Jump to content


  • Content Count

  • Joined

  • Last visited


About Amaroq_Starwind

  • Rank
    Elite Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I recently learned about the existence of Named Pipes in Windows, and now I'd like to find some software that lets me do stuff involving them. https://en.wikipedia.org/wiki/Named_pipe Does anybody on this forum have recommendations for such software? I'm also wondering if the MalwareBytes ever does anything involving Named Pipes. Also... Apparently Windows and OS/2 handle Named Pipes differently from UNIX/Linux; on UNIX, Named Pipes are more or less persistent (at least for the duration of system uptime), but on Windows and OS/2, Named Pipes are deleted the moment that they are no longer referenced. Not sure what the benefits and drawbacks of each approach are.
  2. Well, VR Headsets could hypothetically be used to simulate various visual impairments... Personally though, I have the opposite problem: I really dislike when developers keep increasing the font size in a program that I use regularly without giving me any option to change it back. Since I frequently need to multi-task while still maintaining my privacy in a busy household, I usually have very limited screen real estate. It's even worse on mobile devices.
  3. You could have just turned that feature off, or added an exclusion.
  4. I will let the video speak for itself. It was actually just uploaded by JayzTwoCents not long ago.
  5. This has been requested quite a few times, but it would take significant time and resources to develop due to how different Windows and Linux are on a fundamental level, not only in how they work but also in what kind of threats to look out for. They know that people want it, and they know that it's actually needed due to the continually changing infosec landscape, but they make it a policy to not talk about anything they are working on until it's nearly ready for deployment. In short... If they are working on Malwarebytes for Linux, they won't tell us until they're almost done. They don't want to get people's hopes up in case something doesn't pan out.
  6. Turns out computers really are better at finding Waldo than humans are. https://blog.clarifai.com/wheres-waldo-using-machine-learning-to-find-all-the-waldos http://www.randalolson.com/2015/02/03/heres-waldo-computing-the-optimal-search-strategy-for-finding-waldo/
  7. This is a recent video that I came across and I think would be really interesting for fellow community members. It explains how mutation XSS works, and how Client-side Sanitation can be implemented.
  8. Some exploits were "recently discovered" in the ZIP file specification called Zip Slip and ZipperDown. However, these exploits aren't actually that new. I feel like it is still worth sharing this video to explain the dangers of relative paths in ZIP files, as well as the dangers of miscommunication for the sake of advertising. Safe coding, everyone!
  9. Oh hey, somebody else who watches Ross Scott. I'm also surprised that Ross Scott reads the LinusTechTips forums.
  10. I think it's fixed. Sort of. I had to put it onto a flash drive and compress it on another computer, but 7-Zip apparently forgot to put a password the file this time. Hard_Configurator.7z
  11. The password will be in a private message. I tried zipping up the entire directory so it would be easier to analyaze, but 7-Zip gave me an out-of-memory error >.< As soon as I can figure out what's causing the issue, I'll attach the whole directory. HARDCONF.7z
  12. Sure thing! I'm not at my computer at the moment, but I'll upload the file as soon as possible.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.