

My response: you can figure it out! Just try a little! Don’t ask such cop ass questions, also ddl is the realm of non-English stuff.
You: unsavory!
My response: you can figure it out! Just try a little! Don’t ask such cop ass questions, also ddl is the realm of non-English stuff.
You: unsavory!
The people telling you to use apt are pointing you in the wrong direction. Usually it’s better to use apt but sometimes with software that updates very often for a good reason like yt-dlp you can end up with old nonfunctional versions. Apt versions of yt-dlp are often several steps behind the arms race and just fail to work in weird ways.
The person telling you to add .local/bin to your $PATH is the one you should be listening to. The program isn’t launching because when you type it in, the terminal only looks in the places defined in the environment variable $PATH to see if the thing you typed corresponds to a program.
Once you have added the install location to path, be sure to add -U to your invocations of yt-dlp especially if they’re running automatically. The -U flag causes yt-dlp to try to update itself before attempting to do whatever you asked so things will almost never fail because of an old version.
Just look and figure it out. It’s really straightforward name matching. You don’t need someone to spell everything out to you, if you make a mistake just try something different. You can do it!
OPs_cops_post.html ass post. “Please explicitly tell me what illegal websites these initials refer to!” Guaranteed you are British 100% because only British cops would be stupid enough to do this.
Ddl is gonna be mainly stuff for poor Europeans who are scared of getting caught sharing files and are relying on the “loophole” of “I never actually shared the file, the file was shared with me and that’s substantively different” (it’s not, they’re just using it as an excuse to haul you in for some other reason or frame you for something).
Yes, here are some non kape vpn services with port forwarding for the people reading along:
Air, proton, ivpn, windscribe.
VPN services are targeted at different user bases and have different features. It would be unwise to rely on one service for wildly different uses like browsing, bypassing edge devices, p2p, hosting, location spoofing, etc.
Expressvpn, pia and cyber ghost are owned by kape technologies
Literally just use Winamp. You’re on windows, it’s windows amp. Winamp.
Your Imgur link isn’t working for me. You should be able to put the image in a reply.
What makes you think the file gathered the data? What data?
Shut down the vm, mount the vm disk, mv the files over, unmount the vm disk, start the vm.
That works because nowadays software doesn’t run itself, the system chooses what to run (sometimes at the users request).
When you shutdown the vm, there is no virtual computer interacting with the files on the vms disk. When you mount the vms disk, you’re just telling your system to treat the file that represents the vms disk as a filesystem. When you move the files to it, you’re just copying the files to the file that represents the vms disk respecting its filesystem then deleting the originals. When you unmount the vms disk you’re telling your system to wrap it up and let go of the file that represents the vms disk. Starting the vm is just telling your system to pretend that it has a fake computer whose disk is that file you mounted and wrote to which just so happens to have some new files in it, imagine that!
There’s another person saying you probably can’t figure out if the files you have are malware. I won’t go that far, but the reason most people don’t setup forensic environments (that’s generally what the computing environment you’ve set up is called when you’re doing what you’re doing) for their warez and instead raw dog it is that they have some security software and process they trust and if they get catch some kind of problem they plan on just restoring from backup.
You do have backups, right?
It’s rare for user targeted malware to have persistence, most of that technology is targeted at infrastructure like switches, edge and servers, so a wipe and restore is almost always a perfect fix.
Other people have suggested binding the client to the vpn interface. In rtorrent this is very easy. It may be easy in other clients.
The isp generally doesn’t care if you’re doing p2p. Some use it as a sales tactic to get you to move up to their top tier bandwidth plans though. They handle complaints about your p2p that have been investigated by some group contracted by the rights holders who usually say they have the file or want the file and take note of the ip that offers or accepts the file and then send that information to the group responsible for that ip.
In the case of your home ip, your isp receives the letter and sends you a letter in kind complying with all the laws they’re subject to. This usually has the threat of legal action and termination of service.
In the case of your vps ip, the vps provider complies to the full extent of the law. In some places with a three strikes or similar style of enforcement they may just forward it to you. They may use it as an excuse to ditch you if you’re a problem customer for them. It’s completely within the realm of possibility that they happily provide all the information they have on you, but that usually only when the police get involved.
In the case of your p2p vpn service they often have the ability to say “we don’t know which of our customers we’re connecting from that ip and have no way of finding out”. It’s a dead end for them.
Air has worked well for me. Proton is fine as long as you’re careful about what metadata you give them. Both do port forwarding.
In general, it would be a bad idea to use the same vpn account or service for p2p that you use for browsing or whatever. So maybe don’t do that.
Someone else asked “safe from what?” And that’s the real question.
In lieu of an answer to that though, no. It isn’t. The whole point of using a vpn to do p2p is to accomplish three things: traffic anonymization, legal protection and encrypted data transfer.
A vpn on a vps doesn’t anonymize your traffic because the vps is in your name. The vps provider is likely in compliance with kyc laws and will happily give you up to the law the moment they come knocking. If you’re using a domain with it it’s even easier to check that it’s you by looking at the whois records. On the off chance you’re getting a vps with enough storage and transfer included to act as your seedbox without kyc using cash or monero or something you’re likely paying more than the 2-3$ a month that the p2p vpns tend to charge.
A vpn on a vps most likely doesn’t provide you any legal protection either! Generally speaking, privacy focused vpn providers use nonpersistent systems where the secrets that can be subject to lawful intercept by the authorities are not stored on the systems hard drive and have protections against being read out of ram. Not only are almost all vpses generally held to be vulnerable to having their ram contents read by the provider, it is extremely unlikely that you set up openvpn without a configuration file on disk that contains your secret. This is just one example of a well documented vector of legal attack against a vpn, there are many. Paying an expert in legal attacks takes the onus off you.
A vpn on a vps doesn’t even accomplish encrypted data transfer, since the tunnel is between your pc and your vps, not whatever the vps connects to. Encryption keeps untrustworthy devices upstream of you from reading the data you send and receive. You might have prevented your untrustworthy isp devices from viewing your data, but you didn’t prevent untrustworthy vps provider devices from viewing your data. Even if your vps is trustworthy, the infrastructure it uses is the same infrastructure whose built in lawful intercept backdoors were compromised last year with no firm resolution. This wouldn’t matter nearly as much if your traffic were anonymized or had the shield of a crew of computer security experts running the system you use as a vpn, but as outlined above, you don’t.
Running your own vpn on a vps is cool, and I’m glad you have that ability, but it’s a lot like building your own car from scratch. It is possible, and a phenomenal learning experience, but not the suggested route for anyone.
Use a p2p vpn service instead. It’s much cheaper and better in almost every way.
Probably a good idea to turn off dht and pex
No, yes, no.
There are exceptions. You’ll run into people saying that they bought an account into some tracker years ago and that was their doorway in to everything. Maybe some of those people are telling the truth.
Just get in the normal way.
Orpheus will be easier but they’re both good. Old rave tapes are easy ups.
I found a bunch of music by all those artists on just the two general music trackers, orpheus and red.
Take the time to get on one of those two either by testing in or laddering the Mya tracker and you’ll probably be glad you did.
If you want to know that the music you are interested in is on private trackers, tell me and I’ll look and report back.
I used soulseek a lot and the people who do what you do are on private trackers. I do what you do as well. I found it to be worth my time and not a hassle.
Hey if you’re putting this much effort into soulseek and you’re not already, get on one of the private music trackers.
If the nearby partition isn’t like root or something then yeah you can do that with frisk and parted and whatnot.
What’s your fdisk -l or lsblk output?