andrew

joined 1 year ago
[–] [email protected] 6 points 4 months ago (2 children)

But, eventually exploitable is still a pretty major concern for anybody who has systems running longer than a few days at a time.

[–] [email protected] 23 points 6 months ago (5 children)

Massgrave is a tool that can create legit (oem) keys for windows and office out of thin air*

  • it’s not literally creating them from nothing, it’s using a system Ms themselves run to get working keys. Evidently they don’t have a huge problem with it.
[–] [email protected] 1 points 6 months ago (1 children)

Umami has been pretty good to me. Plausible was a close choice but I ran into technical difficulties getting it going.

I didn’t get around to trying it, but goatcounter looked promising as well.

[–] [email protected] 5 points 7 months ago (1 children)

It was more common for commercial discs and some consumer discs to have the data layer sandwiched between the bottom surface and label layer, especially later in cd/dvd’s heyday, to prevent tiny scratches on the label or sharpie marks from destroying bits in the data layer.

[–] [email protected] 3 points 7 months ago

Cinavia! Allegedly it’s still around and mandated in all consumer Blu-ray players.

[–] [email protected] 1 points 7 months ago

Plex has been good to me but I grow ever more concerned that they will drop lifetime Plex pass features as they become more focused on being a provider of media and not just a streaming middleman.

[–] [email protected] 7 points 9 months ago

My gut feeling is that that is apples entire game plan with the Vision Pro- seed an expensive version of the tech, then refine it with what they learned into something leaner and significantly cheaper.

I could be wrong, but given the current price point that’s my guess.

[–] [email protected] 2 points 10 months ago

A flatpak of the snap, running in a docker container inside a vm for maximum security.

[–] [email protected] 1 points 10 months ago

Checking ip ownership is a moving target more likely to result in outcomes these sites don’t want (accidentally blocking google bots and preventing results from appearing on google).

Checking useragent is cheap, easier, unlikely to break (for this purpose, anyway) and the percentage of folks who know how to bypass this check is relatively slim, with a pretty small financial impact.

[–] [email protected] 1 points 11 months ago

Looks like beeper got their stuff working again.

Can’t imagine this working out very well long term though

[–] [email protected] 1 points 11 months ago

It’s feasible and has been used in various 0day exploits in the last few years. It’s getting significantly rarer nowadays but media player exploits leading to RCE has been a staple of malware distribution for a long while.

It’s just much easier to make a malicious word macro and hope the user isn’t careful than to research/identify an exploitable bug in a media player.

[–] [email protected] 6 points 11 months ago

Generally you can’t reverse it into exactly what was written, but most of the time you can disassemble or decompile just about any program as long as the binary format is known. The legibility of the resulting unraveling may vary depending on language and any methods used to obfuscate the end binary.

 
 
 
 
 
 
 
1
society (radiation.party)
 
 
 
view more: next ›