this post was submitted on 16 Nov 2023
529 points (95.5% liked)

Lemmy Shitpost

26970 readers
4859 users here now

Welcome to Lemmy Shitpost. Here you can shitpost to your hearts content.

Anything and everything goes. Memes, Jokes, Vents and Banter. Though we still have to comply with lemmy.world instance rules. So behave!


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means:

-No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...

If you see content that is a breach of the rules, please flag and report the comment and a moderator will take action where they can.


Also check out:

Partnered Communities:

1.Memes

2.Lemmy Review

3.Mildly Infuriating

4.Lemmy Be Wholesome

5.No Stupid Questions

6.You Should Know

7.Comedy Heaven

8.Credible Defense

9.Ten Forward

10.LinuxMemes (Linux themed memes)


Reach out to

All communities included on the sidebar are to be made in compliance with the instance rules. Striker

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 58 points 1 year ago* (last edited 1 year ago) (3 children)

Fun fact: A common way to get access to SYSTEM (higher than admin) privileges on Windows is the sethc exploit, where you replace sethc (the program that shows the sticky keys dialog) with command prompt, and it gets started as SYSTEM, the only thing needed is write access to System32, which can either be from an admin account or by editing the file system externally. This also allows opening a command prompt on the login screen, allowing some cursed things, like if you start explorer.exe on the login screen it combines the desktop and login screen.

[–] [email protected] 27 points 1 year ago (1 children)

I used to do this to make a hidden account on my computer to bypass my parents' screen time restrictions

[–] [email protected] 12 points 1 year ago (3 children)

I did this in college with windows 7. I don't think it works on 10, but could be mistaken.

[–] TwoBeeSan 15 points 1 year ago

I helped an elderly man get back into his pc doing a variation of this.

Changed the accessibility magnifier function to comman prompt. Was able to log in and create another user account after he lost access to a password.

So not sure about that one specifically bit a variation worked on 10.

[–] ChillPill 10 points 1 year ago (2 children)

It worked in win10 a few years ago when I was working in IT...

[–] [email protected] 5 points 1 year ago

Oh now that I think about it, it was the accessibility executable, not sticky keys.

[–] [email protected] 2 points 1 year ago

Ive done it on 10 before

[–] [email protected] 8 points 1 year ago

That's a common way to reset password for the accounts, among osk.exe file replacement