countries, this group represents as much as 14% of the total adult population in South Africa, or as little as 3% in Venezuela.

These mismatches are often highest in developing countriesand can even extend to people who use their smartphones to do things that necessitate using the internet for tasks such as looking for or applying for jobs.

Across 11 developing countries surveyed in fall 2018, one of the defining factors in people’s awareness they are using the internet is whether they have access to a home or office computer. Majorities of “unconscious internet users” (that is, those who say they do not use the internet, but do use social media, a smartphone or a feature phone) lack access to a home computer or tablet, meaning they likely visit the internet primarily through a mobile phone. In three countries, those with lower levels of education are also somewhat more likely to be unconscious internet users, though in most countries there is no relationship with educational attainment. But, while older people are somewhat less likely to use the internet, smartphones or social media than younger people, they are not more likely to be unconscious users.



This phenomenon extends to advanced economies as well: Previous surveys by the Center have found that a small share of people in nearly every country surveyed underreport internet use. Estimates that account for social media use and smartphone ownership tend to be somewhat larger than those that only include people’s self-reported internet use. For example, 90% of South Koreans say they use the internet, when asked, but 97% of South Koreans report using the internet, owning a smartphone or using social media – a gap of 7 percentage points.

Other developed countries also show gaps between these narrow and broad measures of internet use, including Spain (7 percentage points), Italy (5 points) and France (4). And in our most recent technology-focused survey of U.S. adults, conducted in January and February, one-quarter of those who say they do not use the internet do indicate they own a smartphone – although since relatively few Americans do not go online, that group works out to just 2% of the total adult population.

There are people in many countries who use Facebook and WhatsApp but report not using 'the internet'Second, apart from a lack of awareness that smartphones and feature phones connect to the internet, many people who use social media and messaging apps appear unaware that the platforms themselves are part of the broader internet. This is a relatively well-known phenomenon in the case of Facebook: Sheryl Sandberg, the company’s chief operating officer, was once quoted as saying, “People actually confuse Facebook and the internet in some places.” And in countries like the Philippines, Facebook offers a free version that allows users to visit the site without incurring mobile data charges.

Some of this may seem to be a niche issue, mostly of interest to survey researchers. But measurement matters for our understanding of political phenomena and how people access information. As many policies and programs are structured around reaching the population that is not online – “internet for all” – it’s important to have a clear and accurate reading of who is and is not online. Our research also suggests that the dominance of certain providers – especially Facebook and WhatsApp – is important to this understanding given that considerable shares in some countries appear to be using them without even realizing that they’re going online.

Focus groups conducted in the Philippines in March 2018 highlighted the extent to which people used Facebook as a portal to the internet at large, relying on it as a website for online dating, finding jobs and acquiring news, along with general uses like messaging, sharing pictures with family and video calls. As two participants highlighted in one exchange, “It seems like almost all people in the world have Facebook … it seems impossible if you don’t have [a Facebook account].” Indeed, the Philippines stands out for having the largest share of people among these 11 countries who say they use Facebook but also report not being online (12%). Similarly, as much as 10% of the population in South Africa reports using WhatsApp but not using the internet.

As was true with the distinction between smartphones and the internet, this lack of understanding of the nature of social media is not confined to emerging economies. Among U.S. adults who say they do not use the internet, some 14% indicate in each case that they use Facebook or the video sharing platform YouTube.

Taken together, these findings indicate that people can be unaware of what the internet is in a variety of ways. Across all 11 countries surveyed, anywhere from 5% to 25% of the population fits this pattern of being an unconscious internet user. The highest rates of this behavior occur in Kenya and the lowest rates occur in Lebanon and Vietnam.

In some large emerging economies, more than one-in-ten use the internet but don't realize it


Read Original Article...

Windows 10 will soon ship with a full, open source, GPLed Linux kernel

Earlier today, we wrote that Microsoft was going to add some big new features to the Windows Subsystem for Linux, including native support for Docker containers. It turns out that that ain't the half of it.

The current Windows Subsystem for Linux uses a Microsoft-authored kernel component that provided the same kernel API as the Linux kernel but written from scratch by Microsoft. Essentially, it translated from Linux APIs to Windows NT kernel APIs. That worked pretty well, but the current subsystem had a few shortcomings: there was no ability to use Linux drivers, in particular file system drivers. Its file system performance, layered on top of Windows' own NTFS, was often 20 times slower than a real Linux kernel. It was also a relatively old version of the kernel; it offered approximately the set of APIs that Linux 4.4 did, and that was released in 2016. Some APIs aren't implemented at all, and others are only partially implemented to meet the needs of specific applications.

All is changing with Windows Subsystem for Linux 2. Instead of emulating the Linux kernel APIs on the NT kernel, WSL 2 is going to run a full Linux kernel in a lightweight virtual machine. This kernel will be trimmed down and tailored to this particular use case, with stripped-down hardware support (since it will defer to the host Windows OS for that) and faster booting.

The Linux kernel is GPLed open source; the GPL license requires that any modifications made to the code must be published and made available under the GPL license. Microsoft will duly comply with this, publishing the patches and modifications it makes to the kernel. WSL 2 will also use a similar split as the current WSL does: the kernel component will be shipped with Windows while "personalities" as provided by the various Linux distributions can be installed from the Microsoft Store.

By using the Linux kernel itself, Microsoft gets all of Linux's features for free. This is why WSL 2 will support Docker containers: all the underlying infrastructure, such as cgroups, is already in the Linux kernel, and Microsoft won't need to implement the features itself. The embedded kernel will be serviced and updated by Windows Update.

This also provides a big bump to performance. File system-heavy operations such as extracting a tarball can be up to 20 times faster; other activities (such as cloning source code repositories in Git) will be perhaps five times faster.

WSL has already been warmly embraced by developers, as it gives a solid Linux-like development environment. WSL 2 will take that to a new level and all but eliminate the compatibility issues that WSL 1 has.

The first preview of WSL 2 is due to ship in June.

Read Original Article...
Apple Repairs and Service
Member of the Internet Defense League
Internet Cafe available

BitcoinCash Accepted

download