• 0 Posts
  • 8 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle

  • I’m no stranger to false positives, especially when virus scanners are all too keen to label things as “hacktools” and class them as malicious. However there is apparently no need for an online fix at the moment as there is no real authentication to play online so I just can’t understand why there are so many calls to specific IP addresses that aren’t in the legitimate version. (As there are currently no need to run pirated servers)

    Also it’s the first time I’ve see so many sigma flags in the sandbox tests. When I see “Critical: Ransomware” I get spooked. (As I’ve never seen this level of warning before. Nothing above a medium, infact)

    Ive done quite a bit of googling but haven’t been able to find much to dissuade my fears with sandbox flags like these… What’s more cracks from different users all have differing detection flags and call different IP addresses…

    TL;DR: I’m out of my depth with this one.



  • 0_o@lemm.eetoMicroblog Memes@lemmy.worldReal life Pip Boy
    link
    fedilink
    English
    arrow-up
    15
    ·
    10 months ago

    Reading all the comments reminiscing about using these as if they are now a relic of a bygone era. We errr… Still use them to this day, I don’t believe the company has any plans to upgrade in the near future either.

    We also still use dot-matrix printers. They’re still being manufactured to this day and the new ones even come with ethernet ports! (As opposed to serial, which again we still have some)



  • 0_o@lemm.eetoAndroid@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Good solution but some network providers look for Windows / Mac exclusive traffic, headers or some-such shutting down your connection immediately. I had some success tethering Linux machines tho :P Modern Windows likes to phone-home imminently upon establishing an internet connection, not to mention windows updates and a whole host of windowsness. The anti-tether developers were no doubt spoilt for choice with the amount of flags windows sends!


  • 0_o@lemm.eetoAndroid@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    Okay, so note that this script is over 8 years old now but if you google some of the lines or ask in a Linux / Android board they may be able to help you get this working if it doesn’t as-is:

    So, connect to your vpn on your phone and activate hotspot. Before connecting to it simply type these lines into the terminal (Think I used to use the Terminal Emulator app). You’ll have to run the “su” command first to get root access:

    iptables --flush
    iptables -t filter -F FORWARD
    iptables -t nat -F POSTROUTING
    iptables -t filter -A FORWARD -j ACCEPT
    iptables -t nat -A POSTROUTING -j MASQUERADE
    

    That should be all you need… Unless something’s changed in later android versions. I saved the above as a .sh script so I didn’t have to copy-paste every line every time


  • 0_o@lemm.eetoAndroid@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 year ago

    This is the reason I was forced to use android and root my phone. I used a custom ROM to bring back the tethering option then connect to a VPN and used the rooted terminal to mess with the iptables and routing to mask the fact I was tethering. Uuuugh, I don’t miss those days. Luckily the market changed in my country and went the other direction so I don’t have to deal with this anymore… Still have the old shell scripts saved tho ;)