• 0 Posts
  • 9 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle

  • 0_o@lemm.eeto196@lemmy.blahaj.zoneRule
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    So as I needed to read the answer before I could make out what it was supposed to say ima guess that I am indeed color blind. I can trace the letters and make out the words but if I take a step back I couldn’t determine if it was a pattern, number, symbol or words.

    Thanks for explaining! (And massive thanks to everyone else who replied) ^^


  • 0_o@lemm.eeto196@lemmy.blahaj.zoneRule
    link
    fedilink
    arrow-up
    9
    ·
    2 months ago

    So for those with normal color vision, how easy is this to read? I’ve passed all the blind number based color tests in the past but this one required quite a bit of studying to read… Imagine if this is the way I discover that I am color blind! D:


  • I’m no stranger to false positives, especially when virus scanners are all too keen to label things as “hacktools” and class them as malicious. However there is apparently no need for an online fix at the moment as there is no real authentication to play online so I just can’t understand why there are so many calls to specific IP addresses that aren’t in the legitimate version. (As there are currently no need to run pirated servers)

    Also it’s the first time I’ve see so many sigma flags in the sandbox tests. When I see “Critical: Ransomware” I get spooked. (As I’ve never seen this level of warning before. Nothing above a medium, infact)

    Ive done quite a bit of googling but haven’t been able to find much to dissuade my fears with sandbox flags like these… What’s more cracks from different users all have differing detection flags and call different IP addresses…

    TL;DR: I’m out of my depth with this one.




  • 0_o@lemm.eetoAndroid@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Good solution but some network providers look for Windows / Mac exclusive traffic, headers or some-such shutting down your connection immediately. I had some success tethering Linux machines tho :P Modern Windows likes to phone-home imminently upon establishing an internet connection, not to mention windows updates and a whole host of windowsness. The anti-tether developers were no doubt spoilt for choice with the amount of flags windows sends!


  • 0_o@lemm.eetoAndroid@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    Okay, so note that this script is over 8 years old now but if you google some of the lines or ask in a Linux / Android board they may be able to help you get this working if it doesn’t as-is:

    So, connect to your vpn on your phone and activate hotspot. Before connecting to it simply type these lines into the terminal (Think I used to use the Terminal Emulator app). You’ll have to run the “su” command first to get root access:

    iptables --flush
    iptables -t filter -F FORWARD
    iptables -t nat -F POSTROUTING
    iptables -t filter -A FORWARD -j ACCEPT
    iptables -t nat -A POSTROUTING -j MASQUERADE
    

    That should be all you need… Unless something’s changed in later android versions. I saved the above as a .sh script so I didn’t have to copy-paste every line every time


  • 0_o@lemm.eetoAndroid@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 year ago

    This is the reason I was forced to use android and root my phone. I used a custom ROM to bring back the tethering option then connect to a VPN and used the rooted terminal to mess with the iptables and routing to mask the fact I was tethering. Uuuugh, I don’t miss those days. Luckily the market changed in my country and went the other direction so I don’t have to deal with this anymore… Still have the old shell scripts saved tho ;)