Jump to content

Dave-H

Super Moderator
  • Posts

    5,418
  • Joined

  • Last visited

  • Days Won

    68
  • Donations

    0.00 USD 
  • Country

    United Kingdom

Dave-H last won the day on June 7

Dave-H had the most liked content!

About Dave-H

  • Birthday 03/31/1953

Profile Information

  • OS
    XP Pro x86

Recent Profile Visitors

56,503 profile views

Dave-H's Achievements

2k

Reputation

  1. Just copy 360Loader.exe and 360Loader.ini into the Thorium program folder (they can actually go anywhere, but I find that neatest and saves any complications with paths). IIRC (I don't have it installed any more) Thorium uses Thorium.exe as its executable, not Chrome.exe, so you will have to change the line in the ini file to be AppName=Thorium. That's actually what I've always done too, it makes it a lot easier to change the command line switches. Your shortcut will now have to point to 360Loader.exe of course.
  2. That's not how you do it. Right-click on the Thorium shortcut, and select 'properties' from the menu. In the properties box which pops up, you need to add the switch to the command line in the 'target' box. Add a space after what's there, and then add (copy and paste from Mathwiz's post will be easiest) the --user-agent switch.
  3. A general personal opinion on the actions of an anonymous large group of people many years ago is fine as far as I'm concerned, as long as it's not based on something like racism of course. That is my final word on this, and it should be yours too. Thank you.
  4. Well, I really don't know, but presumably win32ss does! Surely the current ESR version has to be patched until it's superseded, if it's vulnerable, or there's no point in having it. That is 132 as far as I'm aware.
  5. Thanks. IIRC does the system indicate that PAE is enabled if Data Execution Prevention is enabled, or am I mis-remembering? Of course that isn't actually doing anything with the RAM availability, as you say.
  6. We may be talking about different things here regarding PAE. Standard PAE is enabled on my machine, and always has been. Until recently though, I had not experimented with 'PAE patches' to extend the amount of RAM available on my 32-bit system. I do now have one of those available as an option on boot, and it is possible that my access to the 3TB disk will fail if I use that, if I go over 2TB on the disk. I haven't actually tried that, but certainly with the standard PAE configuration, I went over 2TB on my tests without any apparent problems.
  7. I'm pretty sure that when I did my tests, I went well over 2TB on my 3TB disk, with PAE enabled as it always has been, and there were no issues.
  8. I don't see why it would be, they are different exploits. I'm sure win32ss knows what needs patching and what doesn't.
  9. New security patched release. Supermium 132.0.6834.226 R5.01 "The only substantial change in this release is a patch for vulnerabilities CVE-2025-8010 (CVE-2025-8011 is not applicable to M132) and CVE-2025-6558."
  10. My OrangeMonkey extension is certainly working for other scripts, so either the script itself is faulty or it isn't compatible with 360Chrome. @NotHereToPlayGames is certainly still a member here, although not as active as they used to be.
  11. Not working here either. If I try with Supermium, it does work, With that, there is code in the box next to the run and reset buttons when the page first loads, which is not there in 360Chrome. I thought uBlock might have been causing the problem, but disabling it made no difference. Don't know why this is I'm afraid.
  12. The script loads OK for me, but how can I test it? What is it actually supposed to do?
  13. I can't see anything obviously wrong with that, but I'm no expert on scripting, I'm afraid. @NotHereToPlayGames is the man to ask.
  14. I use OrangeMonkey to run my scripts, and that appears to work fine, but so should Tampermonkey of course! I'm not sure how to check whether they are actually working!
  15. Has anyone here actually got Dibya's patch to work? I've found a couple of supposed sources for it, but they all seem to contain just original system files, with no apparent modifications made to them. The instructions that came with one of them seem very strange indeed - "1. Place contents of the "For System32 folder into C:\WINDOWS\system32; Replace .exe and .dll files in System32 2. Enter "C:\WINDOWS\system32\drivers", copy contents of "For Drivers" folder (all .sys files) to the dictionary 3. Enabling PAE Click the start menu, then run (alternatively pressing win + r). Type "C:\boot.ini" then add "\PAE" at the very end of the last line of text. SAVE the file! 4. Reboot and enjoy up to 128gb of ram on your Windows XP installation" The "For System32" folder contains all the HAL and NTKRNL dll and exe files used for various types of system. They all seem to be unmodified originals. Quite how putting all of them in your System32 folder (when only one pair is needed) will do anything other than produce an error message is puzzling!
×
×
  • Create New...