[Freedos-devel] Simplified Chinese Edlin?
While perusing Github, I noticed that the NLS project hasn't upgraded Edlin, which has three new messages to be translated. I also noticed that recently, many of the downloads of Edlin from SourceForge are from Hong Kong, which I found amusing. I also found a "fork" of Edlin in Github where the guy translated the messages into Simplified Chinese. This begs the question of what I should do to get Edlin to work with Simplified Chinese (I know very little about how an Asian language with 50,000 characters is used on a PC) and can we include it in NLS. I think searching for "edlin.zh-hans" on Github will find it. Gregory___ Freedos-devel mailing list Freedos-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freedos-devel
Re: [Freedos-devel] VME broken on Ryzen CPU, autodetection useful?
Hi, On Mon, Nov 13, 2023 at 9:19 PM Steve Nickolas via Freedos-devel wrote: > > I think there may be a point where if one's going to run DOS on > a modern machine, it'll have to be through some degree of emulation. > Whether that be a KVM/QEMU-on-metal approach, or a 64-bit "DOS" which can > emulate a Pentium MMX or so, VESA SVGA, SB16, etc. for legacy apps... > > (Actually, I'd be interested in something of this ilk if I knew more, > having run a stripped-down Apple //e emulator on bare-metal from UEFI and > then giving up because I couldn't read the damned Alt keys...) Just for comparison, for Raspberry Pi (ARM), *not* running atop Linux (or any other host OS): One guy emulates the old 8-bit CP/M OS (and Z80 cpu) via Ultibo (written in Free Pascal), thus allowing him to run Turbo Pascal 3 for CP/M : * http://www.projekte.daleske.de/prog/11_EMUZ80_RPI/prog_EMUZ80_RPI_en.htm Another guy tried porting Project Oberon (compiler and OS) to Ultibo : * https://github.com/MGreim/ultiboberon ___ Freedos-devel mailing list Freedos-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freedos-devel
Re: [Freedos-devel] FreeDOS Phishing attack - warning!
Hi everybody, now I have also received one of those freedos phishing mails: test at multicenter.com.bo wrote "Re: [Freedos-devel] mode.com" from 193.201.8.100 saying: Please review and sign the enclosed document. This is essential for our current project (etc.) The link in the mail interestingly was a doubleclick forward to a bitly link. Luckily, bitly offers a link preview and virustotal helped me to find out more. The link had checked out as harmless 13 days ago, but a "reanalyze" now tells me: https://www.virustotal.com/gui/url/ff13f15b868cc0b4efdb580f44b621d8f435b82e4fbb6e6fe1cef9327d3fb441/detection Malware (ESET, Lumu, SOCRadar, VIPRE) Malicious (Seclookup) Phishing (Fortinet) Details about the type of malware are not provided, though. It is interesting that the previous check was around the beginning of this phishing or malware wave. Maybe those sending the mails themselves had their now-infected sites checked before infecting them, for a fake sense of security? Regards, Eric ___ Freedos-devel mailing list Freedos-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freedos-devel