Aside from reverse image search Yandex is wonderful for obscure things like software reverse engineering.
Aside from reverse image search Yandex is wonderful for obscure things like software reverse engineering.
My bet is that there will be a point where only russian cars (looking at UAZ) and cars made for busieness (delivery VANs and buses) would be only ones left.
If you aren’t strictly concerned with having it losless you can check out yt-dlp and download straight from youtube.
yep! I’ve found out browsing hacking/spamming site and i’ve found something too good to be true, it downloaded archive nested inside other archive and in it was silngle .lnk file leading to “the resource”. Peeking inside i’ve found powershell executing base64 (or base32?) encoded script (it’s got commandline option for that. if you want to ask wtf ask microsoft, and tell me), it dl’d some exe from some site and ran it, site was down alredy.
Mastodon i guess.
Just putting all your stuff in one big .7z so you can unpack it to directiry scan them all w/ AV.
http://phrack.org/issues/71/6.html#article here’s the original paper for the intrested.
He didn’t, malware guys use UPX and it’s true that antiviruses scream bloody murder when they see it. It’s also true you can’t see what’s inside unless you have special tools to do so. UPX also has one huge downside, it’s its RAM usage, due to it’s inner workings it’s unable to use optimisations that normal binaries can like page sharing.
Tech? I would really love to join reverse engineering community or two.
They will not because it wouldn’t be profitable to them.
If you log in w/ tor to account you’ve logged it w/o it you deanonymise yourself and it makes no sense.
Tidal and tidal-dl. You can ask me for stuff.
Grab my hunting knife. Hide it under coat. Call my dogs. Go meet that thing. Knife has to be hidden in case it turns out peaceful like i am. (peaceful is not harmless)
I’ve found a old CD and put it up on Internet Archive, it’s a place for old stuff to go.
Tried and can confirm almost every webpage even static ones which could be simple as rock needs truckload of bloat js code to be loaded from ext servers.
To add to Possibly Linux’s precise and correct answer: Those leaks are made by hackers taking over organisation’s servers and publishing what they found, noone can control it not even orgs in question.
If it’s not a 3rd world country ofc.
Sounds reasonable, but they won’t be able to take it out, they would only be able to not send new movies there.
Friends in other comments suggested that the file is 100-300gb size, it’s quite a lot of RAM if you asked me, but not much for a harddrive. If i were to design this machnie would store the movie heavily encrypted on a harddisk and store keys in RAM. Sb ealier mentioned you need special keys from special compamy to decrypt it so it would be doubly encrypted, one key stored in RAM and another inputed by technican. Ofc if i were to design this i would try to make it piratable by introducing some “accidential” vuln.
There’s monocles chat on fdroid, honestly, it’s avesome.