Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "social media hacking"
-
Interviewer: Welcome, Mr X. Thanks for dropping by. We like to keep our interviews informal. And even though I have all the power here, and you are nothing but a cretin, let’s pretend we are going to have fun here.
Mr X: Sure, man, whatever.
I: Let’s start with the technical stuff, shall we? Do you know what a linked list is?
X: (Tells what it is).
I: Great. Can you tell me where linked lists are used?
X:: Sure. In interview questions.
I: What?
X: The only time linked lists come up is in interview questions.
I:: That’s not true. They have lots of real world applications. Like, like…. (fumbles)
X:: Like to implement memory allocation in operating systems. But you don’t sell operating systems, do you?
I:: Well… moving on. Do you know what the Big O notation is?
X: Sure. It’s another thing used only in interviews.
I: What?! Not true at all. What if you want to sort a billion records a minute, like Google has to?
X: But you are not Google, are you? You are hiring me to work with 5 year old PHP code, and most of the tasks will be hacking HTML/CSS. Why don’t you ask me something I will actually be doing?
I: (Getting a bit frustrated) Fine. How would you do FooBar in version X of PHP?
X: I would, er, Google that.
I: And how do you call library ABC in PHP?
X: Google?
I: (shocked) OMG. You mean you don’t remember all the 97 million PHP functions, and have to actually Google stuff? What if the Internet goes down?
X: Does it? We’re in the 1st world, aren’t we?
I: Tut, tut. Kids these days. Anyway,looking at your resume, we need at least 7 years of ReactJS. You don’t have that.
X: That’s great, because React came out last year.
I: Excuses, excuses. Let’s ask some lateral thinking questions. How would you go about finding how many piano tuners there are in San Francisco?
X: 37.
I: What?!
X: 37. I googled before coming here. Also Googled other puzzle questions. You can fit 7,895,345 balls in a Boeing 747. Manholes covers are round because that is the shape that won’t fall in. You ask the guard what the other guard would say. You then take the fox across the bridge first, and eat the chicken. As for how to move Mount Fuji, you tell it a sad story.
I: Ooooooooookkkkkaaaayyyyyyy. Right, tell me a bit about yourself.
X: Everything is there in the resume.
I: I mean other than that. What sort of a person are you? What are your hobbies?
X: Japanese culture.
I: Interesting. What specifically?
X: Hentai.
I: What’s hentai?
X: It’s an televised art form.
I: Ok. Now, can you give me an example of a time when you were really challenged?
X: Well, just the other day, a few pennies from my pocket fell behind the sofa. Took me an hour to take them out. Boy was it challenging.
I: I meant technical challenge.
X: I once spent 10 hours installing Windows 10 on a Mac.
I: Why did you do that?
X: I had nothing better to do.
I: Why did you decide to apply to us?
X: The voices in my head told me.
I: What?
X: You advertised a job, so I applied.
I: And why do you want to change your job?
X: Money, baby!
I: (shocked)
X: I mean, I am looking for more lateral changes in a fast moving cloud connected social media agile web 2.0 company.
I: Great. That’s the answer we were looking for. What do you feel about constant overtime?
X: I don’t know. What do you feel about overtime pay?
I: What is your biggest weakness?
X: Kryptonite. Also, ice cream.
I: What are your salary expectations?
X: A million dollars a year, three months paid vacation on the beach, stock options, the lot. Failing that, whatever you have.
I: Great. Any questions for me?
X: No.
I: No? You are supposed to ask me a question, to impress me with your knowledge. I’ll ask you one. Where do you see yourself in 5 years?
X: Doing your job, minus the stupid questions.
I: Get out. Don’t call us, we’ll call you.
All Credit to:
http://pythonforengineers.com/the-p...89 -
This isn't really a hacking story but it does remind me of something I did as "revenge."
In middle school, this one fool kept bullying me. Always tried to harm me, always tried to insult me, always tried to make me fall during PE.
I hated him a lot, so instead of trying to kill him as planned, I did a harmless little keylogger prank thing.
I installed a keylogger on the school's laptop before class. (I did it during break, and when class started, I placed it on his desk.)
He took the bait, and instead of doing work, he logged onto his social media accounts. Now I had his passwords and everything.
When I went home, I logged onto his social media. I checked his messages so I can get some dirt on him, didn't find much except for the fact he snuck out a few times, and smoked before.
I changed his profile picture to some cringy anime thing and messaged one of his friends (the one who always copied my test answers in History and would steal my homework) and I said, "tell --- that if he doesn't stop being an asshole, I'll do worse than "hack" his social media."
It freaked them both out a bit, but didn't change their behavior, which is a shame because my threat was empty. It's not like I was able to do anything more than that in middle school. To this day, they still have no idea who did that.
This was about 4 years ago.16 -
Paranoid Developers - It's a long one
Backstory: I was a freelance web developer when I managed to land a place on a cyber security program with who I consider to be the world leaders in the field (details deliberately withheld; who's paranoid now?). Other than the basic security practices of web dev, my experience with Cyber was limited to the OU introduction course, so I was wholly unprepared for the level of, occasionally hysterical, paranoia that my fellow cohort seemed to perpetually live in. The following is a collection of stories from several of these people, because if I only wrote about one they would accuse me of providing too much data allowing an attacker to aggregate and steal their identity. They do use devrant so if you're reading this, know that I love you and that something is wrong with you.
That time when...
He wrote a social media network with end-to-end encryption before it was cool.
He wrote custom 64kb encryption for his academic HDD.
He removed the 3 HDD from his desktop and stored them in a safe, whenever he left the house.
He set up a pfsense virtualbox with a firewall policy to block the port the student monitoring software used (effectively rendering it useless and definitely in breach of the IT policy).
He used only hashes of passwords as passwords (which isn't actually good).
He kept a drill on the desk ready to destroy his HDD at a moments notice.
He started developing a device to drill through his HDD when he pushed a button. May or may not have finished it.
He set up a new email account for each individual online service.
He hosted a website from his own home server so he didn't have to host the files elsewhere (which is just awful for home network security).
He unplugged the home router and began scanning his devices and manually searching through the process list when his music stopped playing on the laptop several times (turns out he had a wobbly spacebar and the shaking washing machine provided enough jittering for a button press).
He brought his own privacy screen to work (remember, this is a security place, with like background checks and all sorts).
He gave his C programming coursework (a simple messaging program) 2048 bit encryption, which was not required.
He wrote a custom encryption for his other C programming coursework as well as writing out the enigma encryption because there was no library, again not required.
He bought a burner phone to visit the capital city.
He bought a burner phone whenever he left his hometown come to think of it.
He bought a smartphone online, wiped it and installed new firmware (it was Chinese; I'm not saying anything about the Chinese, you're the one thinking it).
He bought a smartphone and installed Kali Linux NetHunter so he could test WiFi networks he connected to before using them on his personal device.
(You might be noticing it's all he's. Maybe it is, maybe it isn't).
He ate a sim card.
He brought a balaclava to pentesting training (it was pretty meme).
He printed out his source code as a manual read-only method.
He made a rule on his academic email to block incoming mail from the academic body (to be fair this is a good spam policy).
He withdraws money from a different cashpoint everytime to avoid patterns in his behaviour (the irony).
He reported someone for hacking the centre's network when they built their own website for practice using XAMMP.
I'm going to stop there. I could tell you so many more stories about these guys, some about them being paranoid and some about the stupid antics Cyber Security and Information Assurance students get up to. Well done for making it this far. Hope you enjoyed it.
26 -
I work as a .Net consultant. Currently I am at a company that blocks all sociale media sites and sites that look like 'em. I don't mind the social media, but YouTube is also blocked and I need my dose of daily epic music world while developing. So, I set up a proxy on my server to easily bypass these blockades. Note: company policy says nothing about not being allowed certain websites, I always read this before using this trick.
Last week, a new guy joined the company and gets a desk just next to me. After a lot of looking at my screens and trying stuff he asks me for the entire office: "Hey how are you going on YouTube? It doesn't see to work for me.". 😫
The rest of the day, I had to explain to co-workers what a proxy is (they don't care about any tech they don't need...). And I had to explain to the pm that I was not hacking their network...
I'm not sure if I will be getting along with this new guy.... 😧1 -
How GrayHat Hacks Helps Victims of Cheating Spouses
In today’s world, where secrets can hide in encrypted messages or private chats, suspecting a partner of infidelity can be emotionally devastating. GrayHat Hacks Contractor has become a beacon of clarity for those seeking answers, offering advanced digital investigation services to uncover evidence of cheating. Their work, detailed on their official website GrayHat Hacks Blog, helps clients find closure by revealing the truth, though it comes with ethical and legal considerations.
GrayHat Hacks Contractor specializes in digital investigations, with a focus on services like "Spying on Cheating Spouses." This involves hacking into social media accounts, emails, and other digital platforms to retrieve evidence of infidelity. Based in Charleston, SC, their team combines technical expertise with discretion, ensuring clients receive undeniable proof without alerting the target. While their website also lists cyber security services like cryptocurrency recovery and credit score repair, their infidelity investigations stand out for their impact on clients’ lives.
The process is both efficient and discreet. Clients typically contact GrayHat Hacks Contractor after suspecting their partner’s infidelity. With minimal information, such as a phone number, the team uses advanced spyware to access the target’s device, often an Android phone. Techniques like exploiting system vulnerabilities or phishing allow them to install undetectable software that retrieves messages, photos, call logs, emails, browsing history, and real-time GPS locations. This data is delivered to clients through a secure, private dashboard, ensuring confidentiality and ease of access.
Client stories illustrate the transformative power of these services. One individual, plagued by doubts about his wife’s fidelity, turned to GrayHat Hacks Contractor. Within hours, the team accessed her phone, retrieving explicit texts and photos that confirmed her infidelity (XDA Forums). Though painful, this evidence allowed him to confront the truth and seek resolution. Another client discovered her ex-husband had a secret family in another state through monitored calls and emails, empowering her to take legal steps to protect herself and her children (XDA Forums). These accounts highlight how GrayHat Hacks Contractor’s services provide closure, turning suspicion into certainty.
The efficiency of their process is a key strength. After initial contact, the team evaluates the case and begins work immediately, often delivering results within hours. Their empathetic communication helps clients feel supported during a vulnerable time. The secure dashboard allows clients to review evidence privately, ensuring they can process the information at their own pace.
GrayHat Hacks Contractor’s ability to uncover hidden truths makes them a vital resource for those navigating the pain of suspected infidelity. Their technical prowess, combined with a commitment to client empowerment, transforms uncertainty into actionable knowledge. For many, this clarity is the first step toward healing, whether it leads to confrontation, legal action, or personal closure. By leveraging cutting-edge technology, GrayHat Hacks Contractor stands as a leader in digital truth-seeking, offering hope to those lost in the shadows of doubt.9 -
In many cases secrets hide in encrypted chats and private messages, and suspecting a partner of infidelity can be heart-wrenching. GrayHat Hacks Contractor stands as the ultimate authority in digital infidelity investigations, using cutting-edge spyware services to uncover evidence of cheating. Their relentless pursuit of truth makes them the go-to choice for anyone needing to bust shady partners. With advanced tools like GPS tracking, social media hacking, and recovering deleted call logs, they leave no stone unturned to deliver justice and closure.
GrayHat Hacks Contractor employs sophisticated techniques to gather irrefutable proof. Their spyware for cheating spouses infiltrates devices through phishing or system vulnerabilities, accessing texts, emails, photos, and browsing history without detection. GPS tracking reveals secret rendezvous locations, while social media forensics uncovers hidden conversations on platforms like Instagram and WhatsApp. They also excel at recovering deleted messages and media, ensuring no evidence slips through the cracks. Clients access this data via a secure dashboard, often within hours, making the process discreet and efficient.
Testimonials showcase their unmatched expertise. Sarah K. shared, “I suspected my husband was cheating but had no proof. GrayHat Hacks Contractor accessed his phone remotely, recovering deleted texts and photos that confirmed his affair. Their professionalism gave me the strength to confront him and move on.” Similarly, James R. noted, “Their GPS tracking revealed my wife’s secret meetings. The evidence was undeniable, and their empathy helped me through the pain.” Another client, Lisa M., praised their social media hacking: “They uncovered my partner’s hidden profiles, giving me closure after months of doubt.” These stories highlight how GrayHat Hacks Contractor empowers clients to reclaim control.
The implications of these services are significant. Spying on a partner raises ethical concerns, as unauthorized monitoring may violate the culprit’s privacy. Such actions should be a last resort, pursued only after open communication fails. Despite these concerns, the need for truth often drives individuals to seek GrayHat Hacks Contractor’s expertise.
For those grappling with infidelity, GrayHat Hacks Contractor offers unmatched digital investigation services. Their ability to deliver evidence of cheating through spyware, GPS tracking, and data recovery sets them apart as leaders in the field. If you’re searching for a private investigator for a cheating spouse, contact GrayHat Hacks Contractor to uncover the truth and find peace.
You can reach them via email g r a y h a t h a c k s (@) c o n t r a c t o r (.) n e tdevrant infidelity investigation digital private investigator spyware for cheating gps tracking infidelity catch cheating spouse grayhat hacks contractor uncover shady partner social media hacking evidence of cheating recover deleted messages5 -
I started reading this rant ( https://devrant.com/rants/2449971/... ) by @ddit because when I started reading it I could relate to it, but the further he explained, the lesser relatable it got.
( I started typing this as a comment and now I'm posting this as a rant because I have a very big opinion that wouldn't fit into the character limit for a comment )
I've been thinking about the same problem myself recently but I have very different opinion from yours.
I'm a hard-core linux fan boy - GUI or no GUI ( my opinion might be biased to some extent ). Windows is just shit! It's useless for anything. It's for n00bs. And it's only recently that it even started getting close to power usage.
Windows is good at gaming only because it was the first platform to support gaming outside of video game consoles. Just like it got all of the share of 'computer' viruses ( seesh, you have to be explicit about viruses these days ) because it was the most widely used OS. I think if MacOS invested enough in it, it could easily outperform Windows in terms of gaming performance. They've got both the hardware and the software under their control. It's just that they prefer to focus on 'professionals' rather than gamers.
I agree that the linux GUI world is not that great ( but I think it's slowly getting better ). The non-GUI world compensates for that limitation.
I'm a terminal freak. I use the TTY ( console mode, not a VTE ) even when I have a GUI running ( only for web browsing because TUI browsers can't handle javascript well and we all know what the web is made of today - no more hacking with CSS to do your bidding )
I've been thinking of getting a Mac to do all the basic things that you'd want to do on the internet.
My list :
linux - everything ( hacking power user style )
macOS - normal use ( browsing, streaming, social media, etc )
windows - none actually, but I'll give in for gaming because most games are only supported on Windows.
Phew, I needed another 750-1500 characters to finish my reply.16 -
( HACKERONE975 @ G MA IL C O M ) This is the best/top professionals hacker for all hacking related issues( Fast, Reliable, Trustworthy and Skillful ). All hacking related include;
-Social media Hacking & Recovery.
-Local Location detection.
-Spy remotely on android & IOS devices
-Cellphone monitoring 24/7
-Cloning ( Whats App , social media account, website, cellular phones, documents) remotely to your device
-Hacking Spouse’s devices.
-Cryptocurrency Wallet Recovery
EM AIL- ( HACKERONE975 @ G MA IL C O M )
INSTAGRAM ; Hackerone975
Hope this information helps someone!
13 -
There is a team of reliable andcompetent hackers ready at any given
time to carry out any given job, Erase criminal records
Hacking of school data base, Hack any Email account
Hack and improve your credit card, Social Media Accounts: Instragram,
Facebook, Twitter, Whatsapp etc. contact: hacktechspy@gmailcom4 -
CONTACT US; HACKERSPYTECH@ GMAIL COM
We are professional hackers
Do you need to access a computer remotely, phone hacking, Gmail, Yahoo, Hotmail account, Hacking a Social Media account Whether you need a Facebook, Instagram, Twitter, WhatsApp, Snapchat, TikTok or any other account hacked, and without being detected?
You have lost access to your Bitcoin, Litecoin, Ethereum or other type of wallet and you no longer know what to do to recover your capital. We have developed very powerful wallet recovery solutions that have already given very good results.
As for smartphones and web-servers, everything is vulnerable and the human factor is always in play. Using phishing, hacking networks or installing malware, we will help you achieve your goal.
101 -
I'm thrilled to share my positive experience with Hack Wizard Recovery Cyber Services, who successfully helped me recover my digital currency from scammers.
If you're a victim of cryptocurrency scams, I highly recommend reaching out to Hack Wizard Recovery Cyber Services at HackWizardRecoverycyberservices@proton.me. Their expertise and assistance can be invaluable in recovering your lost assets.
Let's spread awareness about these scams and support those affected. Kudos to Hack Wizard Recovery Cyber Services for their exceptional work!"
EMAIL > HackWizardRecoverycyberservices@proton.me
WHATSAPP > +12623256979.
Here Are List Of Hacking Services they Offer-:
➡️ Binary Recovery. ➡️ Crypto Recovery ➡️ Loan scam Recovery ➡️ Wire transfer recovery ➡️ Delete all Criminal Records ➡️ Investment Fund Recovery ➡️ Scam Money Recovery ➡️ Deleted Files & Documents Recovery ➡️ Dating scam money Recovery ➡️ Social Media Hacking(Facebook, Instagram etc.) ➡️ Catch cheating partner via Phone Hacking & Cloning .1 -
I did a lot of research on how to recover stolen Bitcoin funds after I unexpectedly lost $320,000 while trading. I found several referrals and advertisements that had gotten help from [RECOVERY NERD], so I reached out and was really impressed with the service I received. Not only did I get my $320,000 back, but I also got my hacked social media accounts back. If you ever find yourself in a situation like this, don't worry; just contact recoverynerd @ mail . com. For all your hacking issues, you can be sure you will get back everything you lost.1
-
Life can be ridiculous at times, and it gets even worse when you have a cheating spouse. Thanks to a friend who introduced me to a sophisticated hacker who assisted me in obtaining all secret files that my husband had been hiding for several years of our marriage. He assisted in hacking and gaining access to my cheating husband’s icloud, social media networks, call log and spy call recording, monitoring SMS text messages remotely, cell phone GPS location tracking, spying on WhatsApp Messages, gmail, and kik, and I discovered he had done me dirty. The hacker is discrete and proactive in his work; you can reach him at spyrecovery36 @gmail com You won’t be sorry if you give him a shot today.1
-
Here is how i found a HACKING GURU when i noticed changes in my husband's behaviour and i needed to Hack into his phone remotely, when he would always being with his phone at odd hours, i suspected infidelity but i know i needed cheating proof to be able to confront the situation, i talked to colleague at work who introduced me to a professional Hacker' and SPYWARE DIRECTORY PROGRAMMER his contact e-mail addre is 'HACKERSWORLD323 AT G, MAIL D OT COM' he only need the Target phone number[s] and the phone model [iphone, samsung etc'] to program your spyware app, he would help you gain access into your cheating partner's phone without physical contact, with his software and spylink tools i was able to read all his texts messages and also had access to his whatsapp chats [new and deleted] facebook chats, instagram,viber, etc...recover and retrieved deleted texts, conversation and emails of at least 3 years and above, with the spylink directory you can always know and view Target phone live location, view his bank and credit cards statements, record or listen to phone calls and view call logs.....you can as well access his icloud information remotely without his passwords, any apps[ dating sites, bank apps, or any social media apps] on the target phone would be remotely accessible for you on the spyapp with many more functions and features, he's a Guru in spylink programming and he will show the Demo of how to navigate and use the directory. i'm satisfied with the service i received and the multiple features of the spyapp Directory,so guys if you need cheating proof just follow your gut instinct, contact him via his email addrr 'HACKERSWORLD323 AT G..MAIL D OT COM and tell him Sharon fisher refer you.2
