The ones that get caught anyways
The ones that get caught anyways
Damn, this bot is actually helpful for once.
Ikr, like I don’t need a full feature full stack framework… I just want my tech demo to not look like it was made in the 80s without spending hours. (I’m mostly a backend dev)
Valorant kernel level driver managed to fuck up my whole system every few updates though. It’s managed to freeze my whole pc 2 times, cause a BSoD 3 times… And that’s only talking about last week.
Almost as if running unstable software designed to be intrusive to other programs on a kernel level was not a great idea. But hey less cheaters right??? Oh wait no, turns out it still doesn’t stop cheaters.
Writing kernels for parallel execution with OPENCL gives me flashbacks every time I remember them
Damn… That is good…
I guess we now have to learn all the different markers for AI generated music too (like hands and background continuity for image generation)
There are so many ways to encode information into an image without changing its look that I doubt you’ll find most of them by “changing levels”
But then those images could contain the very fingerprints he’s trying to avoid
Skalak sounds like someone got tired of solving the eternity II puzzle.
Yeah ofc, if you already have a valid key doing everything you need you ofc have no need of it. If you would like BitLocker and remote desktop protocol (build in) like I do, you need a “pro” license.
Stealing from a big company like microsoft is still ethically justified imo.
For anyone wondering how one would go about upgrading your home install to pro, there’s MAS. It’s a simple script that will activate the windows version of your choosing, it can activate msoffice too.
Possible, but nobody is wasting such a good exploit on average consumer PC’s.
I’d like to do the same, but atm I use nginx to serve all the web interfaces… And keycloak support is either a plus subscription feature or made to work with hacky Lua scripts.
So for now it’s security through obscurity, I got a wildcard cert and the pages are accessed based on subdomain. So afaik nobody has a clue unless they start iterating common subdomain names. (At some point™️ I’m adding proper auth though)