Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "code theft"
-
Worst dev I've interviewed?
"Archie" ran his own consulting business for almost 20 years. Prior to his interview, Archie sent HR (to send to us) his company's website, where he had samples of code for us to review (which was not bad, this guy did know his stuff).
What I found odd was Archie was the lone wolf at his company, but everything I found about him (the about page, his bio, etc), Archie was referred to as 'Mr. Archie Brown'.
Ex. 'Mr. Archie Brown began his humble career and 'Mr. Archie Brown is active in his church and volunteers his time in many charities ...'
Odd to refer to yourself in the third person on your own site, but OK, I like putting hot sauce on my mac & cheese (no judgement here).
Then the interview..standard stuff, then..
Me: "Given your experience, this is an entry level developer position. Do you feel the work would be challenging enough for you?"
Archie: "Yes, Mr. Archie Brown would have no problem starting at bottom. You see ..."
Almost any time he would reference himself, instead of 'me' or 'I', he would say 'Mr. Archie Brown'. As the interview continued, the ego and self-importance grew and grew.
My interview partner wanted to be done by using the escape clause, "PaperTrail, I'm good, do you have any questions?"
Yes, yes I do. I was having too much fun listening to this guy ramble on about himself. I made the interview go the full hour with the majority of time 'Archie' telling us how great he is.
The icing on the cake was my partner caught his gold cuff-links and tie-pin where his initials and how he kept raising his hands and playing with his tie to show us (which I totally missed, then was like "oh yea, that was weird")
After the interview, talking with HR:
HR-Jake: "How did it go?"
John: "Terrible. One of the worst. We would have been done in 10 minutes if PaperTrail didn't keep asking questions."
Me: "Are you kidding!? I had the best time ever. I wish I could have stayed longer."
HR-Jake: "Really? This guy was so full of himself I wasn't sure to even schedule with you guys. With his experience, I thought it deserved at least a round with you two. You think we should give him a chance?"
Me: "Hell no. Never in a million years, no. I never in my whole life met anyone with such a big ego. I mean, he kept referring to himself in the third person. Who does that?"
HR-Jake: "Whew!...yea, he did that in the phone interview too. It was a red flag for us as well."
Couple of weeks later I ran into HR-Jake in the break room.
HR-Jake: "Remember Mr. Archie Brown?"
Me: "To my dying day, I will never forget Mr. Archie Brown."
HR-Jake: "I called him later that day to tell him the good news and he accused me of being a racist. If we didn't give him the job, he was getting a lawyer and sue us for discrimination."
Me: "What the frack!"
HR-Jake: "Yep, and guess what? Got a letter from his lawyer today. I don't think a case will come in front of a judge, but if you have any notes from the interview, I'll need them."
Me: "What are we going to do?"
HR-Jake: "Play the waiting game between lawyers. We're pretty sure he'll run out of money before we do."
After about 6 months, and a theft conviction (that story made the local paper), Mr. Archie Brooks dropped his case (or his lawyers did).23 -
What do you do when a developer who has higher title than you; changing a bit of your code to his/her own favor and then claim "fixed and optimized" your code to shoot you down and then take the whole credit?
Essentially how to deal with this kind of theft or robbery?9 -
Because of some theft this year and even though we already have security cameras, my apartment building decided to check the front door locks so it's more secure.
This key looks very high tech... Only issue though is I never use the key anyway... I just entered the door code...
So what is the point of changing the locks? I'm going to guess whoever is stealing isn't picking the lock... People would notice... They must know the code.
Also it seems most of the apartment locks are digital key card/pins too. Wondering if this just means most owners are young or just are techies/devs...
9 -
I'm a proud man, but I'm not such a fan of my own farts that I can't admit when I maybe should have listened to other people's advice earlier.
After having been convinced of the scope of impact of AI by someone I respect, I started playing with the Jetbrains AI tools. I am impressed at its ability to process my code and give actually helpful input and to consolidate documentation into a form that is concise and helpful.
I finally get what people mean when they say it saves time.
A couple things that truly warmed me up to it is, one:
I wanted to know if I could return a string, float array, whatever, from c++ to a python script. I was assured the answer was yes, but I just COULD NOT get it to work, so I gave up on it. I asked the question to the Jetbrains AI (4o in this case) and it gave me what I needed, and now I can return a string from c++ to python no problem. There are a lot of little questions like this that I gave up on that I now have to explore again, which is both exciting and annoying, because I already have a thousand hobbies.
And two:
I am working on an html email. It's a mess of tables and text and inline styles. Compared to the markup I'm used to writing, it's tedious to trudge through to make even simple changes. I was able to successfully instruct it to make a specific copy change, while respecting the document's indenting, all on the first try.
I will forever maintain that it will enable a generation of drones that don't understand how to do simple things and will atrophy the skills of otherwise capable people that use it as a crutch.
I will also always maintain that its foundation is built on mass theft and is a monument to the uneven application of intellectual property protection laws. But with DeepSeek coming out and having done the same thing to them, I find myself enjoying the turnabout. I'm also amused that I coincidentally jumped into the pool right as things got interesting.
All that said, as a reference tool, like Google and Wikipedia used to be, it's not the force of pure evil I held it as. It is actually very useful and if used responsibly on an individual level, can be an amazing productivity tool and can even teach its users new things. -
So I'm not much for Linux, but I'll admit. It's a pretty damn solid environment, especially for programmers.
Since my main computer can't afford to have Linux on it, I decided to start working on making the Raspberry Pi handheld notebook. But after I added up the price for all of the components, it's almost three hundred dollars.
Personally, I would love to have a mini computer everywhere I go. A Chromebook is ok. But I guess you need to take into consideration that it is NOT ment for programming. I have found several IDE's and found none of them have a debugger or a way to execute my code.
I did some thinking and I'm starting to wonder if it is worth it.
It's a hand held computer with ubuntu on it. What's the worse that can happen? I don't solder the battery correctly and the whole thing explodes in my hands? Yeah that's pretty likely. Another reason I look at getting it is because there is so much fucking theft at my school it's hard to believe we don't have armed gunmen at every corner since everyone is always sober or high as shit.
Having an 11.6 inch Chromebook also puts me at risk of getting mugged, because who the fuck wouldn't want to try and pawn a laptop for drug money? At least with a handheld I could keep it in my pocket where I know it'll be safe.
What do you guys think?
Should I build this little thing or keep my current Chromebook but try to keep it safe?4 -
My ex-colleague contacted me recently to help build a solution that would checkmate the case of code theft that they are currently challenged with. I tried to suggest the developers either work remotely (using rdp or similar), or physically with a company provided system. He rejected both recommendations and insisted the potential culprit shouldn't be aware he is being monitored
He proposed the following flow for what he intends I build: an obfuscated program scattered across the code base, possibly assembling at intervals or as a reaction to project build. Then signaling their server with details of the machine it's running on
The project to be rigged with the spyware is written in spring boot and I can't turn this down even if I don't think it's worth it cuz no work has been forthcoming and I'm nearly out of cash
So the question is, is the flow described above a feasible one? Can you suggest a smarter way to detect when the code is transferred to the system of an unaccredited engineer? Can you suggest any tips on how to go about this?6 -
I have been working on idea similar to pastebin for mobile platform currently available on Android. The main concept is the easy share of Note in any language that is encrypted and the notes get deleted as soon as other party reads it. Plus you can encrypt it further by adding your own password and then share that password with others. This is useful when we are sharing our card details and other secret stuff with friends or family. The problem is that if you use mail or messaging stuff it gets stored in other party device and it can be exploited in future in case of theft or mobile loss. Here is my application for Android.
Please comment your reviews.,comments and suggestions here.
If you want to fork the code of both server and client comment that also.
https://play.google.com/store/apps/...7 -
Everyone wants some kind of super expertise but they don’t want to invest to allow people to become experts
I like incentive to learn large framework code that is os
And inventive to invest time to fix
And I think this should be finding that is added to an economy by a CB
Adding to the monetary expansion and contraction equation
The more improvements that work and are accepted
The more bugs that get fixed etc
The more people working on these projects the more money generated that they can spend to prop up their host economy
Of course you’d need some considerable oversight to prevent corruption and laundering or outright theft by dirty fucked up chomo whores pretending that work is there own and destroying people who are enthusiastic or happy like the garbage they are -
RECLAIMING YOUR LOST BITCOIN-VISIT RAPID DIGITAL RECOVERY ADVANCE STRATEGIES
The glow of RGB lights still haunts me. There I was, mid-stream, hyping up a Fortnite squad when an email pretending to be a sponsorship opportunity with the subject line "ENERGY DRINK COLLAB!!! *" appeared on my second monitor. I clicked. Big mistake. By the time my chat spammed "*SCAM ALERT" in neon caps, a trojan had already ghosted my Bitcoin wallet, $320,000 gone, poof, like a noob disconnecting mid-game. My facecam caught the exact moment my soul left my body: jaw open, headset tilted, background of anime posters judging me silently. The VOD blew up. Of course it did...Email: rapid digital recovery (@) execs. com
Pandemonium erupted. Donation alerts became panic emojis. My mods DM'd links to "HOW TO FIX CRYPTO THEFT" amidst banning trolls. My wallet? A barren wasteland. My DMs? A cemetery of "*F"s and crypto-bros pitching recovery scams. Then, a lifeline—a chatter named *xX_CryptoNinja_69 typed, "RAPID DIGITAL RECOVERY. THEY CLAPPED A HACKER FOR MY DOGE ONCE." Desperate, I Googled them mid-stream, muting to scream into a pillow...Whatsapp: +1 4 14 80 71 4 85.
Rapid Digital Recovery’s team responded like NPCs scripted for heroics. “Send us the malware file,” they said. “**And your wallet logs. We’ll handle the rest.” For 12 days, they reverse-engineered the trojan, dissecting its code like speedrunners cracking a glitch. The virus, it turned out, was a knockoff ransomware dubbed “CryptoKrush” (its dev had left a “HACK THE PLANET!!” Easter egg in the code, cringe). Rapid Digital Recovery’s squad traced its path, resurrecting private keys from registry fragments and backup clouds I’d forgotten existed. The return stream was record-breaking. I rebooted my rig, wallet restored, and titled the stream "HOW I UNBRICKED $320K (AND MY CAREER)." Chatters donated Bitcoin out of solidarity, and schadenfreude. Even my rival streamer, DrL33tGamer, raided me with 10k viewers. Rapid Digital Recovery? They viewed anonymously and left a sub with the message: "GG EZ.
These internet Gandalf's didn't just fix a hack—they authored the greatest plot twist in my online existence. Now, my new website, Stream Vault, runs on a server guarded like Fort Knox, and I vet sponsors like the CIA. That fake energy drink company? Its domain now points to a Rickroll....Telegram: h t t p s: // t. me /Rapiddigitalrecovery1
If your crypto gets pawned by a script kiddie, skip the rage quit. Ping Rapid Digital Recovery. They're the ultimate cheat code for catastrophe. Just maybe have a malware scanner in closer proximity than your energy drinks next time.
2 -
VICTIMIZED BY CRYPTO SCAM: RECOVER YOUR LOST FUNDS WITH TRUST GEEKS HACK EXPERT
The glow of RGB lights still haunts me. There I was, mid-stream, hyping up a Fortnite squad when an email pretending to be a sponsorship opportunity with the subject line "ENERGY DRINK COLLAB!!! *" appeared on my second monitor. I clicked— big mistake. By the time my chat spammed "*SCAM ALERT" in neon caps, a trojan had already ghosted my Bitcoin wallet, $320,000 gone, poof, like a noob disconnecting mid-game. My facecam caught the exact moment my soul left my body: jaw open, headset tilted, the background of anime posters judging me silently. The VOD blew up. Of course, it did.
Pandemonium erupted. Donation alerts became panic emojis. My mods DM'd links to "HOW TO FIX CRYPTO THEFT" amidst banning trolls. My wallet? A barren wasteland. My DMs? A cemetery of "*F"s and crypto-bros pitching recovery scams. Then, a lifeline—a chatter named *xX_Cryptosolution_69 typed, "TRUST GEEKS HACK EXPERT. THEY CLAPPED A HACKER FOR MY DOGE ONCE." Desperate, I Googled them mid-stream, muting to scream into a pillow.
TRUST GEEKS HACK EXPERT team responded like NPCs scripted for heroics. “Send us the malware file,” they said. “**And your wallet logs. We’ll handle the rest.” For 12 days, they reverse-engineered the trojan, dissecting its code like speed runners cracking a glitch. The virus, it turned out, was a knockoff ransomware dubbed “Crypto rush” (its dev had left a “HACK THE PLANET!!” Easter egg in the code, cringe). TRUST GEEKS HACK EXPERT squad traced its path, resurrecting private keys from registry fragments and backup clouds I’d forgotten existed. The return stream was record-breaking. I rebooted my rig, wallet restored, and titled the stream "HOW I UNBRICKED $320K (AND MY CAREER)." Chatters donated Bitcoin out of solidarity, and schadenfreude. Even my rival streamer, DrL33tGamer, raided me with 10k viewers. TRUST GEEKS HACK EXPERT? They viewed anonymously and left a sub with the message: "GG EZ.
These internet Gandalfs didn't just fix a hack—they authored the greatest plot twist in my online existence. Now, my new website, Stream Vault, runs on a server guarded like Fort Knox, and I vet sponsors like the CIA. That fake energy drink company? Its domain now points to a Rickroll.
If your crypto gets pawned by a script kiddie, skip the rage quit. Ping the TRUST GEEKS. They're the ultimate cheat code for catastrophe. Just maybe have a malware scanner in closer proximity than your energy drinks next time.
(CONTACT SERVICE )
E m a i l, Trust geeks hack expert [At] fast service [Dot] c o m
Te le gr am, Trust geeks hack expert
E m a i l , info @ trust geeks hack expert. c o m
W e b si te, w w w :// trust geeks hack expert . c o m1 -
Experiencing a security breach involving your Bitcoin wallet can be a harrowing ordeal. This was my reality when I received an unexpected BTC security code on my phone. At the time, I didn’t realize the significance of this code and, unfortunately, ignored it. To my dismay, I later discovered that my Bitcoin wallet had been hacked by an unknown scammer, resulting in the theft of all the funds I had accumulated. The frustration and helplessness I felt during this period were overwhelming. My entire Bitcoin portfolio was inaccessible, and the sense of losing control over my assets was incredibly distressing. The funds that had been stolen represented not just an investment, but a crucial part of my financial security. I was left without any clear path forward, grappling with the reality that my savings were gone and that I had no immediate way to recover them. In my search for a solution, I turned to online resources and discussions in hopes of finding a way to retrieve my lost funds. It was during this search that I heard about FAYED HACKER from a trusted friend. They spoke highly of FAYED HACKER’s reputation for recovering lost funds and providing effective solutions for hacking incidents. Encouraged by their positive feedback, I decided to reach out to FAYED HACKER for help. I contacted them through their email, providing all the relevant details about my situation. The response from FAYED HACKER was swift and professional. They offered a detailed consultation and outlined the steps I needed to follow to initiate the recovery process. Their instructions were clear and comprehensive, guiding me through every necessary action to address the breach and attempt to regain control of my wallet. Following their expert advice, I was able to take the necessary steps to begin the recovery process. FAYED HACKER’s team worked diligently on my case, employing their expertise and advanced techniques to trace the stolen funds and secure my compromised wallet. The process required patience and careful adherence to their instructions, but their support was unwavering and reassuring throughout. Within a few weeks, I received the incredible news that my Bitcoin wallet and the stolen funds had been successfully recovered. FAYED HACKER’s efforts to rectify the situation were nothing short of remarkable. They had not only restored access to my wallet but also ensured that the stolen BTC was returned. I was once again able to manage my wallet independently, regaining control over my financial assets. The successful recovery of my Bitcoin and wallet was a huge relief and a testament to the effectiveness of FAYED HACKER’s services. Their professionalism, expertise, and commitment to their clients were evident throughout the entire process. I am profoundly grateful for their help and would strongly encourage anyone who finds themselves in a similar predicament to seek assistance from credible and ethical recovery services like FAYED HACKER. Dealing with a hacked Bitcoin wallet can be an incredibly stressful experience, but recovery is possible with the right help. FAYED HACKER provided me with the expert support and guidance needed to regain my assets and restore my peace of mind. Their dedication to their clients and their effective recovery strategies make them a trustworthy choice for anyone facing issues with stolen or compromised Bitcoin. If you ever find yourself in a situation where your funds or wallet have been hacked, reaching out to a reputable recovery service like FAYED HACKER could be the key to reclaiming what you’ve lost.
EMAIL: writeus @ fayedhacker . tech or fayedexperthack @ solution4u . com
WHATSAPP: + 44 (753) (524) (0205)
