Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "cyber"
-
Running from my job to my bus stop while having my phone in my hands trying to fend off a cyber attack while my hands are nearly freezing and its raining like hell.
Sometimes my job is just fucking awesome.16 -
Currently at a cyber security event.
The most ironic thing is that the WiFi here is not secured...20 -
I'm a programmer and an aspiring cyber security specialist. Yesterday, after I gave a presentation about smart bulb hacking, I heard through a coworker that a cyber security company is interested in talking to me. Yay!11
-
Cybersecurity:
>nothing happens
>I can't believe we pay your useless ass to sit around doing nothing all day!
>something happens
>this is your fault1 -
(The PM is pretty technical)
One day:
Me: Could you create this subdomain?
PM: Sure, just a sec.
Me: Ohh and could you add a letsencrypt cert? (one click thingy)
PM: Why would you need that on this kinda site...
Me: Well in general for security...
PM: Nahh.
*walks away*
Next day:
(referring to my internship manager/guider as Bob)
Bob: Hey... we have a new subdomain!
Me: Yup!
Bob: Wait why is there no letsencrypt certificate installed...?!?
Me: Well, the PM didn't find that neccesary...
Bob: (Oo) of course it is... are we going for security by default or what?
Me: Yup agreed.
Bob: *creates cert and sets everything up in under a minute*
It wasn't a high profile site (tiny side project) but why not add SSL when you can for free?8 -
hate it when Linux users talk like they own the cyber world.. linux is bla bla windows is shit shit..
I am not a linux fan, nor a Windows fan. just I use what is the best for the requirements21 -
A: There is not even a single forum for cyber security. Let's build one.
Me: Are you sure that there is not even a single forum?
A: Yes, I'm a cyber security expert. I have 5 years of experience in this field.
Me: **walks out quitely**1 -
Fucking China!
The only time they ever come out of their pathetic walled internet is to attack your servers.
Fuck that country.10 -
Paranoid Developers - It's a long one
Backstory: I was a freelance web developer when I managed to land a place on a cyber security program with who I consider to be the world leaders in the field (details deliberately withheld; who's paranoid now?). Other than the basic security practices of web dev, my experience with Cyber was limited to the OU introduction course, so I was wholly unprepared for the level of, occasionally hysterical, paranoia that my fellow cohort seemed to perpetually live in. The following is a collection of stories from several of these people, because if I only wrote about one they would accuse me of providing too much data allowing an attacker to aggregate and steal their identity. They do use devrant so if you're reading this, know that I love you and that something is wrong with you.
That time when...
He wrote a social media network with end-to-end encryption before it was cool.
He wrote custom 64kb encryption for his academic HDD.
He removed the 3 HDD from his desktop and stored them in a safe, whenever he left the house.
He set up a pfsense virtualbox with a firewall policy to block the port the student monitoring software used (effectively rendering it useless and definitely in breach of the IT policy).
He used only hashes of passwords as passwords (which isn't actually good).
He kept a drill on the desk ready to destroy his HDD at a moments notice.
He started developing a device to drill through his HDD when he pushed a button. May or may not have finished it.
He set up a new email account for each individual online service.
He hosted a website from his own home server so he didn't have to host the files elsewhere (which is just awful for home network security).
He unplugged the home router and began scanning his devices and manually searching through the process list when his music stopped playing on the laptop several times (turns out he had a wobbly spacebar and the shaking washing machine provided enough jittering for a button press).
He brought his own privacy screen to work (remember, this is a security place, with like background checks and all sorts).
He gave his C programming coursework (a simple messaging program) 2048 bit encryption, which was not required.
He wrote a custom encryption for his other C programming coursework as well as writing out the enigma encryption because there was no library, again not required.
He bought a burner phone to visit the capital city.
He bought a burner phone whenever he left his hometown come to think of it.
He bought a smartphone online, wiped it and installed new firmware (it was Chinese; I'm not saying anything about the Chinese, you're the one thinking it).
He bought a smartphone and installed Kali Linux NetHunter so he could test WiFi networks he connected to before using them on his personal device.
(You might be noticing it's all he's. Maybe it is, maybe it isn't).
He ate a sim card.
He brought a balaclava to pentesting training (it was pretty meme).
He printed out his source code as a manual read-only method.
He made a rule on his academic email to block incoming mail from the academic body (to be fair this is a good spam policy).
He withdraws money from a different cashpoint everytime to avoid patterns in his behaviour (the irony).
He reported someone for hacking the centre's network when they built their own website for practice using XAMMP.
I'm going to stop there. I could tell you so many more stories about these guys, some about them being paranoid and some about the stupid antics Cyber Security and Information Assurance students get up to. Well done for making it this far. Hope you enjoyed it.26 -
Got called up today by my org's cyber security team.
Reason: Installed a font called "Hack" (https://github.com/source-foundry/...)
🤦♂️🤦♂️🤦♂️🤦♂️🤦♂️1 -
I watched the news recently and they talked about cyber security.
To demonstrate "how serious the topic is" they showed a screen with a terminal and literally pinged google.com.
I thought that was funny7 -
I think I ranted about this before but fuck it.
The love/hate relation I have with security in programming is funny. I am working as a cyber security engineer currently but I do loads of programming as well. Security is the most important factor for me while programming and I'd rather ship an application with less features than with more possibly vulnerable features.
But, sometimes I find it rather annoying when I want to write a new application (a web application where 90 percent of the application is the REST API), writing security checks takes up most of the time.
I'm working on a new (quick/fun) application right now and I've been at this for.... 3 hours I think and the first very simple functionality has finally been built, which took like 10 minutes. The rest of the 3 hours has been securing the application! And yes, I'm using a framework (my own) which has already loads of security features built-in but I need more and more specific security with this API.
Well, let's continue with securing this fucker!10 -
former boss wrote three cyber-defense books. had his "collections" team sending plaintext passwords to high-side clients over unsecured email4
-
I'm soon graduating from a tech/IT school which recently specialized in cybersecurity.
Today when I changed my password on their website, it displayed the old one in clear text.
God damn it people, THIS is the reason why our school's reputation has been slowly but steadily going down.1 -
Haha! Sorry but this new cyber attack that's hit the NHS and other company's around the globe, just makes me laugh 😂
These company's just will not spend money on IT, keeping everything update and backed up! 💾
Some of these machines will still running on Windows Vista or XP 😱10 -
Who's at fault for the recent Wanna Cry virus: The companies affected or Microsoft/NSA?
Personally, I think it's the companies affected. This is what happens when you try and be cheap when it comes to cyber security.8 -
!rant 📚 📑
Cybersecurity books @Humble Bundle
https://humblebundle.com/books/...
There is a really great Humble Book Bundle at the moment, starting at 1$. The bundle contains several cyber security books ("Practical Reverse Engineering" and "Security Engineering" have a good reputation).8 -
Umm yes, this cyber you're talking about sounds interesting, where do i get a cyber? How much does a cyber cost? Can a cyber feed my family?
-.-4 -
Cyber security. Deep knowledge of cyber security and networks is what I wish I had. The math stuff that no one bothers with, specifically.6
-
As for programming: (will do a cyber one later)
Don't *ALWAYS* only study/learn programming solely for learning it as this can be demotivating at times, find a cool project to do and learn while developing that!
This is how I learned programming in a fun way :)5 -
Got my first serious project about a year ago. Made it clear to the client that we are developing a Windows app. After around 80-100 hours of work client just goes "how about we make this a web app?" Got a "financial support" instead of the agreed payment. Got around 4 times less money than agreed upon. They never ended up using some parts of the software (I ran the server so I knew that they weren't using it)
I once had a nightmare explaining to the client that he cannot use a 30+ MB image as his home page background. Average internet speed in my country is around 1-2 MB/s. I even had to do the calculation for him because he couldn't figure out the time it took for the visitor to load the image.3 -
Doing compulsory cyber security training and it's like "if you click a malicious link report it to the IT helpdesk" I and I click agree knowing full well the closest thing to IT we have is me...2
-
You Can't Withdraw Your Cryptocurrency Fund? Contact iBolt Cyber Hacker
Be careful of platforms that promise enormous rewards in order to entice individuals into fraudulent programs. There is no shame in speaking up, I was victim of crypto scam 4 weeks ago, While researching how to recover my assets, I came across multiple suggestions of iBolt Cyber Hacker and how they had restored so much joy to scammed victims. With their assistance i was able to retrieve all of my frozen crypto. I'm writing to convey my heartfelt gratitude to iBolt Cyber Hacker. Please contact them if you require their services or want to learn more about them.
More Info:
Email: Support @ iboltcyberhack . com
Contact/Whatsapp: +39 350 929 0318
Website: https : // iboltcyberhack . com /20 -
Bitcoin Scam From (2022) Recovered By iBolt Cyber Hacker
In 2022, I fell victim to a Bitcoin scam that left me feeling hopeless and frustrated. After investing all my money and credit, I found myself unable to withdraw my funds, and my attempts to get help were ignored, rather they kept asking for more.
three days ago i saw a review of iBolt Cyber Hacker recovered four years bitcoin, i decided to ask questions and try, i can say they are really professionals, i happily write this review because iBolt successfully recovered 93% of my funds. I’m incredibly grateful, If you find yourself in a similar situation, I highly recommend iBolt Cyber Hacker.
www . iboltcyberhack. co m/33 -
Please stop putting critical infrastructure to the internet. Security on the internet is a joke, and we won't be laughing the time when someone dies from a cyber attack on another pipeline/dam/weapons factory.23
-
Our local cyber security team has asked all to remove docker from their laptops, reason they can't track them
Most of our stack is aws fargate with nodejs and java springboot
Developers = wtf ?!!1 -
What a relief!
I got my final certificate for finishing 9th grade, and the council has determined that (drums please)
IM GOING TO CYBER / COMPUTER SCIENCE NEXT YEAR!!!!!!!!!!4 -
Well, here is another Intel CPU flaw.
I'm starting to think that all these were done on purpose...
https://thehackernews.com/2019/05/...3 -
What are you all planning on getting on Black Friday/Cyber Monday? I've pinched pennies all year and saved up just enough to only be able to afford 35% or so of the cost of being beaten in a local dark alley. That's not even what I wanted, but still.16
-
Movie about Stuxnet Cyber weapon is out
The advanced malware used by CIA and MOSSAD to sabotage Iran's nuclear program
"Zero days" by Alex Gibney
Gk watch it guys..7 -
Anyone who's interested in cyber security, go follow Binni Shah (@binitamshah) on Twitter. The amount of tutorials and guides she retweets is crazy and very informative.
Also if you're not on Twitter you're missing out on a lot of content to learn from ✌️18 -
THE CODE USED IN MY MANDATORY ONLINE TRAINING ABOUT CYBER SECURITY AND STUFF LIKE THIS:
<script>window.showQuestion(someOverlyVerboseResponseFromTheServerWithTheCorrectAnswersMarked);
</script>
Oh boi it would be a real shame if someone proxied your precious function :)2 -
I find it hilarious the total misconception of hacking that the general public has. I tell people I know cyber security (Not as much as a lot of people around here) but it is a hobby of mine and I find it very useful/interesting.
But I can't stop but laugh when someone is like, can you get all the text messages my bf receives?
Can you hack this for me can you back that?
C'mon even if I knew how to do that without being caught you think I would even admit that to you. Do hackers just walk around with an index card pasted to their forehead of their skill? It's not even slightly reasonable to think this lol even for someone who doesn't know about the field -
Ah, that feeling when you open random cyber space options in Firefox so you can watch children being forced, classical frontend development with devtools. Happens almost every Tuesday4
-
Just heard this on the news...
"The cyber security on my smart phone compared to the cyber security in medical equipment..."
Wtf did I just hear??? I mean, I get it...using terms the general public understands... But how about educating people instead. 😤1 -
Some things should be prohibited! Such as trying to look smart luring geeks with PHP code. That does not do what you wanted to do in the first place. Idiots!4
-
Massive cyber attack hits Europe. Hopefully everyone is patched and secure. Critical infrastructure, banks... impacted.1
-
What's a good book to read about hacking and/or cyber security? Doesn't have to necessarily a how-to guide, rather, just something to read on the subject.5
-
Apparently Patreon has fired (and then outsourced) the entire cyber security team. What's the worst that could happen?
https://thehackernews.com/2022/09/...4 -
Y'know what's the worst part about all the internet censorship and cyber surveillance? The fact that no one notices it11
-
Never been a fan of podcasts before, but I'm fixing to take a stab at listening to some.
What's a good tech/programming podcast? (Bonus points if it's about Cyber security) -
My first job was writing a cloud based malware analysis system from scratch for UTSA's Institute for Cyber Security.
My direct supervisor was a womanizing, lazy, prick with a PHD. I wonder where he is now.3 -
Anybody else feel like their Internet traffic constanty being monitored after downloading pen testing tools?
Have our identities been added to lists of potential cyber criminals :/
Thoughts?
(For ethical purposes - involving your own site's security!!)2 -
*Has more advanced knowledge on computers and cyber security...
Mother still cant trust with repairing phone, asking which phone to buy, and naggs about the amount of time i spend on my laptop saying i'd break it. -
Just got a request to print the new Tesla truck.
I think it wasn't that hard for the Designer to implement the low pol. Design for the 3d print :')4 -
!rant
I'm a computer engineering student.
I'm very much interested in Systems and networking.
That's why I was thinking of persuing cyber-security as a career option.
But I'm not quite sure if that is a good choice.
Also I don't know how to proceed in order to achieve excellence in cyber-security.
It would be a great help if you guys could help me.
Thanks :)20 -
Honestly, school is useless for me as of right now. I know I should be well rounded and stuff, but do I honestly need to know the symptoms of cervix cancer while going into a tech career? My eyes have been set on tech for my whole life, ever since I left the womb, and I know that if I do switch careers, it'll be from comp sci to cyber security not from IT to med school...
I feel like I could really be devoting my time towards something better than writing a 5 page essay on a healthy food choice.
Every night I think to myself, "You know what, I'm going to lock myself in a room and write bash scripts all day" but then I wake up in the morning, and remember I have to take a quiz on reproductive systems, learn about the procedure of organ donations for driver's ed, write 2 paragraph definitions of vocab words, and read a book about communism.
The most useful thing I learned last year, was how to efficiently navigate the java API, and that's something you don't even learn, you just encounter it. Schools need to start having more specific specialties and stop enforcing knowledge of pointless topics.
I'm not saying to remove all core classes and stuff, I'm saying why waste space in our brains with something we won't use ever again? I get it, some people don't know what career they're looking for yet so you can't make them choose, but it honestly sucks some serious ass that I can't learn what I want to at school, and as a matter of fact, I can't even learn at home, because they're filling my schedule with pointless work because they feel that they have to fill our time somehow.
Point of this long ass rant is: Why lock yourself in a room and learn about something if it isn't something you want to learn about? The space in our brain is finite enough, why can't it be filled with things we're interested in rather than things that will only be used to get good grades in the future then overwritten with useful knowledge. Same thing with time. We have a very finite amount of time in a day, and now that I think of it, a lifetime. Why spend it on something that doesn't, and never will, make your life enjoyable?7 -
Has anyone used python within cyber security?
I really want to get into cyber security. I'm curious what programming languages are used within that industry.4 -
Well my country broke the record of being the cyber bully...
I don't know what to feel.... This is bad..9 -
How did you learn cyber security, especially pentesting ?
I know that making VM lab and/or doing CTFs and reading writeups can help a lot, but is there any more "formal" way to get into things like pentesting etc. ?
(Without having to pay for OSCP, Sans and all this)5 -
So this is what a cyber criminal looks like.
"Norwegians are a favourite for cyber criminals"
"And we are easier to fool than Swedes and Danes, if we're to believe the thieves. The only ones more exposed than us are oil rich Saudis" 🤷♂️ -
I chose Network/Cyber Security because it was my internship experience and they were willing to pay me good money to stay on... No but seriously I am much better at understanding how complex systems work than coding them. This job, as stressful as it is, is a different kind of stressful that the deadline-fraught jobs of software developers worldwide.
And i can do it fully remote.2 -
Ordered a slightly watered down version of my planned PC. Let's wait for Cyber Monday for buyer's remorse!
Either way, paid half price of the planned rig for 80% of the same performance.
See attached specs. Already have a hard drive and PSU, and for now will be reusing my GTS 250.8 -
So first time here seems awesome I'm an aspiring cyber security expert I know very basic c++ and I'm looking for people to talk to about what I should be doing5
-
Hey everyone. I am a freshman in college studying Cyber Security. I have been practicing various programming languages such as httml, css, java script and SQL. Does anyone have any recommendations for resources to study? My end goal is to be blue teaming for my schools Cyber Defense team in the fall.5
-
Typical insurance company BS approach.
Listening to xmas music, Spotify ad kicks in about 'just being "hacked"':
Buy our cyber security insurance product to quickly recover and retain liquidity in case of a cyber security beach.
Not a single word about preventing the incidents in the first place...
Lucky to work in a place that doesn't skimp on IT.5 -
1. I recorded something with my dad until 12 AM isarel daylight time
2. that you so much for congratulating me for the Cyber classes. I love all of you.
3. Thank you also for 400 upvotes. Going strong.
Have an Image of the recording machines in the studio.4 -
this is unsettling :( if they hit the button and start knocking out american infrastructure, even with "harmless" small-scale attacks or limited to certain sectors, i wonder how fast this is going to escalate... this mere unspoken threat is an aggressive move already https://theguardian.com/us-news/...7
-
Hey,
Any tips on how to apply for job, I apply to 10-15 new opportunities daily but haven't received positive response from 99% of them. I don't know what's wrong.
Currently, I am a cyber security analyst at a startup since February 2023.
My resume I use to apply for job
https://ganofins.com/ganesh-bagaria...21 -
Do not buy Hostinger... They are so aggressive with caching that I ran out of devices to test the features. They probably cache based on userAgent because changing other parameters (IP, local cache) doesn't resolve the issue. I talked to tech support whole day, and although they were helpful few times I just got three same answers for the three different questions. Seriously, the only thing I like about Hostinger is their user friendly UI.
The rant goes on. I can basically DoS my website by clicking fast on it. That shit doesn't happen with some free hosting plans... My site goes down for a few minutes before I can visit it again.
THE RANT GOES ON
Using the file manager is tedious work as you get randomly disconnected after less than few minutes of inactivity.
I might seriously switch to Google's Cloud Console. It is more expensive, you have to do all the hosting config yourself using a virtual machine, but I guess it's more reliable and it gives you a lot more control.5 -
I have zero experience working in a company. I did a few freelancing projects. My friend forwarded my resume to a company. They contacted me after some time, and gave me a technical challenge. I have solved it, sent it back to them, now I am waiting for their answer.
What's the thing? After going to the company website, I realized they require at least 3 years of experience. But they still contacted me knowing that I am still a student and have only done freelancing work.
No matter do they accept my solution or not, this is a lesson for me and for everyone else: do not let required years of experience discourage you from applying to a position. You can still get a chance.
Happy job hunting to all you junior devs :)3 -
Question - my field is information security (or cyber security if you want to think of me as a time lord), but I wanted to know;
Front end and back Devs, how much time do you spend on security issues and/or implementing security measures?10 -
Third (or fourth) AI winter coming in despite global warming. Cold war level shit cyber warfare.
C/C++ not dead, Java zombie still in the businesses.
Still no usable IDE (on Linux)5 -
Any of us had annoyances with people with “a million dollar app idea” but what about these which gives unsolicited career advice?
I’m dealing with a boomer which keeps trying me to change my career and work into cyber security (because TV told him it’s a well paid field) despite me kindly telling him for multiple times which it’s not going to happen because I won’t throw away a career I love to work in a field which seems deadly boring to me (I love anything about coding from design to typing for hours on Vim meanwhile the only thought of reading for hours obscure documentation to find potential vulnerabilities on a system kills my spirit).8 -
I recently joined DevRants, and with me joining any new site or media where you can share I am usually the guy who is shy and likes to sit back and watch/read. However I wanted to post a question as I am trying to get a job within the Cyber Security field. I have a computer science degree and honestly I feel like I can't even code at a level I should be able to. I am also currently working/studying for my CompTIA Security+. It has been going good but, I always second guess myself and doubt my abilities. I guess this a a slight rant and question so far.
My question is how can I better improve both my skills (coding, linux, and security) and also my mental. I would say its imposter syndrome but I don't have a job so I don't think it would be fair to say it is. I just want to break into the job field and show people that if given the help and resources I can excel at the task given. I do learn fast and pick things up pretty good. Any help/recommendations is much appreciated, and I look forward to more talks.3 -
Last night the Russians stroke again. It's become obvious that these Ddos attacks are not performed by just some casual hackers, but are part of cyber warfare - just as I suspected in one of my rants a couple of weeks ago6
-
Media always misinterprets anything related to computer and information technology. Recently found an Indian News channel which aired news about recent cyber attack and stated virus named "Ransomware" (not WannaCry) has affected computers all over the world. They aired wrong information without hesitation despite India being world's rapidly growing IT hub.6
-
When a person asks what do I do I tell them that I'm a cyber wizard.
It explains it well doesn't it ?
God damn muggles... -
/*
No Rant
*/
anyone here with a cyber security cert? i kinda want to go that route of cyber securty. so im curious if its worth it.12 -
Going to a business summit tomorrow and I get to see a live hack and learn about cyber attacks.
Shit better be good.2 -
Looking at colleges on summer break between learning python and some projects can't decide between computer science and cyber security as a major 😰 why can't I choose2
-
Is it just me or does anyone else wince when someone says the word "cyber" when referencing something on the internet ....like the current series of attacks ..... oh god ... i winced just typing that !
I hate the word, its an irrational hate i know still !1 -
Cyber threats are the top concern of C levels. In actuality companies unintentionally expose way too much data. It's ridiculous what some make public.
-
I'd love to get into a career within the cyber security industry.
Anyone got advice?
I've played around with Kali/Parrot and setup a proxmox box to perform pen testing and have a fair number of PDF ebooks and audio books on networks, security and pen testing12 -
How does someone with. A+ certs and a Network + and Cyber Security certifications and still only getting Help Desk jobs calling them 🤷♂️2
-
Things will keep going like they are now, only faster, until some Malthusian Event (natural or cyber) drops everything to a few compiled languages, a web stack, a handful of frameworks, and a couple of kernel types.
-
Not sure how to ask this. I really enjoy Network side of IT. Maybe even throw in a little Cyber Security as well. I feel like I'm trying to every too fast. I got no certifications yet. This is stressful 😫1
-
I am learning cyber security, the weird thing is, 90% of the times i find theory in lectures...so less practical content is present, even then web sites like tryhackme provide work machines which are next to use less if you dont pay for a subscription...FML!4
-
829 GB of cources on cyber sec & programming if u wanna learn new skills
https://mega.nz/folder/1rBHzIyD/...15 -
Discord server under development for software engineering, cyber security, networking, and IT talk in general. Looking to meet new people and talk :). @ me if you're interested in testing it.4
-
I joined in 2011 when there were 3% architects/technologists. Even those were PMP certified.
Now we have 80% archs/techs/coders/devops/cyber, with aws/azure/java/db/cyber certs and no PMP.
Even now managers go off-site for a week to some exotic location and come back to present the architecture.1 -
I'm looking for a project idea in cyber-security...
Any ideas?
I'm good with x86 assembly, c, c++, python and shell scripting.
I'm very well versed with Linux operating systems and basic networking stuff.
I'm willing to learn new concepts11 -
I was plunged into despair after losing $24,000 worth of Bitcoin on Valentine's Day. What was meant to be a day of love and celebration quickly turned into a nightmare. I had been drawn in by the allure of a lucrative investment scheme, only to realize too late that it was a well-crafted scam. As the reality sank in, I felt anger and regret, wondering how I had been so naive. In the days that followed, I scoured the internet for recovery options. However, my hope dwindled as I encountered numerous recovery services that seemed more interested in profiting from my loss than in actually helping. It was a frustrating and disheartening experience, leaving me feeling even more isolated and hopeless. Just when I was about to give up, a friend recommended Tech Cyber Force Recovery. Skeptical yet desperate, I decided to reach out. From my very first conversation, Tech Cyber Force Recovery stood out. They were transparent about their methods and fees, which immediately reassured me. Their team took the time to explain the recovery process in detail, answering my questions patiently. Unlike other services, they didn’t make empty promises; instead, they provided a realistic outlook on what could be achieved. Being a government-approved recovery service added an extra layer of credibility that I desperately needed. Tech Cyber Force Recovery laid out a clear plan to trace my stolen Bitcoin, ensuring that they would exhaust every avenue to recover my funds. As the process unfolded, I was continually impressed by their dedication. The team worked diligently, employing advanced techniques and leveraging their extensive network to track down my stolen assets. Throughout the journey, they kept me informed with regular updates, making me feel involved and reassured. It was evident they genuinely cared about helping me reclaim what was lost. Weeks later, I received the incredible news that Tech Cyber Force Recovery had successfully recovered my $24,000. The relief was overwhelming. What began as a day of heartbreak transformed into a moment of triumph, thanks to their relentless efforts. I am profoundly grateful for the honest and effective service provided by Tech Cyber Force Recovery. They not only restored my faith in the possibility of recovery but also turned a painful experience into a story of hope. I wholeheartedly recommend their services to anyone who has fallen victim to online scams. Their unwavering commitment to their clients truly sets them apart.
EMAIL. T.ec.h.c..yb..e.r.s.f.o.r.c.e.r.ec..ov..e.ry.@.c..y.be.r..s.e.rv..i.c.e.s...c.o.m
WhatsApp. +15617263697 -
Now my desktop wifi dongle is crapping out ...
Why is all this happening RIGHT AFTER black Friday, cyber monday....3 -
Where I learn networks and cyber security, we started working with Scapy. I have a problem with pycharm, it cannot resolve half of Scapy's functions. Do any of you know how you fix it (the program runs but pycharm still doesn't like it)3
-
I'd like to one day work on security consulting/advising (incident response, opsec, SOC, etc). For those of you here that are currently in or have worked with people in that field: what advice do you have for handling cyber risk situations?1
-
Happy Friday. Facebook just disclosed hackers have exploited multiple vulnerabilities to get access to potentially 50 million users. I guess... no weekend for the blue team? https://mobile.twitter.com/dnvolz/...
-
I had 6.5 BTC in a Bitcoin wallet that I believed was lost forever. After numerous attempts with various data recovery firms each of whom could not retrieve my funds, I was nearly resigned to the loss. My last hope was TECH CYBER FORCE RECOVERY, which I decided to try after seeing a glowing review online. From the moment I reached out to them, their responsiveness and professionalism stood out. TECH CYBER FORCE RECOVERY quickly understood my situation and assured me that they could help recover my Bitcoin. They were transparent about the process, detailing how they would approach the recovery and what I could expect. This clear communication was reassuring and a stark contrast to my previous experiences with other firms. True to their word, TECH CYBER FORCE RECOVERY managed to recover my Bitcoin wallet in just 48 hours. Throughout the entire process, the team demonstrated an impressive level of expertise and dedication. Their approach to data recovery was meticulous, and their ability to navigate the complexities of my situation surpassed anything I had previously encountered. What particularly impressed me was their commitment to delivering on their promises. They were not only efficient but also exceptionally reliable, qualities that had been missing in my interactions with other recovery services. The professionalism of TECH CYBER FORCE RECOVERY was evident in every aspect of their work. They provided regular updates, ensuring I was informed about the progress of the recovery. This level of communication helped alleviate much of the stress associated with the recovery process. Their expertise was apparent as they handled the technical challenges with a competence that inspired confidence. They took the time to explain the steps they were taking and why, which made me feel included and informed every step of the way. The team was patient, answering all my questions thoroughly, and they never made me feel like just another client. In a world where many recovery services fall short of expectations, TECH CYBER FORCE RECOVERY stands out as a beacon of hope. EMAIL. (contact @ tech cyber force recovery. info) OR TELEGRAM (@)TECHCYBERFORC. Their ability to restore my lost Bitcoin not only salvaged a significant financial investment but also restored my faith in data recovery services. If you are dealing with a situation involving lost cryptocurrency or any form of data loss, I highly recommend TECH CYBER FORCE RECOVERY. Their blend of expertise and genuine commitment to helping clients is truly exceptional. I can’t thank them enough for their outstanding work.
-
BLOCKCHAIN CYBER RETRIEVE//BEST HACKER TO CLAIM BACK MY STOLEN CRYPTO FUNDS
BLOCKCHAIN CYBER RETRIEVE: The Lifeline That Helped Me Recover My Lost Crypto Funds
In March 2024, I became a victim of a cryptocurrency scam. I had invested $158,000—my entire life savings—into a crypto platform that promised sky-high returns. The advertisement seemed legitimate, and the opportunity was too tempting to pass up. But just days after my investment, when I tried to check the status of my account, I was horrified to find that it had been deleted. All attempts to contact their support team went unanswered, and that’s when the grim reality set in: I had been scammed. The loss was devastating. Not only had I lost a significant amount of money, but it also felt like I had lost my financial future. I felt helpless and didn’t know where to turn. That’s when I stumbled upon BLOCKCHAIN CYBER RETRIEVE, Initially skeptical but desperate for a solution, I decided to reach out after reading countless success stories and positive reviews. Little did I know, this would be the best decision I made. From the very first contact, I was impressed by the professionalism and expertise of the BLOCKCHAIN CYBER RETRIEVE. They immediately understood the gravity of my situation and reassured me that they had the tools, knowledge, and experience to assist in recovering my lost funds. The team explained that they employed advanced forensic techniques and specialized strategies to trace and recover stolen cryptocurrency, a crucial component in fraud cases like mine. What truly set BLOCKCHAIN CYBER RETRIEVE apart was their transparency and consistent communication. Throughout the process, they kept me informed every step of the way. They answered my questions promptly and clearly, making sure I was never left in the dark. The level of customer service was extraordinary, and I always felt like my case was being handled with the utmost care and urgency. Incredibly, within just two days, BLOCKCHAIN CYBER RETRIEVE successfully recovered my full investment of $158,000. I was stunned, relieved, and incredibly grateful. What I thought was lost forever was returned to me, thanks to their meticulous work and unwavering dedication. The entire experience was nothing short of exceptional. Not only did they recover my funds, but they also restored my belief that justice can be served in the world of cryptocurrency. Their professionalism, expertise, and commitment to their clients were truly remarkable, and I felt supported throughout the entire process. If you’ve fallen victim to crypto fraud or digital asset theft, I cannot recommend BLOCKCHAIN CYBER RETRIEVE highly enough. They are a legitimate, trustworthy, and highly skilled recovery team that genuinely cares about their clients. Thanks to them, I was able to recover what I thought was gone for good. If you’re in a similar situation, don’t hesitate to reach out to BLOCKCHAIN CYBER RETRIEVE via the following contact information.
WhatsApp:+ 1 520 564 8300
Email:blockchaincyberretrieve (@) post(.) com
It's your best chance at recovering your funds.13 -
Dear Fellow Programmers,
I want to become Cyber Security Specialist and currently learning Java (beginner ). Please, tell me is it a good language for this type of activity and what else should I learn.2 -
HIRE A CRYPTO RECOVERY EXPERT; BEST BITCOIN RECOVERY SERVICE VISIT CYBER CONSTABLE INTELLIGENCE
It was a devastating blow - one moment I was the proud owner of a small digital fortune, 8,000 Bitcoin that I had painstakingly accumulated over years of savvy investing and cautious storage. The next, that entire life-changing sum had vanished without a trace, lost to a cruel twist of fate and my own careless misstep. I had fallen victim to a data breach, leaving me helpless to prevent the thieves from making off with my entire cryptocurrency holdings. The anguish was palpable, a sinking feeling of hopelessness and despair as I realized the scale of my loss. Thousands upon thousands of hard-earned Bitcoins, now in the hands of faceless criminals, beyond my reach. But I refused to give in to despair. Determined to recover what was rightfully mine, I sought out the services of Cyber Constable Intelligence, a specialized team of blockchain forensics experts renowned for their ability to track down and reclaim stolen digital assets. Through their meticulous investigative work, leveraging the transparency of the Bitcoin ledger and their deep technical expertise, they were able to painstakingly trace the movement of my stolen funds, identifying the wallet addresses the thieves had used to launder the cryptocurrency. With this critical intelligence in hand, Cyber Constable Intelligence then coordinated with law enforcement to freeze those illicit accounts, preventing the funds from being moved any further. The final step was a delicate negotiation process, with the recovery team using their connections and influence to compel the thieves to return the stolen Bitcoins - a tense and high-stakes affair, but one that ultimately proved successful. After weeks of anxious waiting, I was overjoyed to have my 8,000 BTC safely returned to my control, a true testament to the skill and determination of the Cyber Constable Intelligence team. It was a harrowing ordeal, but one that reinforced the importance of robust security measures and the remarkable capabilities of specialized firms dedicated to combating cryptocurrency crime and restoring rightful ownership. Losing 8,000 BTC was one of the most stressful events of my life, but thanks to Cyber Constable Intelligence, I was able to reclaim what I thought was lost forever. Their professionalism, technical expertise, and commitment to security made all the difference. If you find yourself in a similar situation, I cannot recommend them highly enough. Cyber Constable Intelligence turned a financial disaster into a remarkable recovery, and I will forever be grateful for their role in securing my assets.
CYBER CONSTABLE INTELLIGENCE INFO:
Website: w w w. cyberconstableintelligence com3 -
Entrusting one's hard-earned money to the wrong hands can have devastating consequences. My journey began innocently enough, sparked by the success story of a former coworker who boasted of her newfound wealth and attributed it to the guidance of an investment coach. Intrigued by her lavish lifestyle, I delved deeper into the world of stock trading, eager to replicate her success. Upon contacting the purported investment coach, John Mark, I was met with promises of quick riches and convenient trading platforms. Eager to seize the opportunity, I followed his recommendations and funded my trading account with a significant sum of $78,000. However, what followed was a series of red flags and suspicious transactions that left me questioning the legitimacy of the entire operation. Despite completing numerous trades within my first week, attempts to withdraw my profits were met with resistance and dubious excuses. The company insisted on additional fees for gas and maintenance, a requirement that had never been mentioned before. As doubts gnawed at my conscience, I realized I had fallen victim to a sophisticated scam, orchestrated by individuals preying on unsuspecting investors. Feeling helpless and betrayed, I turned to FAST SWIFT CYBER SERVICES., a beacon of hope amidst the chaos. From the moment I reached out to them, their team exhibited understanding the gravity of my situation. They conducted a thorough investigation, meticulously analyzing every aspect of the scam to uncover the truth. FAST SWIFT CYBER SERVICES. technical expertise are experienced .Despite the complexity of the case, they remained steadfast in their pursuit of justice, leaving no stone unturned in their quest to reclaim what was rightfully mine. With the information I provided, FAST SWIFT CYBER SERVICES. successfully traced the origins of the scam and identified the culprits responsible for my financial misfortune. Their swift action and relentless determination culminated in the recovery of all lost funds, restoring my faith in humanity and the promise of a brighter future. The amount recovered, totaling $78,000, served as a testament to FAST SWIFT CYBER SERVICES.'s unparalleled capabilities and unwavering commitment to ethical practices. Their transparency and willingness to explain their procedures instilled a sense of trust, which was crucial during such a trying time. I cannot recommend FAST SWIFT CYBER SERVICES. highly enough to anyone who finds themselves ensnared in the clutches of financial fraud. Their exceptional service is good. If you ever find yourself facing a similar ordeal, don't hesitate to seek help from FAST SWIFT CYBER SERVICES.. Let FAST SWIFT CYBER SERVICES. be your savior. Contact FAST SWIFT CYBER SERVICES. via⁚
Email: fastswift @ cyberservices . com
Telephone: +1 323-904-9024
WhatsApp: +4670-449-7301 -
Unraveling the tangled web of deception can be a daunting task, but the emerging field of "CYBER TECH WIZARD" is offering new hope for those seeking to confront the devastating impact of infidelity. This innovative approach leverages advanced digital forensics and data analysis techniques to meticulously piece together the digital trail left behind by unfaithful partners. By delving deep into smartphones, computers, and online accounts, skilled practitioners are able to uncover a startling level of detail about clandestine communications, secret rendezvous, and the complex web of lies that often accompanies infidelity. The insights gleaned from this painstaking process can be nothing short of revelatory, providing scorned individuals with the cold, hard evidence needed to confront their partner's betrayal and reclaim a sense of truth and transparency in the relationship. Yet the implications of CYBER TECH WIZARD extend far beyond the personal realm, as these techniques also hold the power to expose broader patterns of deception, manipulation, and abuse that may have remained hidden for years. As this field continues to evolve, it promises to be a crucial tool in the fight against the corrosive effects of unfaithfulness, empowering those who have been wronged to unravel the deception and forge a path towards healing and accountability. Don't wary if you have been scammed from your hard earn money you can recover them all back, call CYBER TECH WIZARD now through: Email Address cyber tech wizard @ cyber services . com
Good Day and thank me later. -
Need a Trusted Hacker to Recover Stolen Bitcoins? iBolt Cyber Hacker Top Rated
You've lost Bitcoin? Please don’t panic because it's won't help, trust me i have been there and i know how it felt. iBolt Cyber Hacker is our hero! They’re top-rated for a reason. i can testify they are Fast, reliable, and very skilled, they recovered my stolen funds when I thought it's not possible because i was scammed by another recovery twice before i saw iBolt Cyber Hacker reviews and ratings online. The rate of their success results speak for themselves. If you need a trusted hacker to recover your Bitcoins, i testify for iBolt Cyber Hacker.
Cont/Whtp +39, 351..105, 3619 Em.ail: ibolt @ cyber- wizard. co m -
The Bitcoin Resurgence: My Unforgettable Experience with Pro Neuro Cyber Force Recovery
Recovering lost assets can be a daunting and complex process, but Pro Neuro Cyber Force Recovery’s approach offers a glimmer of hope for those seeking to recover their lost Bitcoin. Cyber Force, a renowned cryptocurrency recovery specialist, has developed a meticulous, multi-faceted strategy for tracking and recovering lost or stolen digital assets. Their approach begins with a thorough investigation, leveraging their extensive knowledge of blockchain technology and network of industry contacts to uncover the trail of missing Bitcoin. Through meticulous analysis of transaction histories, wallet addresses, and other digital trails, Cyber Force is often able to identify the last known location of the funds and the individuals or entities responsible for their disappearance. From there, they employ a combination of legal, technical, and negotiation tactics to navigate the maze of crypto regulations and recover the lost assets. This can involve everything from filing civil lawsuits and working with law enforcement to implementing specialized software and engaging in high-stakes negotiations with anonymous hackers. Cyber Force’s tenacity and resourcefulness have earned it a reputation as a formidable ally for those seeking to recover their rightful digital wealth, as evidenced by its successful recovery of the 45,000 Bitcoins at the center of this case. With its unwavering commitment and innovative approach, Cyber Force offers a glimmer of hope to those who have fallen victim to the perils of the cryptocurrency landscape. Be sure to email: for immediate support. Thank you.
WhatsApp : +1 (661) 418-4457 -
The Right Crypto Assets Recovery Service - iBolt Cyber Hacker
If you’re considering a reliable and professional cryptocurrency recovery service, iBolt Cyber Hacker stands out as a trustworthy option. Here’s why I would recommend their services:
From the initial consultation to the completion of the recovery process, iBolt Cyber Hacker maintains clear and consistent communication. They explain their methods in a way that’s easy to understand, fostering trust and confidence in their work.
If you’ve found yourself in the unfortunate position of losing access to your cryptocurrency, iBolt Cyber Hacker is a dependable ally. Their combination of expertise, transparency, and security makes them one of the top choices for crypto asset recovery. While no service can guarantee 100% success, iBolt Cyber Hacker’s track record and professionalism make them top
WhatsApp: …… [+39, 351..105, 3619]
Contact Email: …. [Support @ibolt cybarhack. com]
Homepage: ……… [http s:// ibolt cybarhack. com /]11 -
Bitcoin Recovery Services: Restoring Lost Cryptocurrency
If you've lost access to your cryptocurrency and unable to make a withdrawal, I highly recommend iBolt Cyber Hacker Bitcoin Recovery Services. Their team is skilled, professional, and efficient in recovering lost Bitcoin. They provide clear communication, maintain high security standards, and work quickly to resolve issues. Facing the stress of lost cryptocurrency, iBolt Cyber Hacker is a trusted service that will help you regain access to your funds securely and reliably. Highly recommended!
Cont/Whtp + 3. .9 .3. .5..0. .9. 2. 9. .0 .3. 1 .8.
Website: h t t p s : / / ibolt cyber hack . com / -
Sometimes after a smoke sesh, i want to have cyber sex like a kid again,,,im 34. This stuff makes it fun1