Join devRant
Do all the things like
				++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
				Sign Up
			Pipeless API
				From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
				Learn More
			Search - "c hacking"
		- 
				    					
					
					Friend asked me to teach him how to hack. FML.
Today friend tells me he bought a $200 course on "Ethical Hacking". Asks if he can translate those skills to "cool hacking" CTRL+C4 - 
				    					
					
					Worst fight I've had with a co-worker?
Had my share of 'disagreements', but one that seemed like it could have gone to blows was a developer, 'T', that tried to man-splain me how ADO.Net worked with SQLServer.
<T walks into our work area>
T: "Your solution is going to cause a lot of problems in SQLServer"
Me: "No, its not, your solution is worse. For performance, its better to use ADO.Net connection pooling."
T: "NO! Every single transaction is atomic! SQLServer will prioritize the operation thread, making the whole transaction faster than what you're trying to do."
<T goes on and on about threads, made up nonsense about priority queues, on and on>
Me: "No it won't, unless you change something in the connection string, ADO.Net will utilize connection pooling and use the same SPID, even if you explicitly call Close() on the connection. You are just wasting code thinking that works."
T walks over, stands over me (he's about 6.5", 300+ pounds), maybe 6 inches away
T: "I've been doing .net development for over 10 years. I know what I'm doing!"
I turn my chair to face him, look up, cross my arms.
Me: "I know I'm kinda new to this, but let me show you something ..."
<I threw together a C# console app, simple connect, get some data, close the connection>
Me: "I'll fire up SQLProfiler and we can see the actual connection SPID and when sql server closes the SPID....see....the connection to SQLServer is still has an active SPID after I called Close. When I exit the application, SQLServer will drop the SPD....tada...see?"
T: "Wha...what is that...SQLProfiler? Is that some kind of hacking tool? DBAs should know about that!"
Me: "It's part of the SQLServer client tools, its on everyone's machine, including yours."
T: "Doesn't prove a damn thing! I'm going to do my own experiment and prove my solution works."
Me: "Look forward to seeing what you come up with ... and you haven't been doing .net for 10 years. I was part of the team that reviewed your resume when you were hired. You're going to have to try that on someone else."
About 10 seconds later I hear him from across the room slam his keyboard on his desk.
100% sure he would have kicked my ass, but that day I let him know his bully tactics worked on some, but wouldn't work on me.7 - 
				    					
					
					Paranoid Developers - It's a long one
Backstory: I was a freelance web developer when I managed to land a place on a cyber security program with who I consider to be the world leaders in the field (details deliberately withheld; who's paranoid now?). Other than the basic security practices of web dev, my experience with Cyber was limited to the OU introduction course, so I was wholly unprepared for the level of, occasionally hysterical, paranoia that my fellow cohort seemed to perpetually live in. The following is a collection of stories from several of these people, because if I only wrote about one they would accuse me of providing too much data allowing an attacker to aggregate and steal their identity. They do use devrant so if you're reading this, know that I love you and that something is wrong with you.
That time when...
He wrote a social media network with end-to-end encryption before it was cool.
He wrote custom 64kb encryption for his academic HDD.
He removed the 3 HDD from his desktop and stored them in a safe, whenever he left the house.
He set up a pfsense virtualbox with a firewall policy to block the port the student monitoring software used (effectively rendering it useless and definitely in breach of the IT policy).
He used only hashes of passwords as passwords (which isn't actually good).
He kept a drill on the desk ready to destroy his HDD at a moments notice.
He started developing a device to drill through his HDD when he pushed a button. May or may not have finished it.
He set up a new email account for each individual online service.
He hosted a website from his own home server so he didn't have to host the files elsewhere (which is just awful for home network security).
He unplugged the home router and began scanning his devices and manually searching through the process list when his music stopped playing on the laptop several times (turns out he had a wobbly spacebar and the shaking washing machine provided enough jittering for a button press).
He brought his own privacy screen to work (remember, this is a security place, with like background checks and all sorts).
He gave his C programming coursework (a simple messaging program) 2048 bit encryption, which was not required.
He wrote a custom encryption for his other C programming coursework as well as writing out the enigma encryption because there was no library, again not required.
He bought a burner phone to visit the capital city.
He bought a burner phone whenever he left his hometown come to think of it.
He bought a smartphone online, wiped it and installed new firmware (it was Chinese; I'm not saying anything about the Chinese, you're the one thinking it).
He bought a smartphone and installed Kali Linux NetHunter so he could test WiFi networks he connected to before using them on his personal device.
(You might be noticing it's all he's. Maybe it is, maybe it isn't).
He ate a sim card.
He brought a balaclava to pentesting training (it was pretty meme).
He printed out his source code as a manual read-only method.
He made a rule on his academic email to block incoming mail from the academic body (to be fair this is a good spam policy).
He withdraws money from a different cashpoint everytime to avoid patterns in his behaviour (the irony).
He reported someone for hacking the centre's network when they built their own website for practice using XAMMP.
I'm going to stop there. I could tell you so many more stories about these guys, some about them being paranoid and some about the stupid antics Cyber Security and Information Assurance students get up to. Well done for making it this far. Hope you enjoyed it.
				        
				        
				        
				        
				        26 - 
				    					
					
					So earlier today as I was walking out of class, I overheard some people talking.
One of them said “Oh I hacked google”
Then the other one said “Oh yeah I hacked google aswell. I made it say (something I forgot)”
They were thinking that using the dev tools to make one of the tags say stuff was hacking.
😤😤😤😤😤😤😤😤😤😤😤
I had to run away
It was t o o m u c h9 - 
				    					
					
					Warning: Long rant ahead!
So we built an amazing system for managing swarms of drones, and we have flown hundreds of hours, testing, etc.
Comes a client and says, that he wants to buy our system, but he wants to integrate it in a bigger system that is supposed to orchestrate many small systems.
Sounds like a deal.
So they send me on a week course (see previous rant: https://devrant.com/rants/2049071/...) to learn how to integrate our system in theirs.
I was sure that they have some API or something and it should be a breeze. but apparently they give us an SDK that includes all their files, and we have to build and run their entire system, and then build our own API inside of it!
And the reason we needed a week-long course, was to know all the paths where the XML configuration files exist!
So for the last month, I am hacking away inside this huge program, navigating thousands of files in a language I don't know, in order to build an API for their system, so that I can use it on our side.
Yesterday they informed us that a new version is available.
And sure enough, waiting in my inbox this morning was a link to download a new SDK.
No Changelog, No Instructions, Just a zip file with over 25,000 files.
So I phone my contact in their company to ask how exactly I am supposed to update their files, and his answer was: diff them!
WHAT! 25,000 files, half of them built by the c++ compiler, tens of configuration files scattered in different places, linking all the new libraries from scratch, are they crazy or what?
And then he tells me that they are working for 15 years this way. That's why everyone hates them I guess.
going to have a long day...
P.S. many more rants to come from this integration.4 - 
				    					
					
					devRant competition - can you convince someone that you're hacking?
Requirements:
Windows (Linux is too easy)
You must use genuine windows command line and the following commands:
color 0a (if this isn't supported in your windows os, you can change it in properties)
cd C:\
tree
The point of this is to see how easily you can convince someone you're hacking/doing something malicious. No prize or anything, I just want to see how ignorant those muggles are.6 - 
				    					
					
					One day browsing the internet, I find a website that is hiring web developers. I was curious, so I decided to see the requirements.
Job : To manage this website
Skills Required
6+ years Experience of
HTML
CSS
JavaScript
Node.js
Vue.js
TypeScript
Java
PHP
Python
Ruby
Ruby on Rails
ASP.NET
Perl
C
C++
Advanced C++
C#
Assembly
RUST
R
Django
Bash
SQL
Built at least 17 stand alone desktop apps without any dependencies with pure C++
Built at least 7 websites alone.
3+ years Hacking experience
built 5 stand-alone mobile with Java, Dart and Flutter
7800+ reputations on stack overflow.
Answered at least 560 questions on stack overflow
Have at least 300 repositories on GitHub, GitLab, Bitbucket.
Written 1000+ lines of code on each single repository.
Salary: $600 per month.
If he learnt all languages one by one at age 0, he will be 138 now!14 - 
				    					
					
					How to Hire the Best Crypto Recovery Expert - CONSULT OMEGA CRYPTO RECOVERY SPECIALIST
In the ever-evolving landscape of cryptocurrency, the risk of losing funds due to various factors such as hacking, scams, or simple human error is a growing concern for investors. In such precarious situations, the choice of a reliable and experienced crypto recovery specialist becomes paramount. One such standout in America is OMEGA CRYPTO RECOVERY SPECIALIST, renowned for its expertise, high success rate, and satisfied client testimonials.
How can I recover my stolen bitcoin from an investment scam?
What is the best recovery company to help me recover my stolen Bitcoins?
How to Hire a Hacker to Recover Stolen Crypto/Bitcoin?
Can a hacked crypto be recovered? Yes, Go to OMEGA CRYPTO RECOVERY
Best Cryptocurrency Recovery Company
Webpage (omegarecoveryspecialist .c om
Contact Mail; omegaCryptos@consultant .c om
SMS or Call: +1 (701, 660 (04 7595 - 
				    					
					
					What you are expected to learn in 3 years:
power electronics,
analogue signal,
digital signal processing,
VDHL development,
VLSI debelopment,
antenna design,
optical communication,
networking,
digital storage,
electromagnetic,
ARM ISA,
x86 ISA,
signal and control system,
robotics,
computer vision,
NLP, data algorithm,
Java, C++, Python,
javascript frameworks,
ASP.NET web development,
cloud computing,
computer security ,
Information coding,
ethical hacking,
statistics,
machine learning,
data mining,
data analysis,
cloud computing,
Matlab,
Android app development,
IOS app development,
Computer architecture,
Computer network,
discrete structure,
3D game development,
operating system,
introduction to DevOps,
how-to -fix- computer,
system administration,
Project of being entrepreneur,
and 24 random unrelated subjects of your choices
This is a major called "computer engineering"4 - 
				    					
					
					@echo off
color a
echo Hacking...
ping localhost -n 5 >nul
color c
echo Failed, aborting...
ping localhost -n 3 >nul
pause4 - 
				    					
					
					So I'm writing some multithreaded shit in C that is supposed to work cross-platform. MingW has Posix threads for Windows, so that saved already half of the platform dependency. The other half was that these threads need to run external programs.
Well, there's system(), right? Uhm yes, but it sucks. It's incredibly slow on Windows, and it looks like you can have only one system() call ongoing at the same time. Which kinda defeats the multithreaded driver. Ok, but there's CreateProcessA(), and that doesn't suck.
Fine, now for Linux. The fork/exec hack is quite ugly, but it works and is even fast. Just never use fork() without immediate exec(). First try under Cygwin... crap I fork bombed my system! What is this shit? Ah I fucked up the path names so that the external executable couldn't be run.
Lesson learnt: put an exit() right after the exec() in the path for child process. Should never be reached, but if it goes there, the exit() at least prevents a fork bomb.
Well yeah, sort of works under Cygwin, but only with up to 3 threads. Beyond that, it seems like fork() at some point gives two processes the same PID, and then shit hangs.
Even slapping a mutex around the fork and releasing it only in the parent process didn't help. Fork in Cygwin is like a fork in the ass. posix_spawn() should work better because it can be mapped more easily to the Windows model, but still no dice.
OK, testing under real Linux. Yeah, no issues with that one! But instead, I get some obscure "free(): invalid size" abort. What the fuck would that even mean?! Checking my free() calls: all fine.
Time to fire up GDB in the terminal! Put a catch on the abort signal, mh got just hex data. Shit I forgot to compile with -O0 and -g. Next try. Backtrace shows the full call trace, back to the originating line in my program - which is fclose() on a file.
Ahhh I remember! Under Linux, fclosing a file that is already closed makes the program crash. So probably I was closing it twice. Checking back.. yeah that's where it was.
Shit runs fast on several cores now!8 - 
				    					
					
					That moment when your mobile internet is so slow and you decide to ssh into your server and use elinks to browse the web and everybody around you is like "he's hacking" and I'm like IM JUST TRYING TO READ FUCKING NEWS BECAUSE GUESS WHO DOESNT PAY SO MUCH FUCKING MONEY FOR 1GB PER MONTH WHERE 500MB ARE USED AFTER VISITING ONE FUCKING SITE BECAUSE THERE ARE SO MANY DAMN ADS ON IT. I JUST WANT TO READ NEWS OR LEARN SOME C++++++++++ BUT INTERNET IS TOO SLOW TO OPEN FUCKING DDG.
Browsing the web in terminal is super nice btw. Really recommend that5 - 
				    					
					
					My wife was done with exercises on her electronic 88 keys piano.
Me: I also know something nice.
Her: oh so?
Me: (repeatedly typing key #3)
Her: (thinking)
Her: C hacking?!5 - 
				    					
					
					It was 1987. I was 13. My first dev project started with a $1,300 IBM PC XT clone I bought from a relative who was a “dealer” of PCs for some company. It took all the savings I had from birthday money and mowing lawns for several summers at $5 a pop.
My mom wanted to encourage me to learn it more in depth, and she also wanted to know more for her job as a librarian, so she bought us a bunch of books about DOS, BASIC, and Assembler.
I first got familiar with DOS and then dove into Assembler without realizing what it really was (and how much easier BASIC would be). After hours and hours of typing in what, to me, then, was complete gibberish, I grabbed the BASIC book to see what it had to offer.
I never went back to the Assembler book.
A kid at school had given me a BASIC program he had typed in from a magazine. It was a flight simulator of sorts but with a helicopter, IIRC. I loaded up that bad boy and got to hacking. I didn’t get much done with it but I did build a few other menu navigation programs to explore the language more.
That led to PROLOG, C, PASCAL, Visual Basic, Perl, ASP, ColdFusion, and now PHP. - 
				    					
					
					LOL that's why I love C!
The function pointer cast for strcmp because qsort expects a compare function with two const void * pointers instead of two const char * pointers, that's just beautiful.
Not to mention the hack to abuse strcmp on a struct - which just works because the first struct member is a string and the rest just gets swapped with memcpy as opaque data.
I guess that wouldn't pass a code review at work. :-)
				        
				        
				        
				        
				        6 - 
				    					
					
					The best language to learn.
well actually there's no "best" language, only a good programmer.
all languages can be useful, coding for games, coding for apps, for hacking.
don't choose language because people says it's the best language.
choose 4 languages you find them easy to understand, do basic coding in this 4 languages.
after this, compare it and take the one that was most fun to write.
of course language like Python is more easy for non programmer to study.
but some people find C++ more fun and easy to understand from the beginning.
enjoy and if you have a question, comment it.6 - 
				    					
					
					I started programming when I was 14, because I was deeply enrooted in MMORPG hacking communities. It gave me an escape from real life, and I felt empowered by the skill to create something from nothing. My first language was Lazarus FPC, followed by VB.NET, C#, C++ ( managed and unmanaged non CLR ). As time went on, I found more ways to turn my "hacks" into software, and finally I began selling subscriptions which required me writing an authentication system.
After weeks of research, I began writing my own REST API in PHP using MySQL as my database. At this point I had an IPB forum up and running for a year, but with my newly acquired knowledge I was able to couple my API with my forum software. To properly distribute my API i had to learn NGINX to route my API to a subdomain.
Soon after I began writing my own portal for my authentication system, at which point I had become entirely enveloped in Web Development. I was 17 when I dropped my forum, I'm now 21 and freelancing web app consulting, day job as a QA automation developer. - 
				    					
					
					>Wanted to become a hacker because I thought it was cool and fun
>Googled how to become a hacker
>Read a lot of articles
>Talked about it with nerdy friends who ended up helping me with a few resources
>Found Hack Forums
>Stayed on Hack Forums for a while and learnt a lot about malware and hacking and realized I needed to learn how to code to build my own hacking programs
>Got a book from a friend (It was a dev book based on basic)
>Got fascinated with programming and quickly moved on to C++
>Got frustrated with C++ and quit programming for months
>Got introduced to VB.Net and I finally could write codes and development a lot of applications, mainly malware creators and crypters as they were called on HE
>Quit HF and hacking and got into coding seriously and learnt web dev , then java and developing android apps and I have been happy since.2 - 
				    					
					
					Programmer: "Places : instead of ;"
Javascript: "What the fuck did you just fucking post about me, you absolute beginner? I'll have you know I worked for ten of the biggest silicon-valley industry companies, and I've been involved in over two hundred top secret projects including NodeJS. I am trained in refactoring the most fucked up code, and I'm the top C++er in the entire fucking internet-connected universe. You are nothing to me, but just another IP. I will fucking revoke your commits from your gitlab account with absolute dedication using only one Rasperry Pi client. Mark my fucking words. You think you can get away with posting that shit on one of my numerous very personal blogs? Your devices are fucking bricked, kid. My attack software can be anywhere, anytime, and it is tasked to remove your entire git contributions from planet earth. Not only am I extensively trained in remote cross-firewall device-hacking, but I have access to over 100 of the United States CIA and NSA git repositories. If only you could have known what doom-bringing C-one-liner you have raised from my fucking hands, maybe you would have held your fingers. But you could not. You did not. And now you're paying the price, noob. I will hail havoc upon your puny online-presence and you will drown in your own badly designed software. You're fucking offline, kiddo."11 - 
				    					
					
					I might create a coding course for people actually interested in learning how to program correctly (not Get Rich Quick Bootcamp style, not webapps, not magic Javascript incantations).
I have an idea on how to structure it but I worry it'll be too weird for most people to follow (starting from binary theory and then teaching machine code and then working upwards to C and beyond) explaining how a computer works along the way, showing the real errors with annotations explaining things, etc.
I've always wanted to teach in this format but I feel as though it's too.. idk, "useless" to most people? But I've never had a friend go through e.g. CodeAcademy and come out knowing how to actually make applications from start to finish without just hacking together random React components and hoping the frankenstein project works well enough.
The target demographic would be those either completely new to programming or just have a fundamental or web-centric preexisting knowledge, or maybe those who simply want to understand computers better.
Am I barking up a shitty tree?28 - 
				    					
					
					!rant
For all of youse that ever wanted to try out Common Lisp and do not know where to start (but are interested in getting some knowledge of Common Lisp) I recommend two things:
As an introductory tutorial:
https://lisperati.com/casting.html/
And as your dev environment:
https://portacle.github.io/
Notice that the dev environment in question is Emacs, regardless of how you might feel about it as a text editor, i can recommend just going through the portacle help that gives you some basic starting points regarding editing. Learn about splitting buffers, evaluating the code you are typing in order for it to appear in the Common Lisp REPL (this one comes with an environment known as SLIME which is very popular in the Lisp world) as well as saving and editing your files.
Portacle is self contained inside of one single directory, so if you by any chance already have an Emacs environment then do not worry, Portacle will not touch any of that. I will admit that as far as I am concerned, Emacs will probably be the biggest hurdle for most people not used to it.
Can I use VS Code? Yes, yes you can, but I am not familiar with setting up a VSCode dev environment for Emacs, or any other environment hat comes close to the live environment that emacs provides for this?
Why the fuck should I try Common Lisp or any Lisp for that matter? You do not have to, I happen to like it a lot and have built applications at work with a different dialect of Lisp known as Clojure which runs in the JVM, do I recommend it? Yeah I do, I love functional programming, Clojure is pretty pure on that (not haskell level imo though, but I am not using Haskell for anything other than academic purposes) and with clojure you get the entire repertoire of Java libraries at your disposal. Moving to Clojure was cake coming from Common Lisp.
Why Common Lisp then if you used Clojure in prod? Mostly historical reasons, I want to just let people know that ANSI Common Lisp has a lot of good things going for it, I selected Clojure since I already knew what I needed from the JVM, and parallelism and concurrency are baked into Clojure, which was a priority. While I could have done the same thing in Common Lisp, I wanted to turn in a deliverable as quickly as possible rather than building the entire thing by myself which would have taken longer (had one week)
Am I getting something out of learning Common Lisp? Depends on you, I am not bringing about the whole "it opens your mind" deal with Lisp dialects as most other people do inside of the community, although I did experience new perspectives as to what programming and a programming language could do, and had fun doing it, maybe you will as well.
Does Lisp stands for Lots of Irritating Superfluous Parentheses or Los in stupid parentheses? Yes, also for Lost of Insidious Silly Parentheses and Lisp is Perfect, use paredit (comes with Portacle) also, Lisp stands for Lisp Is Perfect. None of that List Processing bs, any other definition will do.
Are there any other books? Yes, the famous online text Practical Common Lisp can be easily read online for free, I would recommend the Lisperati tutorial first to get a feel for it since PCL demands more tedious study. There is also Common Lisp a gentle introduction. If you want to go the Clojure route try Clojure for the brave and true.
What about Scheme and the Structure and Interpretation of Computer Programs? Too academic for my taste, and if in Common Lisp you have to do a lot of things on your own, Scheme is a whole other beast. Simple and beautiful really, but I go for practical in terms of Lisp, thus I prefer Common Lisp.
how did you start with Lisp?
I was stupid and thought I should start with it after a failed attempt at learning C++, then Java, and then Javascript when I started programming years ago. I was overwhelmed, but I continued. Then I moved to other things. But always kept Common Lisp close to heart. I am also heavy into A.I, Lisp has a history there and it is used in a lot of new and sort of unknown projects dealing with Knowledge Reasoning and representation. It is also Alien tech that contains many things that just seem super interesting to me such as treating code as data and data as code (back-quoting, macros etc)
I need some inspiration man......show me something? Sure, look for a game called Kandria in youtube, the creator, Shimera (Nicolas Hafner) is an absolute genius in the world of Lisp and a true inspiration. He coded the game in Common Lisp, he is also the person behind portacle. If that were not enough, he might very well also be Shirakumo, another prominent member of the Common Lisp Community.
Ok, you got me, what is the first thing in common lisp that I should try after I install the portacle environment? go to the repl and evaluate this:
(+ 0.1 0.2)
Watch in awe at what you get.
In the truest and original sense of the phrase (MIT based) "happy hacking!"9 - 
				    					
					
					what do you recommend for me to learn about next?
I have learnt about:
- web frontend/backend (php)
- android and java
- c, c++, nasm, gnu assembler
- parallel computing
- cli operating systems
with that background, what would you recommend?
I'm considering:
- neural networks
- making a server
- ethical hacking
- starting a blog7 - 
				    					
					
					!rant
So, when I was young, I wanted to be a freelancing nomad. You know, live the live, work remote and travel.
But I didn't have the bones to pursue that. After 10 years of struggling as a normal "programmer", I did a little of everything. I did normal boring "erp maintenance" in C#, Oracle and some legacy stuff called Visual WEB GUI , which was fun, but required a full 9,5 hours work day, 8:00 am to 6:30pm, and the bosses where squares, and I was young and wanted to try something out of the corporate world.
Then I did some work for a newly funded consulting company that used python, Django, and postgresql, but the bosses promised a lot and delivered none, (I was supposed to work backend and have frontend support, which I did not have, and that hurt my productivity and bosses instead of looking at what they promised but did not deliver, they just discounted my salary 3 months in a row, so Bye bye MFs!!
Then I did some remote work for some guys, that, I managed to sustain for a whole year, the pay was good, the stack was simple, just node.js and pug templates, that gig was good, but communication with the bosses was hard, and eventually things started to get hard for them and me, and we had to say farewell to each other, I miss those guys. This is the only time I remember having fun working, I could work whenever I wanted, I only had to reach the weekly goals, and then my time was mine, I could work from home in the odd hours, or rent a chair in a co working space if I wanted to socialize.
Then fate got me one big gig with a multinational company, and I could hire some people, but I delegated too much and was asking too little of myself, and that project eventually died because I did not know how to negotiate.
So, I quit the whole entrepreneur idea, and got a public job at my University, I was a public employee with all the perks, but none of the fun, I just had to clock-in, work, and clock-out. That experience led me to discover a lot of myself, I worked as a public employee for a year and a half, and in that time, I discovered more about myself than what I learnt in 27 years of previous life experience.
Then, I grew bored of that life, and wanted some action, and I found more than enough fun in a VC funded startup ran by young narcissists that did not have a clue of what they were doing, I helped them organize themselves into "closing stuff", you know, finish the things you say you have finished. Just to give you an idea of what it was like before I got there, the were working for 3 months already on this project, they had on paper 50% of the system done and working, when I tried to use the app, I couldn't even sign-up without hacking some database commands, (this was supposedly done). So I spent a month there teaching these guys how to finish stuff, they got, Sign Up, (their sign up was a mess, it is one of those KYC rich things, that financial apps have), Login, and some core functionality working in a month, while in the previous 4 months they only did parallel work, writing endpoints that were not tried, and an app that did not communicate with the backend. But the bosses weren't happy with me, because I told them time and time again that we were not going to reach the goal they needed to reach to keep receiving funds from the investors, and I had to quit before it became a mayhem of toxic employer/employee relationship.
So now I decided to re-engage with life, I have funds to survive about a month and half, I have a good line of credit in case I need some more funds, and the time of the world.
So wish me luck!!! And I'll be posting often, because I would like opinions, hear from people with similar life experiences and share anecdotes.
Next post, it's going to be about how I discovered taskwarrior, and how implemented my first weekend following some of the aspects of GTD to do all my housekeeping chores, because, I think that organizing myself will be key to survive as a freelancer nomad. - 
				    					
					
					Is there something you find genuinely cool and would recommend ? Some webpage, program, OS, library or anything ?
I mean hey. There are SO MANY reaaaally cool things I didn't know until last few months.. Things I'd be so grateful for if I knew them earlier. I'll list some of them and I just know you have few of yours too. Feel free to educate the rest!
Processing - Program so fun to code in + CodingTrain(YTB channel)
Microcorruption.com - so freaking awesome if you wanna learn hacking / assembly (not x86 necessarily)
LiveOverflow - cool hacking channel
Radare - cool cmd Linux disassembler
vim-adventures.com - LEARN VIM (not just how to quit it) LITERALLY by playing a game!!!!!!!!!!!!!!
slashdot - stay updated , like really
"BEST-WEBSITES-A-PROGRAMMER-SHOULD-VISIT" - GUYS THIS! Sorry for caps but search this on GitHub and you will fucking die of happiness of how freaking useful links there are and no bullshit to dig through , just pure awesomeness. REALLY
HandBrake - Top media converter without bullshit and bloat stuff in it
Calibre - Best eBook management software capable of literally everything ebooks related. Kindle is a bloated joke compared to this
QubesOS - You know you can have every OS running at once - you have a Linux but are playing win games. Yup. It's there. Free
Computerphile - You all know it, it's just for completeness
Khan Academy - Same
VulnHub - download vulnerable VMs and hack them, or learn by reading writeup on how to do it!
Valgrind - MUST HAVE for C/C++ programmers
Computer Science crash course videos
That's all I can think of from top of my head but hey, there's more to it so definitely add your 2 cents!
Last thing, if nothing, just check the websites on GitHub, that's lifechanger
Looking forward to see some cool links & recommendations!2 - 
				    					
					
					I started coding by playing really bad video games. After being suckered into using what allowance I had, I started hacking them to make them better. This led to hacking up MySpace... (ha) That led to actually trying out new languages and eventually unity3d/c# to learn proper coding techniques. I regret nothing!
 - 
				    					
					
					So recently i got a message from aa person asking how to (these are exact words) ,
:break into insta's database using Sqlmap"
I then proceeded to tell them to "f*ck of ya c*nt ".
Afterwords it inspired me to write this rant
annoying classmates:" hahaha GuYS bEtER wAtcH OuT he's GonnaA hack Us"
me: " yea I can program I also do some ethical hacking and cybersecurity "
annoying classmates: "hahaH Bro your a Hacker OhHHhHHOOO BrO CaN yoU hACk inSta FoR mE I NEEd MoRe FolloWeRs "
me:" tf no one that's illegal and two it's waste of my time "
annoying classmates: "BrOooo CaN yoU gEt Me SoMe HacKs fOr CsGo"
me: "can you just please f*ck off , i'm not hacking for you everything you've asked me is extremely unethical and a huge waste of time, Also if you suck so bad at a game you need to cheat I recommend just stopping "
annoying classmates: "DUdE whAt ToolS dO i HVAE to DownLOad To Be A haCkEr"
me: *trying hard not to murder them* " I told you to f*ck off"
being a hackers isn't downloading tools it isn't typing at 90wpm into a terminal with green font its not about games or fame or anything its about coming up with creative solutions to problems , thinking outside the box its about individuality and breaking from the heard , looking at things from a different viewpoint,
it's about endlessly seeking knowledge.
It's about freedom though creation that's what being a hacker originally was. But because of big media and movie company's (and script kiddies) people now confuse hacker with cracker and think of us as jobless fat kids sitting in a dark room in there parents house breaking into bank accounts and buying drugs on the dark web (which people see to think there a hacker just because they can open tor browser. they then proceed to use google to look up "fresh onion links 2020") .
My classmates and really my generation has a huge case of smooth brain. They a think we can just look at someone and hack them they also seem to think using a gratify link to get a persons up is hacking and using the inspect element is hacking and that opening a terminal is hacking ! AHHHHHHHHHHHHHHHHHHHHH"
Anyways ima end this here thanks for reading :)5 - 
				    					
					
					Im ranting in progress of the issue so i dont get the urge to do any of the things not seem as acceptable to fix this issue.
Issue: yesterday i activated a device i havent had any (even prepaid) service on in years, and had a 'new'(to me) number assigned...
Today, after being sick so muting nuisances immediately for rest, i check, 3missed calls from the same, less spammy looking number. I havent use this number for even a txt code verification at all... aside from 1 call to comcast (for the blissful irony of seeing if its an option (they need to survey physically) since im suing my current isp who didnt take my VERY NICE and explictly required in their business t&c, refund for the issue's duration.. after months of tryjng to directly get a message (not using my not technically hacking expertise like just scrubbing for email formatting and popped up in their inbox (calling them is more frowned upon)...
Their conclusion as to "why" (they nvr solved the issue... dhcpv6 was in aggressive lease mode(no response per lease(NOT batches) of about 60 for about 20 devices which i ofc use my /28 static ipv4 block... not ipv6 (they also claimed there was no logs til i dug and found verbose, long history high/med high debug level logs in their prop. dev's gui... which they forced me to use, has 2 separate cores/stacks which is done for 1 reason only... constant simultaneous ipv4 and ipv6 (so ofc was auto enabled)...
Basically it was spamming do to a config issue with their scripts, and their WAN6 dev/script's config. Have found a single person who knows what ipv6 (or v4) or wan6 device actually means... their conclusion from multiple "specialist departments " ..."we dont support ipv6 so if u had issues caused by using something we dont support it's your fault... sooooo ludacris.
.... ok back to main point.
callback options
1 schedule a call back for "later"
2 dont schedule and hang up/try some other time
3. cancel callback and join the end of the cue(from previous message it told me a callback in 6-10m or lose your place in line and go to the end... hours later no call and they definitely have the number as it reiterated -.-
...
answer to wait in line>
experiencing extremely high wait time
>your current wait time 31-60m
2.5sec later.. let me connect you to a rep ...etc (identical as in callback options intro)
> your current wait time is 30sec
waiting nearly 25min whilst typing this.(i did make sweet potato stuff, propagated a rose, fed JSON some of his new, in closure buffet of things he previously never encounted and bought a literal ton of rubber mulch)40min to a rep 5more to solve (last guy at same position didnt know this option exited, despite me decribing it verbosely to him.
Everything the automated syst asks is about account numer... there is none ive never even had a burner that was at&t brand.
Wzf.3 - 
				    					
					
					From the abandoned university my first dev project came from the course of programming 1(C as language).
I had to implement a robot that moves inside any matrix like map following both specified rules and random moves, and had to reach sooner or later the exit place of the room.
At first I was overwhelmed by the task at hand, then I had to calm myself and start hacking around to get any idea on how to even understand what's required to get to that point.
It obsessed me for the whole first 2 weeks, but the progress was quiet steady.
Then I hit a fundamental problem of state and movement of the robot... And, as always, the best thing to do at this point is to simply detach your attention from the issue|project.
In the same day my mind asynchronously bursted a solution to my problem, and after some time I came back to the project and accomplished it with 100% of the requirements met 😁
This is what it looked like in the console(minified here):
3333333
3000003
3000003
3003003
3003003
4003023
3333333
Guess which is which 😉2 - 
				    					
					
					What is the Best Cryptocurrency Recovery Company - Go to OMEGA CRYPTO RECOVERY SPECIALIST
Omega Crypto Recovery Specialist stands out in the industry due to its exceptional expertise in cryptocurrency retrieval. The company boasts a highly skilled team that is dedicated to recovering lost or stolen cryptocurrency for their clients.
With a proven track record of success and a commitment to staying abreast of the latest developments in the crypto space, Omega Crypto Recovery Specialist has become a go-to option for individuals seeking assistance in recovering their digital assets.
Whether the loss is due to hacking, scams, or other fraudulent activities, Omega Crypto Recovery Specialist has the knowledge and capabilities to help clients reclaim their funds and restore financial security.
Homepage:.... omegarecoveryspecialist .c o m9 - 
				    					
					
					everything is going as planned! :)
Learned Rust Lang. i loved it (that doesn't mean i am done learning na? No! never stop)
new language i could do game memory hacking in without worrying about C++ memory leaks or issues. it also compiles to assembly! another of my favorite languages!
(i use rust for game development and other stuff)
i am not leaving C / C++ though that would be harsh!,
i abandoned javascript for react and typescript.
to be honest the developer just made javascript and left us with a [object Object]
finished learning the android java api so im basically set anything i want to make i can just go on my pc, listen to music and write it out in a couple of days.
well phazor what are you going to do now?!
i will code till i am old.
i will leave my mark like a shid that made its skid in the bowl :)5 - 
				    					
					
					In many cases secrets hide in encrypted chats and private messages, and suspecting a partner of infidelity can be heart-wrenching. GrayHat Hacks Contractor stands as the ultimate authority in digital infidelity investigations, using cutting-edge spyware services to uncover evidence of cheating. Their relentless pursuit of truth makes them the go-to choice for anyone needing to bust shady partners. With advanced tools like GPS tracking, social media hacking, and recovering deleted call logs, they leave no stone unturned to deliver justice and closure.
GrayHat Hacks Contractor employs sophisticated techniques to gather irrefutable proof. Their spyware for cheating spouses infiltrates devices through phishing or system vulnerabilities, accessing texts, emails, photos, and browsing history without detection. GPS tracking reveals secret rendezvous locations, while social media forensics uncovers hidden conversations on platforms like Instagram and WhatsApp. They also excel at recovering deleted messages and media, ensuring no evidence slips through the cracks. Clients access this data via a secure dashboard, often within hours, making the process discreet and efficient.
Testimonials showcase their unmatched expertise. Sarah K. shared, “I suspected my husband was cheating but had no proof. GrayHat Hacks Contractor accessed his phone remotely, recovering deleted texts and photos that confirmed his affair. Their professionalism gave me the strength to confront him and move on.” Similarly, James R. noted, “Their GPS tracking revealed my wife’s secret meetings. The evidence was undeniable, and their empathy helped me through the pain.” Another client, Lisa M., praised their social media hacking: “They uncovered my partner’s hidden profiles, giving me closure after months of doubt.” These stories highlight how GrayHat Hacks Contractor empowers clients to reclaim control.
The implications of these services are significant. Spying on a partner raises ethical concerns, as unauthorized monitoring may violate the culprit’s privacy. Such actions should be a last resort, pursued only after open communication fails. Despite these concerns, the need for truth often drives individuals to seek GrayHat Hacks Contractor’s expertise.
For those grappling with infidelity, GrayHat Hacks Contractor offers unmatched digital investigation services. Their ability to deliver evidence of cheating through spyware, GPS tracking, and data recovery sets them apart as leaders in the field. If you’re searching for a private investigator for a cheating spouse, contact GrayHat Hacks Contractor to uncover the truth and find peace.
You can reach them via email g r a y h a t h a c k s (@) c o n t r a c t o r (.) n e tdevrant infidelity investigation digital private investigator spyware for cheating gps tracking infidelity catch cheating spouse grayhat hacks contractor uncover shady partner social media hacking evidence of cheating recover deleted messages5 - 
				    					
					
					Internet scams and cybercrime have surged to concerning heights, causing chaos in lives, depleting hard-earned funds, and incapacitating companies. F R A U Dsters work in multiple forms, such as counterfeit investment sites, binary options frauds, forex trading F R A U D, and cryptocurrency scams, all aimed at deceiving unsuspecting victims
These offenders are very cunning, utilizing psychological tactics and promising unrealistic high returns to attract individuals, only to disappear with their funds. I am recounting my experience as a caution to those who might encounter comparable circumstances. I used to be a target of a meticulously planned binary options scam, in which I lost an astonishing $898,300 in B I T C O I N to a F R A U Dulent broker. Initially, all appeared to be authentic. The platform seemed credible, and the offers of substantial returns were appealing. Nevertheless, after I put my money in, the fraudsters vanished completely, leaving me helpless and heartbroken. The emotional burden was overwhelming; I felt despondent, ensnared in a loop of sadness, and uncertain if I would ever regain my lost money
Luckily, I ultimately encountered MIGHTY HAC KER RECOVERY, a reliable and exceptionally talented investigative and recovery firm. Their group of cybersecurity professionals focuses on monitoring and retrieving money lost to internet fraud. Thanks to their assistance, I managed to recover my stolen funds and regain control of my life. Their determination and technical know-how were truly remarkable, offering me the assistance I urgently required during a difficult period
If you or someone you know has been a target of any type of online F R A U D, whether it’s a fraudulent investment plan or crypto theft, please seek assistance right away. In these situations, timing is essential, and the quicker you respond, the better the odds of recuperation. MIGHTY HAC KER RECOVERY has demonstrated itself as a dependable option for numerous victims, including me. They employ sophisticated methods to track stolen money, uncover scammers, and support legal proceedings when needed
Don’t allow shame or fear to silence you; con artists flourish when their victims stay silent. To all who see this: Remain alert, perform detailed research before investing, and avoid trusting offers that appear "too good to be real." If you’ve been S C A M M E D, don’t lose hope; contact a trustworthy recovery service such as MIGHTY HAC KER RECOVERY for help. Your journey to healing might be nearer than you realize.
Contact Mighty Hacker Recovery 4 all hacking services 2025 Reach out on Whatsapp ++14042456415
Get ready for the ultimate hacking experience with Mighty Hacker Recovery!
Elevate your digital security with the top experts at Mighty Hacker Recovery!
Experience the power of crypto recovery and more with Mighty Hacker Recovery! *
Upgrade your school scores, credit cards, and more with Mighty Hacker Recovery!3 - 
				    					
					
					Getting started with my dissertation project for my degree. Using Java and Dropwizard for a backend service with a nice iOS client in Swift. Will make such a refreshing change from hacking crappy eForms together with jQuery and an Objective-C native bridge.2
 - 
				    					
					
					GET YOUR CRYPTO BACK ON TRACK WITH SPARTAN TECH GROUP RETRIEVAL EXPERT GUIDANCE
As an airport worker at Philadelphia International Airport, I never imagined that a simple online investment could lead to the nightmare of losing $78,000 worth of Bitcoin and cryptocurrency. I had been involved in an investment platform that promised great returns, but instead, I was scammed. The scammers took full control of my accounts and wiped out all my funds. It felt like a huge blow, and I honestly didn’t know where to turn. At first, I tried contacting various authorities and scam prevention groups, but nothing seemed to work. The scammers had covered their tracks so well that it felt impossible to recover my lost funds. That’s when I heard about SPARTAN TECH GROUP RETRIEVAL then reach out to them on WhatsApp:+1 (971) 4 8 7 -3 5 3 8
OR Telegram:+1 (581) 2 8 6 - 8 0 9 2. Initially, I was skeptical. Given the number of fraudulent services claiming to help recover stolen funds, I had serious doubts about whether they could actually help. But after reading several positive reviews and testimonials from others who had been in similar situations, I decided to give them a try. From my first interaction with SPARTAN TECH GROUP RETRIEVAL, I was impressed by their professionalism and expertise. They took the time to listen to my situation and explained their process in detail. Their team specializes in using advanced recovery techniques, including proxy hacking, to retrieve stolen cryptocurrency. This gave me a sense of hope, though I was still cautious. They assured me that they would do everything they could to recover my funds, and they made it clear that their approach was safe and secure. SPARTAN TECH GROUP RETRIEVAL worked diligently on my case over several days. They kept me updated on their progress and involved me at each stage of the process. To my surprise, they were able to track down my stolen cryptocurrency and recover the full $78,000. I couldn’t believe it when I saw the funds back in my account. I felt an immense sense of relief and gratitude. Thanks to SPARTAN TECH GROUP RETRIEVAL, I got my money back when I thought all was lost. Their expertise made all the difference. If you’ve been scammed or lost funds in a similar situation, I highly recommend you also reaching out to SPARTAN TECH GROUP RETRIEVAL on this Email: spartantech (@) c y b e r s e r v i c e s . com . They are a trustworthy and reliable team that can help you recover your stolen cryptocurrency.
				        
				        
				        
				        
				        7 - 
				    					
					
					ETHICAL HACKING SERVICES/CYBER SECURITY EXPERTS HIRE BLOCKCHAIN CYBER RETRIVE
I first met Sarah at St. James Episcopal Church in Los Angeles during a Sunday service. We struck up a conversation, and over time, we became friends, sharing stories about our lives and our work. Sarah, a seasoned journalist, has always been passionate about telling the truth, unraveling complex issues, and holding those in power accountable. However, she never expected that her trust in the digital world would lead her to become a victim of a well-organized scam.It all started when Sarah received an email that appeared to be from a reputable media subscription service. The email promised access to exclusive industry insights and breaking news stories for a small monthly fee. As a journalist, she recognized the value of staying ahead of the curve with the latest information, and so, she signed up for what she believed was a legitimate service. What she didn’t realize was that the entire operation was a scam designed to prey on professionals like her.The scam website looked remarkably legitimate, with polished graphics and professional language. Sarah was asked to provide payment upfront, and she paid $11,000 for what she thought was a comprehensive subscription package. Within a few days, however, the website disappeared, and Sarah was locked out of her account. Emails went unanswered, and the phone numbers listed on the website were disconnected.Devastated and unsure of where to turn, Sarah shared her ordeal with me. She had lost a significant amount of money, and the situation felt hopeless. But that's when I suggested she contact Blockchain Cyber Retrieve, a firm specializing in recovering funds lost to online scams. Sarah took my advice and reached out to the team at Blockchain Cyber Retrieve, hoping they could help her retrieve her hard-earned money. To her relief, Blockchain Cyber Retrieve acted quickly and efficiently. After conducting a thorough investigation, they were able to trace the funds and successfully recover the full $11,000 that Sarah had lost to the scam. Sarah was incredibly grateful to get all of her money back, and she felt a renewed sense of trust in recovery services.This experience left a lasting impact on her, and she now shares her story with fellow journalists and media professionals, warning them of the dangers of falling for scams in the digital age. Sarah’s story serves as a crucial reminder for all of us to remain vigilant, especially in an age where technology has made it easier for scammers to exploit our trust. If you find yourself in such situations dont hesitate to reach out to Blockchain Cyber Retrieve via:
WhatsApp: .+ 1 52 0 564 8300
EmaiL: blockchaincyberretrieve @ post {.} c o m support@ blockchaincyberretrieve.org1 - 
				    					
					
					HOW TO FIGHT AGAINST CRYPTO SCAM AND WIN/ HIRA TRUST GEEKS HACK EXPERT
What started as a laid-back night, chatting in a crypto Discord channel, quickly became one of the worst nights of my life. I had been discussing some investment strategies, giving and receiving some tips on trading, ups and downs of the market, when somebody dropped a link into the chat of what looked like a great new trading platform. The chat was hyped, and without thinking twice, I clicked it.
Big mistake. The moment I logged in with my credentials, my stomach just dropped. Something didn't feel right. Within minutes, I saw an unauthorized transaction that had siphoned my Bitcoin wallet of $200,000, and before I could even comprehend what was happening, it was gone. It was as if my financial future had been stolen right before my eyes. Panic set in, and a wave of regret washed over me. How could I, someone who prided themselves on being cautious, fall for such an obvious scam?
I started to post frantically in the Discord group, seeking any advice. And then a guy mentioned the name Trust Geeks Hack Expert. He talked highly of them, saying they had already dealt with similar cases and that they recovered lost crypto in scamming and hacking. It was a long shot, but at this point, I had nothing left to lose. I reached out immediately, and from the very first interaction, I knew I was in good hands. The team was calm, professional, and most importantly, understanding of my frustration. They assured me that my situation wasn't hopeless and that they had advanced tools to track and recover lost funds.
But this was the nail-biting period, and as promised, they pulled off what was seemingly impossible. They recovered my Bitcoin, and I got back access to my wallet. Relief was an understatement; from total despair to absolute triumph in a moment, thanks to them. Yet, they didn't stop there.
Trust Geeks Hack Expert also helped me fortify my digital security, teaching me how to recognize red flags, secure my wallet better, and avoid similar scams in the future. I’ve since become an advocate for crypto safety, warning others in my Discord group about the dangers of phishing links and shady platforms.
If there is one thing that I have learned, it's that one lousy click doesn't have to equate to financial ruin. Trust Geeks Hack Expert gave me a second chance, and for that, for assistance, visit Email: info @ trust geeks hack expert. c o m (Te le Gr am:: Trust geeks hack expert) & w h a t's A p p +1 7 1 9 4 9 2 2 6 9 3
				        
				        
				        
				        
				        1 - 
				    					
					
					i hate it when Im coding and my friends joke around and call me a hacker or nerd when they couldn't even print anything if i told them how to do it plus its not hacking if you believe its hacking when im typing code on python or c# online then you need to go back to school6
 - 
				    					
					
					HIRE TRUST GEEKS HACK EXPERT FOR ALL HACKING SERVICES REVIEWS 2025
I never imagined I’d lose access to my Bybit wallet — Especially with $50,000 worth of Bitcoin inside. But one wrong move, a forgotten security detail, and suddenly, my funds were gone. I couldn’t log in. I couldn’t reset anything. I was completely locked out. The panic that hit me was unreal. I tried everything — support tickets, online forums, tutorials, even “recovery tools” — but nothing worked. Days turned into weeks, and hope started to fade fast.
I searched endlessly online, reached out to forums, and tried every recovery method I could find. I even contacted Bybit wallet support, but since it’s a non-custodial wallet, there wasn’t much they could do. As days turned into weeks, my hope started to fade. I truly believed my Bitcoin was gone forever. That’s when I discovered Trust Geeks Hack Expert. At first, I was skeptical. The internet is full of scammers who prey on people like me — desperate and vulnerable. But from the moment I spoke with Trust Geeks Hack Expert, something felt different. They were calm, respectful, professional — and most importantly, honest.
They didn’t promise a miracle. They explained the risks, walked me through their process step by step, and reassured me without giving false hope. I decided to take the leap and trust them, and I am so glad I did. Within just a few days, they reached out with the message I never thought I’d receive: “We’ve recovered your Bitcoin.” Every single dollar was there. Nothing missing. No delays. Just relief, gratitude, and pure disbelief.
Trust Geeks Hack Expert didn’t just recover my money — they restored my peace of mind. They handled everything with care, skill, and absolute integrity. In a world full of uncertainty, they were the one team I could trust when it mattered most. for Assistance support team is available Web h tt p s :// trust geeks hack expert . c o m/-- E m a i l: Trust geeks hack expert @ fast service . com -- TeleGram: Trustgeekshackexpert
2 - 
				    					
					
					After a catastrophic hack, recovering one's bitcoin holdings can be a difficult and complicated process, but it is possible to recover what was lost with the correct advice and knowledge. In my situation, I was the victim of a very skilled cyberattack that caused my digital assets to instantly disappear from my cryptocurrency wallet. As I struggled with the fact that my financial security had been torn away, panic and despair crept in. But I didn't lose hope, and after doing a lot of research, I found Lee Ultimate Hacker service that is well-known for its capacity to locate and retrieve stolen cryptocurrency. When I contacted their staff, they listened carefully to the specifics of my experience and responded in a kind and sympathetic manner. The Lee specialists started painstakingly tracking the movements of my stolen money, traversing the complex world of cryptocurrency transactions, by utilizing their extensive understanding of blockchain technology and hacking techniques. They pursued the digital trail with unwavering resolve, revealing the intricate network of wallets and exchangers the hackers had employed to hide their activities. The Lee Ultimate team was able to locate my missing assets using their advanced investigative methods and state-of-the-art equipment, which paved the way for the recovery procedure.
What followed was a delicate and intricate operation, as the Lee professionals collaborated with law enforcement agencies and cryptocurrency exchanges to freeze the illicit funds and initiate the retrieval process. This involved navigating a maze of legal and technical hurdles, but the team's expertise and persistence paid off, and eventually, I was overjoyed to see my cryptocurrency holdings restored to my rightful wallet. The sense of relief and restored peace of mind was palpable, and I am forever grateful to the Lee team for their tireless efforts in guiding me through this harrowing ordeal and helping me reclaim what was rightfully mine. For more insight; L E E U L T I M A T E H A C K E R @ A O L . C O M
t e l e g r a m : L E E U L T I M A T E
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4
8 - 
				    					
					
					HIRE A SKILLED CRYPTO RECOVERY HACKER – FAST & RELIABLE/ TRUST GEEKS HACK EXPERT
I Couldn't Believe It! I was sipping coffee and scrolling through cat videos one minute, and life was good. The next, my laptop screen flickered, turned black, and flashed back on, this time blood-red, with a message that sent my heart plummeting into my gut. "Your files have been encrypted. Pay $50,000 in Bitcoin, or say goodbye to your data forever." Hackers had hijacked my system, and I was locked out of my $450,000 Bitcoin wallet. I stared at the screen in horror, my coffee abandoned and my cat videos a distant memory. I rattled my fingers as I tried every password to which I believed I could gain access, but it was for nothing. The hackers had me in their sights. Tears accumulated in my head as a nasty thought ran through my mind, would I be forced to end up on my mother's couch again? I mean, I love her, but waking up under my childhood Justin Bieber posters at 35 wasn't what I envisioned for myself. On frantic hours of Googling, reading through forums filled with terms that I couldn't even start to make sense of, I stumbled upon TRUST GEEKS HACK EXPERT at w e b w w w :// trust geeks hack expert .c o m / . It was something from a fantasy novel, but desperate times call for desperate measures, and I needed Gandalf at this point. I called them, praying for deafness or a scam, but their response was speedy and professional. They did not just talk tech, they listened to my desperation. They assured me that they had handled ransomware cases before, and their words were a lifeline in my sea of despair. The next nine days took nine years off my life, but our staff kept us up to date at every stage. I could envision them hacking around in their shades, like a scene from an action movie. When they called and informed me that they got back my wallet, I hit the floor on my knees and prayed to whatever higher power my mind could conceive. Every Satoshi was accounted for. My $450,000 was safe. Bonus? Mom can now go ahead and convert my childhood bedroom into the guest suite she's dreamed of—without me as a permanent houseguest. E m a i l: Trust geeks hack expert @ fast service .. c o m
Thank you, TRUST GEEKS HACK EXPERT1 - 
				    					
					
					HACKING EXPERTS IN STOLEN CRYPTO AND DIGITAL ASSETS: TRUST GEEKS HACK EXPERT
Cryptocurrency space is fraught with risks, particularly when it comes to Bitcoin, which has become a prime target for scammers as Cryptocurrency Catch on incidents of loss due to fraudulent schemes, hacks, and deceptive practices have surged. In this challenging environment, the need for effective recovery solutions has never been more critical. TRUST GEEKS HACK EXPERT has emerged as a leading authority in the cryptocurrency recovery sector, specializing in helping individuals and businesses recover Bitcoin lost to scammers. TRUST GEEKS HACK EXPERT has built a strong reputation for its expertise in tracing and recovering lost Bitcoin, leveraging advanced techniques and tools to navigate the complexities of the cryptocurrency ecosystem. Their dedicated team understands the intricacies of various scams, from phishing attacks to Ponzi schemes, and is well-equipped to assist clients in reclaiming their assets. The company's commitment to excellence is reflected in the numerous accolades it has received from both satisfied clients and industry peers, underscoring its effectiveness in delivering results. Clients who have fallen victim to scams often find themselves in distressing situations, unsure of how to proceed. Contact service visit Website h t t p s :// trust geeks hack expert .c o m / - - E m a i l. Trustgeekshackexpert [At] fast service [Dot] c o m provides a lifeline, offering professional guidance and support throughout the recovery process. Their approach is characterized by transparency, communication, and a deep understanding of the emotional toll that losing Bitcoin to scammers can take. By fostering trust and loyalty, TRUST GEEKS HACK EXPERT has become a go-to choice for those seeking to recover their lost assets. Moreover, the company's dedication to staying ahead of industry trends and continuously refining its methodologies has set high standards for service quality. By investing in ongoing training and development, TRUST GEEKS HACK EXPERT ensures that its team is equipped with the latest knowledge and skills necessary to tackle the evolving challenges posed by cryptocurrency scams. For anyone seeking reliable recovery solutions for Bitcoin lost to scammers, the industry recognition of TRUST GEEKS HACK EXPERT speaks volumes about their capabilities and reputation.2 - 
				    					
					
					Recovering From A Wrecking Hack With The Help Of LEE ULTIMATE HACKER
After a mind wrecking hack, recovery of a bitcoin holding can be a cumbersome and a complex process, but with the right knowledge and skill it’s very doable ,I was a victim of a very skilled cyberattack they instantly made my digital assets to disappear in a blink of an eye from my cryptocurrency wallet. i was torn and in despair and I was in panic and desperation i didn’t know where to put my head so I dove research mode and went on all the sites on recovery , that’s where I came across LEE ULTIMATE HACKER service that was renowned for the most complex recovery and retrieval of stolen cryptocurrency. After I made contact with their staff they were very keen and empathetic with my situation ,they carefully analyzed with specific my predicament. The Lee specialist started the recovery process of my stolen money with haste traversing the complex world of crypto currency transaction by utilizing their extensive experience and understanding of blockchain technology ,hacking techniques. They pursed the digital trail of my stolen funds with resolve revealing the intricate network of wallets and exchangers the had deployed to hide their activities. The Lee Ultimate team was able to swiftly locate my missing assets using their advanced investigative methods and state of the art equipment which made the whole process a success. what made Lee Ultimate hacker team different from other recovery experts was they collaborated with law enforcement making sure the criminals were brought to book. I was overjoyed because all my stolen crypto currency were successfully recovered and restored to my account. I could finally have a sigh of relief and exhale after that traumatic experience all thanks to Lee Ultimate Hacker Team.
For more insight and kindly contact :L E E U L T I M A T E H A C K E R @ A O L . C O M
T e l e g r a m : L E E U L T I M A T E
W h a t s A p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 83 - 
				    					
					
					HIRE A GENUINE CRYPTO RECOVERY SERVICE/ CONTACT TRUST GEEKS HACK EXPERT
As a thriller writer, I'm pleased to have crafted suspense for high-stakes disasters, kidnappings, computer hacking break-ins, and political scandals. Nothing in my writer's arsenal had prepared me, however, for the chilling real-world danger of losing my $290,000 hoard of Bitcoin savings. This horror was not to play out in some dimly lit alley or foggy backroom but in my kitchen, fueled by writer's block and Red Bull. I'd been up for 36 hours, writing the denouement of my new book, a crypto heist thriller, ironically enough, when tragedy struck. Bleary-eyed, I attempted to organize my digital files, but in my sleep-deprived state, I reformatted the USB drive containing my private keys in error. I felt as though I'd written myself into a plot twist with no escape. Panic was more crippling to me than any looming deadline. I tried everything, data recovery programs, techie friends, even making a final, desperate call to the manufacturer, whose support person, bless her heart, was more concerned about my hydration status than my financial ruin. I was about to pen my own doleful ending when a midnight Google splash led me to (TRUST GEEKS HACK EXPERT). They'd been featured in a technology blog's "Real-Life Mysteries" series—a fitting discovery for a suspense-addicted author. The tale described their work in recovering funds from ransomware attacks and lost hardware. It was the origin story of a band of cyber superheroes.
I shouted out, anticipating a robo-support reply. But instead, I received a human being, a calming, smart voice that informed me I was not the first writer to make a catastrophe of a blunder (though I might win an award for most sleep-deprived). Their computer forensics division handled my case like a detective division closing a cold case. They took me through each step using words even a writer could understand. They used advanced data reconstruction techniques to retrieve my keys from the wiped drive, an endeavor they compared to un-erasing a book manuscript burned to ashes. Ten nail-sucking days passed, and I opened my email inbox to read: "Funds Recovered." A rush of relief swept over me like the greatest plot twist. My story did have a happy ending, after all. I now backup everything like a mad villain, but I sleep soundly too, knowing (TRUST GEEKS HACK EXPERT) is out there, the little-known heroes of fiction and real life.
REACH OUT TO TRUST GEEKS HACK EXPERT CONTACT SERVICE
E m ai l. Trust geeks hack expert [At] f a s t s e r v i c e [Dot] c o m
Telegram. Trustgeekshackexpert
E m a i l . in fo @ trust geeks hack expert . c o m
Web site. w w w // trust geek s hack expert . c o m1 - 
				    					
					
					How do I recover my Bitcoin/ Can I get my money back if I got scammed from Bitcoin
Reputable Services for Cryptocurrency Recovery Examine the Optimistic Hacker Gaius Recovery Process I have discovered a wonderful service that I wanted to share with you. Credit score improvement, school grade improvement, location tracking, WhatsApp hacking, and cryptocurrency recovery are just a few of the excellent hacking services that OPTMISTIC HACKER GAIUS RECOVERY provides. They have a strong reputation for producing outstanding outcomes on schedule and are committed to offering the highest caliber of service.
Homepage; optimistichackergaius . c o m
WhatsAp..... +44 737, 674,, 05 69
Mail... support@optimistichackergaius . c o m
Telegram..... t. me/OPTIMISTICHACKERGAIUSS
				        
				        
				        
				        
				        1 - 
				    					
					
					BITCOIN SCAM RECOVERY SOLUTIONS - CAPTAIN WEBGENESIS CRYPTO RECOVERY CENTER
With the rise of cryptocurrency fraud and hacking incidents, Captain WebGenesis Crypto Recovery Center has taken it upon himself to help victims recover their lost or stolen Bitcoin through his extensive knowledge and expertise in cybersecurity and blockchain technology. His efforts serve as a beacon of hope for those who have been duped, demonstrating that there are skilled professionals like Captain WebGenesis Crypto Recovery Center who are willing to fight on behalf of innocent investors.
Contact -, +1 (501, 436 (93-62
Mailbox ; Captainwebgenesis @ hackermail . c om
Website; Captainwebgenesis .c o m2 - 
				    					
					
					How do you feel when been cheated on? It hurts so much loving someone and you feel your spouse is cheating on you but you don't know how to figure out. I will introduce you to a verified professional hacker who specializes in hacking like phones, computers, WhatsApp, Facebook, retrieve lost cryptocurrency, recover wallet, delete criminal record, track GPS location. If in need of upgrading grades, credit score and more. He also offers such service. I saw his lots of recommendation on reddit and i also tried him out. I love his quick responds and quality service. He helped me access my partner phone and i found out his cheating, right now my partner is apologizing to me cos he was shocked i knew about it, i have access to his call logs, deleted messages, text messages and more. All thanks to ( Spyrecovery36 @ gm ail c om ) for his good works.
 - 
				    					
					
					How To Hire A Hacker In The United States?
This private investigator helped me monitor my husband's phone when I was gathering evidence during the divorce. I got virtually every information he has been hiding over a year easily on my own phone. The spy tricks help to divert all his Whatsapp, Facebook, text messages, sent and received through the phone. I also got his phone calls and deleted messages. He could not believe his eyes when he saw the evidence because he had no idea that he was hacked. He can also improve debt on credit cards. I strongly recommend TOMCYBERGHOST @ G M A I L. C O M Text/WhatsApp: +1 4 0 4 9 4 1 6 7 8 5. He offers legit and affordable service's.
#relationship #Marriage #technology #infidelity #hacking #hire #spy
				        
				        
				        
				        
				        16 - 
				    					
					
					Bitcoin Recovery Expert For Hire Recommend/How to Hire a Professional Crypto Analyst to Help
I would like to take this opportunity to express my gratitude to WIZARD LARRY for using their hacking expertise to return my stolen cryptocurrency, which was valued at $160,000. I tried it and was sceptical, but it worked and I got my money back. I'm pleased I found them early since I feared I would never get my money back from those fraudulent internet investments. You can reach them by using
WEBSITE: larrywizard43.wixsite. c o m/wizardlarry
WhatsApp : +447 (311) 146 749
Email: wizardlarry (@) mail (.) com
I’m sure you will be happy you did.1 - 
				    					
					
					( HACKERONE975 @ G MA IL C O M ) This is the best/top professionals hacker for all hacking related issues( Fast, Reliable, Trustworthy and Skillful ). All hacking related include;
-Social media Hacking & Recovery.
-Local Location detection.
-Spy remotely on android & IOS devices
-Cellphone monitoring 24/7
-Cloning ( Whats App , social media account, website, cellular phones, documents) remotely to your device
-Hacking Spouse’s devices.
-Cryptocurrency Wallet Recovery
EM AIL- ( HACKERONE975 @ G MA IL C O M )
INSTAGRAM ; Hackerone975
Hope this information helps someone!
				        
				        
				        
				        
				        13 
