Also... though glownigger feds want to associate talk.lol with copyright infringement promotion, and such topics should not be promoted here, it is important to sometimes cover malware issues in PDFs by Feds and russian hackers.
Sci-Hub might lead you via addiction to links like these 2.5 million books, or zlibs 16 million books :
Serious warning : these millions of books are free because 15% of them , at time uploaded , have zero day PDF exploits to root Adobe Acrobat and root Foxit (yes foxit too). THEY INFECT YOUR MACHINES so russian hackers can steal Steam passwords, credit cards, and bitcoin passwords.
Solution? only open PDF books uploaded over a year ago, or use a VM to run your pdf reader. Or convert PDFs to EPUB or RTF using web based tools. Or convert PDFs to epub on someone elses computer like a library or school computer.
After a year goes by, the latest PDF readers can be used safely with your older downloads from over a year ago.
[i]Monday?{/i] Kind of procrastinating, aren't you? You can't possibly read, or even scan, all of these book. You should have started sooner. You're a lazy scholar, and I think you don't deserve help with your 11th hour desperate cry for help.
Plus, it's very likely z-lib won't have many of those books.
[ + ] Ironcrusader88
[ - ] Ironcrusader88 1 point 3.2 yearsApr 23, 2022 00:20:52 ago (+1/-0)
[ + ] stone12345
[ - ] stone12345 [op] 0 points 3.2 yearsApr 23, 2022 00:48:29 ago (+0/-0)
[ + ] SilentByAssociation
[ - ] SilentByAssociation 3 points 3.2 yearsApr 23, 2022 00:27:42 ago (+3/-0)
https://u1lib.org/book/16686777/066d8e
[ + ] oursenilepresident
[ - ] oursenilepresident 3 points 3.2 yearsApr 23, 2022 01:05:26 ago (+3/-0)
Sci-Hub might lead you via addiction to links like these 2.5 million books, or zlibs 16 million books :
https://booksc.org/ (zLib has books too, but likes pay to play)
http://libgen.rs/
http://libgen.is/
http://libgen.st/
https://libgen.fun/
https://libgen.lc/
https://libgen.pw/
https://www.reddit.com/r/libgen/
https://www.reddit.com/r/scihub/wiki/index#wiki_official_sci-hub_mirrors
https://sci-hub.do/
https://sci-hub.st/
https://sci-hub.ru/
https://sci-hub.se/
http://bookfi.net/ (2240000 books)
https://b-ok.cc/ (zLib !)
http://twitter.com/Sci_Hub
http://facebook.com/sci.hub.org
http://engineuring.wordpress.com/
usenet gets some fresh ones too :
https://binsearch.info/?q=libgen&max=100&adv_age=1100&server=
DANGER DANGER!
=====
Serious warning : these millions of books are free because 15% of them , at time uploaded , have zero day PDF exploits to root Adobe Acrobat and root Foxit (yes foxit too). THEY INFECT YOUR MACHINES so russian hackers can steal Steam passwords, credit cards, and bitcoin passwords.
Solution? only open PDF books uploaded over a year ago, or use a VM to run your pdf reader. Or convert PDFs to EPUB or RTF using web based tools. Or convert PDFs to epub on someone elses computer like a library or school computer.
After a year goes by, the latest PDF readers can be used safely with your older downloads from over a year ago.
COUNTLESS new exploits revealed year after year :
Adobe acrobat : https://www.cvedetails.com/product/497/Adobe-Acrobat-Reader.html?vendor_id=53
Foxit : https://www.cvedetails.com/product/16993/Foxitsoftware-Foxit-Reader.html?vendor_id=7654
and
Foxit : https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=foxit
Look at those ! 700 PDF exploits! Here's 1,902 more Acrobat PDF exploits:
=========
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=acrobat
Some are from 2022.
Most are critical in importance. Many insert code into your operating system just by opening a PDF up , even not hooked to internet.
Linux too, not just Windows... ALL PDF readers on linux have allowed remote code insertion into kernel merely by reading PDFs.
The CIA and FBI spend millions of dollars creating linux PDF exploits off of PDF buffer overflows. NSA does too.
Remote code execution in Okular PDF reader for KDE:
https://www.cybersecurity-help.cz/vdb/SB2020031319
some require a click on a thing that is a action link though :
"KDE Okular before 1.10.0 allows code execution via an action link in a PDF document."
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9359
Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575
over a dozen for "Evince PDF reader"
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Evince
"XPDF?" 131 CVE Records ! :
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=XPDF
Mupdf? 50 CVE Exploit records :
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mupdf
Poppler library? Fucking Dumpser fire full of exploits, 111 CVE Records :
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Poppler
Lots of "safe light secure linux PDF readers" use Poppler library. What a goddamned joke.
TL/DR: 15% of PDFs are contaminated with fresh malware at time of upload, to permanently root your computer. Use epubs, not PDFs is a solution.
[ + ] stone12345
[ - ] stone12345 [op] 1 point 3.2 yearsApr 23, 2022 01:14:47 ago (+1/-0)
[ + ] stone12345
[ - ] stone12345 [op] 0 points 3.2 yearsApr 23, 2022 00:48:20 ago (+0/-0)
[ + ] HughBriss
[ - ] HughBriss 2 points 3.2 yearsApr 23, 2022 00:37:50 ago (+2/-0)
Plus, it's very likely z-lib won't have many of those books.
[ + ] stone12345
[ - ] stone12345 [op] -1 points 3.2 yearsApr 23, 2022 00:53:38 ago (+0/-1)
nigga don't hate me because I'm beautiful nigga
[ + ] Yargiyankooli
[ - ] Yargiyankooli 0 points 3.2 yearsApr 23, 2022 07:21:30 ago (+0/-0)
[ + ] stone12345
[ - ] stone12345 [op] 1 point 3.2 yearsApr 23, 2022 19:48:30 ago (+1/-0)
[ + ] Yargiyankooli
[ - ] Yargiyankooli 2 points 3.2 yearsApr 23, 2022 19:57:42 ago (+2/-0)
[ + ] beece
[ - ] beece 1 point 3.2 yearsApr 25, 2022 09:04:49 ago (+1/-0)