@zaknenou@lemmy.dbzer0.com cover
@zaknenou@lemmy.dbzer0.com avatar

zaknenou

@zaknenou@lemmy.dbzer0.com

This profile is from a federated server and may be incomplete. View on remote instance

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

doing the lord's work

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

Seriously though, I wish my country had such a detailed effort put into statistics I'm pretty sure it would have been a better project

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

why would I need the best Anti Viruse ?

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

https://lemmy.dbzer0.com/pictrs/image/c99daac4-9f11-4e96-a48a-1eea1fadd0a1.webp
But I think Kaspersky already offers real time protection on the free tier

what are the additional features in this method ?

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

I downvoted because I think this is not true. Kaspersky holds a company in UK and their reputation is the best so far in terms of efficiency, service and respect to terms with costumers. And from my experience pirating software (including video games) it is better than Windows defender in that it has less to no false positives, and detects the actual malware. Hell it even saves the system after being infected, I am told this by 2 friends and my brother.

And it offers real time protection on the free tier so it beats Malwarebytes in this aspect.

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

umm, shouldn't you elaborate more? imo opinion using Kaspersky can save a lot of newbies getting into piracy, so what experience is making us hate on it on forums and discourage using it? I'd understand if you said you prefer Malwarebytes which is American based I think and the best competitor out there to Kaspersky. But saying that AVs are scams is simply not true by logic and by experience.

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar
zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

I mean that the three story tellers downloaded infected software that locked the system but downloading Kaspersky unlocked it. One was LaTeX packages the other little nightmares 2 the game and my brother downloaded a design software.
The LaTeX package made the system unusable and encrypted data, asking for money for decryption. (windows7)
The game also made the system unresponsive and started uploading data, additionally social media accounts pf the owner were hacked. (Windows 10)
In both scenarios the owner didn't have Kaspersky and downloaded it only after infection, and it made the system function normally again. Although it didn't decrypt the files in the first case.
In the case of my brother his social media accounts were hacked and system started dying but he just relaunched Kaspersky (he paused it cuz crack asked him to do so lol) and the system survived functioning as always (although he had to rescue his accounts manually).

While it is debatable whether Kaspersky actually cleaned all the malware from the system, we can agree that the fact that system was rescued for the user to prepare for the re_installation is a good service.

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

yes it is from Vivy: Fluorite Eye's Song

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

what about this answer ? Is it outdated ? According to it, UEFI could be mounted like a flash drive I understand ?

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

hmm, so this is not a constant thing among BIOSes and UEFIs

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

I don't know I got it from this post by the ByteByteGo Youtube Channel:
https://www.youtube.com/post/UgkxNpwmgzai2O_tUa-b5yeLzLjh_OHs4vDY
On the description for this video they state:

Animation tools: Adobe Illustrator and After Effects.

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

thank you! I think this is what needed to explore
It is not my level to edit these things, I'm just Linux newbie exploring the possibilities.

But I still can't wrap my head over dd not being able to wipe a storage device out, despite being described as a "low level tool that can write zeroes to targets" in the discussion I viewed online.

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

but CD-R aren't rewrite_able because of their physical property not because protected

Anti malware that can detect cracks and flag them as so, but can also distinguish from trojact and malware? Also, that can be configured to don't use too many resources when not required

I was thinking, mbam, have you got other suggestions for Windows 10? Also, is there a good setup for when I'm running games I bought, and I don't need active scanning of threats? (Especially for legit games that use resources intensively)

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

Kaspersky and Malwarebytes are the top in the market I think

Would you teach your kids how to pirate?

My gf and I have had discussions about teaching morals to kids. In that vein, I asked myself, would I teach piracy to my kids? Yes, it’s technically illegal and carries inherent risks. But so does teenage sex carry the risks of teenage pregnancy, and so we have an obligation to children to teach them how to practice safe sex....

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

TempleOS! You will never find malware for that holy OS

Offflix - Series manager for your local downloads ( user-images.githubusercontent.com )

I created this project some years back and the project just reached v1.1.0. I know most people have jellyfin servers and all set up, but if you have just a local folder of all your series saved up, you can use this to remember what you were watching....

You are going to be trapped in a room for 12 hours with a mid 2000s office desktop with no internet connection and an external hard drive; what are you putting on the hard drive?

I've got some DOOM WADs I have been meaning to play so I would probably grab Trench Foot, Total Chaos, and the sequel to Ashes 2063, Ashes: Afterglow with a portable install of GZDoom to play them....

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

you didn't specify your system. If android then there are regularly updated solutions on fdroid. On Linux I'm just using the flathub official package

Rotating banners on /r/piracy ( lemmy.dbzer0.com )

Hey mates, recently I've developed a tool to use the GenerativeAI on the AI Horde to created random avatars and banners on lemmy. To keep things spicy, I wanted to deploy to rotate the /c/piracy banner daily, as I've done in a bunch of other communities like !stable_diffusion_art and the lemmy.dbzer0.com....

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

Be Weird, Download a Car, Generate Art, Screw Copyrights

Captain be taking his motto onto other levels

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

big BRUUUH. This is the first time I experience the loss of a site that I really liked. I hope he comes back somehow

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

go through all the tests on this link: ipleak.net
If you see your ip address anywhere then revise your setting
PS: don't forget the torrent leak test, there is one

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

bro there are kinds of games and pornography that I never heard about, I don't think this is accurate.

Installing cracked NukeX 14.0 and trying not to get sued

finally got access to CGPeers and snatched a copy of NukeX, I'm still worried that Foundry will still somehow snatch my hardware ID and send me a threatening email. I've already wiped Nuke and all related files from my hardware and nuked my foundry account, anything else I could do in order to shield myself a bit more before I...

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

you should have used VPN to download mate, or maybe even a proxy like v2ray. the thing is they notice your ip address when you are torrenting (cuz when you engage in Torrent you reveal your IP address publicly, to everyone downloading the thing) and send a lawsuit to your ISP with your IP address written, you ISP gladly reveals the IP is yours and sends the lawsuit to you so that you can prepare for the case. So if nothing comes from this I would say they didn't notice you.

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

Yu-Gi-Oh used to be popular with Hamashi

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

this is very detailed answer thank you. however I face an ambiguity regarding this:

This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).

How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

The situation is just an example, I'm not actually planning a revolution. just for demonstration purpose

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can't read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can't figure out how to unlock it and decrypt the data)?

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

so you can encrypt a message with my public key but you cannot decrypt it afterward ??

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

Thank you! extremely helpful answer

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

I'm satisfied with the answers and insights I got so far. But if you may add I'd be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don't know anything. I know quite well about Prime number and theorems about them on math, but not their applications

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

non destructive editing

huh? do you mean undo history? It is on Gimp, and I think it even made into Windows Paint at this point

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

I still can't understand. In your example most likely I selected the eye then clicked suppr, I can go back and copy it after selection? Or you're talking about an ability to re-arrange edits ?

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

does this project (there is a demonstration video in the link) address the thing ?

zaknenou OP ,
@zaknenou@lemmy.dbzer0.com avatar

Either way I have enough retro games to last me a lifetime.

same tbh, there is a reason !patientgamers is up in the lemmy explorer

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

bro this is depressing. I think CLI projects are less likely to receive donations for some reason and more in danger

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

and mods deleting anything new there

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

I were about to loose my mind if no one shared the same opinion at this point

the more glad I’m that the original Moderator of PiratedGames went to Lemmy

Is it so? I thought it is the same mod team there from before the protest/migration.

zaknenou ,
@zaknenou@lemmy.dbzer0.com avatar

surprisingly, I’m sure getintopc’s mods are same as the notorious oceanofgames yet it is considerably a more reputable site. Although I have to say it is mentioned on the megathread with the unsafe sites as one of the ones Particularly avoided by the pirate community.

If you already downloaded the file then scan with Kaspersky or Malwarebytes as they are imo the most reputable AVs in the industry nowadays (the free tier of Kaspersky is more than enough). Alternatively I think you can copy the download URL and patse it on virustotal and get the file scanned (no need to actually upload I think).

Proton VPN on Linux looks very different from Windows. How do you select one of their P2P options for faster torrenting?

Pretty much what the title says. I noticed that ProtonVPN Linux has an EXTREMELY limited interface compared to their program on Windows. I also do not appear to have the option to bind qBittorrent to ProtonVPN the same way that I did with MullvadVPN. Has anybody experienced ProtonVPN on Linux and successfully used it for...

Pirated video games SOURCE CODE

So there are multiple sites&groups that pirate video games especially on PC. I was wondering if there are places on the internet where you find source code for games especially the highly modifiable ones like Half Life 2/Portal and Skyrim. Or groups that crack into the source code of games (or even software in general), not only...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines