Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "hackers"
-
A hacker deleted the despacito video from youtube.
Those are not the hackers we deserve, but the hackers we need.17 -
I'm at Disney world and the Windows OS was exposed on one of the machines at a ride so pulled up CMD and ran "tree C:/" then played sample music on full blast. Get on my level hackers :^)10
-
What's the downside of having a "high tech" classroom with Bose speakers and a mid tier PC you say?
Hackers
So back in highschool we used to have these fancy "corporate" classrooms with speakers, PC and projector setup (plus really comfy chairs). Classrooms were organized in triads next to each other so we usually knew when classes where taking place next to us.
One day I decided to fuck around with teachers, I waited until he/she started class and I remotely blasted music or porn sounds on the third empty classroom and waited until the angry teacher rushed to the classroom then...silence...nothing but an empty classroom.
One day one of the teachers was so pissed because I orchestrated a Vivaldi concert with the 3 classrooms he rushed into ours and took a friend of mine who he had a personal grudge against, I kinda felt bad but not so much after my mate told me that was genius and that we should do it again.12 -
CW: The SQL injection vulnerability isn't important because our code is proprietary so hackers won't find it.
Me: <censored>7 -
Anyone know this bitch hacker 127.0.0.1 story?
WORST HACKERS OF ALL TIME
CONTINUED IN THE COMMENTS BECUASE IT IS SO LONG...
TLdr bitch hacker hacks himself by localhost
bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> why do you kick me
<bitchchecker> can’t you discus normally
<bitchchecker> answer!
<Elch> we didn’t kick you
<Elch> you had a ping timeout: * bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
<bitchchecker> what ping man
<bitchchecker> the timing of my pc is right
<bitchchecker> i even have dst
<bitchchecker> you banned me
<bitchchecker> amit it you son of a bitch
<HopperHunter|afk> LOL
<HopperHunter|afk> shit you’re stupid, DST^^
<bitchchecker> shut your mouth WE HAVE DST!
<bitchchecker> for two weaks already
<bitchchecker> when you start your pc there is a message from windows that DST is applied.
<Elch> You’re a real computer expert
<bitchchecker> shut up i hack you
<Elch> ok, i’m quiet, hope you don’t show us how good a hacker you are
<bitchchecker> tell me your network number man then you’re dead
<Elch> Eh, it’s 129.0.0.1
<Elch> or maybe 127.0.0.1
<Elch> yes exactly that’s it: 127.0.0.1 I’m waiting for you great attack
<bitchchecker> in five minutes your hard drive is deleted
<Elch> Now I’m frightened
<bitchchecker> shut up you’ll be gone
<bitchchecker> i have a program where i enter your ip and you’re dead
<bitchchecker> say goodbye
<Elch> to whom?
<bitchchecker> to you man
<bitchchecker> buy buy
<Elch> I’m shivering thinking about such great Hack0rs like you
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> dude be happy my pc crashed otherwise you’d be gone
<Metanot> lol
<Elch> bitchchecker: Then try hacking me again… I still have the same IP: 127.0.0.1
<bitchchecker> you’re so stupid man
<bitchchecker> say buy buy
<Metanot> ah, [Please control your cussing] off
<bitchchecker> buy buy elch
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> elch you son of a bitch
<Metanot> bitchchecker how old are you?
<Elch> What’s up bitchchecker?
<bitchchecker> you have a frie wal
<bitchchecker> fire wall
<Elch> maybe, i don’t know
<bitchchecker> i’m 26
<Metanot> such behaviour with 26?
<Elch> how did you find out that I have a firewall?
<Metanot> tststs this is not very nice missy
<bitchchecker> because your gay fire wall directed my turn off signal back to me
<bitchchecker> be a man turn that shit off
<Elch> cool, didn’t know this was possible.
<bitchchecker> thn my virus destroys your pc man
<Metanot> are you hacking yourselves?
<Elch> yes bitchchecker is trying to hack me
<Metanot> he bitchchecker if you’re a hacker you have to get around a firewall even i can do that
<bitchchecker> yes man i hack the elch but the sucker has a fire wall the
<Metanot> what firewall do you have?
<bitchchecker> like a girl
<Metanot> firewall is normal a normal hacker has to be able to get past it…you girl
<He> Bitch give yourself a jackson and chill you’re letting them provoce you and give those little girls new material all the time
<bitchchecker> turn the firewall off then i send you a virus [Please control your cussing]er
<Elch> Noo
<Metanot> he bitchchecker why turn it off, you should turn it off
<bitchchecker> you’re afraid
<bitchchecker> i don’t wanna hack like this if he hides like a girl behind a fire wall
<bitchchecker> elch turn off your shit wall!
<Metanot> i wanted to say something about this, do you know the definition of hacking??? if he turns of the firewall that’s an invitation and that has nothing to do with hacking
<bitchchecker> shut up
<Metanot> lol
<bitchchecker> my grandma surfs with fire wall
<bitchchecker> and you suckers think you’re cool and don’t dare going into the internet without a fire wall
<Elch> bitchchecker, a collegue showed me how to turn the firewall off. Now you can try again
<Metanot> bitchhacker can’t hack
<Black<TdV>> nice play on words
<bitchchecker> wort man
<Elch> bitchchecker: I’m still waiting for your attack!
<Metanot> how many times again he is no hacker
<bitchchecker> man do you want a virus
<bitchchecker> tell me your ip and it deletes your hard drive
<Metanot> lol ne give it up i’m a hacker myself and i know how hackers behave and i can tell you 100.00% you’re no hacker..30 -
I just started playing around with machine learning in Python today. It's so fucking amazing, man!
All the concepts that come up when you search for tutorials on YouTube (you know, neural networks, SVM, Linear/Logic regression and all that fun stuff) seem overwhelming at first. I must admit, it took me more than 5 hours just to get everything set up the way it should be but, the end result was so satisfying when it finally worked (after ~100 errors).
If any of you guys want to start, I suggest visiting these YouTube channels:
- https://youtube.com/channel/...
- http://youtube.com/playlist/...9 -
*Facebook Hackers follow the Rules*
(real story)
TL;DR: sorry, not available, can't do spoilers
One night I was with a group of friends out at a pub. A guy and his girlfriend show up, I didn't know them but they were my friend's friends.
The girl kept bragging the whole time about his boyfriend being a professional programmer, trying to remind it to everybody whenever possible (don't ask me why!).
So, after a while, the discussion moves towards "suspect Facebook activities" and the guy starts saying that he can hack Facebook.
- "What do you mean?", I ask.
- "Hacking into other people's accounts, even with 2 factor authentication. I did it a lot of times"
- "Wait, and they don't notice?"
- "Of course not! ^_^ He's a hacker", the girl replies.
Ok, time to do a coming out.
- "Hey, I'm a developer myself. Can you give me an idea of what you did in technical terms? Did you find a vulnerability? Used a virus? Maybe a keylogger?"
- "No... Uh... Well... The secret is to read the terms of service"
- "What?"
- "Yes... yes it's all in the facebook terms of service..."
- "Uhm, I'm not really sure I'm following. Could you prove it by hacking my Facebook account? I'm giving you the permission".
In less than a minute the discussion flew completely away and they never mentioned computers again.
😂😂8 -
So my Cyber Security lecturer was talking about scam emails and how potential hackers can spoof their identity in order to gain information or get some malware on your PC.
Since this was all really obvious, I decided to email him with a crude scam email myself for the lols.
To his credit he saw the funny side.6 -
Started talking with someone about general IT stuff. At some point we came to the subject of SSL certificates and he mentioned that 'that stuff is expensive' and so on.
Kindly told him about Let's Encrypt and also that it's free and he reacted: "Then I'd rather have no SSL, free certificates make you look like you're a cheap ass".
So I told him the principle of login/registration thingies and said that they really need SSL, whether it's free or not.
"Nahhh, then I'd still rather don't use SSL, it just looks so cheap when you're using a free certificate".
Hey you know what, what about you write that sentence on a whole fucking pack of paper, dip it into some sambal, maybe add some firecrackers and shove it up your ass? Hopefully that will bring some sense into your very empty head.
Not putting a secure connection on a website, (at all) especially when it has a FUCKING LOGIN/REGISTRATION FUNCTION (!?!?!?!!?!) is simply not fucking done in the year of TWO THOUSAND FUCKING SEVENTEEN.
'Ohh but the NSA etc won't do anything with that data'.
Has it, for one tiny motherfucking second, come to mind that there's also a thing called hackers? Malicious hackers? If your users are on hacked networks, it's easy as fuck to steal their credentials, inject shit and even deliver fucking EXPLOIT KITS.
Oh and you bet your ass the NSA will save that data, they have a whole motherfucking database of passwords they can search through with XKeyScore (snowden leaks).
Motherfucker.68 -
I thought I was a hardcore geek until I came on here.
Super chill enviroment tho
Programmers are some of the nicest people you will meet.
Except the 12 year old hackers.4 -
I heard of it for the first time. And well, this sounds disgusting.
If this happens, I'll seriously start a revolution of hackers fighting internet providers. Seriously9 -
This actually happend in my secondary school class. A new guy came to our class. The whole family moved from another city.
*new guy want to start conversation with me*
new guy: "So you into computers and stuff like that?"
me: "Yes" *seems like a cool guy , want to develop the conversation further* "what about you man? do you like computers? do yo program or smth?"
*new guy wants to look cool in front of me*
new guy: " Yeah dude, actually I am hacker"
*me saying to myself, oh fuck not again this shit*
he continues with: " Once I got into the NASA system"
*switches mode to making fun of him*
me: "what the fuck man? really? that´s freaking cool, how you manage to do that? "
new guy: " you know the thing when you press F10 when starting a comupter? "
me: "You mean BIOS?"
new guy : "yeah yeah man through that shit"
* I am done, laughing my ass off and walks away*1 -
My sister lending me her credit card to buy something online.
S: "But don't store the number!"
me: "I would never."
S: "I know you can hack it, please don't!!"
me: "Haha okay.."
*cries inside... just because I make websites and 3D design*
me: "Thanks a lot, sis <3"12 -
Scammers mann:
——————————————-
“Hello sir, you have to renew your subscription before tomorrow else you’ll be charged $299.99 from your bank account.”
Me: And what’s this subscription you’re talking?
“Your Microsoft antivirus subscription, sir.”
Me: Oh wow, and when did I subscribe to this?
“Three years ago, sir.”
Me: lmbo. Please find someone else to scam.
“No sir, it shows here that you subscribed to Microsoft antivirus 3 years ago.”
Me: Dude, I was in college three years ago. I was too broke to be subscribing to useless stuff like this.
“But sir, its an antivirus. You subscribed to protect your Windows PC from viruses, malware so that bad people and hackers don’t get into your computer to do bad things and steal your info.”
Me: Well, what a coincidence. You’re describing yourself except you’re trying to attack my bank account not my pc. And oh, I’ve been using Linux for the past 5 years and currently own a MacBook so good luck finding someone to fall for this.
“Oh, I see. Sorry.”
*Scammer hangs up.
Lmbo, like dude seriously?
Unfortunately though, someone at my work mother fell for this and had to close all her accounts and create new ones.19 -
i just love /r/hacking, best funny pics reddit i have ever seen.
Also, who would have tought rhat hackers are some of the most politest people?7 -
On the first class of cryptography professor says, "Hackers are people who dropped out of school, didn't obey their parents and turned to drugs and alcohol and steal money from people by hacking their facebook."
Then goes on to say, "People tend to keep their birthdate as their debit card's PIN so hacker checks their facebook account, finds their birthdate and goes to ATM machine and hacks their bank account."
I was speechless.7 -
Hey guys,
I have decided to stop worrying about privacy. I have nothing to hide so why should I even care.
I just created an Instagram and a Facebook account and I also installed WhatsApp again and I ordered an Amazon Alexa and a Google home device as well. These voice assistants are just so useful 😊.
I am also gonna use windows again, everything just works and it is the most used operating system so it has to be the best one! It is way securer than Linux because it is not open source and thus hackers can't find vulnerabilities because they can't see the code.12 -
We're having an ongoing credential stuffing attack right now. Hackers hit us hard over the weekend and the web team sent out an email congratulating themselves that they stopped the threat.
I decided to look to see how they "fixed" the issue.
They modified their code to stop logging the errors to prevent Splunk from sending the automated emails to management (how we have been able to spot/monitor the attack).
They literally just put their heads in the sand, stapled a sign to their ass that reads "Meteor? We see no meteor approaching. Everything is fine."5 -
LoL (I wanted to write only LoL for this rant but you need to write atleast 6 characters, ....oh I think now it's sufficient)4
-
Fuck the incompetent and "pretentious psuedo devs" !!
I have been developing a web portal for a student club for this really big company (as intern) and then they assign this fuckin group of these 4 stupid intern devs to work with me !
The fuckin tweked my code and redirected the CONTACT FORM to the fuckin LOGIN CONTROLLER !!
Then these sons of Einstein inserted dummy users without a username and password into the fuckin production site !!
Now each fukin time someone submits contact form is redirected into some random user account !!
Who the fuck needs Hackers when we have these legendary coders -_-11 -
Best computer/hacking/tech TV and movies?
I'll start the list with some of my favorites.
1. Hackers
2. The Net
3. Jumpin Jack Flash
4. Antitrust
5. Swordfish
6. Wargames
7. Mr Robot
Anyone else?34 -
Disabling pasting into a password field in 2020 with password managers, is retarded. That's it that's the rant. Doesn't matter if you think password managers are good or not. Its still retarded that there's a 40 something year old dumbfuck manager who told a web designer at EA to disable pasting into a fucking password field because he was dumb enough to think it stopped hackers or some shit like that.16
-
Was asked to check the sales team server as it was running slow.
Apart from redundant processes and users with too much permissions I found a "Cobol" folder under one of the sales team member's home folder.
If it weren't the sales people I would immediately disregard this as trolling but with them it's quite possible that this is a real attempt to learn programming...
...most likely from the facebook ads with the hooded guys that offer to teach you to code in 10 days for $800.7 -
My OS professor just said that next week we'll be learning about bash scripts, which is fine for me except for one simple thing. We're using Windows 10 and the instructions he provided us with confirm we'll write Windows batch scripts.
I asked him about that and he shouted at me for "thinking I'm smarter than someone with a PhD in computer science".
Also the whole semester apparentyly we won't even hear about Linux, since "only hackers and some servers use it". FML.13 -
Israeli government hackers hacked into Kaspersky’s network in 2015 and caught Russian government hackers red-handed hacking US government hackers with the help of Kaspersky.
In other words — Russia spying on America, Israel spying on Russia and America spying on everyone.10 -
I hate how people think that to be a "hacker" or hacking is this special job title. lol. Hacking is just using something in a way in which it was not intended to be used.
So pretty much think ...anal sex.
There. Now many people are "hackers"6 -
!rant
The change log from notepad++ update. The last paragraph is the cream!
" The issue of a hijacked DLL concerns scilexer.dll (needed by Notepad++) on a compromised PC, which is replaced by a modified scilexer.dll built by the CIA. When Notepad++ is launched, the modified scilexer.dll is loaded instead of the original one.
It doesn't mean that CIA is interested in your coding skill or in your sex message content typed in Notepad++, but rather it prevents raising any red flags while the DLL does data collection in the background.
It's not a vulnerability/security issue in Notepad++, but for remedying this issue, from this release (v7.3.3) forward, notepad++.exe checks the certificate validation in scilexer.dll before loading it. If the certificate is missing or invalid, then it just won't be loaded, and Notepad++ will fail to launch.
Checking the certificate of DLL makes it harder to hack. Note that once users’ PCs are compromised, the hackers can do anything on the PCs. This solution only prevents from Notepad++ loading a CIA homemade DLL. It doesn't prevent your original notepad++.exe from being replaced by modified notepad++.exe while the CIA is controlling your PC.
Just like knowing the lock is useless for people who are willing to go into my house, I still shut the door and lock it every morning when I leave home. We are in a f**king corrupted world, unfortunately. "1 -
!rant
Guys... I've figured it out. Instead of wearing black hoodies, we should all wear white turtlenecks. We'll be the ultimate hackers. No one would suspect a hipster of being h4XX0r mastermind.10 -
Well one time, it was very awkaward.
My colleague went to lunch, and he was working on some website for international client.
So he left his mac unlocked, and as soon as I saw that I thought i would be cool to add click listener on body of page, and on click it opens up 100 tabs of porn. And I did that.
Before he returned from lunch, client called my boss, with wtf is happeneing with his site, and that it is constantly opening up porn.
What i didnt realize that before colleague went to lunch he contacted client to see some progress. And suprisingly I didnt know that his editor atom was automatically set up to upload website on save to dev server that client is currently looking.
We ofcourse told client it was the hackers :)
But boss wasnt that stupid.
Instant karma.4 -
10 years ago, I found a vulnerability in the connection between an insurer I was working for, and the network of databases of municipalities. I was only a hacker in so far as kids who watched Hak5 are considered hackers, so I always carried this laptop with a fake access point, package sniffer, wep crack, sslstrip, etc with me.
The vulnerabilities allowed me to register a new identity, for which I requested a passport.
Walking up to the town hall desk with two passports with different names, both mine, was pretty cool.
I did not do anything malicious, and was hired to fix the issues (wep encryption on insurers trusted wifi, and municipality postgres gave write access to all third parties)
For a few days I was the coolest kid in school though!2 -
"Can't have a fucking std (method) call, give me a break"
Said that loudly on a phone call. Wondering why people were give me dirty looks on the train1 -
Now that I have time to approach my ultimate dream ( being the pro penrester ) , asked a hacker for a road map and he gave me (U'll rarely see such open hackers that share knowledge :) )
Surprisingly I've been familiar with all the topics but being the most pro , requires u to be pro in every single topic .
Guess what ? I'm starting from basic linux commands all over again 😂
echo 'hello world :/'28 -
My son loves...loves Star Wars, so when Star Wars Battlefront (on the PC) went on sale, he jumped on it.
To my shock (I'm not a big gamer), the game is filled with hackers/cheaters that are able to give themselves 'god' mode, so they can kill in one shot and take no damage.
My son (and others in the game) keeps 'reporting' them, but it looks like an issue EA is ignoring.
My son keeps asking me "You're a programmer, can't you fix the game so they can't do that?"
Good lord...I could care less about russians "hacking" our election (moronic press, doesn't even know what that means), but hacking my son's favorite game!...hmm..wonder how long it would take me to drive to EA headquarters and find that SOB dev manager in charge?
I get it, cheaters are gonna cheat, but fix your friggin' code! Aren't you embarrassed!?
Don't give me any of that "we don't know how they are doing it..." nonsense. This is devrant, not <insert media outlet you hate>.13 -
"[In the future, there will be two types of people.] People who tell computers what to do, and people who are told by computers what to do." - Marc Andreessen
I guess we'll be the ones who tell the computers what to do.4 -
Christmas song for UNIX hackers:
better !pout !cry
better watchout
lpr why
santa claus < north pole > town
cat /etc/passed > list
ncheck list
ncheck list
cat list | grep naughty > nogiftlist
cat list | grep nice > giftlist
santa claus < north pole > town
who | grep sleeping
who | grep awake
who | egrep 'bad|good'
for (goodness sake) {
be good
}
(By Frank Carey, AT&T Bell Laboratories, 1985 )1 -
Noob: "Hey guyz! Im now a hacker! Look at this cool script"
Legit programmer: "oh wow! How does it work?"
Noob: "I have no idea. I found it on the internet "
LP: .........1 -
PM ordered me to not use encryption for customer authentication links because we want to be able so send same link if the user loose it. "we have to prioritize usability over security". At least I can tell future hackers it's not my fault..10
-
"or you could be a real hacker with custom vpn designs and shit. But that's only for real hackers"
Do I need to say more about this class?5 -
Really cool. Tesla gave two hackers that found a vulnerability in the Model 3 free cars as a reward. More companies should do that, instead of getting all pissy. I would hope a company wants to know what their vulnerabilities are so that they can avoid embarrassment and the loss of money.3
-
Arch users are literally like vegans, or guys who study the law - they can’t live normally if they don’t tell you that they use it. Just because you can install it, doesn’t make you instantly a Linux god. It’s like Kali users that they think that they’re hackers if they install it, or MacBook users that think that they are “kool kids” because they have a laptop that thousands of other people have.
Nobody. Cares.14 -
Anyone else sick of all the whining about college on here? It’s a CS degree. They are going to teach you science. Not to mention that Stack Overflow did a survey in 2015 and found that nearly half the developers didn’t have degrees. If you’re so much smarter than your professors then you should have no problem finding a job. Of course, if you’re lucky enough to not have to pay for school; you should just be thankful that you’re a step up in going for management positions and shut up. On the other hand, if you’re paying (going into debt) for school; then maybe you should take a step off the safe and well-trodden path and put a little faith in yourself. There is an abundance of free training online. I thought devs were supposed to be free-spirited rebels. Didn’t any of you see ‘Hackers’?9
-
Hi hackers!
Just not sure about this one:
Is this true?
The closer i get to the router , the more packets i might be able to sniff.
And something else:
I might loose the traffic sent to the other APs while i'm close to one another.
Is there any way to capter all packets?
(I also have wired access to network but since the socket isolates the traffic let me know if there is any other method)
Thanks16 -
When someone says they are a 'HACKER' whereas all they do is watch videos of 'How to hack a GMail account' on YouTube and read 'Learn to hack in 24 hours' , while having no knowledge of networking, security protocols and ports.10
-
The moment when you are able to identify the programming language in the movie you are watching and you know they are doing bullshit...2
-
Hey hackers!
Just found root-me.org !
Cool enough to turn me on.
I've just finished first 8 challangrs which were piece of cake.
Let's see how it goes 😎2 -
{spoilers, i guess...}
In season 1 episode 4 of Mr.Robot, Elliott plans on using a Raspberry Pi to heat up the storage facility in order to destroy the cassette tapes stored there. If he can get the temperature high enough, it would render those tapes useless. I was just wondering, can a hack like this take place in real life?11 -
CAN YOU PLEASE UPDATE TO 2018!!!
My bank just sent me a message, that they have a new service where you can send a private message to your banker.
I needed to transfer money, and didn't have my cheque book on me, so I sent him a message to please transfer XX dollars to account YY.
His response?
Please send us a fax.
A FAX?? ARE YOU SERIOUS??
And that is supposed to be more secure than a private message from your website, after you force me to change my password every 90 days with crazy requirements that only satisfy hackers???
I told my friend that he will get his money when the bank updates the century they live in ...13 -
Edit: disregard this rant, as it seems I have no idea what I'm talking about
"Filesystems encrypted with 128 bit keys are practically unbreakable with today's technology" - my OS professor.
No, I didn't mishear him saying 1024. He said 128 bits.
And yes, it's the same guy from my previous rant (the one with "Linux is just for hackers")13 -
Where the fuck my privacy go?
I'm paying you to listen to music or watch films, I don't want you to create a damm profile my taste or "learn" what might like.
If it was a free service, fine, I'd understand, but I am fucking pying you. I should have the option to completely disable your arse sniffing software.
I know some of them provide a "private mode", but I want that to be the default, I am paying for the god damn service :/6 -
You know a company is ripping you off when they charge £79 for a fucking charger and it breaks in 1 year. Fuck you Apple2
-
Hey hackers! It's me again 😀
If I wanna be an awesome pentester / bug hunter , what should be my main focus?
Network?
Data sciense?
Algorythm?
Low level programming?
I've already passed network + and basics of ccna and I already know pentesting using kali and I know c and python as well.
Just not sure where to go next and keep using kali packages makes me feel like a script kiddie (which is aweful 😬)
Dreaming to be able to write my own exploits and have my own 0day bugs👑
Thanks for any recommandation you would39 -
Some people tape up inputs like camera and mic to keep gov and hackers out of their private lives.
Me, I'm an exhibitionist.1 -
Friend (girl) of my friends realized that I’m a programmer and dated me. She wanted me to hack her ex boyfriend Facebook account.
She abused/used me sexually as long I explain to her that programmers aren’t hackers and I can’t hack fb account.
I feel bad for her! 😂😂5 -
Somebody ranted about austria searching for hackers? well germany does too
"How do you protect your ship from digital attackwaves" - "do what really matters"8 -
Man, what a way to start the week. Our mailserver went nuts (something about a Shellbot virus, I don't know) and we were forced to migrate to a new one. Clients calling in panic and threatening to sue us and shit. I was the one tasked to fix the problem (I am a developer mind you, my sysadmin knowledge is limited to google searching and contacting support). At the same time, Turkish hackers attacked our other server and forced me to fetch backups and clear spamming scripts. And to top it all, I was forced to answer the phone calls and respond to the threats. Man, I must have been a complete prick in my previous lifetime to deserve this.4
-
First we had this stupid Hoverboards.
Now we have god damn fidget spinners. Every Idiot got one.
Now there's fucking Fidgets Spinners with LED.
Will the next fucking Cancer be a IDE with RGB flashing Code, animations and this shit is coming form coding Noob Hipsters and script Kiddies, who wanna be cool???
Kid from the future: Yo Bro lets configure our LED Fidget Spinner with this premade software and call it coding. We will be cool hackers.12 -
Oh well, it was just a countdown until somebody finds a way to create the mask.
"On Friday, Vietnamese security firm Bkav released a blog post and video showing that—by all appearances—they'd cracked Face ID with a composite mask of 3-D-printed plastic, silicone, makeup, and simple paper cutouts, which in combination tricked an iPhone X into unlocking."
"But they say that it was based in part on the realization that Face ID's sensors only checked a portion of a face's features, which WIRED had previously confirmed in our own testing."
source: https://wired.com/story/...5 -
!Rant
To all my fellow developers, hackers and programmers. Can't we all come together to agree that... Finally pushing that big update you have been working and struggling on for so long... is one of the most satisfying feelings ever! <3 -
I'm curious, how did you all start to like programming?
Mine was when I was in grade 7 or 8, which is around 13 years old. I watched a movie called "Hackers", Angelina Jolie was in this one (I think, it was a long time). I was curious on how to be a hacker, then I googled and found an article which said something about learning to code.
I wasn't sure I would enjoy it at first but after a while, I started enjoying that thrill you get when you solve that pesky little bug that took you days to get rid of. Haven't stopped learning more about programming and computers since.8 -
PRIVATE - This is private, nothing here. seriously, there is nothing here. Do not click; I'm not kidding. Definitely no... [read more]3
-
When kids watch tutorials on youtube and think they wanna become black hat hackers and tell everyone that thay are black hat hackers 😂😂
Source : reddit8 -
This morning I was looking in our database in order to solve a problem with a user registration and I accidentally noticed some users registered with unusual email addresses (temporary mail services, Russian providers and so on...).
I immediately thought about malicious users so I dug into the logs and I found that the registration requests started from an IP address belonging to our company (we have static IP addresses). My first reaction was: «OMG! Russian hackers infiltrated into our systems and started registering new users!»
So, I found the coworker owning the laptop from which the requests were sent and I went to him in order to warn him that someone violated his computer.
And he said: «Ah! Those 7 users? Yeah, I was doing some tests, I registered them. My email address was already registered so I created some new ones».
Really, man? Really? WTF6 -
Just spent the entire day of which should have been the start of vacation fighting off a second wave of ransomware on one of our production servers. Gandcrab 5.2 anyone?
Turns out an exploit in our MySQL daemon allowed some fucking Chinese hackermonkey to upload a trojan and remote execute it. Thousands of angry customers, me the only one available and able to fix shit and patch up firewalls and system.
And now I get the pleasure of working on what I should have been doing today, another fire that MUST be put out today.
Fuck you deadlines. Fuck you Chinese hackers. In fact, FML.3 -
ssh your.server.ip, welcome message:
#Ooops! your files have been encrypted.
#Don't waste your time trying to decrypt them.
#Nobody can.
#We would gladly offer you a way of recovering all
#your files safely, but sadly we lost the decryption
#password.
#Hackers too are not perfect, have a nice day.
#PS. you can still send money to support us if you want at this
#web page: fuckyou.onion.
#Your personal key: m0r0nm0t3fukk3r
(I'll code this one day and install it on somebody machine, it's one of my top dreams)11 -
Hey hackers! 😀
Does making a camera disconnected from the network using deauth packets , mean the camera won't send any data to the sarver/admin?
Does that make the camera useless and made the camera disabled?30 -
When i started to get into computers i didn't know a shit about Linux, i had the typical idea that is for hackers. Now i see how things that we use everyday like the phone uses it.
#againstignorance3 -
Hackers hid backdoor in CCleaner, with 2 billion downloads and 2.3 million greatly affected and detected so far, go fuck yourself you Windows fucking gloating noob fanboys showing off how you clean your C with CCleaner like a breeze, go clean your ass now and hope there's no backdoor there! 🖕8
-
Can anyone recommend any good IT / hacker related films that are not HACKERS or THE MATRIX. Thanks.16
-
A guy I work with put some sort of network scanning software on his phone. It reported 2 machines on our network with the word "China" in them.
So I changed the name of my machine to "Russian-Hacker".6 -
As the news that hackers have kept new "pirates of the Caribbean" on hold, this kind of comment reassures the trust or acts as reverse psychology to pay up.
Any ways they have got better customer service than any other big corporates1 -
Damn hackers! Within the course of a week, the internet of my country has been DDOS-attacked three times! Last week the attacks came from Russia or China". Yesterday they came from Russia and Ukraina. Is this a part of the Russian military exercises Zapad 17? Well, when an important part of the infrastructure is down and thousands of civilians are affected, it's for real and not an exercise.31
-
Dear Dark Side #3
Honor the hackers who made your childhood:
Store text in .nfo
Trigger a midi when someone makes a patch
Send ASCII art to your graphics dept6 -
I was helping a client launch a new website. We met in a restaurant to do the final launch work. I mentioned I use VPN software to protect my computer on public WiFI and taught him what it means. He said it sounds hackerish and untrustworthy and I had a hard time explaining how it’s actually a countermeasure to hackers.
The next day he calls and says his cell phone is acting up and wants to know what my VPN software might have done to cause that.
How do some people get dressed in the morning?2 -
So my dad is watching some movie from the nineties titled "Hackers". Here are some lines from it:
"So I got into a server, looked around, run some commands. Only then did I realize that it was a bank server"
How can you not know what server are you hacking? And how did you later find out that it was a bank? For all you know you might be hacking into somebody's blog.
"
Hacker 1: So how are you gonna hack that database?
Hacker 2: I don't know yet.
H1: I would use a vulnerability in their security
"
That's like saying you would enter a building using the front doors.
Did whoever wrote the script for this movie even consulted somebody that knows at least something about hacking?6 -
Watching a piece (a Belgian TV series) about hackers
- Police IT dpt takes a burned down computer (literally burned down -- black from the smoke), plug it into the mains and remove a graphics card. To collect evidence from.
- A policeman from IT dpt is browsing some company's website (while at the police station), looking at their clients. Address bar says: 127.0.0.1.
- The police hacker is browsing some forum. She got the post author's IP and MAC addresses from that forum post metainfo.
<img src="awkward.jpeg" alt="Awkward...">
<img src="confused_jackie.jpeg" alt="Awkward...">19 -
If you are one of all those awesome developers and hackers and I only understand 20% of your rants then props to you and keep scrolling :-D
But if you are a young developer, fresh grad or just learning programming I have an idea, how about a mentor?
This literally just pop in my head right now while cleaning my kitchen!
I'd be learning along your side and also having lots of fun! I don't have any formal experience providing mentoring but have some education credits and patience.
I'm gonna stop the sales pitch because it's annoying even me! but Idk, i just thought that maybe there's someone else out there interested in mentoring services :P3 -
Well, here is another Intel CPU flaw.
I'm starting to think that all these were done on purpose...
https://thehackernews.com/2019/05/...3 -
So apparently the CIA signed some of their malware with a kaspersky certificate to not get caught...
I think this kind of a genius thing from a hackers pov, but very very scary... Gotta remove that thwate ca 😁😁 (they singed the fake kaspersky certificate for the CIA)
Source (in German, I'll add one in English as soon as I fond one): https://m.heise.de/newsticker/...6 -
My 17 year old cousin got inspired by Hollywood movie and said he wanted to be an Hacker. Now, who can explain him the shit that's shown on the silver screen isn't practical in real life. The life of programmers, hackers is rather about learning continuously throught their life rather than hacking into a quantum computer through a gaming console.
🤬9 -
!rant
Bit of a shameless plug but...
I've been making Crypton.sh as my side project for the past couple of months and it's now ready for public consumption. Crypton.sh is a secure and encrypted SMS messaging solution in the cloud, with its original purpose to be a 2FA mobile number that cannot be stolen like a SIM card can be, the idea came about when someone I knew has their SIM card stolen via a SIM card swap scam (https://bbc.co.uk/news/...).
Originally it came about as that idea but grew into something bigger, now everything is encrypted and you can also have conversations with other people, but I'm testing things from time to time and more can follow. Crypton.sh makes sure that you can no longer worry about your SIM card being stolen by malicious hackers, or having a second account on Whatsapp, Telegram, Signal, Google and others.5 -
Call at 5am, meeting in the office at 5.15am, leave office at 5.30am on route to airport because the customer doesn't know how to use the system. It turned out to be nothing :/2
-
In my opinion
php is shit
js is shit
now what we have with babel-preset-php is converting shit to shit. it's a fucking shit storm.
https://gitlab.com/kornelski/...8 -
Just learnt about openspades. Fully opensource FPS shooter game. Bloody amazing stuff.
Lots of hackers but admins are nice on most servers and will permban them.
As is usual with me i compile from git on the latest commit there is. (Dont want to miss out on anything)
I recommend you try it cause its really fun.2 -
Overconfidence is striking again. Some companies are really begging for it... Found this cup in the kitchen of a client. And it is the slogan of an external contractor. It says: this network is unavailable for hackers. I think this is worth at least a triple facepalm1
-
Well, I am now in a commited relationship with devRant.
Just deleted facebook, mainly because it was draining me, MY BATTERY, my battery I mean. And also was not using that old serpant.1 -
Do you guys think it’s time “Hackers” gets its 2020 remake? I know it was cheesy for its time (1995) but 8 year old me was INTO that music video montage direction and that movie inspired was what inspired me to get into tinkering with electronics/embedded systems.
Rewatching it tonight and the casting is so on point, too.5 -
I find it hilarious the total misconception of hacking that the general public has. I tell people I know cyber security (Not as much as a lot of people around here) but it is a hobby of mine and I find it very useful/interesting.
But I can't stop but laugh when someone is like, can you get all the text messages my bf receives?
Can you hack this for me can you back that?
C'mon even if I knew how to do that without being caught you think I would even admit that to you. Do hackers just walk around with an index card pasted to their forehead of their skill? It's not even slightly reasonable to think this lol even for someone who doesn't know about the field -
Rant considering the latest Cyber attack and the news around it.
(A recap: a lot of Windows computers were infected with ransomware (due to security hole on Windows), which demanded 300$ in bitcoins to unlock data. After 3 days the price would double, and after 7 days the data was to be deleted)
1) In our country, one of the biggest companies was attacked (car factory). The production stopped and they got for around 1 000 000€ damage in less than 24h (1300 people without work). The news said that they were attacked because they are such a big company and were charged more, as the hackers "knew who they were dealing with" - another reason being the fact that the text was in croatian (which is our neighbor country), but noone realized that it is just a simple google translate of english text - which is obviously not true. The hackers neither know nor care who is hacked, and will charge everyone the same. They only care about the payment.
2) In UK whole (or large part) of medical infrastructure went down. The main thing everyone was saying was: "Nobody's data is stolen". Which, again, is obvious. But noone said anything about data being deleted after a week, which includes pretty much whole electronic medical record of everyone and is pretty serious.
And by the way, the base of the ransomware is code which was stolen from NSA.
All that millions and millions of dollars of damage could be avoided by simply paying the small fee.
The only thing that is good is that (hopefully) the people will learn the importance of backups. And opening weird emails.
P.S. I fucking hate all that 'hacky thingys' they have all over the news.5 -
Had someone call saying "they are going to help me with protecting against the hackers". I played around for awhile until he asked what operating system I had. When I said linux the gig was up. He knew I was messing with him....2
-
Never felt the need for a stressball until I started using those damn automatic checkout machines ...
The f***** juice is in the f***** bagging area and I dont need no f***** help. Who the f*** coded this shit ***** ***** *****3 -
I just love it to giggle at "hackers" in movies/series.
"He used an ARP to 'crack' the hostname of the server"
And then a countdown when the Server is hacked...11 -
I hate it when my friends think they're hackers just because they were able to jailbreak their phones.4
-
When Hackathon Hackers uses "node.js" so much that I'm not sure if it's actually useful or just a joke anymore....4
-
At a previous job I bumped heads with the IT person a lot because he would spread misinformation about technology so the owners would never replace him. This was conversation with the VP:
VP: Hey I just got a new security setup at my house and I can monitor everything with my phone.
Me: That's cool.
VP: I'm rethinking it because [IT guy] said it was very dangerous to have, what do you think?
Me: ....? What did he say was dangerous about it?
VP: He said hackers could then gain access to cameras and plan the perfect time to rob me since it's in the cloud.
Me: I seriously doubt anyone is planning an Ocean's 11 heist to steal your TV.
VP: Yea I thought it sounded weird when he told me.3 -
Hmm...recently I've seen an increase in the idea of raising security awareness at a user level...but really now , it gets me thinking , why not raise security awareness at a coding level ? Just having one guy do encryption and encoding most certainly isn't enough for an app to be considered secure . In this day an age where most apps are web based and even open source some of them , I think that first of all it should be our duty to protect the customer/consumer rather than make him protect himself . Most of everyone knows how to get user input from the UI but how many out here actually think that the normal dummy user might actually type unintentional malicious code which would break the app or give him access to something he shouldn't be allowed into ? I've seen very few developers/software architects/engineers actually take the blame for insecure code . I've seen people build apps starting on an unacceptable idea security wise and then in the end thinking of patching in filters , encryptions , encodings , tokens and days before release realise that their app is half broken because they didn't start the whole project in a more secure way for the user .
Just my two cents...we as devs should be more aware of coding in a way that makes apps more secure from and for the user rather than saying that we had some epic mythical hackers pull all the user tables that also contained unhashed unencrypted passwords by using magix . It certainly isn't magic , it's just our bad coding that lets outside code interact with our own code . -
Attended my first hackathon this weekend. Had a blast and even won a prize for being voted by other hackers as the best/most interesting project. Had a blast and I will definitely be going to more hackathons soon :) Just wanted to share some positivity for those of you who are thinking of going to your first hackathon9
-
Sololearn has probably the dumbest community I've ever seen...
I know that there are lot of beginners who just started learning programming, but if you can't even use the app, I don't think they will be able to learn programming.
Also all these little kiddies who want to get some badass hackers but don't even know how to do a fucking course (There are lots of questions like "Where can I learn HTML" while they are right in the fucking app, like holy sheeet).
Sometimes I browse the Q&A just because there so funny and dumb questions. Really amusing!8 -
PSA: If you use jQuery and BlueImp's jQuery File Upload there is a big potential vulnerability you need to be aware of. If you use NPM to pull the repo into your public folder, the "server" folder will be available for people to take advantage of. "Hackers" may be able to upload malicious code and replace parts of your site.
I had a site hacked and later saw on Google Analytics that people were posting to random URLs in that folder. The fix is to simply delete that folder, but if you use NPM, you need to be extra careful it doesn't come back.
Also, I didn't investigate further. So I'm not sure what (if anything) is vulnerable in there, or if it was just the specific version I had. To be safe, if you use this plugin (as MANY people do), just delete the folder.
Link to the repo for your reference: https://github.com/blueimp/...4 -
I used to think the "hackers" in movies were so cool, with the scrolling matrix like text. Now I just laugh because I know how stupid and unrealistic most of it is 😆.1
-
Fucking christ this year is a fucking shitfest:
- wpa2 krack
- "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions"
- "Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites"
- "Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe"
My fucking router didn't yet get patched, my fucking phone is outdated and I can't change to my patched one because devrant just shits the bed in extended desktop mode. Windows 8.1 loses support in 3 months, rendering my last chance of using it on my surface pro done, making me use windows 10 with its fucking shit ass not optimized tablet interface. I have just fucking constant paranoia what else could be hacked tomorrow, nothing is fucking safe anymore for fucks sake. I even went as far as implement 3 step auth and intrusion detection on my shitty ass VPS nodes, fucking give me a break you fucking assholes.5 -
So, this incident happened with me around 2 years ago. I was pentesting one of my client's web application. They were new into the Financial Tech Industry, and wanted me to pentest their website as per couple of standards mentioned by them.
One of the most hilarious bug that I found was at the login page, when a user tries logging into an account and forgets the password, a Captcha image is shown where the user needs to prove that he is indeed a human and not a robot, which was fair enough to be implemented at the login screen.
But, here's the catch. When I checked the "view source" option of the web page, I saw that the alt attribute of the Captcha image file had the contents of the Captcha. Making it easy for an attacker to easily bruteforce the shit outta the login page.
You don't need hackers to hack you when your internal dev team itself is self destructive.4 -
I was gonna complain about why it is not clear how the tags should be used...
Then saw the placeholder "Tags (comma separated)" -
Damn you hackers!
This is why it pays to hide your login page with WordPress, luckily not been hacked yet.
They are persistent if nothing else them Bots. 😱1 -
Just reminiscing when back in the "old days" video games had cheats built in...
Proton men and the flying Dutchman IN AOE3...
Now have to find hackers to create trainer apps that change values in memory and bypass cheat detection...7 -
Have to use Mac for mobile development
Have 16 GB of ram on a MacBook Pro machine from 2013.
It’s been working perfectly fine on the stack I’ve been using (Firefox, vscode, react-native, node, docker, Xcode, Android studio, simulator, chrome canary)
Apple releases new hardware with 32 GB ram and a few months later I see my is slowing down due to low ram, forcing me to close apps
I smell something fishy going on2 -
Soon every hacker can move to Toronto and play real-life Watch Dogs.
https://amp.theguardian.com/comment... -
I just feel that the Intel stuff going now has been in the past year.
Maybe the hackers found it, selled about 5 times in the deep web. Then one reported to the officials, and they are releasing a statement in 2018.
tldr Hackers want devs to go mad from the start of 2018.
a.k.a FUCKWIT3 -
Fuck you Chrome Canary. You tell me to update and then keep crashing.
Well admittedly it is Canary :o1 -
Hey hardware hackers, just wanted to let you know that seeedstudio offers free PCB assembly. I got 5 pieces of the PCB in the picture for 30 USD manufactured, assembled and shipped (including BOM costs), the also included 5 additional empty PCBs. However I paid another 30$ for customs and DHL customs handling (I'm inside Europe) ... But still, for assembly it's a great price, took around 4 weeks. Just upload the BOM and you get an instant quote. If you are curious, it's a simple board for an ESP32 with some mosfet drivers and two DC-DC converters.
https://seeedstudio.com/free-assemb...4 -
Fuck the feelings of powerlessness and helplessness. when a friend comes crying for you for help with their hacked account and you keep asking them about what they did to protect it in the first place and they reply with nothing, no recovery email, no recover phone, no secondary verification, NOTHING. and you can do nothing but stand there and watch them cry while you can literally do nothing because there literally nothing you can do to retrieve their stolen accounts. FUCK BLACK HAT HACKERS.3
-
I feel like a lot of us write code without thinking it through beforehand. I spend more than half my day working everything out via diagrams on paper or lucidchart or with a coworker/previous maintainer (if applicable) before line #1 of code is written. Ideas are to code as source code is to build products - the latter is made (essentially by rote) from the former.
I'm glad I work from home thanks to 'rona, but before that, gah. Everyone else was visibly grinding away, and here I am staring into space thinking about the problem/project I'm working on. I'm not gonna sit there all day debugging code I once rushed. There's a reason the sites I maintain stay up and untouched by hackers (I think, you can never be sure...).3 -
😂😂😂 lol oh no what will we do when hackers takeover the world by printing an endless stream of planetary gears. Shame on you Harvard for such a poor picture choice.
-
So that is why strangers want to send me videos/etc. on WhatsApp then !
Not that I could ever get it to install mind you!
Related links:
https://dailymail.co.uk/news/...
----------------
Jeff Bezos' cell phone was hacked in 2018 after he received a malicious WhatsApp message from the crown prince of Saudi Arabia, months before the National Enquirer exposed his affair, it has been claimed.
The Amazon billionaire received a video file containing malicious code from Mohammed Bin Salman's personal phone number, The Guardian reported on Tuesday.
According to forensic examination of the phone afterwards, the message was sent on May 1, 2018. Within hours, a large amount of data from Bezos' phone was extracted. There is no detail of what kind of data was taken.
-----------
https://indiatoday.in/technology/...
-----------------------
https://dailymail.co.uk/sciencetech...
However, there does not appear to be any reports of the vulnerability being actively exploited in the wild.
-----------------------
Apart from the one above maybe..
So, be careful out there !7 -
Fuck you BBC, I just want toblosten to fucking radio and you tell me that I "need" to sign in.
I do not want you to tell me what to losten to. I do not want "relevant" content, just want to listen to 30 mins of news.
Then you say it is easy to signup, but then ask for my exact date of birth as the first question wtf ...5 -
DevRant colors :
White - Gray - Black
White hat hacker , gray hat hacker and black hat hackers
Just something random ..5 -
Boss: We need a discount coupons system right now
Me: We have lot of security concerns, if we implement that as the things are right now, that will be exploited by hackers to get infinite discounts
Boss: Dont worry, i will monitor everything personally for avoid problems
Me: :facepalm:
PD: I entered this software agency 4 months ago by necessity and everything was a mess, they pay 250 bucks to all their devs.
They have what they deserve, a shitty software that can be exploited everywhere
Pls give me another Job xD
PD2: I can sell you lot of exploits for this shitty platform they built JAJAJAJAJAJAJA okno2 -
My eyes are burning. Too much color on the notifications page, evil avatars.
There should have been a warning "Do not open in dark!"5 -
I fucking hate when people think they can do a better job not using a well tested library.
And then try justify why their code is better and quicker than using a library.1 -
comment your favorite tv shows for em coders n hackers here!
ill start:
mr robot, it crowd and silicon valley7 -
If I were to change all my passwords into hashes (so take a random word and hash it, ex 'table') and then use those on various websites, would people ever guess that my password is _an actual hash_ rather than a password in hashed form if they were to see it? Would such a meta-hash be safer if 'hackers' were to find it unencrypted?8
-
Why the fuck does Samsung Hub which I don't want on my device, keeps installing Peel Smart Remote TV Guide, what ever that shit is on my device.
Have deleted it 3 times since yesterday and it keeps installing it.3 -
I had a training about secure software engineering recently. Today was the corresponding exam.
One of the questions was a list of 4 hackers and you should pick the one who was in jail.
That question was so unreal... I was speechless.4 -
"The Phoenix project" alternative ending:
Bill Palmer manages to avert disaster with heroic efforts, working 18 hours per day for weeks.
His wife files for divorce. He starts to sleep at office, next to the servers room.
At the last moment a huge hacker attack almost destroys everything, but he finally manages to announce that Phoenix is ready on time, security auditing passed and any kind of great improvements.
Steve, the CEO, calls him and says: "are you crazy? we put you on an impossible project with short notice to make you fail! All our investors have been secretly short selling our stocks, so now they are waiting a big failure to cash in. We also paid korean hackers to bring you on your knees. But you are really stubborn! "
All Phoenix Project is rolled back, huge shit happens, stocks fall, investors ripe great benefits. All IT is outsourced to an external company (owned by members of the board)
Bill is fired. His reputation tainted by the failure, he can't find job anymore. his technical skills and knowledge are out of date.
As he didn't have time to take care of divorce he has lost also all his personal wealth.
He writes a book about his experience, well, actually a rant, but the company sues him forcing him to pay more money.
In the final scene, police arrests him, drunk while trying to burn a server farm with matches. -
Trying to sleep. Looking at devRant. See a f ew rants about bugs which reminds me of my bug. Get out of bed and now behind my computer trying to fix the bug. Hope it's a quick one so I can go back to sleep
-
Marketing material for a RasPi-based device that, supposedly, secures all your traffic from hackers by (translated) "encrypting traffic to your router" and "sharding and dispersing your data, so nobody can read it".
Stay tuned to see what it actually does (waiting for an email reply from it's creator)6 -
Dude at work floats the idea of creating separate Github accounts for personal and work for security. My response:
While we're discussing options, we should also consider maintaining a list of users as a CSV^H^H^H MS Excel file, and install an authentication server that runs off the laptop of an "IT Administrator". That way it'll be super secure because hackers cannot access any system outside of working hours, as well as the days that said admin is off from work.2 -
Woah dude, where do I sign? 😱
Seriously though, it's the second email of the sort today. The recipient is not even my address, and from some subtle cues (cf. "ethical hacking service", "untracable", "victim never suspect"), he's probably a very bad developer too. Dear "Ruben Villanueva", you're just a f***ing a**hole, I hope you die painfully, dumbface.5 -
Watched some documentary about Russian hackers. Journalist: I need to learn their language. - starts programming/hacking course, sees a shell and a python: runs away. 'That ain't for me.'
At least he tried tho.
Later he finds some Ukrainian hackers. One had a strangely familiar logo on his laptop. Rewind a bit: its hackthebox.
Just had my first blood there. So.. I'm a hacker, too? Good enough for Arte doc's?5 -
Every time I try to use TypeScript for something, everything I learned a month ago is deprecated. Tsconfig keeps changing. The way to get and set up definition files has changed like 5 times now. From downloading, all the way to referencing. Can we please just settle on something now?1
-
Just a thought
If WanaCry hackers instead of spreading ransomware they spreaded Silicon Valley Space Saver like app and the virus inside the app continued spreading itself to around 1 Million pcs, where the app would use around 5GB of storage on each pc giving the hackerd around 5 PB of storage.
Would that be possible like Silicon Valley to create a decenteralized data storage system on pcs all around the world and the app would keep spreading itself and by time expand the storage11 -
Lost my temper at one of our volunteer moderators the other day. We had to do a test using live data, our sysadmin warned him, but not far enough in advance and not really by the right channels. So that was on us. sorry not sorry. But so then he didn't believe us. He must be a geek too cuz he responded with some stupid math problem for me to solve, as if that would prove we work here and aren't hackers or scammers. I replied "how about if i just kick you out of your own group and delete your account, would that convince you?" And so I did. Asshole. Of course I had to apologize later and get a lecture from the boss, but it was kinda worth it.1
-
I really get annoyed when people claim that they are programmers or hackers, when all they did is copy a vbs script they found online.4
-
Enter one word in terminal and hack fucking government's, CIA's, NSA's, websites, database and servers, just like hackers in movies do.
If I failed to achieve this, would love to hack Sony's website and post a message on all their websites
"We make terrible mobile phone" -
Just had an argument (with myself ;)) whether to write a completely server rendered site or a js app.
The only stas I have manged to find is from 2010 saying potentially 2% of users could have js disabled.
Why cannkt I find newer stats :/4 -
My group set up a Linux Dev server. We got hacked by Chinese hackers. We set it up again but even more secure with only people inside the uni can access it. We got hacked again.Turns out one of the modules in a container was using an outdated CentOS version. P.S The malicious file on the server was called kk.love.1
-
Why hospitals,trains,banks and others use this stupid vulnerable OS called Windows and why the hell they need to be connected to the public internet?
Heck I even think Microsoft does one hand with hackers.8 -
I want to break my win 10 password which I have forgot . I know one method of breaking the passcode by using bootable Device . Is there any other method to other than using bootable device for breaking the passcode? please suggest some technique11
-
Work on projects that produce something that solves one of my existing problems.
Also dev environment matters. One of those hackers desk setups would be fine. Nothing too fancy, just need a functional one. -
What if. What if all the developer are just one developer. What if all the world is just a training setting for that single developer. All the developers are just manifestation of one single developer.
All the greatest hackers and the noon. Every developer In the world is you. You are all the developer. The one who codes in java python JavaScript. Heck cobol. It's you. What if all the developers are just one developer manifesting differently ?
(Inspired from similar story where all human in history is just one person manifesting into forms to prepare him for higher 'levels ')4 -
Every time I log into a server for a client:
Important notice: only employees of xyz are authorised to use this equipment.
Our client outsources their it to another company, someone from that company sent me details of a server for me to install our software. They licence our software, I am not an employee. I guess it must scare off the hackers?1 -
For fuck sake, stop complaining about the number of js libs. There is just as many if not more c/c++/c#/java/python/ruby/php... libs.
Just because they are available on npm or github, it doesn't mean you have to fucking see/read/use it1 -
Have you seen those comments which are better than the rants themselves ...
I see myself being forced to ++ the rant, just so people could see the comment :/1 -
There is a subreddit collecting media scenes which shows “hackers” and discussing them.
https://reddit.com/r/...: -
Avoided IoT(IoS - InternetOfShit) for a long time now, due to the security concerns with retail products.
Now I looked into 433 Transceiver + Arduino solutions.. to build something myself, just for the lolz.
Theory:
Smallest Arduino I found has 32 KByte of programmable memory, a tiny tiny crypto library could take around 4 KBytes...
Set a symetric crypto key for each homebrewn device / sensor / etc, send the info and commands (with time of day as salt for example) encrypted between Server <-> IoT gadget, ciphertext would have checksum appended, magic and ciphertext length prepended.
Result:
Be safe from possible drive-by attacks, still have a somewhat reliable communication?!
Ofc passionate hackers would be still able to crack it, no doubt.
Question: Am I thinking too simple? Am I describing just the standard here?14 -
!Rant
Not sure where else to ask but here, as I am an unsocial creature; But I need new music!
My general favourite type of music is anything from any of the wipeout games, 90s techno style, think of the backing music from the film Hackers, and that's pretty much my vibe 90% of the time.
You guys got any suggestions? I can't be the only one here into deep techno/progressive industrial techno whatever you can call it I am really unsure!
things like:
prodigy, 808 state, wipeout style, possibly borderline on keygen/chiptune type music depending how its done
Thanks guys! *hug*3 -
Is devRant using Google Analytics for upvotes (on web)? My privacy protection apps have removed the ++ button because of that on web :(1
-
!gamingRant
What annoys my the most in gaming, is when gamers refer to cheaters as "hackers". THEY AREN'T. They are SCRIPT KITTIES. I'm sure most of us here would consider ourselves hackers, and we can all agree that hacking takes time, motivation, and most of all, skill. Cheaters in video games are the lowest of the low. The just download and install scripts written by real hackers. This triggers me beyond words and all caps. What do you all think?7 -
One time, i would put a random stacktrace / error log containing fake server credentials/ card info etc on a page/ action letting those "hackers" waste their time digging into it.. only to found out that the server is just a repo of (i would like to say porn butthats still a win situation) useless things1
-
I can't believe companies fucking do this! If your users PIIs gets fucking leaked or the security is breached in any god-damned way it's YOUR FUCKING JOB to let the affected users know! 57 million users got affected! What the fucking fuck? I think they should pass proper laws where companies have to tell the victims about breaches, especially when it's at a such a huge scale. I get it that it's wasn't under Uber but some third party; but even so Uber should have talked about the level of security in their SLAs and maybe performed regular audits.
This is ridiculous!
https://darkreading.com/attacks-bre...5 -
That moment you setup 17 domains on sparkpost as a email delivery system
make your account secure with 2 factor authentication like a good infoSec enthusiast
Go on with your life
Having a Phone crash but nothing to worry because you made them backupz
Restore backupz
once again go on with your happy life.
Having to setup a different bounce action on sparkpost
logging in to sparkpost to make the adjustments
opening google authenticator
realising the backup you restored was before you added the sparkpost entry
mailing sparkpost asking to deactivate 2factor authentication
Having them tell me that they have no access to Google authenticator so they can't help me and all they can do for me is delete my account if i answer their 7569357 questions that i entered a year ago ..
--
You have access to your database yes ? You can delete my account but you can't adjust a fcking Boolean column from true to false? #@?#&!
Why even offer a feature where you have apparently no control over. Stuff like this happens all the time and almost no one saves that fcking authenticator secret.
Make people use authenticators to keep the hackers out, forces them out instead.4 -
I see lots of script kiddies these days that call themselves software developers or hackers. Their shitty code is flooding the world, so write more code you fuckers and let the world burn2
-
You know when you are interested in a topic or have a question, and you find it on stackoberflow or hacker news, but it is from 754 days ago ...
You are left wondering, should I leave a comment here or create a new thread ...1 -
Why don't hackers or super coders in tv/movies use mouse? I can't even think of working without a mouse!6
-
No the problem is if Tech companies aren't doing it... hackers will anyway?
https://futurism.com/darpa-stop-dee...1 -
You know what's a great app? Termux! It's amazing. Yesterday I tried running apache on it and it worked! If you haven't tried it yet, you really should, it's great. For those of you that don't know, it's basically a custom Linux evnvironment that doesn't require root acces. You can use it for ssh, you can use vim in it, python, standard commands etc. I'm definietly thinking about buying stuff like the customization to support the developer. Btw. Along with "Hackers keyboard" it's even better!
-
Last night the Russians stroke again. It's become obvious that these Ddos attacks are not performed by just some casual hackers, but are part of cyber warfare - just as I suspected in one of my rants a couple of weeks ago6
-
Anyone else a fan of Android: Netrunner? I believe it's one of the only (tabletop) games that depict hackers accurately2
-
Dont want anything, maybe an alternative main stream social network which I actually own my data and I can define who accesses it and who doesnt. Its my info not the company that it is being held on.
Smart p2p and encrypted which somehow only those I allow can view it.3 -
I want to setup a website, I have a few questions.
What's SEO and how does it affect my website?
Where should I setup?
Also how should I set it up to prevent hackers from damaging my site?11 -
About to submit a form to get a scholarship to a government website, and guess what. Errors everywhere. Why are they like this? These government websites are also known to be very vulnerable to hackers2
-
The feeling of evil satisfaction when your boss asks you to build a killswitch into a client's project.
Just call me Zero Cool.4 -
Fuck you "hackers"! You make my life miserable...
No longer can anyone simply enter their user name and password to enter an online app...
Now we as programmers have to leap from one fiery hoop on the precipice of a death defying cliff to another acidic hoop in some mystical forgotten cavern of the underworld just so our users can log in securely to our app... sigh... I'm looking at you Auth0 and Microsoft SSO / AAD !!!111oneeleven
I mean wtf even is a nonce?!
https://urbandictionary.com/define....
**gosh**12 -
Tests, unit tests, integration tests, ui tests, tdd, bdd
I thought I was done with tests after school. Why, why you do this to me 😢😢😢4 -
I'd love to get into a career within the cyber security industry.
Anyone got advice?
I've played around with Kali/Parrot and setup a proxmox box to perform pen testing and have a fair number of PDF ebooks and audio books on networks, security and pen testing12 -
Infosec : I have started a telegram channel.
Join and spread the word..
Link : Hack3rB0x 🔊
https://t.me/hack3rb0x1 -
Anyone going to defcon in a couple weeks? If not, you should think about it. Quite the experience in hacker culture!9
-
Oh no, apparently GDPR is worse than we thought. Just look at the linked thread. The government needs not to touch anything
https://twitter.com/alexstamos/...2 -
I thought devRant week count would have overflowed and gone back to 1.
Qhat sort of year has more than 52 weeks, feels like the estimates PMs give ... -
When did it become so hard to come up with usernames that dont contain your name or year of birth ...4
-
A co-worker ask me to translate my "comments" (*which are in facts annotations) to french since it's private code and as it "plays hackers game". The same coworker writes his methods starting with a uppercase.
This is bothering me a lot.
I want to quit.1 -
They need to add a new definition of Eclipse to all dictionaries.
Taking away the light and joy of development out of the process.
Synonyms: impossible, waste of time, wishing for Friday.1 -
Before now, Twitter was under a bitcoin twister verified attack ( that is my name for it ), now Snapchat is on a photo exposing viral attack.
is this World War including hackers, messing with social media handles.
World War 3 will be fought online, i know yeah.1 -
The consistency of php standard lib function is astonishing. array_map, array_reduce ...
Why do I have to use php7 😢😢😭😭😭1 -
If I wanted to do some 1990s hackers shit, but more for this time period is there a way i can autopilot the apps on a smartphone that offer those crappy free numbers and auto-dial with them and feed / receive audio information into/from them via a program ?3
-
Drawing might not be inherently software-related, but this particular sketch IS software-related. Additionally, the depicted character looks a bit pissed. As such, posting this thing to devRant SHOULD be all right.
Of course, "random" is a stupid term; this post is at best pseudorandom. Every man who is worth a highland midge's urine sample knows that KOOL KEITH is the one true source of entropy.
Actually managing to draw a decent-looking three-quarters pose demands a celebratory ginger ale!
This drawing or a relatively refined equivalent should eventually be used as an image on the 5XX error pages of VARIK's Web servers.
Detailed criticism is welcomed -- not knowing that stuff sucks sucks.
The lack of a standard APL logo is a damn shame. Luckily, the light bulb is handsome and recognisable for APL hackers. -
Since i was little i always wanted to amaze my friends with something. Back then it was magic, then it was music and now it's programming. Please don't kill me but i remember looking at hackers and stuff and seeing how they could remotely control other people's computers and i just wanted to learn that so i looked it up on google and found a post somewhere saying that if you're a hacker and don't even know basic html then you're not a hacker so i decided to learn html. Not so long has passed and i still want to be a developer so i am trying to learn javascript and then start moving to heavier languages. No one i know codes and i'm really alone so if i can simply make something cool with javascript they will be amazed, in the end that's all i want.
-
Ok , so about #wannacry project all we need is group of good programmers and ethitical hackers even black ,any way who wanna join us ? Lets make money3
-
AI taking my job
Become the next president with the moto of build a wall, build a wall, build a wall
Make dev great again ... -
Has anyone here tried nim lang?
I have been intrigued by it, but not sure if it will stay around for the long run. I believe they have been trying to reach v 1.0 for a while, but it is taking longer than expected.
Would be interested your opinions :) -
Happy Friday. Facebook just disclosed hackers have exploited multiple vulnerabilities to get access to potentially 50 million users. I guess... no weekend for the blue team? https://mobile.twitter.com/dnvolz/...
-
Russians Engineer a Brilliant Slot Machine Cheat
...But as the “pseudo” in the name suggests, the numbers aren’t truly random. Because human beings create them using coded instructions, PRNGs can’t help but be a bit deterministic. (A true random number generator must be rooted in a phenomenon that is not manmade, such as radioactive decay.) PRNGs take an initial number, known as a seed, and then mash it together with various hidden and shifting inputs—the time from a machine’s internal clock, for example—in order to produce a result that appears impossible to forecast. But if hackers can identify the various ingredients in that mathematical stew, they can potentially predict a PRNG’s output. That process of reverse engineering becomes much easier, of course, when a hacker has physical access to a slot machine’s innards...
https://wired.com/2017/02/...1 -
You know how people rant about js frameworks; well the very same is true about nosql.
I thought let me broaden my horizon (pun intended) with a nosql db in my project.
So from Friday evening, I started off with ElasticSearch, which is pretty simple to get started, but apparently I need to understand it a lot better to use it as a primary data-store.
Then I stumble upon orient-db, was pretty exciting and learnt the apis/librarys but researching it a bit more to learn about the community; there is some bad-blood there.
Now I'm onto something called ArangoDB, think I'll stick with this; Any more time spent on this and I'll just give up on the project.5 -
How are you building your products today?
-> What is your tech stack?
-> Your reasons for choosing them?
-> Any pain points you can help other indie hackers avoid?
I will start with mine -11 -
Sigh, when you realise your bank is using depracated dojo.js (uncompressed with console warnings) and it wont proceed unless you turn ublock origin off ...
-
A little bit ago I mentioned that I need to do an interview with someone in a career I'm interested and I talked to my teacher so I am allowed to do a skype interview
So are there any Programmers or Ethical Hackers who are available for an interview over skype or something similar
This is an informal interview so please don't be intimidating
My skype name is the same as my Devrant - jester5537 if interested leave a comment and I'll see how many I can do (I only need 1 for class but I want to learn as much as possible)
Thank you for your time -
Bwhahahah! Even after the excitement, business disruption, unpleasantness and pain, GDPR fails at its one job
https://newstatesman.com/science-te...1 -
I have just allowed '*' on the rack-cors host configuration. Yiiiiihhhhaaaaa.. no cors problems on Rails again.
But hackers will go fuck my api. -
I wonder if we will have a sprint review meeting for 2016. You know to prevent the shit storm that happened to continue ...
-
Posted on indie hackers if anyone fancies reading my short blog on launching SongBox
https://indiehackers.com/forum/...