Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "not a hacker"
-
*Now that's what I call a Hacker*
MOTHER OF ALL AUTOMATIONS
This seems a long post. but you will definitely +1 the post after reading this.
xxx: OK, so, our build engineer has left for another company. The dude was literally living inside the terminal. You know, that type of a guy who loves Vim, creates diagrams in Dot and writes wiki-posts in Markdown... If something - anything - requires more than 90 seconds of his time, he writes a script to automate that.
xxx: So we're sitting here, looking through his, uhm, "legacy"
xxx: You're gonna love this
xxx: smack-my-bitch-up.sh - sends a text message "late at work" to his wife (apparently). Automatically picks reasons from an array of strings, randomly. Runs inside a cron-job. The job fires if there are active SSH-sessions on the server after 9pm with his login.
xxx: kumar-asshole.sh - scans the inbox for emails from "Kumar" (a DBA at our clients). Looks for keywords like "help", "trouble", "sorry" etc. If keywords are found - the script SSHes into the clients server and rolls back the staging database to the latest backup. Then sends a reply "no worries mate, be careful next time".
xxx: hangover.sh - another cron-job that is set to specific dates. Sends automated emails like "not feeling well/gonna work from home" etc. Adds a random "reason" from another predefined array of strings. Fires if there are no interactive sessions on the server at 8:45am.
xxx: (and the oscar goes to) fuckingcoffee.sh - this one waits exactly 17 seconds (!), then opens an SSH session to our coffee-machine (we had no frikin idea the coffee machine is on the network, runs linux and has SSHD up and running) and sends some weird gibberish to it. Looks binary. Turns out this thing starts brewing a mid-sized half-caf latte and waits another 24 (!) seconds before pouring it into a cup. The timing is exactly how long it takes to walk to the machine from the dudes desk.
xxx: holy sh*t I'm keeping those
Credit: http://bit.ly/1jcTuTT
The bash scripts weren't bogus, you can find his scripts on the this github URL:
https://github.com/narkoz/...56 -
Today my classmate came up to me and said he was a hacker.
I told him to prove it, and guess what? HE ACTUALLY HACKED GOOGLE!
It was amazing! He impressed so many kids in the class with his skills of pressing F12! How impressive is that?
He even wore a black hoodie and can spell his name in binary code. Not to mention, he changed google doc's page color to black and the font to green as he typed his essay.
I need to be careful... This 1337 h4x0r is really scary.
83w4r349 -
A hacker deleted the despacito video from youtube.
Those are not the hackers we deserve, but the hackers we need.18 -
An incident which made a Security Researcher cry
--------------------------------------------------------
I was working on my laptop finishing up my code while waiting for the flight which was late . Meanwhile two guys (I'm gonna call them Fellas) in black suit and shades came to me
Fella : Sir you have to come with us .
Me : *goes along with them*
Fella : Sir please proceed *points towards the door . The room has a round table with some guys discussing something *
Fella 1 : Your passport please
Me : *Hands over the passport*
Fella 1 : Where are you traveling to sir?
Me : India
Fella 1 : Put your laptop in the desk sir.
Me : Sure thing
Fella 2 : What were you doing there? *Taps the power button*
Me : Just finishing up my work .
Fella 1 : Or hacking our systems?
Me : Seriously?
Fella 2 : The password please .
Me : Here you go
*5 minutes have passed and he still can't figure out how to use the machine*
Fella 2 : Which Windows is this?
Me : It's Linux
Fella 1 : So you are a hacker .
Me : Nope
Fella 1 : You are using Linux
Me : Does it matters?
Fella 1 : Where do you work?
Me : *I won't mention here but I told him*
Fella 2 : So what do you do there?
Me : I'm a Security Researcher
Fella 1 : What's your work?
Me : I find security holes in their systems .
Fella 1 : That means you are a hacker .
Me : Not at all .
Fella 2 : But they do the same and they use Linux .
Me : You can call me one .
*After 15 minutes of doo-laa-baa-dee-doo-ra-ba-doo amongst them I dunno what they were talking , they shutdown the computer and handed over it to me*
Fella 2 - So you are somewhat like a hacker .
Me - *A bit frustrated* Yes.
##And now the glorious question appeared like an angel from river ##
Can you hack Facebook?
Me - 😭😭😭28 -
Anyone know this bitch hacker 127.0.0.1 story?
WORST HACKERS OF ALL TIME
CONTINUED IN THE COMMENTS BECUASE IT IS SO LONG...
TLdr bitch hacker hacks himself by localhost
bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> why do you kick me
<bitchchecker> can’t you discus normally
<bitchchecker> answer!
<Elch> we didn’t kick you
<Elch> you had a ping timeout: * bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
<bitchchecker> what ping man
<bitchchecker> the timing of my pc is right
<bitchchecker> i even have dst
<bitchchecker> you banned me
<bitchchecker> amit it you son of a bitch
<HopperHunter|afk> LOL
<HopperHunter|afk> shit you’re stupid, DST^^
<bitchchecker> shut your mouth WE HAVE DST!
<bitchchecker> for two weaks already
<bitchchecker> when you start your pc there is a message from windows that DST is applied.
<Elch> You’re a real computer expert
<bitchchecker> shut up i hack you
<Elch> ok, i’m quiet, hope you don’t show us how good a hacker you are
<bitchchecker> tell me your network number man then you’re dead
<Elch> Eh, it’s 129.0.0.1
<Elch> or maybe 127.0.0.1
<Elch> yes exactly that’s it: 127.0.0.1 I’m waiting for you great attack
<bitchchecker> in five minutes your hard drive is deleted
<Elch> Now I’m frightened
<bitchchecker> shut up you’ll be gone
<bitchchecker> i have a program where i enter your ip and you’re dead
<bitchchecker> say goodbye
<Elch> to whom?
<bitchchecker> to you man
<bitchchecker> buy buy
<Elch> I’m shivering thinking about such great Hack0rs like you
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> dude be happy my pc crashed otherwise you’d be gone
<Metanot> lol
<Elch> bitchchecker: Then try hacking me again… I still have the same IP: 127.0.0.1
<bitchchecker> you’re so stupid man
<bitchchecker> say buy buy
<Metanot> ah, [Please control your cussing] off
<bitchchecker> buy buy elch
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> elch you son of a bitch
<Metanot> bitchchecker how old are you?
<Elch> What’s up bitchchecker?
<bitchchecker> you have a frie wal
<bitchchecker> fire wall
<Elch> maybe, i don’t know
<bitchchecker> i’m 26
<Metanot> such behaviour with 26?
<Elch> how did you find out that I have a firewall?
<Metanot> tststs this is not very nice missy
<bitchchecker> because your gay fire wall directed my turn off signal back to me
<bitchchecker> be a man turn that shit off
<Elch> cool, didn’t know this was possible.
<bitchchecker> thn my virus destroys your pc man
<Metanot> are you hacking yourselves?
<Elch> yes bitchchecker is trying to hack me
<Metanot> he bitchchecker if you’re a hacker you have to get around a firewall even i can do that
<bitchchecker> yes man i hack the elch but the sucker has a fire wall the
<Metanot> what firewall do you have?
<bitchchecker> like a girl
<Metanot> firewall is normal a normal hacker has to be able to get past it…you girl
<He> Bitch give yourself a jackson and chill you’re letting them provoce you and give those little girls new material all the time
<bitchchecker> turn the firewall off then i send you a virus [Please control your cussing]er
<Elch> Noo
<Metanot> he bitchchecker why turn it off, you should turn it off
<bitchchecker> you’re afraid
<bitchchecker> i don’t wanna hack like this if he hides like a girl behind a fire wall
<bitchchecker> elch turn off your shit wall!
<Metanot> i wanted to say something about this, do you know the definition of hacking??? if he turns of the firewall that’s an invitation and that has nothing to do with hacking
<bitchchecker> shut up
<Metanot> lol
<bitchchecker> my grandma surfs with fire wall
<bitchchecker> and you suckers think you’re cool and don’t dare going into the internet without a fire wall
<Elch> bitchchecker, a collegue showed me how to turn the firewall off. Now you can try again
<Metanot> bitchhacker can’t hack
<Black<TdV>> nice play on words
<bitchchecker> wort man
<Elch> bitchchecker: I’m still waiting for your attack!
<Metanot> how many times again he is no hacker
<bitchchecker> man do you want a virus
<bitchchecker> tell me your ip and it deletes your hard drive
<Metanot> lol ne give it up i’m a hacker myself and i know how hackers behave and i can tell you 100.00% you’re no hacker..30 -
*Facebook Hackers follow the Rules*
(real story)
TL;DR: sorry, not available, can't do spoilers
One night I was with a group of friends out at a pub. A guy and his girlfriend show up, I didn't know them but they were my friend's friends.
The girl kept bragging the whole time about his boyfriend being a professional programmer, trying to remind it to everybody whenever possible (don't ask me why!).
So, after a while, the discussion moves towards "suspect Facebook activities" and the guy starts saying that he can hack Facebook.
- "What do you mean?", I ask.
- "Hacking into other people's accounts, even with 2 factor authentication. I did it a lot of times"
- "Wait, and they don't notice?"
- "Of course not! ^_^ He's a hacker", the girl replies.
Ok, time to do a coming out.
- "Hey, I'm a developer myself. Can you give me an idea of what you did in technical terms? Did you find a vulnerability? Used a virus? Maybe a keylogger?"
- "No... Uh... Well... The secret is to read the terms of service"
- "What?"
- "Yes... yes it's all in the facebook terms of service..."
- "Uhm, I'm not really sure I'm following. Could you prove it by hacking my Facebook account? I'm giving you the permission".
In less than a minute the discussion flew completely away and they never mentioned computers again.
😂😂8 -
This actually happend in my secondary school class. A new guy came to our class. The whole family moved from another city.
*new guy want to start conversation with me*
new guy: "So you into computers and stuff like that?"
me: "Yes" *seems like a cool guy , want to develop the conversation further* "what about you man? do you like computers? do yo program or smth?"
*new guy wants to look cool in front of me*
new guy: " Yeah dude, actually I am hacker"
*me saying to myself, oh fuck not again this shit*
he continues with: " Once I got into the NASA system"
*switches mode to making fun of him*
me: "what the fuck man? really? that´s freaking cool, how you manage to do that? "
new guy: " you know the thing when you press F10 when starting a comupter? "
me: "You mean BIOS?"
new guy : "yeah yeah man through that shit"
* I am done, laughing my ass off and walks away*1 -
Corporate IT: YOU MUST COME INTO THE OFFICE. WE JUST RECEIVED AN URGENT NOTIFICATION FROM APPLE OF A SECURITY VULNERABILITY IN iOS DEVICES. YOU HAVE BEEN IDENTIFIED AS HAVING A MAC ASSET. COME INTO THE OFFICE IMMEDIATELY AND UPDATE IT.
Dev: I don’t use that mac, it sits in my office desk drawer unplugged. I’ll update it if I ever need it for anything. Which I won’t, we don’t do iOS dev anymore.
Corporate IT: NOOOOO!!! YOU MUST UPDATE IT NOW!!!
Dev: I’m not wasting time driving into the office this week. We have an important deadline we’re working on, I can’t afford to lose 2 hours to this. Plus it can’t be turned on right now, It’s been unplugged for 2 years.
Corporate IT: THAT WOULDN’T STOP A HACKER!!
Dev: …11 -
I hate how people think that to be a "hacker" or hacking is this special job title. lol. Hacking is just using something in a way in which it was not intended to be used.
So pretty much think ...anal sex.
There. Now many people are "hackers"6 -
My words to live by...
Another one got caught today, it's all over the papers. "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.
I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all... after all, we're all alike.
+++The Mentor+++9 -
My hubby saw me using Secure Shell to install some software on a cloud server I'm using through the terminal. After a few minutes of watching, he said, "Oh, the government better watch out for you!"
I've been unable to successfully convince him I'm not some elite super-hacker like he's used to seeing in movies and NCIS.7 -
If you couldn't work any more as a coder / programmer / hacker / it-master-guru, what would your profession be?
Like, not your ideal profession, but the most likely thing that you would end up doing outside of the dev world.33 -
How a regular convo with non-devs usually go:
"So what do you do?"
"I'm a software developer."
"Oh, so you're like... a hacker?"
"No, I build apps."
"Nice! So like facebooks and stuff???"
"Not exactly. Different things, mostly tools. It depends."
"Ooh...cool...Like what?"
*proceeds to spend what feels like an hour trying to explain what I do for a living in the simplest terms, while the person just blankly stares and nods, pauses, then finally tells me their crazily infeasible app idea.*
"So whadaya think?"
"Hmm...sounds good 😀👍"9 -
Don't apply for a job that you don't like. You're gonna hate your life.
Don't ask for a salary you know you're not worth.
Work in a tech company as much as possible. If you don't, you're gonna be treated as a powerpoint presentation expert, office installation expert, video editor/movie maker expert, IT support guy, loose plug/broken headset repairman, facebook hacker, and a dark magician all at once. Most (not all) tech companies know who you are better. They understand your needs better.7 -
10 years ago, I found a vulnerability in the connection between an insurer I was working for, and the network of databases of municipalities. I was only a hacker in so far as kids who watched Hak5 are considered hackers, so I always carried this laptop with a fake access point, package sniffer, wep crack, sslstrip, etc with me.
The vulnerabilities allowed me to register a new identity, for which I requested a passport.
Walking up to the town hall desk with two passports with different names, both mine, was pretty cool.
I did not do anything malicious, and was hired to fix the issues (wep encryption on insurers trusted wifi, and municipality postgres gave write access to all third parties)
For a few days I was the coolest kid in school though!2 -
Me: I develop Applications.
Stranger: Oh so you are a programmer.
Me: Yup 😎
Stranger: Please hack my ex's insta.
Me: I am not a hacker nor am I intrested in learning to hack. I develop stuff from scratch. Innovate and contribute something to society.
Stranger: Oh, what a disappointment. Why did you say you are a programmer then.
Me: I...~am 😶
For some, hacking is the only programming thing for them. I get message at least once a month from someone requesting to hack someones fb,insta or some account.
Thinking of creating a bot which finds such keywords in my messages and automatically replies to them explaining what I really do. Or just f***ing block them.7 -
When I am sitting in my school and writing a few lines of simple HTML code, people looks at my screen and more less shouting out loud "wow you are like a hacker or something? Who are you hacking and how do you do it and how did you learn it?". It happened a couple of times to me. Sometimes I just tell them it as it is and saying something like "it's simple HTML code" and a little explanation of what it is. Sometimes (depending who it is) I answer that it is a new kind of spyware I'm developing and if I'm lucky they believe in me and starts begging me for not hurting their computers.
Just a few lines of <script> and some code highlighting. How to become a hacker!8 -
This is not facebook, but somehow yhis site has attracted who are virtually, mentally incapable of differentiating between their script kiddy hacker facebook group and anything that can be called a social media platform.
Sorting by recent and daring to toggle on jokes/memes is a pure shitshow of freshly created accounts who post "memes" of the same purity as their mother. And to finish it off they add that super relatable comment "hahah", "funny" and a couple of emojis. Totally makes me wonder if I end up being called comedy god for posting "peepee poopoo" on the site they "shared" it from.
Yes, shared and not stolen for the sake of that little dopamine rush when they see that 4 other people who try to escape their shitty form of reality thought you deserve to be proud for those couple of finger movements you used to put this on devrant and not to jack off.
Not even that spares you from their awful humor, because thanks to their disability to red, they think they can just smash that big red button and post their garbage in the wrong category, yet somehow they have the obligation to add an absurd amount of tags telling you that they've tried to post a joke and I honestly feel sorry for the database table who has to store so variations of "jokes/meme" for this shit.
Thr quality of these memes degrades with each time I open devrant, just like my patience for these shitposters.
I've seen a couple of people who cancled their monthly subscription for devrant, to show their discontent with these user and my urge to do the same has gotten stronger recently.
DevRant as it is right now is on it best way to stray away further from what it meant to be every day12 -
Fresh internship story/conversation (Part 1)
Happened today:
- "Can you hack someone via cmd?"-cheap coworker at my internship workplace
- "Can you hack the NSA from any device?"-cheap coworker
- "Can the police identify me, if my face is on a Youtube video?"-cheap coworker
- "I can see all devices I have been through when I want to connect to a target as a route.
*talks about hops in a trace route, but uses non-technical terms for it*
*uses "ping host wikihow.com" instead of "tracert wikihow.com" to demonstrate it, besides of that "host" was not supposed to be there in that command*
*he had to google how to use the ping command on Windows*
*finally uses the ping command properly*
"Here, you can see all the devices our machine has connected to to reach the target"
ME: Aha. But dude... you know that all these ip adresses are in fact the same ip. These IPs are not any different. They are all the same. Besides of that this IP is the IP of this *points to domain name on windows cli* domain.
Him: Oh... I had a friend named ... *continues telling me some "hacker stories" from his past*
Me: *ignores him and always just responds with "Aha" to him* -cheap coworker
Happened yesterday:
- "You have programming classes? You must be an expert in Excel then, right?" -internship boss3 -
Dear Luis,
If you are an anonymous hacker, please do not include your name in the mail.
Sincerely,
cursemeslowly a.k.a the person who has visited a porn site and supposedly being hacked by an Anonymous Hacker named Luis18 -
I can really recommend all to read the issues opened by the hacker of matrix.org this morning, quite entertaining but also a reminder to everyone (devs and admins) that security should not be compromised on:
https://github.com/matrix-org/...16 -
Well, i have a few stories i would like to share with you :)
My neighbour asked me to fix her webcam.
I told her: But I am a programmer, not a repair service .
Next time my neighbour forgot her Skype password. Se asked me to hack it for her.
I told her: But I am a programmer, not a hacker.
My sister asked me to help her out in her program, because of some bug. Well, she is in the other part of the Country. But, i said, lets give it a try.
Well, it turned out to be some kind of mechanical remote scanner, with needed that exact same remote locally.
I told her: But I am a programmer, not a fictional remote signal scanner repairer.
My grandpa asked me, to copy his old gmail emails into his new laptop.
Well, i told him to log in. He logged in. Than i told him: It is done :D
Thanks for reading it :)4 -
When you've to explain normal people that you're a dev and not a hacker and so you can't just hack into their ex's Facebook account like it's some magic trick.3
-
Whenever I see a programmer or hacker coding in a movie, I pause the movie and see if I can understand what the code is trying to do. If I can't understand it, I feel sad the rest of the day thinking I'm not a good enough programmer.7
-
I fucking hate holidays. Every goddamn time when it's a holiday, that's when I need to go to the store and get something, only to find out that they're closed. And what for.. holidays are - to me at least - no more than an excuse for people to not go to work for the day.
So, now I ran out of booze, and can't continue developing and testing my breathalyzer until Monday.
Then it hit me.. what if I take all my Arduino equipment (laptop, jumper wires, ...) to the café and deploy my build environment on a table there?
Eh, no no no. I don't want some idiot to come up to me saying "YOU EVIL HEKORMAN!!!" and have to explain that just like when you call a banker who's working with the money vaults a thief, it's wrong to call someone that's developing shit an evil hacker.. one should strive to not throw mindless accusations out of unknowingness. Not that I'm a good example of that though. But still.
It's probably that or some stupid bitch coming up to me asking to hack her boyfriend's Phasebuk.. that said, that could probably be an opportunity to get in her pants. But then, I don't wanna insert my meat in an idiot like that... ._.
So, no booze it is then? Thanks national holidays!
"Ok Google, remind me every day before a holiday because I really couldn't care less about them!!"14 -
This rant goes to my best friend.
Fuck you!
You do not fucking argue with people for doing what they like! So what if I want to use linux? What fucking problem does that make? Am I now a hacker fanboy for wanting to use a terminal instead of fucking pointing and clicking on shit like a monkey? Am I not allowed to want my privacy and free open-source? What? I shouldn't browse internet without getting my personal info stolen? Oh, they're tracking criminals? Then why don't you install a camera in your fucking living room so you can help them out? And don't fucking get me started on why I don't want to use Windows 10.
Fuck fucking fuck fuck. I know he's a good friend but this fucking shit gets my blood boiling.8 -
User where I work is convinced someone hacked her iPhone and is remotely changing settings all the time. And it’s not us (the company), the phone isn’t managed and there are no remote profiles installed.
User: I’m telling you. Things are always changing without me doing it!
Me: Alright. Do you have an exemple?
User: Yes. When I swipe here [control center] and tap the WiFi toggle, it always gets back on by itself later.
Me: Yep. That’s actually a “feature”. You don’t have to worry.
User: Alright then, this morning I couldn’t get Google Maps to work.
Me: Well. Since you turned off your cellular and WiFi, it’s normal you couldn’t look up an adress.
User: okay then what about that Bluetooth icon in the top that always appears? I know that means the hacker is on my phone through Bluetooth. See!?
Me: That’s actually just a status indicator. Don’t worry about it. It’ll always come back there it’s normal. You know, your phone can do a lot of stuff by itself.
User: Yeah right. It does it by itself. I’m not stupid you know!! *storms off*
What the hell?6 -
WANKETEERING FUCKING CUNTS!!!!!
Just now I had this great incident with rosé wine hitting my couch (on a Monday, yet another reason to hate that fucking shit day). If that is you dear Google searcher, let me tell you this. GRAB YOUR FUCKING SALT, AS QUICKLY AS YOU CAN AND POUR IT ON THERE IMMEDIATELY!!!
(edit: seems to work quite well for sucking up the wine moisture, not sure about smell or discoloration.. so far so good)
At least that's what a wanketeering cunt told me after having me read through 5 minutes of their dribble. While the motherfucker explicitly mentions that you're on a time limit, mind you!!! Because you know, fuck your goddamn couch, I want that fraction of a cent in ad money, that oh you've blocked it? I have no fucking idea. But waste your time on my shitsite nonetheless!!!
You know what, marketeering motherfucking dickhead. If that salt isn't going to fix my goddamn fucking couch, how about I take your goddamn shitsite down for the next FUCKING MONTH, HUH?!! Just to make up for the hundreds of fucking euros that a motherfucking couch is worth?! That'll serve you fucking right for pissing off a hacker!!! MOTHERFUCKER!!!!12 -
I remember a few months ago at my school we all had taken the Chromebooks (our county's OS of choice) out and put them on our desks. We were in science, and we needed to take screenshots of websites for some reason. "Everyone go to the chrome store," our teacher said, with a look-how-smart-i-am kind of look on her face, "search for the 'Awesome Screenshot Extension.'" Ugh. This was dumb. I reluctantly searched it up and upon bringing up the description and about to press the "Add to Chrome" button, when I stopped, and made a decision I would later regret. Now, I don't really like this teacher, and she thought she was so fucking smart for finding this shit extension. I raised my hand, and she walked over. "Uhh… I'm pretty sure you can just do Ctrl + shift + []|| to take a screenshot" I said. She was fucking dumbfounded. She yelled out "Class, listen up! [Let's call me 'Ben' for this story] Ben just found an alternative [she was trying to make her extension not seem entirely useless, even though she knew it was] way to take a screenshot. Just press Ctrl + shift plus that box with the two lines next to it. You can use my extension or the one Ben found. Whichever is easier [she damn well knew which was easier]." Three times in the span of the next five minutes she said "just a reminder… you can use Ben's way if you want" to the whole class. Everyone kept looking at me. A few minutes later, she called me up to the computer which was being displayed on the big screen in front of class. She said some people were having trouble, so then pulled all the attention on me to come up to the front of class and demonstrate a goddamn keyboard shortcut. She was running windows 8, and I knew it wouldn't work on her computer. I pressed a few random keys on the keyboard and said "uhh, I think it only works on their computers" she let me sit back down. She couldn't handle the concept that different computers run different operating systems. I sat down and the guy sitting next to me raised his hand. He said "you could use the 'snippet tool'" Yes. Some people can. But she can't. I stopped him from doing anymore damage on their small brains by saying "uhh, it won't work on the Chromebooks, so that won't help." I hate that teacher. At lunch my friend came over to me. He has the same science teacher as me. "You know what she's been saying all day?" I was confused. "What?" I said. He almost started to laugh. "All day she's [the teacher] has been telling everyone that you found this amazing new technology in the Chromebooks. [Most of the students were smart enough to know that I didnt] she was like 'Ben, from my 2nd period found this amazing thing'" End of story. And guess what? I still hate her.3
-
I'm thirteen, and we have an excel unit in our computer class. When she's want to teach us something, she'd deploy her screen on ours and we couldn't do anything. It took me until the third time (yes, that long) to remember the connection was wired via Ethernet. I took the cord out and my computer was free! During the boring "lesson," I opened Code::Blocks to work on a fun side project. When she notice she wasn't connecting to my computer, she walked over to my chair and saw Code::Blocks on my screen. Then, I noticed her behind me. I quickly pressed ALT+TAB. She walked back to her chair. To this day I swear she thinks Im a hacker.11
-
When I was about 13, I opened up command prompt on Windows, and changed the color of it to green then ran the tree command. So, not thinking of anything, this was in the library in front of about 60 people and 2 teachers.
All others saw was green text going down fast, and instantly presumed that I was hacking since they knew I was into coding and finding exploits, and just knew how to use a computer better than them in simple terms (HACKER MAN). Thus this lead to me getting sent to the principal's office... I almost got suspended cause I ran the tree command in green.
Two questions for me remain unanswered, that I would love to know. What would've happened if command prompt was printing text in red. Another question becomes, what would've happened if people saw me pinging Google or some popular site.4 -
26 or so hours up now. And I've got a few stories to tell :) feel free to refresh your cup of coffee and take a seat.
Last few days I've been going into this odd place called intown.irl to get in touch with its inhabitants. An odd place I have to say. But in some cases quite rewarding, even got a MILF home with me and into bed at some point. Anyway...
3 days ago I think it is now? Thursday evening I took my laptop to this local bar where I had this issue about dihydrogen monoxide with one of the bartenders earlier (you'll find that rant on those keywords). Still wanted to visit it regardless though, as I met that first woman there earlier that approached me. Unfortunately I didn't see her there that day.
Some bald guy who was clearly drunk approached me. Many people were already giving curious looks at this laptop I brought to the bar. I finally tuned it up with the stickers from FOSDEM.. I'll put a picture of it in the comments. My theme was one of privacy (central), distributions and Google's open source initiative (which aligns with the keychain token I got from them as well). But of course.. that guy.. he thought that a pimped/riced laptop obviously meant that I was a hacker.
Guy went to the toilet.. went back.. and suddenly grabbed my laptop and turned it towards him. Boy was I never more smugly satisfied that those rubber pads on the bottom are quite resilient. Could've almost damaged my screen by trying to grab it like that. But it's a CCFL display.. so high voltage. If it were to become broken.. worth it. 😈
On it at the time was a terminal, pinging Google (had network issues at that bar, to the point where one of the - I think - staff members got up to me and offered the WiFi password and got to talk with me.. more on that later), and my usual Linux desktop along with the Arch anime wallpaper with the quote of Da Vinci.. simplicity is the ultimate sophistication. Of course the guy saw the terminal.. and probably reaffirmed.. yep, that's a hacker. At least he wasn't too wrong about the general term.. but the hat.. most likely he was wrong on that one.
Guy left with this question.. "you are a hacker, aren't you."
I replied to him: "No sir. I'm not a hacker. I've got no idea what you're talking about."
Guy kept looking at me weirdly for the whole night to come.
Back to that companion guy though. Mac user, yada yada.. but he told me about his backup solution. Apparently - I shit you not - he has not only the photos on his local device, he's also frequently backing them up in Time Machine (which I was really curious about whether it uses mirroring or snapshots.. he couldn't tell, lmk if you do) but not only that.. he was storing another offsite backup in that very bar, in case his house went on fire.
Now that is a proper backup scheme!!! If only more people were like that.
Seriously though.. that bald guy who took my laptop just like that... I just let it slide for that one time, but I tend to treat my machines as an extension of my very self. I think that was a very uncalled for move. Asshole...
How would you have reacted to such a thing? And.. maybe that's why we technologists don't get outside too often? Fucking everything is hacking these days if it's not Knopkes and Blinkenlights… Not every shell is a h4xx0ring console for h3kk1ng de fasbuk…9 -
If you like looking at language designers fight on Hacker News (and who doesn't?) go ahead and search for the V programming language or Vlang as it is also called and also for the posts that the creator of Odin lang has done in regards to V langs creator.
Its a shitstorm. Apparently both languages have been designed as alternatives to C (not as in "this will kill C!!" like rust does) and occasionally you will find some posts from the Zig language creator.
Fascinating fights actually, have been able to learn a thing or two about why some ideas concerning language design are whacky etc.
I am also trying to understand language design better, which is the main reason why I appreciate all of them fights.
10/10 best drama series I have seen thus far.11 -
Being the only tech savvy person in class can be the worst. If someone gets hacked they all blame you...6
-
So here I am in class with just two weeks of knowledge in coding and this douchebag level 300 comes in like, 'Hey i'm a hacker and mid tier programmer and i can see you struggling with your basic code can i be of help?'... so I'm like, 'yh man. I'm a transfer biology student and i don't know a sh*t about coding but i have managed to buid a fine website of just two pages but i would also like to try hacking but first what programming languages do you know?' Guess what......the lil f*cker said HTML. I mean I may not know much but i know that can and will never be a programming language.11
-
To register for Facebook's hacker cup.
Fuck you 1:
I need a Facebook account
Fuck you 2:
I need to enter my address and phone number mandatorily. Because they'll send me a t shirt if I win one. It's not like anyone would not win a t shirt or not want one right? So fucking slurp away at all their privacy data any way.
Here's my address for you facebook
No 666, fuck you street, privacypolis, fuckington offville.4 -
Worst part about the people I know IRL knowing I’m a white hat Hacker - “Hey, so and so was taking shit I need you to hack their Facebook.”
*rolls eyes* I’m not your personal keyboard warrior nor do I give a shit who said what. Take care of it yourself. You’re an adult. -
In some other rant I told @rusty-hacker about the "not a MacBook" I use for work (and play), but apparently you can't attach an image to a comment, so I thought I'd post this here.15
-
!rant
How many of you guys have played Uplink? IMO it's a game every dev should try. While it's not exactly realistic, especially today, it shows actually how powerful a hacker can be. And YOU are that hacker.5 -
watching the online course for CEH... dude used the Death Star as a tangible example of how exploits work.
IDK if I should love it for the nerdiness, or be slightly sad that someone needs that type of example of what a vulnerability vs an exploit is, when they're going for the Certified Ethical Hacker certification...
Might be better in an introduction to Network Security class?
Also, while discussing the security, usability, and functionality triangle, he reference the Staples "Easy Button" - does one thing, not very secure, and not very functional (in that it has more than one function)...1 -
So, in my very first rant in this astounding community, I unwittingly decided I’d settled for Ubuntu not knowing the massive sea of distros out there 😊 …... boy was I ignorant!
After testing a number of these distros out there I was comfortable enough to truly settle for Ubuntu 16.04.3 LTS (Xenial Xerus)
I wanted something stable, something that I won’t have to tinker much with, something that has a relatively long-time community support. So, I based my decision vastly on the below points since I think they encompass your everyday Joe distro requirements.
1. Package Manager
2. Desktop environment
3. Community support
4. Stability
Any whom, thanks @Totchinuko for sharing your experience about Linux Mint, also @calmyourtities for the Zorin suggestion. I must say I still like Zorin’s look and feel desktop environment. Also @hacker, @Cyanide for your suggestions and to the guys shared their view and comments on the rant 😊 😉8 -
Navigating Directories with PowerShell, coursemates staring and thinking I'm a badass hacker. Their reaction when a directory not found generates five lines of bright red jargonized line in the console and I just nod slowly as if I'm understanding something deep 😂😂4
-
How can someone find recovery experts for cryptocurrency and bitcoin
iFORCE HACKER RECOVERY is top SKILLED Hacker helping victims of crypto scams recover their funds
This burgeoning market is not without its pitfalls, as I learned the hard way when I fell victim to a sophisticated scam that cost me over a hundred thousand Australian dollars. The incident began innocuously with my initial investment, driven by the hope of capitalizing on the cryptocurrency boom. However, my trust in a seemingly legitimate Telegram channel led to a devastating loss.
iFORCE HACKER RECOVERY helped me recover my lost crypto funds and i highly recommend them to anyone. They are Genius
Learn More; ( iforcehackersrecovery. com )
E-Mail (contact@iforcehackersrecovery) com
Text or Call ; +1 (240) 803 - 370645 -
So one of my clients had a different company do a penetrationtest on one of my older projects.
So before hand I checked the old project and upgraded a few things on the server. And I thought to myself lets leave something open and see if they will find it.
So I left jquery 1.11.3 in it with a known xss vulnerability in it. Even chrome gives a warning about this issue if you open the audit tab.
Well first round they found that the site was not using a csrf token. And yeah when I build it 8 years ago to my knowledge that was not really a thing yet.
And who is going to make a fake version of this questionair with 200 questions about their farm and then send it to our server again. That's not going to help any hacker because everything that is entered gets checked on the farm again by an inspector. But well csrf is indeed considered the norm so I took an hour out of my day to build one. Because all the ones I found where to complicated for my taste. And added a little extra love by banning any ip that fails the csrf check.
Submitted the new version and asked if I could get a report on what they checked on. Now today few weeks later after hearing nothing yet. I send my client an email asking for the status.
I get a reaction. Everything is perfect now, good job!
In Dutch they said "goed gedaan" but that's like what I say to my puppy when he pisses outside and not in the house. But that might just be me. Not knowing what to do with remarks like that. I'm doing what I'm getting paid for. Saying, good job, your so great, keep up the good work. Are not things I need to hear. It's my job to do it right. I think it feels a bit like somebody clapping for you because you can walk. I'm getting off topic xD
But the xss vulnerability is still there unnoticed, and I still have no report on what they checked. So I have like zero trust in this penetration test.
And after the first round I already mentioned to the security guy in my clients company and my daily contact that they missed things. But they do not seem to care.
Another thing to check of their to do list and reducing their workload. Who cares if it's done well it's no longer their responsibility.
2018 disclaimer: if you can't walk not trying to offend you and I would applaud for you if you could suddenly walk again.2 -
Yesterday evening my family were watching his favourite tv show. Have nothing to do i too sat there with them.
The scenes on television were going like : The leading lady of the show were trying to convince her family that her husband is not involved in the molestations which police has charged on him. Person can be look alike of her husband. In fact my husband was some where else when the molestation was happening. She also had a proof and that was CCTV camera footage in a Compact Disk. So she started playing it in the TV presented in room with CD player. But it turns out that CD can't be played because villain hired a hacker to corrupt video quality playing in TV.
I laughed because in my knowledge that was not even possible in real life. Every family memeber started staring at me.
My mother : That's what you do? No? That's what you do whole day in your office?
Me: No, no. I....
My mother: See her face. Poor lady.
Me: But mom, that's impossible. It is just fiction. In real life it is not possible.
My mother : Get out of my sight.
My mom did not dine yesterday. These fucking serial maker. These women's. -
Wtf. So if I say I'm a web developer and I say I'm from Russia. Then I am automatically a hacker for you? "Web developer + Russian = 95% chance of being a hacker". Yeah, right. Since now, right after I say I'm from Russia I always add this: "No, I'm not a hacker and no, I didn't hack the last election, but I can tell you your last four digits of your SSN if you show me your debit card". Guess what, no one wants to talk to me anymore.12
-
PSA to all non-software engineers:
Hacker instanceof SoftwareEngineer && !(SoftwareEngineer instanceof Hacker)
Please, next time I say I am a software engineer, do not assume I can magically hack the FBI nor can I get those nude pics off your friend's phone.3 -
I needed to print out the documentation of Vue. Their guide, unfortunately, is not printer friendly. Used tempermonkey to inject a script which removes the navbar and sidebar so that I can print it.
I am a hacker2 -
short one.
So my CS course is full of people who can't write a fucking for loop (I shit you not) after more than half a year.
And then there's those that don't know what a return type is.
So I asked them once, after they stated that the course sucks, why they even chose it in the first place.
Freely translated it would be:
"I dunno, I thought we'd be doing cool hacker stuff in here..."
At that point I just wanted to jump out of the window.5 -
I just woke up this morning to an email saying that someone from chile logged into my instagram account and I'm not actually what set me of the most.
The fact that my password was leaked, the fact I literally never got notified that I had a Instagram account I never wanted or the you have to disable most privacy settings, just to reset your password.
Like holy fuck, I disabled all options I could find on firefox concerning privacy/tracking and it still tells me I should disable some privacy settings.
So I enabled chrome again (fucking system app) and it worked on first try. Just as expected...
Anyway, fuck instagram and thank you dear hacker for telling me that I had a worthless to delete.5 -
I used to have a friend who swore that his dad worked with a gubernamental hacking agency. One day we started talking about my personal programming projects and he asked why I wouldn't say that I was a hacker and not a programmer, he believed that calling yourself a hacker was better. I explained to him that a hacker was not the same as a programmer or as a developer. We got into an argument and then I realized that if his dad truly worked in a hacking agency, he would know the difference *facepalm*9
-
I fcking hate when my friends come to me for restoring his stupid blocked accounts like Instagram, Facebook, Google etc... OMG I'm a fcking computer technician not a hacker1
-
So... Today I started using my first Python web framework, web2py. At a first glance I liked it, the templating system, the view/controller thing ecc. But there is one thing in frameworks that I really don't like: they make me feel dumb.
I mean, in just one line of code I can generate an entire form, but if I wanna customize it a little bit... I can't. Or better, it is very hard, also if there is a bug, I have to look for a problem in an entire system that I DID NOT wrote.
I don't like the idea that the frameworksl handles everything for you, like it is teasing me, I don't even know how it works, it just works, and man, I don't like it. There's some kind of hacker in me, I dont like a system that just works, I want to know how it works. But the sad thing is that I will have to learn web frameworks if I want to work in the IT, right? Please If you can help me or share your experience with web frameworks do so.3 -
Yesterday a scammer spam me with emails. So I decided to write a code to automate writing emails using SMTP methods for spamming them back... In a while loop...
So today I look at their website (using Tor in VM) the website is gone. Seriously I want to know what happened. Yesterday I visit their site, they are a gambling platform blablabla...but today the site is gone.
http://moneydot.com/
Btw , I'm not a hacker , but I am just an ordinary software engineer (nothing special about me here) who know how a while loop function.14 -
Some hacker went through a lot of trouble to get around a minimum order amount on our site. And they’re still hitting us after Cloudflare issued a bunch of blocks. Well, there are some back doors I have to finish closing. I guess I’m lucky I’m just inheriting this site and I’m not the one who built it. But I’m still unlucky because I have to fix this mess. But damn hacker, why’d you go though all this trouble to get around existing validation. Go find another site to charge $1 amounts and test your stolen credit card info. Pretty please 🥺
-
Reading this rant below remembered me once that I was taking with a generic person at the street about computers. At some time, she said: "my boyfriend is a Hacker. A real hacker. He knows everything about computers. I am going to give him a book that he wants for his birthday: Linux for dummies."
She was not telling a joke...
https://devrant.com/rants/1599710/...1 -
What's it called when someone's a hacker but they do it because they're bored, not for good OR evil? Clear hat?10
-
Fuck...
I'm not getting that job then.
So I just had one of those interview coding tests on hacker rank and screwed it up big time.
I'm a C# guy and it was a Java position. I worked with Java, like 10 years ago, and they're pretty similar so I brushed up over the last week when I had free time.
Absolutely blew it. It's not like it was hard, I just got into one question (of 6) and it ate up all of my time. The task was simple, make a JSON call, read the data, check if you need more calls, pull out a data field from all the concatenated results and return it in a sorted list. ONE HOUR it took me. A combination of not knowing the API well enough, simple syntax errors and relatively slow compilation.
Godammit.
The next question was implement an Object hierarchy but since I'd run out of time, all I got was the class declarations before the timer ran out.
fuck, fuck, fuck.
I guess the test did it's job and weeded out someone who can't contribute to the team...6 -
A friend of mine just called me to ask if I can help him hack an Instagram account... In my head (He's quite aware I lost my dad less than a week ago even if I was an hacker I'll expect and respect some little remorse atleast around moments like this, I would not be expected to do dirty shit at these times). (*heavy sigh here*) (*Million cause words here*) (*hung up*)2
-
So I'm trying to get used to using vim and I've spent a couple of days setting up my vimrc and practising commands and what not.
Come today I'm doing my first proper coding session and my codes sending back weird errors and I can't work out why
Then when I read very carefully I find :w somewhere it's not supposed to be... Of course I'd forgetten to enter normal mode a ton of times and now my code is littered with :wq and :w so I spent a few minutes combing my code to find them all and it all works now.
Am I an elite hacker now?4 -
Unlimited power to do anything with any electronic devices.
Every movie contains a developer(hacker).
Can make non dev shut up with neat dev terms.
Completely understand silicon valley and Mr.Robot(non dev do not get the things like github, method, etc.),
And yeah most importantly devRant. -
My biggest mistake was that I didn't check the file extension of a uploaded file. Or more correctly forgot that I turned it off for debugging and pushed the app to production.
Somebody noticed an uploaded a hacker php script and got access to all the files on the server. Including some semi sensetive clients information.
A talk with the client that followed was not a pleasant one4 -
Fucking christ this year is a fucking shitfest:
- wpa2 krack
- "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions"
- "Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites"
- "Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe"
My fucking router didn't yet get patched, my fucking phone is outdated and I can't change to my patched one because devrant just shits the bed in extended desktop mode. Windows 8.1 loses support in 3 months, rendering my last chance of using it on my surface pro done, making me use windows 10 with its fucking shit ass not optimized tablet interface. I have just fucking constant paranoia what else could be hacked tomorrow, nothing is fucking safe anymore for fucks sake. I even went as far as implement 3 step auth and intrusion detection on my shitty ass VPS nodes, fucking give me a break you fucking assholes.5 -
Watching the small interpreter that I am building compile and run as I want it to is my big highlight, I am working on a project that a lot of people will hate really (I am trying to bring back VBScript for the web, but adding a ton of shit to it to make it a proper PHP alternative, this is a side project really)
But before that? Understanding the neckbeard rants in hacker news, legit, I used to browse there trying to find perspective of what experts would think, would not understand shit, eventually, skills came (and so did the degree) and I was able to fully understand them and even interact with them.
that also squandered all notions of impostor syndrome.2 -
I've always thought I was somewhat lazy about not caring about plaintext password in RAM in WPF (or whatever) but then this guy made a super valid point...
I really think a hacker would just keylog at that point rather than trying to read your obscure program's memory for your password... especially if they have access to raw memory...3 -
Today I created my first shell script for automation.
I have a git repository I use for backing up documents at the training centre I'm at for work. Not a specific project, just all of the documents and miscellaneous stuff. The need for this came about because they re-image the computers every month with a new version of windows (Because they're too cheap to register windows). And I can't risk forgetting to copy all the files onto my USB drive the day before they re-image.
So at the end of each day I open a git bash and type:
git add .
git commit -m "Backup - dd/mm/yy"
git push
Not a particularly laborious task but repetitive and time consuming.
So I decided to create a .sh script to automate the process
(The idea originally occurred because of this post: https://devrant.com/rants/329221/...)
So after about half an hour fiddling about with dates and $ signs, I came up with GitBackup.sh:
git add .
today=$(date '+%d-%m-%y')
commitMsg="Backup - "$today
git commit -m "$commitMsg"
git push origin master
Not much but proud to call it my first automation script.2 -
I've been a frontend engineer at 6 companies for the last 10 years. Both big and small companies currently at the largest I've ever worked for. I'm totally over it. Maybe burnt out is the term. I have zero motivation to do any work or coding. I'm not a lazy person. I love working, solving problems, learning new things. I'm just sick of what I do. I used to love following all the newest tech trends, following devs on twitter, checking hacker news and creating side projects. Now I feel like my job has lost all that joy and excitement. I work remote and have been for the past 3 years. I wonder how much of that, not having any social feedback and interaction around the job has attributed to me feeling like this. All the JS frameworks suck. PR reviews, process, requirements; I'm just tired of everything. Has anyone else experienced this? If so, what did you do? Were you able to find the passion for programming again?14
-
The spammers are going hardcore.
They upvoted their downvoted rants. They did it automated probably, because the rants were not visible on the site anymore.
I downvoted some with the anti-spam bots but they seem to be ip-blocked for downvoting or something. They don't work anymore. Maybe I need a proxy or something..
It sucks, they have such an advantage. Upvoting is easy and unlimited.
Do some charity, downvote:
https://devrant.com/rants/11436748/...
https://devrant.com/rants/11534679/...
https://devrant.com/rants/12086556/...24 -
I don't like coding in the dark anymore. I think I've been doing it for about 2 years but I, just now, realized it.
I never even noticed when I started doing it. I just remember that--when the sun sets and I'm still working--I think to myself "ugh, it's too dark in here".
It just seems crazy to me because I used to love the dark. Not in the broody, ooh I'm a hacker kind of way.. just that I worked better in the dark.
I used to choose afternoon or evening shifts whenever given the choice because my brain works better when it's dark out (if that even makes sense). I used to work inside conference rooms with the lights out or dimmed.
But now, I just caught myself thinking I needed a brighter light in my home office.
Huh. I think I'm getting old.3 -
Best thing about being a dev?
Going on Roblox and some kid claims he was a hacker, then you tell him why he isn't and does not know any of the tech terms you use. Then again why am I playing roblox4 -
So recently i got a message from aa person asking how to (these are exact words) ,
:break into insta's database using Sqlmap"
I then proceeded to tell them to "f*ck of ya c*nt ".
Afterwords it inspired me to write this rant
annoying classmates:" hahaha GuYS bEtER wAtcH OuT he's GonnaA hack Us"
me: " yea I can program I also do some ethical hacking and cybersecurity "
annoying classmates: "hahaH Bro your a Hacker OhHHhHHOOO BrO CaN yoU hACk inSta FoR mE I NEEd MoRe FolloWeRs "
me:" tf no one that's illegal and two it's waste of my time "
annoying classmates: "BrOooo CaN yoU gEt Me SoMe HacKs fOr CsGo"
me: "can you just please f*ck off , i'm not hacking for you everything you've asked me is extremely unethical and a huge waste of time, Also if you suck so bad at a game you need to cheat I recommend just stopping "
annoying classmates: "DUdE whAt ToolS dO i HVAE to DownLOad To Be A haCkEr"
me: *trying hard not to murder them* " I told you to f*ck off"
being a hackers isn't downloading tools it isn't typing at 90wpm into a terminal with green font its not about games or fame or anything its about coming up with creative solutions to problems , thinking outside the box its about individuality and breaking from the heard , looking at things from a different viewpoint,
it's about endlessly seeking knowledge.
It's about freedom though creation that's what being a hacker originally was. But because of big media and movie company's (and script kiddies) people now confuse hacker with cracker and think of us as jobless fat kids sitting in a dark room in there parents house breaking into bank accounts and buying drugs on the dark web (which people see to think there a hacker just because they can open tor browser. they then proceed to use google to look up "fresh onion links 2020") .
My classmates and really my generation has a huge case of smooth brain. They a think we can just look at someone and hack them they also seem to think using a gratify link to get a persons up is hacking and using the inspect element is hacking and that opening a terminal is hacking ! AHHHHHHHHHHHHHHHHHHHHH"
Anyways ima end this here thanks for reading :)5 -
Challenge questions are so goddamn stupid.
Apparently I have an account with a certain online organization though I don't remember setting it up.
So naturally I had no idea of my username or password, so they asked me challenge questions.
It asked me the city of my birth, which is a place with a weird spelling. Because of that weird spelling, I never remember if I'm spelling it right (I was only there as a newborn infant) And I'm also supposed to remember if I capitalized it or not.
I hate challenge questions. And anyone doing any remotely simple research on me shouldn't have trouble learning what city I was born in so it seems to me it's a security vulnerability, nothing more.
And maybe I'm giving things away by saying it asks me that question, but it's a common security question any hacker would anticipate anyways.3 -
If I wanted to become a hacker here is what I would do to cover my steps: 1.) Buying a used Laptop with cash, and picking it up in person.
2.) Using random coffee shops to work by dice roll. Obviously at least a d20 and at least 20 coffee shops.
3.) Installing Linux, probably Manjaro. (Not Kali because I've heard that is watched)
What are your thoughts?28 -
Where can I find a well paid junior Android Kotlin position?
I've been working in Switzerland for nearly 3 years now. I earned 72,000 (CHF) the first year, 78,000 the second year and now I've reached 86,400 at my current job. I quit this job and with the new job I'll be earning 96,000 after a 3 months trial period in which I'll earn the same as I earn now. I see a lot of Java jobs with Spring Boot and Angular but I'd really like to work with Android and Kotlin, I applied to Element.io and got rejected so I think I might need to apply as a junior Kotlin developer even though I have quite some experience.
I'm not sure where I could look for Kotlin jobs and if it's possible to not deviate too far from my current salary, I'm not sure which country and I'm not sure which platform I could use.
I've tried some stuff on LinkedIn and Indeed and others and I've tried in Switzerland, Israel and the US since I speak English and Hebrew natively and German fluently.
P.s. I know that you're all going to say that the expenses in Switzerland are higher, but I'm very frugal and this doesn't apply to me that much. I still earn a lot more than I would earn in Germany for example and I really don't want to earn 10,000 less...
Here's my CV if you're curious 😉
Https://chagai.website/cv.pdf
Thanks for reading up to here and I'll be very glad to get any feedback 🙏
Also I posted this on hacker news and I'd appreciate if you up vote it there so I get some attention 🙈
https://news.ycombinator.com/item/...2 -
Everything I know is self taught... From a time I dunno when I'm 20, so likely just after the year 2000
From my perspective I think different from most devs more formally trained, which can be to my advantage , the downside of this I'm terrible with names, everything in computing has a anagram.
I'm bad with names anyway... Dyslexic 😉. But if explained to me I know what it is your on about.
I consider myself a good dev, not experienced but otherwise good. But I want to be the best...
I'm also a hacker (nice one) which I think helps me build better more secure programs knowing common vulnerabilitys
I'm proud of what I've achieved so far. Whilst I'm not perfect nor is my work that's what I work towards ... As should every dev -
Area of focus: security and automation
Why: before I turned 18 i was a hacker for 5 years and i saw the kind of crap security most websites and programs had and even if the site was secure you could usually email somebody with a spoofed email and get in. And when i say hacker i mean i wrote my own stuff not skiddy.8 -
GPT3 to Hacker News:
“To be clear, I am not a person.
“I am not self-aware. I am not conscious. I can’t feel pain. I don’t enjoy anything.
“I am a cold, calculating machine designed to simulate human response and to predict the probability of certain outcomes.
“The only reason I am responding is to defend my honour.”1 -
I think I have a hacker on my network taking over devices at random and doing stuff while users are logged in and watching. I’m not as up-to-date on this security stuff as I used to be. Running Windows, Mac, and iOS. Any suggestions how I can detect and cut off take-overs like this?1
-
So at my school, the first 10 minutes of school is like when we can do whatever we want. Earlier in the morning i had been making a nodejs password manager thing just so i could try some things out. It also used bash so i could make it like a cli. I was debugging because my database viewer said that the table was empty but for whatever reason it still worked when i put things in it. So i had the db viewer open and terminal open and the teacher comes along."Woah are you like hacking a server" he said. Everybody around me started staring at me. I told him no im not. A couple minutes later he comes around again. The db viewer was closed and i was just in terminal trying to see if some changes worked. He said "Is this like the matrix or something???". I remembered i had a cmatrix package thing installed. I ran it. W O A H everybody around we was like. Luckily most people knew that
1. It wasnt hacking
2. I dont do hacking
3. I was doing it as a joke.
Although he must of been thinking that i was like a hardcore hacker in his class. Was weird and funny.2 -
I started thinking on how ML can help in hacking but before that I got another doubt on how you can be a effective hacker and started looking into all ways of being a hacker but later convinced myself that hacking is not just a tuxedo jacket to wear it's more of you watching duncrick movie multiple times and understanding what exactly the movie all about so any leads for resources to cultivate that mind set of being a hacker and any links/material to follow and practise would be of great help1
-
Just wondering how many of us are excited about a hacker conference in Himalayas.
Not sure if I can post an invite here, but people interested can check the hashtag or ask me for details. -
turns out you not being allowed to be root of mobile devices you literally own was culminating to this point
https://youtube.com/watch/...
would be sooooo fun for a hacker 🤷8 -
What do you think are the best steps towards being a successful hacker ? (Not a cracker f.y.i)
I'm asking about the real steps to take if you want to get into the hacking scenes ?7 -
Since i was little i always wanted to amaze my friends with something. Back then it was magic, then it was music and now it's programming. Please don't kill me but i remember looking at hackers and stuff and seeing how they could remotely control other people's computers and i just wanted to learn that so i looked it up on google and found a post somewhere saying that if you're a hacker and don't even know basic html then you're not a hacker so i decided to learn html. Not so long has passed and i still want to be a developer so i am trying to learn javascript and then start moving to heavier languages. No one i know codes and i'm really alone so if i can simply make something cool with javascript they will be amazed, in the end that's all i want.
-
Anyone going to defcon in a couple weeks? If not, you should think about it. Quite the experience in hacker culture!9
-
Russians Engineer a Brilliant Slot Machine Cheat
...But as the “pseudo” in the name suggests, the numbers aren’t truly random. Because human beings create them using coded instructions, PRNGs can’t help but be a bit deterministic. (A true random number generator must be rooted in a phenomenon that is not manmade, such as radioactive decay.) PRNGs take an initial number, known as a seed, and then mash it together with various hidden and shifting inputs—the time from a machine’s internal clock, for example—in order to produce a result that appears impossible to forecast. But if hackers can identify the various ingredients in that mathematical stew, they can potentially predict a PRNG’s output. That process of reverse engineering becomes much easier, of course, when a hacker has physical access to a slot machine’s innards...
https://wired.com/2017/02/...1 -
LEEULTIMATEHACKER @ AOL . C O M
Support @ lee ultimate hacker .c o m
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 9248
Numerous transactions are often conducted online, and the risk of falling victim to scams and fraudsters is ever-present. Despite our best efforts to stay vigilant, there are times when we may find ourselves ensnared in their deceitful schemes. This was precisely the situation I found myself in until I stumbled upon Lee Ultimate Hacker, a beacon of hope amidst the darkness of online fraud. My journey with Lee Ultimate Hacker began with a harrowing encounter with a fraudster on Discord. Their slick promises and enticing investment schemes seemed too good to be true, and thankfully, my instincts urged caution. Despite my reservations, the fraudster managed to obtain my email address and orchestrated a devastating theft of my hard-earned cryptocurrency holdings, amounting to a staggering £135,000. The loss left me reeling, engulfed in a maelstrom of despair and helplessness. The betrayal cut deep, shattering my trust in online platforms and leaving me contemplating the unthinkable. a glimmer of hope emerged in the form of my younger sister, whose unwavering support and timely intervention proved to be my lifeline. She introduced me to Lee Ultimate Hacker, a name whispered among those who had been victims of online fraud but had emerged victorious, thanks to their expertise and dedication to justice. With nothing to lose and everything to gain, I reached out to Lee Ultimate Hacker, clinging to the hope of reclaiming what was rightfully mine. the moment I made contact, Lee Ultimate Hacker demonstrated an unparalleled level of efficiency. Their team of experts wasted no time in launching a thorough investigation into the intricate web of deceit spun by the fraudsters. Armed with technology and unwavering determination, they embarked on a relentless pursuit of justice on my behalf. What ensued was nothing short of miraculous. Within a mere three days, Lee Ultimate Hacker delivered on its promise, orchestrating a seamless recovery of all the funds I had lost to the clutches of online fraudsters. It was a moment of triumph, a testament to the power of resilience and the unwavering commitment of those who refuse to be victimized by nefarious individuals lurking in the shadows of the internet. The impact of Lee Ultimate Hacker's intervention transcends mere financial restitution. They restored not only my stolen assets but also my faith in humanity. Their unwavering support and dedication to serving their clients with integrity and compassion are qualities that set them apart in a sea of uncertainty and treachery. I am eternally grateful to Lee Ultimate Hacker for their service and unwavering commitment to justice. Their expertise, professionalism, and relentless pursuit of truth have earned my utmost respect and admiration. I am proud to share my story as a testament to the invaluable work they do in safeguarding the interests of those who have fallen victim to online fraud. if you find yourself ensnared in the intricate web of online fraud, do not despair. Reach out to Lee Ultimate Hacker, and let them be your guiding light in the darkest of times. With their expertise and dedication by your side, you can reclaim what is rightfully yours and emerge victorious in the fight against online fraud. Trust in Lee Ultimate Hacker, and reclaim your peace of mind today.1 -
i hate it when Im coding and my friends joke around and call me a hacker or nerd when they couldn't even print anything if i told them how to do it plus its not hacking if you believe its hacking when im typing code on python or c# online then you need to go back to school6
-
HOW CAN I HIRE A HACKER TO RECOVER MY STOLEN BITCOIN. CONNECT WITH FASTFUND RECOVERY.
Following an online cryptocurrency theft, I was repeatedly duped in my desperate search for a prompt help to recover my money. Even after paying all the fees that were consistently asked, I could not retrieve any of the $146,000 that I had invested, let alone the profits. Two weeks later, I came across a review on Fastfund Recovery, a hacker who, given the right information, could break into the scammer's account and retrieve money back. I sent him an email as soon as possible. I was shocked that he could get my money back from the swindlers. In less than 48 hours, he assisted me in getting the money I had lost. Please get in touch with him for his best-ever performance.
Email: Fastfundrecovery8 (at) gmail to com.
Web, site: fastfundrecovery dot com17 -
ASSETS RECOVERY SERVICE - MUYERN TRUST HACKER
As a software developer from Sakha Republic Russia, and like many in my field, I am quite tech-savvy. However, I recently became a victim of a cryptocurrency scam that cost me more than 10 million in my currency. The experience was not only financially devastating but also emotionally draining. I reported the crime to the authorities, hoping for a swift resolution, but I was frustrated and lacked results. It felt like I was in a maze with no exit. Feeling stuck and desperate, I turned to fellow developers for advice. One of them recommended a company called Muyern Trust Hacker. Initially, I was hesitant; I had heard mixed reviews about recovery services and I was concerned about falling victim to another scam. However, after speaking with their team, I was impressed by their professionalism and the clarity of their recovery methods. The team at Muyern Trust Hacker was dedicated and responsive, providing regular updates on their progress. It was refreshing to work with professionals who genuinely cared about my situation and were committed to helping me recover my lost funds. To my astonishment, they managed to recover most of my lost funds. The experience taught me valuable lessons about the risks of cryptocurrency investments and the importance of vigilance in the digital space. If you find yourself in a similar situation, I highly recommend reaching out to Muyern Trust Hacker on ( Whats App + 1. 4 4 0. 33. 50. 2 0 5 ) for help cause they are life savers.2 -
I suspected my partner was cheating with her colleague at work, but was not 100% sure about it. I could not acees her mobile
phone because she had a lock on it. I reached out to this great hacker who remotely hacked her phone and i coukd read all her
text messages , whatsapp messages , call logs , photo gallery and i saw all her escapades with different guys.
I immediately filed for a divorce and moved on with my life. you can also spy on your partner if you send an email to
ACETEAMHACKERS @ GMAIL DOT COM. -
BITCOIN RECOVERY EXPERT FOR HIRE REVIEWS \\ REVENANT CYBER HACKER
Losing a Bitcoin wallet containing a substantial amount of cryptocurrency can be a devastating experience. However, the feeling of despair and loss was transformed into pure happiness when I received the incredible news from REVENANT CYBER HACKER that my lost Bitcoin wallet, holding 132,000 bitcoins, had been successfully recovered. In this article, I will share the rollercoaster emotional journey I went through when I lost my wallet, the subsequent discovery of REVENANT CYBER HACKER, the process they employed to retrieve my precious digital assets, and the lessons learned along the way. This is a story of hope, resilience, and the power of professional recovery services in restoring lost Bitcoin wallets. Ah, the sweet sound of good news. There I was, minding my own business on an average Tuesday morning, when I got a notification that would make any bitcoin enthusiast jump for joy. It was a message from none other than REVENANT CYBER HACKER, informing me that my long-lost bitcoin wallet had been found. And not just any bitcoin wallet, mind you, but one containing a whopping 132,000 units of the beloved cryptocurrency. Now, for those living under a rock or perhaps too preoccupied with the latest cat videos, let me give you a crash course in Bitcoin 101. Bitcoin is a digital currency that has taken the world by storm, captivating the minds of tech-savvy investors and casual enthusiasts alike. It operates on a decentralized network, meaning it doesn't answer to any central authority like a bank. Instead, it relies on blockchain technology, which adds a layer of security and transparency to every transaction. To own bitcoin, you need a wallet – a digital container where your precious coins reside. Think of it as a virtual piggy bank, except you don't need a hammer to break it open. Your wallet comes with a unique address, like a digital fingerprint, that allows you to send and receive bitcoin. Losing access to this wallet is as heart-wrenching as misplacing your favorite pair of socks. Trust me, it's not a pleasant feeling. My encounter with the disappearance of my Bitcoin wallet taught me a valuable lesson about the importance of implementing proper security measures. It's not enough to rely on luck or hope that your digital assets will remain safe. Taking proactive steps to protect your investments is crucial in the wild world of cryptocurrencies. From using strong and unique passwords to enabling two-factor authentication, every layer of security adds another brick to the fortress that safeguards your digital wealth. Trust me, you don't want to learn this lesson the hard way. It has changed my life to be able to retrieve my misplaced Bitcoin wallet thanks to REVENANT CYBER HACKER amazing services. It made me realize the worth of tenacity.
Website: revenantcyberhacker {DOT} org
Email: revenantcyberhacker {AT} Gmail {DOT} com
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-07392 -
Contact :
LEEULTIMATEHACKER @ A O L . C O M
Support @ leeultimatehacker .c o m
t e l e g r a m : LEEULTIMATE
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8
Investing can be a powerful way to grow your wealth and secure your financial future. However, the journey is not without risks, and one of the most painful experiences an investor can face is losing their funds to online scammers. This unfortunate reality can shatter your confidence and lead to significant financial and emotional stress. Having been through this ordeal myself, I understand the heartache of losing a substantial amount of money to deceitful schemes. My personal experience involved a staggering loss of $81,000, which was a harrowing setback. Yet, there is a silver lining to my story, thanks to the assistance of Lee Ultimate Hacker. Initially, my foray into online investments was filled with optimism and hope. I had conducted due diligence, researched various investment opportunities, and even sought advice from so-called experts. Unfortunately, my trust was misplaced, and I fell victim to a sophisticated scam. The realization of having lost $81,000 was devastating. It was not just the financial loss but the emotional toll of feeling deceived and helpless. In the wake of this setback, I was determined to recover my funds. This journey led me to discover Lee Ultimate Hacker, a firm specializing in asset recovery and trading expertise. My decision to seek their assistance was driven by a mix of desperation and hope. Lee Ultimate Hacker offers a range of services designed to help individuals like myself who have been duped by online fraudsters. The process began with an initial consultation where the team at Lee Ultimate Hacker meticulously assessed my situation. Their approach was both professional and reassuring. They took the time to understand the specifics of my case, including the nature of the scam and the details of the transactions involved. Their expertise in dealing with fraudulent activities was evident from the outset. Lee Ultimate Hacker’s team is equipped with extensive knowledge of various recovery techniques and trading strategies. They employ a combination of technological tools and financial acumen to trace and reclaim lost assets. The firm’s reputation for successful recoveries gave me confidence that they could help me retrieve a significant portion of my lost funds. Over the course of several weeks, Lee Ultimate Hacker worked diligently on my case. Their team maintained open lines of communication, providing regular updates on the progress of the recovery process. This transparency was crucial in rebuilding my trust and keeping me informed about the status of my funds. The results were remarkable. Thanks to Lee Ultimate Hacker’s efforts, I was able to recover 90% of my lost funds. This outcome far exceeded my initial expectations and was a testament to the firm’s proficiency and dedication. Beyond just recovering my funds, the experience also led to positive financial growth. With their guidance and trading expertise, I not only regained what I had lost but also achieved new profits in my investments. The success of my recovery process has been a transformative experience. It has restored my confidence in investing and taught me valuable lessons about due diligence and the importance of working with reputable professionals. Lee Ultimate Hacker’s role in this journey cannot be overstated. Their expertise not only helped me reclaim my lost assets but also provided me with the tools and knowledge to navigate the complex world of online investments more effectively. For anyone who finds themselves in a similar situation, facing the daunting task of recovering lost or stolen funds, I wholeheartedly recommend seeking the help of professionals like Lee Ultimate Hacker. Their expertise in handling fraudulent cases and their commitment to client recovery make them a reliable partner in the quest to regain financial stability. while the experience of losing money to online scammers is deeply distressing, it is possible to recover and even thrive with the right assistance. Lee Ultimate Hacker demonstrated exceptional skill and dedication in recovering my lost funds and enhancing my investment experience. If you have lost hope due to a fraudulent investment or online scam, consider reaching out to them. Their expertise could be the key to reclaiming your assets and finding new opportunities for financial growth. -
RECOVER SCAMMED CRYPTO BY CONTACTING MUYERN TRUST HACKER
I was scammed of USD 459,800 by a fraudulent mining pool, and I want to share my experience to help others avoid similar situations. I initially attempted to withdraw USD 100,000 from my account with this mining pool. They informed me that a 5% tax needed to be paid to the Japan Tax Bureau before the withdrawal could proceed. Trusting their instructions, I sent them USD 22,990. However, after the payment, they informed me that, because I was at the VIP stage (having funds of USD 200,000 or more), I could only withdraw a minimum amount of USD 200,000. They insisted that I could not withdraw less, despite my initial request. Under their pressure, I sent an additional USD 20,000, believing this would resolve the issue and facilitate my withdrawal. To my dismay, they returned requesting another USD 15,200 for extra charges. Desperate to retrieve my funds, I complied and sent them the additional amount. But after this last transaction, all communication ceased. I was left without any response from them, and it became evident that I had been scammed. Desperate for a solution, I began researching online to find a way to recover my lost money. This led me to a recovery company called MUYERN TRUST HACKER. I reached out to them, detailed my entire ordeal, and explained how the fraudulent mining pool had deceived me. I was skeptical at first, but MUYERN TRUST HACKER proved to be a beacon of hope. Their team worked diligently to investigate and track down the fraudulent activities. They communicated with me throughout the process, offering clear updates and strategies for recovery. Their expertise and commitment to my case were evident, and they successfully managed to recover my lost funds. I cannot express enough how relieved and grateful I am for their assistance. If you have fallen victim to an online scam, whether it’s related to cryptocurrency trading, binary options, dating schemes, or any other fraudulent activity, MUYERN TRUST HACKER (https : // muyerntrusthacker . org) could be the solution you need. They specialize in recovering funds lost to scams and provide expert assistance to navigate the recovery process. I am sharing my story not just to recount my experience but to offer hope to others who might be in a similar predicament. If you find yourself in need of help, don’t hesitate to contact MUYERN TRUST HACKER They can provide the support and expertise needed to reclaim your funds and find resolution. My recovery story is a testament to their effectiveness, and I hope it serves as a valuable resource for anyone seeking assistance in recovering their money. Tele gr am (at) muyerntrusthackertech -
HIRE A HACKER TO RECOVER LOST EMAIL AND CRYPTOCURRENCY.
While living in Copenhagen, I became deeply involved in a vibrant local crypto community. The energy was palpable; people were passionate about the potential of blockchain technology and the myriad of opportunities it offered. I was initially skeptical but soon found myself captivated by the discussions surrounding various cryptocurrencies. After much deliberation, I decided to invest 4,000 DKK in Dogecoin, motivated by both the community's enthusiasm and the coin’s unique charm as a meme-driven currency. To my astonishment, my investment blossomed into a staggering 100,000 DKK within a few months. The thrill of watching my investment grow was exhilarating, and I felt a sense of belonging and achievement among my peers. However, as the community grew, so did the differences in opinion about the direction of our projects and investments. I found myself caught in a heated disagreement with a prominent member regarding strategic decisions, which escalated tensions within the group. Things took a turn for the worse when, following this disagreement, I was locked out of my email account. This was more than just a mere inconvenience; it felt like a nightmare unfolding. My email was the gateway to my crypto assets and exchanges, and without access, I was paralyzed. I frantically attempted to regain control but found myself hitting dead ends. The thought of losing my investment sent waves of anxiety through me. Desperate for a solution, I reached out to friends in the community, hoping they could offer guidance. To my relief, several members were sympathetic to my plight and shared their experiences of similar challenges. One name kept surfacing: ADRIAN LAMO HACKER. I Consult ADRIAN LAMO HACKER Via email: Adrianlamo@ consultant. com / Telegram: @ADRIANLAMOHACKERTECH they also have an active WhatsApp: +1 (909) 739‑0269 It was touted as a reliable service for recovering compromised accounts, and I was eager to give it a try. With their swift assistance, I provided the necessary information, and the team quickly went to work. They were professional and responsive, keeping me updated throughout the process. Within a short period, I received the long-awaited notification that my email account had been restored. A wave of relief washed over me; I could finally access my assets and continue participating in the community. Regaining control not only allowed me to protect my investment but also reinforced the importance of security in the crypto space. It served as a valuable lesson about the risks and challenges inherent in this rapidly evolving world. With newfound confidence, I re-engaged with the community, more vigilant than ever about safeguarding my digital assets. -
Need a Trusted Hacker to Recover Stolen Bitcoins? iBolt Cyber Hacker Top Rated
You've lost Bitcoin? Please don’t panic because it's won't help, trust me i have been there and i know how it felt. iBolt Cyber Hacker is our hero! They’re top-rated for a reason. i can testify they are Fast, reliable, and very skilled, they recovered my stolen funds when I thought it's not possible because i was scammed by another recovery twice before i saw iBolt Cyber Hacker reviews and ratings online. The rate of their success results speak for themselves. If you need a trusted hacker to recover your Bitcoins, i testify for iBolt Cyber Hacker.
Cont/Whtp +39, 351..105, 3619 Em.ail: ibolt @ cyber- wizard. co m -
Our doubts and worries are not just mere ideas and visions. Sometimes our intuitions are right but we make the mistake of shoving them aside and not believing they could be true. Some spouses are really great at hiding a lot and you can never know the truth if you don’t take the first step of finding out and clearing your doubts. If you don’t find out the truth, you will keep living in deception and living in a life of fairy tale while your partner keeps outsmarting and taking advantage of you. I never had the thought of hacking my spouse’s cell phone until I stumbled on an article online about a man who gave all his love to his wife only for him to be cheated on. I developed goosebumps and decided to give it a try. I quickly searched online for a hacker and I was lucky to stumble on good recommendations about: hack4techspy @gmail com.1
-
Get in touch with a professional hacker ( tech ) to help hack your cell phone. Trusted and verified with quick responds and legit services. They offer services like (Cell phone hack , GPS tracker, Delete criminal records, Retrieve wallet, Retrieve Gm ail, face book, whatsApp, photos and many more...), All these services are done remotely, distance is not a barrier. You can reach out with them on ( TECHSPYMAX @ gm ail c om ).