Like Vegas? Sure. Open source stuff like kdenlive and shotcut exists. Davinci resolve is available for Linux for more professional stuff. Specifically Vegas? Probably only under a VM, and you’d likely get awful performance, so not worth it. If you’re a professional, Linux isn’t always an option, especially if you are in a software ecosystem that doesn’t work there
Worth noting that the free version of Davinci Resolve doesn't support H.264/H.265 under Linux. You will need to use another format or pay for the full version. ($295)
i know you guys are probably right when you say that security updates are important, but why exactly? give me an example of how i could be fucked over while i’m just mindlessly playing my steam games and watching twitch+youtube on a system that hasn’t been updated since 2016.
i blindly assume that as long as i don’t download and run stupid .exes or click stupid links, i am completely fine
You don't need to click anything suspicious. Remote code execution has in the past been done through images, PDFs, comments on some webpage, or supposedly trustworthy games. Just recently, Minecraft would let an attacker run anything on the victim's computer due to a vulnerability in Log4j.
If your computer is not directly exposed to the internet, you might get away with some security updates that for example fix vulnerabilities that target the system firewall. But the point is, you're constantly exposing yourself to attackers without knowing so.
A few example vectors:
Cross-Site Scripting (XSS) allows an attacker to run arbitrary code on the victim's browser. All that's required is a website that doesn't validate its input properly. That is, an attacker can write executable code into a YouTube comment and when you view that comment, your computer will execute that code. Obviously YouTube is secured against that, but there are plenty of websites where this attack can be done. Therefore, modern browsers isolate the code execution to only that "browser tab", so the attacker can't access some sensitive data (unless the browser has some undiscovered vulnerability or for example the page itself contains sensitive information, say your bank account details). While modern browsers should provide sufficient protection against such attacks, the take-away point is that you don't necessarily need to click any "suspicious links". A vulnerability in a well-known website you frequent could be discovered any day.
An attacker can easily make your PC go to their website when typing google.com. DNS (how your computer is able to tell which web address is which computer) is not encrypted. It is incredibly easy tamper with. Why you don't get scammed everyday is because of TLS encryption. Your computer is able to tell that the website is not Google, because it doesn't have Google's cryptographic "keys". Assume that we discover a vulnerability in TLS (encryption of webpages) tomorrow and you refuse to update your operating system. Suddenly, an attacker can route any traffic they'd like back to them and you would be none the wiser. Same thing would happen if some vulnerability is discovered in X509 certificates, if ICANN's private keys are leaked, and so on.
There are a lot of things that could go wrong. And they go wrong daily. Security updates fix vulnerabilities that we constantly find. They may be updates for your browser, your games, or indeed your operating system, depending on where that vulnerability is. The examples I gave are exaggerated, because they're meant to be simple to understand. We do not find vulnerabilities in TLS every single day. Still, weak points are being discovered and fixed constantly. One of the bigger exploits were Spectre/Meltdown (attacks on the CPU) that let an attacker read any data they want, provided they can simply run some code on your computer in some way.
Also, obviously, if you expose yourself to the internet directly (e.g. port forwarding) or connect to an unsecure WiFi network, you'll be bombarded with automated attacks that exploit holes found in firewall and the likes. If you open a port on your computer right now, you'll get around a few hundred such knocks per day.
There are plenty of videos online that display what happens if you for example use a Windows 95 computer, either directly exposed to the internet or not. Might be worth watching to see just how easy it is for attackers to take over in the case of such an ancient system. Same principles apply to newer systems as well, the attacks are just more complex.
For web browsing, that almost makes no difference. As long as the browser is being updated, the most important attack vectors are closed. Even if there are any exploitable vulnerabilities on the OS, that will stop malware from even getting to them.
Absolute joke of a comment. You are assuming the browser is a holy grail completely isolating the internet from the operating system.
First of all. The browser runs on the operating system's services. In particular, the isolation that you implicitly cite is done entirely by the kernel. (That's for example why you cannot run chrome in an unprivileged docker container - the crucial isolation-centered system calls are not available) The whole network stack is managed by the operating system. Cryptography can also partially be done OS-sided. The simplest example is CSPRNG, which is usually provided by the OS. (Advanced systems may rely on external physical generators, see Cloudflare's lava lamps).
Secondly. Completely and utterly wrong. The linked video displays the execution of Meltdown/Spectre within a browser. Using JavaScript. This allows the attacker to gain access to any data they want on your computer simply by running some JavaScript code. Easily remotely executed via XSS on a poorly written website. You may read the full article here. Or inform yourself about Meltdown and Spectre here. How is that relevant? Combating this vulnerability was primarily done via critical OS updates. The exploits are inherit to certain CPUs and are therefore not fully fixable. Still, the combination of BIOS, Chipset, OS, and browser updates help prevent very serious attack vectors. (That's the reason why the browser's time measurement is only accurate to about the millisecond.)
So no. Browsers aren't the magic solution to everything (sorry Ubuntu Snap). They very much depend on the OS providing the assumed security guarantees. And even assuming no direct vulnerabilities in the OS, we can never exclude side-channel attacks, like what Meltdown and Spectre were (or still are if you refuse to update your system).
All jokes aside, after hearing that EOL is coming to Win10 this October, I have decided over the summer, before fall quarter is in and I'm back to start my 2nd year of college, that I would definitely be taking everything I need/want off of my desktop and switch to something like mint or MX because of how simple and user friendly they've been to me as someone who's only been using Linux for maybe 2-3 years. Only things I would I need are dedicated time and personal drive to pull that off and a new external drive for storing all my files.
I try to avoid things with Red Hat or Canonical stink on it (which is why Kubuntu and Fedora are out)… and it’s more friendly than something more barebones like Arch.
Archinstall script worked fine for me tho, it gives blank which you fill in and press enter, then installer will do it's job without you. p.s i love opensuse tubleweed tho, my top 3 distros is debian gentoo opensuse, gentoo also have gentooinstall script derived from archinstall one
Well, it will be slightly different. AMD releases open source drivers. That's why it works so much better. Nvidia releases proprietary ones and let's the community handle the open source ones. To the end user, there probably won't be much difference eventually, but it does hurt progress so they'll always be slightly behind where they could be.
The main issue I've been having is getting two monitors to work.
Install Linux, one monitor works. Let's try changing the driver, permanent black screen.
Reinstall Linux, well maybe I can make one monitor work. Nope. Let's try and change the driver using the terminal. Oh black screen again.
Ok I'll only use Linux for coding on one monitor, Windows update somehow lost the boot loader for Linux. I'm not good on grub so I just removed Linux afterwards.
I have another older computer, still Nvidia. Let's do a clean install. No windows, just Linux. Configure proton on steam, hmm it doesn't launch games. It just says starting then nothing. No errors. Let's try different compatibilities, still no errors.
What I experienced is, Linux doesn't tell you what You're doing wrong, it just doesn't work. Which isn't going to work for the majority of computer users.
If something is having an issue, I want to know why, which unfortunately and fortunately Windows does a good job on.
I found the best working linux for me is endeavorOS, which istalls Arch and package manager yay
If you want to install anything just write yay „anything“ and choose what to install from the list (google „aur „answer to anything“ „ to check which answer is the app you want)
For installing proprietary NVIDIA drivers, there is a tool preinstalled (have to google the name) if you really want.
If I can get overwatch and steam games to work, I would leave Windows in a heart beat. But I'm also at the point in my life where I can't spend hours troubleshooting.
Steam has great Linux support and can run even non steam windows apps through proton
I have not tested overwatch, but you can launch battle.net through steam if you add the exe to your steam library and force proton in the game properties
Edit: just use the app lutris to install battle.net, seems to be the even more easy route
Not sure what you have, what your trying to do, and am pretty new to Linux myself, but I’m running KDE neon with a 3070, and after a little work to get drivers updated I’ve had minimal issues!
I’m not doing anything too crazy though, mostly web browsing and gaming is all.
On released they didn't know yet how far they can push that telemetry shit down their users' throats. I bet, 11 is better optimized for that. And eventually, it'll be Win365 OSaaS anyway...
Writing your own internet protocol is a good idea but you shouldn't stop there. You need to run your own internet cables too to make sure it does what you want and isn't controlled by someone else.
You don't have to choose between binary and source, you can get some pre-compiled packages that you don't care about, but e.g. run a custom kernel at the same time.