I downvoted because I think this is not true. Kaspersky holds a company in UK and their reputation is the best so far in terms of efficiency, service and respect to terms with costumers. And from my experience pirating software (including video games) it is better than Windows defender in that it has less to no false positives, and detects the actual malware. Hell it even saves the system after being infected, I am told this by 2 friends and my brother.
And it offers real time protection on the free tier so it beats Malwarebytes in this aspect.
umm, shouldn't you elaborate more? imo opinion using Kaspersky can save a lot of newbies getting into piracy, so what experience is making us hate on it on forums and discourage using it? I'd understand if you said you prefer Malwarebytes which is American based I think and the best competitor out there to Kaspersky. But saying that AVs are scams is simply not true by logic and by experience.
I mean that the three story tellers downloaded infected software that locked the system but downloading Kaspersky unlocked it. One was LaTeX packages the other little nightmares 2 the game and my brother downloaded a design software.
The LaTeX package made the system unusable and encrypted data, asking for money for decryption. (windows7)
The game also made the system unresponsive and started uploading data, additionally social media accounts pf the owner were hacked. (Windows 10)
In both scenarios the owner didn't have Kaspersky and downloaded it only after infection, and it made the system function normally again. Although it didn't decrypt the files in the first case.
In the case of my brother his social media accounts were hacked and system started dying but he just relaunched Kaspersky (he paused it cuz crack asked him to do so lol) and the system survived functioning as always (although he had to rescue his accounts manually).
While it is debatable whether Kaspersky actually cleaned all the malware from the system, we can agree that the fact that system was rescued for the user to prepare for the re_installation is a good service.
thank you! I think this is what needed to explore
It is not my level to edit these things, I'm just Linux newbie exploring the possibilities.
But I still can't wrap my head over dd not being able to wipe a storage device out, despite being described as a "low level tool that can write zeroes to targets" in the discussion I viewed online.
I was thinking, mbam, have you got other suggestions for Windows 10? Also, is there a good setup for when I'm running games I bought, and I don't need active scanning of threats? (Especially for legit games that use resources intensively)
My gf and I have had discussions about teaching morals to kids. In that vein, I asked myself, would I teach piracy to my kids? Yes, it’s technically illegal and carries inherent risks. But so does teenage sex carry the risks of teenage pregnancy, and so we have an obligation to children to teach them how to practice safe sex....
I created this project some years back and the project just reached v1.1.0. I know most people have jellyfin servers and all set up, but if you have just a local folder of all your series saved up, you can use this to remember what you were watching....
I've got some DOOM WADs I have been meaning to play so I would probably grab Trench Foot, Total Chaos, and the sequel to Ashes 2063, Ashes: Afterglow with a portable install of GZDoom to play them....
Hey mates, recently I've developed a tool to use the GenerativeAI on the AI Horde to created random avatars and banners on lemmy. To keep things spicy, I wanted to deploy to rotate the /c/piracy banner daily, as I've done in a bunch of other communities like !stable_diffusion_art and the lemmy.dbzer0.com....
go through all the tests on this link: ipleak.net
If you see your ip address anywhere then revise your setting
PS: don't forget the torrent leak test, there is one
finally got access to CGPeers and snatched a copy of NukeX, I'm still worried that Foundry will still somehow snatch my hardware ID and send me a threatening email. I've already wiped Nuke and all related files from my hardware and nuked my foundry account, anything else I could do in order to shield myself a bit more before I...
you should have used VPN to download mate, or maybe even a proxy like v2ray. the thing is they notice your ip address when you are torrenting (cuz when you engage in Torrent you reveal your IP address publicly, to everyone downloading the thing) and send a lawsuit to your ISP with your IP address written, you ISP gladly reveals the IP is yours and sends the lawsuit to you so that you can prepare for the case. So if nothing comes from this I would say they didn't notice you.
this is very detailed answer thank you. however I face an ambiguity regarding this:
This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).
How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??
Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can't read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can't figure out how to unlock it and decrypt the data)?
I'm satisfied with the answers and insights I got so far. But if you may add I'd be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don't know anything. I know quite well about Prime number and theorems about them on math, but not their applications
[Thread, post or comment was deleted by the moderator]
I still can't understand. In your example most likely I selected the eye then clicked suppr, I can go back and copy it after selection? Or you're talking about an ability to re-arrange edits ?
I recently checked back on the PiratedGames subreddit after long while not being there. And I wonder what other people here think but in my opinion, the quality of the subreddit has gone downhill....
surprisingly, I’m sure getintopc’s mods are same as the notorious oceanofgames yet it is considerably a more reputable site. Although I have to say it is mentioned on the megathread with the unsafe sites as one of the ones Particularly avoided by the pirate community.
If you already downloaded the file then scan with Kaspersky or Malwarebytes as they are imo the most reputable AVs in the industry nowadays (the free tier of Kaspersky is more than enough). Alternatively I think you can copy the download URL and patse it on virustotal and get the file scanned (no need to actually upload I think).
Pretty much what the title says. I noticed that ProtonVPN Linux has an EXTREMELY limited interface compared to their program on Windows. I also do not appear to have the option to bind qBittorrent to ProtonVPN the same way that I did with MullvadVPN. Has anybody experienced ProtonVPN on Linux and successfully used it for...
So there are multiple sites&groups that pirate video games especially on PC. I was wondering if there are places on the internet where you find source code for games especially the highly modifiable ones like Half Life 2/Portal and Skyrim. Or groups that crack into the source code of games (or even software in general), not only...
The State of global Piracy - April 2024 ( lemmy.dbzer0.com )
🏴☠️ AHOY fellow pirates and welcome to the state of global piracy for April 2024! ARRR! 🏴☠️...
Just wanted to share this simple way to use kaspersky for free ( forum.kaspersky.com )
You can use kaspersky beta versions for free by downloading and installing it from their forum....
Is it possible to erase the UEFI/BIOS using dd or rm -rf on Linux ? ( yt3.ggpht.com )
Anti malware that can detect cracks and flag them as so, but can also distinguish from trojact and malware? Also, that can be configured to don't use too many resources when not required
I was thinking, mbam, have you got other suggestions for Windows 10? Also, is there a good setup for when I'm running games I bought, and I don't need active scanning of threats? (Especially for legit games that use resources intensively)
Would you teach your kids how to pirate?
My gf and I have had discussions about teaching morals to kids. In that vein, I asked myself, would I teach piracy to my kids? Yes, it’s technically illegal and carries inherent risks. But so does teenage sex carry the risks of teenage pregnancy, and so we have an obligation to children to teach them how to practice safe sex....
Offflix - Series manager for your local downloads ( user-images.githubusercontent.com )
I created this project some years back and the project just reached v1.1.0. I know most people have jellyfin servers and all set up, but if you have just a local folder of all your series saved up, you can use this to remember what you were watching....
You are going to be trapped in a room for 12 hours with a mid 2000s office desktop with no internet connection and an external hard drive; what are you putting on the hard drive?
I've got some DOOM WADs I have been meaning to play so I would probably grab Trench Foot, Total Chaos, and the sequel to Ashes 2063, Ashes: Afterglow with a portable install of GZDoom to play them....
The National Court orders to block Telegram in Spain ( www.gearrice.com )
Rotating banners on /r/piracy ( lemmy.dbzer0.com )
Hey mates, recently I've developed a tool to use the GenerativeAI on the AI Horde to created random avatars and banners on lemmy. To keep things spicy, I wanted to deploy to rotate the /c/piracy banner daily, as I've done in a bunch of other communities like !stable_diffusion_art and the lemmy.dbzer0.com....
The Gnarly-Repacks website may not be coming back ( rentry.org )
"WHERE DA FUCK IS DA SITE MOTHAFUCKA?!"...
Beginner questions: VPN safe enough? How to use all these tools?
Hi,...
Installing cracked NukeX 14.0 and trying not to get sued
finally got access to CGPeers and snatched a copy of NukeX, I'm still worried that Foundry will still somehow snatch my hardware ID and send me a threatening email. I've already wiped Nuke and all related files from my hardware and nuked my foundry account, anything else I could do in order to shield myself a bit more before I...
online multiplayer in pirated games?
this isn't about anything specific, this is just a general question....
the encryption keys, why can't the government just sneak on them?
disclaimer: I'm just asking to get understanding of the theory behind network traffic encryption, I know this doesn't happen irl most likely....
[Thread, post or comment was deleted by the moderator]
rentry.co now showing ad to recover server costs ( rentry.co )
There's a FOSS alternative for rentry.co which is sentrytwo.com - Codeberg...
I'm happy he did actually say it
https://lemmy.dbzer0.com/pictrs/image/c55c4a6a-b3bc-471c-8244-cb58aadf117f.png...
TIL that operating system Linux is an example of anarcho-communism ( en.wikipedia.org )
PiratedGames content Lemmy/Reddit
I recently checked back on the PiratedGames subreddit after long while not being there. And I wonder what other people here think but in my opinion, the quality of the subreddit has gone downhill....
Is igetintopc safe ?
Basically the title....
Proton VPN on Linux looks very different from Windows. How do you select one of their P2P options for faster torrenting?
Pretty much what the title says. I noticed that ProtonVPN Linux has an EXTREMELY limited interface compared to their program on Windows. I also do not appear to have the option to bind qBittorrent to ProtonVPN the same way that I did with MullvadVPN. Has anybody experienced ProtonVPN on Linux and successfully used it for...
Pirated video games SOURCE CODE
So there are multiple sites&groups that pirate video games especially on PC. I was wondering if there are places on the internet where you find source code for games especially the highly modifiable ones like Half Life 2/Portal and Skyrim. Or groups that crack into the source code of games (or even software in general), not only...