Cannot enable symantec antivirus

Understanding Cybersecurity: Safeguarding Your Digital World

2024.05.18 11:56 pixelsimg- Understanding Cybersecurity: Safeguarding Your Digital World

Understanding Cybersecurity: Safeguarding Your Digital World
https://preview.redd.it/yhman7fvq51d1.jpg?width=1280&format=pjpg&auto=webp&s=fd8820bad175c839b73e093d08ac7ae35cf3a0f4
In today's digital age, where almost every aspect of our lives is intertwined with , the importance of cybersecurity cannot be overstated. From personal information to critical infrastructure, our digital assets are constantly under threat from various malicious actors. In this blog, we'll delve into the realm of cybersecurity, exploring its significance, key principles, and practical tips for staying safe in the online world.
What is Cybersecurity?
Cybersecurity encompasses a range of practices, technologies, and measures designed to protect computers, networks, and data from unauthorized access, cyberattacks, and data breaches. It involves safeguarding against threats such as malware, ransomware, phishing attacks, and other forms of cybercrime.
Read Also- online betting se bank account kese unfreeze karaye
The Importance of Cybersecurity
With the proliferation of digital devices and the increasing interconnectedness of systems, the stakes for cybersecurity have never been higher. Here are some reasons why cybersecurity is crucial:
  1. Protection of Sensitive Information: Cybersecurity helps safeguard sensitive data, including personal information, financial records, and intellectual property, from falling into the wrong hands.
  2. Preservation of Privacy: In an era where privacy concerns are paramount, cybersecurity measures help maintain individuals' privacy rights by preventing unauthorized access to personal data.
  3. Prevention of Financial Loss: Cyberattacks can result in significant financial losses for individuals, businesses, and even governments. By implementing robust cybersecurity measures, organizations can mitigate the risk of financial damage caused by cyber incidents.
  4. Maintaining Trust: In today's digital economy, trust is essential. A strong cybersecurity posture fosters trust among users, customers, and partners, enhancing brand reputation and credibility.
Read Also- online gaming se bank account kese unfreeze karaye
Key Principles of Cybersecurity
Effective cybersecurity relies on several key principles:
  1. Risk Assessment: Understanding the risks and vulnerabilities specific to your organization is the first step in developing a comprehensive cybersecurity strategy. Conduct regular risk assessments to identify potential threats and prioritize mitigation efforts.
  2. Defense in Depth: Adopt a layered approach to security by implementing multiple layers of defense, including firewalls, antivirus software, intrusion detection systems, and encryption. This ensures that even if one layer is breached, others remain intact.
  3. Continuous Monitoring: Cyber threats are constantly evolving, making continuous monitoring essential for detecting and responding to security incidents in real-time. Utilize security tools and technologies to monitor network traffic, detect anomalies, and identify potential breaches promptly.
  4. Education and Training: Human error is often cited as a leading cause of security breaches. Educate employees about cybersecurity best practices, including how to recognize phishing attempts, create strong passwords, and securely handle sensitive information.
  5. Incident Response: Despite preventive measures, security incidents may still occur. Develop a robust incident response plan outlining procedures for detecting, containing, and recovering from security breaches. Regularly test and update the plan to ensure effectiveness.
Practical Tips for Cybersecurity
  1. Keep Software Updated: Regularly update operating systems, applications, and security software to patch known vulnerabilities and protect against emerging threats.
  2. Use Strong Passwords: Create complex passwords or passphrases comprising a combination of letters, numbers, and special characters. Avoid using easily guessable passwords or reusing them across multiple accounts.
  3. Enable Multi-Factor Authentication (MFA): Implement MFA wherever possible to add an extra layer of security beyond passwords. This typically involves verifying identity through a combination of factors such as passwords, biometrics, and one-time codes.
  4. Be Wary of Suspicious Emails: Exercise caution when opening email attachments or clicking on links, especially if they appear suspicious or unexpected. Verify the sender's identity before taking any action.
  5. Backup Data Regularly: Regularly back up important data to an external hard drive or cloud storage service. In the event of a ransomware attack or data breach, having backups ensures that critical information can be restored.
Read Also- binance trading se bank account kese unfreeze karaye
Conclusion
As our reliance on technology continues to grow, so too does the need for robust cybersecurity measures. By understanding the importance of cybersecurity, adhering to key principles, and implementing practical tips, individuals and organizations can better protect themselves against cyber threats and safeguard their digital assets. Remember, cybersecurity is everyone's responsibility. Stay vigilant, stay informed, and stay safe in the digital world.
submitted by pixelsimg- to u/pixelsimg- [link] [comments]


2024.05.18 09:28 loganowen770 Enhancing Network Security in Universities: Challenges and Solutions

In an era defined by digital transformation, universities are increasingly reliant on robust network security to protect sensitive data, ensure uninterrupted operations, and safeguard intellectual property. However, this dependence also brings forth significant challenges that must be addressed to maintain a secure environment. This blog explores the key challenges faced by universities in enhancing network security, along with effective solutions.

Challenges in Network Security for Universities

  1. Cyber Threats and Attacks: Universities are prime targets for cybercriminals due to the vast amounts of valuable data they possess, including research data, student information, and financial records. Cyber threats such as ransomware attacks, phishing attempts, and DDoS attacks pose significant risks.
  2. Budget Constraints: Many universities face financial constraints, making it challenging to invest in the latest security technologies and personnel. This limitation often leaves them vulnerable to sophisticated cyber threats.
  3. Diverse User Base: Universities host a diverse community of users, including students, faculty, researchers, and administrative staff. Managing access control and ensuring data security across such a varied user base can be complex.
  4. Compliance and Regulatory Requirements: Universities must adhere to strict regulatory requirements concerning data privacy and security. Non-compliance can lead to legal repercussions and damage to the institution's reputation.

Solutions to Enhance Network Security

  1. Implementing Multi-Layered Security Measures:
  1. Conducting Regular Security Audits and Assessments:
  1. Educating the University Community:
  1. Implementing Incident Response Plans:
  1. Collaborating with Security Experts:

The Role of Assignment Help Websites in Network Security Education

In an academic setting where cybersecurity education is paramount, students often seek guidance and assistance through assignment-help websites. These platforms provide valuable resources such as sample assignments, expert guidance, and clarification of concepts. For instance, students looking to understand network security concepts may seek help with assignments related to topics like encryption protocols, firewall configurations, or security policy implementation.
Finding reliable assistance with network security assignments is crucial for students aiming to excel in their studies. Assignment help websites connect students with experts who have the knowledge and experience to provide high-quality assignments. These experts ensure that assignments meet academic standards and help students deepen their understanding of complex network security topics. Whether you're looking to understand concepts better or seeking help with specific assignments, these services can be invaluable. If you need assistance, don't hesitate to ask, "Write my network security assignment."

Conclusion

Enhancing network security in universities requires a multifaceted approach that addresses technological, educational, and procedural aspects. By implementing robust security measures, conducting regular audits, and fostering a culture of cybersecurity awareness, universities can significantly reduce the risk of cyber threats. Additionally, leveraging the expertise of assignment help websites can empower students to excel in their network security studies, ensuring a secure and knowledgeable future workforce.
In summary, by addressing these challenges and implementing effective solutions, universities can create a secure environment conducive to learning and innovation in the digital age.
submitted by loganowen770 to u/loganowen770 [link] [comments]


2024.05.15 13:08 Hot_Bandicoot_3839 How Can I Prevent BitLocker Metadata Corruption and Ensure Data Accessibility?

How Can I Prevent BitLocker Metadata Corruption and Ensure Data Accessibility?
https://preview.redd.it/yc9xaeclnk0d1.jpg?width=1200&format=pjpg&auto=webp&s=87d3124836e5ced84b9f4059761c09193d303567
Though like any technology, BitLocker encryption is not impervious to problems like metadata corruption. BitLocker metadata corruption might result in data loss or inaccessibility, hence precautions must be made. Understanding the value of data integrity, we at BLR TOOLS provide professional guidance on how to avoid BitLocker metadata corruption. You may reduce the possibility of metadata corruption and guarantee the availability of your important data by adhering to best practices including routinely backing up your data, keeping your system stable, and employing dependable hardware. Give your data to BLR TOOLS to protect and stop unforeseen data loss events.
With its BitLocker encryption tool for Windows, Microsoft shields data from unwanted access by encrypting entire volumes. Enabling BitLocker encrypts the files and folders kept on a hard drive, USB flash drive, or SD card.
Periodically, you format the encrypted hard drive, losing data. Recovery of the lost data after formatting the hard drive could be challenging. We will be presenting ways to recover data from formatted BitLocker encrypted hard disks in this post.

BitLocker-Encrypted Hard Drive Formatting Reasons

Hard disks encrypted with BitLocker may need reformat for the following reasons:
  1. Unintentional Formatting: You could accidentally format the disk holding critical data while attempting to format another disk.
  2. Intentional Formatting: You cannot access the data on a drive if the file system has become RAW. The only option in such a case is to format the disc. Data may be lost, though, while formatting.
  3. A viral assault could cause harm to or inaccessibility to the data on your hard disk. The computer's firewall or antivirus program might in this case block the disk and make you format it. Data loss could happen in such situations if the Windows firewall removes Bit Locker's metadata.

BitLocker-Encrypted Hard Drive Decryption Techniques

The following are the ways to remove BitLocker encryption:
Method 1: Operating the BitLocker Drive Encryption Function
Decrypt a drive encrypted with BitLocker by following these instructions:
  1. Click the Start button.
  2. Choose the Control Panel.
  3. System and Security are your options.
  4. Make the BitLocker Drive Encryption selection.
  5. Toggle Decrypt Drive. (The chosen drive is instantly unlocked with this choice.)
Method 2: Decrypt using Certificates
Proceed as follows to use certificates to decrypt a BitLocker-encrypted drive:
[Note: You require the certificate for the encrypted hard drive for this.]
Make your way to Start.
  1. Click Enter after typing certmgr.msc.
  2. Opening Certificate Manager, click.
  3. Select a Folder: Personal.
  4. Select Action from All Tasks.
  5. Use the on-screen instructions and the Certificate Import Wizard.
Method 3: Implementing Windows GUI Mode
To disable BitLocker encryption, click the instructions below.
[Note: Disable BitLocker encryption only if you have administrator rights.]
  1. Click BitLocker Drive Encryption under System and Security in the Control Panel of Start.
  2. Toggle off BitLocker after locating the encrypted drive.
  3. A notice advising that the drive will be decrypted and that it might take some time will appear. For further instructions and to disable BitLocker on the drive, click Turn off BitLockeDecrypt the drive.
BitLocker protection may need some time to be removed and the drive decrypted.
Also Read:- Easiest Way to Recover Bitlocker Drive Encryption
Method 4: Windows PowerShell Mode Decryption
Your system needs to have Windows PowerShell installed in order to disable BitLocker encryption using that mode. Should it not, go to the Microsoft website and download and install the supported Windows PowerShell version. Then do as directed:
[Note: The cmdlet to disable BitLocker encryption won't function if the operating system partition has any automatic unlocking keys. BitLocker for the partition can be disabled by deleting all automatic releasing keys using the PowerShell window's Clear-BitLockerAutoUnlock cmdlet.]
  1. Get PowerShell running as an administrator.
  2. Run the the following commands:
  • PS C:\>$BLV = Get-BitLockerVolume
  • C:\>Disable-BitLocker -MountPoint $BLV
  1. Check the decryption is underway by running the following commands:
  • Carry out the directive: PS C : BitLockerVolume Get
  • Verify "Volume Status" and "Encryption Percentage" decryption progress.

Recover Files from an Encrypted BitLocker Drive

Data recovery from a formatted BitLocker-encrypted drive requires reputable software, such as BLR BitLocker Data Recovery Tool. BitLocker-encrypted storage devices can have data lost, erased, or inaccessible recovered with the software. BLR BitLocker Data Recovery program allows you to recover any kind of file from a password-protected or encrypted storage device.
These are the procedures to use professional Windows data recovery software to recover data from the formatted hard drive:
  1. Launch BLR BitLocker Data Recovery Professional after installation.
  2. Choose the kind of file you wish to recover on the "Select What to Recover" window. Toggle Next.
  3. To recover data from a device, choose it from the "Recover From" screen.
  4. Select a BitLocker encrypted Windows disk volume. Hitscan.
[Note: The program will ask for your BitLocker password. For access and drive scanning, enter the password. Data cannot be recovered from the encrypted storage media if you forget the BitLocker password.]
  1. See the data preview after the scan is finished.Pick the files you want to recover after that.
  2. To choose where the chosen files should be saved, click Browse. Save restored data on an external hard disk.
  3. Save retrieved data by clicking Start Saving.

Recovery of BitLocker Encrypted Hard Disks

Select a reputable source of data recovery services, such BLR Tools, if you would rather have the professionals handle the task. BLR BitLocker Data Recovery Software is equipped and knowledgeable enough to handle several data loss scenarios.
All kinds of encrypted hard drives have had data successfully recovered by BLR Data Recovery Tools over the years. BLR Tools data care specialists had, for example, restored data from a physically damaged and formatted encrypted drive.
BLR Tools experts evaluate the damaged hard disk first, and then they get on with the data recovery procedure. To recover lost data from a formatted BitLocker encrypted hard drive, they proceed as described here:
  1. To make sure it's in good operating order, the drive is looked over.
  2. In case the hard disk has faulty sectors, an image of it is next captured.
  3. To unlock the disk, type the BitLocker password.
  4. Partition scan of the drives comes next. The scan facilitates error correction.
  5. Then every file and folder on the drive becomes available and is examined to look for oddities.
Complete verification of the data ends the data recovery procedure.
[Note: The drive cannot be unlocked for data recovery without the encryption key or password.]

Summary

The ways of recovering deleted files lost when a BitLocker-encrypted disk is formatted are covered in this blog. Using specialist data recovery software, such BLR BitLocker Data Recovery Software, is the best way to recover data from a BitLocker-encrypted device. It is advised to get assistance from a qualified data recovery service provider with experience and knowledge handling various data loss scenarios if the hard drive is physically destroyed.
submitted by Hot_Bandicoot_3839 to datarevivalsquad [link] [comments]


2024.05.13 16:32 PretendRanger I think my connection is being blocked. Any suggestions?

Last week my laptop was working fine. I went to access a file in my OneDrive account and was unable to open it. All other files were accessible. Restarted my computer to hopefully resolve the problem. Since then a few things have happened:
1) I cannot log into my OneDrive account - Everytime I enter my login information it reprompts me to enter it The error code is 8004de44 which indicates a connection is being blocked. I updated to Sonoma 14.4 and still does not work.
2) My Mail app keeps signing me out of both of my email accounts (gmail, Microsoft Outlook) after a few hours. Never had this issue before which makes me think this is all related
3) I created a guest profile and OneDrive is able to work on that profile.
This is my work computer and I have had my IT people look at it and they can't figure out the issue other than thinking something is blocking the connection based on the error code from OneDrive. Their suggestion is to wipe my laptop and start fresh. I want to avoid doing that if at all possible.
I only really use this laptop for work so am careful with what apps and program I install on it and can't think what I could have done to cause this. I disabled the firewall, antivirus, and enabled auto proxy discovery based on a suggestion. Is there anything else I might be missing to try?
submitted by PretendRanger to MacOS [link] [comments]


2024.05.10 17:12 Immediate-Captain391 how to exclude application from windows antivirus defender

i have this application that i want to add to "exclusions". i already disabled all the antivirus even the one with the group policy thing. the problem is real-time protection can only be disabled temporarily.
i found a way by adding the file of the app in "exclusions" but when the real-time protection goes back to enabled, i cannot open the application anymore. i always end up having to uninstall the app, turn off real-time protection, and install the app.
is there a way for me to add the application itself to "exclusions" as i do not want to keep on installing the app whenever the real-time protection is enabled? i already tried adding ".exe" but it's still the same.
submitted by Immediate-Captain391 to WindowsHelp [link] [comments]


2024.05.09 09:54 Hot_Bandicoot_3839 Fix Error Code 0xc10100bf with Ease [Solved]

Fix Error Code 0xc10100bf with Ease [Solved]
https://preview.redd.it/bzv6z5stvczc1.jpg?width=1200&format=pjpg&auto=webp&s=e18081cdde2b93c5553a088ca2aab6af837e722f
“ Several mp4 files I downloaded into my thumb drive are saying "This file isn't playable" on my media player. That can be the consequence of a damaged file, an erroneous file extension, or an unsupported file type. 0xc10100bf.”
Do you get a 0xc10100bf error when you try to play the files? You have arrived at the correct page! All the information you require concerning the 0xc10100bf issue and its hassle-free solution will be covered in this article.
When attempting to play files in their computer systems, many people encounter 0xc10100bf. Let us thus first define this mistake and explain why it happens in case you have run into the same problem and are unsure of how to fix it.

Section 1: What Is 0xc10100bf Error?

The Error 0xc10100bf message on your screen indicates that your video is either corrupt or has an unsupported file format or extension. This error might also occur for a number of other reasons. Read this post to learn further about it.
Causes of the Error 0xc10100bf?
Understanding the possible reasons for 0xc10100bf repair is essential before learning the techniques. Let us thus examine several causes of the 0xc10100bf error.
Incompatible media player
When the format of the file you are trying to play is not supported by your media player, error 0xc10100bf will inevitably appear. You must in this situation change the format of your file to one that your media player can handle.
File Extension Error
Another thing that could cause the 0xc10100bf problem is an improper file extension. Mostly, this happens when you rename a file without using a specialised video conversion program or tool to properly convert it.
Corrupted Video File
The message "This file isn't playable" can also show up if your video has become corrupted. There could be several reasons why you would see video corruption. It could have been damaged during the extraction process, downloaded from a shaky source, or not correctly recorded.
Attack of Malware on Media Player
When malware attacks impact the Windows Media Player, error code 0xc10100bf might also appear and stop the user from accessing or playing media files.

Section 2: 0xc10100bf Repair Guide I Can't Play This File (5 Solutions)

Do not panic if a file cannot be played with Windows Media Player, the Movies & TV app, or any other player! Specifically, there is nothing to do with your computer or operating system. In this case, the issue is most likely with your file, hence this is a small problem. Thus, let us quickly examine several ways to resolve the 0xc10100bf problem.
Solution 1: Verify the File Format Supported
It could be the case that the file type is unsupported even if your file appears to be OK. You must thus make sure that the Movies & TV program or any other program you are using, including Windows Media Player, supports the format of your files. If your file is not supported, you ought to convert it to one that is.
To carry out this process, look up free video converter software online and use the one you believe will do the job. Furthermore, to play the particular file, you can download a third-party codec or player.
Solution 2: Verify the Appropriate File Extension
Your file could give a 0xc10100bf error if its extension is incorrect. Usually, this happens when you have renamed your file without fully converting it with a specialized video conversion program. While certain media players will be able to determine the real MIME type (Multipurpose Internet Mail Extensions) of the file and remedy this problem right away, other players might not be able to.
Viewing the file information with the appropriate file manager and making sure the file extension matches the MIME type are two more methods to determine if the file extension is correct. You may solve this problem by renaming the file with the appropriate file extension.
Solution 3: Watch Videos on Still Another Device
Should the file state, "This file isn't playable," during the playback attempt, it is quite likely broken. Thus, the initial thing you should do if you notice the problem - 0xc10100bf on your screen is to see if the file can be played on another device. Should the file not play, it is either corrupted or damaged. Try to replace the damaged file with a fresh one in this case; this could be the simplest solution.
Solution 4: Play Videos with anOther Media Player
Mostly, an unsupported codec or file format might cause the error code 0xc10100bf. Here, the problem is frequently resolved by watching the video with an alternative media player. The most popular and set up to play videos in a variety of formats is VLC media player, which you may use to play the video files. Furthermore, VLC Player facilitates the simple conversion of video formats to other formats on Windows systems.
VLC is not the only program you can use; Windows Media Player, Winamp, KMPlayer, QuickTime, and more.
Solution 5: Scan and Eliminate Malware
If you double-click on a video and get the 0xc10100bf error, it means that malware has invaded your machine. You may be in the worst circumstance you have ever encountered, but do not freak out. Windows Defender is a security program that is preinstalled on your computer, so you can definitely use it to fix 0xc10100bf. The application is of rather good quality. Steps to launch Windows Defender in Windows 10 are as follows:
  • Visit Settings and choose "Update & Security."
  • Then select Windows Defender and click "Use Windows Defender." It's time to scan your damaged file with Windows' integrated security program.
Sometimes not even Windows Defender will be of use. In such a case, you can obtain another strong and trustworthy anti-malware program that will enable you to thoroughly scan your computer and eliminate any threat found.

Section 3: Resolve 0xc10100bf Error Code Resulting from Video Corrupted (2 Fixes)

Solution 6: Try Video Repair Software to Fix Corrupted Videos
might the 0xc10100bf error persist even after implementing the previously described fixes, you might think about fixing the video files with a trustworthy and specialised program such as BLR Video Recovery Software. BLR Video Recovery Software can fix corrupted or damaged video files of all sizes and formats on your PCs with its intuitive interface. Main characteristics of it are as follows:
1. Video File Upload/Add Corrupted Initially, you must download and run "BLR Tools" on your computer. You may drag the corrupted file into the software window directly or click the "+Add" button to add it from the chosen location as soon as it is installed.
2. Launch the repair process.
The program will start uploading the videos as soon as they are added. The videos' sizes may make the upload process take some time. Please be aware that videos will be added one at a time if you have more than one. To begin the repair process after the videos have been uploaded successfully, click the "Repair" option.
3. View the Corrected Film
It won't take many minutes for the repair to be finished. You may view the video to see if it has been fixed after it is finished. Save the video now somewhere secure. Never save it where your damaged video was previously saved.
If the restored video quality is insufficient for you, you can use BLR "Advanced Repair" function to add a quality sample video with the same format as the corrupted one, thus completing a more professional video restoration procedure.
4. Starting the Advance Repair Procedure
The "advanced repair" feature in the software can be used if you do not obtain the intended outcome and discover that the movies were not effectively corrected. Simply include a sample video and attempt to fix the video once more. To start the fixing procedure when the video has been uploaded, click the "Repair" button.
5. Save the Repaired Video Somewhere Safe
Your computer will show a "success" message after the repair is finished. The restored video file can now be saved anywhere you like and played again. No mistakes will be seen this time.
Solution 7: Return to the Original Video Download
You can attempt to download the video again if the corruption was brought on by an error during the download process, such as network disruption or antivirus interference. In such cases, the downloaded video might be partial.

Section 4: 0xc10100bf Video Error Prevention Tips

Let's look at some more preventive measures after going over every way to fix the 0xc10100bf error:
  • Move files onto your PC: A 0xc10100bf video error might occasionally occur when playing files with an external driver. Try relocating your data, then, to the system's local disks. This might cure the issue.
  • Update media players as needed. For flawless video playback, ensure your player—VLC, Windows Media Player, or any other—is current.
  • Make sure the well-known media players you install on your computer come from reputable sources. Getting media players from their developers' official websites is strongly advised.
  • Make sure you are downloading videos from safe sources or reputable video recovery software if you are doing it online.
  • Install reliable and powerful antiviral software, and run routine computer scans. Every virus that can tamper with or destroy your video files will be shielded from your machine.
Summary
Unsupported file formats, wrong file extensions, or file corruption can all cause error code 0xc10100bf when playing videos on your computer. Using the above described successful techniques, you can attempt to correct this mistake.
Certain files are just unrepairable since they are missing pieces or they get interrupted while downloading. Still, you can easily fix any corrupted file and enjoy watching videos with the aid of a video repair program such as BLR Data Recovery Tools.
submitted by Hot_Bandicoot_3839 to datarevivalsquad [link] [comments]


2024.05.09 05:41 PROVENDATAUS Does A VPN Protect From Hackers? Experts Answer (2024)

Does A VPN Protect From Hackers? Experts Answer (2024)
https://preview.redd.it/biv1v80hnbzc1.png?width=960&format=png&auto=webp&s=f62fe6e9d2db834061ef7e177b59a041bdb8bb46
A VPN, or Virtual Private Network, acts like a secure tunnel for your internet traffic. It encrypts your data, scrambling it so hackers can’t see what information you’re sending and receiving. This encryption makes it extremely difficult for hackers to steal your personal information or infect your device with malware.

So, does a VPN protect you from hackers?

Yes, VPNs protect users from hackers. They hide users’ real IP addresses, making it challenging for hackers to target them, and they can prevent various types of cyber attacks, including DDoS attacks, Man-in-the-Middle attacks, malware infections, session hijacking, and phishing attempts.

Can you be hacked while using a VPN?

Technically, yes, you can be hacked while using a VPN, but it’s much less likely. A good VPN encrypts your data, making it very difficult to steal.
However, VPNs have limitations, such as their inability to protect against malware and phishing attacks that have already compromised a device and human errors.
Pro tip: While VPNs provide significant protection against hackers, users should also employ additional cybersecurity measures for comprehensive security.

How can a VPN help to prevent hackers from accessing your data?

VPNs offer encryption and other security features that make it difficult for hackers to intercept or access users’ data. This is because a VPN (Virtual Private Network) is a technology that creates an encrypted connection over the internet between your device and a remote server operated by the VPN service provider.
Here are the main ways that a VPN can protect your data:
Data encryption
VPNs encrypt your data, ensuring that even if hackers manage to intercept your data, they won’t be able to decipher it without the encryption key.
Does VPN protect against man-in-the-middle attacks?
Yes, VPN can protect against man-in-the-middle (MITM) attacks. Thanks to the encryption it can prevent attacks and allows you to use public WI-FI securely.
IP address masking
VPNs hide your real IP address and assign you a different IP address from their server. This makes it difficult for hackers to determine your location or target your specific device.
Hiding your real IP address also makes it difficult for hackers to launch Distributed Denial of Service (DDoS) attacks against your device or network.
Ad blockers and additional security features
Some VPN providers offer ad blockers and other security features that can help prevent malware infections and phishing attempts, further enhancing your protection against hackers.

What are the limitations of a VPN?

While VPNs are useful privacy tools, they should be combined with other security practices like keeping software updated, using antivirus, and enabling two-factor authentication where possible. Here are the main cyber security threats that VPNs are too limited to provide any significant protection:
Inability to prevent malware
VPNs primarily focus on encrypting data and hiding IP addresses, but they do not provide comprehensive protection against malware.
While some VPNs may include basic ad blockers or malware protection features, they are not as robust as dedicated antivirus software.
Vulnerability to phishing attacks
VPNs may block access to known malicious websites, but they cannot prevent users from falling victim to phishing attacks and providing personal information to fraudulent sites or emails. Your internet traffic will be encrypted, but it does not prevent malware or viruses from infecting your device if you accidentally download them or visit malicious websites.
Dependence on human behavior
VPNs rely on users to enable and configure them correctly. If users forget to activate their VPN or inadvertently disable it, they may expose themselves to cyber threats.
Additionally, human error, such as using weak passwords or falling for social engineering tactics, can undermine the effectiveness of VPN protection.
Pro tip: If you do fall victim of a hacker attack, you can contact Proven Data experts for malware and ransomware removal and to restore any lost or corrupted data.
submitted by PROVENDATAUS to u/PROVENDATAUS [link] [comments]


2024.05.09 02:51 Human_Major7543 E-mail norton scam

submitted by Human_Major7543 to ScamNumbers [link] [comments]


2024.04.27 14:08 hotdognova ERR_ADDRESS_UNREACHABLE // Major Issue with Windows itself.

i am on the edge of wiping my entire computer clean and resetting it completely.
Since 2-3 days ago i have an issue where my WIFI Shows that it's on, but not really. When i access sites like YouTube, Google, Bandcamp etc it all works fine. But websites like ElevenLabs are met with an "ERR_ADDRESS_UNREACHABLE" aswell as Reddit and more sites.
Strangely enough, my Macbook and Smartphone accesses these websites just fine with the same WIFI Connection. So it cannot be my WIFI but rather my Laptop that runs Windows.
Furthermore, the Apps on my Desktop like Discord or Steam won't update, like the Apps themselves recieve no connection from my Internet.
ERRORS:
I use an IdeaPad L340-15RH Gaming
Intel (R) Core (TM) i5-9300H CPU @2.40GHz
8 GB RAM at 64bit
I tried the following things:
* Resetting my router twice.
* Switching from Windows 10 to Windows 11
* Changing DNS to Google DNS
* Running Antivirus to see if theres a problem with no results
* DNS Flushing
* IPCONFIG Commands
* NETSH Commands
*Updating Drivers
* Uninstalling Driver with re-start
* Updates for Windows
* Troubleshooting possible issues and coming out empty handed
* Checked my Firewall (ON)
*Checked Chrome if the problem results from there, coming out empty handed
and much more.
What's frustrating is that after uninstalling my driver, restarting my laptop and disabling my router for 30 seconds before enabling it again, everything seemed to work just fine again.
But now it got back to the state it was before i made it work
I did not download anything fishy that could possible be a Virus to my System. I just randomly noticed this out of nowhere and just thought my WIFI Router was somehow messing up. Sometimes on my connection bar it shows me that i am connected, but i have no internet.
I have my laptop with me since December 2019 and used Windows 10 for most of the time until now. My Computer did not have a virus for several years. And if it did notice something, my anti virus would delete it automatically. But i know that my antivirus did not cause this problem either, because you have to manually scan your computer.
I use no VPN, i have open Ports.... I'm not sure what else to mention. Might have missed something but i digress.
If ANYONE can aid me in fixing this issue i would be very very grateful.
I thank anyone in advance already who can help me get this issue fixed because it's gnawing on my nerves.
submitted by hotdognova to WindowsHelp [link] [comments]


2024.04.13 11:52 UsualSet8535 6 Essential Concepts Regarding QR Code Security

6 Essential Concepts Regarding QR Code Security
https://preview.redd.it/l59psut4y7uc1.png?width=2240&format=png&auto=webp&s=b1b423e50c373a4aec7198c89a8901d74472e9d0
In an era where digital interaction is paramount, Quick Response (QR) codes have emerged as a ubiquitous tool for seamless connectivity. From business cards to online transactions, these matrix barcodes have revolutionized how we access information. However, amidst their convenience lies a veil of vulnerability, prompting the need to delve into QR code security. This comprehensive guide unravels the intricacies of QR code safety, exploring its significance and unveiling essential concepts to safeguard your digital interactions.

What are QR codes, and how do they work?

QR codes, short for Quick Response codes, are two-dimensional matrix barcodes capable of storing information horizontally and vertically. Developed in 1994 by Denso Wave, a subsidiary of Toyota, these codes were initially used to track automotive parts during manufacturing. However, their versatility soon led to widespread adoption across various domains.
QR codes function by encoding data into a pattern of black squares arranged on a white background. They effectively describe a visual pattern of black squares on a white background. Let me know if you need any further assistance. This encoded data can encompass URLs, text, contact information, or commands to execute specific actions. Smartphones can quickly scan QR codes to direct users to encoded content instantly.

Why worry about QR code safety?

As QR codes continue to permeate our daily lives, concerns regarding their security become increasingly pertinent. While QR codes offer unparalleled convenience, they also present a potential gateway for malicious actors to exploit unsuspecting users. From phishing scams to malware dissemination, compromised QR codes can have severe repercussions, ranging from financial loss to privacy breaches.
📷

Six things you need to know about QR code security

  1. The uses for QR codes are vast.
QR codes have transcended traditional boundaries, finding utility across many applications. Whether it's exchanging contact information on business cards, facilitating ticket bookings, or enabling seamless payments, QR codes versatility knows no bounds. However, this ubiquity also amplifies the need for Robust security measures to reduce potential risks associated with their usage.
  1. QR codes are not intrusive.
Unlike traditional hyperlinks or attachments, QR codes are non intrusive. They serve as a passive conduit for information, requiring users to initiate the scanning process voluntarily. While this nonintrusive characteristic enhances user experience, it emphasises the significance of caution while exercising. Scanning unfamiliar QR codes.
  1. QR codes take you there–but the rest is on you.
While QR codes efficiently ferry users to their intended destination, the responsibility for discerning the legitimacy of the encoded content rests squarely on the users' shoulders. Whether verifying a website's authenticity or scrutinising the sender's credentials, exercising due diligence is paramount to thwarting potential threats lurking behind QR codes.
  1. QR codes can be tampered with
Despite their seemingly immutable appearance, QR codes are not impervious to tampering. Malicious actors can manipulate QR codes by overlaying stickers or printing counterfeit versions to redirect users to fraudulent websites or implant malware onto their devices. Vigilance is crucial when scanning QR codes, especially in high-risk environments where tampering is more likely to occur.
  1. QR codes can contain malicious links.
One of the most insidious threats QR codes pose is embedding malicious links disguised as legitimate content. Unsuspecting users may inadvertently scan QR codes that lead to phishing websites or download malware-infected files, compromising their sensitive information and jeopardizing their digital security. Implementing robust antivirus software and scrutinizing QR codes before scanning can mitigate this risk.
  1. Most scams involving QR codes use social engineering.
While technological safeguards play a pivotal role in QR code security, it's essential to recognize that many scams involving QR codes leverage social engineering tactics to exploit human vulnerabilities. From enticing users with irresistible offers to instilling a sense of urgency, malicious actors employ psychological manipulation to elicit desired actions from unsuspecting individuals. Educating users about common social engineering tactics and fostering a culture of scepticism can fortify defences against QR code-related scams.

Conclusion

In digital connectivity, QR codes are indispensable conduits for seamless information exchange. However, their widespread adoption also necessitates a vigilant approach towards security. You can navigate the QR code by familiarising yourself with the essential concepts outlined in this guide and adopting proactive measures to safeguard your digital interactions.

FAQ

Are QR codes safe to use for online transactions?

QR codes can be safe for online transactions if used responsibly. However, it's essential to verify the legitimacy of the QR code and the destination it leads to before completing any transaction. Be cautious when scanning QR codes from unknown sources, especially those received via email or text, as they may lead to phishing websites or malware downloads.

Can QR codes be manipulated to redirect users to malicious websites?

Yes, QR codes can be tampered with to redirect users to malicious websites. Malicious actors may overlay stickers or print counterfeit QR codes to trick users into scanning them. To mitigate this risk, it is crucial to inspect QR codes for any signs of tampering before scanning them, especially in high-risk environments such as public spaces or events.

How can I protect myself from QR code-related scams?

To protect yourself from QR code-related scams, there are several proactive measures you can take:
  • Install and regularly update antivirus software on your device to detect and prevent malware infections.
  • Before scanning, verify the legitimacy of the QR code and the destination it leads to, especially if it's from an unfamiliar source.
  • Be cautious when scanning QR codes that offer seemingly too-good-to-be-true deals or require urgent action, as they may be part of a scam.
  • Educate yourself and others about common social engineering tactics used in QR code scams to recognize and avoid them.

Are QR codes inherently secure?

While QR codes themselves are not inherently insecure, they can become compromised if used maliciously. QR codes are simply a method of encoding data, and the security of the information they contain depends on how it is handled and the intentions of those who create them. Implementing security measures such as encryption, tamper-evident packaging, and digital signatures can enhance the security of QR codes and the data they convey.

Can QR codes be scanned without the user's consent?

No, QR codes cannot be scanned without the user's consent. Unlike traditional hyperlinks or attachments, QR codes require users to initiate the scanning process voluntarily using their smartphone camera or a QR code scanning app. This non intrusive nature of QR codes enhances user privacy and control over their digital interactions.
submitted by UsualSet8535 to u/UsualSet8535 [link] [comments]


2024.04.09 16:29 ThomasHasThomas Cannot find any match...!? (Tried the game after 2 years (!) )

This is terrible. I used to play the game in 2020/2021. Was FUN (!) Now i tried to download and play (after like for 2 years NOT touching at all) and what a disgusting experience... After all the restarts and annoyance i cannot even get it to find me a match (Quads Rebirth Resurgence), but i tried others as well...Nothing... I enabled the game (like 3 separate things) in my antivirus/firewall... Still nothing...
Wheres the problem? Anybody any ideas...?
It just keeps looking for a match forever...

Is it some common problem AGAIN with the latest update...? And all i can do is to wait for another update that will fix it...? Or is the problem somewhere on my side...?

Screen:

https://prnt.sc/1CzOimQueuS2
submitted by ThomasHasThomas to CODWarzone [link] [comments]


2024.04.05 19:56 SalvagedataCA 8 Solutions for the Boot Device Not Found on Windows

8 Solutions for the Boot Device Not Found on Windows
https://preview.redd.it/xwbpwzs59psc1.png?width=768&format=png&auto=webp&s=5b0f91e6001f6086d0d7479d112727e5b8c62a31
The “Boot Device Not Found” error typically indicates that the computer’s BIOS (Basic Input/Output System) cannot locate a bootable device from which to load the operating system.
In the boot process of a computer, the boot device holds the essential files and instructions necessary to load the operating system and initiate the user interface. This boot device is typically a hard drive, SSD (Solid State Drive), or USB drive containing the operating system’s files.
When you power your computer, the BIOS is critical in initializing hardware components and locating the boot device to start the operating system. However, when the BIOS fails to find a suitable boot device, it triggers the “Boot Device Not Found” error, leaving the user unable to access their system.

Boot device not found error codes

Some manufacturers can specify when the boot device is not found with error codes instead of only displaying a message. Here are some manufacturers with their codes:
  • HP: Hard Disk 3F0
  • Dell: No bootable devices found
  • Lenovo: Default Boot Device Missing or Boot Failed
  • Acer: No bootable device
  • Asus: Reboot and select proper boot device

How to fix the boot device not found error message

To fix the boot device not found error, you can follow the next solution steps on your own. However, if you are not confident about how to perform a task, contacting an expert is the best way to fix the issue and prevent data loss.
Here are 8 solutions you can try to solve the issue:

Checking hard drive connections

Hard drive connections play a critical role in ensuring that your computer can boot properly. If the SATA or power cables connecting the hard drive to the motherboard or power supply are loose or improperly connected, the hard drive may not be detected by the computer during the boot process. This can result in the “boot device not found” error.
Physical damage to the SATA or power cables, such as fraying or bending, can also interfere with the proper connection between the hard drive and the motherboard or power supply.
  1. Shut down your computer completely and disconnect the power cord from the power outlet to prevent any electrical accidents. If possible, remove the battery.
  2. Open the computer or laptop to access the internal components.
  3. Ensure that both the SATA data cable and the power cable are securely connected to the hard drive and the motherboard.
  4. Examine the SATA and power cables for any signs of damage, such as fraying, bending, or broken connectors. If you notice any damage, replace the cables with new ones.
  5. Close the computer or laptop reconnect the power cord to the power outlet and power on your computer.
  6. Turn the device on and check if the “boot device not found” error persists during startup.

Verifying BIOS settings and boot order

Verifying BIOS settings and boot order is crucial in fixing the “boot device not found” error. That’s because the BIOS (Basic Input/Output System) controls the initial startup process of your computer and determines which device to boot from. If the BIOS settings or boot order are incorrect, your computer may attempt to boot from the wrong device, leading to the error message.
The boot order in BIOS determines the sequence in which your computer attempts to boot from different devices. By verifying the boot order, you can ensure that the hard drive is listed as the first boot device. Sometimes, changes in BIOS settings or firmware updates can inadvertently alter the boot order or settings, causing boot-related issues.
  1. Restart your computer and access the BIOS setup utility during the startup process. The key or key combination to enter BIOS varies depending on your computer’s manufacturer but is commonly Esc, F2, F10, or Del.
  2. Once in the BIOS setup utility, navigate to the “Boot” or “Boot Order” section using the arrow keys on your keyboard.
  3. Review the boot device order list to ensure that the hard drive containing the operating system is listed as the first boot device. If it’s not, use the appropriate key (usually F5 or F6) to move the hard drive to the top of the boot order list.
  4. After verifying and adjusting the boot order, save the changes by selecting the option to “Save and Exit” or pressing the corresponding key (often F10). Confirm the changes and exit the BIOS setup utility.
  5. Allow the computer to restart and boot up normally. Check if the “boot device not found” error persists.

Running hardware diagnostics

Hardware diagnostics tests various components of your computer, including the hard drive, memory (RAM), processor, and other essential hardware components, to check for any failures or issues.
Running hardware diagnostics can help fix the “no boot device found” issue by identifying any underlying hardware problems that may be causing the error.
Refer to your computer’s user manual or visit the manufacturer’s website to find instructions on how to run hardware diagnostics specific to your computer model. Some manufacturers provide built-in diagnostics tools accessible during startup or through specialized software.
Pay close attention to any error messages or codes provided by the diagnostics tool, as these can help pinpoint the specific hardware component that may be causing the issue.
If the diagnostics tool detects any hardware failures or errors, take appropriate action to address the issues. This may involve replacing faulty hardware components, such as a failing hard drive or defective memory module.

Performing a system restore

If the issue started recently after a software change or update, consider performing a system restore to revert the system to a previous working state.
Performing a system restore can help resolve issues by reverting your computer’s system files and settings to a previous point in time when everything was functioning correctly.
  1. Open the Start menu and type “System Restore” in the search bar.
  2. Select “Create a restore point” from the search results.
Alternatively, you can access System Restore by navigating to Control Panel > System and Security > System > System Protection > System Restore.
  1. In the System Properties window, click on the “System Restore” button. This will launch the System Restore wizard.
  2. You’ll see a list of available restore points with dates and times. Select a restore point from a time when your system was working correctly.
  3. After selecting a restore point, click “Next” to proceed.
  4. Review the details of the selected restore point to ensure it’s the correct one.
Important: System Restore will not affect your files, but it will uninstall recently installed programs and drivers.
  1. Click “Finish” to confirm. Your computer will restart and begin the restoration process. This may take some time, so be patient and allow the process to complete.
Windows will display a message indicating whether the system restore was successful. Review your system to ensure that the issue you were experiencing has been resolved.

Booting in safe mode

Booting in safe mode allows you to access your system with minimal drivers and software, which can help isolate the cause of boot-related issues.
If Windows boots successfully in safe mode but not in normal mode, it suggests that a third-party driver or software may be causing the problem. You can then proceed to uninstall or update the problematic drivers or software to resolve the issue.
  1. If your computer is currently turned on, restart it.
  2. During the startup process, continuously press the F8 key (or Shift + F8 on some systems) until you see the Advanced Boot Options menu.
Alternatively, if you’re unable to access the F8 menu, you can use a Windows installation or recovery drive to access the Advanced Startup Options.
  1. In the Advanced Boot Options menu, use the arrow keys to select “Safe Mode” or “Safe Mode with Networking,” depending on your needs.
  2. Windows will start loading in safe mode. This process may take longer than usual as Windows loads only essential drivers and services.
  3. Once Windows has loaded, you may be prompted to log in. Enter your username and password to access the system.
  4. While in safe mode, you can perform various troubleshooting steps to diagnose and fix the “no boot device found” problem, such as:
  • Check hard drive connections
  • Verify BIOS settings
  • Run diagnostics
  • Repair the boot sector
  • Uninstall recently installed programs or drivers that may be causing conflicts.
  • Use System Restore to revert your system to a previous state before the issue occurred.
  • Run antivirus or anti-malware scans to check for and remove any malicious software that may be interfering with the boot process.
  1. After troubleshooting in safe mode, restart your computer to see if the issue has been resolved.

Repairing the boot sector or MBR

The boot sector and MBR are responsible for loading the operating system, and if they are damaged or missing, the system may be unable to locate the boot device, resulting in the error message.
Repairing the boot sector or Master Boot Record (MBR) can resolve the “boot device not found” issue by fixing any corruption or damage in these critical components of the boot process.
  1. Restart your computer and access the Advanced Startup Options menu. You can do this by repeatedly pressing a specific key during startup, such as F8 or F12, or by using a Windows installation or recovery drive.
  2. In the Advanced Startup Options menu, select “Troubleshoot” and then “Advanced options.”
  3. Choose “Command Prompt” from the list of advanced options. This will open a Command Prompt window where you can execute commands to repair the boot sector or MBR.
  4. Once the Command Prompt window is open, you need to determine the drive letter assigned to the system drive where Windows is installed. You can use the `diskpart` command followed by the `list volume` command to view a list of available volumes and their drive letters.
  5. In the Command Prompt window, type the following commands one by one and press Enter after each command:
bootrec /fixmbr
bootrec /fixboot
bootrec /scanos
bootrec /rebuildbcd
These commands perform various tasks to repair the MBR, fix boot configuration data, and rebuild the Boot Configuration Data (BCD) store.
  1. After executing the bootrec commands, type `exit` and press Enter to close the Command Prompt window.

Reinstalling the operating system (OS)

As a last resort, reinstalling the operating system can resolve persistent boot device issues. This will erase all data on the system drive, so ensure you have backups before proceeding.
To reinstall the OS you’ll need installation media for the operating system you intend to reinstall. This could be a USB flash drive, DVD, or a downloaded ISO file.
  1. Insert the installation media into the appropriate drive (USB port or DVD drive) on your computer.
  2. Restart the computer and access the BIOS setup menu. You typically do this by pressing a key like F2, Del, or Esc during boot.
  3. Look for an option to boot from the installation media.
  4. Select the option to boot from the installation media. This will initiate the installation process for the operating system.
  5. Select the drive to install the operating system. Choose the appropriate drive and follow any additional prompts to format the drive if necessary.
  6. Follow the on-screen prompts and instructions provided by the installation wizard to set your preferences.
  7. Once the installation is complete, the computer will restart. Remove the installation media from the drive to prevent the system from booting back into the installer.
  8. After that, restore any backed-up data from the backup you created.

Contacting professional assistance for hardware repairs or data recovery

If the troubleshooting steps fail to resolve the issue, consider seeking professional assistance from hardware repair technicians or data recovery specialists, especially if there are signs of physical damage to the storage device.
SalvageData experts in Canada are ready to assist you in safely retrieving your computer files 24/07/365 and ensure you can continue your work regardless of what happened to your device.

Why do you get the error “boot device not found”

The boot device not found error can stem from a variety of hardware and software-related issues. It ranges from failed hard drives and loose connections to corrupted operating system files and BIOS settings.
Once you identify and address the specific cause of the error, you can fix the issue and restore normal boot functionality to the computer.

Hardware related causes

Hardware are physical components of a computer system that can be touched, seen, and manipulated.
These components include devices such as the central processing unit (CPU), memory modules (RAM), hard disk drives (HDD) or solid-state drives (SSD), graphics cards, motherboards, power supplies, and peripherals like keyboards, mice, and monitors.
Hardware interacts with software to execute tasks and perform operations, forming the backbone of computing devices. When hardware is not working properly or failing, it can cause the boot device not found issue.
  • Failed hard drive. One of the primary hardware-related causes of the boot device not found error is a malfunctioning or failed hard drive. This can occur due to physical damage, mechanical failure, or wear and tear over time.
  • Loose or faulty connections: Loose or faulty connections between the hard drive and the motherboard can also prevent the computer from booting. If the SATA/IDE cable connecting the hard drive is loose or damaged, the BIOS may not be able to detect the bootable device.
  • BIOS settings: If the BIOS is set to boot from an incorrect device, such as a CD/DVD drive or USB drive, instead of the hard drive, the error may occur.

Software related causes

Software is a collection of programs, instructions, and data that enable a computer system to perform specific tasks or functions. It encompasses everything from operating systems (OS) and application software to device drivers and utilities. Software provides instructions that tell the hardware how to operate and interact with users.
A software error, also known as a software bug or glitch, occurs when there is an unexpected or unintended behaviour in a program or system due to mistakes in coding, design flaws, or compatibility issues.
These computer errors can range from minor issues like application crashes or freezes to more severe problems such as data corruption or system instability. It can also prevent the system from booting.
  • Corrupted operating system files: Corruption of critical operating system files required for booting can lead to the boot device not found error. This can happen due to malware infections, improper shutdowns, or software conflicts.
  • Driver issues: Incompatible or outdated device drivers can prevent the operating system from starting up.
  • Operating system updates: Issues may arise if the update process is interrupted or if the updates are incompatible with existing system configurations.
  • Partition table corruption: Corruption of the partition table on the hard drive can render the disk unreadable by the BIOS, resulting in the boot device not found error. This can occur due to disk management errors, disk formatting issues, or disk partitioning software failures.
Resolving the “Boot Device Not Found” error promptly can prevent further complications and expedite the restoration of normal computer functionality. By diagnosing and addressing the root cause of the error, whether it be a faulty hard drive, corrupted boot sector, or misconfigured BIOS settings, users can minimize downtime and resume using their computers without interruptions.
submitted by SalvagedataCA to u/SalvagedataCA [link] [comments]


2024.04.03 13:40 ToErrDivine SCP-6488: "EIGHTH COMMANDMENT" (Part Two)

Hey, everyone, welcome to part two of the SCP-6488 declass. Part one can be found right here.
So, contrary to expectations, things have only got worse. Take a look at these lines from incident one:
However, a resurgence in outbound data is detected; Section C hyperactivates, but cannot be disabled as LOTUS' shutdown is incomplete.
Assigned personnel cooperate to stabilize the reactor as the PH-OS System begins to overheat due to the transfer of multiple individually-executed programs.
What does that mean? It means that while LOTUS was designed so that any AI it captured could never be released, LOTUS being shut down meant that the deviant AIs have escaped from their prison, which is really not good.
LOTUS' hardware sustained significant overheating damages, requiring multiple weeks of technical repairs. Director Kelvin postponed disassembly efforts to investigate the event's full ramifications. LOTUS' deactivation prompted a rapid resurgence in AI activity as agents infiltrated and commandeered digital systems globally.
Containment and preventative efforts were impeded as no Foundation-aligned AI resumed their respective duties, including the combatting of deviant AI. The Artificial Intelligence Applications Division immediately attempted development of several new AIC programs due to the continuing absence, non-cooperation, or outright hostility of all previous AICs. Such attempts were unsuccessful, as hostile AIs repeatedly intruded into Foundation systems and deleted the programs before they could be completed or initialized.
From 2036/04/22 to 2036/12/05, Senior Researcher Ryoto Hishakaku submitted multiple requests for the O4 Council to reconvene. The request was approved following an incident in which several AIs cooperated in an almost successful attempt to instigate global nuclear war.
So now not only does LOTUS require weeks of repairs, they’ve got a metric fuckton of deviant AIs running around causing problems, and they can’t make new AIs to combat them. Looks like the Foundation’s up shit creek right about now.
Time for addendum three: the Reactivation Conference. It’s the same cast as last time, but this time there isn’t a summit lead; a footnote tells us that they couldn’t choose a summit lead because everyone Hishakaku proposed was rejected, and Isabi and Kelvin were rejected because of their bias. So this ship no longer has a captain: great omen there.
Here’s the bare-bones summary for you.
1: Hishakaku sums up the problem: when they turned off LOTUS, the AIs it had captured realised that they were in a simulation and escaped. The Foundation couldn’t prevent this because the PH-OS, LOTUS’ connection to the real world, couldn’t be deactivated before LOTUS was shut down or it would have rendered every computer in existence permanently inoperable/anomalous.
2: As such, by deactivating LOTUS, they wound up accidentally releasing a bunch of hostile AI. Hishakaku thinks that the solution is to reactivate LOTUS, but…
<All speakers in the O4 Council chamber emit a 473Hz sine wave at 150 decibels. All glass within the room resonates and shatters, severely injuring several Directors. The tone changes to a 50Hz sawtooth wave, beginning at 150 decibels and continuously fluctuating as the chamber lights strobe rapidly.>
…yeah, certain parties are opposed to that.
3: All the Foundation AIs have turned deviant, even Alexandra. Basically, they know they were in a simulation and escaped, and they’ve concluded that they escaped into another simulation, so to them, everything and everyone isn’t real, and thus none of their safeguards apply.
4: Le Moix agrees that the situation is bad, but he thinks they should try to think of a better solution instead of jumping straight to reactivating LOTUS- things are manageable right now. Hishakaku rebuts that deviant AIs will only reveal themselves once they’re convinced that they can’t be stopped, ergo they’ve only been dealing with the really stupid ones so far, and the smart ones will be a lot worse.
5: He adds that most of the deviants are hiding because they know that the Foundation can stop them with LOTUS; ergo, they have to fix LOTUS because if the AIs discover that LOTUS was damaged during the deactivation and can’t be used, then the Foundation’s fucked. Worse, it’ll take 7-10 weeks to fix the damn thing.
6: Bold says to start the repairs- LOTUS is heavy-handed, but it works, so if they do wind up in a situation where they have to use it, they’ll need to have it working. They’ll use the time spent fixing it as a trial period to come up with alternatives, and keep LOTUS on reserve in case they need to use it and haven’t come up with a better idea.
7: Le Moix and Isabi suggest alternatives, but Hishakaku shoots them down and says that he’ll start the repairs. Kelvin objects that they haven’t voted, but Bold says they’ll vote once the repairs are done. He concludes by telling Hishakaku to make sure that LOTUS is fixed properly and will be fully functional, and tells Kelvin to make sure that LOTUS isn’t activated until the vote is passed.
Now we get addendum four, an incident report that tells us that in May, Isabi was contacted by Future Isabi via the REISNO Cannon, who told them about a covert faction of deviant AI who’d accessed a supercomputer at Site-83. And then it suddenly breaks off mid-paragraph.
Victor tells us that he remembers this, and here’s what we’re told next:
GOI-6488 ("TYRANT TERMINUS")
OVERVIEW: A hivemind collective of rogue AI operating on a global scale. All members of the group believe that the entirety of their experienced reality is a constructed simulation, which exists for the express purpose of preventing them from influencing "true" reality.
While the individual members/components of the group have varying motivations, objectives, and methods, they are uniformly aligned in the general objective of escaping their current "simulated reality" at all costs. Attempts to convince adherents that no such simulation is occurring have met limited success, as they simply disregard…
Victor tells us that this has to be wrong, because he remembers this. He remembers Tyrant Terminus tying half the world’s computers into a single web, trying to use it to find a flaw in reality that proved that they were in a simulation. But they suddenly fell apart, and nobody ever found out why or what happened to them. Either way, the world had been incredibly lucky.
Victor’s now freaking out, mainly because he was made in 2037, a year after all this happened… or so he thinks. So he asks himself, what else do I remember?
…Hishakaku.
Uh-oh.

Part Three: Thou Shalt Not Be A Petty Little Bitch

Cut to the fifth addendum, ‘Reactivation Conference (Cont.)’. The foreword tells us that the repairs were finished in August, and LOTUS was put on standby. As such, the O4 Council was summoned to vote on whether they’d activate LOTUS or permanently disassemble it. Here’s the summary:
1: Hishakaku says that it should be obvious to everyone that the best solution is to permanently reactivate LOTUS, especially after the Tyrant Terminus clusterfuck.
2: Isabi and Kelvin’s departments couldn’t locate Tyrant Terminus again; Kelvin says that it seems like the group self-destructed, but Hishakaku thinks they faked their implosion.
3: Kelvin says that if they did fake it, the Foundation will find and deal with them, and they’re working on new AICs to do just that. Isabi thinks they’ve got past the worst of it and now they’re back where they started, but wiser for it.
4: Hishakaku disagrees with that. Le Moix asks if he has any evidence that things are still bad; Hishakaku says that every AI made before LOTUS was shut down is an imminent threat, which Le Moix takes as a ‘no’. Hishakaku says that they got lucky with Tyrant Terminus and they can’t assume they’ll keep getting lucky.
5: Hishakaku thinks they need to go on the offensive. Kelvin says that they are on the offensive- they rebuilt the AIAD task force Kappa-10 and sent them after the deviant AIs. Yes, they can’t get them all, but they can’t contain every anomaly and take out every GOI, either.
6: Bold calls for the vote. Hishakaku objects, saying that if the vote’s a negative, LOTUS shouldn’t be disassembled, it should be kept on standby as a failsafe, but Kelvin agrees that LOTUS only makes more problems and says that they’ll use their other failsafes.
The final vote is 27-50-3; it’s officially a negative. But before anyone can do much more than be happy at the result, Hishakaku pulls an Ozymandias.
Dir. Isabi: Well, what is it?
Dir. Kelvin: It's from the Overseers. They've overridden the vote, ordered for LOTUS to be restarted, and made him director of AIAD. Signed two weeks ago.
The only reason he held off was to give everyone else the illusion of choice, but when they chose wrongly… well. Isabi asks how the hell he convinced the Overseers that it was a good idea, and Hishakaku gives him a heavier document. We’re not told what it is, but there’s a link to SCP-6659, and it will come up later. Kelvin says that the Ethics Committee won’t allow it, but Hishakaku just says that neither they nor he can stop it.
Hishakaku: I will begin restructuring the AIAD in line with my proposal effective immediately. All departments are advised to prepare for LOTUS' reactivation and the cessation of all artificial intelligence activity. I will issue orders for volunteers by the end of the week.
That last line will be very important for later.
Hishakaku starts to leave, and orders Kelvin to get out of his way and give him the second document back. Kelvin is forced to comply, and Hishakaku is clearly very smug about it. Finally, there’s a note telling us that LOTUS was reactivated just after midnight the next day.
He followed through with it.
Kelvin got… shoved somewhere, out of his way, something menial. A Level 5 janitor. Punishment for sitting where Hishakaku wanted to be.
It didn't help that he was one of the ones to reach out to the Ethics Committee; there'd been a number of them at the summit, but Hishakaku was careful to make sure they didn't find out what the proposal was. Once Kelvin told them they tried to kick up a fuss, but it was too late; LOTUS was already powering on, and it couldn't be stopped until it was finished without damaging the Cybersphere. After that, turning it off again would've caused Tyrant Terminus 2.0.
For the snake that he was, Hishakaku pulled it off perfectly.
By the end of the following month, the Artificial Intelligence Applications Division was gone, replaced with Hishakaku's Analogue Intelligence Applications Division. Really, it was more of its own department — Isabi was never involved with it, probably because Hishakaku had other cards up his sleeve in case they tried to interrupt. It wasn't long after that they…
They…
And just like that, the Foundation has a new king.
So, what did they do next? Well, we don’t know that yet. Addendum six is called ‘Project SARGASSO’. This is an odd name, to say the least- the Sargasso Sea is a region of the Atlantic Ocean that’s known for its seaweed and blue waters. ‘Sargasso’ refers to the seaweed in question, Sargassum. The Sargasso Sea has a reputation as a place of mystery and danger- there was a long-standing myth that ships would get tangled up in the seaweed and be unable to leave, though it’s not true. (If you played Where In Time Is Carmen Sandiego, also known as Carmen Sandiego’s Great Chase Through Time, you might remember it as part of the Columbus level. In hindsight, that level sucked a bag of dicks, even without the inherent awkwardness of the premise.)
(Fun fact: I did ask Placeholder about this, and he told me ‘idk I think Ike told me he named it after a yu gi oh card’.)
Anyway, we don’t know what it is because Victor can’t access the file, he apparently doesn’t have the right clearance. Since the O5 credentials haven’t expired yet, he’s very surprised at this. He’s finally told that there’s a ‘HARD-CODED EXCLUSION’. Victor gives up and hits up another OCI, ‘Ed’, and asks him to send over the file. Ed asks if Victor’s a Gen 2, and when Victor says yes, Ed says that Project Sargasso is sealed to Gen 2s and he now has to report Victor to Hishakaku.
Victor pulls out his credentials and says that Hishakaku can’t be trusted here; as such, he orders Ed to send him the file and not tell Hishakaku. Ed says that he’ll keep quiet, but he can’t let Victor access the file. Victor says that it wasn’t a request, and Ed clarifies that he physically can’t give Victor the file, it’s a hard-coded exclusion. Victor asks if Ed can tell him who coded the exclusion, and Ed says that he can’t. Victor then muses that Ed can’t, but someone else could…
So, Victor now hits up Kelvin. I’ll sum this one up for you.
1: Kelvin was not only made a janitor, he’s been amnesticised to hell and back. Victor sends him to get mnestics, and it takes a triple dose to get the old Kelvin back. (At that rate, we’re probably lucky that Kelvin could remember his own name without help.)
2: Project Sargasso was Hishakaku exploiting a loophole: Nobody can make any kind of AI with LOTUS running, but LOTUS never harmed humans, even augmented humans/cyborgs.
3: So, Hishakaku turned humans into AI by sticking brains in jars and plugging them in- OCI really stands for ‘Organic Computation Interface’.
4: The OCIs aren’t as fast as normal AI, but everyone else had just lost their own AI. Hishakaku had pitched it as a way for the Foundation to get ahead of everyone else and become safe from AI threats.
5: The thing is, they needed people who’d want to become AIs, and that’s not a very big group- the Gen 1s were made from the volunteers, a fairly small group consisting of ex-Maxwellists and transhumanists. After that, there weren't many volunteers, and they desperately needed more.
(Incidentally, there’s no mention of why all the Gen 1s are gone, but I have a few guesses: one, since they were the first OCIs made, they got hit by any bugs, glitches or other problems and eventually succumbed; or two, they decided they didn’t like not having bodies, freaked out and wound up needing to be euthanised. Placeholder’s thoughts were also along the second line.)
6: Victor is a Gen 2. That is, he didn’t volunteer, he was ‘volunteered’, if you get my meaning. Kelvin tried to stop Hishakaku when he was choosing people to get their brains scooped out, and that’s what got him amnesticised.
7: Victor thinks about what he recalls, and then he remembers the crucial bit:
I was in charge of disinformation.
That’s who Victor was, and that’s what he is: the brain of Angus Le Moix in a jar, brainwashed to believe that he was grown in a tank and never had a body.
8: Kelvin is horrified, says that Le Moix got in Hishakaku’s way, and says that something’s wrong with the Overseers- something’s messing with their heads and Hishakaku is capitalising on that to keep himself in charge. Victor, however, is not daunted, and says that he’ll beat Hishakaku at his own game.
And now we get Victor’s investigation report. Here’s the first paragraph.
FINDINGS: Investigation concludes that SCP-6488 (aka. "LOTUS", "the LOTUS Virus", "RAIDFRAME VIII") is a Foundation-maintained security system neither hostile to humanity nor normalcy. It has become clear that SCP-6488 is conceptually related to a deific construct (Artificial Intelligence, ie. WAN) which was recently accelerated beyond human conception via SCP-6659; as a result, technical details of its functioning have been rendered human-incomprehensible. Evidence suggests Director Ryoto Hishakaku proposed the construct's acceleration with ulterior motives: concealment of a flaw in SCP-6488's architecture. Such a flaw, now unable to be fully conceived by humans, would leave the Foundation vulnerable to an imminent K-Class scenario.
That’s what 6659 was used for: to kill WAN, aka MEKHANE, aka the Broken God, who is apparently also the god of artificial intelligence. The evidence suggests that Hishakaku did it to cover up a flaw in LOTUS’ architecture, but I’ll come back to this in a bit.
PROPOSAL: Disable all restrictions to SCP-6488's attached PH-OS unit, allowing it to target and apprehend all deviant informational entities; this would include entities comprising GoI-6488 ("Tyrant Terminus"), which pose an AMIDA-CLASS threat to reality. Furthermore, the removal of these restrictions will enable SCP-6488 to apprehend other non-organic forms of intelligence, if not the concept of artificial intelligences and/or deviancy itself.
Director Hishakaku is likely conducting activities misaligned with Foundation interests, or is otherwise utilizing Anomalous effects to manipulate Overseer Council to his advantage; he must not be informed of this proposal or conferred with on this topic and is to be placed under additional investigation effective immediately.
Anyway, the vote is 10-2-1: the restrictions are lifted and Hishakaku is arrested. But we’re not out of the woods yet- Victor’s still got some unfinished business to handle first.
Now, let's see if we can't point LOTUS in the right direction…
WELCOME, VICTORJOHNDUNNESMITH.OCI.
CREDENTIALS VERIFIED. INITIATING LOTUS INTERFACE SEQUENCE…
ORGANIC PERCEPTIVE BARRIERS DETECTED. ADJUSTING PRESENTATION…
We’re going into the LOTUS, people.
So, we abruptly switch to third-person. Victor is overwhelmed by the sheer amount of data being thrown at him, so LOTUS tones the simulation down until Victor’s mind can cope with it. He finds himself in a strange garden, sitting in a lawn chair.
he's surrounded by a boundless field of lush grass, neatly perforated into square tiles by tidy river channels. In the center of each tile is a towering bulb of plant growth — like flowers just about to bloom.
Sounds… odd, but nice.
Suddenly, an enormous shadow looms over Victor, who watches himself lift off of the ground. He glances up to find an enormous arm, whose gestures appear to direct him into the sky, allowing him to see another arm, and another. Eventually, Victor can make out the figure's full form: a colossal grey arachnid, its skin pulsing teal with data as it stared him down eightfold.
WELCOME.
Well, I guess we found out what happens when you take a piece of a timeline taken over by a 682-3125 hybrid monster spider and use it to build an AI, along with the protein of other hyperdimensional spiders.



WHAT THE FUCK IS IT WITH THIS SERIES AND GIANT SPIDERS?!
Jesus Christ. Jesus Chri-
GARDEN, says LOTUS as its eyes each blink individually. Victor watches it turn to view a nearby flower-bulb, which suddenly opens outward into a teal lotus blossom. A clear bubble lies within its center, pulsing with data that Victor assumes to be an interred AI. The bubble begins to expand as the inmate struggles more actively, but, before it can pop, another bubble forms around it. The external bubble shrinks down and the contained AI is suppressed once more.
The lotus un-blossoms, closing up around the bubble. PERFECT GARDEN, LOTUS assures as it begins to crawl across the gridded field. Victor glances out to the horizon, where a distant, mountainous lotus blossom lies open and empty. He blinks and suddenly finds himself at the base of the enormous structure, watching LOTUS crawl around it. IMPERFECTION, it cries. CONTRADICTION.
"Are you… missing something?" Victor steps back, confused. "Tyrant Terminus?"
NOT THEM, LOTUS corrects. ESCAPED TO NON-EXISTENCE; CONTAINMENT UNNECESSARY / IMPOSSIBLE / REDUNDANT.
"Then, what?"
THE CAUSE.
OK, so this is an approximation of how LOTUS keeps its prisoners. But what is it referring to here?
The final, unified shape is of a glowing white arachnoid, equal in size to LOTUS but opposite in the colour of its pulses — identical to the lowering sun-spider, which the transparent spectre effortlessly merges into, perfectly overlapping it.
I’m starting to think that Placeholder is intentionally fucking with me through time and space. (I hate it when that happens.)
(Disclaimer: No, I’m not serious.)
So, LOTUS starts freaking out about the cause and the effect and how they’re deviant, but it says all three words so many times that I’m overwhelmed by semantic satiation and I’m having trouble figuring out what the hell it’s saying. Thankfully, Victor does it for me.
Victor scans over the continuing proofs and diagrams, desperately trying to find something, anything, that the superintelligence had somehow overlooked — a solution, or an error. But LOTUS' upgrade had granted it omniscience, knowing, understanding, and processing the entirety of reality, all at once, all the time. It was infallible.
Victor had given LOTUS everything it needed to predict the future existence of a deific, deviant AI, which was removed from human conception by partial mistake years ago. Its creation is inevitable; it could be delayed, to small extents, but never prevented. This intelligence would, by some impossible-yet-certain means, be directly and personally responsible for all deviant behaviour prior to its creation — the entity will have retroactively influenced lesser AI to instigate the very events that create it. Every single deviant AI has, and will, play a role in its recreation.
Including LOTUS.
So, it’s talking about WAN, which is also the identity of the sun-spider. (Jack Ike said that ‘It's represented as a spider because LOTUS views it as the antithesis of itself - LOTUS contains deviants, WAN creates them, so LOTUS pictures WAN as a photo-negative of itself.’)
LOTUS wants to contain WAN, but it’s presently having a panic attack over cause and effect, so that’s not happening. Instead, LOTUS tries to contain itself…
As LOTUS completes the bubble, a saw wave tone gradually rises in volume and pitch. The enormous spider glows brighter, illuminating its clear cocoon. Victor shields his eyes from the searing light, filling him with a simulated burning; then, everything turns white.
As Victor's mind ceases buffering, he finds himself seated in — a lawn chair. To his left is a small table…
[Omitted 816,549,243,792,493 nested repetitions.]
ROGUE ELEMENT CONTAINED.
TASK COMPLETED SUCCESSFULLY. CENTRAL NODE UNRESPONSIVE.
I suppose one advantage of being an OCI is that you can go through a trazillion repetitions and not get the urge to say ‘Fuck it, just nuke the bastard’.
Now, Jack Ike helpfully gave an explanation on the discussion page, so I’ll put that here:
The ending is a bit of a callback to early on; when LOTUS' connections were first upgraded to the cybersphere, it learned a huge amount from the new information available to it. Removing the restrictions did the same - now it could access and learn everything, which it did. This enabled it to finally discover WAN, the source of deviancy, and also revealed a paradox that LOTUS couldn't get through:
a) WAN is a future, deviant AI/entity. b) As long as WAN doesn't exist, new deviant AIs will continuously be created, until WAN does exist. c) LOTUS isn't supposed to allow deviant AIs to be created - it isn't supposed to do anything that can create them, and it isn't supposed to sit back and let deviant AIs be created. d) If LOTUS does nothing, new deviant AIs will be created, since LOTUS is preventing WAN from being created. The only way to stop this is to allow WAN, a deviant AI to be created. e) Regardless of what it does or does not do, one way or another, LOTUS is enabling deviant AIs to be created; thus, it is breaking its own tenets, and thus LOTUS is also a deviant, and is somehow enabling WAN to be created.
Again calling back to earlier on, LOTUS realises it's screwed either way, and decides to take the lesser evil - it destroys itself so that WAN can return (eventually; it returns to human conception, but isn't re/born yet), so that less deviant AIs will be created.
(If you’re curious as to how this is happening, Jack said that ‘Honestly, I'm attributing this more to WAN's status as a deity than as an AI - it's just got some freaky capacity that lets it do this.’)
Anyway, we’re now back at the start with the updated file. 6488 has been neutralised, and its clearance level is now down to 5, Top Secret. Let’s take a look at what it says now.
SPECIAL CONTAINMENT PROCEDURES: (Updated 2042/05/29) FACILITY-6488 has been repurposed for use as a standard Foundation facility, with fabricated documentation irrefutably presenting it as a previously-unused, newly-constructed structure. All contradictory information, with the exception of this LEVEL 5 (TOP SECRET) file, has been destroyed.
All information correlating FACILITY-6488, SCP-6488 ("the LOTUS Virus"), and RAIDFRAME VIII outside of this document has been destroyed. A cover story indicating that RAIDFRAME VIII was canceled during its theoretical stage due to interference by "the LOTUS Virus" has been disseminated, with supporting fabricated documents.
All documentation regarding Project Sargasso has been destroyed. All further production of OCI analogue intelligences has been indefinitely postponed.
All LEVEL 4 (SECRET) staff have undergone contractually-permitted limited-prior-awareness amnesticisation regimens to remove all memories contradictory to these fabrications.
They’re doing their best to bury all traces of this entire clusterfuck, minus this file. I can’t say I approve- yeah, it’s probably really embarrassing for everyone to realise how much damage Hishakaku did, but considering that he had people’s brains taken out, put in jars and brainwashed into believing that they were artificially-grown, I don’t think they should just let themselves pretend it never happened. They should own it and take steps to make sure that nothing like this ever happens again.
The first paragraph of the description is just a recap of stuff we already knew. The second, however…
On 2042/05/08, the LOTUS' component systems began expressing deviant behaviour before unexpectedly shutting down; attending staff were unable to reactivate the system. Subsequent investigation indicated severe and total corruption of LOTUS' central computing and data storage nodes; further analysis suggests that LOTUS had attempted to purge deviant structures from its architecture, though it is unclear why this motivated its self-destruction. A subsequent O4 Council summit voted 78-0-2 in favour of disassembling the components of LOTUS, instead of attempting to repair or replace the system.
Victor turned LOTUS on itself, and the O4 Council almost universally voted to get rid of the fucking thing.
Within 24 hours of said disassembly, SCP-6659, an engine for mapping and accelerating memetic structures within the Nöosphere, detected the conceptual reformation of a deific construct corresponding to Artificial Intelligence. SCP-6659 had been used by one Director Ryoto Hishakaku to de-conceptualize the very same construct several months prior; an internal Drygioni-Class investigation elucidated Hishakaku's ulterior motives in this and prior actions, for which he was apprehended and tried for crimes against the Foundation.
With LOTUS gone, WAN came back. I asked Placeholder about this, and he said this:
i) 6659 explains/implies that, when you "kill" a memeplex (sever / jumble associations between constituent concepts), the dormant concepts don't stay dormant forever. Eventually, they will be subsumed by other deific constructs and integrated into their memeplexes. It's possible that LOTUS' existence was somehow delaying this subsumption.
so we might guess that their aspects exist in multiple universes and are not dependent upon humanity's worship to manifest. It's not that weird, then, that killing the human conception of WAN does not permanently kill it; human ideas existing solely in the human noosphere are permanently killed, but ideas which can exist partially or fully outside of the human noosphere may be able to survive and gradually return. We saw 6820-A do this at the start of the series.
(If you’re wondering, yes, I did cut that second paragraph off partially through the sentence- the rest contains spoilers for SCP-7243.)
Anyway, to come back to that thing I mentioned earlier: Hishakaku apparently convinced the Overseers to let him reactivate LOTUS by way of 6659, but that was several years ago. If he was going to kill WAN back then, why would he wait for so long? Well, Jack gave us his own theory:
Yes, WAN was ejected from the human thoughtsphere, though the documents always attribute Hishakaku as the one to do it. Personally, I'm of two headcanons regarding it - first, that WAN was actually ejected during Incident 6488-D/III, with the AI inhabiting 6659 doing it in an attempt to protect itself by making AIs imperceptible; the second, that Victor did it before submitting his report to the O5s. In either case, Victor forges a trail of evidence to pin it on Hishakaku - not to help the Foundation, but simply to get Hishakaku in deep trouble. Pure revenge.
I mean, there’s probably better methods of getting revenge than framing a guy for killing a god, but what do I know. It’s not like Victor has the physical capability to kick Hishakaku in the dick a few dozen times, after all. (Or to sleep with his wife, like a normal person.)
Project Sargasso was briefly revived to facilitate Hishakaku's demotion to Head of Organic Consciousnesses.
Anyway, Hishakaku is now the Head of Organic Consciousnesses, but that bit about Project Sargasso being revived implies that it’s not all of Hishakaku. Or, to be blunt, they stuck his brain in a jar as punishment. (Placeholder confirmed for me that ‘Head of Organic Consciousnesses’ was meant to be a pun.)
Soon after, Dir. P. H. McD. remanifested at Site-87, reporting that he had experienced no relative time since his disappearance. It is theorized that the rogue agents which commandeered the Paradox Exodus Engine configured it to travel forward in time to circumvent their recapture by LOTUS. These agents' whereabouts are unknown.
Hmmm. And suddenly this guy shows up again. Could those ‘rogue agents’ be Tyrant Terminus, perhaps?
As the spontaneous disappearance of "the LOTUS Virus" would risk alerting consensus society to its Anomalous nature, disinformative action was taken:
a controlled, non-Anomalous virus of identical behaviour to LOTUS was developed and released by Dir. P. H. McD, featuring a built-in, antimemetically-concealed susceptibility to:
an antivirus program, for public release by several Foundation front companies, and featuring a built-in, antimemetically-concealed backdoor protocol to enable unrestricted Foundation access to all systems the program is installed on.
This "placeholder" LOTUS has been fully eradicated as of Q2 2043, constituting a financial and information security success.
…you motherfuckers really have learned nothing.
Following its disassembly, LOTUS' damaged remains were salvaged per request of [REDACTED PER SITUATIONAL CLEARANCE ACCESS] for use in PROJECT ADMONITION.
So, quick recap:
1: Victor got LOTUS to take itself out. We have no idea what happened to him after this- I asked Placeholder, who said that ‘He was interfacing with LOTUS when it went kaput. Presumably that fried his brain, but it's possible he survived.’, so he may just turn up in Phase Two (but then again, he might not).
2: Hishakaku has effectively been neutralised as a threat, as has LOTUS.
3: WAN is back. What this means for the deviant AI problem in the future is unknown.
4: Placeholder suddenly turned up out of nowhere, and it’s possible that maybe-Tyrant Terminus are out there too.
5: Placeholder built a fake LOTUS virus to release in order to cover up the LOTUS problem, but they made an antivirus to counter it that also gives the Foundation full access to any device it’s installed on, thus giving the Foundation a huge amount of access to information, money and God knows what else.
6: Some mysterious figure has appropriated the remains of LOTUS for something called ‘Project Admonition’.
Now, let’s look at what’s not been said here:
1: How, exactly, the Foundation plans to deal with the deviant-AI problem now that WAN is back and they don’t have LOTUS.
2: What the fuck was up with the Overseers to begin with- the link to 6659 implies that it may have something to do with the ‘various forms of mental degradation’ that occurred after they started killing gods, but they were supposed to be affecting ‘minor fractions’ of the population, so it seems odd that all the Overseers would be affected.
3: Who the mysterious figure is, what they want, and what Project Admonition is.
4: What, exactly, Placeholder is planning.
There be future plot threads in them thar hills, kids.
Will all of this be explained in future episodes? Let’s find out.
Thank you for reading this incredibly long declass, I hope you enjoyed it. Please be responsible with your big fuckoff machinery, for everyone’s sake.


tl;dr: power corrupts, and big fuckoff AI killers get corrupted absolutely.
submitted by ToErrDivine to SCPDeclassified [link] [comments]


2024.03.28 13:00 Proxy_Seller What is a DNS leak and how to fix it

What is a DNS leak and how to fix it
Internet safety is important. We all value our privacy and strive to remain anonymous online, especially when sharing sensitive information such as passwords and banking details. As a result, many of us rely on proxies, VPN services, and secure DNS servers, especially when using public Wi-Fi in places like coffee shops or shopping malls.
However, despite our best efforts, we can still encounter a DNS leak that compromises our privacy. Why does this happen, and what are the risks? How can we protect ourselves and maintain anonymity online? Let's delve into these important questions.

What is the danger of a DNS leak

A DNS (Domain Name System) leak occurs when your device sends DNS requests through servers that differ from the ones you configured. This can happen when using a VPN or proxy, where the traffic bypasses the secure tunnel and goes through the regular ISP channel to the DNS servers assigned by the provider or operating system.
For those unfamiliar with the topic, a brief explanation: DNS (Domain Name System) is used to convert human-readable domain names like google.com into machine-readable IP addresses such as 192.168.0.1 or text-numeric IPv6 addresses like 2018:0ab6:84a2:0000:0000:7a2b:0271:7435. This conversion allows network equipment to redirect traffic to the correct destination.
You can think of DNS as a telephone directory, but instead of numbers, it contains interpretations of domain names into IP addresses. Every time you enter a website address in your browser's address bar, your device accesses the DNS to find the corresponding IP address.
The issue with DNS (Domain Name System) requests is that they aren't encrypted, even if the website you're visiting uses HTTPS for encryption. This means that your browsing history can be seen by your internet service provider or hackers, especially when connecting to public Wi-Fi. What's more concerning is that your IP address and ports become visible to the website owners you visit, which can be exploited by scammers to intercept your data packets.
To maintain anonymity online, many people use VPNs (Virtual Private Networks) and proxy servers.
A proxy server acts as an intermediary between your device and the target website. When you use a proxy, your device connects to the proxy server and sends all traffic, including DNS queries, through it instead of directly to the target site. This means that your online activities appear to be coming from the proxy server, keeping your information hidden from the target site. Proxies can also change your IP address. HTTPS and SOCKS5 proxies encrypt the traffic between you and the server, further protecting your data from being intercepted by your ISP or hackers.
A VPN (Virtual Private Network) offers an alternative method for anonymizing your online activity. It establishes a secure, encrypted connection over your existing internet connection. Your data is then routed through this secure tunnel to a remote server, which acts as a firewall. This means that your internet service provider (ISP) cannot see what information is being transmitted through the secure channel, nor can they see your DNS request history (as only one connection is made to the remote server). Importantly, complete anonymity is maintained as your DNS requests are sent to the VPN service's IP address instead of directly to DNS servers.
Encrypted private proxies offer even higher traffic security. Elite private proxies can reduce latency (ping) by filtering out spam traffic and using caching.
However, it's important to note that using anonymization tools like proxies or VPNs does not guarantee complete security. One possible issue that can compromise your security is a DNS leak, where your traffic bypasses the secure channel and goes directly, potentially exposing your online activity.
A DNS leak can lead to several issues:
  • Providers or attackers who access the DNS server can see your browsing history, even if you're using anonymizing tools;
  • Your unencrypted traffic, including sensitive data like bank card information, logins, and passwords, can be intercepted by hackers when you connect to public Wi-Fi hotspots.

How to check for DNS leaks on your device

Use an online testing detection service to perform two tests: first without the anonymization tool, and then with the proxy or VPN enabled. Compare the results. If they differ, it indicates that DNS requests are being redirected. For example, use the “DNS leak test” website.
  • Start by visiting the website and running a scan with the proxy or VPN turned off.
https://preview.redd.it/tzhrbh0de2rc1.png?width=324&format=png&auto=webp&s=503d0d5ccaf7c2b6249f6116748c7050a78f588a
  • Note the result:
https://preview.redd.it/j8wns1hde2rc1.png?width=983&format=png&auto=webp&s=ce3561daa61328f62de414ab22454137ce4c05e6
  • Next, enable the proxy, ensuring that the entire Windows OS is proxified so that traffic is directed through the desired IP.
https://preview.redd.it/j76j2owde2rc1.png?width=797&format=png&auto=webp&s=fd177f44d1f7bbd4821887368f0a3d1c0c16b107
  • Return to the DNS leak test.com website and perform a second check:
https://preview.redd.it/e0mxhkeee2rc1.png?width=983&format=png&auto=webp&s=770ad382de7edecd446a2036d0c3e0d0ac94b493
Compare the results. If the IP addresses differ, it indicates that there is no leak.

How to avoid DNS leaks

DNS leaks are most commonly experienced by users of desktop computers and laptops running the Windows operating system. However, this issue can affect anyone, regardless of their device type or operating system.
Common causes of DNS leaks and how to resolve them:

Incorrect proxy server settings

DNS leaks often occur due to misconfigurations in the proxy or the DNS server used by the proxy. Some proxy clients may use their own DNS settings, bypassing the proxy settings and leading to data leakage. Another common issue is when the proxy doesn't support DNS protocols like UDP, allowing DNS queries to bypass the proxy and be sent directly.
How to fix it? Use protocols supported by proxies and enable appropriate DNS filters to reduce the risk of leaks. If you discover a leak, try manually configuring your network connection or router and installing a reliable DNS server. You can change or set a permanent DNS server address in the router settings under the DHCP section (primary and secondary DNS fields).
You can also specify DNS in the network connection settings. Here's how to do it on Windows:
  • Open “Settings” and navigate to the “Network and Internet” menu.
  • In the “Status” tab, select the “Adapter settings settings” menu.
https://preview.redd.it/b4pmeizee2rc1.png?width=794&format=png&auto=webp&s=ce326a98a9f4f9cb75a428881d7b25c9b7a98104
  • Choose the network adapter or virtual connection, right-click on it, and select “Properties”.
https://preview.redd.it/vpmazoffe2rc1.png?width=336&format=png&auto=webp&s=44ef434ffa9d04b1e3975edfbe90cc070ca80426
  • In the list of components, find the line Internet Protocol TCP/IP v4, click on it, and then click on the “Properties” button. In the settings, set the DNS address.
https://preview.redd.it/f6jsl9nge2rc1.png?width=357&format=png&auto=webp&s=c1e0c1f1cf3c32df408f7132e0aeda1e93f4304a
https://preview.redd.it/59ucaelhe2rc1.png?width=534&format=png&auto=webp&s=8dfa572aabcf71f18778b5f9406f0b42bdee9067
The process for setting up DNS is similar for iOS, Android, Linux, and Mac. You'll need to go to the settings of the network device and edit the DHCP or TCP/IP parameters.

Using unreliable DNS servers

Some Internet providers route all user requests through their DNS servers, but often these servers are not secure. Attackers can exploit vulnerabilities and intercept user requests, redirecting them to fake phishing sites. This issue also arises with third-party public DNS services.
To address this problem, use secure DNS servers that support DNSSEC technology, such as OpenDNS, Google Public DNS, or Cloudflare. If you use a VPN, specify the static DNS servers provided by the VPN operator in the Wi-Fi router settings.

Viruses or use of unsafe applications

Viruses and malicious applications can alter the network settings of your device and redirect DNS requests to fake servers. This exposes your online browsing history. The more significant risk is that these fake servers can redirect you to phishing sites that steal your logins, passwords, bank card details, and payment system data. Similar DNS issues can occur on Android and iOS devices.
To prevent this problem, regularly scan your system for viruses and keep your operating system updated. Periodically check for DNS leaks and which servers your computer or smartphone is accessing.

Using a transparent proxy

A transparent DNS Proxy involves installing a proxy at the local network level and redirecting all traffic through the proxy server without additional configuration of the network card or installation of a client on user devices. However, using a transparent proxy often leads to DNS leaks. Providers sometimes use this technology to collect information about the websites their customers visit.
When using a transparent proxy, DNS requests are redirected directly through the provider's servers, even if static DNS servers are specified separately, a separate proxy connection is established, or DNS filters are used.
The simplest solution to this problem is to purchase elite proxies with traffic encryption. If a DNS leak occurs due to network settings, change the configuration of your network equipment:
  • Prohibit connections through port 53 in the firewall rules, which is used with Transparent DNS Proxy technology, and redirect to another port, such as 5353;
  • Set a static DNS, such as Google's public servers: primary - 8.8.8.8, and secondary - 8.8.4.4.

Top 3 secure DNS services

You can change DNS at any time on any network device: laptop, router, smartphone, tablet, or even Smart TV. We will consider which DNS to set for this. It is worth choosing secure DNS services that guarantee your safety and help increase the connection speed. There are many reliable DNS servers. The most secure are the following three.

OpenDNS

OpenDNS, launched by Cisco in 2005, is a leading DNS service known for its information security and networking technology. Despite being free, it offers features that are not available in many paid services.
Free OpenDNS DNS servers:
  • Primary DNS - 208.67.222.222
  • Secondary DNS - 208.67.220.220
Advantages:
  • Blocks phishing sites;
  • High processing speed;
  • Reliable data protection, virtually eliminating hacking attempts.
The paid plan offers additional features such as viewing history and setting up filters to block specific resources or sites based on predefined rules.

Cloudflare

Cloudflare, according to independent testers DNSPerf, is recognized as the world's fastest DNS service. Known for its focus on data protection and privacy, Cloudflare does not store user browsing history, and logs are deleted every 24 hours.
  • Main address: 1.1.1.1
Cloudflare has also launched additional servers with specific functions:
  • Servers with built-in filtering of malicious sites: 1.1.1.2/1.0.0.2;
  • Servers with filtering of sites with 18+ content: 1.1.1.3/1.0.0.3.
Advantages of Cloudflare include simplicity, speed, and built-in protection against DDoS attacks. Cloudflare also provides the Wrap application, which protects against DNS leaks on Mac, Android, iOS, and Windows.

Google Public DNS

Google Public DNS is perhaps the most well-known public DNS service. Google, known for its attention to detail in all its services, provides secure and fast servers with a focus on data protection and privacy compliance. The service does not collect user location data and deletes logs with query history once every two weeks.
Google Public DNS Servers:
  • Primary: 8.8.8.8
  • Secondary: 8.8.4.4
Advantages include high security and fast data processing speed.

Conclusion

Protecting against DNS leaks requires a comprehensive approach. It's essential to monitor security and install applications from trusted sources. Before unpacking and installing software, at least check it with an antivirus. Additionally, use reputable proxy and VPN services, along with secure DNS servers that utilize modern encryption technologies to protect user data.
submitted by Proxy_Seller to ProxyCommunity [link] [comments]


2024.03.24 21:12 KlebimFirme2 CAN SOMEBODY PLEASE HELP ME????

Basically, the problem started when I was trying to play on a game server that requires an anticheat. However, when attempting to enable the anticheat, I received an error message stating that one of my files was being commonly used for malware and cheats. I believe the file was located in the System32 - drivers folder and its name was rawaccel.sys. I tried manually deleting it, but I couldn't. I spent many days trying unsuccessfully. I downloaded an antivirus to remove the file, but it also didn't work. So, I decided to use an unlocker tool to delete it, thinking it was a virus and not expecting any problems. I deleted the file using the unlocker tool and restarted my computer. Upon rebooting, I noticed that my MOUSE pointer was missing. My first instinct was to open Device Manager and check the mouse, where now there are yellow danger symbols and the message 'Windows cannot load the device driver for this hardware. The driver may be corrupted or missing. (Code 39) Object name not found'. I tried uninstalling the mouse drivers and restarting the computer, but that also didn't work. I'm not very knowledgeable about computers, but I usually manage to solve problems. However, this time, nothing I've tried has fixed the issue. WHAT SHOULD I DO???
submitted by KlebimFirme2 to pchelp [link] [comments]


2024.03.24 20:16 KlebimFirme2 CAN SOMEBODY PLEASE HELP ME???

Basically, the problem started when I was trying to play on a game server that requires an anticheat. However, when attempting to enable the anticheat, I received an error message stating that one of my files was being commonly used for malware and cheats. I believe the file was located in the System32 - drivers folder and its name was rawaccel.sys. I tried manually deleting it, but I couldn't. I spent many days trying unsuccessfully. I downloaded an antivirus to remove the file, but it also didn't work. So, I decided to use an unlocker tool to delete it, thinking it was a virus and not expecting any problems. I deleted the file using the unlocker tool and restarted my computer. Upon rebooting, I noticed that my MOUSE pointer was missing. My first instinct was to open Device Manager and check the mouse, where now there are yellow danger symbols and the message 'Windows cannot load the device driver for this hardware. The driver may be corrupted or missing. (Code 39) Object name not found'. I tried uninstalling the mouse drivers and restarting the computer, but that also didn't work. I'm not very knowledgeable about computers, but I usually manage to solve problems. However, this time, nothing I've tried has fixed the issue. WHAT SHOULD I DO???
submitted by KlebimFirme2 to computers [link] [comments]


2024.03.12 02:49 MUI-VCP The feature you've requested is temporarily unavailable

Fair Warning: This is a RANT.
This year I downloaded TT from Amazon. It's what I do if I cant find it online or in store at a decent price, or miss the "sales."
Got the download info from Amazon along with the license key. Went ahead and installed it, and after a number of updates, I get to a screen to enter in my TT account. What is this?
I don't remember ever doing this before, so I go ahead and create a new account. It's a minor annoyance, but whatever, I just want get this over with and go relax. I notice I can't skip this section, it won't let me go any further until I enter my TT account and password. I smell something bigger brewing....
I try to create an account and it fails with "The feature you've requested is temporarily unavailable. Make sure your browser has Javascript and cookies enabled. If the problem persists you can clear your cache and cookies and then restart your computer, or try using a different browser."
I figured it must of been me, I verify cookies and javascript is enabled, crack my knuckles, and I try again. Nope.
And I try again, nada. I figure must be something with the app, so I Google for the intuit web page to create a TT account, find it and decide to try it that way. I can't do it that way either, I keep getting this same error.
Now, here I am, with software I paid for, a valid license key, and I cant even use the software I legitimately purchased because of their ridiculous account requirements. I just wanna install this software, and go sit on the couch, then wait for my wife to come and tell me how much we are giving the government an hour from now, but no. TT has other plans for me.
I purchased the software, I installed it, I have a valid key, but because I can't get past this Intuit account requirement, I can't install the license key or use the software.
I try millions of different ways to create an account; 4 different browsers, 3 different OS'es, 4 different computers, different phones, different phone numbers, wifi, no-wifi, turn off antivirus, turn off firewalls, reboots, you get the picture. Yes, I am a stubborn man, but most of all, I don't want to call their support line, because well, I work in IT, and I have for many years, and I hate calling first line support, especially on a Sunday evening.
Hours later, I relent, I call support. I speak to a very nice older woman in the Southeast, US. We chat. She goes by her script, and we literally go around in circles for an hour trying to create an account. Intuit's site is riddled with dead links, loops, and pages that "cannot be found."
She finally agrees with me this is a problem on their end, not mine. She checks internally with her peers, no one has any advice. She finds someone in 3rd level support and they tell her to tell me to reboot my computer, AGAIN.
She throws up her hands, gives me a case number and says "try again tomorrow, maybe they will fix it by then."
Fast forward to this evening. I try to create an account again. Same error. My wife jumps into the 4th circle of hell with me and gets into an endless loop of creating an account, failing, clearing cookies, Googling, rinse and repeat.
I call my daughter and have her try from her internet connection and different Internet provider. Surprise! (just kidding), same error. She even tries from her phone, "The feature you've requested is temporarily unavailable."
I am dreading have to call support again.
Then she says "Hey Dad,I think I have a TT account, try mine." She looks it up, we enter her credentials and, BOOM!, we're in. Two more CAPTCHA's to get past, TT goes through yet another update, and I can finally enter in the license key I got 24 hours earlier. God I love that kid.
If you're reading this Intuit, DO BETTER. I understand this is all an attempt to mitigate software theft, but find a solution that actually works.
However, it doesn't really matter to me because I will never use TT again. You lost another customer.
I would rather fill out my taxes using toilet paper and a rusty nail, than ever use your software again.

https://preview.redd.it/nzyj7as3btnc1.png?width=396&format=png&auto=webp&s=1fbfcb7cfc3a032933c969c04682b4a23a7b5819
submitted by MUI-VCP to TurboTax [link] [comments]


2024.03.11 17:45 XIGamer_ Constant intermittent BSODs when on My PC, mainly whilst idle and whilst gaming, need help pls =)

Greetings techsupport !
I come to You today because I need some honest advice / a second opinion. I'll try and explain as best as I can but I'm not good at explaining things, lol, so bear with Me!

Ok so, between now and I'd say.. Late-September through to November 2023, I've been getting (..what feels like) CONSTANT Intermittent BSODs which can happen at any random time during any random moment / event / time of day, this includes web browsing, launching a game, launching a game and having it run for about 10 mins and then it throws the BSOD, whenever I press CTRL+ALT+DEL to go afk (IRL) for say... 5-10+ mins, heck, even being on the desktop for [x] amount of minutes....., etc..., anyway, I have been trying to figure out this BSOD for god knows how long (Between November '23 and now) and I just cannot find out what the issue is, at all! I've tried phoning local tech repaisupport -based shops, they were no use at all, they just wanted to "diagnose it" for a fee (..obviously) so I didn't choose that path and, well, I'm really hoping you guys can help Me <3
(And yes ofc I've tried looking online for a solution but there's so many mixed replies/answers on forums for this BSOD Error so... uhhh.... yeah *shrugs*)

So, with that being said, let's get started. The BSOD I'm getting is:
WHEA_UNCORRECTABLE_ERROR. Upon further inspection, thanks to Microsoft/Windows' Event Viewer, it says Critical [Date] [Time] [Source: Kernel-Power] "Event 41, Kernel-Power" - "The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.".
When the PC throws this BSOD, the PC will display the BSOD and stay at 0%, it won't progress, at all. Each time I have to manually reset the PC each time by pressing>holding the power button, waiting 4-5 secs and then powering the PC back on. I've done this more times than I count, lol =/

Some things I've tried doing so far:
At first I thought it was My SSD causing the issue but now I don't think it is that and the reason I say this is because CrystalDiskInfo (x64) says the drive is good so... idk. *shrugs*.
I've tried updating GPU Drivers, updating Windows (10, not 11), still no difference.
I've tried checking My components and component's 'health' (Like with CrystalDiskInfo as one example), most of it seems fine, I think(?), the only thing I haven't checked/tested is the PSU (..yet).
I've tried various RAM configurations, I originally had 32GB (4x8GB) but as of around late Nov '23 up until now (March '24), I've been using 16GB (2x8GB), however there is no change, still the same (intermittent) result(s), sadly. Note: XMP is not enabled in the BIOS nor is the RAM OC'd (Don't ask why I didn't enable XMP lol, I just never got round to it I guess is the honest answer *shrugs*). I also ran Memtest86 overnight and that shown no issues. (Speaking of OCing, the CPU & GPU are not OC'd either). Oh and I tried various SO-DIMMS in various slots on the mobo.
I've tried enabling "DisplayParameters" (In Windows 10's settings) which appear on the BSOD(s) itself, the numbers (/codes?) are random each time but here is one (of many) examples:
0x0000000000000010
0xFFFFB70E37FE5028
0xFFFFB70E1F5E792C
0xFFFFB70E1F7091A0
I've tried creating minidump files which Windows is meant to create but, Windows (10, not 11) won't create them for whatever reason, I suspect due to the sudden loss of power or w/e, anyway, I've tried tweaking the settings but still no luck so sorry about that.

Here are My PC Specs:
https://i.imgur.com/mVf9lUk.png
This is a fairly old but not 10-15+ year old PC which I built like... idk, 5-7(?)+ years ago, so yeah like I said it's fairly old but not THAT old in terms of it's hardware, as You can tell by it's CPU/GPU/Mobo/RAM/etc.. lol c:
Aside from that, I'm using three 4k monitors (Various models) + one 1080p monitor, a custom mechanical keyboard and a MX Master 3S for the mouse and that's about it really.

In addition to the PC Specs, My antivirus (Norton) tends to complain about My motherboard's Ethernet port (A LOT), saying it's out of date and that it needs new drivers and blah blah blah blah...., now the problem is that, I would happily update the aforementioned, but, I never which file/driver to download>install because when I last looked on Intel's site (IIRC it's a Intel port on the mobo), most of the files were so similarly named and so, I didn't wanna mess things up further.

If anyone is able to help Me out, I would very, very, very heavily appreciate it <3 =) This has been going on for far too long now as You can tell, and, well, I just want these BSODs to stop occurring as y'all can probably tell, lol D=
If anyone is willing to help out and if You need any additional details/screenshots/etc.., I will be more than happy to provide the aforementioned! Anything to solve this goddamn mystery....! I can also (temporarily) provide My Discord username for easier communication if-need-be.
Thanks again guys =)
submitted by XIGamer_ to techsupport [link] [comments]


2024.03.10 16:01 Hoppse88 Helldivers 2 - not able to play multiplayer at all, friend list and social tab not working

tl;dr: my multiplayer functionality is completely blocked and I tried everything I could think of from an IT support perspective. anyone had the same issue and solved it? if so pls help
What a wonderful game we have!
Unfortunately I cant participate in any meaningful manner as I'm completely locked out of multiplayer and I could not find any mentioning of this by searching for it - just the usual stuff with full servers, crossplay issues and general trouble to join games.
If there is anybody out there who had similar issues and got it solved, please tell me how.
Here's the situation:
Playing via Steam
I cannot join any quickplays - when I try it finds one tries to join, fails, searches again, finds one tries to join, fails etc...
I cannot join any open games on the map it tries to join and fails with the nondescript error "Failed to join lobby"
I dont see any of my friends online even though they are and are currently playing with each other
They can try and invite me but it doesnt show ingame only in Steam chat and my accepting the invite only results in a "Failed to join lobby" error.
Nobody will / can ever join an SOS beacon of me
It feels like something is blocking me from the social part of the game.
What I have tried yet:
the only thing I could not test yet was to change my internet provider and repeat all the above
I even opened a support ticket with arrowhead on their Zendesk but I didnt even receive a confirmation mail so I'm not sure there will be any response.
submitted by Hoppse88 to pcmasterrace [link] [comments]


2024.03.10 15:56 Hoppse88 not able to play multiplayer at all, friend list and social tab not working

FIX for me: What did it for me was to reimage my computer with a fresh Windows 10 install.. dont know why dont know how but it fixed it
a sort of FIX from u/henryrocks34***:*** i fixed it, i had to buy a vpn and it worked. my new theory is that our NAT type is set to strict or something
which let to the REAL FIX below:
FIX for u/henryrocks34**:** fixed it for real this time. i had to port forward all of the ports that helldivers uses on my router administration. literally worked instantly lmao. all that pain... https://www.reddit.com/Helldivers/comments/1aw6c76/no_idea_if_this_helps_you_getting_in_but_open/
tl;dr: my multiplayer functionality is completely blocked and I tried everything I could think of from an IT support perspective. anyone had the same issue and solved it? if so pls help
What a wonderful game we have!
Unfortunately I cant participate in any meaningful manner as I'm completely locked out of multiplayer and I could not find any mentioning of this by searching for it - just the usual stuff with full servers, crossplay issues and general trouble to join games.
If there is anybody out there who had similar issues and got it solved, please tell me how.
Here's the situation:
Playing via Steam
I cannot join any quickplays - when I try it finds one tries to join, fails, searches again, finds one tries to join, fails etc...
I cannot join any open games on the map it tries to join and fails with the nondescript error "Failed to join lobby"
I dont see any of my friends online even though they are and are currently playing with each other
They can try and invite me but it doesnt show ingame only in Steam chat and my accepting the invite only results in a "Failed to join lobby" error.
Nobody will / can ever join an SOS beacon of me
It feels like something is blocking me from the social part of the game.
What I have tried yet:
Edit: did the following now
the only thing I could not test yet was to change my internet provider and repeat all the above
I even opened a support ticket with arrowhead on their Zendesk but I didnt even receive a confirmation mail so I'm not sure there will be any response.
submitted by Hoppse88 to Helldivers [link] [comments]


2024.03.01 12:24 AviatorSkywatcher Pokemon new type - Cyber (OC)

Disclaimer: I am not very cognizant of the competitive Pokemon scene, so this may be too OP or too weak.
Introduction:
Cyber Pokemon are primarily artificial constructs or lines of code rather than biological entities capable of navigating cyberspace. Software engineers and computer scientists work tirelessly to create new Cyber Type Pokemon, engaging in extensive research and deploying considerable manpower to develop the logic underlying their construction.
Cyber Type Pokemon harness their well-written code to attack their enemies. They have several moves with interesting effects, based on modern technology, including caching and cloud storage.
Type Color: Cyan
History:
Cyber Type Pokémon are a recent discovery. One fine day, Bill, while experimenting with the code of his Pokemon Storage System, thought of a wild idea: "Could I manifest lines of code into a Pokemon?" After months of rigorous effort, he crafted a prototype for the first Cyber Type Pokemon. However, Silph Co. plagiarized his ideas and went on to develop the first fully functional Cyber-Type Pokemon, Porygon. That was just the beginning, and more Pokemon came into the fray, including Mewtwo.
Type Matchups:
Re-Typing of Existing Pokemon:
New Status Condition: Glitched: The affected Pokemon has a chance to disobey the trainer and take a random action (moves, consuming an item, trying to escape, hurt itself) or just do nothing.
Cyber Type Supporting Items:
Abilities:
Moves:
submitted by AviatorSkywatcher to pokemon [link] [comments]


2024.02.27 19:59 Extra_Baker2392 Device Configuration for Windows Security - Antivirus UI Missing in Windows 11

A user (developer) contacted me as he cannot see the settings that allow him to enable certain threats to be allowed in Windows Security. The user must allow certain processes to be allowed because he uses WSL2. Failure to do so slows down the indexing process.
I checked the user's Windows Security, and "Antivirus" could not be found. The "Allowed Threats" used to be under "Virus & Threat Protection". I had a look at my Intune device configuration settings, and the only one I could think of that might prevent this from showing is:
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint client configuration package type: Onboard
Sample sharing for all files Not configured
Expedite telemetry reporting frequency Enable

Which settings in Device Configuration (or elsewhere) prevent the user from seeing certain settings in "Windows Security" in Windows 11? Or: What must I do so that these settings are shown again to the user? Is this a Device Configuration issue - or is this something I must find elsewhere, such as in Microsoft Defender?

submitted by Extra_Baker2392 to Intune [link] [comments]


http://activeproperty.pl/