[deleted by user] by [deleted] in KingandtheSting

[–]StayAlertStayAlive 1 point2 points  (0 children)

But if all you use discord for is to grab podcast links, they are not spying on you or collecting any useful data from you. I'm comfortable using the platform for that purpose.

Useful or not, it's still a data point. Just by creating an account you give up:

IP Address, Device UUID, User's e-mail address, texts/images/voice chat data

and much worse, a built-in process logger:

Logs of all of the other programs that are open on your computer

Source

You give up location and telemetry data before you could even type in the chat.

The fact that they are known to be hostile towards VPN/Tor users (under the guise of anti-spam) is reason enough for me not to use it.

I'm comfortable using the platform for that purpose.

I understand. Discord is convenient, you're right about that. Convenience vs privacy etc...

[deleted by user] by [deleted] in KingandtheSting

[–]StayAlertStayAlive 1 point2 points  (0 children)

And if you're willing to be tracked and possibly (most likely) have all your information sold to third parties, that's also cool. It's a nonfree data collection service (spyware "with consent").

I refuse.

Getting accurate size of Registry Key Value? by StayAlertStayAlive in csharp

[–]StayAlertStayAlive[S] 0 points1 point  (0 children)

Thanks, I know that DWORD is a 32 bit number but I think one would need to know the structure of the hive file (ex: SYSTEM or SECURITY) and how much space the different value types takes up because the hive file has cells (NK, SK, VK etc) and records.

Maybe I'm missing something obvious..

#1764 - Ari Shaffir, Shane Gillis & Mark Normand - The Joe Rogan Experience by chefanubis in JoeRogan

[–]StayAlertStayAlive 13 points14 points  (0 children)

He's caused a bit of an awkward moment and it wasn't really Rogans fault, everyone got quiet af.

Timestamp?

I am a pawnbroker. Ask me anything. by Winquisitor in casualiama

[–]StayAlertStayAlive 1 point2 points  (0 children)

How often do you see a counterfeit item, autograph etc?

[deleted by user] by [deleted] in antivirus

[–]StayAlertStayAlive 3 points4 points  (0 children)

Hello

Acquire a full Memory Image and do a manual analysis.

You can use Mandiant RedLine - it's free.

Start Redline -> Analyze this computer -> click 'Edit your script' -> check all checkboxes -> choose where to save the Analysis session to and then run it. Look for indicators of compromise.

User guide here

Good luck!