Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "blackmail"
-
And here comes the last part of my story so far.
After deploying the domain, configuring PCs, configuring the server, configuring the switch, installing software, checking that the correct settings have been applied, configuring MS Outlook (don't ask) and giving each and every user a d e t a i l e d tutorial on using the PC like a modern human and not as a Homo Erectus, I had to lock my door, put down my phone and disconnect the ship's announcement system's speaker in my room. The reasons?
- No one could use USB storage media, or any storage media. As per security policy I emailed and told them about.
- No one could use the ship's computers to connect to the internet. Again, as per policy.
- No one had any games on their Windows 10 Pro machines. As per policy.
- Everyone had to use a 10-character password, valid for 3 months, with certain restrictions. As per policy.
For reasons mentioned above, I had to (almost) blackmail the CO to draft an order enforcing those policies in writing (I know it's standard procedure for you, but for the military where I am it was a truly alien experience). Also, because I never trusted the users to actually backup their data locally, I had UrBackup clone their entire home folder, and a scheduled task execute a script storing them to the old online drive. Soon it became apparent why: (for every sysadmin this is routine, but this was my first experience)
- People kept deleting their files, whining to me to restore them
- People kept getting locked out because they kept entering their password WRONG for FIVE times IN a ROW because THEY had FORGOTTEN the CAPS lock KEY on. Had to enter three or four times during weekend for that.
- People kept whining about the no-USB policy, despite offering e-mail and shared folders.
The final straw was the updates. The CO insisted that I set the updates to manual because some PCs must not restart on their own. The problem is, some users barely ever checked. One particular user, when I asked him to check and do the updates, claimed he did that yesterday. Meanwhile, on the WSUS console: PC inactive for over 90 days.
I blocked the ship's phone when I got reassigned.
Phiew, finally I got all those off my chest! Thanks, guys. All of the rants so far remind me of one quote from Dave Barry:
7 -
RememberMe's relatives' guide to raising a kid:
1. Enroll kid in school IT course - Java/SQL.
2. Let kid be useless on Facebook all day. Kid doesn't write a line of code unless it's for exams.
3. Realize that kid need to do a project for 12th grade (final year in school).
4. Complain loudly to everyone in the vicinity.
5. Let kid choose a project waaay above her skill level.
6. Have some other relative mention that RememberMe is a "computer waala" (computer person).
7. Ask poor RememberMe to do the kid's project.
8. Use typical family blackmail ("oh you can't have that much work, do something for your family for once").
Yeah, nope. Get lost. I don't mind teaching, but I'm not doing your work for you.6 -
Worst hack/attack I had to deal with?
Worst, or funniest. A partnership with a Canadian company got turned upside down and our company decided to 'part ways' by simply not returning his phone calls/emails, etc. A big 'jerk move' IMO, but all I was responsible for was a web portal into our system (submitting orders, inventory, etc).
After the separation, I removed the login permissions, but the ex-partner system was set up to 'ping' our site for various updates and we were logging the failed login attempts, maybe 5 a day or so. Our network admin got tired of seeing that error in his logs and reached out to the VP (responsible for the 'break up') and requested he tell the partner their system is still trying to login and stop it. Couple of days later, we were getting random 300, 500, 1000 failed login attempts (causing automated emails to notify that there was a problem). The partner knew that we were likely getting alerted, and kept up the barage. When alerts get high enough, they are sent to the IT-VP, which gets a whole bunch of people involved.
VP-Marketing: "Why are you allowing them into our system?! Cut them off, NOW!"
Me: "I'm not letting them in, I'm stopping them, hence the login error."
VP-Marketing: "That jackass said he will keep trying to get into our system unless we pay him $10,000. Just turn those machines off!"
VP-IT : "We can't. They serve our other international partners."
<slams hand on table>
VP-Marketing: "I don't fucking believe this! How the fuck did you let this happen!?"
VP-IT: "Yes, you shouldn't have allowed the partner into our system to begin with. What are you going to do to fix this situation?"
Me: "Um, we've been testing for months already went live some time ago. I didn't know you defaulted on the contract until last week. 'Jake' is likely running a script. He'll get bored of doing that and in a couple of weeks, he'll stop. I say lets ignore him. This really a network problem, not a coding problem."
IT-MGR: "Now..now...lets not make excuses and point fingers. It's time to fix your code."
IT-VP: "I agree. We're not going to let anyone blackmail us. Make it happen."
So I figure out the partner's IP address, and hard-code the value in my service so it doesn't log the login failure (if IP = '10.50.etc and so on' major hack job). That worked for a couple of days, then (I suspect) the ISP re-assigned a new IP and the errors started up again.
After a few angry emails from the 'powers-that-be', our network admin stops by my desk.
D: "Dude, I'm sorry, I've been so busy. I just heard and I wished they had told me what was going on. I'm going to block his entire domain and send a request to the ISP to shut him down. This was my problem to fix, you should have never been involved."
After 'D' worked his mojo, the errors stopped.
Month later, 'D' gave me an update. He was still logging the traffic from the partner's system (the ISP wanted extensive logs to prove the customer was abusing their service) and like magic one day, it all stopped. ~2 weeks after the 'break up'.8 -
Got a nice blackmail email sent to my work email during the weekend. Too bad when I got back to work on Monday he already sent the pics. JK this is a work email he doesn't have shit on me.
He did send the email from my email but the password he said hasn't been since I started working here. I just feel insulted. Come on guys let's donate so he doesn't share how hard I work.
Here's the email: https://text-share.com/view/...9 -
A chick asked how much I earn, and I politely declined to answer.
She seemed annoyed and insisted, nudging me by saying how much she earns.
Again I told her I'd rather not say.
She got mad, started trying to emotionally blackmail me into telling her my salary...
This must be a red flag cuz I don't give two fucks about how much money people I date earn/have and expect them to either respect or share my view8 -
I'm seriously burned out "CTO" (small company 20 people, 4 developers).
Should I tell my CEO/CFO exactly that?
Should I tell them, I can't take it anymore, please help me.
Next month we'll have a fund raising opportunity.
I'm afraid it will sound like a blackmail.
I'm afraid they will think, ok, he's burned out, let find somebody else.
On the other side, if I take the risk myself, without telling anyone, I could explode and I'll be on my own.
What do you think it's the best approach?15 -
"Hi X,
Y stepped down from organizing meetup Z.
You are one of the top members of this Meetup, so I think you have what it takes to be a great organizer. Stepping up would help ensure that this community continues to survive past [date in the near future]."
Third time I get a message like this from meetup. Usually followed up by threatening to delete all group data forever if no one "steps up" (e.g. pays their bills). F***ing vendor lock-in! They have been colleting and publishing data for years only to blackmail people to continue using their services.
Some meetups (at least in my region) have switched to LinkedIn, so we will surely receive messages like above from LinkedIn in a couple of years.1 -
I need advice.
So let's say, hypothetically, I found a site with a user data leak.
Would it be illegal if I only told them where the leak was for a bounty?
I am NOT going to distribute the user data. I just don't want to work for free, you know?
Again: NOT DISTRIBUTING USERDATA. No blackmail. Just information that their QA should have caught.25 -
So I got a scam email... well I hope it’s a scam email
Saying that they know my email and password, stating the email and password (I think it was the correct password or maybe older version), have installed whatever on my OS and want blackmail me w/ my info for money or else they’ll release it in 48 hrs and ugh
I have exams, honestly can’t be fucked dealing with this.
It is a scam right???
#concerned
#dumbass6 -
Hi who knows a tool for reverse image search on Facebook? Someone blackmail my gf by posting her picture and tagging her as a "call me for sex" hooker...16
-
I believe there is a sizable community suffering the current situation of TypeORM, a blackmailing author without introducing new members.
Why isn't there a succeeding fork yet? We have Sequal Ace now, people can do it!6 -
You should learn how the most prevalent kinds of cryptocurrency scams operate, how to recognize them, and what to do if you fall victim to one if you are considering investing in cryptocurrency or currently own digital assets. Giveaways, new romance scams, phishing, extortion emails, false company notifications, blackmail, "rug pulls," and maybe fake mining programs or networks are all examples of scams. Poorly written white papers, overzealous marketing campaigns, and get-rich-quick boasts are all indicators of cryptocurrency scams. To avoid getting scammed, there are a few things you can do. Refuse to provide your private bitcoin keys when asked. No one requires those keys for a valid bitcoin transaction, and they govern your wallet and cryptocurrency access. Finally, avoid working with investment managers who approach you and claim to be able to grow your money rapidly. The ideal people to get in touch with if you think you may have fallen victim to a scam is Wizard James Recovery. Wizard James Recovery provides unique recovery services customized for your situation. Visit them right now or contact wizardjamesrecovery @ usa . com via email.2
-
Cybersecurity Firm For Cryptocurrency Scam Review // PASSCODE CYBER RECOVERY
My name it's Eddie West and here it's my encounter with a fraudulent sinero. I connected with someone on Instagram who appeared genuine. Our interactions began innocuously, characterized by light-hearted banter and shared interests. As days morphed into weeks, we engaged in daily conversations, exchanging personal anecdotes and cultivating a sense of trust. I felt emboldened to divulge sensitive details about my life, convinced I had found a true confidant. However, this misplaced trust would soon lead to a harrowing ordeal.One fateful day, the tone of our exchanges took a sinister turn. The individual I believed I knew transformed into a menacing figure, demanding that I remit 125,000 USDT or face the exposure of my private information. A wave of panic engulfed me as I grasped the potential ramifications of her threats. Fearing the catastrophic fallout from having my personal details unveiled, I reluctantly acquiesced and transferred the funds, hoping this would quell the harassment. Yet, after the transaction, she vanished, blocking me on all platforms. It became painfully evident that I had fallen prey to a sophisticated blackmail and crypto scam.
Devastated and desperate to reclaim my stolen assets, I embarked on a quest for solutions. This search led me to Passcode Cyber Recovery, a cybersecurity firm renowned for its expertise in crypto fraud investigations and asset recovery. Initially skeptical yet hopeful, I reached out to them for assistance.
The team at Passcode Cyber Recovery sprang into action with remarkable efficiency. They commenced by meticulously analyzing the blockchain transactions pertinent to my case, employing advanced forensic tools to trace the USDT transfer. Their expertise enabled them to pinpoint the scammer’s wallet and track the funds as they traversed multiple exchanges. Recognizing the urgency of the situation, they collaborated with law enforcement and various exchange platforms to freeze the assets before they could be laundered. Within a mere 72 hours, Passcode Cyber Recovery successfully located the stolen USDT and initiated a comprehensive recovery process. They provided me with detailed evidence, including transaction logs and the scammer’s digital footprints, which significantly bolstered my case. Thanks to Passcode Cyber Recovery unwavering diligence and expertise, I was able to recover the full amount of 125,000 USDT.If you find yourself in a situation similar to mine, where trust has been exploited and you've fallen victim to a scam, I highly recommend reaching out to Passcode Cyber Recovery. Their team of experts specializes in cybersecurity and crypto fraud investigations, and they have a proven track record of successfully recovering stolen assets.
PASSCODE CYBER RECOVERY
WhatsApp: +1(647)399-4074
Telegram : @passcodecyberrecovery9 -
RESTORE BACK YOUR LOST USDT TODAY WITH TRUSTED EXPERTS - HIRE SALVAGE ASSET RECOVERY
I connected with someone on Instagram who appeared genuine. Our interactions began innocuously, characterised by light-heated banter and shared interests. As days morphed into weeks, we engaged in daily conversations, exchanging personal anecdotes and cultivating a sense of trust. I felt emboldened to divulge sensitive details about my life, convinced I had found a true confidant. However, this misplaced trust would soon lead to a harrowing ordeal.One fateful day, the tone of our exchanges took a sinister turn. The individual I believed I knew transformed into a menacing figure, demanding that I remit 125,000 USDT or face the exposure of my private information. A wave of panic engulfed me as I grasped the potential ramifications of her threats. Fearing the catastrophic fallout from having my personal details unveiled, I reluctantly acquiesced and transferred the funds, hoping this would quell the harassment. Yet, after the transaction, she vanished, blocking me on all platforms. It became painfully evident that I had fallen prey to a sophisticated blackmail and crypto scam.
Devastated and desperate to reclaim my stolen assets, I embarked on a quest for solutions. This search led me to Salvage Asset Recovery, a cyber security firm renowned for its expertise in crypto fraud investigations and asset recovery. Initially sceptical yet hopeful, I reached out to them for assistance.
The team at Salvage Asset Recovery sprang into action with remarkable efficiency. They commenced by meticulously analysing the blockchain transactions pertinent to my case, employing advanced forensic tools to trace the USDT transfer. Their expertise enabled them to pinpoint the scammer’s wallet and track the funds as they traversed multiple exchanges. Recognising the urgency of the situation, they collaborated with law enforcement and various exchange platforms to freeze the assets before they could be laundered. Within a mere 72 hours, Salvage Asset Recovery successfully located the stolen USDT and initiated a comprehensive recovery process. They provided me with detailed evidence, including transaction logs and the scammer’s digital footprints, which significantly bolstered my case. Thanks to Salvage Asset Recovery unwavering diligence and expertise, I was able to recover the full amount of 125,000 USDT.If you find yourself in a situation similar to mine, where trust has been exploited and you've fallen victim to a scam, I highly recommend reaching out to Salvage Asset Recovery. Their team of experts specialises in cyber security and crypto fraud investigations, and they have a proven track record of successfully recovering stolen assets. If you need help Contact Salvage asset recovery via below =
TELEGRAM---@Salvageasset
Whats App+ 1 8 4 7 6 5 4 7 0 9 62 -
SECURE YOUR BITCOIN RECOVERY WITH RAPID DIGITAL RECOVERY TRUSTED SOLUTION
Before parting with any money on a website or mobile app, it's essential to take steps to ensure the platform is legitimate. Researching the company, its founders, and its track record is key to making an informed decision. Be diligent in asking questions, reading reviews, and looking for any signs of credibility. Always remember the old adage, "If it’s too good to be true, it probably is." Scammers often prey on unsuspecting users with enticing offers that, on closer inspection, are nothing more than traps designed to steal your money. Scams can come in many forms, and some are more subtle than others. For instance, scammers may pretend to form emotional connections, feigning love or friendship to manipulate victims into giving money. In more extreme cases, they may even post inappropriate material to coerce or blackmail their victims. Regardless of the method, the impact can be both emotionally and financially damaging. If you’ve been scammed, recovering your funds can be a stressful and frustrating process. However, with the right approach, you may be able to recover your money and mitigate the damage. I found myself in such a situation, and I was able to successfully recover my funds by working with a service like Rapid Digital Recovery. They specialize in helping individuals who have fallen victim to online scams by assisting with fund recovery. The process was faster and easier than I expected, and their team made the entire experience much less overwhelming. If you suspect you’ve been scammed, the first step is to gather all relevant information about the transaction. This means taking screenshots of conversations with the scammer, which will serve as vital evidence. Next, gather any details about the scammer, such as their full name and account information. If you made the payment through a mobile app or SMS, find the transaction in your history and copy the “Transaction ID Number.” This information will be essential when filing your case with both your bank and the platform where the scam took place. Once you’ve gathered your evidence, contact your bank’s e-fraud department immediately. Most banks have specialized teams for online fraud. Provide them with all the necessary details, including screenshots and transaction IDs. It’s also wise to contact the scammer’s bank, sharing the same information, and to forward a copy of your case to Rapid Digital Recovery. Their team worked with the bank to help freeze the scammer’s account, preventing further losses and speeding up the recovery process. Recovering funds from online scams can be daunting, but with the right steps and the help of professionals like Rapid Digital Recovery, you can significantly increase your chances of success and protect yourself from future scams. Thanks to their assistance, I was able to recover my funds and put the whole ordeal behind me.
Reach Out To Them Via
Whatsapp: +1 4.14 8.0 71.4 8.5
Website: https: // rapiddigitalrecovery. org
Email: rapiddigitalrecovery (@) execs. com
1
