b1ab

joined 1 year ago
[–] b1ab@lem.monster 2 points 1 year ago

This is one of the single most important pieces of advice. Unless you have access to topsites, then this is about as close to the source as you are going to get, except for FitGirl repacks that can be DDLd from her site.

[–] b1ab@lem.monster 1 points 1 year ago

Yep. The approach that Denuvo utilizes has been discussed forever, but games didn't really have the extra CPU cycles to run around and validate the integrity of each and every function. Most games are balls to the wall and using every CPU cycle it can. Point is, games that require heavy performance suffer under Denuvo unless your system is bleeding edge. This means the vast majority of their customer base suffer. There are all sorts of ways to prevent piracy for games.. but most companies can't utilize these approaches due to the very nature of disorganized game development.

[–] b1ab@lem.monster 4 points 1 year ago (4 children)

I don't really use Windows except for playing games, so someone else may have a better answer.

For me, I want 3 types of protection, priority order.

  1. Rootkit and ransomware protection. Lock down and protect system files.

  2. Firewall. Stop software from calling home (and possibly invalidating my forged license) and to stop malware from reaching out to command and control systems.

  3. Malware scanning and suspect execution detection. Most antivirus software detections will be in only one of a couple categories: keygen, generic trojan, or obfuscated executable. If I encounter this, I go to VirusTotal.com and drop the offending file(s) for it to scan. If I'm still concerned I will use an online sandbox execution recorder that tells you what the exe does such as outbound comms, file modifications, registry read/writes, etc.

Windows Defender accomplishes these requirements. Although it is a bit clunky and other mainstream antivirus (paid or free) accomplish the same in a much cleaner interface.

I cannot stress enough the importance of downloading pirated software from a trusted source.

[–] b1ab@lem.monster 1 points 1 year ago

Many do provide some form of checksum.

[–] b1ab@lem.monster 3 points 1 year ago

Ohhh. My day is done. GitHub’s list of Awesome. So much great stuff. Thanks for the topic and sharing.

[–] b1ab@lem.monster 0 points 1 year ago

It does have a needless booby shot.

[–] b1ab@lem.monster 0 points 1 year ago (1 children)

Please define fascism.

[–] b1ab@lem.monster 16 points 1 year ago (5 children)

I don’t.

But I take many precautions.

I’ve been pirating software since the C64. About 40 years. Never stopped. Never will.

I buy the good software I encounter. As a developer, i know it’s important to keep funding further development. Unfortunately most is overpriced garbage.

[–] b1ab@lem.monster 80 points 1 year ago* (last edited 1 year ago) (13 children)

Long story short.

  1. Be prepared for disaster.
  2. Scan it. Sandbox it if concerned.
  3. Firewall inspect/block/allow every outbound comm.
  4. Get it from a trusted source.

Basically the same stuff you should be doing with all software.

Edit for firewall clarification.

[–] b1ab@lem.monster 4 points 1 year ago

And there needs to be a WFH policy that states reasonable responsiveness. If on a break, set you chat status as such.

Of course there are workarounds, like just carrying you phone with chat app.

Then it really does boil down to people management.

[–] b1ab@lem.monster 0 points 1 year ago (4 children)

Your definitions, not mine.

Extremes are untenable. There has to be a compromise at some point.

I think your leftist definition is more moderate than mine.

I think many moderates agree on the general premise of what you want, but how to get there will take more work.

I’m far from enlightened, and I’m clearly ignorant for pissing up hill with a reactionary such as yourself.

Good luck. Enjoy your life of suffering and toil.

[–] b1ab@lem.monster 1 points 1 year ago

Great response, thank you.

When you are making fun of the “other side”, whether left or right, it won’t open their eyes and ears to a counterpoint. It gets instantly dismissed. It’s wasted effort IMHO. I want people to listen to all this research and insight.

That’s the crux of my issue with this approach.

view more: ‹ prev next ›