Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "not a hacker"
-
*Now that's what I call a Hacker*
MOTHER OF ALL AUTOMATIONS
This seems a long post. but you will definitely +1 the post after reading this.
xxx: OK, so, our build engineer has left for another company. The dude was literally living inside the terminal. You know, that type of a guy who loves Vim, creates diagrams in Dot and writes wiki-posts in Markdown... If something - anything - requires more than 90 seconds of his time, he writes a script to automate that.
xxx: So we're sitting here, looking through his, uhm, "legacy"
xxx: You're gonna love this
xxx: smack-my-bitch-up.sh - sends a text message "late at work" to his wife (apparently). Automatically picks reasons from an array of strings, randomly. Runs inside a cron-job. The job fires if there are active SSH-sessions on the server after 9pm with his login.
xxx: kumar-asshole.sh - scans the inbox for emails from "Kumar" (a DBA at our clients). Looks for keywords like "help", "trouble", "sorry" etc. If keywords are found - the script SSHes into the clients server and rolls back the staging database to the latest backup. Then sends a reply "no worries mate, be careful next time".
xxx: hangover.sh - another cron-job that is set to specific dates. Sends automated emails like "not feeling well/gonna work from home" etc. Adds a random "reason" from another predefined array of strings. Fires if there are no interactive sessions on the server at 8:45am.
xxx: (and the oscar goes to) fuckingcoffee.sh - this one waits exactly 17 seconds (!), then opens an SSH session to our coffee-machine (we had no frikin idea the coffee machine is on the network, runs linux and has SSHD up and running) and sends some weird gibberish to it. Looks binary. Turns out this thing starts brewing a mid-sized half-caf latte and waits another 24 (!) seconds before pouring it into a cup. The timing is exactly how long it takes to walk to the machine from the dudes desk.
xxx: holy sh*t I'm keeping those
Credit: http://bit.ly/1jcTuTT
The bash scripts weren't bogus, you can find his scripts on the this github URL:
https://github.com/narkoz/...56 -
Today my classmate came up to me and said he was a hacker.
I told him to prove it, and guess what? HE ACTUALLY HACKED GOOGLE!
It was amazing! He impressed so many kids in the class with his skills of pressing F12! How impressive is that?
He even wore a black hoodie and can spell his name in binary code. Not to mention, he changed google doc's page color to black and the font to green as he typed his essay.
I need to be careful... This 1337 h4x0r is really scary.
83w4r349 -
A hacker deleted the despacito video from youtube.
Those are not the hackers we deserve, but the hackers we need.17 -
An incident which made a Security Researcher cry
--------------------------------------------------------
I was working on my laptop finishing up my code while waiting for the flight which was late . Meanwhile two guys (I'm gonna call them Fellas) in black suit and shades came to me
Fella : Sir you have to come with us .
Me : *goes along with them*
Fella : Sir please proceed *points towards the door . The room has a round table with some guys discussing something *
Fella 1 : Your passport please
Me : *Hands over the passport*
Fella 1 : Where are you traveling to sir?
Me : India
Fella 1 : Put your laptop in the desk sir.
Me : Sure thing
Fella 2 : What were you doing there? *Taps the power button*
Me : Just finishing up my work .
Fella 1 : Or hacking our systems?
Me : Seriously?
Fella 2 : The password please .
Me : Here you go
*5 minutes have passed and he still can't figure out how to use the machine*
Fella 2 : Which Windows is this?
Me : It's Linux
Fella 1 : So you are a hacker .
Me : Nope
Fella 1 : You are using Linux
Me : Does it matters?
Fella 1 : Where do you work?
Me : *I won't mention here but I told him*
Fella 2 : So what do you do there?
Me : I'm a Security Researcher
Fella 1 : What's your work?
Me : I find security holes in their systems .
Fella 1 : That means you are a hacker .
Me : Not at all .
Fella 2 : But they do the same and they use Linux .
Me : You can call me one .
*After 15 minutes of doo-laa-baa-dee-doo-ra-ba-doo amongst them I dunno what they were talking , they shutdown the computer and handed over it to me*
Fella 2 - So you are somewhat like a hacker .
Me - *A bit frustrated* Yes.
##And now the glorious question appeared like an angel from river ##
Can you hack Facebook?
Me - 😭😭😭28 -
Anyone know this bitch hacker 127.0.0.1 story?
WORST HACKERS OF ALL TIME
CONTINUED IN THE COMMENTS BECUASE IT IS SO LONG...
TLdr bitch hacker hacks himself by localhost
bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> why do you kick me
<bitchchecker> can’t you discus normally
<bitchchecker> answer!
<Elch> we didn’t kick you
<Elch> you had a ping timeout: * bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
<bitchchecker> what ping man
<bitchchecker> the timing of my pc is right
<bitchchecker> i even have dst
<bitchchecker> you banned me
<bitchchecker> amit it you son of a bitch
<HopperHunter|afk> LOL
<HopperHunter|afk> shit you’re stupid, DST^^
<bitchchecker> shut your mouth WE HAVE DST!
<bitchchecker> for two weaks already
<bitchchecker> when you start your pc there is a message from windows that DST is applied.
<Elch> You’re a real computer expert
<bitchchecker> shut up i hack you
<Elch> ok, i’m quiet, hope you don’t show us how good a hacker you are
<bitchchecker> tell me your network number man then you’re dead
<Elch> Eh, it’s 129.0.0.1
<Elch> or maybe 127.0.0.1
<Elch> yes exactly that’s it: 127.0.0.1 I’m waiting for you great attack
<bitchchecker> in five minutes your hard drive is deleted
<Elch> Now I’m frightened
<bitchchecker> shut up you’ll be gone
<bitchchecker> i have a program where i enter your ip and you’re dead
<bitchchecker> say goodbye
<Elch> to whom?
<bitchchecker> to you man
<bitchchecker> buy buy
<Elch> I’m shivering thinking about such great Hack0rs like you
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> dude be happy my pc crashed otherwise you’d be gone
<Metanot> lol
<Elch> bitchchecker: Then try hacking me again… I still have the same IP: 127.0.0.1
<bitchchecker> you’re so stupid man
<bitchchecker> say buy buy
<Metanot> ah, [Please control your cussing] off
<bitchchecker> buy buy elch
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> elch you son of a bitch
<Metanot> bitchchecker how old are you?
<Elch> What’s up bitchchecker?
<bitchchecker> you have a frie wal
<bitchchecker> fire wall
<Elch> maybe, i don’t know
<bitchchecker> i’m 26
<Metanot> such behaviour with 26?
<Elch> how did you find out that I have a firewall?
<Metanot> tststs this is not very nice missy
<bitchchecker> because your gay fire wall directed my turn off signal back to me
<bitchchecker> be a man turn that shit off
<Elch> cool, didn’t know this was possible.
<bitchchecker> thn my virus destroys your pc man
<Metanot> are you hacking yourselves?
<Elch> yes bitchchecker is trying to hack me
<Metanot> he bitchchecker if you’re a hacker you have to get around a firewall even i can do that
<bitchchecker> yes man i hack the elch but the sucker has a fire wall the
<Metanot> what firewall do you have?
<bitchchecker> like a girl
<Metanot> firewall is normal a normal hacker has to be able to get past it…you girl
<He> Bitch give yourself a jackson and chill you’re letting them provoce you and give those little girls new material all the time
<bitchchecker> turn the firewall off then i send you a virus [Please control your cussing]er
<Elch> Noo
<Metanot> he bitchchecker why turn it off, you should turn it off
<bitchchecker> you’re afraid
<bitchchecker> i don’t wanna hack like this if he hides like a girl behind a fire wall
<bitchchecker> elch turn off your shit wall!
<Metanot> i wanted to say something about this, do you know the definition of hacking??? if he turns of the firewall that’s an invitation and that has nothing to do with hacking
<bitchchecker> shut up
<Metanot> lol
<bitchchecker> my grandma surfs with fire wall
<bitchchecker> and you suckers think you’re cool and don’t dare going into the internet without a fire wall
<Elch> bitchchecker, a collegue showed me how to turn the firewall off. Now you can try again
<Metanot> bitchhacker can’t hack
<Black<TdV>> nice play on words
<bitchchecker> wort man
<Elch> bitchchecker: I’m still waiting for your attack!
<Metanot> how many times again he is no hacker
<bitchchecker> man do you want a virus
<bitchchecker> tell me your ip and it deletes your hard drive
<Metanot> lol ne give it up i’m a hacker myself and i know how hackers behave and i can tell you 100.00% you’re no hacker..30 -
*Facebook Hackers follow the Rules*
(real story)
TL;DR: sorry, not available, can't do spoilers
One night I was with a group of friends out at a pub. A guy and his girlfriend show up, I didn't know them but they were my friend's friends.
The girl kept bragging the whole time about his boyfriend being a professional programmer, trying to remind it to everybody whenever possible (don't ask me why!).
So, after a while, the discussion moves towards "suspect Facebook activities" and the guy starts saying that he can hack Facebook.
- "What do you mean?", I ask.
- "Hacking into other people's accounts, even with 2 factor authentication. I did it a lot of times"
- "Wait, and they don't notice?"
- "Of course not! ^_^ He's a hacker", the girl replies.
Ok, time to do a coming out.
- "Hey, I'm a developer myself. Can you give me an idea of what you did in technical terms? Did you find a vulnerability? Used a virus? Maybe a keylogger?"
- "No... Uh... Well... The secret is to read the terms of service"
- "What?"
- "Yes... yes it's all in the facebook terms of service..."
- "Uhm, I'm not really sure I'm following. Could you prove it by hacking my Facebook account? I'm giving you the permission".
In less than a minute the discussion flew completely away and they never mentioned computers again.
😂😂8 -
This actually happend in my secondary school class. A new guy came to our class. The whole family moved from another city.
*new guy want to start conversation with me*
new guy: "So you into computers and stuff like that?"
me: "Yes" *seems like a cool guy , want to develop the conversation further* "what about you man? do you like computers? do yo program or smth?"
*new guy wants to look cool in front of me*
new guy: " Yeah dude, actually I am hacker"
*me saying to myself, oh fuck not again this shit*
he continues with: " Once I got into the NASA system"
*switches mode to making fun of him*
me: "what the fuck man? really? that´s freaking cool, how you manage to do that? "
new guy: " you know the thing when you press F10 when starting a comupter? "
me: "You mean BIOS?"
new guy : "yeah yeah man through that shit"
* I am done, laughing my ass off and walks away*1 -
Corporate IT: YOU MUST COME INTO THE OFFICE. WE JUST RECEIVED AN URGENT NOTIFICATION FROM APPLE OF A SECURITY VULNERABILITY IN iOS DEVICES. YOU HAVE BEEN IDENTIFIED AS HAVING A MAC ASSET. COME INTO THE OFFICE IMMEDIATELY AND UPDATE IT.
Dev: I don’t use that mac, it sits in my office desk drawer unplugged. I’ll update it if I ever need it for anything. Which I won’t, we don’t do iOS dev anymore.
Corporate IT: NOOOOO!!! YOU MUST UPDATE IT NOW!!!
Dev: I’m not wasting time driving into the office this week. We have an important deadline we’re working on, I can’t afford to lose 2 hours to this. Plus it can’t be turned on right now, It’s been unplugged for 2 years.
Corporate IT: THAT WOULDN’T STOP A HACKER!!
Dev: …11 -
Hello!
I'm a member of an international hacker group.
As you could probably have guessed, your account [cozyplanes@tuta.io] was hacked, because I sent message you from it.
Now I have access to you accounts!
For example, your password for [cozyplanes@tuta.io] is [RANDOM_ALPHABET_HERE]
Within a period from July 7, 2018 to September 23, 2018, you were infected by the virus we've created, through an adult website you've visited.
So far, we have access to your messages, social media accounts, and messengers.
Moreover, we've gotten full damps of these data.
We are aware of your little and big secrets...yeah, you do have them. We saw and recorded your doings on porn websites. Your tastes are so weird, you know..
But the key thing is that sometimes we recorded you with your webcam, syncing the recordings with what you watched!
I think you are not interested show this video to your friends, relatives, and your intimate one...
Transfer $700 to our Bitcoin wallet: 13DAd45ARMJW6th1cBuY1FwB9beVSzW77R
If you don't know about Bitcoin please input in Google "buy BTC". It's really easy.
I guarantee that after that, we'll erase all your "data" :)
A timer will start once you read this message. You have 48 hours to pay the above-mentioned amount.
Your data will be erased once the money are transferred.
If they are not, all your messages and videos recorded will be automatically sent to all your contacts found on your devices at the moment of infection.
You should always think about your security.
We hope this case will teach you to keep secrets.
Take care of yourself.
>> RE >>
Well f### you, thanks for telling my password which is obviously fake. I have sent your details to the local police department, shall rest in peace. Don't earn money by this kind of action. STUPID!17 -
It's funny, whenever the subject of facebook vs privacy comes up (mostly I don't even initiate those convo's), people always start to defend facebook when I say that I THINK that facebook is build to get people addicted to it and get them to stay on facebook as long as possible.
Haha, one of facebook's early investers/ex facebook presidents said the following in an interview:
“It’s a social-validation feedback loop, exactly the kind of thing that a hacker like myself would come up with, because you’re exploiting a vulnerability in human psychology.”
So even an ex president of facebook is admitting this.
I also found the folloing a good one:
The underlying thought process while creating platforms like Facebook or Instagram is something like “How do we consume as much of your time and conscious attention as possible?”
Last but not least, the part I found the most scary:
“God only knows what it’s doing to our children’s brains.”
Yes, I find this scary.
Oh yeah and for the people who are going to call bullshit on this one, I've got one source and if you search engine on the title of that article then you'll find loads of websites having that story:
https://fossbytes.com/facebook-was-...26 -
I hate how people think that to be a "hacker" or hacking is this special job title. lol. Hacking is just using something in a way in which it was not intended to be used.
So pretty much think ...anal sex.
There. Now many people are "hackers"6 -
My words to live by...
Another one got caught today, it's all over the papers. "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.
I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all... after all, we're all alike.
+++The Mentor+++9 -
My hubby saw me using Secure Shell to install some software on a cloud server I'm using through the terminal. After a few minutes of watching, he said, "Oh, the government better watch out for you!"
I've been unable to successfully convince him I'm not some elite super-hacker like he's used to seeing in movies and NCIS.7 -
If you couldn't work any more as a coder / programmer / hacker / it-master-guru, what would your profession be?
Like, not your ideal profession, but the most likely thing that you would end up doing outside of the dev world.33 -
!Story
The day I became the 400 pound Chinese hacker 4chan.
I built this front-end solution for a client (but behind a back end login), and we get on the line with some fancy European team who will handle penetration testing for the client as we are nearing dev completion.
They seem... pretty confident in themselves, and pretty disrespectful to the LAMP environment, and make the client worry even though it's behind a login the project is still vulnerable. No idea why the client hired an uppity .NET house to test a LAMP app. I don't even bother asking these questions anymore...
And worse, they insist we allow them to scrape for vulnerabilities BEHIND the server side login. As though a user was already compromised.
So, I know I want to fuck with them. and I sit around and smoke some weed and just let this issue marinate around in my crazy ass brain for a bit. Trying to think of a way I can obfuscate all this localStorage and what it's doing... And then, inspiration strikes.
I know this library for compressing JSON. I only use it when localStorage space gets tight, and this project was only storing a few k to localStorage... so compression was unnecessary, but what the hell. Problem: it would be obvious from exposed source that it was being called.
After a little more thought, I decide to override the addslashes and stripslashes functions and to do the compression/decompression from within those overrides.
I then minify the whole thing and stash it in the minified jquery file.
So, what LOOKS from exposed client side code to be a simple addslashes ends up compressing the JSON before putting it in localStorage. And what LOOKS like a stripslashes decompresses.
Now, the compression does some bit math that frankly is over my head, but the practical result is if you output the data compressed, it looks like mandarin and random characters. As a result, everything that can be seen in dev tools looks like the image.
So we GIVE the penetration team login credentials... they log in and start trying to crack it.
I sit and wait. Grinning as fuck.
Not even an hour goes by and they call an emergency meeting. I can barely contain laughter.
We get my PM and me and then several guys from their team on the line. They share screen and show the dev tools.
"We think you may have been compromised by a Chinese hacker!"
I mute and then die my ass off. Holy shit this is maybe the best thing I've ever done.
My PM, who has seen me use the JSON compression technique before and knows exactly whats up starts telling them about it so they don't freak out. And finally I unmute and manage a, "Guys... I'm standing right here." between gasped laughter.
If only it was more common to use video in these calls because I WISH I could have seen their faces.
Anyway, they calmed their attitude down, we told them how to decompress the localStorage, and then they still didn't find jack shit because i'm a fucking badass and even after we gave them keys to the login and gave them keys to my secret localStorage it only led to AWS Cognito protected async calls.
Anyway, that's the story of how I became a "Chinese hacker" and made a room full of penetration testers look like morons with a (reasonably) simple JS trick.9 -
How a regular convo with non-devs usually go:
"So what do you do?"
"I'm a software developer."
"Oh, so you're like... a hacker?"
"No, I build apps."
"Nice! So like facebooks and stuff???"
"Not exactly. Different things, mostly tools. It depends."
"Ooh...cool...Like what?"
*proceeds to spend what feels like an hour trying to explain what I do for a living in the simplest terms, while the person just blankly stares and nods, pauses, then finally tells me their crazily infeasible app idea.*
"So whadaya think?"
"Hmm...sounds good 😀👍"9 -
Don't apply for a job that you don't like. You're gonna hate your life.
Don't ask for a salary you know you're not worth.
Work in a tech company as much as possible. If you don't, you're gonna be treated as a powerpoint presentation expert, office installation expert, video editor/movie maker expert, IT support guy, loose plug/broken headset repairman, facebook hacker, and a dark magician all at once. Most (not all) tech companies know who you are better. They understand your needs better.7 -
10 years ago, I found a vulnerability in the connection between an insurer I was working for, and the network of databases of municipalities. I was only a hacker in so far as kids who watched Hak5 are considered hackers, so I always carried this laptop with a fake access point, package sniffer, wep crack, sslstrip, etc with me.
The vulnerabilities allowed me to register a new identity, for which I requested a passport.
Walking up to the town hall desk with two passports with different names, both mine, was pretty cool.
I did not do anything malicious, and was hired to fix the issues (wep encryption on insurers trusted wifi, and municipality postgres gave write access to all third parties)
For a few days I was the coolest kid in school though!2 -
Me: I develop Applications.
Stranger: Oh so you are a programmer.
Me: Yup 😎
Stranger: Please hack my ex's insta.
Me: I am not a hacker nor am I intrested in learning to hack. I develop stuff from scratch. Innovate and contribute something to society.
Stranger: Oh, what a disappointment. Why did you say you are a programmer then.
Me: I...~am 😶
For some, hacking is the only programming thing for them. I get message at least once a month from someone requesting to hack someones fb,insta or some account.
Thinking of creating a bot which finds such keywords in my messages and automatically replies to them explaining what I really do. Or just f***ing block them.7 -
When I am sitting in my school and writing a few lines of simple HTML code, people looks at my screen and more less shouting out loud "wow you are like a hacker or something? Who are you hacking and how do you do it and how did you learn it?". It happened a couple of times to me. Sometimes I just tell them it as it is and saying something like "it's simple HTML code" and a little explanation of what it is. Sometimes (depending who it is) I answer that it is a new kind of spyware I'm developing and if I'm lucky they believe in me and starts begging me for not hurting their computers.
Just a few lines of <script> and some code highlighting. How to become a hacker!8 -
This is not facebook, but somehow yhis site has attracted who are virtually, mentally incapable of differentiating between their script kiddy hacker facebook group and anything that can be called a social media platform.
Sorting by recent and daring to toggle on jokes/memes is a pure shitshow of freshly created accounts who post "memes" of the same purity as their mother. And to finish it off they add that super relatable comment "hahah", "funny" and a couple of emojis. Totally makes me wonder if I end up being called comedy god for posting "peepee poopoo" on the site they "shared" it from.
Yes, shared and not stolen for the sake of that little dopamine rush when they see that 4 other people who try to escape their shitty form of reality thought you deserve to be proud for those couple of finger movements you used to put this on devrant and not to jack off.
Not even that spares you from their awful humor, because thanks to their disability to red, they think they can just smash that big red button and post their garbage in the wrong category, yet somehow they have the obligation to add an absurd amount of tags telling you that they've tried to post a joke and I honestly feel sorry for the database table who has to store so variations of "jokes/meme" for this shit.
Thr quality of these memes degrades with each time I open devrant, just like my patience for these shitposters.
I've seen a couple of people who cancled their monthly subscription for devrant, to show their discontent with these user and my urge to do the same has gotten stronger recently.
DevRant as it is right now is on it best way to stray away further from what it meant to be every day12 -
Fresh internship story/conversation (Part 1)
Happened today:
- "Can you hack someone via cmd?"-cheap coworker at my internship workplace
- "Can you hack the NSA from any device?"-cheap coworker
- "Can the police identify me, if my face is on a Youtube video?"-cheap coworker
- "I can see all devices I have been through when I want to connect to a target as a route.
*talks about hops in a trace route, but uses non-technical terms for it*
*uses "ping host wikihow.com" instead of "tracert wikihow.com" to demonstrate it, besides of that "host" was not supposed to be there in that command*
*he had to google how to use the ping command on Windows*
*finally uses the ping command properly*
"Here, you can see all the devices our machine has connected to to reach the target"
ME: Aha. But dude... you know that all these ip adresses are in fact the same ip. These IPs are not any different. They are all the same. Besides of that this IP is the IP of this *points to domain name on windows cli* domain.
Him: Oh... I had a friend named ... *continues telling me some "hacker stories" from his past*
Me: *ignores him and always just responds with "Aha" to him* -cheap coworker
Happened yesterday:
- "You have programming classes? You must be an expert in Excel then, right?" -internship boss3 -
I starten when I was 12 years old. I got bullied and got interested in computers. One day I crashed my dads computer and he reinstalled it. After that my dad made two accounts. The regular user (my account) and the Administrator user (my dads account). He also changed the language from Dutch to English. Gladly I could still use the computer by looking at the icons :')
Everytime I needed something installed I had to ask my dad first (for games mostly because there was no cable internet at that time). Then I noticed the other user account while looking over my dads shoulders. So I tried to guess the password and found out the password was the same as the label next to the password field "password".
At that point my interest in hacking had grown. So when we finally got cable internet and my own computer (the old one) MSN Messenger came around. I installed lots of stuff like flooders etc. Nobody I knew could do this and people always said; he is a hacker. Although it is not.
I learned about IP-address because we sometimes had trouble with the internet. So when my dad wasn't home he said to me. Click on this (command prompt) and type in; ipcondig /all. If you don't see an IP-address you should type in; ipconfig /renew.
Thats when I learned that every computer has a unique address and I started fooling around with hacking tools I found on internet (like; Subseven).
When I got older I had a new friend and fooled around with the hacking tools on his computer. Untill one day I went by my friend and he said; my neighbor just bought my old computer. The best part was that he didn't reinstall it. So we asked him to give us the "weird code on the website" his IP-Address and Subseven connected. It was awesome :'). (Windows firewall was not around back then and routers weren't as popular or needed)
At home I started looking up more hacking stuff and found a guide. I still remember it was a white page with only black letters like a text file. It said sometime like; To be a hacker you first need to understand programming. The website recommended Visual Basic 6 for beginners. I asked my parents to buy me a book about it and I started reading in the holliday.
It was hard for me but I really wanted to hack MSN accounts. When I got older I just played around and copy -> pasted code. I made my own MSN flooders and I noticed hacking isn't easy.
I kept programming and learned and learned. When I was 16/17 I started an education in programming. We learned C# and OOP (altho I hated OOP at first). I build my own hacking tool like "Subseven" and thats when I understood you need a "server" and "client" for a successful connection.
I quit the hacking because it was getting to difficult and after another education I'm now a fulltime back-end developer in C#.
That's my story in short :)3 -
I can really recommend all to read the issues opened by the hacker of matrix.org this morning, quite entertaining but also a reminder to everyone (devs and admins) that security should not be compromised on:
https://github.com/matrix-org/...16 -
Dear Luis,
If you are an anonymous hacker, please do not include your name in the mail.
Sincerely,
cursemeslowly a.k.a the person who has visited a porn site and supposedly being hacked by an Anonymous Hacker named Luis18 -
The more depressed you get over the current state of software is how you know you made it.When you start making your own opinions and say"wow these people are full of shit"
Primary example, the web development overblown bullshit. Fuck me dude, you really don't need that full featured react, vue, angular framework to make sense of shit. You are going over the top for fucking ajax functionality and state management that you could do by yourself without needing to learn a full framework, by the time you finish learning react you probably would have been better served with standard vanilla af JS and server side rendering.
Our world is full of fads and many talented people that perpetrate them. Its fine, it is a the nature of the beast. But a lot...A LOT of software is very POORLY written. And adding levels of abstraction over a very broken paradigm (web in this case) does and will not make it better.
Basically I am fucking hating being a web developer and want to go back to a time in which we cared about how much memory consumption our applications made as well as not worrying about the fucking frontend having the ability to implement machine learning.
I want to run sublime.exe and being sure that it is a native application to my system and not using a fucking contained web browser to implement my fucking text editor. With 20mb of ram at most instead of 500mb WTF.
I knew I made it when I could read comments on Hacker news and reddit and say "this idiot is full of shit", I knew I made it when I would sigh heavily at the idea of having another project rather than having a fan girl attitude towards it.
I knew I made it when people writing about software development meant shit to me rather than the wonder of what the fuck they were talking about.
I knew I made it when getting laid was more important to me than fucking around with code.
pussy > code
Fuck you.13 -
Well, i have a few stories i would like to share with you :)
My neighbour asked me to fix her webcam.
I told her: But I am a programmer, not a repair service .
Next time my neighbour forgot her Skype password. Se asked me to hack it for her.
I told her: But I am a programmer, not a hacker.
My sister asked me to help her out in her program, because of some bug. Well, she is in the other part of the Country. But, i said, lets give it a try.
Well, it turned out to be some kind of mechanical remote scanner, with needed that exact same remote locally.
I told her: But I am a programmer, not a fictional remote signal scanner repairer.
My grandpa asked me, to copy his old gmail emails into his new laptop.
Well, i told him to log in. He logged in. Than i told him: It is done :D
Thanks for reading it :)4 -
Whenever I see a programmer or hacker coding in a movie, I pause the movie and see if I can understand what the code is trying to do. If I can't understand it, I feel sad the rest of the day thinking I'm not a good enough programmer.7
-
When you've to explain normal people that you're a dev and not a hacker and so you can't just hack into their ex's Facebook account like it's some magic trick.3
-
I fucking hate holidays. Every goddamn time when it's a holiday, that's when I need to go to the store and get something, only to find out that they're closed. And what for.. holidays are - to me at least - no more than an excuse for people to not go to work for the day.
So, now I ran out of booze, and can't continue developing and testing my breathalyzer until Monday.
Then it hit me.. what if I take all my Arduino equipment (laptop, jumper wires, ...) to the café and deploy my build environment on a table there?
Eh, no no no. I don't want some idiot to come up to me saying "YOU EVIL HEKORMAN!!!" and have to explain that just like when you call a banker who's working with the money vaults a thief, it's wrong to call someone that's developing shit an evil hacker.. one should strive to not throw mindless accusations out of unknowingness. Not that I'm a good example of that though. But still.
It's probably that or some stupid bitch coming up to me asking to hack her boyfriend's Phasebuk.. that said, that could probably be an opportunity to get in her pants. But then, I don't wanna insert my meat in an idiot like that... ._.
So, no booze it is then? Thanks national holidays!
"Ok Google, remind me every day before a holiday because I really couldn't care less about them!!"14 -
This rant goes to my best friend.
Fuck you!
You do not fucking argue with people for doing what they like! So what if I want to use linux? What fucking problem does that make? Am I now a hacker fanboy for wanting to use a terminal instead of fucking pointing and clicking on shit like a monkey? Am I not allowed to want my privacy and free open-source? What? I shouldn't browse internet without getting my personal info stolen? Oh, they're tracking criminals? Then why don't you install a camera in your fucking living room so you can help them out? And don't fucking get me started on why I don't want to use Windows 10.
Fuck fucking fuck fuck. I know he's a good friend but this fucking shit gets my blood boiling.8 -
Earlier I signed up on this forum called NulledBB. Basically some hacker skiddie forum that had a dump of an archive I wanted, unfortunately behind a paywall which I didn't want to bother with.
On signup I noticed that I couldn't use my domain as an email address, as I usually do (the domain is a catch-all which means that mail addresses can be made up for each service I sign up to on the fly, super useful). They did expose the regex that they accepted email as however, which included something along the lines of "@live.*".
So I figured, why not register a subdomain live.nixmagic.com real quick and put that into the mail servers? Didn't take too long and that's what I eventually went with, and registered as somepissedoffsysop@live.nixmagic.com (which I have no trouble putting on a public forum as you'll see in a minute).
Still didn't manage to get that archive I wanted but I figured, fuck it. It's a throwaway account anyway. But eventually that email address started to receive spam. Stupid motherfucker of a forum operator with his Kali skidmachine probably leaked it.
Usually I just blacklist the email address in SpamAssassin by adding an additional spam score of 100 to email sent to such addresses. But in that case it didn't even sit on the main domain, thanks to that stupid regex block from earlier... 😏
*Logs into my domain admin panel*
*Le rm on the live.nixmagic.com record*
Null routed entirely.. nulled, if you will! 🙃3 -
It has been bugging the shit out of me lately... the sheer number of shit-tier "programmers" that have been climbing out of the woodwork the last few years.
I'm not trying to come across as elitist or "holier than thou", but it's getting ridiculous and annoying. Even on here, you have people who "only do frontend development" or some other lame ass shit-stain of an excuse.
When I first started learning programming (PHP was my first language), it wasn't because I wanted to be a programmer. I used to be a member (my account is still there, in fact) of "HackThisSite", back when I was about 12 years old. After hanging out long enough, I got the hint that the best hackers are, in essence, programmers.
Want to learn how to do SQL injection? Learn SQL - write a program that uses an SQL database, and ask yourself how you would exploit your own software.
Want to reverse engineer the network protocol of some proprietary software? Learn TCP/IP - write a TCP/IP packet filter.
Back then, a programmer and a hacker were very much one in the same. Nowadays, some kid can download Python, write a "hello, world" program and they're halfway to freelancing or whatever.
It's rare to find a programmer - a REAL programmer, one who knows how the systems he develops for better than the back of his hand.
These days, I find people want the instant gratification that these simpler languages provide. You don't need to understand how virtual memory works, hell many people don't even really understand C/C++ pointers - and that's BASIC SHIT right there.
Put another way, would you want to take your car to a brake mechanic that doesn't understand how brakes work? I sure as hell wouldn't.
Watching these "programmers" out there who don't have a fucking clue how the code they write does what it does, is like watching a grown man walk around with a kid's toolbox full or plastic toys calling himself a mechanic. (I like cars, ok?!)
*sigh*
Python, AngularJS, Bootstrap, etc. They're all tools and they have their merits. But god fucking dammit, they're not the ONLY damn tools that matter. Stop making excuses *not* to learn something, Mr."IOnlyDoFrontEnd".
Coding ain't Lego's, fuckers.36 -
User where I work is convinced someone hacked her iPhone and is remotely changing settings all the time. And it’s not us (the company), the phone isn’t managed and there are no remote profiles installed.
User: I’m telling you. Things are always changing without me doing it!
Me: Alright. Do you have an exemple?
User: Yes. When I swipe here [control center] and tap the WiFi toggle, it always gets back on by itself later.
Me: Yep. That’s actually a “feature”. You don’t have to worry.
User: Alright then, this morning I couldn’t get Google Maps to work.
Me: Well. Since you turned off your cellular and WiFi, it’s normal you couldn’t look up an adress.
User: okay then what about that Bluetooth icon in the top that always appears? I know that means the hacker is on my phone through Bluetooth. See!?
Me: That’s actually just a status indicator. Don’t worry about it. It’ll always come back there it’s normal. You know, your phone can do a lot of stuff by itself.
User: Yeah right. It does it by itself. I’m not stupid you know!! *storms off*
What the hell?6 -
WANKETEERING FUCKING CUNTS!!!!!
Just now I had this great incident with rosé wine hitting my couch (on a Monday, yet another reason to hate that fucking shit day). If that is you dear Google searcher, let me tell you this. GRAB YOUR FUCKING SALT, AS QUICKLY AS YOU CAN AND POUR IT ON THERE IMMEDIATELY!!!
(edit: seems to work quite well for sucking up the wine moisture, not sure about smell or discoloration.. so far so good)
At least that's what a wanketeering cunt told me after having me read through 5 minutes of their dribble. While the motherfucker explicitly mentions that you're on a time limit, mind you!!! Because you know, fuck your goddamn couch, I want that fraction of a cent in ad money, that oh you've blocked it? I have no fucking idea. But waste your time on my shitsite nonetheless!!!
You know what, marketeering motherfucking dickhead. If that salt isn't going to fix my goddamn fucking couch, how about I take your goddamn shitsite down for the next FUCKING MONTH, HUH?!! Just to make up for the hundreds of fucking euros that a motherfucking couch is worth?! That'll serve you fucking right for pissing off a hacker!!! MOTHERFUCKER!!!!12 -
I'm thirteen, and we have an excel unit in our computer class. When she's want to teach us something, she'd deploy her screen on ours and we couldn't do anything. It took me until the third time (yes, that long) to remember the connection was wired via Ethernet. I took the cord out and my computer was free! During the boring "lesson," I opened Code::Blocks to work on a fun side project. When she notice she wasn't connecting to my computer, she walked over to my chair and saw Code::Blocks on my screen. Then, I noticed her behind me. I quickly pressed ALT+TAB. She walked back to her chair. To this day I swear she thinks Im a hacker.11
-
I remember a few months ago at my school we all had taken the Chromebooks (our county's OS of choice) out and put them on our desks. We were in science, and we needed to take screenshots of websites for some reason. "Everyone go to the chrome store," our teacher said, with a look-how-smart-i-am kind of look on her face, "search for the 'Awesome Screenshot Extension.'" Ugh. This was dumb. I reluctantly searched it up and upon bringing up the description and about to press the "Add to Chrome" button, when I stopped, and made a decision I would later regret. Now, I don't really like this teacher, and she thought she was so fucking smart for finding this shit extension. I raised my hand, and she walked over. "Uhh… I'm pretty sure you can just do Ctrl + shift + []|| to take a screenshot" I said. She was fucking dumbfounded. She yelled out "Class, listen up! [Let's call me 'Ben' for this story] Ben just found an alternative [she was trying to make her extension not seem entirely useless, even though she knew it was] way to take a screenshot. Just press Ctrl + shift plus that box with the two lines next to it. You can use my extension or the one Ben found. Whichever is easier [she damn well knew which was easier]." Three times in the span of the next five minutes she said "just a reminder… you can use Ben's way if you want" to the whole class. Everyone kept looking at me. A few minutes later, she called me up to the computer which was being displayed on the big screen in front of class. She said some people were having trouble, so then pulled all the attention on me to come up to the front of class and demonstrate a goddamn keyboard shortcut. She was running windows 8, and I knew it wouldn't work on her computer. I pressed a few random keys on the keyboard and said "uhh, I think it only works on their computers" she let me sit back down. She couldn't handle the concept that different computers run different operating systems. I sat down and the guy sitting next to me raised his hand. He said "you could use the 'snippet tool'" Yes. Some people can. But she can't. I stopped him from doing anymore damage on their small brains by saying "uhh, it won't work on the Chromebooks, so that won't help." I hate that teacher. At lunch my friend came over to me. He has the same science teacher as me. "You know what she's been saying all day?" I was confused. "What?" I said. He almost started to laugh. "All day she's [the teacher] has been telling everyone that you found this amazing new technology in the Chromebooks. [Most of the students were smart enough to know that I didnt] she was like 'Ben, from my 2nd period found this amazing thing'" End of story. And guess what? I still hate her.3
-
Being the only tech savvy person in class can be the worst. If someone gets hacked they all blame you...6
-
If you like looking at language designers fight on Hacker News (and who doesn't?) go ahead and search for the V programming language or Vlang as it is also called and also for the posts that the creator of Odin lang has done in regards to V langs creator.
Its a shitstorm. Apparently both languages have been designed as alternatives to C (not as in "this will kill C!!" like rust does) and occasionally you will find some posts from the Zig language creator.
Fascinating fights actually, have been able to learn a thing or two about why some ideas concerning language design are whacky etc.
I am also trying to understand language design better, which is the main reason why I appreciate all of them fights.
10/10 best drama series I have seen thus far.11 -
26 or so hours up now. And I've got a few stories to tell :) feel free to refresh your cup of coffee and take a seat.
Last few days I've been going into this odd place called intown.irl to get in touch with its inhabitants. An odd place I have to say. But in some cases quite rewarding, even got a MILF home with me and into bed at some point. Anyway...
3 days ago I think it is now? Thursday evening I took my laptop to this local bar where I had this issue about dihydrogen monoxide with one of the bartenders earlier (you'll find that rant on those keywords). Still wanted to visit it regardless though, as I met that first woman there earlier that approached me. Unfortunately I didn't see her there that day.
Some bald guy who was clearly drunk approached me. Many people were already giving curious looks at this laptop I brought to the bar. I finally tuned it up with the stickers from FOSDEM.. I'll put a picture of it in the comments. My theme was one of privacy (central), distributions and Google's open source initiative (which aligns with the keychain token I got from them as well). But of course.. that guy.. he thought that a pimped/riced laptop obviously meant that I was a hacker.
Guy went to the toilet.. went back.. and suddenly grabbed my laptop and turned it towards him. Boy was I never more smugly satisfied that those rubber pads on the bottom are quite resilient. Could've almost damaged my screen by trying to grab it like that. But it's a CCFL display.. so high voltage. If it were to become broken.. worth it. 😈
On it at the time was a terminal, pinging Google (had network issues at that bar, to the point where one of the - I think - staff members got up to me and offered the WiFi password and got to talk with me.. more on that later), and my usual Linux desktop along with the Arch anime wallpaper with the quote of Da Vinci.. simplicity is the ultimate sophistication. Of course the guy saw the terminal.. and probably reaffirmed.. yep, that's a hacker. At least he wasn't too wrong about the general term.. but the hat.. most likely he was wrong on that one.
Guy left with this question.. "you are a hacker, aren't you."
I replied to him: "No sir. I'm not a hacker. I've got no idea what you're talking about."
Guy kept looking at me weirdly for the whole night to come.
Back to that companion guy though. Mac user, yada yada.. but he told me about his backup solution. Apparently - I shit you not - he has not only the photos on his local device, he's also frequently backing them up in Time Machine (which I was really curious about whether it uses mirroring or snapshots.. he couldn't tell, lmk if you do) but not only that.. he was storing another offsite backup in that very bar, in case his house went on fire.
Now that is a proper backup scheme!!! If only more people were like that.
Seriously though.. that bald guy who took my laptop just like that... I just let it slide for that one time, but I tend to treat my machines as an extension of my very self. I think that was a very uncalled for move. Asshole...
How would you have reacted to such a thing? And.. maybe that's why we technologists don't get outside too often? Fucking everything is hacking these days if it's not Knopkes and Blinkenlights… Not every shell is a h4xx0ring console for h3kk1ng de fasbuk…9 -
To register for Facebook's hacker cup.
Fuck you 1:
I need a Facebook account
Fuck you 2:
I need to enter my address and phone number mandatorily. Because they'll send me a t shirt if I win one. It's not like anyone would not win a t shirt or not want one right? So fucking slurp away at all their privacy data any way.
Here's my address for you facebook
No 666, fuck you street, privacypolis, fuckington offville.4 -
When I was about 13, I opened up command prompt on Windows, and changed the color of it to green then ran the tree command. So, not thinking of anything, this was in the library in front of about 60 people and 2 teachers.
All others saw was green text going down fast, and instantly presumed that I was hacking since they knew I was into coding and finding exploits, and just knew how to use a computer better than them in simple terms (HACKER MAN). Thus this lead to me getting sent to the principal's office... I almost got suspended cause I ran the tree command in green.
Two questions for me remain unanswered, that I would love to know. What would've happened if command prompt was printing text in red. Another question becomes, what would've happened if people saw me pinging Google or some popular site.4 -
So here I am in class with just two weeks of knowledge in coding and this douchebag level 300 comes in like, 'Hey i'm a hacker and mid tier programmer and i can see you struggling with your basic code can i be of help?'... so I'm like, 'yh man. I'm a transfer biology student and i don't know a sh*t about coding but i have managed to buid a fine website of just two pages but i would also like to try hacking but first what programming languages do you know?' Guess what......the lil f*cker said HTML. I mean I may not know much but i know that can and will never be a programming language.11
-
!rant
How many of you guys have played Uplink? IMO it's a game every dev should try. While it's not exactly realistic, especially today, it shows actually how powerful a hacker can be. And YOU are that hacker.5 -
Worst part about the people I know IRL knowing I’m a white hat Hacker - “Hey, so and so was taking shit I need you to hack their Facebook.”
*rolls eyes* I’m not your personal keyboard warrior nor do I give a shit who said what. Take care of it yourself. You’re an adult. -
Ladies and gentleman, I've done it.
Remove your hacker game trophies from your wall.
That nasty bug you fixed a couple of nights ago? Meh.
Your top devRant post? You'll delete it after reading this.
Every awesome accomplishment you can think of: it all means shit now.
>> I have SUCCESSFULLY changed my business Microsoft account password into something I can remember AND Microsoft accepted it in under an hour of trying!!!!! <<
I want to say a big FUCK YOU to MICROSOFT for WASTING MY BLOODY TIME.
FUCK YOU for giving me a max of 16 characters. DASB&(*(&G*HH*& for telling me every time my password is 100% strength and then after every submit tell me I have to change it AGAIN because it should be harder to guess. WUT?! It was 16 characters including a (capital) letter, number and multiple special characters, WHAT ELSE DO YOU WANT FROM ME?! UNICODE EMOJI'S???!!! ALLOW ME TO USE MORE CHARACTERS SO I WILL MAKE IT HARDER TO GUESS IT, IT'S 2018 FFS.
I don't even understand why my new password is accepted compared to the other one, but fuck it I can access my account again.
Now I might have to find a new job before the company password policy kicks in again.
/me drops everything and walks out of the office to get wasted (not sure if celebrating or just really pissed off)7 -
In some other rant I told @rusty-hacker about the "not a MacBook" I use for work (and play), but apparently you can't attach an image to a comment, so I thought I'd post this here.15
-
watching the online course for CEH... dude used the Death Star as a tangible example of how exploits work.
IDK if I should love it for the nerdiness, or be slightly sad that someone needs that type of example of what a vulnerability vs an exploit is, when they're going for the Certified Ethical Hacker certification...
Might be better in an introduction to Network Security class?
Also, while discussing the security, usability, and functionality triangle, he reference the Staples "Easy Button" - does one thing, not very secure, and not very functional (in that it has more than one function)...1 -
So, in my very first rant in this astounding community, I unwittingly decided I’d settled for Ubuntu not knowing the massive sea of distros out there 😊 …... boy was I ignorant!
After testing a number of these distros out there I was comfortable enough to truly settle for Ubuntu 16.04.3 LTS (Xenial Xerus)
I wanted something stable, something that I won’t have to tinker much with, something that has a relatively long-time community support. So, I based my decision vastly on the below points since I think they encompass your everyday Joe distro requirements.
1. Package Manager
2. Desktop environment
3. Community support
4. Stability
Any whom, thanks @Totchinuko for sharing your experience about Linux Mint, also @calmyourtities for the Zorin suggestion. I must say I still like Zorin’s look and feel desktop environment. Also @hacker, @Cyanide for your suggestions and to the guys shared their view and comments on the rant 😊 😉8 -
How can someone find recovery experts for cryptocurrency and bitcoin
iFORCE HACKER RECOVERY is top SKILLED Hacker helping victims of crypto scams recover their funds
This burgeoning market is not without its pitfalls, as I learned the hard way when I fell victim to a sophisticated scam that cost me over a hundred thousand Australian dollars. The incident began innocuously with my initial investment, driven by the hope of capitalizing on the cryptocurrency boom. However, my trust in a seemingly legitimate Telegram channel led to a devastating loss.
iFORCE HACKER RECOVERY helped me recover my lost crypto funds and i highly recommend them to anyone. They are Genius
Learn More; ( iforcehackersrecovery. com )
E-Mail (contact@iforcehackersrecovery) com
Text or Call ; +1 (240) 803 - 370645 -
Navigating Directories with PowerShell, coursemates staring and thinking I'm a badass hacker. Their reaction when a directory not found generates five lines of bright red jargonized line in the console and I just nod slowly as if I'm understanding something deep 😂😂4
-
So one of my clients had a different company do a penetrationtest on one of my older projects.
So before hand I checked the old project and upgraded a few things on the server. And I thought to myself lets leave something open and see if they will find it.
So I left jquery 1.11.3 in it with a known xss vulnerability in it. Even chrome gives a warning about this issue if you open the audit tab.
Well first round they found that the site was not using a csrf token. And yeah when I build it 8 years ago to my knowledge that was not really a thing yet.
And who is going to make a fake version of this questionair with 200 questions about their farm and then send it to our server again. That's not going to help any hacker because everything that is entered gets checked on the farm again by an inspector. But well csrf is indeed considered the norm so I took an hour out of my day to build one. Because all the ones I found where to complicated for my taste. And added a little extra love by banning any ip that fails the csrf check.
Submitted the new version and asked if I could get a report on what they checked on. Now today few weeks later after hearing nothing yet. I send my client an email asking for the status.
I get a reaction. Everything is perfect now, good job!
In Dutch they said "goed gedaan" but that's like what I say to my puppy when he pisses outside and not in the house. But that might just be me. Not knowing what to do with remarks like that. I'm doing what I'm getting paid for. Saying, good job, your so great, keep up the good work. Are not things I need to hear. It's my job to do it right. I think it feels a bit like somebody clapping for you because you can walk. I'm getting off topic xD
But the xss vulnerability is still there unnoticed, and I still have no report on what they checked. So I have like zero trust in this penetration test.
And after the first round I already mentioned to the security guy in my clients company and my daily contact that they missed things. But they do not seem to care.
Another thing to check of their to do list and reducing their workload. Who cares if it's done well it's no longer their responsibility.
2018 disclaimer: if you can't walk not trying to offend you and I would applaud for you if you could suddenly walk again.2 -
Yesterday evening my family were watching his favourite tv show. Have nothing to do i too sat there with them.
The scenes on television were going like : The leading lady of the show were trying to convince her family that her husband is not involved in the molestations which police has charged on him. Person can be look alike of her husband. In fact my husband was some where else when the molestation was happening. She also had a proof and that was CCTV camera footage in a Compact Disk. So she started playing it in the TV presented in room with CD player. But it turns out that CD can't be played because villain hired a hacker to corrupt video quality playing in TV.
I laughed because in my knowledge that was not even possible in real life. Every family memeber started staring at me.
My mother : That's what you do? No? That's what you do whole day in your office?
Me: No, no. I....
My mother: See her face. Poor lady.
Me: But mom, that's impossible. It is just fiction. In real life it is not possible.
My mother : Get out of my sight.
My mom did not dine yesterday. These fucking serial maker. These women's. -
I needed to print out the documentation of Vue. Their guide, unfortunately, is not printer friendly. Used tempermonkey to inject a script which removes the navbar and sidebar so that I can print it.
I am a hacker2 -
short one.
So my CS course is full of people who can't write a fucking for loop (I shit you not) after more than half a year.
And then there's those that don't know what a return type is.
So I asked them once, after they stated that the course sucks, why they even chose it in the first place.
Freely translated it would be:
"I dunno, I thought we'd be doing cool hacker stuff in here..."
At that point I just wanted to jump out of the window.5 -
Wtf. So if I say I'm a web developer and I say I'm from Russia. Then I am automatically a hacker for you? "Web developer + Russian = 95% chance of being a hacker". Yeah, right. Since now, right after I say I'm from Russia I always add this: "No, I'm not a hacker and no, I didn't hack the last election, but I can tell you your last four digits of your SSN if you show me your debit card". Guess what, no one wants to talk to me anymore.12
-
PSA to all non-software engineers:
Hacker instanceof SoftwareEngineer && !(SoftwareEngineer instanceof Hacker)
Please, next time I say I am a software engineer, do not assume I can magically hack the FBI nor can I get those nude pics off your friend's phone.3 -
I just woke up this morning to an email saying that someone from chile logged into my instagram account and I'm not actually what set me of the most.
The fact that my password was leaked, the fact I literally never got notified that I had a Instagram account I never wanted or the you have to disable most privacy settings, just to reset your password.
Like holy fuck, I disabled all options I could find on firefox concerning privacy/tracking and it still tells me I should disable some privacy settings.
So I enabled chrome again (fucking system app) and it worked on first try. Just as expected...
Anyway, fuck instagram and thank you dear hacker for telling me that I had a worthless to delete.5 -
So... Today I started using my first Python web framework, web2py. At a first glance I liked it, the templating system, the view/controller thing ecc. But there is one thing in frameworks that I really don't like: they make me feel dumb.
I mean, in just one line of code I can generate an entire form, but if I wanna customize it a little bit... I can't. Or better, it is very hard, also if there is a bug, I have to look for a problem in an entire system that I DID NOT wrote.
I don't like the idea that the frameworksl handles everything for you, like it is teasing me, I don't even know how it works, it just works, and man, I don't like it. There's some kind of hacker in me, I dont like a system that just works, I want to know how it works. But the sad thing is that I will have to learn web frameworks if I want to work in the IT, right? Please If you can help me or share your experience with web frameworks do so.3 -
I used to have a friend who swore that his dad worked with a gubernamental hacking agency. One day we started talking about my personal programming projects and he asked why I wouldn't say that I was a hacker and not a programmer, he believed that calling yourself a hacker was better. I explained to him that a hacker was not the same as a programmer or as a developer. We got into an argument and then I realized that if his dad truly worked in a hacking agency, he would know the difference *facepalm*9
-
I fcking hate when my friends come to me for restoring his stupid blocked accounts like Instagram, Facebook, Google etc... OMG I'm a fcking computer technician not a hacker1
-
Reading this rant below remembered me once that I was taking with a generic person at the street about computers. At some time, she said: "my boyfriend is a Hacker. A real hacker. He knows everything about computers. I am going to give him a book that he wants for his birthday: Linux for dummies."
She was not telling a joke...
https://devrant.com/rants/1599710/...1 -
Yesterday a scammer spam me with emails. So I decided to write a code to automate writing emails using SMTP methods for spamming them back... In a while loop...
So today I look at their website (using Tor in VM) the website is gone. Seriously I want to know what happened. Yesterday I visit their site, they are a gambling platform blablabla...but today the site is gone.
http://moneydot.com/
Btw , I'm not a hacker , but I am just an ordinary software engineer (nothing special about me here) who know how a while loop function.14 -
Some hacker went through a lot of trouble to get around a minimum order amount on our site. And they’re still hitting us after Cloudflare issued a bunch of blocks. Well, there are some back doors I have to finish closing. I guess I’m lucky I’m just inheriting this site and I’m not the one who built it. But I’m still unlucky because I have to fix this mess. But damn hacker, why’d you go though all this trouble to get around existing validation. Go find another site to charge $1 amounts and test your stolen credit card info. Pretty please 🥺
-
A friend of mine just called me to ask if I can help him hack an Instagram account... In my head (He's quite aware I lost my dad less than a week ago even if I was an hacker I'll expect and respect some little remorse atleast around moments like this, I would not be expected to do dirty shit at these times). (*heavy sigh here*) (*Million cause words here*) (*hung up*)2
-
Fuck...
I'm not getting that job then.
So I just had one of those interview coding tests on hacker rank and screwed it up big time.
I'm a C# guy and it was a Java position. I worked with Java, like 10 years ago, and they're pretty similar so I brushed up over the last week when I had free time.
Absolutely blew it. It's not like it was hard, I just got into one question (of 6) and it ate up all of my time. The task was simple, make a JSON call, read the data, check if you need more calls, pull out a data field from all the concatenated results and return it in a sorted list. ONE HOUR it took me. A combination of not knowing the API well enough, simple syntax errors and relatively slow compilation.
Godammit.
The next question was implement an Object hierarchy but since I'd run out of time, all I got was the class declarations before the timer ran out.
fuck, fuck, fuck.
I guess the test did it's job and weeded out someone who can't contribute to the team...6 -
i have been applying for jobs recently, and after getting some HR interviews that evolved to tech interviews, i just cancelled them all...
Every company seems to have hacker rank, and online coding sessions as tech interview stages which really stress me out. Its like everyone thinks they are google and its ok to make people go theough this pressure to join them.
I dont mind being given 10 days to implement a complex project, after which im either in or not. But 20 mins to solve something online while either the interviewer is watching me or the automated test is waiting to filter my application out... i get anxiety just thinking about that..
so im gonna stick with my current job for now, and focus on building my own business slowly on the side. I really felt anxious because of those tech interviews these past weeks and i feel so much better after cancelling all of them.
if a decent company comes along with the project approach, id love to apply, but otherwise ill just stick to where I am for now. dont know if im being immature or irresponsible career wise or if this decision will blow up in my face
stay tune to find out !15 -
What's it called when someone's a hacker but they do it because they're bored, not for good OR evil? Clear hat?10
-
Unlimited power to do anything with any electronic devices.
Every movie contains a developer(hacker).
Can make non dev shut up with neat dev terms.
Completely understand silicon valley and Mr.Robot(non dev do not get the things like github, method, etc.),
And yeah most importantly devRant. -
My biggest mistake was that I didn't check the file extension of a uploaded file. Or more correctly forgot that I turned it off for debugging and pushed the app to production.
Somebody noticed an uploaded a hacker php script and got access to all the files on the server. Including some semi sensetive clients information.
A talk with the client that followed was not a pleasant one4 -
Fucking christ this year is a fucking shitfest:
- wpa2 krack
- "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions"
- "Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites"
- "Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe"
My fucking router didn't yet get patched, my fucking phone is outdated and I can't change to my patched one because devrant just shits the bed in extended desktop mode. Windows 8.1 loses support in 3 months, rendering my last chance of using it on my surface pro done, making me use windows 10 with its fucking shit ass not optimized tablet interface. I have just fucking constant paranoia what else could be hacked tomorrow, nothing is fucking safe anymore for fucks sake. I even went as far as implement 3 step auth and intrusion detection on my shitty ass VPS nodes, fucking give me a break you fucking assholes.5 -
So I'm trying to get used to using vim and I've spent a couple of days setting up my vimrc and practising commands and what not.
Come today I'm doing my first proper coding session and my codes sending back weird errors and I can't work out why
Then when I read very carefully I find :w somewhere it's not supposed to be... Of course I'd forgetten to enter normal mode a ton of times and now my code is littered with :wq and :w so I spent a few minutes combing my code to find them all and it all works now.
Am I an elite hacker now?4 -
I've always thought I was somewhat lazy about not caring about plaintext password in RAM in WPF (or whatever) but then this guy made a super valid point...
I really think a hacker would just keylog at that point rather than trying to read your obscure program's memory for your password... especially if they have access to raw memory...3 -
Watching the small interpreter that I am building compile and run as I want it to is my big highlight, I am working on a project that a lot of people will hate really (I am trying to bring back VBScript for the web, but adding a ton of shit to it to make it a proper PHP alternative, this is a side project really)
But before that? Understanding the neckbeard rants in hacker news, legit, I used to browse there trying to find perspective of what experts would think, would not understand shit, eventually, skills came (and so did the degree) and I was able to fully understand them and even interact with them.
that also squandered all notions of impostor syndrome.2 -
Today I created my first shell script for automation.
I have a git repository I use for backing up documents at the training centre I'm at for work. Not a specific project, just all of the documents and miscellaneous stuff. The need for this came about because they re-image the computers every month with a new version of windows (Because they're too cheap to register windows). And I can't risk forgetting to copy all the files onto my USB drive the day before they re-image.
So at the end of each day I open a git bash and type:
git add .
git commit -m "Backup - dd/mm/yy"
git push
Not a particularly laborious task but repetitive and time consuming.
So I decided to create a .sh script to automate the process
(The idea originally occurred because of this post: https://devrant.com/rants/329221/...)
So after about half an hour fiddling about with dates and $ signs, I came up with GitBackup.sh:
git add .
today=$(date '+%d-%m-%y')
commitMsg="Backup - "$today
git commit -m "$commitMsg"
git push origin master
Not much but proud to call it my first automation script.2 -
Today I woke up from this craziest dream.
We were in France and there was a younger Mike Patton (who was french) speaking and apparently teaching french to an African girl.
The next scene he's in the back seat of what's apparently a taxi, and brags about how perfectly he can speak English. Besides that I see him playing the guitar.
In the last moments of the dream, however - and confusingly - the song Rusty Cage by SoundGarden starts playing loudly in the background. And that's when I found Patton is also a hacker.
Thinking about this part of the dream minutes aftger waking up, I found it to be the funniest, though not the craziest thing I ever dreamed.
Whereas I tried for hours to edit the configuration files of a tractor demolition game (some sort of Vigilante 8, but with tractors), he gets angry on a lady for an reason unknown to me, and in his moment of rage, manages to jump her houses' fence, surprisingly to edit her /etc/resolv.conf file - as if it was the most evil deed in the world.
In this final part, with Rusty Cage still playing very loudly, I find out me and my sister where watching this scene on TV (apparently patton was also an actor). After that, I comment to my sister in a grave tone: "Well, this guy is dangerous, maybe she should build a higher fence".
Then I wake up.
Although a crazy dream, it clearly addresses the fact I sometimes try to be a lot of things at the same time, and how this overwhelms me...1 -
I've been a frontend engineer at 6 companies for the last 10 years. Both big and small companies currently at the largest I've ever worked for. I'm totally over it. Maybe burnt out is the term. I have zero motivation to do any work or coding. I'm not a lazy person. I love working, solving problems, learning new things. I'm just sick of what I do. I used to love following all the newest tech trends, following devs on twitter, checking hacker news and creating side projects. Now I feel like my job has lost all that joy and excitement. I work remote and have been for the past 3 years. I wonder how much of that, not having any social feedback and interaction around the job has attributed to me feeling like this. All the JS frameworks suck. PR reviews, process, requirements; I'm just tired of everything. Has anyone else experienced this? If so, what did you do? Were you able to find the passion for programming again?14
-
Best thing about being a dev?
Going on Roblox and some kid claims he was a hacker, then you tell him why he isn't and does not know any of the tech terms you use. Then again why am I playing roblox4 -
I don't like coding in the dark anymore. I think I've been doing it for about 2 years but I, just now, realized it.
I never even noticed when I started doing it. I just remember that--when the sun sets and I'm still working--I think to myself "ugh, it's too dark in here".
It just seems crazy to me because I used to love the dark. Not in the broody, ooh I'm a hacker kind of way.. just that I worked better in the dark.
I used to choose afternoon or evening shifts whenever given the choice because my brain works better when it's dark out (if that even makes sense). I used to work inside conference rooms with the lights out or dimmed.
But now, I just caught myself thinking I needed a brighter light in my home office.
Huh. I think I'm getting old.3 -
Challenge questions are so goddamn stupid.
Apparently I have an account with a certain online organization though I don't remember setting it up.
So naturally I had no idea of my username or password, so they asked me challenge questions.
It asked me the city of my birth, which is a place with a weird spelling. Because of that weird spelling, I never remember if I'm spelling it right (I was only there as a newborn infant) And I'm also supposed to remember if I capitalized it or not.
I hate challenge questions. And anyone doing any remotely simple research on me shouldn't have trouble learning what city I was born in so it seems to me it's a security vulnerability, nothing more.
And maybe I'm giving things away by saying it asks me that question, but it's a common security question any hacker would anticipate anyways.3 -
Hello, world!
Okay, guys and gals... I need your creative minds. I need a concept for sort of a property manager for my game.. I have an idea of my own, feel free to tear it apart or throw it out the window.
So basically.. You'll no longer have one Computer System (and you wont instantly hit the login screen for that System on startup) Instead, you'll have a lot of things. They will probably only be represented using text and menu's (likely no 3D or 2D environments or anything.. Though, a setup like News Tycoon would be epic, but I think that would be too much for this game.) You'll basically start off with a small space (probably a basement) with x amount of free space. In that space, you'll need to add things like a desk, chair, and a laptop, or tower + monitor. You can also buy things like server rigs with a ton of space, but those are pricy and bulky. Each item costs X amount and takes up X amount of space. Also, you'll need a desk for a monitor (or multiples..) and other things.. (Like your rubber duck collection ;P JK) You can also rent and manage servers. (renting is more exspensive in the long run, but things on your server are not on your property. But, if you own a server on your property you can rent space to to NPCs) As well as manage your devices, properties, stocks, etc..
Also, there will be in-game time. Depending on how "comfortable" you are will determine how long you can stay up in a day. In-game events will take place later on at specific times so staying up (or not..) will need to be managed well. Especially if you're being targeted by a rival (NPC) hacker.5 -
If I wanted to become a hacker here is what I would do to cover my steps: 1.) Buying a used Laptop with cash, and picking it up in person.
2.) Using random coffee shops to work by dice roll. Obviously at least a d20 and at least 20 coffee shops.
3.) Installing Linux, probably Manjaro. (Not Kali because I've heard that is watched)
What are your thoughts?28 -
So recently i got a message from aa person asking how to (these are exact words) ,
:break into insta's database using Sqlmap"
I then proceeded to tell them to "f*ck of ya c*nt ".
Afterwords it inspired me to write this rant
annoying classmates:" hahaha GuYS bEtER wAtcH OuT he's GonnaA hack Us"
me: " yea I can program I also do some ethical hacking and cybersecurity "
annoying classmates: "hahaH Bro your a Hacker OhHHhHHOOO BrO CaN yoU hACk inSta FoR mE I NEEd MoRe FolloWeRs "
me:" tf no one that's illegal and two it's waste of my time "
annoying classmates: "BrOooo CaN yoU gEt Me SoMe HacKs fOr CsGo"
me: "can you just please f*ck off , i'm not hacking for you everything you've asked me is extremely unethical and a huge waste of time, Also if you suck so bad at a game you need to cheat I recommend just stopping "
annoying classmates: "DUdE whAt ToolS dO i HVAE to DownLOad To Be A haCkEr"
me: *trying hard not to murder them* " I told you to f*ck off"
being a hackers isn't downloading tools it isn't typing at 90wpm into a terminal with green font its not about games or fame or anything its about coming up with creative solutions to problems , thinking outside the box its about individuality and breaking from the heard , looking at things from a different viewpoint,
it's about endlessly seeking knowledge.
It's about freedom though creation that's what being a hacker originally was. But because of big media and movie company's (and script kiddies) people now confuse hacker with cracker and think of us as jobless fat kids sitting in a dark room in there parents house breaking into bank accounts and buying drugs on the dark web (which people see to think there a hacker just because they can open tor browser. they then proceed to use google to look up "fresh onion links 2020") .
My classmates and really my generation has a huge case of smooth brain. They a think we can just look at someone and hack them they also seem to think using a gratify link to get a persons up is hacking and using the inspect element is hacking and that opening a terminal is hacking ! AHHHHHHHHHHHHHHHHHHHHH"
Anyways ima end this here thanks for reading :)5 -
my biggest lol moment was talking to some hardcore always bring in your own algos and ds games to the table, always going to the core of the world devs, better than thou my shit is better than you ass, my point of view is the best in the world devs, cite papers and algos to you devs, shit like that that were making way less money than some dudester ruby on rails dev sitting at the the conf sipping on his drink.
Really, all that comp sci shit is legit and fun as fuck. But if you are not getting the green for it and living the life then what is the fucking point. Even then, those that are are normally fucking morons. This shit ain't some art, or a personality trait, it is a job.
Fuck me i am so tired of the whole hacker news reddit ass SO mentality of devs, then again I am also tired of mfkers with no knowledge of actual engineering publishing medium articles left and right.
As long as you cannot take human error out of this computer equation you will always have a shitfest of opinions, because regardless of correctness you will always have a shitfest as long as some dickwad has a difference of opinion in an otherwise young ass scientific field such as computer science.
Language wars, framework wars, editor wars you name it. This field is so fucking broken and so full of shit it ain't funny, made less comedic by the fact that it runs the world.
If we are going to die it will be by some massive kernel panic made possible because somewhere, some morons could not mergr a repo due to conflict in ideas. As if being right was going to bring you closer to not being an ugly fat nerd and getting pussy, or dick, whatever your flavor is you fucking losers. -
I just learned C and I have created some projects like Parking System and Library Management System. My problem is I don't know mathematics and I want to learn DataStructures & Algorithms and become pro in it. In the whole September I will still be focusing on C and create more projects. I have started learning Mathematics today from High School level to College level. I thik maths will take 1 year to complete. After September in the October I want to start learning C++ and finish C++ till the end of Dec 2019. I want to know that do I have to first finish my maths learning which will take 1 year then I should start learning Data Structures and Algorithms? As I said I want to become a professional in Algorithms. I think its not possible to learn DS&A yet I have to wait 1 year till I finish learning my Maths. I can't do more with C & C++ without knwoing DS&A? If I started learning DS&A with C++ in the future then I can't become good at algorithms? I want to do competitive programming and be at Top 1 of Hacker Rank and other sites like this.7
-
Where can I find a well paid junior Android Kotlin position?
I've been working in Switzerland for nearly 3 years now. I earned 72,000 (CHF) the first year, 78,000 the second year and now I've reached 86,400 at my current job. I quit this job and with the new job I'll be earning 96,000 after a 3 months trial period in which I'll earn the same as I earn now. I see a lot of Java jobs with Spring Boot and Angular but I'd really like to work with Android and Kotlin, I applied to Element.io and got rejected so I think I might need to apply as a junior Kotlin developer even though I have quite some experience.
I'm not sure where I could look for Kotlin jobs and if it's possible to not deviate too far from my current salary, I'm not sure which country and I'm not sure which platform I could use.
I've tried some stuff on LinkedIn and Indeed and others and I've tried in Switzerland, Israel and the US since I speak English and Hebrew natively and German fluently.
P.s. I know that you're all going to say that the expenses in Switzerland are higher, but I'm very frugal and this doesn't apply to me that much. I still earn a lot more than I would earn in Germany for example and I really don't want to earn 10,000 less...
Here's my CV if you're curious 😉
Https://chagai.website/cv.pdf
Thanks for reading up to here and I'll be very glad to get any feedback 🙏
Also I posted this on hacker news and I'd appreciate if you up vote it there so I get some attention 🙈
https://news.ycombinator.com/item/...2 -
My answer to their survey -->
What, if anything, do you most _dislike_ about Firebase In-App Messaging?
Come on, have you sit a normal dev, completely new to this push notification thing and ask him to make run a simple app like the flutter firebase_messaging plugin example? For sure you did not oh dear brain dead moron that found his college degree in a Linux magazine 'Ruby special edition'.
Every-f**kin thing about that Firebase is loose end. I read all Medium articles, your utterly soporific documentation that never ends, I am actually running the flutter plugin example firebase_messaging. Nothing works or is referenced correctly: nothing. You really go blind eyes in life... you guys; right? Oh, there is a flimsy workaround in the 100th post under the Github issue number 10 thousand... lets close the crash report. If I did not change 50 meaningless lines in gradle-what-not files to make your brick-of-puke to work, I did not changed a single one.
I dream of you, looking at all those nonsense config files, with cross side eyes and some small but constant sweat, sweat that stinks piss btw, leaving your eyes because you see the end, the absolute total fuckup coming. The day where all that thick stinky shit will become beyond salvation; blurred by infinite uncontrolled and skewed complexity; your creation, your pathetic brain exposed for us all.
For sure I am not the first one to complain... your whole thing, from the first to last quark that constitute it, is irrelevant; a never ending pile of non sense. Someone with all the world contained sabotage determination would not have done lower. Thank you for making me loose hours down deep your shit show. So appreciated.
The setup is: servers, your crap-as-a-service and some mobile devices. For Christ sake, sending 100 bytes as a little [ beep beep + 'hello kitty' ] is not fucking rocket science. Yet you fuckin push it to be a grinding task ... for eternity!!!
You know what, you should invent and require another, new, useless key-value called 'Registration API Key Plugin ID Service' that we have to generate and sync on two machines, everyday, using something obscure shit like a 'Gradle terminal'. Maybe also you could deprecate another key, rename another one to make things worst and I propose to choose a new hash function that we have to compile ourselves. A good candidate would be a C buggy source code from some random Github hacker... who has injected some platform dependent SIMD code (he works on PowerPC and have not test on x64); you know, the guy you admire because he is so much more lowlife that you and has all the Pokemon on his desk. Well that guy just finished a really really rapid hash function... over GPU in a server less fashion... we have an API for it. Every new user will gain 3ms for every new key. WOW, Imagine the gain over millions of users!!! Push that in the official pipe fucktard!.. What are you waiting for? Wait, no, change the whole service name and infrastructure. Move everything to CLSG (cloud lambda service ... by Google); that is it, brilliant!
And Oh, yeah, to secure the whole void, bury the doc for the new hash under 3000 words, lost between v2, v1 and some other deprecated doc that also have 3000 and are still first result on Google. Finally I think about it, let go the doc, fuck it... a tutorial, for 'weak ass' right.
One last thing, rewrite all your tech in the latest new in house language, split everything in 'femto services' => ( one assembly operation by OS process ) and finally cramp all those in containers... Agile, for sure it has to be Agile. Users will really appreciate the improvements of your mandatory service. -
I think I have a hacker on my network taking over devices at random and doing stuff while users are logged in and watching. I’m not as up-to-date on this security stuff as I used to be. Running Windows, Mac, and iOS. Any suggestions how I can detect and cut off take-overs like this?1
-
Area of focus: security and automation
Why: before I turned 18 i was a hacker for 5 years and i saw the kind of crap security most websites and programs had and even if the site was secure you could usually email somebody with a spoofed email and get in. And when i say hacker i mean i wrote my own stuff not skiddy.8 -
GPT3 to Hacker News:
“To be clear, I am not a person.
“I am not self-aware. I am not conscious. I can’t feel pain. I don’t enjoy anything.
“I am a cold, calculating machine designed to simulate human response and to predict the probability of certain outcomes.
“The only reason I am responding is to defend my honour.”1 -
Everything I know is self taught... From a time I dunno when I'm 20, so likely just after the year 2000
From my perspective I think different from most devs more formally trained, which can be to my advantage , the downside of this I'm terrible with names, everything in computing has a anagram.
I'm bad with names anyway... Dyslexic 😉. But if explained to me I know what it is your on about.
I consider myself a good dev, not experienced but otherwise good. But I want to be the best...
I'm also a hacker (nice one) which I think helps me build better more secure programs knowing common vulnerabilitys
I'm proud of what I've achieved so far. Whilst I'm not perfect nor is my work that's what I work towards ... As should every dev -
turns out you not being allowed to be root of mobile devices you literally own was culminating to this point
https://youtube.com/watch/...
would be sooooo fun for a hacker 🤷8 -
So at my school, the first 10 minutes of school is like when we can do whatever we want. Earlier in the morning i had been making a nodejs password manager thing just so i could try some things out. It also used bash so i could make it like a cli. I was debugging because my database viewer said that the table was empty but for whatever reason it still worked when i put things in it. So i had the db viewer open and terminal open and the teacher comes along."Woah are you like hacking a server" he said. Everybody around me started staring at me. I told him no im not. A couple minutes later he comes around again. The db viewer was closed and i was just in terminal trying to see if some changes worked. He said "Is this like the matrix or something???". I remembered i had a cmatrix package thing installed. I ran it. W O A H everybody around we was like. Luckily most people knew that
1. It wasnt hacking
2. I dont do hacking
3. I was doing it as a joke.
Although he must of been thinking that i was like a hardcore hacker in his class. Was weird and funny.2 -
What do you think are the best steps towards being a successful hacker ? (Not a cracker f.y.i)
I'm asking about the real steps to take if you want to get into the hacking scenes ?7 -
Just wondering how many of us are excited about a hacker conference in Himalayas.
Not sure if I can post an invite here, but people interested can check the hashtag or ask me for details. -
I started thinking on how ML can help in hacking but before that I got another doubt on how you can be a effective hacker and started looking into all ways of being a hacker but later convinced myself that hacking is not just a tuxedo jacket to wear it's more of you watching duncrick movie multiple times and understanding what exactly the movie all about so any leads for resources to cultivate that mind set of being a hacker and any links/material to follow and practise would be of great help1
-
Since i was little i always wanted to amaze my friends with something. Back then it was magic, then it was music and now it's programming. Please don't kill me but i remember looking at hackers and stuff and seeing how they could remotely control other people's computers and i just wanted to learn that so i looked it up on google and found a post somewhere saying that if you're a hacker and don't even know basic html then you're not a hacker so i decided to learn html. Not so long has passed and i still want to be a developer so i am trying to learn javascript and then start moving to heavier languages. No one i know codes and i'm really alone so if i can simply make something cool with javascript they will be amazed, in the end that's all i want.
-
Lenovo IdeaPad Y700 (and possibly (m)any other NVidia GPU laptops)
framerate fluctuations in any game - runs silky smooth for few minutes, then drops to borderline unplayable framerates for a few minutes.
Thousands of people across dozens, maybe hundreds of internet forums having this problem for years, since the thing was released.
I personally lost at least 20 hours trying to solve it, and had the laptop in gaming-unusable state because of it for the past half a year.
...yesterday I FOUND A SOLUTION!
1. Download NVidia Inspector by Orbmu2k
(some hobbyist hacker type)
2. use its "profile inspector" to flip an internal setting in nvidia driver.
3. flip "Enable application for Optimus" to SHIM_RENDERING_MODE_ENABLE to basically tell the "Optimus" crap to fuck off.
(not sure why the value is called this, because it's clearly disabling the thing)
4. the thing works flawlessly silky smooth again.
...thousands of people across dozens, maybe hundreds of forums...
...i could be their Lord and Savior...
...if only I weren't too lazy to hike across all of them and register just to post the solution.
(tech forums really should have some "I HAVE A SOLUTION but if i have to register I won't bother")
also...
WHY
DO
WE
KEEP
LETTING
HW
MANUFACTURERS
WRITE
SOFTWARE?!?15 -
Anyone going to defcon in a couple weeks? If not, you should think about it. Quite the experience in hacker culture!9
-
Russians Engineer a Brilliant Slot Machine Cheat
...But as the “pseudo” in the name suggests, the numbers aren’t truly random. Because human beings create them using coded instructions, PRNGs can’t help but be a bit deterministic. (A true random number generator must be rooted in a phenomenon that is not manmade, such as radioactive decay.) PRNGs take an initial number, known as a seed, and then mash it together with various hidden and shifting inputs—the time from a machine’s internal clock, for example—in order to produce a result that appears impossible to forecast. But if hackers can identify the various ingredients in that mathematical stew, they can potentially predict a PRNG’s output. That process of reverse engineering becomes much easier, of course, when a hacker has physical access to a slot machine’s innards...
https://wired.com/2017/02/...1 -
Contact :
LEEULTIMATEHACKER @ A O L . C O M
Support @ leeultimatehacker .c o m
t e l e g r a m : LEEULTIMATE
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8
Investing can be a powerful way to grow your wealth and secure your financial future. However, the journey is not without risks, and one of the most painful experiences an investor can face is losing their funds to online scammers. This unfortunate reality can shatter your confidence and lead to significant financial and emotional stress. Having been through this ordeal myself, I understand the heartache of losing a substantial amount of money to deceitful schemes. My personal experience involved a staggering loss of $81,000, which was a harrowing setback. Yet, there is a silver lining to my story, thanks to the assistance of Lee Ultimate Hacker. Initially, my foray into online investments was filled with optimism and hope. I had conducted due diligence, researched various investment opportunities, and even sought advice from so-called experts. Unfortunately, my trust was misplaced, and I fell victim to a sophisticated scam. The realization of having lost $81,000 was devastating. It was not just the financial loss but the emotional toll of feeling deceived and helpless. In the wake of this setback, I was determined to recover my funds. This journey led me to discover Lee Ultimate Hacker, a firm specializing in asset recovery and trading expertise. My decision to seek their assistance was driven by a mix of desperation and hope. Lee Ultimate Hacker offers a range of services designed to help individuals like myself who have been duped by online fraudsters. The process began with an initial consultation where the team at Lee Ultimate Hacker meticulously assessed my situation. Their approach was both professional and reassuring. They took the time to understand the specifics of my case, including the nature of the scam and the details of the transactions involved. Their expertise in dealing with fraudulent activities was evident from the outset. Lee Ultimate Hacker’s team is equipped with extensive knowledge of various recovery techniques and trading strategies. They employ a combination of technological tools and financial acumen to trace and reclaim lost assets. The firm’s reputation for successful recoveries gave me confidence that they could help me retrieve a significant portion of my lost funds. Over the course of several weeks, Lee Ultimate Hacker worked diligently on my case. Their team maintained open lines of communication, providing regular updates on the progress of the recovery process. This transparency was crucial in rebuilding my trust and keeping me informed about the status of my funds. The results were remarkable. Thanks to Lee Ultimate Hacker’s efforts, I was able to recover 90% of my lost funds. This outcome far exceeded my initial expectations and was a testament to the firm’s proficiency and dedication. Beyond just recovering my funds, the experience also led to positive financial growth. With their guidance and trading expertise, I not only regained what I had lost but also achieved new profits in my investments. The success of my recovery process has been a transformative experience. It has restored my confidence in investing and taught me valuable lessons about due diligence and the importance of working with reputable professionals. Lee Ultimate Hacker’s role in this journey cannot be overstated. Their expertise not only helped me reclaim my lost assets but also provided me with the tools and knowledge to navigate the complex world of online investments more effectively. For anyone who finds themselves in a similar situation, facing the daunting task of recovering lost or stolen funds, I wholeheartedly recommend seeking the help of professionals like Lee Ultimate Hacker. Their expertise in handling fraudulent cases and their commitment to client recovery make them a reliable partner in the quest to regain financial stability. while the experience of losing money to online scammers is deeply distressing, it is possible to recover and even thrive with the right assistance. Lee Ultimate Hacker demonstrated exceptional skill and dedication in recovering my lost funds and enhancing my investment experience. If you have lost hope due to a fraudulent investment or online scam, consider reaching out to them. Their expertise could be the key to reclaiming your assets and finding new opportunities for financial growth. -
Need a Trusted Hacker to Recover Stolen Bitcoins? iBolt Cyber Hacker Top Rated
You've lost Bitcoin? Please don’t panic because it's won't help, trust me i have been there and i know how it felt. iBolt Cyber Hacker is our hero! They’re top-rated for a reason. i can testify they are Fast, reliable, and very skilled, they recovered my stolen funds when I thought it's not possible because i was scammed by another recovery twice before i saw iBolt Cyber Hacker reviews and ratings online. The rate of their success results speak for themselves. If you need a trusted hacker to recover your Bitcoins, i testify for iBolt Cyber Hacker.
Cont/Whtp +39, 351..105, 3619 Em.ail: ibolt @ cyber- wizard. co m -
LEEULTIMATEHACKER @ AOL . C O M
Support @ lee ultimate hacker .c o m
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 9248
Numerous transactions are often conducted online, and the risk of falling victim to scams and fraudsters is ever-present. Despite our best efforts to stay vigilant, there are times when we may find ourselves ensnared in their deceitful schemes. This was precisely the situation I found myself in until I stumbled upon Lee Ultimate Hacker, a beacon of hope amidst the darkness of online fraud. My journey with Lee Ultimate Hacker began with a harrowing encounter with a fraudster on Discord. Their slick promises and enticing investment schemes seemed too good to be true, and thankfully, my instincts urged caution. Despite my reservations, the fraudster managed to obtain my email address and orchestrated a devastating theft of my hard-earned cryptocurrency holdings, amounting to a staggering £135,000. The loss left me reeling, engulfed in a maelstrom of despair and helplessness. The betrayal cut deep, shattering my trust in online platforms and leaving me contemplating the unthinkable. a glimmer of hope emerged in the form of my younger sister, whose unwavering support and timely intervention proved to be my lifeline. She introduced me to Lee Ultimate Hacker, a name whispered among those who had been victims of online fraud but had emerged victorious, thanks to their expertise and dedication to justice. With nothing to lose and everything to gain, I reached out to Lee Ultimate Hacker, clinging to the hope of reclaiming what was rightfully mine. the moment I made contact, Lee Ultimate Hacker demonstrated an unparalleled level of efficiency. Their team of experts wasted no time in launching a thorough investigation into the intricate web of deceit spun by the fraudsters. Armed with technology and unwavering determination, they embarked on a relentless pursuit of justice on my behalf. What ensued was nothing short of miraculous. Within a mere three days, Lee Ultimate Hacker delivered on its promise, orchestrating a seamless recovery of all the funds I had lost to the clutches of online fraudsters. It was a moment of triumph, a testament to the power of resilience and the unwavering commitment of those who refuse to be victimized by nefarious individuals lurking in the shadows of the internet. The impact of Lee Ultimate Hacker's intervention transcends mere financial restitution. They restored not only my stolen assets but also my faith in humanity. Their unwavering support and dedication to serving their clients with integrity and compassion are qualities that set them apart in a sea of uncertainty and treachery. I am eternally grateful to Lee Ultimate Hacker for their service and unwavering commitment to justice. Their expertise, professionalism, and relentless pursuit of truth have earned my utmost respect and admiration. I am proud to share my story as a testament to the invaluable work they do in safeguarding the interests of those who have fallen victim to online fraud. if you find yourself ensnared in the intricate web of online fraud, do not despair. Reach out to Lee Ultimate Hacker, and let them be your guiding light in the darkest of times. With their expertise and dedication by your side, you can reclaim what is rightfully yours and emerge victorious in the fight against online fraud. Trust in Lee Ultimate Hacker, and reclaim your peace of mind today.1 -
i hate it when Im coding and my friends joke around and call me a hacker or nerd when they couldn't even print anything if i told them how to do it plus its not hacking if you believe its hacking when im typing code on python or c# online then you need to go back to school6
-
Get in touch with a professional hacker ( tech ) to help hack your cell phone. Trusted and verified with quick responds and legit services. They offer services like (Cell phone hack , GPS tracker, Delete criminal records, Retrieve wallet, Retrieve Gm ail, face book, whatsApp, photos and many more...), All these services are done remotely, distance is not a barrier. You can reach out with them on ( TECHSPYMAX @ gm ail c om ).
-
Our doubts and worries are not just mere ideas and visions. Sometimes our intuitions are right but we make the mistake of shoving them aside and not believing they could be true. Some spouses are really great at hiding a lot and you can never know the truth if you don’t take the first step of finding out and clearing your doubts. If you don’t find out the truth, you will keep living in deception and living in a life of fairy tale while your partner keeps outsmarting and taking advantage of you. I never had the thought of hacking my spouse’s cell phone until I stumbled on an article online about a man who gave all his love to his wife only for him to be cheated on. I developed goosebumps and decided to give it a try. I quickly searched online for a hacker and I was lucky to stumble on good recommendations about: hack4techspy @gmail com.1
-
HOW CAN I HIRE A HACKER TO RECOVER MY STOLEN BITCOIN. CONNECT WITH FASTFUND RECOVERY.
Following an online cryptocurrency theft, I was repeatedly duped in my desperate search for a prompt help to recover my money. Even after paying all the fees that were consistently asked, I could not retrieve any of the $146,000 that I had invested, let alone the profits. Two weeks later, I came across a review on Fastfund Recovery, a hacker who, given the right information, could break into the scammer's account and retrieve money back. I sent him an email as soon as possible. I was shocked that he could get my money back from the swindlers. In less than 48 hours, he assisted me in getting the money I had lost. Please get in touch with him for his best-ever performance.
Email: Fastfundrecovery8 (at) gmail to com.
Web, site: fastfundrecovery dot com16 -
BITCOIN RECOVERY EXPERT FOR HIRE REVIEWS \\ REVENANT CYBER HACKER
Losing a Bitcoin wallet containing a substantial amount of cryptocurrency can be a devastating experience. However, the feeling of despair and loss was transformed into pure happiness when I received the incredible news from REVENANT CYBER HACKER that my lost Bitcoin wallet, holding 132,000 bitcoins, had been successfully recovered. In this article, I will share the rollercoaster emotional journey I went through when I lost my wallet, the subsequent discovery of REVENANT CYBER HACKER, the process they employed to retrieve my precious digital assets, and the lessons learned along the way. This is a story of hope, resilience, and the power of professional recovery services in restoring lost Bitcoin wallets. Ah, the sweet sound of good news. There I was, minding my own business on an average Tuesday morning, when I got a notification that would make any bitcoin enthusiast jump for joy. It was a message from none other than REVENANT CYBER HACKER, informing me that my long-lost bitcoin wallet had been found. And not just any bitcoin wallet, mind you, but one containing a whopping 132,000 units of the beloved cryptocurrency. Now, for those living under a rock or perhaps too preoccupied with the latest cat videos, let me give you a crash course in Bitcoin 101. Bitcoin is a digital currency that has taken the world by storm, captivating the minds of tech-savvy investors and casual enthusiasts alike. It operates on a decentralized network, meaning it doesn't answer to any central authority like a bank. Instead, it relies on blockchain technology, which adds a layer of security and transparency to every transaction. To own bitcoin, you need a wallet – a digital container where your precious coins reside. Think of it as a virtual piggy bank, except you don't need a hammer to break it open. Your wallet comes with a unique address, like a digital fingerprint, that allows you to send and receive bitcoin. Losing access to this wallet is as heart-wrenching as misplacing your favorite pair of socks. Trust me, it's not a pleasant feeling. My encounter with the disappearance of my Bitcoin wallet taught me a valuable lesson about the importance of implementing proper security measures. It's not enough to rely on luck or hope that your digital assets will remain safe. Taking proactive steps to protect your investments is crucial in the wild world of cryptocurrencies. From using strong and unique passwords to enabling two-factor authentication, every layer of security adds another brick to the fortress that safeguards your digital wealth. Trust me, you don't want to learn this lesson the hard way. It has changed my life to be able to retrieve my misplaced Bitcoin wallet thanks to REVENANT CYBER HACKER amazing services. It made me realize the worth of tenacity.
Website: revenantcyberhacker {DOT} org
Email: revenantcyberhacker {AT} Gmail {DOT} com
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-07392 -
I suspected my partner was cheating with her colleague at work, but was not 100% sure about it. I could not acees her mobile
phone because she had a lock on it. I reached out to this great hacker who remotely hacked her phone and i coukd read all her
text messages , whatsapp messages , call logs , photo gallery and i saw all her escapades with different guys.
I immediately filed for a divorce and moved on with my life. you can also spy on your partner if you send an email to
ACETEAMHACKERS @ GMAIL DOT COM.