reading input from multiple mice in QB64 in Windows 10?

I am looking to write a non-network multiplayer game for Windows 10 with QB64 that accepts input from 2 or more USB mice plugged into the system. Like a simple Pong game where additional players plug mice into a USB hub to use as game controllers.

I have been googling this and found some older threads

  • Is it possible to detect two different mice at the same time, and have their movements recorded seperately? Asked 8 years, 9 months ago
  • How do I read input from multiple keyboards/mice on one computer? Asked 7 years, 6 months ago

however these are pretty old threads from before Windows 10, also they seem to be more oriented towards C++ or .NET.

Can anyone provide some example how it might be done with QB64 under Windows 10?

Thanks

Is it safe to use the Windows “Compress directory to save space” feature on the directory that contains my MySQL general log file?

I have changed MySQL 8 on my Windows 10 development machine to write logfiles (general log and slow queries log) to "E:\mysql logfiles". I’d like to compress this directory using the Windows "Compress Directory to save space" advanced feature in the Windows 10 directory properties to save space (currently my logfile is over 50 GB). I’m wondering though: is this a good idea? Or will this break MySQL in (subtle or not) ways?

Hostpoco.com -Windows Reseller – cPanel/Fully Managed/ – Starting from $8/m.

Start your own hosting business today. Resell hosting at your own prices!
Hostpoco.com offers the highest quality reseller hosting services at the lowest possible prices. We make web hosting simple with reliable servers, one-click installers, and money other features.

Our Windows Reseller hosting plans start at just $8 /Monthly for 50GB Web Space and 500gb of bandwidth. Our hosting plans are the best solutions for your needs. We provide full refunds within 30 days if there is any dis-satisfaction with our services or products. All our plans include cPanel and Softaculous, among many other features. Come and try our service!

Windows Reseller Hosting Plans come with the following Features:
– Free Migration
– Free Domain for Life
– FREE Private Name servers
– FREE Setup & Instant Activation
– FREE Domain Reseller Account
– WHMCS License
– WHMCS Auto SSL-Let’s encrypt
– 99.9% Uptime Guarantee
– 30 Day Money Back Guarantee
– Ultra-Fast and Secure
– 1 Click Installs with Plesk Application Vault
– 24x7x365 Tier 4 Technical Support
– NO Hidden Charges
– NO Advertising
– NO Risk

————————-
Startup plan:$8/m.
————————-
– 50GB Web Space
– 500GB Bandwidth
– 15 Plesk Accounts

———————-
Pro Plan:$16/m.
———————-
– 80GB Web Space
– 800GB Bandwidth
– Unlimited Plesk Accounts

—————————–
Premium plan:$20/m.
—————————–
– 100GB Web Space
– 1000GB Bandwidth
– Unlimited Plesk Accounts

———————
Elite plan:$28/m.
———————
– Unlimited Web Space
– Unlimited Bandwidth
– Unlimited Plesk Accounts

If you have any questions regarding our web hosting plans and features included in our packages,
Please contact us:https://hostpoco.com/cheapest-windows-re…osting.php
You can also email us anytime at sales@hostpoco.com.

How can I get LOAD DATA LOCAL INFILE to work for MySQL 8.0.21 on a Windows machine?

I’ve created a file: 'C:\fff.txt' which contains data for my database table. Then I’m trying to load data from that file like this:

LOAD DATA LOCAL INFILE 'C:\fff.txt' INTO TABLE fff LINES TERMINATED BY '\r\n';  

but I get the following error all the time:

ERROR 2 <HY000>: File 'C:\fff.txt' not found (OS errno 2 - No such file or directory) 

I’ve added local_infile=1 to [mysql] and [mysqld] sections of my.ini file. When I type: SHOW GLOBAL VARIABLES LIKE 'local_infile'; I can see that it’s set to 'ON'. Is there a way to solve this problem?

Windows RDP vCPU08 RAM16 SSD300 Service Start from $5

Best Configuration and Cheapest Windows VPS-RDP Service in Fiverr. Even the whole Online MarketPlace. Guarantee Windows RDP & VPS Service for Any kind realtime works Like Gaming Server, Streaming Server, Run SEO Software, and many more. Hi-Speed Connection for Download & Upload
Package Offer:
Package 01 – $ 5
-2vCPU
-2GB RAM
-75GB SSD
-Windows Server 2012/2016/2019
-Minimum 1GBp/s Connection
—————Buy it Now———————————–
Package 02 – $ 15
-4vCPU
-8GB RAM
-150GB SSD
-Windows Server 2012/2016/2019
-Minimum 5GBp/s Connection
—————Buy it Now———————————–
Package 03 – $ 25
-8vCPU
-16GB RAM
-300GB SSD
-Windows Server 2012/2016/2019
-Minimum 5GBp/s Connection
—————Buy it Now———————————–

How to close all torrent ports on Windows [closed]

I used to use Deluge to download stuff from torrent (like Linux ISOs), but now I stopped doing it as it’s a huge risk security-wise. I uninstalled Deluge, but I wonder what I have to do to find out whether some torrent ports are still open and I’m at risk of being attacked.

Also, is there a way to find out if I’ve been attacked through torrent?

Does this registry entry for implementing custom protocol handlers in Windows present a security risk?

Background

Some features are not yet available on the web platform and thus require cooperation with a native application in order to provide them. One method for a web application and a native application to communicate with each other is a custom protocol handler.

For instance, the web application can call "mycustomproto://some/params", where "mycustomproto" must first be registered with the operating system as a valid URI protocol. On Windows, this is done in the registry. There are a few keys/subkeys/values etc that must be added to the registry, but only one actually deals with specifying the executable and it’s parameter(s).

Note that once the protocol handler is registered with the operating system, it can be launched by any website that knows of its existence, subjecting it to potential abuse.


Example Windows registry value for this purpose

All of the examples that I’ve found documenting this show the following:

C:\myapp.exe "%1"


Primary Question

Assuming that the registered handler (e.g. "myapp.exe") has zero possible security flaws, is the above example registry value sufficient for ensuring that malicious websites are unable to piggyback additional commands and/or arguments?


Clarifications

  • For the purpose of this question, please assume that the protocol handler (e.g. "myapp.exe") is incapable of exposing vulnerabilities of its own – it’s idle – it launches, does nothing, and quits. This question is specifically related to the browser and/or OS and the "execution" of this registry value.
  • Can malicious actors somehow escape out of the "%1" double quotes and cause the browser and/or OS to run additional commands (e.g. && C:\Win32\do-something-malicious.example.exe)?
  • Similarly, can malicious actors somehow send additional arguments to the protocol handler? Or does the "%1" ensure that the handler will only ever receive a single argument?
  • If this registry value is insufficient to only ever call the protocol handler (and nothing more) with a single argument, is there a better way?

What are the security implications of adding an Intermediate Certificate into the Trusted Root Store in Windows?

I have 2 certificates (one root and one intermediate).

In Windows OS, the Root certificate is in the trusted root store (for current user). The other intermediate certificate (signed by the root CA), is to be found (under current user also) under the Intermediate CA store.

I am using SSL verification in one of my client applications (Kafka Confluent) and realized the client only enumerates certificates in the root store. Therefore SSL handshake fails (the intermediate CA is needed).

One solution is to import that certificate into the Trusted Root Certificate Authorities. With that solution, SSL verification at client works. However, is there any concern in doing so?

From security point of view does it make a difference if the intermediate CA exists in the Root store vs the Intermediate store on Windows?

UPDATE If more context is needed as to what exactly I am facing you can check the issue here https://github.com/edenhill/librdkafka/issues/3025

Windows Exploit Protection: what is SEHOP setting: “TelemetryOnly” for?

I’m reading myself into the different exploit protection methods from MS. One is SEHOP, if I check it e.g. with PS:

Get-ProcessMitigation -System

I get:

    Enable                             : NOTSET     TelemetryOnly                      : OFF     Audit                              : NOTSET     Override SEHOP                     : False 

What is "TelemetryOnly" ? Internet search was not successful so fare.

Thanks for hints and resources!