Okay, but that would have made a shitty joke wouldn’t it?
Hmm… I don’t know maybe it’s fine as a joke.
Okay, but that would have made a shitty joke wouldn’t it?
Hmm… I don’t know maybe it’s fine as a joke.
Fontunately it’s just DNS.
Loop up the domains at one of: ns1.cloudns.net ns2.cloudns.net ns3.cloudns.net ns4.cloudns.net
Aliasing and forwarding is not a good solution if you are concerned about law enforcement, because your personal e-mail is still linked with the tracker, just behind an extra hop and in addition you allow someone in between to read your e-mails. You had the answer yourself. Create a completely fresh free e-mail account somewhere, using as minimum a private tab to prevent tracking data to link anything to the account… and if you can get a free e-mail account with IMAP/POP access so that you can use it in an e-mail client to leak less data, do that.
I build a lot of tools like that and the first thing I do is to go to the developer tool in my browser and observe the network traffic. When you find the resource you’re after you scroll back and see what requests resulted in that URL. Going from those requests you figure out in the original static HTML document and resource, which parameters are used for the construction of the URL, that might require reversing some javascript, but that’s rare. After that you’ll have a pretty good idea how you obtain the video resource from the original URL. Beware of cookie set by the requests, they might be needed to access the next requests. For building my tools I use Perl or sometimes just Bash or a GreaseMonkey userscript to fetch and parse the urls and construct the desired output.
From reading the docs I get the impression that the client is discovering torrents from the DHT, and that’s also the data you can search from other clients. That means it wouldn’t be revealing anything about which torrents you’ve downloaded or are sharing.
Why would you run linux.exe from Linux?
My guess is that it’s an instance of some federated platform talking to lemmy, which has once been used to serve malware by one of its users. AFAIK lemmy only fetch avatars directly from instances, but it’s a privacy nightmare which, admittedly easy to say for one who doesn’t pay for storage space, should be mitigated with a caching mediaproxy.
Oh no you wouldn’t…
In the context of the modern web, I take that as a badge of honor. I’ve build pages using flexbox/grid and I’ve done so only for the sake of responsive layout, because of the way that tables can’t degrade to a bunch of boxes, but a bunch of boxes can by styled to look like a table. It is a convoluted way of doing table layout instead of just using a table.
What do you mean? I still write my sites in HTML 4.1 and frameset works fine in all the browsers I’ve tried. HTML 4.1 is still a standard, I can only recommend more people use it. HTML5 isn’t really a standard… it’s a “living document”… pff.
``
You’re allowed to <center>
things and use `` without shame… or if you really do prefer it, you can still wrap that relative positioned <div>
with auto margins in an absolute positioned parent <div>
or whatever CSS bullshit makes stuff centered nowadays.
One thing I always though was very backwards in CSS is the paradigme to make <div>
into tables instead of the other way. Tables are an easy and simple way to layout things and if it could degrade into divs you’d have your responsive design making many related CSS standards unnecessary.</div></div></div><table></table></center>
What is the reason everyone is using cdm extracted from an android device, when a webbrowser also has a cdm?
The Expert: 7 Red Lines