Yakov

89 posts

Yakov

Yakov

@Yakov5776

discord: yakov

Cannot dispose 'Location()' Katılım Mart 2018
59 Takip Edilen48 Takipçiler
Yakov
Yakov@Yakov5776·
@sbxpra @VicVijayakumar Um no, the user shouldn't have to be up to date with the news to know when to migrate regions, it's Amazons liability.
English
0
0
0
102
SP
SP@sbxpra·
@VicVijayakumar OP should have migrated when bombing started happening
English
2
0
96
30.5K
Vic 🌮
Vic 🌮@VicVijayakumar·
😬
Vic 🌮 tweet media
QME
47
95
3.3K
454K
Yakov
Yakov@Yakov5776·
@ThatProgrammer @thiojoe Sorry but if there are hash checks then why do you have a fair of infected updates? this is not the first time I've heard people say this and it just sounds like fear mongering.
English
1
0
19
455
Brad
Brad@ThatProgrammer·
@thiojoe I know hash checks are likely in place but the idea that a infected update could be downloaded from other devices on the internet makes me fearful of using it.
English
3
0
12
3.2K
ThioJoe
ThioJoe@thiojoe·
Ok I slept on this Windows Update feature. I never enabled the "download from other devices on the internet" because of it using upload bandwidth. But I just had an update in a VM slowly trickling to 6% over minutes. Then when I turned it on, it blasted up to 100% in seconds. So if you're trying to install a specific update faster, at least enable it temporarily.
ThioJoe tweet media
English
12
5
261
28.3K
Phil 🇨🇦
Phil 🇨🇦@philviral·
@vxunderground What software are you using in image one to view the assembly code? Am I correct in assuming that's assembly code? I'm a newb wrt to disassembling binaries but it's something I've always been interested in learning
English
1
0
0
570
vx-underground
vx-underground@vxunderground·
MalwareBytes has an local database on the machine. It is a SQLite database. It contains settings for various properties such as licensing, malware identified, and known-good and known-bad lists. This is standard anti-malware stuff. The database with "ThankYouForChoosingMalwarebytes" is the less interesting database, as it mostly contains settings (this can still be abused though). Regardless, MalwareBytes does a couple of things with this SQLite stuff MalwareBytes establishes a kernel-mode minifilter (mbam.sys). They setup minifilter callback routines to handle events on the system for process creation, process loading, and registry modification (Image 1) In other words, MalwareBytes is notified immediately when a process is created or an executable image is loaded. When a process is created or an executable image is loaded, MalwareBytes has special functionality to temporarily "pause" execution so it can review it. However, this "pause" happens faster than you or I can blink. Computers are fast. The mbam.sys creates an internal record of all processes running. When a new process is loaded it is added to this internal record. When a program is closed, it is removed from the record. It does this so it doesn't accidentally review or "pause" the same process twice. When a program is added to this list, the kernel-mode component communicates with the user-mode component that then signals and connects to a local SQLite database. The SQLite database then does a lookup to determine if the process "paused" is known or unknown (Image 2) However, it should be noted, Image 2 is not the important SQLite instance I am looking for. This is something else MalwareBytes uses (and communicates to with kernel-mode components). The point still stands. If it is known, it communicates back to the kernel-mode component that is it known. If it known, and known to be malicious, MalwareBytes takes action on the program attempting to run and immediately stops execution. If it is known to be good, MalwareBytes marks it internally as "seen" and keeps it in it's internal record. Image 3 is from the internal database they use. It's fairly large and is mostly settings. I still haven't find where the really nice, big, and important dataset they use is. It requires more poking and more sticks.
vx-underground tweet mediavx-underground tweet mediavx-underground tweet media
Dead Exit@_deadexit

@vxunderground Explain this to me because I’m stupid

English
36
177
3K
382.3K
Yakov
Yakov@Yakov5776·
@Little_34306 Send me the GitHub when you open source it, thanks!
English
0
0
0
706
Huy Nguyen
Huy Nguyen@Little_34306·
I'll open source a bot that can decrypt app on iOS 18-26. It supports app > 2GB (by userbot) and only support Vietnam Appstore atm Require 1 device on iOS 14 with trolldecryptjb cli (included later) Tele API for upload is limited so it's a lil bit slow t.me/DecryptAppForM…
Huy Nguyen tweet media
English
7
24
179
21.5K
Yakov
Yakov@Yakov5776·
@SpinkaMilan @0gtweet No in this case of Samsung magician installer, which is what he's using, is an installer which unpacks itself which means that the unpacked binary which would use the imports aren't called yet because the parent process was doing the check (and it doesn't rely on those DLLs)
English
0
0
2
222
Milan Špinka
Milan Špinka@SpinkaMilan·
@0gtweet I would say that if you see this message box, it's already too late to check for DLL hijacking, which happens at load time... or am I missing something? Or does it check pre-elevation to avoid privileged DLL hijacking?
English
4
0
51
5.8K
robertus
robertus@rtheoryxyz·
@abhitwt the nvidia founder/ceo into dishwasher/busboy pipeline is maybe the most real credential flex on the entire platform. this is what "started from the bottom" actually looks like
English
2
0
2
463
Abhishek B R
Abhishek B R@abhitwt·
one if the most goated profile ever
Abhishek B R tweet media
English
25
16
196
24.9K
Xeno
Xeno@XenoPanther·
I wish Windows told me which service was using my microphone
Xeno tweet media
English
27
62
3.3K
54.7K
Yakov
Yakov@Yakov5776·
@kaustubhowmick @rayman_1337 @ayysoni Modifications to any app would render it with an invalidate certificate. Mentioning they he might have taken some FOSS software may be true but is irrelevant to that post.
English
0
0
1
288
I
I@kaustubhowmick·
@rayman_1337 @ayysoni I doubt he made this app, probably took some FOSS software and bundled his logo and UI, and put a price tag
English
2
0
11
1.5K
Ayush Soni
Ayush Soni@ayysoni·
The internet trained us to think "just upload & convert" is normal. Marksheets. IDs. Salary slips. All going to some server we’ll never see. I still love ilovepdf for what it did. But I’d rather keep sensitive docs on my own machine. So I built filestudio.app last month - 100% offline - PDF + file tools - no accounts, no uploads, no tracking Same workflow. Completely different trust model.
Ayushi☄️@iyoushetwt

Whoever created ilovepdf, you're the real hero.

English
123
446
5.3K
1.2M
Yakov
Yakov@Yakov5776·
@davepl1968 This isn't Windows. This is your NAS's SMB implementation :)
English
0
0
0
47
Dave W Plummer
Dave W Plummer@davepl1968·
Score one for Windows today! If you have a ZFS pool that is set up for automatic snapshots, you can go to a file's properties and see the prior versions, restore them and so on, all from your desktop. I can't find a way to surface that feature on a Mac, so I'm guessing it's not possible?
Dave W Plummer tweet media
English
57
9
237
34.1K
Yakov
Yakov@Yakov5776·
@jerkeyray Without saving, it's :q! (not :q)
English
0
0
0
60
adi
adi@jerkeyray·
obsidian literally asks you if you know how to exit vim before letting you enable vim mode 😭😭
adi tweet media
English
240
666
20.8K
599.5K
EvilFuGuru/ジョン
EvilFuGuru/ジョン@EvilFuGuru·
When I got my Xbox One on launch day (Amazon delivery), it had this disk inside of it. I never figured out what it was, but I’m 99.9% sure it wasn’t supposed to be in there🤔
EvilFuGuru/ジョン tweet mediaEvilFuGuru/ジョン tweet media
English
169
633
31.6K
2.1M
Yarden Shafir
Yarden Shafir@yarden_shafir·
Hours of complex research in the last few days ended up with like… 3 new lines of code. These 3 lines make a big difference. They do something really cool. But this still feels very underwhelming for how cool this research was.
English
5
1
52
4K
NZ ☄️
NZ ☄️@CodeByNZ·
Mention a better alternative to this I’ll wait.
NZ ☄️ tweet media
English
170
8
304
20K
Yakov
Yakov@Yakov5776·
@WhoisPandey @WindowsLatest You can't because as soon as they discontinue an older version, it subsequently gets discontinued on the server-side as well. (specifically by turning off support for their older networking protocol version)
English
1
0
10
147
•
@WhoisPandey·
@WindowsLatest I hope someone reverse engineers and disables the update feature so that we can continue using the last version of WhatsApp indefinitely.
English
3
0
143
7.2K
Windows Latest
Windows Latest@WindowsLatest·
Meta has just replaced WhatsApp for Windows 11 with a web wrapper that consumes up to 2GB of RAM (or up to 1 GB when idle). New WhatsApp for Windows 11 is based on WebView2. WhatsApp has been testing its new web-based app for Windows 11 for some time now, and it's rolling out today. WebView2 is based on Chromium, using the same Microsoft Edge (Chromium-based) rendering engine. Do not update WhatsApp in the Microsoft Store.
Windows Latest tweet media
English
202
256
3.2K
875.2K
Yakov
Yakov@Yakov5776·
@WindowsLatest Even if you don't update eventually the version will expire (and it won't take that long) and you won't be able to use it anymore.
English
0
0
39
4.4K
Lain on the Blockchain
Lain on the Blockchain@CryptoCyberia·
FBI has subpoenaed the domain registrar of archive.is The won't say what crime is being investigated. Sad :(
Lain on the Blockchain tweet media
English
36
94
830
54.5K
Yakov
Yakov@Yakov5776·
@hackerfantastic That's actually pretty funny because I actually have a Chinese VM with all these programs installed on the desktop
English
0
0
7
341
hacker.house
hacker.house@hackerfantastic·
Chinese hacker checks if the computer is a real computer not a sandbox by looking for common installed Desktop shortcuts like WeChat and QQ. Neat trick for Chinese specific desktop compromise ;)
hacker.house tweet media
English
25
148
2.6K
115.8K