In another of their regular update blog posts, KDE's Nate Graham has highlighted some recent new KDE Plasma features coming soon to the desktop.
With the latest blog post the first noted item might have a lot of uses! As Ark, the KDE file compression/decompression utility, can now open and un-archive self-extracting .exe archive files. There's a lot of installers out there for games, mods and plenty more that use this and so just being able to extract them simply on KDE Plasma with Ark sounds really useful. This will come with Ark version 24.05.
Some more work is going into tweaking the Plasma UI too including showing you shortcuts over menu items, like middle click for opening a file in the first entry inside the "Open With" menu. That simple but useful change is coming with Dolphin 24.05.
They've also made the floating panel’s float/de-float animation smoother when using a scale factor, in Plasma's global Edit Mode you can now click anywhere on a panel to show that panel’s own configuration dialog, entries in the System Settings Autostart page are now sorted alphabetically and more.
Lots of bug fixes coming too as the clean-up continues from the main Plasma 6 release. Like a fix to relax KWin's requirement on Wayland that XWayland windows can only put content on the clipboard when they have keyboard focus, as this was not a requirement on X11 and enforcing it was breaking some XWayland-using apps.
Have you made the jump to Plasma 6 yet? Or are you waiting for a bit for bug fixes to roll in?
Quoting: redneckdrowSelf extracting archives?Well, a perfect example of why self-extracting archives are a requirement... The Amiga standardized for the most part on LHA/LZH files... but because that wasn't written by Commodore, much like pkzip wasn't written by MS, they can't include it with the OS. Being able to grab a self-extracting archive of it so that you can then open not-self-extracting archives is kind of a requirement. But yeah, I didn't like the ones outside of the use case of the actual compress/uncompress program.
I still have nightmares about those things! 15–20 years ago, they were a huge deployment method for all manner of worms and viruses!
I caught one in high school when I noticed one of our teacher's computers behaving oddly.
My high school had a contract with McAfee, and I remember having to explain along with both computer skills teachers, why said 'antivirus' hadn't caught a teacher's infected e-mail attachment before it had reached the school's network and why John McAfee's product was absolute snake oil! Thankfully, no one else opened the attachment!
From a bootable USB drive I always kept on me, I ran Malwarebytes and several other programs, and found 122 actual bugaboos and only 2 false positives on the initially infected machine. Apparently, it was pandelirium in the computer lab for the next couple hours!
Anyone who uses a self-extracting executable/zip of any kind these days should be shot, hanged, and shot again!
See more from me