

Does anyone know of any place to keep up with what people are doing with the XP leak? I vaguely remember some 4chan threads where people worked to get it compiling properly, and I think someone ported USB 3.0 support, but I lost track after that.


Does anyone know of any place to keep up with what people are doing with the XP leak? I vaguely remember some 4chan threads where people worked to get it compiling properly, and I think someone ported USB 3.0 support, but I lost track after that.


OT: Anybody up for making convincing fake book cover/jacket art for “Don’t Build the Torment Nexus”?
It just occured to me that having that as a fake book that’s actually just a container for shit would make for a great addition to my desk at work, and I’m not finding any suitable pre-existing fake covers myself, surprisingly.


Y Combinator CEO is launching a “dark money group” (not super familiar with the term, I guess they mean political lobbying group) becuase completely fucking over the entire tech startup space through VC shenanigans and manipulation of tech sphere opinions through controlled social media with HackerNews wasn’t enough.
Lemmy thread that made me aware: https://lemmus.org/post/20140570
Actual article: https://missionlocal.org/2026/02/sf-garry-tan-california-politics-garrys-list/


Decade and a half ago I torrented all the time and didn’t get caught until I stupidly downloaded something from the top 100 torrents on pirate bay.
Not sure how safe torrents are now.
Never have had any issues with direct downloads and streaming. Just use your head, adblock, and virus scan your downloads (knowing that keygens or cracked exes may show as viruses).
For safest option and free: Use an up to date web browser with a good adblocker (ublock origin is the current best), stick to direct downloads using a download manager to manage the 12+ parts, and virus scan everything that you download. Download from trusted sites from the megathread. Direct download is generally safe, unless you live in one of the few countries cracking down on fitgirl repacks specifically. Then that site is off limits for you.
You can use torrents without a VPN, it’s just not safe. You could be caught and the penalty will vary based off of what you’re downloading, where you live, and who you use for an ISP.


More than 15 years ago I ended up with one of those in a C++ program.
I’m sure the real ssue was somewhere else in the code, but if I removed one specific comment (or maybe it was a print to console, it was forever ago) it would segfault, otherwise it ran fine.


Awesome, turn it all into one giant morass of shit. Maybe it’ll all go bankrupt faster.


Part of the issue, admittedly, is that there’s a bunch. Many have outdated info as well.
NAACP guide seems written for a more peaceful era, but is a good place to start.
Rescue our Democracy similarly has some oversights when it comes to tech safety, but at least mentions wearing a mask.
I’m not finding the better guides right now.
The big things as far as reducing identification that I’m not seeing is that beyond face coverings and the like to prevent facial recognition, don’t bring your real phone and if you do keep it powered off in a faraday bag.
Phones are still traceable when in airplane mode, and while powered off, through bluetooth low power mode. This is what many countries used for covid exposure tracking. The only defense agaist this tracking is having your phone in a faraday bag that it doesn’t leave until you are out of the protest area, or simply not bringing it.
There are a few ways to get burner phones not tied to your identity. If you wanted to go that route, you’d want to do the opposite. Keep the burner in the faraday bag at home and only use it out at protest locations, alongside the advice from those two guides as far as disabling biometrics, etc.
I’ll try and find some better guides later today.


The protest safety guides need to be more widespread.


Just enulation? Ducktales 1 got a remake/remaster. Kind of sad not to include that.
It’s only a thing if you leave smartscreen on. Think it might also only apply to stuff downloaded through Edge, but don’t quote me on that.


Everything in the world of these people needs an overdrawn explanation and story of creation and meaning and it makes me want to projectile vomit on or near them.
If you haven’t seen the Pepsi logo redesign doc from 2008 or 2009… well I hope you haven’t eaten anything recently.
It starts off doing some weird stuff with circles, the golden ratio, and old pepsi logos, slowly building to a frankly cultish crescendo of absurd marketing wankery.


As others have said, is Gooey, is friend.
Lorewise he’s made up of the same stuff as Dark Matter one of the big villians, but the power of friendship means he’s friend.
Mechanics wise, he’s player 2. If you don’t have a real player 2, he’ll be controlled by a basic CPU that mostly copies what you do.
I’ve heard there’s also some cheese you can do by spawning him when you only have one health (negating the one health cost to spawn him) and then eating him to restore up to two health, but imo Dreamland 3 is better without cheesing it.
Unasked for advice: In Dreamland 3, the game that screenshot is from, every level (except boss fights) have some sort of puzzle in the level you can complete to get a “heartstar” from whatever character is standing on the last screen of the level. You unlock the true final boss by collecting all the heartstars and beating each worlds boss while you have all of them for that world.
As is Kirby tradition, the true final boss is horrifying.
Depends on the program. I’ve got a handful of that old on CDs that still install fine. Checked when I was backing them up to ISO. There’s little bits of weirdness and unintended behavior while running them now, but they still install and run to a fairly acceptable degree.
That experience varies wildly though. Wine tends to handle things better and more consistently.


If you’re not active on the comms on awful.systems, I think you’d like it. Most users are aware of Yarvin etc.


ELITE? Really, of all the things to name it?
Well I guess they know who they’re marketing to.


I would hope so, they have to go somewhere


“Made a hobo CEO? You won’t believe what happens next!”


there is then zero switching cost outside
Tell me again how you’ve never supported an email service migration. I’m delighted that you haven’t, but it’s obvious.
Also, I love when people pull a “draw the rest of the owl” with tech they’ve never been up in the guts of.
Emails also come in standardized formats that can be downloaded and transferred to a new provider, too.
Oh, you sweet sweet thing. I remember when I believed that technical specs were reliable and things were interoperable because documentation said they were.
I can still see their tears.
Maybe it truly is that easy with other providers to switch from one to another, but Outlook, and especially the Exchange backend underneath (both the effectively discontinued self-hosted server version and the Azure-managed Exchange Online) are a special kind of jank.
There isn’t a special layer or kind of hell for whoever designed it. There isn’t even a specific hell in and of itself.
Whatever exists after death for the designers of Outlook and Exchange is something so much worse than hell that it’s categorically different from anything able to be conceptualized by humans. We don’t have words to even begin to describe the gulf between comprehendable human thought and what awaits for them.
If you power the NAS off completely, do the network issues disappear? Wi-fi can be effected by all sorts of things and it sounds like you’re currently just going off of a gut feeling.
Honestly, my first step would be to get as much as possible on wired connections. This could be as simple as wireless spectrum congestion due to a neighbor getting a new wireless AP.
Then I’d be checking network logs for the synology. I would expect it to have some way to do that.
Beyond that, “network issues” doesn’t give a lot to work with. Is it complete loss of connection, slow speed? And can you quantify it with any network logs or diagnostics?
If it was just from adding one more piece of hardware to your network that is sitting idle, I would expect you to have seen it before now with say, an extra cell phone on your wifi.