Morgikan

@Morgikan@lemm.ee
0 Post – 107 Comments
Joined 1 years ago

Apparently some mods were running keyloggers on the community.

14 more...

I had a few networking and docker guides up, but I nuked the account with shreddit. Still, the institutional knowledge that those guides were based on left with me. We can rebuild.

4 more...

If you get a nice projector you can play it on the side of your neighbors house and they won't know.

1 more...

Transmission is probably one of the best clients to use in a headless setup. I think it usually ranks lower because it doesn't do a lot of things for you. What it does it does well, but nothing beyond that. Technically there is network binding, but by IP address and not interface. That means you have to script it which I know most people aren't going to want to do. As far as searching, again you have to rely on other services that probably do it better anyway. Still I rank it alongside qbittorrent. It just takes a less user or beginner friendly route.

It's not automatic, but you can technically block countries. From the Connections tab in Options, there is an IP Filter option for data files. I believe the format is X.X.X.X-Y.Y.Y.Y

Country IP assignments are handled by ARIN in North America and RIPE NCC for Europe. Those are the two main ones, but LATAM, Africa, and APAC territories have their own respective groups as well. So, every main German IP block is known and searchable via RIPE. You would have to format your lists using that info.

It may not be super effective as IPs can somewhat float, but that would be the method.

EDIT: Here is an example using Germany again that shows the data you'd have to format - https://lite.ip2location.com/germany-ip-address-ranges?lang=en_US

That would be a lot simpler if Qbittorrent accept CIDR notation like any sane human should be using.

4 more...

What evidence has been found that links the crypto-mining wallets with the 1337X admins?

2 more...

Valve argued in court that you do not own any title in your library and that they are a subscription based service. That's not very ethical.

23 more...

Windows being easy to pirate wasnt the reason for it's popularity. It had market share because they allowed for it to be preinstalled on machines for virtually nothing. They allowed it to be preinstalled on machines for virtually nothing because the OS wasn't the flagship product.

MS Office has always been the major flagship product for the company. This was true in 1994 and still is today. Office is so important to their revenue streams that it's fairly common knowledge and has been mentioned by former employees that OS development would focus on compatibility with Office programs, not the other way around.

Specifically if you look at the years around Office XP and 2003, that suite is used very much as a CVS. They deprecate their operating systems using Office.

BBC could ID a VPN IP address based on usage and concurrent sessions, but honestly most companies that block VPNs just purchase IP address lists from any number of vendors. Pixalate and DoubleVerify are two that I've worked with in the past that both provide that data to clients. They rarely ever block entire IP blocks though, so you might just try reconnecting from a different location/server within the UK until you land on one that works (if any).

2 more...

spouses might learn about secret affairs

Threat to your "stability, security and intergrity" = Your wife finds out you're cheating on her.

I spent many years working building and maintaining fiber networks, and I can unequivocally tell you that the answer to this is maybe. Normally you can treat city fiber just as any other ISP. A lot of them have different rules and different thresholds on what they allow and what they do not allow. Fiber networks are extremely expensive to build. So while you definitely need to protect the multi-million dollar investment you've made, depending on how you've built it it can be a little tricky to police what everyone is doing.

What's interesting is just because you are not receiving notice of a DMCA infraction, that does not mean that your ISP has not received a notice. There is this idea that if you are not set up for it it is difficult to track out what account held what IP 30 days prior or 60 days prior. That is kind of a BS excuse, but I have been at companies that did not have logging because they did not want to have logging.

We did collect email notices and pass them around though weekly to see who could find the most absurd DMCA takedown. So I will say, if you were pirating some weird ass mommy fetish furry porn everyone in that call center knows it and is laughing about it.

Fucking Lars. Metallica just did not get it and attacked their fans. Nobody had a problem paying for the music, they just wanted to be able to download it. They didn't want a CD they wanted an MP3.

1 more...

While an interesting idea, there is no evidence that supports that Ad Nauseum adversely impacts reporting metrics. This is due to ad servers all determining click by different methods. It rarely ever aligns. It likely doesn't impact user targeting either as your behavior still hasn't really changed and clicks aren't typically used for that purpose.

You're better off just running UBlock Origin. Punishing advertisers doesn't really make any sense anyway. The blame is really on publisher groups and their rampant greed. Auto-clicks just further that.

Whether they win the case or not, Plex should replace the photo with one poorly drawn in MS Paint as an FU to the photographer.

Kubuntu? Whore.

Q: How do you know that you don't have a virus without AV?

A: How do you know that you don't have a virus WITH AV?

Oh man, you brought up a really good point. There's the albums, and then there's the merch. Metallica junkies would have like 20 band shirts and so much Metallica swag all over their places. Those guys would drop thousands of dollars. They lived for that music. When Lars came out and was basically "it's about the money" so many fans stopped caring about the music. When they stopped caring about the music they stopped buying the merch.

I'm no theological expert, but I believe reading "Long-life sutra destroys sins" cancels out pirating it.

How funny would it be if they got hit with a GDPR violation?

I'm not really familiar with Wii U emulation, but the cdecrypt github page says you can compile it on Linux. It isn't Windows only.

My understanding was it's bad practice to host images on Lemmy instances anyway as it contributes to storage bloat. Instead of coming up with a one-off script solution (albeit a good effort), wouldn't it make sense to offload the scanning to a third party like imgur or catbox who would already be doing that and just link images into Lemmy? If nothing else wouldn't that limit liability on the instance admins?

1 more...

Suggesting a non-piracy option or providing links to non-piracy options is a violation of the community rules and guidelines.

I'm pretty sure ML is how Pixalate and DoubleVerify were building their lists, too. The difference is they were footing the bill in terms of resources and time spent to develop a solution. Training ML isn't hard, its just really time consuming.

I used to have a 16 drive bay DAS and HP Procurve modular switch I scraped from an old managed IT employer. They make really good space heaters in the winter and are good year round as white noise machines for when you sleep.

While I understand the sentiment, I kind of disagree with this. Cities implement fiber in different ways. Not all of them focus or care about residential service. In my city, they essentially set themselves up as a backhaul carrier. So when ISPs move into town rather than building out large infrastructure they connect into the city's and pay the city for interconnect. That money then goes to city services which is why we have so many parks and different programs.

Usually resellers are allowed to use it. It might be prohibitively expensive for them, but there is availability. Again that depends on how the city has it set up, but typically you as a citizen are getting a return on that investment either way.

1 more...

Those hits relate to DLL injection which would be required for Green Luma to interact with Steam the way it does. Looking at a generic online guide to using GL, the second step even states "Open DLLinjector.exe", so I'm thinking you're probably ok. With everything though, take that with a big helping of skepticism. How GL works is sketchy, but that doesn't mean its not "good" sketchy.

Here's my take on it. Things like Radarr, Sonarr, Jackett, etc offer a better service then Disney+, Netflix, Hulu, etc. Devs could charge for the *arrs and a lot of people would pay. Why? Because it's completely a la carte. Right now if there are say three shows I'm interested in then I could have to pay for three different streaming services. But not only that, I would also have to be concerned with whether or not that show is leaving the platform anytime soon. In the case of Hulu, not only do I have to worry about paying them but I also have to worry about paying them enough that I don't have to watch ads after paying them.

Likewise with video games, there are games that have DLCs that require previous DLCs to fully unlock what they include. In other words, it is paywalling already paywalled content. I don't have a problem with the content, I have a problem with the way they present the content.

Bare in mind what OP posted was from 4 months ago, but one of the mods mentions it here: https://www.reddit.com/r/PiratedGames/comments/14qvyi3/some_controversy_going_on_at_this_sub/

They acknowledge changes were made, so I would take that as confirmation, but that whole group/sub kind of cringey. Posts do get deleted by mods but users also make a lot of claims without any evidence. I get that most of those people don't have a technical background so its hard to find evidence, but that also maybe is a good reason to make a claim.

EDIT: When I wrote my original comment, I used "Apparently" and "Allegedly" synonymously. I understand if anyone wants to call me out on that, but doesn't seem right changing what I wrote (seems like that would be covering).

3 more...

Every day is a pirate party in the US.

The DNS modification is slightly off. Some ISPs check UDP packets since they are insecure and will modify query results regardless of the DNS server you are sending to. Mediacom is known to do this for their billing and DMCA systems. They use DNS redirection to assist in MITMing the connection to load their own certificate to your browser. With that done, they can prepend their own Javascript to the response they receive from whatever web server you are trying to contact. That's how they get their data usage and DMCA popups loaded when you load up whatever site.

1 more...

Black Friday ads on a piracy board. There is no God.

That's not a dumb question.

So, this question is more how does NAT function. There are different NAT configurations, but basically when you connect to anything behind a router, that router maps a port to be used for the request. Traffic matching its destination on return is then compared against an internal table and sent back through to your device. Opening these ports do not directly increase speed, but they do allow you to join DHT/PeX swarms. If you see an increase in speed its because you are effectively being saturated by connections passively through the swarm.

In a normal situation to connect to these swarms, you would either need to open a port pointing to the port number you configured your torrent application to use thereby making you visible to it, or enable UPnP which dynamically maps ports for the connections to work. Typically, you wouldn't want to enable UPnP as it is then possible to externally query the router and pull a manifest of UPnP advertised devices that exist on your internal network, however.

The problem with opening ports in your router if on a mobile network is that most networks use CGNAT. This is where your router does not hold a publicly routable IP address on the WAN side and instead maps out a single public IP with many (possibly thousands) of other devices. In this case, you would need something like a VPN service that supports port forwards. They would give you a port that they are forwarding for you. You would take that port number and from the device you connected to the VPN from (like your PC) enter that port number into your torrent client's "listening" port field.

9 more...

I run my own Invidious instance on my local network and its not bad, but you really aren't able to endlessly doom scroll Youtube recommendations with it. That sounds like a non-issue, but its more difficult to find new content you like without that algorithmic aspect. Technically, Invidious will load playlists, but the UI is designed to maximize the video presence without the other add-ons, so scrolling is a pain. Also, history is unnamed so its just a thumbnail with no other info.

You can change UI of Invidious with Stylus (ex. https://userstyles.world/style/6850/invidious-all-instances-player-and-tabs-v-3), but that won't run in qutebrowser and I love my native vim bindings.

5 more...

Mullvad no longer supports port forwarding and isn't really used by anyone in the torrenting community any longer. Most of those users have moved over to IVPN or AirVPN.

2 more...

Imagemagick can convert a series of images to single PDF: "convert page*.png mydoc.pdf"

With the Premium Afterhours service you get ad-free but also handjobs from a YouTube intern in the broom closet. $15.99 per month no contract, cancel anytime.

5 more...

"Pirates".

I set up a backup cell connection to my cable internet connection. Sketchy Chinese 4G LTE modem. My router was a DIY job I set up off of Ubuntu Server. Everything ran to a Cisco switch and then was VLAN isolated. For the two WAN connections, I ran scripts from the router that periodically tried to reach out to several DNS providers and then average response rates to determine if the main connection was up. If not then it would modify default routes and push everything to the cell.

The cell connection had pretty low data cap, so it was just for backup and wasn't a home style plan. I used the old TTL modification trick to get it to pass data like a phone. When I moved the backup to 5G, TTL modification stopped working and I had to resort to creating tunnel interfaces to an actual phone. Since that tunnel is limited in bandwidth to the lowest value, my speeds were really cut in half.

I look at it this way: A company's goal is to generate revenue from some product's sale. So, I could ask myself two questions regarding digital items:

Am I making money from the piracy of that product? Is this product something I would have otherwise purchased?

As I'm not making money from it and they are not being deprived revenue as I would not have bought it anyway, my actions are therefore ethical.

Despite the obvious red flags here, I would just like to point out that this person is asking a pirate group where to buy something.