A Reddit Refugee. Zero ragrets.
Engineer, permanent pirate, lover of all things mechanical and on wheels
moved here from lemmy.one because there are no active admins on that instance.
3 sticky notes telling me to “go get that incremental backup working”,
2 separate external hard drives,
1 month out of date
VLC includes all codecs it needs internally to play DVD’s. If VLC is not playing DVD’s, there’s something else wrong with your system.
You might also try MPV player.
I’m currently half way thru building a ZFS array using (5) 8tb Ironwolf Pro drives. I’m modelling and 3d printing a custom drive cage with brackets to hold them all inside the shitty Dell tower case I have dedicated to it. Hoping I can get it done sometime Sunday, I’m on V2 of the drive cage print and it takes like 8 hours to do lol.
“No. Also while we’re at it we’re going to ban divorce lol”
If the tracker(s) defined in the mag link are still active and have the torrent metadata, then yes a magnet link should also work fine; you just have to add the magnet link, wait for the torrent to update with the torre t name/size in your client before pausing, then do the folder redirect.
Deluge is always my goto.
If it is new malware, scanners wouldnt pick up on it.
Actually they do often pick up on it, unless it is a very novel attack vector (and probably not something you’d find on a pirate site). Malware often follows very predictable code execution patterns of communicating with outside IP’S and modifying other executables, and these are things that can be detected by most AV.
On behavior tab there is tons of stuff. Shouldnt there be none?
There will never be none. it’s all listed as low or no risk/informational only anyway, which goes back to the pattern recognition thing.
VT is listing things that the file has done during viewing. ALL things. This stuff might or might not be a concern, whether or not it’s a known attack or pattern of malicious behavior. If you are a legit security analyst you can use the behavior data to see what files its touching and stuff and understand good and bad security design. Like, the only actual yellow warning is… it apparently looked at Google dns. Which is something any browser pdf viewer will do.
Oh. The other thing I forgot to mention, is every submission to Z-Lib goes through an approval process where a certain number of community contributors have to review the document and make sure it’s legible, safe, and valid. I know, because I’ve submitted stuff before, it takes quite a few days to go live. It’s not just random bad actors shotgunning stuff onto the site.
I have downloaded hundreds of documents from Z-library and LibraryGenesis and never had an issue with a single one of them.
That virus total scan shows free and clear, it has some warnings about there being external links inside the doc afaik (VT very broken on mobile so i can’t understand the report well), but that’s really fringe edge stuff to actually be “dangerous”. You’re over-awfulizing the danger.
Ensuring everyone runs Windows maintains their monopoly and also keeps the user data siphon net as wide as possible. They don’t give a shit as long as you are feeding them personal data and are using Windows.
I’ve always just used the KMS activation method from ms guides dot com. Avoids running anything local (that’s not already baked into Windows). I haven’t had to use it for a year or so but my machines are still working so I am pretty sure it is still current.
The KMS method can be batch scripted too so it’s a single run for your family member.
Pretty much every cracking tool or cracked EXE will trip anti-virus packages because they will either A. Has code to overwrite another program’s bytes, which is a typical Trojan, or B. A known common program exe doesn’t match the saved hash that the AV has stored for it, since a cracker has modified it.
I’ll typically scan my games and tell it to ignore any EXE or single dll it registers as “bad” after doing a quick research on how the crack works. If other files begin showing up bad I might question it. But otherwise you’re largely left trusting the cracker, so be very particular about where you download cracks from.
WARNING: FROG ON ROAD
your hardware ain’t shit until it’s a first gen core2duo in a random Dell office PC and 2gb of memory that you specifically only use just because it’s a cheaper way to get x86 when you can’t use your raspberry pi.
Also they lie most of the time and it may technically run fine on more memory, especially if it’s older when dimm capacities were a lot lower than they can be now. It just won’t be “supported”.
Piracy was likely the only way myself and a large number of my friends graduated college, so yeah.
Don’t feed the 16 minute old troll account.
dont worry bud you’ll get that 50k tip bounty any day now.
Yep. Aaaaaaanyday now. You’ll get it.
I mean I was thinking like when you’re flying on a plane and you get to your destination after 5 hours. You probably go use the bathroom in the airport almost the first thing. I guess lemmy can’t think that far ahead though