I don't regret any of this one bit, you look them up and it's always someone shilling products extremely hard while doing extremely low effort content like reaction videos or streaming Minecraft.
and then absolutely everyone I talk to will do usual 'oh it's not that bad , you're over reacting' with the additional "I don't use it but I still have it installed"
Install steam.
Mount your NTFS drive which contains your windows games.
If you have sims on steam use steam.
If not take a look at lutris before doing any of the above.
Your experiment ends when you've tested all games you want to play.
Now: You cannot use NTFS (windows) drive for games, although you did it in the experiment long extended usage is discouraged.
So you will need to find a way to transfer your games to a different formatted drive. (ext4, btrfs for example)
If you don't need that advice you will eventually run into frustrating issues.
I love stupid exploits like the patapon demo exploit where you use a specific save file as the payload entry point. That's what I like the most about exploits. Or how for Nintendo consoles all the Smash games can be used to install cfw.
Ah the nostalgic days of obsessing over wololo to see if my firmware was finally going to be supported.
IIRC for the PSP there came a day where you could run code straight from the external storage card without needing anything else. Which led to bootable game ISOs from the vanilla UI.
I could be remembering things wrong as it has been over a decade.
SQL injection is like this: you have something you can interact with on the browser like a form containing different values.
You hit a button and that value is sent and merged into a SQL query.
Say the value is an user ID and you're deleting an account, perhaps your own.
If the coder is incompetent the API will run this query: "DELETE FROM USERES WHERE ID =
<id in form>
"
Which means that if you open the developer console, change the value field for that html ID you can break that SQL line and write more SQL, or you can delete other users based on their ID.
Essentially editing a frontend input allows that input to be ran directly by the SQL engine. It's like having full access.
So through that ID field you can inject more SQL code. There's multiple ways to do this, sometimes the URL itself on a website uses these query parameters like "&search=something” and the "something" is injected into the SQL string.
SQL injection is baby's first exploit, this method is like granting everyone DB access.
also capitalists calling for fucking RTO again, fuck