Skip Navigation

Posts
0
Comments
131
Joined
6 mo. ago

  • If your therapist is not working for you, it is time to get a new therapist.

  • I seem to recall one of the early cross-platform competitive multiplayer games having full controller aim assist on PC, they had to dial it back because players were figuring out how to combine it with mouse input and ending up with such a massive advantage that console players were disabling crossplay.

  • My line of thinking is that games optimized for controllers will usually have sticky aim or aim assist, whereas those that maybe lack controller support won’t necessarily have those features.

    Gyro adds that last little bit of precision that could potentially bridge the gap

  • Maybe you need a controller with motion / tilt support?

  • That’s quite a headline they’ve got there!

    After provisioning a PC with a Windows 11, version 24H2 monthly cumulative update released on or after July 2025 [KB5062553], various apps such as StartMenuExperiencehost, Search, SystemSettings, Taskbar or Explorer might experience difficulties.

    This will occur for the following: First time user logon after a cumulative update was applied. All user logons to a non-persistent OS installation such as a virtual desktop infrastructure (VDI) or equivalent as application packages must be installed each logon in such scenarios.

    If you are wondering, provisioning essentially is the way admins configure devices as they automatically deploy various settings and policies on a client PC. So while the issue is in office PCs, considering a huge number of enterprise PCs are Windows, this is probably a very big problem.

  • I don’t see that very often in general, and it’s not that I don’t notice them because they do tend to stand out to me when they’re present.

    I wouldn’t necessarily correlate that with a specific manufacturer, afaik the only laptop manufacturers that also make their own screen panels are Samsung and LG. Rest are using screens made by a small variety of other OEMs.

  • 👋 Repair shop owner

    Between the three issues you mentioned, charge port are the most common I see with Acer whereas hinge issues are actually on the rarer side compared to other manufacturers.

    With Acer, charge ports are pretty memorable since they’re soldered to the mainboard rather than being on an easy to replace daughterboard or cable.

    Ultimately, charge ports issues are usually a user problem rather than a quality issue. There should always be extra slack on the cable when charging, the systems should be on a flat level surface, and the device should never be transported with the charger connected to the port.

    Someone who has had repeat problems related to their laptop’s charge port is going to have a real bad time if they switch to a system that uses Type C ports.

  • Or perhaps it could be something other than malice?

    This person is putting up with a misbehavior they don’t have to live with. They’re presenting the perception that it’s due to the nature of the operating system.

    My Toyota engine dies when I idle, therefore all Toyotas and fundamentally flawed.

    Flawed logic, no? And yet, when it comes to tech, plenty of folks apply the same type of thought pattern.

    You’re right that one would think the issue is as it seems on the surface. Computers are actually a bit more complicated than that.

    One fail mode of memory is the occasional bit flip silently corrupting data in the background. As time goes on and new data is written to a disk, things can get weirder and weirder over time.

    We don’t know if Windows and Linux are sharing a physical disk (I hope for their sake they aren’t) and we don’t know how old the Linux deployment is, so it’s possible it hasn’t had the opportunity to get progressively messed up enough yet.

    Another key variable is that the Linux environment might not be interacting with every single piece of hardware, or that the structure of those interactions could result in symptoms manifesting differently or not at all.

    I’ve had situations where a MacBook’s keyboard and trackpad were completely functional in Linux and Windows, but absolutely dysfunctional in any MacOS based environment. The fix? Replacement trackpad cable.

    At the end of the day, the situation they’re describing is not common for the OS and indicates something is very wrong.

    There’s plenty to complain about with Windows, but if this were a typical experience people would not be putting up with it.

    A device with those symptoms coming through my shop is statistically likely to be leaving with replaced parts, a component level repair, or at the very least a complete OS and Driver reinstallation after passing extensive diagnostic testing and behavioral isolation.

  • 5 to 10 minutes before the mouse pointer decides to cooperate with mr

    This is not a typical experience, you have some kind of hardware issue or corruption / incongruities in your OS deployment.

  • Well, I stand corrected, I hadn’t been in the loop as to how deep this really ran.

    They probably would have saved a ton of money and bad PR by just paying ANTIREAL for this work.

  • How does one […]

    This is the key element. I don’t think this is a case where a team collectively chose to steal someone’s art.

    If the theft was deliberate, it was probably an individual, with how big these projects are it’s not hard to consider how that may have flown under the radar.

    I could also see one team member collecting assets to serve as inspiration and another implementing them without realizing they weren’t created in house.

    With how exhausting the current state of the world is, I could even see a burnt out employee tossing something together without remembering where the asset came from.

    Not trying to excuse what happened, the original artist is definitely owed for this, but there are other potential explanations for this beyond intentional malice.

  • If you opted into ESU, those would be the security updates that you opted to receive.

  • There is no way to ‘downgrade’ a fresh installation. Only an installation that was done as an upgrade from Windows 10 can be downgraded, it has to be done within 10 days of the upgrade and that is possible thanks to the Windows.old folder that gets retained for that period.

    In your case, you’re looking at a clean install. Once you’ve got your installation media ready, you can make your life substantially easier by using DISM to extract the drivers and integrate them into the WIM file. I’ve had a few laptops end up with no network drivers, no keyboard / touchpad drivers, and no USB drivers - leaving OOBE inoperable.

  • Effectively doing that server-side would substantially increase the bandwidth requirements though.

    If we take wallhacks as an example, that takes place entirely in the local rendering pipeline. In a game like Battlefield or Counter Strike, smoke and foliage are used for tactical purposes.

    Aimbots read player location data sent from the server and send input commands to the OS to automate headshots.

    Preventing local memory from being read and modified outright prevents (well, substantially raises the skill ceiling) for performing these kinds of hacks. I have a hard time envisioning a server-side solution to those.

    security of the client against the owner of the device on which the client runs

    That’s exactly who a cheater is though

  • Way I see it, there’s two ways to address the “cheating” issue in multiplayer online games.

    First, let’s establish that game cheats typically involve using another application to modify the game’s running code while it is loaded in memory.

    Historically, anti-cheat has largely taken a “reactive” approach. Try to detect the hook / modification taking place, ban the player if it is detected. These systems and bans were often circumvented. There are entire games that I stopped playing because the experience was ruined for me - GTA Online and the late stages of Titanfall 2 are standouts in my mind.

    With how the Windows device security landscape has changed In the 2020s (MacOS has had something similar for ages), there’s now the option of taking a “proactive” approach by preventing application memory from being tapped in the first place. These technologies, notably Secure Boot and TPM, help mitigate rootkits and malware that might steal sensitive information from application memory, as well as paving the way for other protection measures like disk encryption.

    And that’s the main part they’re interested in - by ensuring the entire process up through the kernel cannot be tampered with, the anti-cheat is going to be highly effective at pre-empting anyone from attempting the cheat to begin with.

    It really sucks that, in the curent landscape, that means there are a handful of games that I can’t play on my Linux devices. But it also makes sense - Proton runs with many layers beneath it, which would make it trivial to tamper with memory and engage in cheating.

    I’m hopeful that we’ll someday see a solution that opens up the opportunity for the same degree of integrity protection in Linux so that anyone can enjoy any game on the operating system of their choosing.

    Regardless of what others have to say about EA or the franchise (and boy do they have their issues), Battlefield has always been a beloved series for me. I’m having a blast in Battlefield 6 and I have yet to encounter any cheaters. Previous entries in the series would see me hopping to a new server whenever I encountered one or, on some occasions, ending my play session out of frustration. Anecdotally, the cheating felt much more prevalent before.

    I have a lot less time to game than I used to, so that time is sacred to me. While I’d obviously prefer another way, maintaining a Windows system and enabling two BIOS settings (well, leaving them enabled - they’re on by default) has been worth it for me.

  • Indeed you can!

    If you enable the core isolation and memory integrity features, which rely on the TPM, the system will slog down to less than potato speed.

  • secure boot is being used to lock your control out of your own system

    Care to elaborate?

  • They are.

    Drivers with known security vulnerabilities are blocked from loading in Windows 11.

    This is functionality of the core isolation / memory integrity protection, which rely on Secure Boot and TPM to function.

  • OP, seems like you drank the Kool Aid