• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: December 28th, 2023

help-circle
  • EU is making a new law which makes your IP the same as (something similar to) your social security number.

    If that’s true, then even VPNs won’t help. Not sure how they will implement such a thing, but it’s obviously to protect the children !

    There’s also the I2P network, which is similar to TOR but with torrenting in mind and other nice tools and utilities ! However, it’s slower, has less traffic/seeder and don’t even bother to try and find some older movies/music or hidden gems.

    It’s getting better and some applications, like qbittorrent, are adding the i2p network. In the near future, when they have protected the children, I2P will be the place to be for a free and open Internet. However, you will probably be tagged as criminal…






  • Yeah Lemmy is very Linux oriented :). Though I do agree Linux is harder to get into but that’s not because GNU/Linux is difficult, it’s because we were so much accustomed to how Windows work !

    I don’t really remember because it has been ages, but I’m sure my first steps with Windows 98 where awful and not easy and intuitive at all !

    Linux has a lot of issues so does Windows (and MacOS) and learning a whole new paradigm of a working system takes time and some investement, but after you get the basic gists, Linux gives you total control of everything ! (Like to see hidden directories is like Windows, just a check box to show hidden files :) don’t need a CLI for that)

    You rarely need the use of the Terminal when on easier distributions like PopOS or Ubuntu (while I wouldn’t suggest the later), However if you tried more difficult distribution first (like arch and derivatives), CLI is mandatory !

    Not saying YOU should switch, do whatever makes you happy, more productive and vibes with your current needs/feeling…

    However, If you feel the need to switch the Linux community will always welcome you :) Keep in mind, there are good people and a**holes everywhere !

    Glad you solved your issue with massgrave, which is a great tool :) ! Have fun with your system !

    Edit: Sorry for the off topic XD discussion got a bit heated up haha ! I’m kinda surprised it didn’t got deleted !




  • Docker is really cool tech, but not that easy to get it right the first time you run into it. The easy suggestion would probably be some YouTube videos? But the best would be to find your way on the web and follow some written tutorials that gives more details.

    Depending on how far and deep you want to go with docker it can range from a simple command you copy/past to more advanced stuff where you add new tools into the image.

    My first contact with docker was through Network Chuck’s video, while it gives you a first feeling on what it does and how it work at the basic level, it won’t give you the keys to host qbitorrent behind gluetun on a raspberry pie, let alone on how to properly configure and protect it.



  • A few years back there was some kind of url trick where you could directly download every file with some string manipulation… But that doesn’t work anymore and there isn’t any new hack/workaround to bypass paywalled files.

    My guess would be that there isn’t any kind of “hack” floating arround anymore, cause it involves the site’s security measure and would leave a very bad image of DeviantArt if the creators only way to market their art has some loophole to get freestuff.

    Your best chance is either someone who paid/share the stuff you’re a looking for or someone who has the technical skills to do what you’re looking for without leaving a trace.


  • Mostly phishing or link redirects. But the PDF in itself is harmless. Or Am I wrong here? Is it possible to install malware just by opening a PDF file?

    My guess would be no… Because there isn’t any execution file to install sketchy binaries. This is very different from cracked games in the sense that getting malware from a PDF is more like a user mistake while a crack… You already know you are doing something sketchy and have no idea what it does in the background.

    If someone has more details on how PDF can be exploited, except for the classical phishing attack (social engineering) I’m open to learn something new !