Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
Get a devDuck
Rubber duck debugging has never been so cute! Get your favorite coding language devDuckBuy Now
Search - "attack"
- DoS Attack16
Calling a DDoS attack a hack is like blowing a door off its hinges with semtex and then telling people you can pick locks.16
Browsing to a porn site while still being in the corporate VPN.
Got a proxy page which said this type of content isn't allowed at work. Nearly had a heart attack ;D15
Me: good day, how can I help you?
Client: *explains issue*
Me: alright, let's take a loo.... *AACHOOOO*
M: my apologies sir, that came out of nowhe... *ACHOOO*
M: do you have a second sir? My apologies!
C: sure man take your time 😁
*30 seconds later, nose seems to have calmed down*
M: back I am, apologies for the inconvenience!
C: no problem, it happens!
M: where was I?.... Right, I was going t...
AH... AH... AAAAH..... ACHOOOOO*
M: I'm very sorry, I'm going to put you through to a collegue!
*puts through to collegue*
*goes to bathroom*
*returns to desk*
Me: good afternoon sir, how may I hel... *A-MOTHERFUCKING-CHOOOOO* (thinking: oh for fucking fucks sake)
C: bless you!
M: thank you! Apologies, I seem to be having a snee.. *CHOOOOOOOO*
*sniffs a few times*
- zing attack.
*collegue yells at me to transfer my call*
Me: thanks man, idk what's wrong with me hahah... *ACHOOOOOOOOOOOOOOOOOOOO*
OH FUCKING HELL 😠28
Does anyone else have a mini heart attack when you touch your pockets and can't feel your phone for a second?12
Last month: Opening devrant
Facebook, Mark Zuckerberg, FUCK FACEBOOK, ZUCKED ME, KILL MARKBOOK, ATTACK FACEBERG
Last week: Opening devrant
GDRP, GDRP, GGEEDDEERRPPPEEEEE, FUCK GDRP, YEEEY GDRP, WHY GDRP, UPDATED OUR GDRP, FUCKED MY GDRP, PEED IN MY GDRP
this week: Opening devrant
Microsoft, Github, NO Microshit, Burn Github, FUCK GITHUB, POO ON MY MICROHUB, VOMITED ON MY GITSOFT
(Google, you better be ready, it's your turn)31
Fucking Windows 10 installer
WHO THE FUCK THOUGHT THAT AUTOMATICALLY STARTING CORTANA AT THE START OF THE WINDOWS INSTALLER IS A GOOD IDEA
Cortana just spoke at the maximum volume on a very loud sound system I have at 2 am. I nearly had a fucking heart attack29
Want to understand a DDOS attack?
Imagine trying to work while being interrupted every few seconds.. forever.
Just like an open office!5
Ooooooh I just skip a heart attack and shit myself at the same time, thank god for error "can not delete database, database is in use"8
While working support a client calls saying he's being DDoS-ed. The whole team went into high alert. Everyone is checking network traffic but there is no evidence of an attack. The client insists, calls all the way up to our CEO complaining of our incompetence and that he's losing thousands of dollars every second.
I take it on myself to look a little deeper. After some Sherlocking, I find that the client's developers managed to build an infinite loop that makes HTTP requests to localhost. The client was DDoS-ing them selves.
I got no thanks for my competence no apology regarding my incompetence. 😑6
TL;DR: Got a really horrible supervisor temporarily fired, maybe permanently fired, got a laptop, and realized that senior devs are amazing when they stand up for the little guys
Omg... I love my coworkers!!! So like, I'm an incredibly shy dev, like, I only managed to get my internship purely because of my familiarity with c#, Android/UWP app development (although never apple, which you can read about in my last rant lol), and the API Management framework that they were using, so, long stories short, I'm insanely shy and I get anxious quite quickly in social situations, that'll be important in a bit. Anyways, so, in my previous rant (my first one actually, it was "that" bad...) I had a run-in with a rather unfair supervisor situation where he expected me to work on an iOS app without a Mac machine.
So, this is currently a little bit before my shift end, where I'm anxiously trying to get a MacOS VM up and running to be able to copy paste some psudo-code so as not to get in trouble, which is when the senior dev of the team walks by and sees me tearing hair out of my head and being really sad. So what does this god amongst men do?
He comes over and asks me what I'm doing.
Now, I didn't actually notice him, so when he asked me, I was insanely jumpy and scared that my supervisor would appear and be mad at me for not having things done, so I kind of half scream half yelp when he says something, so now he knows somethings up and he acts kind of like I'm an injured deer and slowly asks what's going on.
So, of course I tell him everything that had happened and how the supervisor got really mad about me not being able to develop iOS apps due to not having a Mac, and his expectation of me to get it magically working and getting to work on my module, and the selenium portal automatization, and after a couple seconds of me rapid fire nervous squirrel-like explanation, he holds up a hand and says "He what?!!!!? God dammit, how the hell are you supposed to do that? Jesus, you were supposed to get a company laptop when you got here, where's that??? And if you don't have that then how the hell were you working on the cross platform portion? You need a Mac machine for that, so let me get this straight... You've been frantically trying to find a workaround so that AS (let's call him AS for asshat supervisor (missing an s)) doesn't get mad at you... Who the hell... And this fuckers in charge of the interns??"
He was incredibly pissed off at this point, like, REALLY pissed off... But-
This man had just spoken miracles to me.
So I do what any self respecting intern would do, I start cry laughing and hug said BSD for a quick second (badass senior developer), and I say yep, pretty much ;-;.
And queue AS walking into my workspace and saying
AS- "are you done with the iOS a..."
BSD- "You've got to be kidding me, shut up for a second and sit down"
AS- "?" *Sits*
Me- *hides in corner and cinches up hoodie*
BSD- "Excuse me, but what did you ask benlion to do?"
AS- "Um, I simply told him to start working on the Xamarin app"
BSD- "Yes, but according to benlion, you angrily told him to start working on the Mac portion... Let me ask you something first, why would you do that? It's rude and inappropriate to be hostile to anyone at the workplace, in fact, if he wants to pursue to matter, you can get demoted, actually, if he wants to pursue it, you're fired, and there's no way I'm letting you get a management job again"
AS -"Wow, did benlion really say that? He's obviously lying due to his dislike for me, BSD, it's rather unfair to take his word over his superv..."
BSD-"Oh you did NOT just go there. That's it, stay here. And benlion, come with me." *Points at me*
Me- *Terrified out of my mind, almost to the point of a nervous breakdown because of the argument that I had started* "O-okay o_O"
Long stories short, we come back with his supervisor and he is now relieved of his duties temporarily while this whole thing gets settled...
Oh, and I get my Apple Laptop tomorrow ^-^ so I'm really happy, albeit kind of sad that its my fault that AS doesn't have a job right now ;-;, but he did yell at me and expect incredibly impossible things of me, so, not as bad as I might feel.26
Running from my job to my bus stop while having my phone in my hands trying to fend off a cyber attack while my hands are nearly freezing and its raining like hell.
Sometimes my job is just fucking awesome.16
The following dialogue is inspired by a career of similar conversations.
Manager: What's the status?
Dev: It works, but I just found a security hole. That contractor did not sanitize all the different kinds of user input and someone approved the PR with "LGTM." A customer can run malicious code and get us in real trouble. I'm patching this now.
Manager: How long with that take?
Dev: If done right, 4-5 days. If done fast, I can squeeze 3.
Manager: Let's not boil the ocean. We need to ship by tomorrow so we can't spend too much time on something that we can fix later.
Dev: Surprising deadline aside, I made a Jira workflow state called "Later" for when you close the ticket after this conversation.
Manager: We need to talk about how your negativity impacts the team.
Dev: Sorry. I just don't want to knowingly release a critical vuln.
Manager: We can introduce a procedural change and have ops vet the documents. We already have a screen where they can approve what uploads get to the customer. If we let a bad egg through, then we'll right-size according to customer feedback.
Dev: Lawsuits are feedback?
Manager: I mean
Dev: *Googles "brain parasite symptoms"*
Manager: Hey. The kind of thing you are worried about probably won't happen soon, and we'll be able to handle things in the short term.
Dev: Because it's better that our staff have unprotected sex with the Internet on our corporate network than use a few more days to move everyone along worry-free?
Manager: It's a calculated risk. We're Agile after all, right?
Dev: When it's an excuse.14
Wild customer appeared!
dev used Ubuntu
It's not very effective...
Foe customer used Stupid Feature-Request
It's super effective!
dev is confused!
dev hurt itself in its confusion!
dev used Reasoning
dev's attack missed!
Foe customer used Ridiculous Feature-Request
It's super effective!
dev used Rage Quit
dev fled using its Rage Quit
If programmers were doctors.
Doctor A: the patient is having heart attack
Doctor B: we have to reproduce the heart attack to be able to heal him
Doctor C: why dont we just remove the hesrt and install a new heart
Doctor D: human heart are bad, maybe we should use animal heart22
We just had a terror attack here in Stockholm. I'm stuck in my office. Stay safe everyone and take the time with your loved ones.31
That’s fucking insane.... Probably a double post; sorry in advance... I just have to express my anger and amazement for a second.
Angry that they didn’t use such a high powered DDoS attack against say... Facebook or some shit like that, amazed at the sheer size of that attack...
I kinda wanna touch it.23
I'm watching TV and I just heard something along the lines of "The files have been wiped from the server and there was no sign of a DDOS attack. Whoever erased those files had a backdoor.".13
Fellow ranter who ever posted about fakeupdate.net thank you so much for the entertainment, a colleague forgot to lock their computer and came back to a heart attack and we had a nice laugh8
A client’s server crashed so they called us. When we checked the logs we found a user was logged in 200,000+ times. We told them the user and a few minutes later we get a picture of a cupcake that was on the enter key. They got cupcake DOS attacked. My team isn’t in charge of the login functionality but I can say the team that is got a fairly aggressive internal support ticket.6
How to secure yourself from flash 0-day attacks:
1. Uninstall flash
2. Don't reinstall flash
3. Seriously, you don't need flash7
A human cell has 75MB of DNA information, a sperm cell has half A human cell has 75MB of DNA of it 37.5MB, a milliliter of semen has 100 million sperm cels, on average, a ejaculation lasts 5 seconds and has 2.24 milliliters of Semen.
That means a man is able to produce: 37.5MB x 100,000, 000 x 2.25/5 = 1.687.500,000.000.000 bytes/sec 1,6875 Terabytes/sec;
That means a ovule is able to recive a dDOS attack of 1,6 terabytes per second and only lets one package pass, making it THE BEST FIREWALL IN THE WORLD6
Step-dad : "Chrome is good"
Me : "Yeah but Firefox Quantum :/"
Step-dad : "That's a virus"
That moment at work when we've had no calls for an hour and suddenly the phone goes off
*suddenly you have a few Linux support engineers with a mini heart attack*
- Spent 4 hours coding up the most complex but cleanest test I've ever written. Well let's commit this as a save point
- accidentally committed to master
- Stackoverflow how to fix this shit
- reset head
- destroyed all my work 😱
- made a new branch
- ctrl-z in my editor to recover all my edits 😳
- commit to new branch
- dodge bullet, heart race decrease10
We're having an ongoing credential stuffing attack right now. Hackers hit us hard over the weekend and the web team sent out an email congratulating themselves that they stopped the threat.
I decided to look to see how they "fixed" the issue.
They modified their code to stop logging the errors to prevent Splunk from sending the automated emails to management (how we have been able to spot/monitor the attack).
They literally just put their heads in the sand, stapled a sign to their ass that reads "Meteor? We see no meteor approaching. Everything is fine."5
"PornHub is under maintenance"
Me: "The fuck is this?" *refreshes page*
*under maintenance bullshit disappears, page loads as usual*
Shit, almost got a lunch time heart attack. Who's cruel enough to do such a thing? Is this all just a joke to you people? Near-death experience right there. I am forever changed and traumatized. 😢56
Just took apart my laptop to dust it out from the inside. Had it back together, put the battery in. "Alright, time to make sure I didn't break something"
Beep....beep beep beep....beep beep beep....beep
"FUCK I FUCKING BROKE SOMETHING WHAT DID I BREAK?"
Google Lenovo post codes (Thinkpad laptop). DIMM issue.
"Oh fuck I forgot to put the RAM back in.."
My friend works in retail I.T, they clients said the computers were a bit dusty from the stores.
i can feel the asthma attack coming.13
Site (I didn't build) got hacked, lots of data deleted, trying to find out what happened before we restore backup.
Check admin access, lots of blank login submissions from a few similar IPs. Looks like they didn't brute force it.
Check request logs, tons of requests at different admin pages. Still doesn't look like they were targeting the login page.
We're looking around asking ourselves "how did they get in?"
I notice the page with the delete commands has an include file called "adminCheck".
Inside, I find code that basically says "if you're not an admin, now you are!" Full access to everything.
I wonder if the attack was even malicious.3
Nearly had a crash today driving home and almost had a heart attack. Apparently my car had the heart attack for me and started doing. A speaker test.
So I'm contemplating what just happened and my car's speakers start going BEEEEP BEEEP BOOOOOOOOOOOOP (Subwoofer).
Then the radio came on and switched to a Spanish station.
I looked it up, apparently I had entered diagnostic mode on the infotainment system when I was fiddling with the wheel buttons as a stress relief.
Long story short, the diagnostic mode informed me that my car runs Windows ME!
I would like a new car please, kthxbye.9
Stallman heart failure recipe:
1. Start your UBUNTU LINUX(don't add the GNU part) and set up your .NET Core environment.
2. Download VS Code, the superior text editor for those that do not wish to have carpal tunnel.
3. Open the terminal inside your VS Code instance while inside a .net core project.
4. Type emacs -nw and watch emacs come to life inside of the terminal while living inside of the heretic vs code editor.
Wait for stallman to get a heart attack or a stroke from this.13
So my IT department at school accused a student (referring to him as MR) I know of taking down the Wi-Fi network.
MR, who I see at student tech support every once in a while, has zero fucking advanced technical knowledge. They thought he took down the network from his PHONE.
The FBI was even getting involved investigating him. 90% of the kids in this school can't even troubleshoot OneDrive, so I find it INCREDIBLY hard to believe a student here did anything.
THE FUCK AM I WITNESSING?20
At a busy restaurant.
Person 1: oh my God this man here is having a heart attack. Is there a doctor here?
Person 2: here's ten reasons why Kotlin is better than Java for Android development5
I had a small heart attack yesterday due to the unhealthy amount of energy drinks i consume so... I guess dont be like me guys23
My morning (RO = remote office):
Me: Your xxx implementation is very strange.
RO: Yes we are following a new example from experts in this field. See this link.
Me: Paragraph 1, use xxx class in these situations. Were not doing that.
RO: Yes we had problems with that, we decided to skip that.
Me: Paragraph 2, always use xxx when accessing data. Were not doing that.
RO: Yes that create many bugs, we skipped that.
Me: This section on debugging says to enable this flag while in development to allow the IDE to alert you to issues.
RO: Yes this causes the app to crash constantly. So we took it out.
Me: ... because its finding issues ... and telling you where the problem is, with an error message.
... your not following the experts at all.
RO: We are!, please read the link we provided.
... this will be discussed on my exit interview6
Following a conversation with a fellow devRanter this came to my mind ago, happened a year or two ago I think.
Was searching for an online note taking app which also provided open source end to end encryption.
After searching for a while I found something that looked alright (do not remember the URL/site too badly). They used pretty good open source JS crypto libraries so it seemed very good!
Then I noticed that the site itself did NOT ran SSL (putting the https:// in front of the site name resulted in site not found or something similar).
Went to the Q/A section because that's really weird.
Saw the answer to that question:
"Since the notes are end to end encrypted client side anyways, we don't see the point in adding SSL. It's secure enough this way".
I emailed them right away explaing that any party inbetween their server(s) and the browser could do anything with the request (includingt the cryptographic JS code) so they should start going onto SSL very very fast.
Too badly I never received a reply.
People, if you ever work with client side crypto, ALWAYS use SSL. Also with valid certs!
The NSA for example has this thing known as the 'Quantum Insert' attack which they can deploy worldwide which basically is an attack where they detect requests being made to servers and reply quickly with their own version of that code which is very probably backdoored.
This attack cannot be performed if you use SSL! (of course only if they don't have your private keys but lets assume that for now)
Luckily Fox-IT (formerly Dutch cyber security company) wrote a Snort (Intrustion Detection System) module for detecting this attack.
Anyways, Always use SSL if you do anything at all with crypto/sensitive data! Actually, always use it but at the very LEAST really do it when you process the mentioned above!31
I'm a PHP programmer and it hurts my heart whenever I see a lot of developers attack/hate PHP.
Why do they hate PHP that much? 😞21
Imagine how many of us would be fucked if the largest ever recorded DDoS attack was successful/persistent. Y'all should be thankful.
🙏 Glory Be GitHub 🙏
Wireless fucking doorbell!! ლ(ಠ益ಠლ)
This motherfucker almost gave me a heart attack. It kept ringing in middle of the night, went down to check, no one was there. Happened again, went down and sat next to the switch this time, and guess what?
It rang again!! (ノಠ益ಠ)ノ彡┻━┻
Booooo! Faulty switch! (◣_◢)10
That mini heart attack you get when you've rebooted the server, but it takes longer than normal before it comes up again (and before you can ssh it).2
No, MD5 hash is not a safe way to store our users' passwords. I don't care if its been written in the past and still works. I've demonstrated how easy it is to reverse engineer and rainbow attack. I've told you your own password for the site! Now please let me fix it before someone else forces you to. We're too busy with other projects right now? Oh, ok then, I'll just be quiet and ignore our poor security. Whilst I'm busy getting on with my other work, could you figure out what we're gonna do with the tatters of our client's business (in which our company owns a stake) in the aftermath of the attack?9
Currently I live in the city Utrecht. Right now a terrorist attack is happening next to my school with explosives and I'm at school right now.
Waiting it out now!20
I played a lot of Command & Conquer when I was younger, and I remember going through the files for C&C: Red Alert. I found one that had all the units names and properties, and wondered what happened if I changed a value. So I changed grenadiers attack speed to something ridiculously fast, and found that it actually changed it in the game!
The light bulb went off in my head, and I then created new units:
- Albert Einstein that shot electricity
- Attack dogs that launched missiles
Granted the animations didn't exist for these so it defaulted to playing their death animations when attacking, which was amusing.
That was the ah-ha moment for me that lead me to pursue programming. It was just so much fun!4
Today while livecoding in lecture, my prof got a call that got shown on his Mac. His response to that was very interesting:
“Has anyone else noticed that phones have gotten so advanced that when we receive a phone call we treat it almost like a DOS attack? It impairs is from doing everything that’s secondary to making and taking phone calls and that pisses us off”6
On a tiny vacation in another country. Don't have a converter plug (for the power sockets) so borrowed one.
*connects laptop to charger* (old charger which might die soon)
*tries different sockets*
"you might want to check your phone with that thing as the socket seems loose as hell"
*tries phone with charger that definitely works*
That was a fucking panic attack right there 😅2
Very long story ahead!
Yesterday in the evening a friend of mine (calling him F from now on) became the target of something new to me...
Apparently one can fake his phone number through some fishy ways and call people with that number. Someone (we think we might know who it was, the why is at the end) did this yesterday to F.
Here's the whole story:
We were just talking together on a TeamSpeak Server (a program to talk to others on the internet) when suddenly another friend said: "F, why did you just call me three times in a row?" That was the first thing that was a bit suspicious. After that, F got calls from random numbers (even Afghanistan, we are German), and they said something like "Have fun with the police coming to your house". Then there was silence. 10 minutes later his phone rang and there were a ton of pizza delivery services in his town that apparently got pizza orders from him. Then there was silence, again. Suddenly someone with a hidden number called him, a woman's voice said they were the police and if F doesn't stop calling the police there will be consequences. F then told her what was going on but I think she didn't really care. She then wanted to know where F lives, but I told him not to say that, because if it is the police they can find it out by themself and if it's not, they don't need to know that.
Now, a short break: There is some fake information going around about where F lives. I can't remember when we found out but the attacker thought he would actually live there. No idea what happened at that location...
Now back to the story:
Time went by, nothing really happened. Suddenly F shouted: "There are blue lights outside! The police is here!" He muted his microphone and (the following is what he told us what happened) went down to the door (remember, he is 16) and there were two police men. They were asking about why he called the police. F explained what we knew until then, about number spoofing and stuff... They sent a more technical person to him, he understood what F was trying to explain. The police men drove away and he came back to tell us what happened. (Now we get back to what I heared myself.) The mom came in, screamed something that I couldn't understand, and F went offline. We searched who the attacker could have been. And we are pretty sure we found him. That guy connected to our Minecraft server (that's where I know F from) with his real IP, and his main account, which made it easy to search. He also got a static IP which means it doesn't change. We also got some information that in the recent days this guy was talking about VoIP spoofing and such stuff. Another friend of mine, a bit older, found some proofs and I think he will go to the police.
That's it. Thanks for reading.8
My boss is Russian and he sits right next to me. He often talks to himself in Russian (while typing furiously). makes me think he is casting a spell for his code to attack. lol17
The only time they ever come out of their pathetic walled internet is to attack your servers.
Fuck that country.10
I thought meditation was more like putting myself in “airplane mode”. But in reality it felt more like a DDoS attack!4
A day of an iOS developer life:
1. XCode crashed
2. XCode freeze
3. XCode "Jump to Definition" takes me to a different file that has the exact same variable name instead of jumping to the top of the file
4. XCode Storyboard designer throwing 1000000000 as UIStackView width on a newly created UIView
5. Heart attack
6. Lots of depression
just noticed devRant web has xcode as placeholder in the tags box lol devRant knows my pain T_T8
When you're talking on your phone and have a panic attack because you can't feel your phone in your trouser pockets...4
Just wrote a brute-force attack simulation in c. Going to run it on actual hardware, with an 8-character limit, including alphabet (Upper and lower case), 0-9 and a few special characters and see if it gets done tonight ;)
I'll see you all in about 360 trillion operations.11
The best hack in history is surely the one from the mystic "bitchchecker":
https://ubuntuforums.org/showthread... (too long to paste here)
He's a true master6
You guys should really take a look at your YouTube history sometimes (If you use it). It's amazing how I move from one video to another.
Here is what I did yesterday:
- I watched a GOT Season 7 review
- Then for some reason, I watched Underground nuclear test
- Several HD footages of Nuclear tests
- Top 10 Demolitions gone wrong 😕
- "No Planes" in 9/11 attack 😕
- Amber Heard's Sexy Prank 😕
Fucking hell, I need to get back to work ☹️19
Can we talk about this for a second? I mean WTF, how is Windows XP still a thing. Wasn't there a ransomeware attack recently, so every last sys admin should have some motivation to upgrade their shit?
Sure, I hear you say, it's just an information display. No critical stuff.
Well guess what, it was at an airport. Most likely not connected to any critical infrastructur, but still it's a computer, stuck at the boot screen at 11 a.m. running windows XP, connected to an airport network.
And I was standing there like: fuck me!14
"I just hacked your website"
Me: Oh really? What did you do?
"Ran DDos attack using this third party website haha"
I asked for a screenshot to help me assist with the problem.
I got an image inside a Microsoft Word document attached to a Facebook message.
COULDN'T YOU JUST ATTACK THE FUCKING IMAGE INSTEAD2
---WiFi Vision: X-Ray Vision using ambient WiFi signals now possible---
“X-Ray Vision” using WiFi signals isn’t new, though previous methods required knowledge of specific WiFi transmitter placements and connection to the network in question. These limitations made WiFi vision an unlikely security breach, until now.
Cybersecurity researchers at the University of California and University of Chicago have succeeded in detecting the presence and movement of human targets using only ambient WiFi signals and a smartphone.
The researchers designed and implemented a 2-step attack: the 1st step uses statistical data mining from standard off-the-shelf smartphone WiFi detection to “sniff” out WiFi transmitter placements. The 2nd step involves placement of a WiFi sniffer to continuously monitor WiFi transmissions.
Three proposed defenses to the WiFi vision attack are Geofencing, WiFi rate limiting, and signal obfuscation.
Geofencing, or reducing the spatial range of WiFi devices, is a great defense against the attack. For its advantages, however, geofencing is impractical and unlikely to be adopted by most, as the simplest geofencing tactic would also heavily degrade WiFi connectivity.
WiFi rate limiting is effective against the 2nd step attack, but not against the 1st step attack. This is a simple defense to implement, but because of the ubiquity of IoT devices, it is unlikely to be widely adopted as it would reduce the usability of such devices.
Signal obfuscation adds noise to WiFi signals, effectively neutralizing the attack. This is the most user-friendly of all proposed defenses, with minimal impact to user WiFi devices. The biggest drawback to this tactic is the increased bandwidth of WiFi consumption, though compared to the downsides of the other mentioned defenses, signal obfuscation remains the most likely to be widely adopted and optimized for this kind of attack.
For more info, please see journal article linked below.
Haha! Sorry but this new cyber attack that's hit the NHS and other company's around the globe, just makes me laugh 😂
These company's just will not spend money on IT, keeping everything update and backed up! 💾
Some of these machines will still running on Windows Vista or XP 😱10
Howdy my binary friends and those who identify as an attack helicopter or an Amiga 500, I was away from devRant for about 2 weeks or 4 because I had to order a new touchscreen (who cares anyway).
Have I missed something on devRant?
Let me just freshen up my dictionary with Alex's rants, be right back.28
Once while making a automation program for a friends errr academic betterment. I realized I had taken three of the sacred caffeine pills and chewed them unlike normal. Needless to say this increased the surface area tremendously. I thought I was gonna have a heart attack right there at the age of 20. And all I could think was, "fuck my screen has a lot of dead pixels."
It's sad that such a primitive thing as a DDoS attack can bring down a huge chunk of the internet. Well done Dyn for being so unprepared.7
Is it normal for every stupid, arrogant, selfish person to talk all kinds of bad stuff about my app and attack me personally on the play store? It's just a soundboard and it's free you pricks, be grateful for once and don't mind the god damn ads so much. I can't believe that shit.5
I FREAKED OUT
I WAS A DIFFERENT PERSON FOR SOME REASON
Dfox thanks for the heart attack, I thought I got hacked.7
WikiLeaks founder Julian Assange has been charged with 17 new counts under the Espionage Act for "unlawfully obtaining" and disclosing national defense information.
Massive attack on media freedom and free speech.7
It started with the customer calling and saying they were experiencing some delays in our system. I talked to a 3rd party and they confirmed that messages between our systems would suddenly stop. We talked several times and I spent the whole day investigating and found nothing. Then at about 7 in the evening I get a mail from the customer who says the problems stopped when the ddos attack was over..... WHAT FUCKING DDOS ATTACK!?!?
Not dev related but still a rant:
My company decided that all the network traffic should go throu a virus scanner. But they don't know what the fuck they are doing, so now EVERY valid SSL cert gets rejected by our browsers because the virus-scanner breaks the SSL encryption.
Anyone open for a pishing attack?8
"Systems open to all, but closed to intruders"
HEY, HP, PACK YOUR WHOLE FAMILY OF TRASH SOFTWARE INTO YOUR TRAILER HOME AND DRIVE IT OFF A CLIFF. WHAT THE __FUCK__ DOES THAT EVEN MEAN YOU LITERAL BLOAT FLIES. HOW ABOUT WE START WITH THE FACT THAT ALL IT TAKES IS ONE DUMB MOTHER FUCKER ANYWHERE IN A COMPANY GIVING AWAY ONE LOGIN IN A SOCIAL ENGINEERING ATTACK TO POP THIS NICE FART FILLED BALLOON YOUR DRUNK SALES AND MARKETING MORON PARADE CAME UP WITH.
STOP FUCKING ADVERTISING ON MR. ROBOT AND LET ME PRETEND IT'S NOT A PRODUCT FOR JUST ONE MOMENT FUCK YOU FUCK YOU FUCK YOU4
My phone just froze. But this one time, instead of being mad at it for stopping I had the thought that it's probably working harder than when things are going smoothly. So I watched with compassion as my phone tried to resolve its internal struggle, it being so overwhelmed that it could no longer communicate with me. It was like watching someone having an anxiety attack. There, there. Take all the time you need, little friend. You're safe in my hands ♥️9
scarlxrd - HeartAttack
scarlxrd - BANE
xxxtentacion - look at me! https://soundcloud.com/rojasonthebe...
xxxtentacion - #IMSippinTeaInYoHood
These 4 songs suffice me.
Sub-genre is TRAPMETAL12
I once saved lives sending cpr teams to heart attack victims through an sms gateway platform.
This was amazing considering it was back in 2008 ;)11
Lads, this DDoS attack on DYN is must be getting pretty bad, the Department of Homeland security just launched an emergency investigation into the source and apparently Amazon has started being interrupted22
Who has a DDOS attack story they want to share ? Dyn put up the good fight today... DDOS attacks can be incredibly difficult to deal with ... Internet of Things devices makes this an even more complicated situation. Outside of calling Prolexic, any vets have some good stories ?6
My company compromises SSL certificates in the name of "security". I can't even use Gmail because Google has identified my intranet as a malicious network executing a man in the middle attack. So they break security in the name of security.6
Someone is trying to launch a brute force attack on one of my servers that I set up for an old project. According to the logs, they've tried Jorgee, they've tried directly accessing the MySQL database (with the laziest passwords), and they're now on day 4 of their brute force attack against my SSH server. I'm fairly certain that they won't be getting in (not that there's anything worth getting in the first place), but what's the standard protocol for this? Do I just wait this out, or is there something I can do to break their bot? I have fail2ban enabled, and it is doing its job, but the attacker is changing their IP address with every attack.12
Yet another Intel vulnerability. Who_would_have_thought.png.
Pushed code remotely and told a teammate to run it on the target hardware. He then told me he might of blown up $6000 worth of equipment. Then he says "Never mind everything works."
World record for biggest heart attack?1
Fuck the new ECMAScript 2018 specifications.
I mean seriously? How the hell is dot syntax gonna make it more readable?
Also, i love the brackets, braces and semicolon. Hate to see them deprecated.
Almost gave me a heart attack and my head was boiling watching it.
I guess I had an EMP attack in my home.In a single day my laptop charger burst,my desktop monitor got damaged and my Lumia phone has stopped opening.Dont know what to do13
Sort of !dev
I can't do school anymore. I get so many panic attacks. I was shaking the entire time I was writing my essay today. It's hard to focus when your brain is fucking freaking out. I'm missing deadlines, failing tests left and right.
Real talk, I'm not dumb. This was never a problem. My University fucked me up and now I can't even look at an assignment without an electric feeling and I don't know what to do.
I had a panic attack during the opening crawl of Star Wars. I had to leave the theater. My anxiety is going to give me a heart attack one of these times. I'm 18, why am I experiencing health issues like this?
School isn't done right. How could this be the intended effect?10
My new motherboard (MSI Z170 GAMING AC) reports temps for the memory, CPU, GPU and hard drive in °C. And the motherboard temp in °F.
Almost had a fucking heart attack the first time I opened Speccy for benchmarking.
Merriott got hacked. I know the head (and only) tech at a local hotel/resort that just got bought and turned into a Margaritaville, so I checked in with him to see if he needed any help or advice or anything, and he said he hasn't slept since the attack and probably won't for another week. Everything's on lockdown, he's been staring at the firewall monitor and public PC feeds for like a week straight...
God, I feel bad for this man.2
FYI to anyone following the Krack WPA2 vulnerability
A testing suite in python has made its way to github.
I was finally moved to a production project after 2 months in my internship.
Almost had a heart attack after seeing the source code. Thousands of lines of code. So many files. So many things to understand.
I hope I don't lose my brain before getting a stress ball :(5
Door knobs !
Don't you hate how they attack your sleeves, your pockets, and your belt loops!
No more, just replace them with one of these, and you too can now brush up against doors with no more fears or concerns about side tummy jabs either.14
Windows 10 loves to freeze... especially when I wrote more than 200 lines of code and I'm pointing the cursor on the Save icon!
Thanks MS, you know how to give me a heart attack.13
Damn of we can't trust anymore, even banks went under the attack!8
Last night I had a panic attack and woke up in cold sweats because in the dream I had I was constantly using the wrong variables in the wrong places...
We upgraded to Dyn Managed DNS last month, now we're down with the DDoS attack! If we didn't upgrade from their standard plan, we would be online still 😂1
Maybe coding would be fun again if I just got out of this neurotic rut.🙄
And..... it’s Monday now....8
The project I accepted for measuring heart sound is giving me a heart attack 😬
I have only 10 days left the deadline 😭6
You just knew the DDOS attack that impacted Twitter, SoundCloud, Spotify, Netflix, Reddit, Disqus, PayPal... Would not have a chance to slow down devRant! Guaranty @dfox has a world class resilient infrastructure built to circumvent and to scale.6
Call centre manager was made VP of my tech company. Is now directing the programming department.
Yesterday she spent 30 minutes looking through Excel files in an attempt to prove me wrong. Literally found nothing, with 3 other people in the meeting.
Repeatedly told everyone she was "not crazy" in her failed attempt to throw me under the bus.
I love coding, but these human interactions are going to give me a heart attack.3
This is legit bad news.
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.
Damn Windows april update!
After a LOT of problems with drivers, bluetooth, etc. it even partially corrupted the font of a program, the console shows a list of data from a medical image database so i had a micro heart attack when i first saw this tinking the database was corrupted (i was checking out a problem)!
I bet it's the "smart" font re-sizing!!!5
Identified the origin of the DDoS attack. Apparently, the person was just hopping through 3 IPs so looked like a targeted attack likely from a competitor. I sent the logs with incident notification to the email@example.com to ask them to suspend them.
Got a prompt response but took them a week to suspend this.
We were a very small team and had to stop everything to fix this-iptables and firewall etc.
We had not even launched the product and was still under development.2
I think someone just did a MITM attack on my private server. Got the IP from netstat, and it's from somewhere, somewhere china. And I think he got my cred.
What do I do now?21
So the football world-cup tip app I'm using with some mates got hit by a DDoS attack yesterday.
The only question I have is who the FUCK DDoS'es a motherfucking tip-app?! What the hell is there to gain?! It doesn't even involve money, just tipping for the hell of it!1
- build my two pixie radios
- get my ham and Morse code licences
- finish writing my rf replay attack program
- build a custom version of raspbian os for FRC
- win all the games (right @ellont?)
There are more.. I can't remember them.. I should really wake up before trying to make lists5
I'm a php developer.
I don't like preg functions (regular expressions) and i don't remember exactly the syntax for alternate words.
I googled, and this is what I found.
An heart attack.5
i nearly had a panic attack when 3 tables contaning transactions shows empty,. then i reconnected dbeaver and it turns out it was fine,. damn my shitty internet!
*Start thinking about it.
*Start seriously thinking about it.
*Push yourself to do it.
*Have a mini unconscious panic attack that tells you you're gonna fail.
*Do something else completely unrelated to what you wanted to do.
*Feel good about the meaningless shit you just achieved.
*Recognize you're procrastinating.
*Try to stop.
*You can't cause you're stupid and lack the control and discipline to trick your own mind.
*Watch video about how to overcome procrastination.
*Get a more firmer understanding of it.
*Realize you're a helpless piece of shit.
*Cry till dead inside.
*Resume daily mindless shit.1
When you walk in at work in the morning, hoping for a quiet Friday at work, but nope. I check our WP monitoring and see that half our sites aren't responding. Well fuck. Turns out that the firewall service we use to protect our sites experienced a massive DDOS attack. So the service we use to keep our sites safe ironically caused downtime. Me, our Devopser and another dev spent the entire morning bringing the sites up again and bringing the customers up to date. FFS, I need more coffee.2
Currently our companies website is being attacked and we're getting a 500 error and the FTP servers are down. Everyone is panicking. Little do they know that I just rebooted the server and already sent out a notice of this happening and will be back online. People are chanting for my death outside my cubical with fire and pitch forks. HURRY UP AND FINISH REBOOTING SERVER!!!1!!2
A site I manage in my spare time with a couple thousand normal users was getting attacked by a Chinese botnet. All the requests were coming from only two subnets. Easy to block. Feels like this was only the vanguard. Prelude to the real attack. I'm thinking about moving the site to its own server, so it won't affect my other sites. There at least if it gets kneeled, it'll only be that site.6
TIL if you know the password for a WIFi SSID, you can replicate it with your hardware. All devices that have credentials for that SSID will connect to yours if your signal is stronger. The encryption just needs to be the same (wpa2/wep) The underlying UUID doesn’t matter.
Not bad for a quick and dirty man-in-the-middle attack. The WiFi spec needs a bit more work.
TLS all the things!4
Today I woke up with 2 things in my personal todo list
1. As coder, I need to figure out why my yaml parser doesn't work
2. As Lv 60 wizard, I need to clear morroc 245. Wtf with that once punch kill charge attack....8
When you think about it, a female egg cell can withstand a sperm DDoS attack at a rate of 1.8 terabytes per second, letting through just one data packet. It's amazing that the packet can hang the system for a whole 9 months.
That's what I would call a good firewall.5
*Now a days*
We don't need viruses ☣ or malwares to slow down MS Windows 💻,
Two Tabs of Google Chrome does it delicately. 😂😂😂😂😂7
windows booted up into a blue screen for a second before going to the login screen.
i almost had a heart attack2
Want to scare your boss? Wait for a day or two before month end and take all your stuff off your desk home with you.4
A great and very common web attack is known as 'SQL injection'.
So if I am using MongoDB, does that become 'NoSQL injection'?1
Spent about six hours writing tests and coding a user log in system for a Rails app last night. Finally finished at around 2:00am. Commited, pushed and merged, then called it a night.
Woke up today and Postgres is refusing to play nice. Spent twenty mins or so fixing that and then ran rspec.... Two thirds of my tests are missing - everything I wrote last night. I check my code and sure enough, they aren't there.
Wild panic ensues for a solid 5 mins before I realise I didn't actually pull the updated master branch after deleting my feature branch last night.
Now I feel like an idiot, but a relieved one.
Hi every one!
I have to present kali linux on Monday and the presantation should take from 30 to 45 minutes.
What are the best and coolest topics I may have? ( other than aircrack or fluxion .I am going to show them a live attack on my sim wifi!!)
We love to freak out about critical infrastructure that's still running MS DOS in 2018, but tbh the scarier thing is that trying to upgrade all of it might be just as catastrophic as any exploits. Lots of this shit is so old that you'd have to rewrite any programs from scratch since they weren't even intended for modern x64 systems and the original documentation got lost in a rolodex from a dude who's probably dead. While we're totally unequipped to handle an advanced attack on our air traffic control systems or telecoms grid, it's a guarantee that any attempt to update the hardware SWIFT uses would cause a financial crisis.
Fucking christ this year is a fucking shitfest:
- wpa2 krack
- "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions"
- "Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites"
- "Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe"
My fucking router didn't yet get patched, my fucking phone is outdated and I can't change to my patched one because devrant just shits the bed in extended desktop mode. Windows 8.1 loses support in 3 months, rendering my last chance of using it on my surface pro done, making me use windows 10 with its fucking shit ass not optimized tablet interface. I have just fucking constant paranoia what else could be hacked tomorrow, nothing is fucking safe anymore for fucks sake. I even went as far as implement 3 step auth and intrusion detection on my shitty ass VPS nodes, fucking give me a break you fucking assholes.5
Has anyone read the latest rant from Microsoft?
<<Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage.>>16
Need a phone upgrade. So now the question is, do I want the $1000 version of the phone I am already using but from a hipster fruit based company or do I want a Korean phone that, given their recent track record, will have a battery that vibrates at the exact frequency that cause wasps to attack the user's testicles?
Oh and it should probably be a thing I can make apps for but doesn't require I learn the thing that pretends it isn't Objective-C.10
How would you explain SSL, certificates, and CAs to a layman?
I just spent 30mins trying to explain it to them in a chat (related to Mpngo driver configs and the sslValidatrle flag), they sorta went silent on me so not sure if I explained it or understood the roles/purposes correctly...
One example I used was it prevents a man in the middle attack where your connection gets rerouted to another server. If the CA didn't recognize the cert the new server replies with then it rejects it and prevents the attack.10
That mini heart attack when you run `rm rf *` and it takes some seconds longer than you expected and you reallize that you cannot remember if you cd'ed out /2
I have come to realize that my stress comes from how inefficient my clients use their tech.
I have to stop caring. Is it up? Is it running? Good. That should be where my investment ends.
I shouldn't fear a heart attack or stroke because of some clients' inefficiency.
IT'S JUST SO DAMN HARD.
That cringeworthy moment when you end up updating code you wrote two years ago as an amateur. Sigh, massive OCD attack settling in, I have a feeling I'm going to put in a few extra hours just so I can turn this blob of sticky code into something decent/readable.1
Massive cyber attack hits Europe. Hopefully everyone is patched and secure. Critical infrastructure, banks... impacted.1
Learning about security and how to write secure programs. So much of my stuff was vulnerable to attacks when I stated learning about how hackers do what they do and hacked my own programs. It was frightening… I'm still not confident to say my applications are 100% secure, but it's gotten a lot better and at least I'm actively concerned about it now, even though I'm very unlikely to become a target of an attack (my programs are used almost exclusively by me and my friends). However, it's still frightening to see how unconcerned many more popular/professional devs are with security.7
horrible terrorist attack in Uri, Kashmir.
may the jawans rest in peace 🙏
enough is enough.
time for change ✊3
When you give your self a mini heart attack by knocking over an empty water cup while coding.
I can't count how many times I have done this over the years.2
Have u heard about ear infarction?
Which makes one of your ears deaf?
Aaaah! I got one!
Tommorow must go to the doc then he injects inside my ear (hope it is less painful then i think)
Wish me luck ! Hope I can hear things as before soon35
So just read up that some companies based in china were able to attack Google back in 2009, all cause IE had a dangling pointer issue.
When you sit at your desk peacefully doing nothing and a coworker calls you.
Almost fell off my chair...
How do you counter DOS attack? I have one online service where an idiot just calls curl command to one endpoint.
Although my service is working and server performance is not affected, I found it annoying.
Cloudflare could be a solution, the reason I did not use before is user might have to wait a few seconds before seeing the app, but if no choice then.18
China used a tiny chip in a huge hack that infiltrated Apple and Amazon. The attack—denied by the companies—compromised the U.S. tech supply chain, sources say: https://www.wbca.st/PPrOcew2
This new season of Attack on Titan is getting more intense!!!
Also, Google Approved my Action TODAY!! :D
Check it out for yourself. It's my first action so don't be too harsh.
SSH attack today. I asked my colleague if a rule in the firewall would block that. He tells me that yes and when I look, the rule is open for the SSH. 2 hours ouf downtime ...1
I never had to deal with an attack.
At least, I don't know about it. My firewall couldn't detect anything.
I wish I could have experienced something like that tbh *sob*2
Feck. My brain bluescreened during a coding interview and I had a major panic attack. No clue what or why it happened. FML.1
Just when i somehow accepted that Austrian part of team is naming theirs methods in Deutch, i almost got heart attack when i saw this. They're combining english with deutch, for example isOffen(), isLoeschenAllowed(), isEinsichtHinzufuegenAllowed() and so on... And most of the time these assholes even dont add javadoc, but when they do it something like: "Checks if *curentClass* is offen". Thanks a fucking ton.3
ME: Yo Manager, we got a problem...
MANAGER: Nah dude, every problem is an opportunity!
ME: Okay fam, we got an opportunity of a DDOS attack :-)6
Deleted 1000 lines of code that I would need at a later point. Had a mini heart attack once I found out the code was no longer there...3
What is the probability of alien rootkit signal that would be intercepted by satellite and then executed on modern computers to create AGI that can use cloud computing and digital currency to take over our world ?
From my perspective pretty high 🤣🤣🤣
Let’s convince some government people and create intergalactic cyber attack defense institution, that would keep earth safe from alien invasion, with high money grants so we can prevent those threats.
Maybe Ernest Cline Armada is already a thing.
What you think ?2
Accidentally cleared user accounts table that connects mobile apl accounts with main system accounts. Almost had a heart attack but luckily Azure had point in time restore 😌
PC-Lint is such a useless piece of shit! Tons of warnings with no actual benefit. The obvious motivation behind this crap was to throw as many warnings as this cheap sucker can even generate with no effort to minimise false positives. Typical snakeoil shit, reminds me of ZoneAlarm back then which reported every ping as "attack" just to fool the clueless into buying. Meanwhile, the actual bugs that sophisticated tools can find pass unnoticed through PC-Lint.
Tutorial: How to get rid of your dev?
1. Find a very old (2+ years) jira task that took a lot of sleepless nights to get resolved.
2. Make sure that your dev is still on the watchers list.
3. Reopen to 'change some labels'.
4. Forget to close the task again.
5. Remove the body. Heart attack will get classified as a natural cause.
6. Close the task.1
In the spirit of week93:
If you haven’t read/heard about the attack on HB Gary Federal (a computer security company) in 2011 and you want a good read about a DDOS attack, social engineering, espionage, and the “infiltration of Anonymous” by a very punchable CEO you should check out this article:
And the follow up by Anonymous:
Not from a teammate, but using Ionic to create a banking app, I was about to have a heart attack seeing my brother forced to use it :|5
Four hours of work and the work horse decides to have a heart attack.
Thank the server gods for swap files.
Freelancer.com is under heavy spam attack for a couple of hours now, I guess the devs are sleeping.13
He got me. I'm so done for...
Pretty funny, cause maybe half a year ago there was an attack against my email, but I'm pretty sure he got stopped because of the 2FA. Not to mention that I immediately changed it for a password x times stronger than whay I had before 🤷♂️13
... when you as an internee with limited access, gets your early off friday ruined by a flooding attack and one of the clients on that server somehow has your number..
Meeting room pc with windows 7 switched on once a week. Sometime it says at boot that has to apply 32769 updates.
Everytime an heart attack.
Fortunately it takes only a couple of minutes.
Revenge of the developer.
After our project consultants aren't good at planning projects I started my revenge. They will get soon a heart attack or paranoia...
Every time I need something from them (cause they missed it in the specs) and see them at the end of the floor. I stealth in their room and stand behind their door. When they are sitting, the door is closing mystically and I step to them. The faces are hilarious. That's my way to teach them to write better Specs :)
I know I've been spending way too much time in doors programming because I had a panic attack while at the grocery store. I've never had one in a long time.1
Got access to root access of school's lab computer.
Saw an account 'tee'(Term end exams) associated with it, copied the hash, ran a dictionary attack and the password was 'tee'
It's been confirmed the DDoS attack on DYN that affected Github, Amazon, etc was perpetrated by supporters of Wikileaks for "revenge" for Julian Assange8
I may not be the guy who 'sudo rm -rf /' for a company but I dang near came close and had a heart attack...
Unity has a nice feature where if you search for an item in your hierarchy, it fades to white as if it just crashed.
Thanks for the heart attack, Unity! Maybe this serves as a reminder to save frequently because it *does* crash a lot.3
Wait, why is nginx communicating from our cache servers to app servers using HTTP1.0? Added http_version 1.1 to a general config. Moments away our responses return 500 on our production because one of our module doesn't handle gzip. If I ever had a heart attack...
@alexdovzhanyn and I just released the third episode of Runtimerror Live!
We talk about various things like the DynDDoS attack, recursion and much more.
We hope you enjoy it as much as we enjoyed recording it :)1
I been using digital ocean to host my server for a project, but they seem to get shutdown because of DoS behaviour. I have no idea why. The server is doing some soap and rest communication and controlling a database.
To be fair the password was poor, but it was meant to be a fast way for four people to work on it at the same time.
But after the first shutdown, we rebuild the server and work on functions. Finish the work and went home. But in the server 9 hours of uptime with 2 of them unsupervised it was detected as DoS behaving server.
-Writing engineering thesis
-Have two W10's, because of requirements for HoloLens emulator
-Turn off computer
-Run it again and bootloader doesn't loading
-Heart attack guaranteed4
Everybody when a forced update is released: "I hate forced updates!! They can't force me to do shit!!"
Everybody when a massive ransomware attack happens: "You should've updated when the update came out, so you aren't vulnerable!"
If they made the fix for the WannaCry vulnerability forced, the attack wouldn't have been as big as it was.
Confession: I wish they made more forced updates :/
Also, I'll probably get a lot of hate about this...2
NOTE TO SELF:
Verify with your coworkers about how you plan to attack a certain feature if you’re unsure, especially since you work remotely. If not, you’ll have to fucking redo a feature three times
Developers more than other groups tend to hold their operating system or programming language of choice dearly, to the point where if someone thinks poorly of the OS or Language, they take it like a personal attack. Then there are those who think poorly of people who who's a certain OS or a specific language. Combine the two and you get hurt feelings and identity crisis.
Can we all just agree that we're all in different stages of learning and that we all generally end up going the same direction for the same types of problems?
Or just have it out and kill each other over it. Will give me great rant material.3
I assume everyone's heard about the GoldenEye attack.As I understand the attack was called Petya.
Fun fact: In the movie, there were two GoldenEye satellites Petya & Misha.
If those guy want to stay true to form, should we be expecting a second attack?
Mom: Why are you not using this laptop.
Me: I have to wipe it clean. Virus attack.
Me: Mom why is my laptop smelling like washing detergent ??
Guess what happened.....:'(1
For the longest time I've had trouble trying to get my background images full screen viewed and responsive for some components while learning angular 2. Then some one typed this in the CSS
Min-height: 100vh; for height
It felt like I had a heart attack and spontaneous orgasim at the same time.3
I got a bug on production that I cannot reproduce on our testing environment. It bothers me a lot because I’m putting a lot of man hours finding it. Do you guys have any recommendation how to ”attack” the issue? Unfortunately I cannot debug the code.11
Until that recent terrorist attack, I had believed that Ariana Grande is the name of a spacecraft or something. I studied about Ariane 5's failure in software testing course. Maybe that's what made me think like that. 😁
Anyone have much success with Kali/WiFi penetration testing?
I've been tasked with trying to break WPA security within a couple of hours without a dictionary attack - is that even possible?
I have an Alfa AWUS036NHA capable of monitoring mode if that makes any difference. It's my first time trying anything like this.10
Back to Excel for control project, sih 😢, just because my non tech boss can't work with JIRA and it confused him. Do you guys know any idiot friendly control project before I having a heart attack?2
That mini heart-attack when you navigate to your AWS entities and it listed nothing.. only to realize you're in the wrong region.
Every fukken time2
That moment when you realize you've basically been having a protracted anxiety attack for two months. Should uh...build character or something, right?
Is the devRant logo breathing faster on load screens or is it just me? Now it appears that it is having a heart attack, @dfox please help him1
The massive DDoS attack that took down the internet this morning, hit NPM too and I just cleared out my node modules without realizing it. :'(
I lost the book that i store all my passwords on it
I almost had a heart attack and
I woke up from my dream2
Back in the days of DOS/Win3.x I was jerking around in school sending messages to my friends in other classes by changing autoexec.bat on the workstations I used.
Somehow someone mistook my messages as a virus, and the IT department closed down the workstations for weeks.2
When you commit a more readable README on GitHub to a non native English speaker sends you an email a day later asking for help why his self-signed certificate isn't trusted by his browser or his other computers.
The project he's working on is to sniff Wi-Fi packets that are encrypted through a MiTM attack. I've now stopped following this project and moved on.
Has anyone else had any stupid questions from debs which were about the key purpose of their project and how to go about it?
Note to self.. Check how your backup restore works before actually needing it...
Coworker got ransomware to his computer via targeted attack and managed to encrypt about 6000 files on Google Drive share... Which I have backed up. However there are a total of 100k files so total restore is not an option and with 60 users updating things can't do point in time restore either... And thanks to the backup softwares buggy cmd line interface I can't create command line script to restore the files one by one... So in the end I most likely need to restore via sluggish gui one by one...3
Love the feeling when reading about one ransomware attack after another targeting Windows machines and successfully infects large companies like Maersk from my Ubuntu laptop. 😂
wondering if I should destroy someone's soul today.
Seriously considering going full drill-sergeant. Complete with knife-hand and shark attack.2
Guys any suggestions?
I'm having a migraine attack (severe headcahe) right now in the office.
What should I do.21
We had a discussion about coding style. At one point I said that it’s his personal opinion and not an objective fact. He went full on rage mode and said that he takes this as an personal attack. Then another dev chimed in, telling me to listen to the older devs, because they know more.
Not really a big fight, but stuff like this makes me mad as hell.1
I think our network was having a heart attack today. Had to jump in on a webinar after most people had gone home and ended up tethering to my phone to get a decent connection. Hopefully our network guys see the ticket and can fix things quickly.1
Had a shitty day and no idea who else tell so I'll just leave it here. Had like the first part of leaving exams in school (before university). Today was the last day and we were writing an exam from math. Kinda got panic attack in the middle of it, because it came to my mind "what if I can't make it?" so I lost a lot of time and fucked up so much :). I guess I passed without a problem but I'm really disappointed at me, because I didn't think I would panic so much and fuck up so much. At least now I know how panic attack feels :)))))))))))).1
I wrote a type checking utility that also considers all types (JS without TypeScript, so this meant arrays etc.). The desired type had to be declared in a config file and the data didn’t even come from the config.
What would I not do to prevent all possible attack vectors...
We had a test in class where one of the questions was "What is SQL injection?" and I wrote what it was and even gave a bang on simple example where I showed how you could end up with a truncate statement on your customer db. The last part of it was:
"This will be the SQL that gets executed:
INSERT INTO Customers (Name) VALUES (' ';TRUNCATE Customers;--);
When I got it back after we had a session of "grade each others work" I got the comment: "What makes this an attack against a database?"
I mean, I'm not sure what I could have written. That it truncates the database? And, correct me if I'm wrong, but if a user truncates your DB, is that not an attack?
A bit confused !
Must prepare an article about network pentest and defense .
Since its a very wide topic and I've been told not to just mention tools , I'm confused about categorizing these tests !
Also the footprinting stage is not likely to have any defense !(no attack is lunched yet :) )
So... Any idea?8
I've always wondered if techies would make good heads of state. there would be reason in every decision and countries would progress a lot quicker. and we may have world peace someday.4
Was working in an n-tier website, standard Web forms, BAL, DAL, database architecture. Validation and processing of data done in the BAL. Not the best idea, but whatever. Well apparently some developer thought it was too much work to pass his data through the BAL, so he directly accessed the DAL, performing zero validation on the data being passed in. Luckily, this was in a non-critical part of the site but the PM at the time nearly had a heart attack when I told him.
O great devs that know grep I have a log that I took from a local company's router that got DOSsed yesterday (they sell very nice sandwiches) and I wanted to know how I can take only the IP's from the log so that I can take action against the users (contacting the abuse if the ISP)10
why do all erp solutions i know have a poor design?
one of you guys surely works for a company which sells erp solutions. as i am a user AND a programmer.
i just have to ask: do you have the feeling that your UI is bad?
and if - why is it like this?
i dont want to attack someone. just want to know the reason why all of the solutions i saw have bad UI or are just "user-unfriendly" (like you would say in german :D)1
System engineers who are "too busy" (facebook too much) to try anything new and get a heart attack when you only mention nginx
This shithead continuously wasted 2 lectures of CNS(Cryptography and Network Security) on debating: in a link to link encrytion if encryption and decryption takes place on every node, what if attacker attacks the node while the data is decrypted.
Though I couldn't care less about the lecture but this guy brings the same issue in every lecture
Do anyone have any idea about the link to link encryption?
I know already it encrypts the whole packet with header and on each hop the data is decrypted and the destination ip address is fetched and encrypted again, but i don't know if it's possible to perform an attack on the decrypted data.3
Is the ransomware attack using leaked NSA hacking tools affecting 99 countries is seriously serious or should be categorized as fake news14
I need to test a client's website for DDoS attack performance, it has been attacked in the past and I want to know what kind of changes are the most effective, are there any good tools/services you know?6
Coffee. Get wired off your face on caffeine and then you only have three choices, program like you've never programmed before, bounce off a couple of walls or have a severe heart attack.
Rinse an repeat until you're in hospital.
You're welcome 😂😂1
I just saw this video on slow loris attacks (https://youtu.be/XiFkyR35v2Y).
So my question is: why even bother with creating a botnet for a ddos attack?3
Starting to invite coders who lost their job for camping. Have cooked for large groups (120 people plus) before. And then, after days of eating and resting, my army can counter attack.... 😁 *mwahaha*
So in the past 3 days I've almost had 6 heart attacks, I've been giving public speeches for random classes at my school as a practise.
Today I'm going to some capital city finals shit whatever you call it and I have to give a public speech to fuc knows how many people.
I wrote a speech about lies in 700 words, speech has to be 5 minutes, oh yeah, in English. It's not my native...
Man, I am not ok at all Xd, they had to choose the one who has anxiety dosorders.2
Media always misinterprets anything related to computer and information technology. Recently found an Indian News channel which aired news about recent cyber attack and stated virus named "Ransomware" (not WannaCry) has affected computers all over the world. They aired wrong information without hesitation despite India being world's rapidly growing IT hub.6
Devs are divided on gitlab blunder, some appreciate their honesty and transparency while other are either cursing them or grateful that they didn't use it. But think like this :
You own a MacBook and you love it like your baby, if someone drops it, there is good probability it won't break but it will sure give you a fucking heart attack. You won't ever let that person touch your MacBook.
Gitlab just did that. They scared the hell out of the developers.
I hope everyone learns from this and it doesn't happen to anyone in future.4
I just hate how all the the internet providers (Sprint and Verizon mainly) just attack each other. It is all about combating, attacking and 1upping to them.2
What are the odds Microsoft is playing behind the scenes with Wannacry attack to increase Windows 10 growth ?
It is not a secret that Satya Nadella is on a mission to meet 1 billion W10 devices by 2018.9
I think the CA DMV is under attack right now. Been here for a couple of hours and computers keep going up and down. And now they just announced that this is state wide across all DMVs, so going to another one nearby will not help.
Anyone have any incite....?1
"Be friendly to those who enjoy your work and friendlier to those who attack it. " - David Leggett3
Django wont pick up migrations for this app. Nothing in dj migration table for the app. It just won't create the tables on staging.
My panic attack is over but Im still going to lose this client over this.
Just out of curiosity...
Is there a way to prevent a DDoS attack using settings in the Router? Like, changing the DNS Port to maybe 54 because most people just spam 53 with random packets?6
So it has been a couple of months since I've used MailGun in a project and I felt like it was time to use it. So I try to go to the mailgun website and it doesn't seem to load. I check twitter and they are experiencing a DDoS attack (tweeted out 20 minutes ago)
Really? Did it really have to happen now I just wanted to use it :c?
Whoa.. I think piratebay is under DDoS attack. I was trying to get microprocessor tutorials. Can anyone verify?
I learned the ancient art of internal screaming and imagining the annoying people dying one by one at my feet.
this is the only way that I don't die of a heart attack some days.
Awesome feature by devRant...
You can't post your password in rants or comments... See:
My password is ***********
Try now! When you post you can see the password, but others will only see '*'.
-If you fell for this, u r a noob.17
Can I get some advise on what a independent contractor (programmer) making no more then 3-4K has to do to be straight come tax time? This is my first time that I had done any freelancing work and am having a mini heart attack10
So, for about two days ago I got hit with a crazy anxiety attack. My chest started to tighten and things seemed dark at the time.
I'm a CS freshmen this year and I find myself struggling with some subjects. I felt like I've dissapointed a lot of people that I really cared. Anxiety attacks have been happening recently. Do you guys have any advice for dealing with anxiety attacks ?
*sorry for the bad english4
I was told it was one brave squirrel that led the attack on our internet today...I hope that squirrel is up and running because we are.
I was in my class on Thursday around 12 PM noon Indian standard time.
I couldn't access github on mobile (connection refused error) but at 2 pm once I was out of class could access it.
Any guesses if it was related to recent ddos attack on dyn ?
Currently in a boot camp. Just finished with python/flask/django...during the html/css part of the camp I literally had "attack of the divs" nightmares.
Kindly vote for. I have participated in angular attack hackathon, need some votes to make audience favorite.