So I thought you were talking about live streams, usually fed by .M3U8 playlist files. In this case VLC and MPV can open and play such live streams and show you the codec being used.
For Youtube there is this extension:The-10-Pen wrote: ↑30 Jan 2026, 00:21 I'd actually *PREFER* the old codec! At least on this one laptop.
I can do that in YouTube (ie, there are userscripts galore to force h264).
I don't think things like that exist to force *ALL* videos to *ALWAYS* be h264, regardless of website.![]()
So I thought you were talking about live streams, usually fed by .M3U8 playlist files. In this case VLC and MPV can open and play such live streams and show you the codec being used.
For Youtube there is this extension:The-10-Pen wrote: ↑30 Jan 2026, 00:21 I'd actually *PREFER* the old codec! At least on this one laptop.
I can do that in YouTube (ie, there are userscripts galore to force h264).
I don't think things like that exist to force *ALL* videos to *ALWAYS* be h264, regardless of website.![]()
If you can watch them then you can record them or download themThe-10-Pen wrote: ↑30 Jan 2026, 15:34 I guess I've always called online videos that can not be "downloaded" but simply watched in "real time" as 'live streams'.
I cannot download them, I have to log in at the time of day that they play them.
If you can watch them then you can record them or download themThe-10-Pen wrote: ↑30 Jan 2026, 15:34 I guess I've always called online videos that can not be "downloaded" but simply watched in "real time" as 'live streams'.
I cannot download them, I have to log in at the time of day that they play them.
Or in an orange bikini like in Die Another Day
Or in an orange bikini like in Die Another Day
It's not the browser, it's your graphics card which is decoding in software mode hence the 100% CPU usage. As of today no browser has native support for HEVC because of licensing issues. They can use the HEVC codec but you need to have this video extension installed:The-10-Pen wrote: ↑31 Jan 2026, 09:53 I have also recently been *FORCED* to upgrade from v140 to, IRONICALLY, v143 *minimum*.
It's not the browser, it's your graphics card which is decoding in software mode hence the 100% CPU usage. As of today no browser has native support for HEVC because of licensing issues. They can use the HEVC codec but you need to have this video extension installed:The-10-Pen wrote: ↑31 Jan 2026, 09:53 I have also recently been *FORCED* to upgrade from v140 to, IRONICALLY, v143 *minimum*.
Attachments
Attachments
Attachments
Attachments
I found this page about HEVC support in browsers:The-10-Pen wrote: ↑04 Feb 2026, 17:30 Turns out, running EDGE BROWSER did the trick!
"Portable" v144. Same exact "chrome engine" that I was using in Chrome v144 and Chromium v144.
I found this page about HEVC support in browsers:The-10-Pen wrote: ↑04 Feb 2026, 17:30 Turns out, running EDGE BROWSER did the trick!
"Portable" v144. Same exact "chrome engine" that I was using in Chrome v144 and Chromium v144.
Maybe they are now using DRM ? Which uses a lot of CPU.
Maybe they are now using DRM ? Which uses a lot of CPU.
Attachments
Attachments
No, you can't. Because Youtube is not using H.265/HEVC at all but VP9, AV1 and H.264/AVC.The-10-Pen wrote: ↑04 Feb 2026, 22:24 I intentionally (for a few years now) force YouTube to only play h.264.
But I can just as easily force it to play h.265 instead.
No, you can't. Because Youtube is not using H.265/HEVC at all but VP9, AV1 and H.264/AVC.The-10-Pen wrote: ↑04 Feb 2026, 22:24 I intentionally (for a few years now) force YouTube to only play h.264.
But I can just as easily force it to play h.265 instead.
MSFN will *REFUSE* to delete your account if you request it to be deleted.
MSFN will *REFUSE* to delete your account if you request it to be deleted.
Yeah okay I won't lie this is really stupid from MSFN side. Big L for them. Well I was considering creating myself an account on MSFN, but I doubt I will do that now.]]>The-10-Pen wrote: ↑13 Feb 2026, 13:57 Yep, that's basically how they describe it.
EU members are "permitted" to have their accounts removed.
But even they are basically told "it kind of doesn't matter, everything is backed up across so many different methods that we cannot really remove *everything*..."
Yeah okay I won't lie this is really stupid from MSFN side. Big L for them. Well I was considering creating myself an account on MSFN, but I doubt I will do that now.]]>The-10-Pen wrote: ↑13 Feb 2026, 13:57 Yep, that's basically how they describe it.
EU members are "permitted" to have their accounts removed.
But even they are basically told "it kind of doesn't matter, everything is backed up across so many different methods that we cannot really remove *everything*..."
Attachments
Attachments
teknixstuff wrote: ↑30 Dec 2025, 13:35 Newer versions of node available at https://crackthemall.neocities.org/
teknixstuff wrote: ↑30 Dec 2025, 13:35 Newer versions of node available at https://crackthemall.neocities.org/
A safer way would be to simply rename {3EB3C877-1F16-487C-9050-104DBCD66683} in HKEY_CLASSES_ROOT\AppID\, just in case.The-10-Pen wrote: ↑26 Feb 2026, 01:20 It's easy to disable.
Regedit and search for {3EB3C877-1F16-487C-9050-104DBCD66683}.
Take ownership of the key and then delete it.
A safer way would be to simply rename {3EB3C877-1F16-487C-9050-104DBCD66683} in HKEY_CLASSES_ROOT\AppID\, just in case.The-10-Pen wrote: ↑26 Feb 2026, 01:20 It's easy to disable.
Regedit and search for {3EB3C877-1F16-487C-9050-104DBCD66683}.
Take ownership of the key and then delete it.
I'm not a PowerShell specialist but I've found that:The-10-Pen wrote: ↑26 Feb 2026, 04:03 Any chance of something like a PowerShell script that can perform a registry key take-ownership plus rename?
I'm not a PowerShell specialist but I've found that:The-10-Pen wrote: ↑26 Feb 2026, 04:03 Any chance of something like a PowerShell script that can perform a registry key take-ownership plus rename?
Code: Select all
# Get the ID and security principal of the current user account
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent();
$myWindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($myWindowsID);
# Get the security principal for the administrator role
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator;
# Check to see if we are currently running as an administrator
if ($myWindowsPrincipal.IsInRole($adminRole))
{
# We are running as an administrator, so change the title and background colour to indicate this
$Host.UI.RawUI.WindowTitle = $myInvocation.MyCommand.Definition + "(Elevated)";
$Host.UI.RawUI.BackgroundColor = "DarkBlue";
Clear-Host;
}
else {
# We are not running as an administrator, so relaunch as administrator
# Create a new process object that starts PowerShell
$newProcess = New-Object System.Diagnostics.ProcessStartInfo "PowerShell";
# Specify the current script path and name as a parameter with added scope and support for scripts with spaces in it's path
$newProcess.Arguments = "& '" + $script:MyInvocation.MyCommand.Path + "'"
# Indicate that the process should be elevated
$newProcess.Verb = "runas";
# Start the new process
[System.Diagnostics.Process]::Start($newProcess);
# Exit from the current, unelevated, process
Exit;
}
# Run your code that needs to be elevated here...
# Write-Host -NoNewLine "Press any key to continue...";
# $null = $Host.UI.RawUI.ReadKey("NoEcho,IncludeKeyDown");
# Your script here
function Enable-Privilege {
param(
## The privilege to adjust. This set is taken from
## http://msdn.microsoft.com/en-us/library/bb530716(VS.85).aspx
[ValidateSet(
"SeAssignPrimaryTokenPrivilege", "SeAuditPrivilege", "SeBackupPrivilege",
"SeChangeNotifyPrivilege", "SeCreateGlobalPrivilege", "SeCreatePagefilePrivilege",
"SeCreatePermanentPrivilege", "SeCreateSymbolicLinkPrivilege", "SeCreateTokenPrivilege",
"SeDebugPrivilege", "SeEnableDelegationPrivilege", "SeImpersonatePrivilege", "SeIncreaseBasePriorityPrivilege",
"SeIncreaseQuotaPrivilege", "SeIncreaseWorkingSetPrivilege", "SeLoadDriverPrivilege",
"SeLockMemoryPrivilege", "SeMachineAccountPrivilege", "SeManageVolumePrivilege",
"SeProfileSingleProcessPrivilege", "SeRelabelPrivilege", "SeRemoteShutdownPrivilege",
"SeRestorePrivilege", "SeSecurityPrivilege", "SeShutdownPrivilege", "SeSyncAgentPrivilege",
"SeSystemEnvironmentPrivilege", "SeSystemProfilePrivilege", "SeSystemtimePrivilege",
"SeTakeOwnershipPrivilege", "SeTcbPrivilege", "SeTimeZonePrivilege", "SeTrustedCredManAccessPrivilege",
"SeUndockPrivilege", "SeUnsolicitedInputPrivilege")]
$Privilege,
## The process on which to adjust the privilege. Defaults to the current process.
$ProcessId = $pid,
## Switch to disable the privilege, rather than enable it.
[Switch] $Disable
)
## Taken from P/Invoke.NET with minor adjustments.
$definition = @'
using System;
using System.Runtime.InteropServices;
public class AdjPriv
{
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
internal static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall,
ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr relen);
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
internal static extern bool OpenProcessToken(IntPtr h, int acc, ref IntPtr phtok);
[DllImport("advapi32.dll", SetLastError = true)]
internal static extern bool LookupPrivilegeValue(string host, string name, ref long pluid);
[StructLayout(LayoutKind.Sequential, Pack = 1)]
internal struct TokPriv1Luid
{
public int Count;
public long Luid;
public int Attr;
}
internal const int SE_PRIVILEGE_ENABLED = 0x00000002;
internal const int SE_PRIVILEGE_DISABLED = 0x00000000;
internal const int TOKEN_QUERY = 0x00000008;
internal const int TOKEN_ADJUST_PRIVILEGES = 0x00000020;
public static bool EnablePrivilege(long processHandle, string privilege, bool disable)
{
bool retVal;
TokPriv1Luid tp;
IntPtr hproc = new IntPtr(processHandle);
IntPtr htok = IntPtr.Zero;
retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);
tp.Count = 1;
tp.Luid = 0;
if(disable)
{
tp.Attr = SE_PRIVILEGE_DISABLED;
}
else
{
tp.Attr = SE_PRIVILEGE_ENABLED;
}
retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);
retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);
return retVal;
}
}
'@
$processHandle = (Get-Process -id $ProcessId).Handle
$type = Add-Type $definition -PassThru
$type[0]::EnablePrivilege($processHandle, $Privilege, $Disable)
}
Enable-Privilege SeTakeOwnershipPrivilege
# Change Owner to the local Administrators group
$regKey = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("AppID\{3eb3c877-1f16-487c-9050-104dbcd66683}",[Microsoft.Win32.RegistryKeyPermissionCheck]::ReadWriteSubTree,[System.Security.AccessControl.RegistryRights]::TakeOwnership)
$regACL = $regKey.GetAccessControl()
$regACL.SetOwner([System.Security.Principal.NTAccount]"Administrators")
$regKey.SetAccessControl($regACL)
# Change Permissions for the local Administrators group
$regKey = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("AppID\{3eb3c877-1f16-487c-9050-104dbcd66683}",[Microsoft.Win32.RegistryKeyPermissionCheck]::ReadWriteSubTree,[System.Security.AccessControl.RegistryRights]::ChangePermissions)
$regACL = $regKey.GetAccessControl()
$regRule = New-Object System.Security.AccessControl.RegistryAccessRule ("Administrators","FullControl","ContainerInherit","None","Allow")
$regACL.SetAccessRule($regRule)
$regKey.SetAccessControl($regACL)
Code: Select all
# Get the ID and security principal of the current user account
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent();
$myWindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($myWindowsID);
# Get the security principal for the administrator role
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator;
# Check to see if we are currently running as an administrator
if ($myWindowsPrincipal.IsInRole($adminRole))
{
# We are running as an administrator, so change the title and background colour to indicate this
$Host.UI.RawUI.WindowTitle = $myInvocation.MyCommand.Definition + "(Elevated)";
$Host.UI.RawUI.BackgroundColor = "DarkBlue";
Clear-Host;
}
else {
# We are not running as an administrator, so relaunch as administrator
# Create a new process object that starts PowerShell
$newProcess = New-Object System.Diagnostics.ProcessStartInfo "PowerShell";
# Specify the current script path and name as a parameter with added scope and support for scripts with spaces in it's path
$newProcess.Arguments = "& '" + $script:MyInvocation.MyCommand.Path + "'"
# Indicate that the process should be elevated
$newProcess.Verb = "runas";
# Start the new process
[System.Diagnostics.Process]::Start($newProcess);
# Exit from the current, unelevated, process
Exit;
}
# Run your code that needs to be elevated here...
# Write-Host -NoNewLine "Press any key to continue...";
# $null = $Host.UI.RawUI.ReadKey("NoEcho,IncludeKeyDown");
# Your script here
function Enable-Privilege {
param(
## The privilege to adjust. This set is taken from
## http://msdn.microsoft.com/en-us/library/bb530716(VS.85).aspx
[ValidateSet(
"SeAssignPrimaryTokenPrivilege", "SeAuditPrivilege", "SeBackupPrivilege",
"SeChangeNotifyPrivilege", "SeCreateGlobalPrivilege", "SeCreatePagefilePrivilege",
"SeCreatePermanentPrivilege", "SeCreateSymbolicLinkPrivilege", "SeCreateTokenPrivilege",
"SeDebugPrivilege", "SeEnableDelegationPrivilege", "SeImpersonatePrivilege", "SeIncreaseBasePriorityPrivilege",
"SeIncreaseQuotaPrivilege", "SeIncreaseWorkingSetPrivilege", "SeLoadDriverPrivilege",
"SeLockMemoryPrivilege", "SeMachineAccountPrivilege", "SeManageVolumePrivilege",
"SeProfileSingleProcessPrivilege", "SeRelabelPrivilege", "SeRemoteShutdownPrivilege",
"SeRestorePrivilege", "SeSecurityPrivilege", "SeShutdownPrivilege", "SeSyncAgentPrivilege",
"SeSystemEnvironmentPrivilege", "SeSystemProfilePrivilege", "SeSystemtimePrivilege",
"SeTakeOwnershipPrivilege", "SeTcbPrivilege", "SeTimeZonePrivilege", "SeTrustedCredManAccessPrivilege",
"SeUndockPrivilege", "SeUnsolicitedInputPrivilege")]
$Privilege,
## The process on which to adjust the privilege. Defaults to the current process.
$ProcessId = $pid,
## Switch to disable the privilege, rather than enable it.
[Switch] $Disable
)
## Taken from P/Invoke.NET with minor adjustments.
$definition = @'
using System;
using System.Runtime.InteropServices;
public class AdjPriv
{
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
internal static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall,
ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr relen);
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
internal static extern bool OpenProcessToken(IntPtr h, int acc, ref IntPtr phtok);
[DllImport("advapi32.dll", SetLastError = true)]
internal static extern bool LookupPrivilegeValue(string host, string name, ref long pluid);
[StructLayout(LayoutKind.Sequential, Pack = 1)]
internal struct TokPriv1Luid
{
public int Count;
public long Luid;
public int Attr;
}
internal const int SE_PRIVILEGE_ENABLED = 0x00000002;
internal const int SE_PRIVILEGE_DISABLED = 0x00000000;
internal const int TOKEN_QUERY = 0x00000008;
internal const int TOKEN_ADJUST_PRIVILEGES = 0x00000020;
public static bool EnablePrivilege(long processHandle, string privilege, bool disable)
{
bool retVal;
TokPriv1Luid tp;
IntPtr hproc = new IntPtr(processHandle);
IntPtr htok = IntPtr.Zero;
retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);
tp.Count = 1;
tp.Luid = 0;
if(disable)
{
tp.Attr = SE_PRIVILEGE_DISABLED;
}
else
{
tp.Attr = SE_PRIVILEGE_ENABLED;
}
retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);
retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);
return retVal;
}
}
'@
$processHandle = (Get-Process -id $ProcessId).Handle
$type = Add-Type $definition -PassThru
$type[0]::EnablePrivilege($processHandle, $Privilege, $Disable)
}
Enable-Privilege SeTakeOwnershipPrivilege
# Change Owner to the local Administrators group
$regKey = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("AppID\{3eb3c877-1f16-487c-9050-104dbcd66683}",[Microsoft.Win32.RegistryKeyPermissionCheck]::ReadWriteSubTree,[System.Security.AccessControl.RegistryRights]::TakeOwnership)
$regACL = $regKey.GetAccessControl()
$regACL.SetOwner([System.Security.Principal.NTAccount]"Administrators")
$regKey.SetAccessControl($regACL)
# Change Permissions for the local Administrators group
$regKey = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("AppID\{3eb3c877-1f16-487c-9050-104dbcd66683}",[Microsoft.Win32.RegistryKeyPermissionCheck]::ReadWriteSubTree,[System.Security.AccessControl.RegistryRights]::ChangePermissions)
$regACL = $regKey.GetAccessControl()
$regRule = New-Object System.Security.AccessControl.RegistryAccessRule ("Administrators","FullControl","ContainerInherit","None","Allow")
$regACL.SetAccessRule($regRule)
$regKey.SetAccessControl($regACL)
I tried this. Did not work.Duke wrote: ↑26 Feb 2026, 11:44 SubInACL download:
https://github.com/Jackpison/IDM-reset/blob/master/subinacl.msi
I tried this. Did not work.Duke wrote: ↑26 Feb 2026, 11:44 SubInACL download:
https://github.com/Jackpison/IDM-reset/blob/master/subinacl.msi
Attachments
Attachments
I had many graphics card problems and crashes past year after I tried Zen browser. It looks like this thing silently installed a ring0 DLL and that caused a lot of trouble.
I had many graphics card problems and crashes past year after I tried Zen browser. It looks like this thing silently installed a ring0 DLL and that caused a lot of trouble.
Code: Select all
sudo apt install firefoxCode: Select all
sudo dpkg --force-architecture -i (path-to)/librewolf-146.0.1-1-linux-i686-deb.deb
sudo dpkg --force-all --configure -aCode: Select all
sudo nano /var/lib/dpkg/statusCode: Select all
sudo apt install firefoxCode: Select all
sudo dpkg --force-architecture -i (path-to)/librewolf-146.0.1-1-linux-i686-deb.deb
sudo dpkg --force-all --configure -aCode: Select all
sudo nano /var/lib/dpkg/statusI know more and more people think the same and I'm one of them.]]>
I know more and more people think the same and I'm one of them.]]>
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
It might be true but I don't know because I'm not saving passwords in my browsers, I'm using KeePass.
Attachments
It might be true but I don't know because I'm not saving passwords in my browsers, I'm using KeePass.
Attachments
Attachments
Attachments
Good, this is a stupid feature. I figure it's only like that here because it's a phpbb default, and me not having to go and remove it is time well saved.]]>The-10-Pen wrote: ↑31 Jan 2026, 15:17 Technically, Firefox (and forks) was IN VIOLATION NON-COMPLIANCE of web standards for SEVERAL years!
Password fields commonly have an autocomplete="off" parameter (including right here at Eclipse!) within their HTML code.
Good, this is a stupid feature. I figure it's only like that here because it's a phpbb default, and me not having to go and remove it is time well saved.]]>The-10-Pen wrote: ↑31 Jan 2026, 15:17 Technically, Firefox (and forks) was IN VIOLATION NON-COMPLIANCE of web standards for SEVERAL years!
Password fields commonly have an autocomplete="off" parameter (including right here at Eclipse!) within their HTML code.
Attachments
Attachments
Attachments
Attachments
Attachments
Attachments
Code: Select all
"ExtensionSettings": {
"uBlock0@raymondhill.net": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/uBlock0@raymondhill.net/latest.xpi",
"installation_mode": "normal_installed",
"private_browsing": true
}
},
Code: Select all
"ExtensionSettings": {
"uBlock0@raymondhill.net": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/uBlock0@raymondhill.net/latest.xpi",
"installation_mode": "normal_installed",
"private_browsing": true
}
},
Oh, come onThe-10-Pen wrote: ↑08 Feb 2026, 22:37 is the uBO developer being paid somehow for the "forced inclusion"?
AFAIK uBlock is open source and free to use.The-10-Pen wrote: ↑08 Feb 2026, 22:37 does r3dfox have the developer's "permission" to force-include?
]]>Frequently Asked Questions
Is uBlock Origin free?
Yes. uBlock Origin is completely free and open-source. The project does not accept donations and instead encourages users to support filter list maintainers.
Oh, come onThe-10-Pen wrote: ↑08 Feb 2026, 22:37 is the uBO developer being paid somehow for the "forced inclusion"?
AFAIK uBlock is open source and free to use.The-10-Pen wrote: ↑08 Feb 2026, 22:37 does r3dfox have the developer's "permission" to force-include?
]]>Frequently Asked Questions
Is uBlock Origin free?
Yes. uBlock Origin is completely free and open-source. The project does not accept donations and instead encourages users to support filter list maintainers.
Code: Select all
"ExtensionSettings": {
"uBlock0@raymondhill.net": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/uBlock0@raymondhill.net/latest.xpi",
"installation_mode": "normal_installed",
"private_browsing": true
}
},
Code: Select all
"ExtensionSettings": {
"uBlock0@raymondhill.net": {
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/uBlock0@raymondhill.net/latest.xpi",
"installation_mode": "normal_installed",
"private_browsing": true
}
},
Out of curiosity, can you tell me why you don't want to use uBlock Origin ?
Out of curiosity, can you tell me why you don't want to use uBlock Origin ?
Thanks!PantelicGR wrote: ↑18 Feb 2026, 15:42 r3dfox v147.0.4 has been released:
https://github.com/Eclipse-Community/r3dfox/releases/tag/v147.0.4
Thanks!PantelicGR wrote: ↑18 Feb 2026, 15:42 r3dfox v147.0.4 has been released:
https://github.com/Eclipse-Community/r3dfox/releases/tag/v147.0.4
]]>
]]>I think you might like Q4OS with the Trinity desktop environment.xperceniol_sal wrote: ↑01 Feb 2026, 23:51 ^So that is Fedora? I wonder how that would work on my aged systems?
I think you might like Q4OS with the Trinity desktop environment.xperceniol_sal wrote: ↑01 Feb 2026, 23:51 ^So that is Fedora? I wonder how that would work on my aged systems?



]]>


]]>




