alexg_k

joined 1 year ago
[–] alexg_k@discuss.tchncs.de 3 points 1 year ago (2 children)

Source for this claim?

[–] alexg_k@discuss.tchncs.de 5 points 1 year ago

Maybe it is too obvious, I am not sure: You all know that his name originates from the German expression "fetter Mann", which translates to "fat man"? I can vividly imagine his ancestors arriving at Ellis island and getting their new surname. :D

[–] alexg_k@discuss.tchncs.de 2 points 1 year ago (1 children)

Agreed. I think the only VPN providers that are able to keep offering port forwarding are those that log data and hand it to the authorities.

[–] alexg_k@discuss.tchncs.de 1 points 1 year ago

That's smart, but requires extra work and hardware.

[–] alexg_k@discuss.tchncs.de 1 points 1 year ago

Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?

[–] alexg_k@discuss.tchncs.de 3 points 1 year ago (3 children)

I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder...

[–] alexg_k@discuss.tchncs.de 4 points 1 year ago (4 children)

Ivpn stopped as well. Let's hope this is not a trend..

[–] alexg_k@discuss.tchncs.de 4 points 1 year ago (1 children)

Interesting. If there are reputable packers / crackers, why do they not uses GPG to sign the software? That way, no one can manipulate and reupload the software.

[–] alexg_k@discuss.tchncs.de 4 points 1 year ago (1 children)

Well, I prefer to go the hospital with licensed personnel and not to ask some guy on the internet to perform surgery..

[–] alexg_k@discuss.tchncs.de 5 points 1 year ago (8 children)

If you notice the malware..

[–] alexg_k@discuss.tchncs.de 12 points 1 year ago (3 children)

I think it is very rare to find or even craft a video file that is able to allow for arbitrary code execution on an updated video player software like VLC. The same is true for photos or documents with the exception of office documents using macros.

 

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

 

Using public trackers it is extremely hard to find specific content with German audio.

How do I find access to these private trackers?

  • Borgzelle
  • Coastal-Crew
  • The-Crazy-Ones
  • Dark-Shadow
  • The Falling Angels
  • Fantastic Heaven
  • House of Devil
  • Immortuos
  • MaDs Revolution
  • MNV
  • The-New-Fun
  • The New Retro
  • The Shinning
  • Speedmaster HD
  • SpeedTorrent Reloaded
  • Spirit of Revolution
  • Torrent-Explosiv
  • Torrent Sector Crew
  • TorrentSyndikat
  • World-of-Tomorrow

I have a 24/7 server running and seed generously. Any tips on how to join the community are appreciated.

view more: next ›