It’s referring to both. The recompiler links to the Zelda project and basically tells you “if you want to haven an example how to.proceed/what to implement yourself after the recompilation finished, you can use the Zelda project as an example”.
It’s referring to both. The recompiler links to the Zelda project and basically tells you “if you want to haven an example how to.proceed/what to implement yourself after the recompilation finished, you can use the Zelda project as an example”.
Well, usually those re-compilers or transpilers just translate the binary to some sort of intermediate language and then any backend should be able to compile it for your target system. So, in theory those handheld could be targeted. Problem with this project is that it’s not just “start transpiler, load rom, click go and your port is ready”. It’s more like "ok, here’s your game logic. Now implement the rest (or use several other projects and duct tape their libraries together to get what you want).
Other people’s password be like
JetBrains032024
JetBrains042025
Jetbrains052024
…
My JetBrains accounts be like
JetBrains032024@example.com
JetBrains042024@example.com
JetBrains052024@example.com
…
If paying on a monthly basis, as soon as you pay for 12 consecutive months, you will receive this perpetual fallback license providing you with access to the exact product version for when your 12 consecutive months subscription started. You will receive perpetual fallback licenses for every version you’ve paid 12 consecutive months for.
So, in your example, you unsubscribe in month 15. This means, you paid 14 months so you get to retain the version from month three (which is 12 full paid months to 14). This means a downgrade to 1.0.x and not to 1.2.x
Fifteen Million Merits, IIRC?
Nah, it just marks your question as duplicate.
The first one kinda works, but I think it’d be more clear, when used without “selbst”/self, as this would be read to reference the invention instead of the inventor.
On the other hand, that then feels like “yeah, it didn’t work. The invention misfired and is crap”. Maybe “Erfindungserschafferzerstörer”? (Invention’s creator destructor) but that sounds off, too.
There’s not really a word that I can come up with that really conveys this meaning. There’s a german saying “wer Andern eine Grube gräbt, fällt selbst hinein” (he, who digs a hole for others, will fall into it by itself). Then there’s the humorous “Rohrkrepierer” (along the lines of “died in the barrel”) which basically means something like “dead on arrival” / that went wrong and didn’t work. So it’d be probably something that references one of those, which would make it work culturally?
Why not both?
Too big to fail, too big to jail
Let me guess - long distance is if it’s outside the prison? /s
Not necessarily. You could have a sensor that detects when the water reservoir is emptied that doesn’t need logic - e.g.
You can then use those signals to do something like switch off the heater, change a light,… all without using a microcontroller. There’s no programming needed for that. You might see things like transistors and some basic digital circuitry here but it’s all very basic and still far from a microcontroller.
Yeah, not everything needs to have a microprocessor in it, but only few items of those do really have none
You’re right, but this basically implies that you get all access to documentation. Remember the good old days, when a manual included even circuit diagrams, procedure for test points, etc?
anything with a CPU in it
If we count microcontroller as CPUs, that would include basically anything that runs with electricity. But I like that thought even more that way
I mean, the hosting company would be the likely target then and they’d probably lock your account and switch off the server. Depending on your nationality and that of the hoster, at least.
I found a blog post outlining exactly that. If you use it locally, it will install and start a service temporarily. That service runs as SYSTEM and invokes your command. To succeed, you need to be a local administrator.
If you try the same remote, it tries to access \\remote-server-ip\$admin and installs the service with that. To succeed your current account on your local machine must exist on the remote machine and must be an administrator there.
So in short: It only works, if you’ve already the privilege to do so and the tool itself is not (ab)using a privilege escalation or something like that. Any hacker and virus may do the very same and doesn’t need psexec - it’s just easier for them to use that tool.
Pretendstation Network when? (Context)
Never thought about that, but since these tools just work, when you copy them to your PC… how does psexec do that? It’d either need you to be an administrator (and then it’s not really a privilege escalation as you could have registered any program into the task scheduler or as a service to run as SYSTEM) or it’d need a delegate service, that should only be available when you use an installer - which again wasn’t was has been done when just copying the tool.
D key?