alexg_k

@alexg_k@discuss.tchncs.de
2 Post – 12 Comments
Joined 1 years ago

Good and valid point. I use opensource software wherever I can.

Though paid software is not going to encrypt your data for ransom or use a keylogger to steal bitcoin (yet).

2 more...

I think it is very rare to find or even craft a video file that is able to allow for arbitrary code execution on an updated video player software like VLC. The same is true for photos or documents with the exception of office documents using macros.

2 more...

Maybe it is too obvious, I am not sure: You all know that his name originates from the German expression "fetter Mann", which translates to "fat man"? I can vividly imagine his ancestors arriving at Ellis island and getting their new surname. :D

If you notice the malware..

7 more...

Interesting. If there are reputable packers / crackers, why do they not uses GPG to sign the software? That way, no one can manipulate and reupload the software.

Ivpn stopped as well. Let's hope this is not a trend..

3 more...

Well, I prefer to go the hospital with licensed personnel and not to ask some guy on the internet to perform surgery..

I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder...

2 more...

Agreed. I think the only VPN providers that are able to keep offering port forwarding are those that log data and hand it to the authorities.

Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?

That's smart, but requires extra work and hardware.

Cool!