DivisionResult

@DivisionResult@lemmy.dbzer0.com
4 Post – 59 Comments
Joined 12 months ago

Sometimes , things have to go down to go up.Justo wait, its like a roller coaster.

9 more...

Hey Sabee363, I didn't make the meme. I'm diging into this technologies because im paying for my grandma and last night I started remembering this topic, I'mhighly addictive to low level technology and I like to play with systems.

Partner, sorry if I don't transcribed. Have a nice day/evening/night.

0

1 more...

KeePass, and backup it on luks containers.

1 more...

And if you start building a QEMU machine that spoofes your machine IDs? So you can do all ypur DRM sruff from QEMU?

https://github.com/A1exxander/KVM-Spoofing

ProtonVPN/Mullvad. This is the post number 288471 talking about this. Can we put it somewhere un wiki?

AirVPN isnt based on Italy? Watchout Italy is a place where Lawfull Interception is easy to implement. I understand the portfowarding thing, stick to ProtonVPN. You need a VPN where countries do the things right, I'm not saying Italy is not one of those. But Switzerland, seems like the best option to resolve any issue.

Maybe... You can use i2p.

BTW cryptostorm is a very old and very known for the paranoid owners. They are really tech savvy, you should give them a try. They do not have a nice, client for windows, and doesn't for Linux they use nm for connections. I think that's where you know they don't want to be more famous , like mullvad orprotono or the others.

1 more...

No problem my friend, I will count on this for the next time. Thanks for making me notice.

on linux/unix you can make partitions files non executable.

Maybe you can mount in fstab a partition with the parameter NOEXEC:

Option 'NOEXEC' flag in the mount command does not allow the execution of executable binaries in the mounted file system1. However, when a script (a text file that begins with she-bang line; i.e., a line that begins with #!) is given to some shells (bash), it will run the executable named on that line (e.g., /usr/bin/perl) and pass the path of the shell script as the first argument. The actual interpreter might not be on that mountpoint.


1 The mount command typically mounts a file system. (Arguably, loop-back or bind mounts may be considered an exception to this generality.) In some cases (e.g., /tmp), this file system will contain only one directory.

[0]https://superuser.com/questions/728127/what-does-noexec-flag-mean-when-mounting-directories-on-rhel

This is a thing that story rpeats :

"Until they do.".

1 more...

Get hdd for saving data my pirate

You are correct I didn't make the meme, I'm looking for the technical background .

Checkout the pages:

Cuevana3.CH And dontorrent (mirrors are updated in their tg)

13 more...

Yall taking about modern cars, meanwhile my 94' Citröen works like a charm. Aftermarket alarm with GPS unmbolizer for 50 bucks does al the work.

https://piped.video/watch?v=aTNAghGMnIU

This is freedom hahahaha

Thats good but you need to blend with othet people.

Thanks I will check it out!

2 more...

Yes you can and its super easy. Setup your conection through HTTPS block your port only locally, buy a 1$ domain and install cloudflared tunnel. (Cloudflare configures your own TLS.)

You should disable the instance, or try to modify some parameters so you have to connect via some login or password.

Thank you for sharing this information.

Use cloudflare tunnel.

Always encrypt your files. (:

About tour técnical problem.

Just setup staticip un /etc/network/interfaces.

Search thatpath and static there is a lot of material about it.

(:

1 more...

Nixos is great but really it has its learning curve.

Docker-Compose is more friendly because all people use it.

I use NixOs and it's beautifull

It is working!

https://cuevana3.ch/

11 more...

It even hasn't a ECU. Lol

Yes and No. You should be able to set some GroupPolicies, and execute games by that type of policies like Application Guard. (Search GPO).

Application Guard is a security feature that isolates untrusted applications in a separate container, so if an attacker does manage to exploit a vulnerability, they’ll be contained and prevented from doing any further damage.

I'm seeing there are various systems you can get into to pay.

First try to get a Residential Proxy, second there are various prepaid cards like Prex or payment systems like mercadopago (Brazilian company as I researched). Or search resellers.

Hi the materials includes, OVA, PDFs mkv, and epubs.

1 more...

Hi the materials includes, OVA, PDFs mkv, and epubs.

Hi the materials includes, OVA, PDFs mkv, and epubs.

A good recomendations is AWS , after verifing your ID with a VCC, you should have 12 months of freetier products .

Nice you to know its running. :)

Yes but in a VM you have to make sure you PASSTHROUGH a GPU. Maybe OP can execute games by another user without privileges. Like execute app as not admin, or user.

Check out forma the SFx if u are in windows

Im downloading adobe photoshop 24.5 by m0nkus in a fx550,i3-9thG, 16 Ddr4 RAM. Imtrying all posibilities. Let's see! Thank for your reply!

Maybe can we emulate this apple silicon processor? I will give it a try.

If you find some source with Latín Spanish content please share.

So 7z let be it!.

Hey @Jvrava9, I downloaded, with aurorastore 4pda.RU app, but they ask me for captcha. I'm on a hardened android so maybe, I can search with all GoogleApps arsenal in my dev phone.

I also check this blogspot: https://www.celsoazevedo.com/files/android/how-to-bypass-4pda-captchas/

That says the same as you do about registering with the app .

1 more...

Yes tomorrow with more time, it's a good situation to learn something new.