winamp is back after revamp; nostalgia-inducing looks intact
Justinas Vainilavičius , Senior Journalist Updated on: 04 August 2022
winamp is back after revamp; nostalgia-inducing looks intact

Image by Winamp

The heritage MP3 player has been updated and is available for download on Winamp forums.

While its turn-of-the-millennia momentum has passed, Winamp can still pride itself on what it says is a “vibrant” community of 80 million active users. Many were delighted when Winamp dropped its latest software update – the first in four years.

Retro-seekers will be glad to see no dramatic changes to how Winamp looks. Still, developers noted a lot of under-the-hood modifications, the most significant of which was migrating the entire project from VS2008 to the VS2019 codebase.

It took two developer teams and “a pandemic-induced hiatus” to accomplish the feat. Acknowledging that “tons more” are to be done, the developers say they will now focus on fixing existing features or adding new ones. It may put Winamp closer to achieving its ultimate goal of building a “remastered” player that will better suit today’s streaming-based consumer needs by offering podcast and radio features.

It was the emergence of music streaming platforms and, before that, fierce competition from iTunes that put Winamp – one of the most downloaded Windows applications in the late 90s and early aughts – behind its golden days.

The music player of choice at the time, Winamp played the most popular formats, including MP3, and was known for its psychedelic visualizers and customizable interface skins. Users would typically rip their files straight from CDs or download them from peer-to-peer sharing networks, which led to outcries over piracy.

Eventually, Winamp’s parent company AOL decided to shut it down in 2013 – but then sold it to a digital audio company Radionomy instead, which in turn closed in 2020. Winamp, however, lives on.

TECH NEWS RELATED

Research reveals how common online health marketing practices may violate patient privacy

Credit: Unsplash/CC0 Public Domain The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 to protect sensitive protected health information (PHI) from being disclosed without patient consent. But a study published August 15 in the journal Patterns shows that some PHI is not as secure as expected. ...

View more: Research reveals how common online health marketing practices may violate patient privacy

AI-designed camera only records objects of interest while being blind to others

Object class-specific imaging using a diffractive camera. a Illustration of a three-layer diffractive camera trained to perform object class-specific imaging with instantaneous all-optical erasure of the other classes of objects at its output FOV. b The experimental setup for the diffractive camera testing using coherent THz illumination. Credit: eLight ...

View more: AI-designed camera only records objects of interest while being blind to others

How to Remove Password From PDF

Are you tired of constantly entering the password to your PDF, especially if it no longer needs one? Or, do you want to give others quick access to your PDF file at all times? If so, you can easily opt to remove the password. Similar to adding a password, ...

View more: How to Remove Password From PDF

How to Enable or Disable Bitlocker?

Data privacy is a concerning topic in this technological world. Information is vulnerable to different kinds of attacks and thefts online or offline. Security measures may be effective to a point when online due to server syncing. But what if such attacks are initiated offline? Windows provides a BitLocker ...

View more: How to Enable or Disable Bitlocker?

Ex-Qualcomm research vice president and three others charged in $150 million fraud scheme

Credit: Pixabay/CC0 Public Domain Federal prosecutors unveiled fraud and money-laundering charges this week against a former Qualcomm research engineer and three others for allegedly duping the San Diego company into paying $150 million to acquire technology that it putatively owned already. A federal grand jury handed up the indictment ...

View more: Ex-Qualcomm research vice president and three others charged in $150 million fraud scheme

Amazon, Oracle shrug off lawmaker fears of abortion data sales

Credit: Unsplash/CC0 Public Domain Amazon.com Inc., Oracle Corp. and other data providers pressed by a group of U.S. lawmakers about how they sell mobile phone location data offered assurances that the information couldn’t be used to track individuals seeking abortion services. U.S. Representative Lori Trahan, one of the House ...

View more: Amazon, Oracle shrug off lawmaker fears of abortion data sales

Deepfakes expose vulnerabilities in certain facial recognition technology

Credit: Pixabay/CC0 Public Domain Mobile devices use facial recognition technology to help users quickly and securely unlock their phones, make a financial transaction or access medical records. But facial recognition technologies that employ a specific user-detection method are highly vulnerable to deepfake-based attacks that could lead to significant security ...

View more: Deepfakes expose vulnerabilities in certain facial recognition technology

US unmasks Conti suspect for first time, asks public help to identify him

Jurgita Lapienytė Deputy Chief Editor Updated on: 12 August 2022 Image by Shutterstock If you have any information about the malicious hackers known as Target, Reshaev, Professor, Tramp, and Dandis, come forward. The US has revealed the face of a Conti associate for the first time and is asking for ...

View more: US unmasks Conti suspect for first time, asks public help to identify him

Meta failing to stamp out cyberbullying, says report

Russian cyberwarfare has mixed success, say experts

Australian court orders Google to pay $43 million for misleading users

FTC zeroes in on Big Tech with public consultation

Cybersecurity In Movies Myths vs. Reality

Zeppelin ransom gang executes malware multiple times within a victim’s network

Study reveals AI prediction model that could help save firefighter lives

Russian threat group targets online vendors in Singapore

7-Eleven stores knocked out after a cyberattack in Denmark

Researchers mitigate potential side-channel attack vulnerability in multicore processors

Threat actors use Google Cloud to spoof Best Buy

Identity theft: why oversharing your data online could put your quality of life in jeopardy

OTHER TECH NEWS

Top Car News Car News