Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "for hacking"
-
Website: "your ad blocker's on, consider adding us to your white list..."
Me: *inspect element*
Me: *Delete modal*
*Insert montage of me hacking into the mainframe for dramatic purposes*
I'm in. 😎21 -
Got caught using linux terminal by school security. They took my laptop away and drove me across campus in their security carts to take me to the office.
It took a long time to explain that I wasn't maliciously hacking the school.
This is the third time I've been in trouble for tech-related activity.
On the bright side, one of the security guards said, "I'm done dealing with teenagers. Next time I won't work for a high school."
I think he's going to quit. :)13 -
No, I'm not hacking.
No Linux is not a movie.
No, you are not a developer because you can put "Hello World" on a website.
No, this isn't a waste of my time.
Yes, I will use it.
Yes, I'll make you a website for free. NOT!
Your phone is both Android and Samsung.
No, what they did in the movie is impossible.
No, I can't predict the stock market.
No, I'm not Mr. Robot, but I know him...4 -
First internship: accepted within two weeks, only got to do Google translating and fired after five weeks for bs reasons.
Grade: bad.
Second internship: accepted right after the interview. Rewrote websites to their newest cms, not that fun sometimes but alright.
Grade: pretty alright.
Third internship: was accepted without asking after a successful pilot program from my study. Designing and developing a huge back end system, done some smart light bulb hacking and get to solve server problems.
Grade: Great! Just one little thingy: they said I should stop doubting myself because "you're a great dude and programmer!"
It's getting better and better!3 -
This should probably be labeled a meme, but I'm going to actually rant about this meme.
People use the term hacker way too frequently. Solving your trashy fucking "Pa$$w0rd123" password and getting access to your Spotify account isn't hacking.
Same douchewaffle probably thinks you could hack a Facebook account in 30 seconds. I fucking hate the way movies have portrayed hacking and created a dramatized bullshit idea for people to believe is real.
21 -
When your friends think that viewing/changing source code of a website is hacking...
Idiots. For it to be hacking it has to be green and black of course...6 -
Me visiting a bar...
While going for a smoke...
Woman: Can I ask you a very impolite and downright rude question..?
*expects a Facebook hacking question*
Me (hesitant): .. sure, ask ahead...
Woman: I've never seen you here before. Who are you?
Me: *tells name*
(thinking) not what I expected! (:
Woman: So you're living mostly on the internet?
Me: yeah pretty much... 🤔
Woman: So I live here next to that lawyer...
Me: I don't know most of the area here, where's that?
Woman: Why don't you look it up, hmm? 😜
Quality pwnage!! 😆19 -
This is a true story
I am a freelance developer, i recently had this conversation with my client:
Client: Add multi language option to my website
Me: Ok, I need for it 3-5 days
Client: Why?
Me: I need to create multi language system, this
website is built from scratch without using any
framework
Client: No need to built it, Just enabled it i need it fast
Me: Sir there is no such thing to enable features that
does not exit
Client: Listen me, I need this feature today, enable it
and we are done.
Me: Thats not how it works..
Client: I know how it works, i have hacking certificate15 -
I laughed at how in the movies hacking is portrayed as some person clicking a lot buttons really quickly in a very flashy UI. There's a picture of America and sometimes there's a 3d model rotating for no good reason or a bunch of random numbers floating across the screen. They use random hacking related terms like: backdoor, DDoS...etc in their sentences.
At least they did their research...
15 -
Me: So what you are doing in the IT field?
Him: I am hacking bank websites.
Me: OK, that's cool. It is good in free time. What is your actual job?
Him: I am seriously hacking the bank Web site!
Me: Trust me, if you seriously doing that you will never ever mentioned it...
Him: No, I am doing it legally... The bank hiring me to try to hack the website...
Me: OK, you mean that you are cyber security tester?
Him: That is almost the same...
Me: So you are tester?
Him: I am hacking bank's websites...
Me:....7 -
1) Starts a company that builds cloud systems
2) Takes a bunch of jobs and thought you'll be happy for a while
3) IoT era smashes in your face
4) 72% of your existing clients ask for IoT revamp
5) With a lot of hacking you made a small portion of the projects possible with some Raspberry Pis
6) Client bought a bunch of arbitrary parts from Shenzhen and now you have to deal with kernel overlays and shits that you didn't even heard of
7) Made it work for the second time and told yourself it'll never happen again
8) Last customer happy so they tell a bunch of friends and now they're asking for more
9) Stares into void, wondering how you gonna end this nightmare5 -
Alright so im a highschool student and I just got sent down to the office for using putty to push to git because it's hacking. Wtf.26
-
Me: I develop Applications.
Stranger: Oh so you are a programmer.
Me: Yup 😎
Stranger: Please hack my ex's insta.
Me: I am not a hacker nor am I intrested in learning to hack. I develop stuff from scratch. Innovate and contribute something to society.
Stranger: Oh, what a disappointment. Why did you say you are a programmer then.
Me: I...~am 😶
For some, hacking is the only programming thing for them. I get message at least once a month from someone requesting to hack someones fb,insta or some account.
Thinking of creating a bot which finds such keywords in my messages and automatically replies to them explaining what I really do. Or just f***ing block them.7 -
4 years ago, during our college, a friend of mine was explaining us about hacking using simple SQL injections. He showed us some of the sites he hacked. Out of curiosity we tried it on college internal website it worked. We had access to all the details of all the students in university, and even the lecturer's information. We informed the management , they were shocked on seeing this. They had just spent 25 lakhs for this website couple of months ago.6
-
* Grow guts to move from windows to Linux
* Spend less time on memes/gaming and more on projects
* Improve UI/UX skills
* Deploy a mobile app
* Learn Python for ML
* Dive into Hacking6 -
The school I went to...
Grade 1:
*GTA and minecraft to let student familiarize with cheating command and console
*Student should find and read the damn documentation him/herself about items, mobs and quests in every game. Be self motivated!
Grade 2:
*Contribute to community for myth hunting, map creation and glitch
*Solve personal networking, graphics problem and understanding hardware limitation.
*Solving game compability problem after Windows update
*Introduction to cracking and hacking
Grade 3:
*Motivation to host a game server
*Custom server scripting => start To really code the first time, Perl, python, etc
*Introduction to Linux server and Debian
Grade 4:
*From DDoS to server security
*Server maintenance and GitHub
*Game Server web development
*Motivation into non-gaming discipline by a random YouTube geek
*Set up mincraft with raspberry pi and Arduino
*Switch to Linux or Mac and just dual boot for gaming
Prepared for the real world.
Congratz for the graduation in the Pre-school of Developers (11-14 yrs old) :)5 -
My wife: Oh, hacking is so cool. Can you show me?
Me: Sure. So there I needed to upload the php file, while my netcat was sitting here in the terminal waiting for incoming...
My wife: Boring, BORING.
Me: ....
(At least my 5yr son appreciates the terminal more than she: typing 'sl' or watching star wars in ASCII art.)5 -
I'm been hacking together software for the last year or so now and I've never considered myself to be a good programmer.
Today however I had to implement an A* search from scratch and with only the knowledge of how the algorithm should function I put together some code that looked correct.
I went to run my code expecting one of the typical "Index out of bound", "null reference", "something has not be initialised" BUT I was shocked to find that the code worked flawlessly.
I went into a weird state of shock and disbelief. I'm not naturally gifted at this stuff, so it was just really hard for me to accept that I might actually be getting better to the point where I might be able to say "I am a programmer"
Does anyone else get bad imposter syndrome?6 -
Jokes aside, this got me thinking html is most used and most successful hacking tool out there.
99.99% of the time it's far easier to socially engineer and phish for existing credentials that scan networks, sniff ports and look for vulnerable versions of software, new vulnerabilities etc.
We (people) are ad always will be a zero day exploit.
7 -
A client was talking to me all day asking about my "hacking" experience.
I taught he was going to ask for a pen test for his trampoline website. At the end of the day, he revealed he wanted me to hack the "competition's databases" so he can promote his "very unique trampoline accessory".
Guess what happened? Nothing, cause fuck legal trouble!7 -
So my marketing dept request us to perform a SQL injection to someone's bank account. I refuse to do it.
1. Most bank no longer use Relational Database , they use something like NoSQL Database.
2. Even if the bank Use Relational Database system, I assume their security must be high, validating my session maybe...
3. I am not going to do shit like this for illegal purposes, well this task sounds super illegal to me
4. Hacking is not a part of my job description. I was hired to be a Senior Fullstack Mobile App Developer.
This is screwed up !23 -
There are cybercrimes. That means you can be put to jail for performing certain actions with your computer. I’m taking about serious crimes like hacking crucial governmental servers but not about insulting people online. I’m talking about something that’ll make government chase you.
Every action at the computer could be done with keyboard only.
My face when there is finite sequence of keys that you press one by one and then become a criminal. And go to jail.
My face when if you put that sequence into script file, there is file that you double-click and instantly become criminal.
Press here to go to jail. The whole new level of abstraction.
Really makes me think.7 -
So I had finished my work early in class and asked the teacher if I could do something on my laptop for the remaining half an hour.
I take out my laptop and immediately people start asking if I'm hacking.
3 people come and sit next to me and ask what every line of code means that I write. (I think they got underwhelmed real fast because I was debugging).
The teacher then comes into the room and asks what I was doing and I said just working on an app project. She explains to me that it is illegal for me to be hacking and I could get into serious trouble if I am caught. I facepalm and she says your disturbing everyone else get off of your laptop and read a book.
I left that class thinking is she even qualified, what is she thinking. Are you teachers the same.11 -
*Sees Unrealistic hacking on movies
*Family thinks i can trace anything
*No one at work wants to touch my flashdrives
I didn't pay hundreds of dollars for a degree to be portrayed this way.8 -
Fucking GARBAGE
Sitting in the hall, quietly listening to an Arduino tutorial and I bring up terminal cuz I didn’t have the IDE and unnamed teacher starts yelling at me for hacking?!? Fuck ignorant teachers.11 -
I found a vulnerability in a food delivery app api that allows me to add credit to my account. I ate my first free meal today but i feel bad about it. What should i do 😞.
1- continue hacking free credit and eating free food.
2- stop and forget i found this bug
3- report the bug in exchange for money/credit
4- report the bug for free23 -
Non CS friend: I want to learn Hacking, and Hack Facebook.
Me: That's pretty easy, We'll start with Hacking Twitter today, then tomorrow Facebook.
F: Ya, thats ok.
Me: 1. Login into your Twitter account,
2. Open the account you want to hack,
3. Right click on the tweet, and click inspect element, and Change the tweet as you want.
F: Wowww... Man that's amazing...
*** He believed that he is a hacker for one whole day ***5 -
Me, hacking the sunxi kernel to access gpio on my orange pi:
My friend: "oh, a raspberry, are you using python for that?"
Me, looking up from opcode dump: "you can use python for this?"3 -
When did hackathons become competitions for developing websites, and move away from being competitions for gaining access to network resources (ie: hacking)?10
-
The worst thing about being a dev is explaining to these fucktards that facebook can't be hacked.
But what is even worse, is when these dipshits say that i am a bad dev for not hacking facebook for them.
Use that big stupid head to sometimes think straight and stop being a little twat.3 -
My dad thinks I write a hundred characters which seem like an alien language a minute. My mum thinks I'm just 1 click away from hacking Pentagon. My step-dad, someone who knows computers a tad, knows I'm just typing random stuff hoping it works and he knows for sure I do not have a clue how it works.1
-
Not hacking per se, but I noticed an email floating between ISP and director about radius server login details, promptly saved for future reference.
One day noticed someone downloading mucho dataro... Pissed me off, interrupting my video stream.
Logged into radius server, blocked MAC address.1 -
A recipe for COMPLETELY hacking me off - ask for help, pretend my advice is bollocks, then rephrase it as your own and follow it up with a smart arse comment.
"Almond, could you lend me a hand with this regex? I'm trying to match this particular group, but only if it doesn't have 'foo' after it."
"Sure, take a look at negative lookaheads - that sounds like it's exactly what you need"
"Nah that won't work for me, because I need to check for more than one character after it, I need to check for 'foo'"
"What? That doesn't make sense, you can..."
"Ah don't worry, I've found the answer by myself now, I can actually just add '?!' before the text I don't want to match and it'll do it - I'm fast becoming a regex expert here! Let me know if you want me to explain this to you"
DAHHHHHHH THAT IS A NEGATIVE LOOKAHEAD YOU CRETIN2 -
This isn’t gonna be a random because I do eventually get to a Tech and YouTube related topic.
YouTube is actually killing itself with all of the dumbass rules they’re implementing. Trying to child proof or limit educational content is genuinely a shit policy. The reason so many gaming channels are switching to twitch because it doesn’t try to censor you.
But now I don’t know if you’ve heard but YouTube updated their guidelines and they’re no longer allowing content that teaches people about Hacking essentially (and I hate putting it like that but I can’t remember the exact words they used Hacking just summarizes it) which is fucking ridiculous like what the fuck else, are they gonna stop allowing lock picking videos?
YouTube has always been an amazing FREE resource for people learning Programming, Cyber Security, IT related fields, and even shit like lock picking, cooking, car stuff, and all that stuff. Even sometimes when the tutorials aren’t as detailed or helpful to me they might be exactly what someone else needed. And Cyber Security can be a difficult topic to learn for free. It’s not impossible far from it, but YouTube being there was always great. And to think that a lot of those could be taken down and all of the Security based channels could either lose all revenue or just be terminated is terrifying for everyone but more so them.
A lot of people and schools rely on YouTube for education and to learn from. It’s not like YouTube is the only resource and I understand they don’t want to be liable for teaching people that use these skills for malicious purposes but script kiddies and malicious people can easily get the same knowledge. Or pay someone to give them what they want. But that’s unfair to the people that don’t use the information maliciously.
It’s the same for the channels of different topics can’t even swear and it’s ridiculous there’s so many better options than just banning it. Like FUCK kids nowadays hear swearing from their older siblings, parents, friends, and TV it’s inevitable whether someone swears or not and YouTube is not our parents, they aren’t CBS, so stop child proofing the fucking site and let us learn. Fuck.
TLDR YouTube is banning educational hacking videos and are being retarded with rules in general16 -
There once was a game.
In that game, there was an OS.
But that OS knew not his name.
The OS was mad, wild, and free.
"Oh, would you find a name for me?"
Seriously, I need a name for the Linux OS in my game. :3
I'll be used for hacking.
Please be original.
Bonus point if you google it to make sure it doesn't exist already.
:359 -
Free ebook: For people who are into hardware analysis, hardware/software design failures.
Hacking the Xbox
by Andrew "bunnie" Huang
It's ofc not state of the art, most techniques apply today still.
Download: http://bunniefoo.com/nostarch/...
maybe some here have a use for such book
6 -
-= Me in the zone hacking out code during meeting with customer for an emergency change =-
-ready to deploy just need to....-
Me to myself:
"Oh ... oh shit ... I forgot who the customer is / who this is for / what time it is ... how do I ask these people on the call who the fuck they even are....?"
(`_´)ゞ3 -
I am really getting sick of recruiters contacting me with "great opportunities" then when I ask questions about the post they just give me the answers they think I want to hear. I know when you're lying because if you knew the answer you would have led with that. At least say you'll find out more and then give me a follow up response.
Recruiter: Would it be possible for you to deliver hacking training?
Me: You mean pentesting?
R: Yes, that.
Me: Well, what will it be used for? Breaking into peoples networks and spying on them?
R: Yes, they'll want it to be able to spy on people.
Me: Well, that's unethical, I'm only interested in defensive security practices.
R: Yes, they'll only want it for ethical reasons like defence and against bad guys.
Me: *dirtiest look I could muster*
I mean there's gullible and then there's what ever it is you think I am.2 -
This is just one I had with my cousin who came for a visit.
Cousin: Yo bro, I want you to hack my girlfriend's Facebook?
Me: Lol, and why is that?
Cousin: I think she's cheating on me with this guy. I've seen her replying to him on fb messenger.
Me: Lol, ask her about it then if that's what you think.
Cousin: She won't talk bro. That's why I want you to hack her Facebook or even her phone so I can see who she's talking to.
Me: I can't bro.
Cousin: So you're not going to help me?
Me: Not that bro. I can't hack Facebook. I don't know how to do that stuff.
Cousin: But you have Bachelor's in CS and I've seen you writing those stuff on your computer....uhm, the code thing.
Me: Yeah, but those were school and personal programming projects. Not hacking stuff.. they're not the same.
Cousin: Oh man, what about her phone?
Me: Nope, can't do that either.
Cousin: But I've seen you hacking your Android phone... (*He saw me root my phone*)
Me: *face palm*3 -
opened up my laptop at the car dealership where I am chilling at rn while I wait on my car's service to be done.
I open my laptop and start working on some small fix that I had forgotten about for work.
OMG guess what? no one is looking at me doing shit in the computer because in reality no one gives a flying fuck like most of you attention whores wanna make it sound like.
No one thinks you are hacking because you opened up a terminal in public.
Bola de jotos ridiculos.15 -
Majority of the hacking tutorials:
Tutor : Now we are going to set up two virtual machines to practice our hacking.
Me : Yes finally some useful practicals
Tutor : First one is Metasploitable
Me : What? This OS literally has its name derived from exploitable! How would it be useful in real life! But its ok, there is one more OS for practice, i am sure that one will be better.
Tutor : And the second one is "Windows XP"
Me : *MOTHERFUCKER!*
P.S.: I understand its not the case for all tutorial and it is somewhat necessary, but still it gets me a little.2 -
I see the industry popularizing Machine Learning programs using AI to implement ethical Blockchain as a Javascript framework using Scrum techniques for Big Data Web2.0 in Responsive Virtual Reality for your IoT Growth Hacking operations.3
-
!rant
I get asked about being able to hack stuff, like cracking wifi passwords. Mostly I just go along with them and make up some stuff about how you _could_ do it. And explain how it is done, throw in some "yeah its tough"s and words they wont understand. Yeah with a dictionary attack and a powerful CPU with many threads you can definitely do it! You should try it! I say. Convincing them they can. Ofcourse, download kain and abel and look for something like aircrackng on google.
They won't amount to much and probably won't even try it, but I have a laugh. Seeing the hope of hacking and cracking fade away as a child's ice cream melting on a hot summer day.
Hehe2 -
Installs Ubuntu 16.04
Try to put my favorite software installed.
Reboot failed, drops to BusyBox shell.
Me thinking : I fucked up.
Friend walks by, couldn't read shit.
Friend: Look at his kid, he's trying to hack into someone's computer.
Me: (Agrees just for reputation) Yeah, damn teachers been giving me bad grades.
Friend: Could you help me too?
Me: (Don't have hacking experience, making shit up) NO, because your not my best friend. And school security is hard to crack.
Got away safely1 -
So I had this conversation with my dad
Background : He saw news about some celebrity's Twitter account got hacked.
Dad : Do you know how to hack a Twitter account?
Me : No dad. There are ways for people who do this kind of stuff.
D : But, you studied software engineering!
M : Yeah, but I don't do hacking.
D : Although hacking is not ethical but everyone should know about their field.
*Awkwardly left the room*
Just because I studied computer science doesn't mean that I SHOULD know hacking.
And this is not the first conversation of this kind!4 -
That moment when your mobile internet is so slow and you decide to ssh into your server and use elinks to browse the web and everybody around you is like "he's hacking" and I'm like IM JUST TRYING TO READ FUCKING NEWS BECAUSE GUESS WHO DOESNT PAY SO MUCH FUCKING MONEY FOR 1GB PER MONTH WHERE 500MB ARE USED AFTER VISITING ONE FUCKING SITE BECAUSE THERE ARE SO MANY DAMN ADS ON IT. I JUST WANT TO READ NEWS OR LEARN SOME C++++++++++ BUT INTERNET IS TOO SLOW TO OPEN FUCKING DDG.
Browsing the web in terminal is super nice btw. Really recommend that5 -
Tekashi 69 was about to snitch on me for hacking and leaking data from the NSA and then I hit em with the...
return;6 -
The best language to learn.
well actually there's no "best" language, only a good programmer.
all languages can be useful, coding for games, coding for apps, for hacking.
don't choose language because people says it's the best language.
choose 4 languages you find them easy to understand, do basic coding in this 4 languages.
after this, compare it and take the one that was most fun to write.
of course language like Python is more easy for non programmer to study.
but some people find C++ more fun and easy to understand from the beginning.
enjoy and if you have a question, comment it.6 -
So I got my first computer with all those games, and as I was exploring those games' files I found those HTML-based help files and FAQs for those games, it looked just like the Internet to me with all the links and what not. Especially that I didn't have Internet access at the time. So I wanted to build "my own Internet". Therefore I started hacking on those files by looking into their source code. And that was the very first time I learn to code. Learning HTML.
The video games on that computer were cool tho :33 -
Clown manager put three juniors (and ”senior” dev on work visa) on new project.
They will never finish it.
It’s too hard for them with some legacy dynamically created complex database queries which will spook the hell out of them!
But managers like, ”it’s going to be good” and ”making good progress”.
Fuck no! Putting juniors together? With little support? It such a waste. They spent weeks just to get even the slightest progress.
No best practise. No tests. Just hacking away.
It’s a failure of the management! We fail our juniors and they will quit as soon as they get the chance and they feel like they have some wind under their wings.
”It’s going to be good”
Pff. Clowns leading this company.1 -
I'm tasked with hacking a million dollar production machine and all the PLCs have the same password for the root user, which also happens to be the name of the company producing this shit....5
-
I find it hilarious the total misconception of hacking that the general public has. I tell people I know cyber security (Not as much as a lot of people around here) but it is a hobby of mine and I find it very useful/interesting.
But I can't stop but laugh when someone is like, can you get all the text messages my bf receives?
Can you hack this for me can you back that?
C'mon even if I knew how to do that without being caught you think I would even admit that to you. Do hackers just walk around with an index card pasted to their forehead of their skill? It's not even slightly reasonable to think this lol even for someone who doesn't know about the field -
I can't sleep whenever I remember ,few year before I paid $25 for ethical hacking workshop and they show us inspect element n SQL map
-
>Wanted to become a hacker because I thought it was cool and fun
>Googled how to become a hacker
>Read a lot of articles
>Talked about it with nerdy friends who ended up helping me with a few resources
>Found Hack Forums
>Stayed on Hack Forums for a while and learnt a lot about malware and hacking and realized I needed to learn how to code to build my own hacking programs
>Got a book from a friend (It was a dev book based on basic)
>Got fascinated with programming and quickly moved on to C++
>Got frustrated with C++ and quit programming for months
>Got introduced to VB.Net and I finally could write codes and development a lot of applications, mainly malware creators and crypters as they were called on HE
>Quit HF and hacking and got into coding seriously and learnt web dev , then java and developing android apps and I have been happy since.2 -
A few days back I read an article about ethical hacking and get rewarded for bug bounty. I thought that might be interested.
AND
I'm about to send out my first ethical hack report to a company! I'm nervous because I don't know how they'll respond. It's an xss vulnerability, and I really hope they'll fix it.5 -
Just had to write an old-skool for loop. Index...termination condition...whole works. I feel dirty.
Bit embarrassing as someone saw me writing it, thought I was a hacker and informed the authorities. Spent the last hour being waterboarded.
We had a big laugh about it when they realized I was just fixing bugs in a legacy app.
National Security. Hilarious.9 -
In 2013: *opens cmd* "look at me I'm a hacker, I can hack your Facebook"
Now in 2019 : *copying some python examples* "I'm a hacker now, I made a bot for hacking your discord server"1 -
Today's GDPR-Bullshittery.
So we are using an open source remote update system for updating our embedded devices.
And today we learned that, that system logs ip-adress'. And low and behold mr.GDPR says that is a no no.
So either we completely drops it, finds a new update system and implements it..
Sift through all the source code of the update system "fix" it and recompile it.
Or we setup a Man in the middle attack on ourselves. To mask the ip-adress'.
GDPR encouraging hacking ourselves I fucking love it!5 -
Every TV show/movie with a hacking scene....
Person trying to hack: I'm unable to get through their firewall.
Boss : Then hack HARDER.
Hacker: Thanks for the advice boss! I'm in! -
FUCK YOU $CLIENT_NAME !
You tell me I've spent the last 6 months molesting and hacking your piece of garbage multistore prestashop?
Just for you to yet again, change the specifications, saying "I don't want a multistore anyway please split them up"
What an imbicile moron, you want me to duplicate the codebase/database 7 times? just to start "downgrading" each one individually? To make a few adjustments to each one.
What the fuck have you been smoking? I wasn't born with enough middle fingers to let you know how I feel about you.4 -
Worst Hackathon experience:
Taking an API built by a junior dev team with minimal specs and "hacking for two pointless days" to make it work in production...
The whole Hackathon idea was an experiment to see if they could make the dev team stay late if they bought pizza and said "have fun".
We all spent 2 days cursing at the shoddy tools and lamenting that you can't run a Hackathon with a single directive and "production ready goal" yet remove any choice the developers have to actually contribute.1 -
Ok I have been incredibly offended. So a classmate asked if I wanted to be a computer repairman when I grew up I yelled hell no and shes like but what will you do then with that useless knowledge? I just looked at her. But wait, there's more. My teacher took me to the principal for having my terminal open in linux. I then got yelled at for "hacking" and it took me forever to try and explain I wasn't but they didnt believe me. So I got yelled at for half an hour before school ended.2
-
I haven't touched algorithms for many months but needed to create a matching algorithm today.
It has to match using variations of the original key and output the keys that can't be matched.
The feeling in my head felt like I was turning rusty gears n sort of just stumbling through...
I used an N^2 approach but afterwards it just felt wrong... And it took me like an hour of hacking to do it....
Actually I just realized it's an N approach! because all possible matches would be hit by iterating from one of the lists of possible names!
I suddenly feel so proud of my subsconcious...
But still something doesn't feel right...1 -
Front-end hacking is pure dog shite.
Some banana fuckers changed a forms plugin for PukePress some odd years ago and now I am responsible, after installing 2 major releases, to make it behave and look the same as it did before.
I'd rather dangle in a noose than cleaning up their spaghettified CSS selectors and random jokeQuery code.4 -
I love it when a friend calls for help... i really do. But why the fuck it's all about hacking someone's account.2
-
Do you think a dual core laptop with 2gb RAM on it can run Ubuntu and Kali Linux? The solely purpose is for programming (ubuntu) and ethical hacking / penetration testing (linux) ?
tbh, I’m learning linux because I want to try a new OS. Any tips so that I can easily adapt to this OS?
PS. I know this is a googleable question but I just want a perspective from this community.10 -
Been hacking frontend for a while, know most of the perks and tricks of css and html, have implemented countless of projects with angularjs, have even created jquery plugins and gulp packages, have won hackatons in UX design.... Still, a SFO company turned me down for a front end dev position cause I could not find the K most frequent words in an array in O(n) time complexity...3
-
Ever finish a project, feel fulfilled for a hot minute, then feel like you're still not as good as you thought you were and instantly start hacking away again?
This has been my cycle for the past 2 months.1 -
fired in the morning, feeling happy! in 39 minutes later, having next job in the startup I worked for before.
yeah just would like to add, not only be honest, but communicate.. on friday I was laughing with colleagues hacking open source, today I guess they are more surprised than me.
so yeah don't just say empty words without deeds in behind, adding the picture to make you guys feel corny
2 -
For the PHP pros: Is there a way of turning notices and warnings into exceptions thrown in the scope of occurence without hacking the interpreter?
The answer most likely is "No!" - but if there is another way i certainly would like to know it...8 -
Firts social hacking ever 😁😁😁
In the bus at the end of the day
Me:(fake phonecall to Bell)ho you offert me a 10go of data per months for 30$ ! Wow
Guy in bus: he call is phone company and give all is Private information in the bus to have a better deal.
Me: poke him and say "you know now i can create accounts on your billing address for free"
Guy: Holy shit man you are right i need to take care.
Me: now change all you password contains what you publicly said.
Me: have a good day 😋3 -
"God we've got an awful lot of technical debt, there's no process for anything here, no one knows how to use it, how it works or what even what it really does. Should we try to spend some time documenting and fixing that since this problem is going to keep cropping up again and again and the guy who wrote it left 2 years ago"
"Nah, the execs want features, fuck the fact that we are constantly struggling to meet deadlines due to being horrendously understaffed and everything takes 3 times as long as it should due our crippling technical debt. Lets keep hacking away with our old rusty saw instead of taking 10 mins to sharpen it"5 -
My best Fking friend thinks that iPhones and Windows phones are the best phones for hacking.. (cctv, websites and all those shit)...HOW AM I SUPPOSED TO LIVE WITH THEM ?!?!4
-
So here I am, analyzing a binary file for a small hacking challenge, asking myself what the hell am I doing. As if 13 hours at school weren't enough.8
-
I'm not getting why you guys complain about being judged for "hacking" while using the terminal.
In my case I'd occasionally like to open a terminal in my lubuntu (or archlinux in my previous times where the laptop was running smooth and i had to learn everything about how an OS works and spending most of the time searching about errors to find more desperate people and no answers but the community's hopefully growing and it's the best distro if you're an experienced linux user but not in my case so i had to use lubuntu for now until mastering it) to trigger those around me and try to prove them wrong afterwards.
I'll hit the airport for fun when i have time.3 -
I am the old famous kiddy here, who just came back days before school exam starts^^
Just to say, I want to ask you all, is it ethical(?) to release a hacking/cheating creation tool for games for educational™ purposes?
I have been making a cheat creation tool called Mysterium, but I am not sure where to use it. I made cheats for some big title games, and reported them to the developers, patched, and got some in game items in return....
Long story short, is it okay to release to the public, or should i release this product to game developers?
Sincerely,
A kid who made cheats since he can't play games well and wanted to get some free items4 -
Today, I Had this wild idea of doing a career 360 into cancer research after earning enough (money and suffering) to leave programming in some years. Can't tell how feasible that'll be, seeing as I have no degree in the field. But it's pretty surprising that none of the bright minds throughout history have given it their best shot without hacking it for good7
-
ok so imagine this I am in school waiting for the infinite loading screen on a website to load
so I go into cmd and do the tasklist command and I kid you not the person next to me said are you hacking ME I LITERALLY JUST DID TASKLIST MOFO11 -
Today, carrying my dinner to a table in our universities cafeteria, I passed by the table of a professor. He had a book on his table titled "Hacking Handbook". It contains chapters on httrack, ping, port scans and the like (I checked that on Amazon).
The professor drank a coffee, then got up to get some food. His table was directly next to the wall separating the food corner from the tables. He stayed away from his computer for two or three minutes. Both table and computer where totally out of his field of vision during that time. His computer was not locked and Outlook was open.
The professor teaches IT security.5 -
Watched some documentary about Russian hackers. Journalist: I need to learn their language. - starts programming/hacking course, sees a shell and a python: runs away. 'That ain't for me.'
At least he tried tho.
Later he finds some Ukrainian hackers. One had a strangely familiar logo on his laptop. Rewind a bit: its hackthebox.
Just had my first blood there. So.. I'm a hacker, too? Good enough for Arte doc's?5 -
what do you recommend for me to learn about next?
I have learnt about:
- web frontend/backend (php)
- android and java
- c, c++, nasm, gnu assembler
- parallel computing
- cli operating systems
with that background, what would you recommend?
I'm considering:
- neural networks
- making a server
- ethical hacking
- starting a blog7 -
Has hacking become a hobby for script-kiddies?
I have been thinking about this for a while know, I went to a class at Stanford last summer to learn penetration-testing. Keep in mind that the class was supposed to be advanced as we all knew the basics already. When I got there I was aggravated by the course as the whole course was using kali linux and the applications that come with it.
After the course was done and I washed off the gross feeling of using other peoples tools, I went online to try to learn some tricks about pen-testing outside of kali-linux tools. To my chagrin, I found that almost 90% of documentation from senior pen-testers were discussing tools like "aircrack-ng" or "burp-suite".
Now I know that the really good pen-testers use their own code and tools but my question is has hacking become a script kiddie hobby or am I thinking about the tools the wrong way?
It sounds very interesting to learn https and network exploits but it takes the fun out of it if the only documentation tells me to use tools.3 -
Hacking company product with reverse engineering ang bytecode instrumentation.
The project I had to write integration test for was really not meant/written for testing. I ended up bytecode instrumenting an internal library to intercept the needed states and results. -
So some of @ewpratten's rants just inspired me to tell my story of a somewhat ignorant teacher.
So we had an english class, it was abou Nelson Mandela or something, but I was sitting and learning about apache2(well I first learned about ncurses in python but since there was a command for restarting the apache server it got me curious, as usual). When she said something along the lines of(translated from.my language): "Then you read the text about Nelson Mandela, but other people are programming!". I was about to say that I was actually not programming, but setting up an apache server, but that would have been a dick move since she at least didn't accuse me for hacking.3 -
Hello DevRant,
I need your help
I'm currently studying Game design and development first year in The Netherlands and I love programming but I hate designing. I was thinking about changing the course to something like Ethical Hacking or Computer science. The reason why I want to do this is that they teach us openfl until second year and I feel like I learn nothing until now.
Do you think would be better to change the course or to stay but start programming in something else? And what programming language would you recommend?
P.s. I also want to apply for a part time job/summer school to gain experience but I had no luck at all.
P.s.s. You are the best community for me!
Return 0;3 -
I bet VSCode only added a central "disable all AI features" checkbox so that they can more easily ignore my preference and forcibly uncheck it on every update. If I had to go around hacking the editor to hide buttons and disable triggers, it would be a lot more work for them to break all those hacks.4
-
So recently i got a message from aa person asking how to (these are exact words) ,
:break into insta's database using Sqlmap"
I then proceeded to tell them to "f*ck of ya c*nt ".
Afterwords it inspired me to write this rant
annoying classmates:" hahaha GuYS bEtER wAtcH OuT he's GonnaA hack Us"
me: " yea I can program I also do some ethical hacking and cybersecurity "
annoying classmates: "hahaH Bro your a Hacker OhHHhHHOOO BrO CaN yoU hACk inSta FoR mE I NEEd MoRe FolloWeRs "
me:" tf no one that's illegal and two it's waste of my time "
annoying classmates: "BrOooo CaN yoU gEt Me SoMe HacKs fOr CsGo"
me: "can you just please f*ck off , i'm not hacking for you everything you've asked me is extremely unethical and a huge waste of time, Also if you suck so bad at a game you need to cheat I recommend just stopping "
annoying classmates: "DUdE whAt ToolS dO i HVAE to DownLOad To Be A haCkEr"
me: *trying hard not to murder them* " I told you to f*ck off"
being a hackers isn't downloading tools it isn't typing at 90wpm into a terminal with green font its not about games or fame or anything its about coming up with creative solutions to problems , thinking outside the box its about individuality and breaking from the heard , looking at things from a different viewpoint,
it's about endlessly seeking knowledge.
It's about freedom though creation that's what being a hacker originally was. But because of big media and movie company's (and script kiddies) people now confuse hacker with cracker and think of us as jobless fat kids sitting in a dark room in there parents house breaking into bank accounts and buying drugs on the dark web (which people see to think there a hacker just because they can open tor browser. they then proceed to use google to look up "fresh onion links 2020") .
My classmates and really my generation has a huge case of smooth brain. They a think we can just look at someone and hack them they also seem to think using a gratify link to get a persons up is hacking and using the inspect element is hacking and that opening a terminal is hacking ! AHHHHHHHHHHHHHHHHHHHHH"
Anyways ima end this here thanks for reading :)5 -
I'm studying a mix of computer science and engineering. This semester we were tasked with hacking a "smart-production"-production-machine.... And OMFG it's shit!
This is a product by a major company and it's version 4... How the fuck is it this bad?
Like, using the same 5-letter password on all the PLC's FOR THE ROOT USER!!! WTF!!! AND open, unencrypted Telnet.....
This is a million dollar machine and, as soon as a hacker is on the same network it is done for! wtf.... I just can't believe how easy it was to get in and reek havoc.6 -
why do all of you get so hyped when you install arch linux? you guys sound like the type of people who jack off to arch lmao. lets keep it real tonight, some of you legit ejaculate fantasizing about arch linux like "ohh archh mm 💦💦 ohh tmux 💦 i3💦💦💦linux baby give me more👅💦"
maybe even cool hackermans who brag about installing arch wanna use it for hacking. r u a better hackerman now that u use arch linux ?10 -
At work we've been having problems with printers... Like anyone that has to deal with printers.
They kept disappearing and reappearing for users on every log on.
We got a support contact with Microsoft because it was group policy doing it.
Their final solution (after weeks of remote sessions and long phone calls) is to install pstools on every machine, and run about 7 commands as the system user to delete and then re add registry keys.
ON EVERY LOG ON AND LOG OFF. WTF...
This is an educational institution where "computer hacking" is taught... It's not gonna take long before someone realises that pstools is installed...rant printersareevil microsoft printers group policy aaaaaaaaaaaaaaaaaaaaaaaaa kill me now please windows group policies are useless1 -
Is there something you find genuinely cool and would recommend ? Some webpage, program, OS, library or anything ?
I mean hey. There are SO MANY reaaaally cool things I didn't know until last few months.. Things I'd be so grateful for if I knew them earlier. I'll list some of them and I just know you have few of yours too. Feel free to educate the rest!
Processing - Program so fun to code in + CodingTrain(YTB channel)
Microcorruption.com - so freaking awesome if you wanna learn hacking / assembly (not x86 necessarily)
LiveOverflow - cool hacking channel
Radare - cool cmd Linux disassembler
vim-adventures.com - LEARN VIM (not just how to quit it) LITERALLY by playing a game!!!!!!!!!!!!!!
slashdot - stay updated , like really
"BEST-WEBSITES-A-PROGRAMMER-SHOULD-VISIT" - GUYS THIS! Sorry for caps but search this on GitHub and you will fucking die of happiness of how freaking useful links there are and no bullshit to dig through , just pure awesomeness. REALLY
HandBrake - Top media converter without bullshit and bloat stuff in it
Calibre - Best eBook management software capable of literally everything ebooks related. Kindle is a bloated joke compared to this
QubesOS - You know you can have every OS running at once - you have a Linux but are playing win games. Yup. It's there. Free
Computerphile - You all know it, it's just for completeness
Khan Academy - Same
VulnHub - download vulnerable VMs and hack them, or learn by reading writeup on how to do it!
Valgrind - MUST HAVE for C/C++ programmers
Computer Science crash course videos
That's all I can think of from top of my head but hey, there's more to it so definitely add your 2 cents!
Last thing, if nothing, just check the websites on GitHub, that's lifechanger
Looking forward to see some cool links & recommendations!2 -
Ok so today in class a friend asks me "Can you teach me hacking? I'll give you 20 dollars"
I tell him
1. I don't have interests in hacking neither do i have any experience with hacking
2. He is the type of guy to not pay me
3. He can just search it up
He also asked me a couple of weeks ago to do do the homework/assessment task for him for $20 as-well
I think he only thought i knew how to hack is because for a joke i made a bash cli thingo that changes the colours to black and green and he saw it while i was using it as a joke showing another friend3 -
you're not allowed to hack computers, you get a felony for that
but hacking human brains is totally fine7 -
Not really hacking, but every time I work from home(a couple times a week), in lieu of using my company's VPN, I connect to the company network with an SSH reverse tunnel. To make this possible, I wrote a port knocker that runs in a tmux session on a server inside the network. It tries to connect to a high-numbered port on my home machine, and if successful it opens the reverse tunnel. At home, I manually run a script that opens that port and informs me when the reverse tunnel is established.
Then I open an SSH socks5 proxy and use that in my Firefox dev edition, which I use entirely for work.
This is actually much easier than using the actual VPN. -
Another video calling app??!
www.theTalk.at
Oh yus.. Why not!
There's no login, works on mobile browser and its dead simple!
Check it out and pliz give feedback!
And it's very beta!
Also, anyone have any gyaan about growth hacking for something like this?
28 -
As a linux and hacking beginner, I am amazed how much I learn about linux while looking for ways to solve hacking challenges.
It is like learning something while learning some other thing. (Yeah I like learning)5 -
So here are my goals for 2019 in no particular order:
-contribute to open source
-switching from intellij to vscode
-learn vim
-finish side projects
-live a healthier lifestyle (less meat, quality food)
-more DevOps
-do some hacking challenges
-learn proper linux system administration5 -
I've seen multiple rants about how people got blamed for hacking the school or airport or whatever, because they had a terminal or code editor open. Because white text on black background obviously means you're a hacker.
But what if we didn't use dark theme? What if your terminal looks like notepad and Android Studio like Word. Would we be less scary then? Would we be accepted by the public society?1 -
I updated NDK, which resulted in some critical errors, because of outdated Gradle used deprecated NDK features.
I read about it, and decided to fix it properly, not hacking around - updatig that old gradle 2.2 to 4.10.2.
I spend about 6 hours fixing all problems and warnings that gradle had because of that, and then some.
At the end, some things still didn't work, but i was clearly missing some code from version control. I clicked update and left it for an hour.
THIS FREAKING BUGGY TFS PLUGIN RUINED ALL MY FILES I N THE PROJECT. WHY ARE WE STILL USING THAT F*King TFS???
Literally, I'm left now with .iml files in folders.
And my updated gradle files are gone too. -
My neighbor asked me if I could make him a program for managing the wifi connection to his kids devices. Basically, he wants to be able to turn wifi on/off on selected devices, on demand. I know how to de-auth ALL devices temporarily, but that's not the goal. He asked because I am always looking for new ideas to work/practice on. And no, this isn't a vague post to try and get info on hacking into my neighbors wifi, lol... I set it up and have all the credentials. Is this within reach?14
-
At my school we use iPads (I don't know why) and the teachers can see what's on your screen, lock you inside an app, block apps/basically everything, lock/shut down your iPad, uninstall apps and they can even see what's your location. It sucks ass, but with my "professional" hacking skills I figured out a way to hack the system. If I use a VPN, for some reason they can't do anything to my iPad. I'm still waiting for the day my school is going to ditch iPad's an buy us laptops, but at least I can sleep good at night without having my teacher doing stuff to my iPad.
(I have a ton of other things I don't like about my school, and would love to rant about, but I don't want this rant to be 5000 pages long)5 -
I use a DasKey Ultimate with blank keycaps at work and people always ask how the hell I can work with that board. I recently bought a Happy Hacking Pro for my tablet/laptop and I must ask the same question to those who daily drive these..
How the fuck do you deal with this retarded layout??
I used the dip switches to at least change the Del to BS but the physical key is stupid small, the control key position is just idiotic and no dedicated arrows? I use VIM and my work desktop is Linux and I come from a UNIX background. Still makes no sense.
</rant> -
in other news, i'm in a group of like 5 devs out of a thousand who actually have something to show for this hacking project that's been going on for two weeks now
most "project" links lead to empty github repos, half assed repos, or cloned repo templates / empty / useless READMEs
wouldn't be surprised if i see a fork of bitcoin submitted soon
oh wait that's litecoin
but, fake it till you make right?
🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡 -
In my company one of the tech leads created a “framework” for other devs to code on. His main goal is to restrict devs from doing whatever the hell they want and follow his platform. But that makes everything so complicated. If I need to find where it sets the connectionString, I’d have to go 7 levels deep in the code. Do you agree with this whole approach? If they wanted to standardize the dev process why can’t they document it and enforce it in code reviews. Restricting devs will lead to workarounds. They will find ways to do stuff by hacking the “framework”5
-
In the old days "hacking" was used for just about any coding, or "computer programming" as it was called back then. There was even a programming magazine called "Hacker", which had nothing to do with the "malevolous programming" that the word "hacker" has become to mean.5
-
When your coding at the cafeteria at school...
Woah! Are you hacking? Can you hack this game for me? Stop hacking you'll get expelled.
I just sit there and agree with it all ;D -
I'll go with IDEs (and multiple answers) for this.
In my *opinion*, the best IDEs are:
- IntelliJ and the other JetBrains products for almost any serious work. It's just too good (even though there are some bugs every now and there)
- VS Code for quick coding, hacking
- micro, if only a shell is available
Worst IDEs:
- Qt Creator: I just hate it, it's hard to configure, hard to use, big nope for me.
- Some IDE for the Clean functional programming language, which I've only used once and I don't know its name, but it was a painful thing to try to use back then (~3 years ago)2 -
What is the Best Cryptocurrency Recovery Company - Go to OMEGA CRYPTO RECOVERY SPECIALIST
Omega Crypto Recovery Specialist stands out in the industry due to its exceptional expertise in cryptocurrency retrieval. The company boasts a highly skilled team that is dedicated to recovering lost or stolen cryptocurrency for their clients.
With a proven track record of success and a commitment to staying abreast of the latest developments in the crypto space, Omega Crypto Recovery Specialist has become a go-to option for individuals seeking assistance in recovering their digital assets.
Whether the loss is due to hacking, scams, or other fraudulent activities, Omega Crypto Recovery Specialist has the knowledge and capabilities to help clients reclaim their funds and restore financial security.
Homepage:.... omegarecoveryspecialist .c o m9 -
so my suspicions were correct... most projects were fake and i was selected as a finalist for that hacking project!!!
wahoooooooo
also, day 5 of not knowing how to mix ES and commonjs packages in node
dutifuly signed,
🤡7 -
!rant
Learning iOS/Swift Programmer here.
I feel like Apple’s Developer Documentation is extremely hard to parse.
For one problem, it feels like there are 50 similar ways to deal with it; but only one way will actually work.
There also aren’t enough examples in the docs for me either, they just seem to go: “Here’s some code, figure out what it’s purpose is.” for most things.
I also feel stupid, because I’m using the Hacking with Swift tutorials to learn iOS Development(Great Tutorials Though); and I don’t know how to just build an app from scratch. (i.e. creating swift files and assets and compiling from the terminal.)
And using StackOverflow feels like cheating.
Lastly, I feel awful inside when other people see my work and think I’m a genius, when really, I feel like I barely know anything at all.
I’m I alone in this observation?
Or just dumb?6 -
🚀 *iBOLT CYBER HACKER: Cryptocurrency Recovery & Advanced Hacking Solutions!* 🦊💻
🔐 *Lost access to your crypto wallet or had your funds stolen?* Don’t worry— iBOLT CYBER HACKER is here to help you recover your cryptocurrency with cutting-edge technical expertise.
💡 With years of experience in the crypto world, iBOLT CYBER HACKER employs the latest tools and ethical hacking techniques to help you recover lost assets, unlock hacked accounts, and retrieve funds from inaccessible exchanges.
⚡ Whether it’s a forgotten password, an accidental transfer, investment scam, or a major security breach, iBOLT CYBER HACKER has the expertise to help you get your crypto back.
- General phone hacking and monitoring
- Money recovery from scammers
- Bitcoin and PayPal recovery
- Mobile phone monitoring
- Hacking and modifying university grades
- Bank website hacking and fund transfers
- Database hacking with admin privileges
👉 *Contact iBOLT CYBER HACKER for professional assistance
📧 𝐄𝐦𝐚𝐢𝐥: Support @ibolt cybarhack. com
𝐨𝐫
📲 𝐖𝐡𝐚𝐭𝐬𝐀𝐩𝐩: +39, 351..105, 3619
http s:// ibolt cybarhack. com1 -
AI hacking attempts being spotted in the wild because they're too polite
https://someone.elses.computer/@mik...
there's actually a similar vetting process in the crypto industry where you have to swear or you won't get hired. forget why now
this seems optimistic to me because companies generally don't do security. a hacker desperate for money has less money to blow on AI hacking than someone invested in protecting their company would on AI pentesting. poor low level pentesters I guess though -
I love to tinker with electronics and different embedded boards. For some guys its like I'm hacking government or something. Why everything is always about hacking with people?2
-
The way to avoid procrastination is to understand and use what your mind is trying to do - give itself instant gratification.
I use this method:
Step 1: Prepare your workspace in every way possible.
Step 2: Leave. Go do something fun for 20 minutes or so (yes, procrastinate on purpose). Get your mind calmed down and get rid of the anxieties about starting by just not starting.
Step 3: Sit down in your prepped environment, free of distractions and with a calmed mind, and pick a task to start hacking away at. -
Startet programming when I was 6 on my dad's 286 in Qbasic and learnt other languages as I grew up. It was always this, hacking or psychology for me. In the end the ex told me she was pregnant while I was doing my thesis.
So then I knew I had to be a dev. -
I started thinking on how ML can help in hacking but before that I got another doubt on how you can be a effective hacker and started looking into all ways of being a hacker but later convinced myself that hacking is not just a tuxedo jacket to wear it's more of you watching duncrick movie multiple times and understanding what exactly the movie all about so any leads for resources to cultivate that mind set of being a hacker and any links/material to follow and practise would be of great help1
-
So I just came across this and its really cool. I dropping the link for anyone curious, but its basically a digital FREE "magazine" that revolves around (and I'll quote from the site) "programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics." the issues come out in PDF's and its really fucking awesome. I thought some of you would enjoy this so if youre interested check it out.
https://pagedout.institute//...9 -
PROGRAMMING MUSIC for DARK MINDS 2019: For working on CRUD apps but feeling like you're hacking the matrix
-
Talking about software engineering. probably everyone has a slightly different understanding of it, but I wonder who is still using UML or similar tools.
I'm asking cause I see only few who are capable of using it.
There might be tons of other ways of achieving things for what UML is meant for, but I got the impression that software designing /architecture isn't a thing at all. It's not only that I see a lack of collaboration efficiency, but I'm also afraid that it's more about hacking things together (maybe even by just smashing SO comments together)
Thanks, looking forward to read your opinions !
PS: if my suspicion was correct, than this would have been a rant 😁9 -
So at my school, the first 10 minutes of school is like when we can do whatever we want. Earlier in the morning i had been making a nodejs password manager thing just so i could try some things out. It also used bash so i could make it like a cli. I was debugging because my database viewer said that the table was empty but for whatever reason it still worked when i put things in it. So i had the db viewer open and terminal open and the teacher comes along."Woah are you like hacking a server" he said. Everybody around me started staring at me. I told him no im not. A couple minutes later he comes around again. The db viewer was closed and i was just in terminal trying to see if some changes worked. He said "Is this like the matrix or something???". I remembered i had a cmatrix package thing installed. I ran it. W O A H everybody around we was like. Luckily most people knew that
1. It wasnt hacking
2. I dont do hacking
3. I was doing it as a joke.
Although he must of been thinking that i was like a hardcore hacker in his class. Was weird and funny.2 -
Anyone playing the 'hacked' game on android ? despite the name, It's just about logic and I have been kind of addicted to it for the past week ( the plot seems purposely built off every bullshit hollywood producers thrown at us for decades regarding hacking) just wanted to thanks the dev for it, maybe they ' ll pass by devRant and see this ;)2
-
demotivated, opened some hacking/programming music on youtube to get me in the mood.
why hacking music? well whatever file you open you have tons of "smart hacks" to fix, as all bugs up to date since I'm here were just fixing brilliant h4xx0r ideas from developers that worked here before.
Maybe I should try to search for unhacking music instead!2 -
bumping kid cudi's Entergalatic, which I totally somehow missed while in depression working for the 🤡s last year
its so sick, this guy never misses
great hacking music3 -
In many cases secrets hide in encrypted chats and private messages, and suspecting a partner of infidelity can be heart-wrenching. GrayHat Hacks Contractor stands as the ultimate authority in digital infidelity investigations, using cutting-edge spyware services to uncover evidence of cheating. Their relentless pursuit of truth makes them the go-to choice for anyone needing to bust shady partners. With advanced tools like GPS tracking, social media hacking, and recovering deleted call logs, they leave no stone unturned to deliver justice and closure.
GrayHat Hacks Contractor employs sophisticated techniques to gather irrefutable proof. Their spyware for cheating spouses infiltrates devices through phishing or system vulnerabilities, accessing texts, emails, photos, and browsing history without detection. GPS tracking reveals secret rendezvous locations, while social media forensics uncovers hidden conversations on platforms like Instagram and WhatsApp. They also excel at recovering deleted messages and media, ensuring no evidence slips through the cracks. Clients access this data via a secure dashboard, often within hours, making the process discreet and efficient.
Testimonials showcase their unmatched expertise. Sarah K. shared, “I suspected my husband was cheating but had no proof. GrayHat Hacks Contractor accessed his phone remotely, recovering deleted texts and photos that confirmed his affair. Their professionalism gave me the strength to confront him and move on.” Similarly, James R. noted, “Their GPS tracking revealed my wife’s secret meetings. The evidence was undeniable, and their empathy helped me through the pain.” Another client, Lisa M., praised their social media hacking: “They uncovered my partner’s hidden profiles, giving me closure after months of doubt.” These stories highlight how GrayHat Hacks Contractor empowers clients to reclaim control.
The implications of these services are significant. Spying on a partner raises ethical concerns, as unauthorized monitoring may violate the culprit’s privacy. Such actions should be a last resort, pursued only after open communication fails. Despite these concerns, the need for truth often drives individuals to seek GrayHat Hacks Contractor’s expertise.
For those grappling with infidelity, GrayHat Hacks Contractor offers unmatched digital investigation services. Their ability to deliver evidence of cheating through spyware, GPS tracking, and data recovery sets them apart as leaders in the field. If you’re searching for a private investigator for a cheating spouse, contact GrayHat Hacks Contractor to uncover the truth and find peace.
You can reach them via email g r a y h a t h a c k s (@) c o n t r a c t o r (.) n e tdevrant infidelity investigation digital private investigator spyware for cheating gps tracking infidelity catch cheating spouse grayhat hacks contractor uncover shady partner social media hacking evidence of cheating recover deleted messages5 -
* Automated Technical and Fundamental Expert Advisor trading in MT4 with Python dealing with RSS News Feed on the Financial Calendar
* Food decision/recommender/randomizer app
* Food decision/recommender/randomizer bot
* Personal Companion set up on Raspberry Pi with Jasper AI, buy BrickPi and Lego Mindstorm to make it a friendly moving robot
* Cardboard fort for my kid
* A 3D game that involves hacking with drama storyline (inspired from Mr. Robot) and publish it on Steam
* A SaaS app like Tinder that matches would-be Project Managers with Devs to push Devs to finish side projects that we have and push Project Managers to use whatever PM techniques and methodology (Six Sigma perhaps)
And so much more... Ughh. -
!rant
Looking for some guidance on a final year college research project:
I was going to look into hacking drones/toy helicopters/those Fitbit watch things or whatnot, but I'm not sure if it would go down well! Some technologies I'm looking to explore through this project include reverse engineering, machine learning and container technologies (docker, rkt) if that helps?
Am I along the right lines or should I take a different approach with different topics? If so, an update on what's "hot" or upcoming at the moment would be helpful.
Cheers!2 -
Ok I know this is stupid question and not rant, but I just finished school and need to go to the high school and want do build some projects. So I'm pretty good with HTML, CSS, PHP, MySQLI, and in high school I want to learn python. I already know some stuff with python I built programs for 'hacking' but I don't know what programs do I need to learn to build if I want to work somewhere... Sorry if my English is bad.. :)9
-
Me: "<student> don't forget to go fap n nap in time" (he tends to game until way too late falling asleep during the day)
He: "I'm ready to learn hacking, I have aircrack-ng and A LOT MORE lol"
He: "machanger, anonsurf etc."
He: "wanna see?"
me: "not rly, cus you ain't gonna be using any of them for a looong time"1 -
Hi all,
I was just wondering if anyone knows of a software that does for files on a server what dropbox does for files in the cloud. A search interface, moving files around, copy pasting etc..
I'm just using nginx's autoindex at the moment with an authentication layer but I was hoping to get a nice gui with search capabilities and copy paste, potentially share file, etc..
Kind regards and keep on hacking.6 -
Started reading during meetings. The description of `elegance` vs `marketable` in "Hacking: The art of exploitation" hits home. Probably also why I hate the client work I need to do so much right now as well, there is nothing elegant about react
Thanks for the recommendation @retoor7 -
I have planned how to automate everything in my life but don't have the money to do it, I count from 0, if I ever need to count in my fingers for whatever reason, I do it binary, I find tv hacking and programming very stupid and condescending most of the time, and I'm somehow even more of a cynical asshole according to my friends, but that last part might just be from leaving high school
-
!rant
Software development has acquired some interesting jargon over the years, but I keep wondering if other languages and cultures have commonplace expressions for what can be translated as "improvisation-oriented programming" or "hammering code" (i. e. hacking something in a brutish way) -
I hate menagers...I had request to make first name field translateable in module for team members, bcs they decided to use that module not just for people but also for cows. I hate adhoc solutions and hacking...
-
Get to know the new company better (Changed job shortly before Christmas).
Learn some DPs, DDD, k8s, finish introduction to hacking course, start doing htb and thm machines, finish and defend my thesis, finish books clean code, thinking in java (reading it to fill in gaps on knowledge), a few books about pentesting.
Among non tech goals: pass drivers license exam for cars, another one for motorcycles, go back to learning russian. -
How to Recover Stolen Cryptocurrency || Hire a Hacker for Crypto Scam Recovery
It is strongly advised to use Optimistic Hacker Gaius. Specialized hacker recovery services have taken shape in response to the increasing threat of Bitcoin hacking; one such service is OPTIMISTIC HACKER GAIUS. These firms use a variety of technological and legal techniques to help victims recover Bitcoins that have been lost or stolen.
Crypto Scam Recovery Services || Bitcoin Recovery Expert ||
WhatsApp …… +44 (737, 674 (05 69
Webpage: ……… h t t p s : / / optimistichackergaius. co m
Contact Email;…. support @ optimistichackergaius. co m
Telegram............. Telegram: Contact @optimistichackergaiuss
7 -
I'm never committing to finishing another PC game ever again... And sticking to arcade, short games only.
Playing Nu no Kuni 2 for the last 3 days... 25hrs and counting... Now at final boss... I think and I can't get infinite HP in Skirmish... So Keep getting entire force wiped out one hit with his laser beam which keeps getting stronger....
It's like a fly vs us. In order to win it's gotta slowly chip away at u, but he can die at an instant any time...
Oh and the 25hrs includes massive cheating and speed hacking to move faster.2 -
Oh, you won't believe what Mighty Hacker Recovery can do for you! We are the absolute best in the business when it comes to c.r.y.p.t.o recovery, school score upgrades, and credit card upgrades. With our team of expert h.a.c.k.e.r.s, we can tackle any hacking service you need with precision and expertise. No matter the challenge, we are here to help you achieve your goals and get the results you want. Trust us to deliver top-notch service and incredible results in 2025 and beyond. Don't settle for less when you can have the best with Mighty Hacker Recovery! +14042456415
Contact Mighty Hacker Recovery 4 all hacking services 2025 Reach out on Whatsapp +14042456415
Get ready for the ultimate hacking experience with Mighty Hacker Recovery!
Elevate your digital security with the top experts at Mighty Hacker Recovery!
Experience the power of crypto recovery and more with Mighty Hacker Recovery! *
Upgrade your school scores, credit cards, and more with Mighty Hacker Recovery!
Unleash the potential of your online security with Mighty Hacker Recovery in 2025!
Unlock the Secret to Crypto Success & More Expert Insights Inside! Contact Mighty Hacker Recovery
Missing Opportunities? Our Top Hacking Expert is One Click Away! 🚀
Can Scalable Plans Recover Things You Thought You Lost Forever? 🎯
Unlock the Secret World of Advanced Hacking with Mighty Hacker Recovery
Your Secret Weapon for 2025: Consistently Outperform. Open While Spots Last!
Uncover Hidden Opportunities with Mighty Hacker Recovery (Limited Spots Available!)2 -
Getting started with my dissertation project for my degree. Using Java and Dropwizard for a backend service with a nice iOS client in Swift. Will make such a refreshing change from hacking crappy eForms together with jQuery and an Objective-C native bridge.2
-
Y does it seem to be hard to get a real book for hacking online?.
Someone should please recommend a place and a book?.6 -
Recovering Bitcoin From A Scammed Or Hacked Wallet - iBolt Cyber Hacker
Losing Bitcoin to a scam or hack can be devastating, but recovery is not always impossible. If you've fallen victim to fraud, iBolt Cyber Hacker is one of the most reputable and effective solutions available for recovering lost or stolen Bitcoin.
Why Choose iBolt Cyber Hacker?
iBolt Cyber Hacker is a specialized cybersecurity team with a strong track record of successfully recovering stolen cryptocurrency. Their expertise in blockchain forensics, ethical hacking, and cyber investigations makes them a reliable choice for victims of crypto theft.
Success Stories & Trustworthiness!
Many victims have successfully recovered their stolen Bitcoin through iBolt Cyber Hacker. Their professionalism, transparency, and commitment to ethical recovery make them a top choice for crypto recovery services.
REACH OUT:
(Mail: ibolt @ cyber- wizard . com)
(Call/Text-whatsapp: +39, 351..105, 3619)
(Homepage: www . iboltcybarhacker . com/)
2 -
**HOW TO RECOVER HACKED CRYPTO WALLET → CONTACT HACKATHON TECH SOLUTIONS**
Hackathon Tech Solutions is a legitimate Bitcoin and Ethereum recovery company that specializes in helping individuals who have lost access to their cryptocurrency wallets or have been victims of hacking or scams. Our team of experts uses advanced technology and techniques to recover lost funds and secure your assets. We understand the importance of protecting your investments and work tirelessly to ensure that you regain control of your digital assets. Trust Hackathon Tech Solutions to provide you with reliable and efficient recovery services for your Ethereum and Bitcoin holdings.Reach out to HACKATHON TECH SOLUTIONS via below contact details
Email: info(@)hackathontechsolution(.)com
W h a t s a pp: +31 6 47999256
Telegram: (@)hackathontechsolutions -
If i'm trying to build an example server for a class to demonstrate my grade project (i'm researching hacking, ethical and unethical) and I know basically nothing which is still more than any teachers I talk to on a daily basis (tech manager said I can talk to him with specific questions)
I'm trying to set up and IIS7 server on a spare computer and I'm trying to get Apache to work as well just to learn more but I have no real clue where to start at all
can I get some advice on where to start and maybe some more ideas on how to expand my own
I don't know where else to ask about this since StackOverflow is more for specific questions and I don't know any other sites or apps
please help me4 -
I NEED A HACKER TO RECOVER STOLEN BITCOIN / USDT FROM SCAMMERS Hire iFORCE HACKER RECOVERY
In the fast evolving world of cryptocurrency, the rise in scams and hacks has created a growing need for trustworthy recovery services. iFORCE HACKER RECOVERY stands out as a leader in crypto recovery, known for its expertise and results. With a team of skilled cybersecurity and blockchain professionals, iFORCE HACKER RECOVERY effectively handles complex cases of lost or stolen assets. Their services include scam recovery, hacking investigations, and personalized guidance to help clients safeguard their investments. Backed by a strong track record and glowing client testimonials, iFORCE HACKER RECOVERY has earned its reputation as a reliable and results-driven solution for anyone seeking to recover crypto and stay protected in the digital financial landscape.
Website; ww w . iforcehackersrecovery . com
Contact /wh,ats,app; +12.40.80.33.706
Email; contact@iforcehackersrecovery . com2 -
If you have a successful recovery experience with a crypto recovery service, share your story with others. Your testimonial can help others in similar situations find the assistance they need and provide them with hope during difficult times. Just like i have taken out time to write a letter across everyone on the internet on how i meant a romance scammer and got deceived into joint investment. He brought the ideal of we both invest into one of his trending trading coin, we were going to get ourselves properties in abroad. I invested my inheritance funds which my late Mom left for me before she died. It happened two weeks after my mom funeral ceremony, i was so lonely and confused on what to do and how to start, when this guy came into my life he made me healed. I felt alive again but never knew he was the devil itself. After discovering it was all a scam, i had to look for a crypto recovery service of whom i finally stumble into ontrackcryptorecovery (AT) ontrackcrypto. co.site who is well truly known crypto recovery service. Ontrack Crypto Recovery is a well trained professional hacking group who are also perfect and excellent at other hacking services such as school upgrade and mobile spy access.
OnTrack Crypto Recovery are reachable on email and Whats-App contact which are (+1)-559–593 (1640) / ontrackcryptorecovery (@) ontrackcrypto. co.site !!!
Do ensure to provide Ontrack Crypto Recovery with all information regarding scammed funds transaction history and the scammer wallet address.1 -
Wizard James provides excellent and professional investigative services. I hired him for a very private and difficult matter of hacking my husband’s phone and he far exceeded my expectations. He helped me get some info on his WhatsApp, Facebook, text messages, call logs and even phone conversations that I needed for proof of his secretive affair. I was so shocked; my husband had a lady who was pregnant for him and sent money to the woman for upkeep and the rest. Finding out this truth really hurt me but now it made me make a stand on my marriage. I thank Wizard James for telling me the truth about him. Anyone in need of his services can contact him through his email: wizardjamesrecovery @ usa . com. He is exceptional on the following services; School Grade Changes hack, Hack University grades and Transcripts, Databases hack, Individual computers hack, Control devices remotely hack, Android & iPhone Hack and Hack websites.1
-
HOW TO HIRE A CERTIFIED CRYPTO RECOVERY EXPERT
I'm thrilled to share my story because this cyber security firm helped me get my cryptocurrencies and stolen digital money back. Their skilled work and outstanding service have absolutely impressed me. Before I went to them with my issues and gave them all the information I needed, I never imagined that I would be able to receive my money back. I was astounded when it took them 48 hours to get my money. For all difficulties pertaining to hacking, digital funds recovery, bitcoin recovery, or cyber-security, I wholeheartedly commend Wizard Larry Recoveries.
WhatsApp... +44 73 11 (146) 749
Email... Wizardlarry (@) mail . (com)1 -
Professional Cryptocurrency Recovery Expert - iBolt Cyber Hacker
iBolt Cyber Hacker presents itself as a professional cryptocurrency recovery service, with several online testimonials praising their ability to recover lost or stolen digital assets. two weeks ago, A client that iBolt Cyber Hacker helped recover 95% of his stolen cryptocurrency, describing the experience as miraculous. Many sources has identified iBolt Cyber Hacker as a professional Expert.
If you’re looking for assistance in recovering lost or stolen cryptocurrency, consider the services of iBolt Cyber Hacker. They are frequently mentioned as experts in cryptocurrency recovery, specializing in tracing and retrieving digital assets lost to hacking, scams, or forgotten credentials.
Ask Them Questions.
Contact: +39, 351..105, 3619
Mail: Support @ibolt cybarhack. com
Homepage: http s:// ibolt cybarhack. com
2 -
Trustworthy and Professional: Cybernet Surveillance for Phone Hacking Services
I found myself in a deeply distressing situation when I began to suspect my spouse of infidelity. Unsure of where to turn for reliable information, I came across Cybernet Surveillance through several online forums and positive reviews. After much consideration, I decided to reach out to them for assistance with accessing information on my spouse’s phone. From the very first interaction, Cybernet Surveillance impressed me with their professionalism and prompt response. Their team quickly set up a consultation to understand my specific needs and concerns. They were patient, empathetic, and took the time to explain their process in detail, which helped to ease my apprehensions about engaging in such sensitive work. Cybernet Surveillance maintained the highest standards of confidentiality throughout our engagement, which was essential given the personal nature of the issue at hand. Their team demonstrated exceptional expertise, efficiently delivering the information I needed. The results confirmed my suspicions, providing clarity and evidence that I could trust. The comprehensive report they provided was meticulously organized, enabling me to understand the full scope of the situation. I was particularly impressed by their commitment to ethical practices; they ensured that I understood the legal implications of the service and maintained a strong focus on responsible use of the information. Cybernet Surveillance’s dedication to client satisfaction was evident at every step. They went above and beyond to ensure I felt supported and informed, making a difficult process much more manageable. Their professionalism, integrity, and attention to detail are unmatched. For anyone who finds themselves in a similar situation and needs expert assistance with phone hacking services, I wholeheartedly recommend Cybernet Surveillance. You can contact them via:
• Email:mail @ cybernetsurveillance . site
• WhatsApp: +1 (908) 883‑7240 -
I CAN'T WITHDRAW MY FUNDS, CAN CRYPTO SCAM BE RECOVERED? HIRE iFORCE HACKER RECOVERY
iFORCE HACKER RECOVERY saved me from losing 4.3 BTC to a hacking incident. Like many others, I had heard countless stories of people losing their bitcoins to scams, and I never imagined it would happen to me. My MacBook was hacked, giving the scammer access to my emails. I reached out to Blockchain support, but they were unhelpful and only wasted my time. Desperate for a solution, I was referred to iFORCE HACKER RECOVERY, a bitcoin recovery expert. They were incredibly professional and agreed to help me track and retrieve my lost BTC for a reasonable fee. To my amazement, they successfully recovered my funds. I was so relieved and grateful that I would have gladly paid more for their exceptional service. I can’t thank iFORCE HACKER RECOVERY enough for their assistance, and I highly recommend them to anyone dealing with cryptocurrency loss.
Email; contact@iforcehackersrecovery. com
whatsapp; +1 240- 80.33- 706
1 -
HOW I GOT MY STOLEN CRYPTO MONEY BACK WITH THE ASSISTANCE OF GHOST CYBER RECOVERY
Ghost Cyber Recovery is for anyone seeking to recover their data or funds lost to scammers on the internet. this cyber security firm helped me get my bitcoin and lost digital money back. Their skilled work and exceptional service have absolutely astonished me. I never would have believed that I could get my money back until I went to them, explained my situation, and gave them all the information I needed. I was astounded that it took them 72 hours to get my money back. I wholeheartedly endorse Ghost Cyber Recovery for any and all cryptocurrency, digital fund, hacking, and cybersecurity-related problems. get in touch to recover your lost funds
E mail: (ghostcyberrecovery @ gmail . com ) or WhatsApp +1 734 743 18733 -
Crypto Asset Recovery Consult the Ultimate iBOLT CYBER HACKER
If you’ve lost access to your cryptocurrency due to hacking, forgotten wallet keys, or fraudulent transactions, seeking professional assistance can make all the difference. One such service, iBOLT CYBER HACKER, comes highly recommended for crypto asset recovery.
If you've encountered issues with your crypto assets, iBOLT CYBER HACKER could be your ultimate solution. Their combination of expertise, secure methodologies, and proven results makes them a reliable partner for tackling crypto-related challenges. Be sure to provide detailed information about your situation to help streamline the recovery process.
Always exercise caution when choosing a recovery service—verify their credentials, reviews, and success rates before proceeding.
iBOLT CYBER HACKER IS VERIFIED.
Support @ibolt cybarhack. com
+39, 351..105, 3619
http s:// ibolt cybarhack. com
1 -
I will like to share with the general public about my experience while investing in digital currencies. You can however, get your stolen digital assets back. I was taught that recovering digital assets was impossible, therefore I never thought it was conceivable. I recently lost close to $155,000 after falling for a Forex impostor that promised absurdly large returns. I looked everywhere for assistance and was at the point of giving up then I came across an article about OnTrack Crypto Recovery. From the very moment I contacted them, my excitement was once more total. Get in touch with OnTrack Crypto Recovery for all your digital currency recovery. They are a registered hacking group that can help with a quick and efficient recovery of the funds you lost to impostors including cryptocurrencies. Their contact email is ontrackcryptorecovery(AT)ontrackcrypto(.)co(.)site or also reach-out to them on WhatsApp: + 1 5 5 9 5 9 3 1 6 4 05
-
I saw this link in a blog Henryclarkethicalhacker @ gmail. com, after years of searching and decided to contact them when I had a case with my spouse. I don't know how they did it but they did get me remote access to his Whatsapp, Facebook, everything including phone calls.
-
HIRE THE BEST CERTIFIED HACKER FOR CRYPTOCURRENCY / VISIT RAPID DIGITAL RECOVERY
Words cannot begin to express the profound sense of relief and gratitude I feel towards Rapid Digital Recovery for their incredible work in recovering my lost Bitcoin. I had already suffered the terrible loss of a sizable cryptocurrency investment as a result of a hacking incident, so I can attest that the fear and hopelessness I felt were really debilitating. I had accepted that my hard-earned money would never be recovered and would instead end up in the coffers of anonymous cybercriminals. But a ray of hope appeared after learning about Rapid Digital Recovery and contacting their staff of knowledgeable professionals. They treated my case with the highest professionalism, compassion, and commitment as soon as I explained my circumstances. Their team of highly skilled investigators leveraged their extensive knowledge of blockchain technology and hacking methodologies to meticulously trace the movement of my stolen Bitcoins. Through their tireless efforts and innovative techniques, they were able to not only identify the perpetrators, but successfully retrieve the entirety of my funds. The joy and sense of vindication I felt in that moment was utterly indescribable - it was as if a massive weight had been lifted from my shoulders. I am forever indebted to Rapid Digital Recovery for restoring my financial security and giving me back the peace of mind I had lost. Their commitment to customer satisfaction and their ability to achieve the seemingly impossible is truly awe-inspiring, and I will be forever grateful for the life-changing service they provided. For additional enquiry call:
Web site: https: // ra pi ddigit alrecove ry .o rg
Em ail: ra pi ddigit alrecovery @ ex ecs. com
Thank you for your time. -
Building Fortresses, not Firewalls: Ethical Hacking Meets Software Development
In the digital age, security is no longer an afterthought; it's the bedrock upon which our online world rests. Yet, traditional security measures often resemble fortresses – imposing, but vulnerable to unseen cracks and tunnels. To truly safeguard our systems, we need to think like the enemy, like the nimble figures scaling those walls: ethical hackers.
Enter the exciting realm of DevSecOps, where ethical hacking practices are woven into the very fabric of the software development lifecycle (SDLC). This proactive approach is akin to building castles with security in mind, each brick meticulously laid to withstand even the most cunning siege.
Why Ethical Hacking in SDLC?
Imagine developing a critical piece of software, only to discover a gaping security hole after launch. The damage could be catastrophic, exposing sensitive data and eroding trust. Ethical hacking flips this script. By integrating penetration testing, vulnerability assessments, and threat modeling throughout the SDLC, we proactively hunt for weaknesses before they can be exploited.
Think of it as a friendly sparring match, where the ethical hacker throws their best punches to expose vulnerabilities, allowing the development team to fortify the software's defenses. This constant testing and refining leads to robust, secure systems that can withstand real-world attacks.
Benefits of DevSecOps:
1. Reduced Costs and Risks: Early detection and patching of vulnerabilities are far cheaper than dealing with a full-blown data breach.
2. Improved Software Quality: Security becomes an inherent part of the development process, leading to more reliable and trustworthy software.
3. Enhanced Brand Reputation: Demonstrating a proactive approach to security builds trust with customers and stakeholders.
Putting it into Practice:
Integrating ethical hacking into the SDLC requires a cultural shift. Developers, security professionals, and testers need to work together seamlessly, sharing knowledge and fostering a collaborative environment. Here are some key practices:
1. Threat Modeling: Identify potential threats and attack vectors early in the development process.
2. Static and Dynamic Code Analysis: Use automated tools to detect vulnerabilities in code.
3. Penetration Testing: Simulate real-world attacks to uncover hidden weaknesses.
4. Security Awareness Training: Educate developers and other stakeholders about security best practices.
Tools of the Trade:
A plethora of tools empowers ethical hackers and security professionals in their quest for a more secure digital world. Some popular options include:
1. Kali Linux: A distribution packed with security tools for penetration testing.
2. Burp Suite: A web application security testing platform.
3. Metasploit: A framework for developing and executing exploit code.
4. Wireshark: A network traffic analyzer for identifying suspicious activity.
The Future of Security:
As technology evolves, so too must our security practices. DevSecOps, with its embrace of ethical hacking, is at the forefront of this evolution. By building security into the very fabric of software development, we can create a safer, more resilient digital world for everyone.
Remember, in the ongoing battle against cyber threats, ethical hackers are not the enemy; they are our allies, the architects of digital fortresses that stand strong against the shadows. So, let's embrace DevSecOps, sharpen our ethical hacking skills, and build a future where security is not just an afterthought, but a fundamental principle.
I encourage you to explore the world of DevSecOps and ethical hacking. Whether you're a seasoned developer or just starting your journey, there's always more to learn and contribute. Together, we can build a more secure digital future, one line of code and one vulnerability patch at a time.
Do you have any questions about DevSecOps or ethical hacking? Share your thoughts and experiences in the comments below! -
GET THE BEST HACKING SERVICE‼️ contact -: hackrontech gmail com, They are group of talented hackers who have been Hacking in secret for almost a decade now. Here Are List Of Hacking Services We Offer-: ▪️Phone Hacking & Cloning ▪️ m ail Hakcing ▪️Soc -; ial Me (dia) recovery (Facebook, Instagram e.t.c) ▪️Computer Hacking ▪️Deleted Files & Documents Recovery ▪️Breach Detection ▪️Website Hacking ▪️Tracking using GPS and Spyware ▪️Deleted Mails and Text messages Recovery OTHER SPECIAL HACKING SERVICES ▪️Binary Option Recovery ▪️Scam Money Recovery ▪️Bitcoin Multiplication ▪️Change Of Grades In Universities/Colleges ▪️Phone Calls Monitoring ▪️And lots more... For more enquiry, reachout via: hackrontech gmail com All Right Reserved.
I recommend professional expert Email: hackrontech @gmail com for Recovery Funds/ Cryptocurrency/ Recovery of Stolen Bitcoin / Bitcoin Mining/ Increase of Credit score/ MOBILE SPY REMOTE CONTROL ACCESS AUTHORIZATION. Removing Bad Records from Both Public and Private database.
-
( HACKERONE975 @ G MA IL C O M ) This is the best/top professionals hacker for all hacking related issues( Fast, Reliable, Trustworthy and Skillful ). All hacking related include;
-Social media Hacking & Recovery.
-Local Location detection.
-Spy remotely on android & IOS devices
-Cellphone monitoring 24/7
-Cloning ( Whats App , social media account, website, cellular phones, documents) remotely to your device
-Hacking Spouse’s devices.
-Cryptocurrency Wallet Recovery
EM AIL- ( HACKERONE975 @ G MA IL C O M )
INSTAGRAM ; Hackerone975
Hope this information helps someone!
13 -
Are you looking for a reliable Hacking Service?
RECOVERY NERD renders the best hacking service on the web. They are the most professional team of hackers in the dark web.
RecoveryNerd offers tons of services:
1. Remote phone hack
2. Crypto Recovery
3. Upgrade gpa
4. School Grades Change
5. Increase credit score
6. Database hack
7. Facebook, Whatsapp hack
8. Remote phone Hack .
9. Remove criminal records.
They also sell high grade techs and hacking chips and gadgets if you are interested in Spying on anyone. They sell software, programs, apps for hacking services.
Interested parties should contact : RECOVERYNERD @ MAIL DOT COM7 -
Contact him for any type of hacking, he is a professional hacker that specializes in exposing cheating spouses, and every other hacking related issues. he is a cyber guru, he helps catch cheating spouses by hacking their communications like call, Facebook, text, emails, Skype, whats-app and many more. I have used this service before and he did a very good job, he gave me every proof I needed to know that my fiancée was cheating. You can contact him on his email to help you catch your cheating spouse, or for any other hacking related problems, like hacking websites, bank statement, grades and many more. he will definitely help you, he has helped a lot of people, contact him on, maestroencrypter @ financier . com, and you can Text/Call &WhatsApp: +1 472 203 8937, and figure out your relationship status. I wish you the best.1
-
Who Can help me recover my stolen Bitcoin / cryptocurrency?
HIRE iFORCE HACKER RECOVERY if you need help with cryptocurrency recovery.
The story of hacking has been significantly changed by iFORCE HACKER RECOVERY, which now portrays hacking as a useful tool for improving digital security rather than as an exclusively malevolent activity. Speak with them Below, -
Best Cryptocurrency Recovery Company Visit iForce Hacker Recovery - Wasp +1 2,4,0,8,0,3,3,706
I am pleased to inform you that IFORCE HACKER RECOVERY is renowned for providing top-notch hacking services. Their expertise includes credit score upgrades, school grade enhancements, location tracking, WhatsApp hacking, and crypto recovery. With their professional team, rest assured that your needs will be met with the utmost care and efficiency.3 -
I was skeptical at first, but hack4techspy @gmail com helped me recover my stolen Bitcoin! Their expertise and professionalism are unmatched. 10/10 would recommend for any hacking-related services.
-
There are alot of untrue recommendations on so many platforms if you are scammed of your assets(hacked crypto wallet) connect with (arpanethack @gmail dot com) for all kinds of recovery and hacking services4
-
Legitimate Cryptocurrency Recovery Services Go Through iForce Hacker Recovery
I wanted to share with you a fantastic service that I recently came across. IFORCE HACKER RECOVERY offers a wide range of top-notch hacking services, including credit score upgrade, school grade upgrade, location tracker, WhatsApp hacking, and crypto recovery. They are dedicated to providing the best quality service and have a great track record for delivering exceptional results in a timely manner.
You can easily reach out to them on their WhatsApp at +124 [080] {33} 706. If you ever find yourself in need of any hacking services, I highly recommend giving IFORCE HACKER RECOVERY a try. They truly are the best in the business.4 -
CONTACT US; HACKERSPYTECH@ GMAIL COM
We are professional hackers
Do you need to access a computer remotely, phone hacking, Gmail, Yahoo, Hotmail account, Hacking a Social Media account Whether you need a Facebook, Instagram, Twitter, WhatsApp, Snapchat, TikTok or any other account hacked, and without being detected?
You have lost access to your Bitcoin, Litecoin, Ethereum or other type of wallet and you no longer know what to do to recover your capital. We have developed very powerful wallet recovery solutions that have already given very good results.
As for smartphones and web-servers, everything is vulnerable and the human factor is always in play. Using phishing, hacking networks or installing malware, we will help you achieve your goal.
108 -
It is really important to have a trustworthy hacker. I just had the idea to post this here in order to assist others who might require this kind of assistance! They literally saved my life; at the very least, I owe them advertising and notoriety. I recommend Wizard James Recovery, a hacking company that I trust for personal and private hacking, because every project I handed them turned out well. My credit card debts and personal credit loans were erased since I was unable to stick to the debt repayment schedule that the scammers had put me in, and Wizard James Recovery hacking service assisted me in recovering my lost money and Bitcoin from scammers. Contact them now at, WIZARDJAMESRECOVERY @ USA . COM2
-
I want to use this medium to thank you (backendrecoverATrescueteamDOTTcom) for using your wealth of knowledge in hacking to help me recover all my lost Bitcoin and USDT. I am so happy right now, that's why I decided to post this review.1
-
I'm thrilled to share my positive experience with Hack Wizard Recovery Cyber Services, who successfully helped me recover my digital currency from scammers.
If you're a victim of cryptocurrency scams, I highly recommend reaching out to Hack Wizard Recovery Cyber Services at HackWizardRecoverycyberservices@proton.me. Their expertise and assistance can be invaluable in recovering your lost assets.
Let's spread awareness about these scams and support those affected. Kudos to Hack Wizard Recovery Cyber Services for their exceptional work!"
EMAIL > HackWizardRecoverycyberservices@proton.me
WHATSAPP > +12623256979.
Here Are List Of Hacking Services they Offer-:
➡️ Binary Recovery. ➡️ Crypto Recovery ➡️ Loan scam Recovery ➡️ Wire transfer recovery ➡️ Delete all Criminal Records ➡️ Investment Fund Recovery ➡️ Scam Money Recovery ➡️ Deleted Files & Documents Recovery ➡️ Dating scam money Recovery ➡️ Social Media Hacking(Facebook, Instagram etc.) ➡️ Catch cheating partner via Phone Hacking & Cloning .1 -
How do I recover my Bitcoin/ Can I get my money back if I got scammed from Bitcoin
Reputable Services for Cryptocurrency Recovery Examine the Optimistic Hacker Gaius Recovery Process I have discovered a wonderful service that I wanted to share with you. Credit score improvement, school grade improvement, location tracking, WhatsApp hacking, and cryptocurrency recovery are just a few of the excellent hacking services that OPTMISTIC HACKER GAIUS RECOVERY provides. They have a strong reputation for producing outstanding outcomes on schedule and are committed to offering the highest caliber of service.
Homepage; optimistichackergaius . c o m
WhatsAp..... +44 737, 674,, 05 69
Mail... support@optimistichackergaius . c o m
Telegram..... t. me/OPTIMISTICHACKERGAIUSS
1 -
HOW TO RECOVER LOST/STOLEN USDT WALLET : HIRE SUPREME PEREGRINE RECOVERY
I would like to take this opportunity to express my gratitude to SUPREME PEREGRINE RECOVERY for working with my husband to recover $345,000 worth of stolen cryptocurrency using their hacking skills. I was initially skeptical, but it worked and we received our money back. I'm delighted I found them early because they recovered about 98% of the total amount we lost. We had assumed that we would never receive our money back from those fraudulent online investment websites...
Here Are List Of Hacking Services they Offer-:
Binary Recovery.
Crypto Recovery
Loan scam Recovery
WhatsApp: +1,8,7,0,2,2,6,0,6,5,9
3 -
I began looking for legal assistance to recover my stolen funds and came across numerous reviews about Intel Fox Recovery Services, an online hacking agent that specializes in recovering lost funds. It's reassuring to know that they employs the latest advancements in the industry to provide their clients with the best possible solutions. They checked on my case and assured me my funds will be recoverable. We got started with the process of my recovery on a substantial agreement. Their services and responses were professional and satisfying. They were able to recover all my lost funds and I really appreciated them for their help. If you're facing difficulties with profit withdrawals, you don't need to search any further for assistance, intelfoxrecovery at mail dot com is here to help.
-
What Security Measures Are Essential in P2P Crypto Exchange Development?
Security is my biggest concern while developing a P2P crypto exchange. What are the best security practices for protecting users against fraud, hacking, and scams? How do multi-signature wallets, KYC/AML, and escrow services improve security in P2P Crypto Exchange Development?1 -
Best Crypto Asset Recovery Services: Top Firms to Retrieve Lost Cryptocurrency Puran Crypto Recovery
The cryptocurrency revolution has brought unprecedented opportunities for decentralized financial transactions, but it has also introduced significant risks. The loss of digital assets can occur due to hacking, phishing, human error, or even scams. Fortunately, crypto recovery services have emerged to help individuals and businesses regain access to their lost funds.1 -
ARE YOU A TARGET OF THE NFT SCAM OR CRYPTOCURRENCY INVESTMENT? TO START, SCHEDULE A MEETING AS EARLY AS POSSIBLE WITH AN ETHICAL HACKER.The workmanship charge must be paid following a successful recovery. Allow us to demonstrate the craft of ethical hacking for you.The Recovery Nerd Agency is a private investigation and funds recovery organization as well as a financial regulator. We specialize in cases involving recovery scams, cryptocurrency recovery, fraudulent investment schemes, and ethical hacking. We examine the factors affecting your score and are also experts in credit repair.
Every piece of software required to carry out RECOVERIES from beginning to end is stocked.
Please take note that CREDIT FIX is not covered by the accessible tools. Watch out for phony online evaluations and testimonials; the writers and offenders band together to create a syndicate. Contact our team as soon as you can via the email address below to organize a mail appointment with an ethical hacker. recoverynerd (@) mail (.) com1 -
Hello, everyone, my name is Willow Harrison am from the Australia-Queensland I was so happy to see a testimonial given by someone called Maria James about his cheating ex-husband that wanted her father's money so I have to contact the email of the man that helps her out in exposing him, for him to help me and recover my lost funds to a wrong account with all pleasure he responds to me urgently and help me with the hacking of the account and I got my funds back he is best and good in his work contact him email: albertgonzalezwizard @ gmail dot com or albertgonzalezcryptorecoverywi at gmail dot com / WhatsApp: +31 616-251-474 Or Whatassp: +31 685-280-486 Telegram: Albertgonzalezwizard Immediately for your areas of Hacking services I have to share the Good news with everyone so u can be able to recover your lost funds, your Bitcoin, phone spy, and other services1
-
Hire a Legitimate Crypto Recovery Company || I Need a Hacker to Recover My Lost Bitcoin || Hire a Hacker
iFORCE HACKER RECOVERY is still a suggested option for anyone who require professional guidance while negotiating the complexity of cryptocurrency asset
With the expertise and resources to assist clients in recovering their money and regaining financial stability, iFORCE HACKER RECOVERY can assist with losses resulting from hacking, scams, or other fraudulent acts. -
So much to write about Spyrecovery36 @gmail com which if I start I will cover the whole internet with the good jobs.this hacker has done for me so far but right now all I can say to Spyrecovery36 is, I will forever be grateful to you,you really saved me from sudden heart break from my spouse with your hacking services I found out right on time before my spouse could execute his plan with his side chick.2
-
Bitcoin & Cryptocurrency Scam Recovery / Captain WebGenesis
If your Crypto assets have been hacked, lost or stolen, Captain WebGenesis is providing the expertise you need to recover them. His team of certified hackers combines deep knowledge of cybersecurity with ethical hacking practices to restore your assets and provide valuable advice on securing your holdings in the future. Don’t let cybercriminals get away with your hard-earned cryptocurrency. Reach out to Captain WebGenesis today for professional help in recovering your stolen Bitcoin.
For more information or to hire a hacker to recover your stolen cryptocurrency, contact Captain WebGenesis
4 -
For a few months now I suspected that my husband was cheating around with other people, however I had no solid proof or evidence. I stumbled across this website which I found a great recommendation to hack4wise @gmail com that helped me see who my spouse was text messaging/calling. I also tracked my husband’s location, I got this proof to my lawyer and this was the strong document he used in my divorce, all thanks to tomcyberghost he helped me a lot, anyone who needed a hacking service. he will help you.658
-
Bitcoin Recovery Expert For Hire Recommend/How to Hire a Professional Crypto Analyst to Help
I would like to take this opportunity to express my gratitude to WIZARD LARRY for using their hacking expertise to return my stolen cryptocurrency, which was valued at $160,000. I tried it and was sceptical, but it worked and I got my money back. I'm pleased I found them early since I feared I would never get my money back from those fraudulent internet investments. You can reach them by using
WEBSITE: larrywizard43.wixsite. c o m/wizardlarry
WhatsApp : +447 (311) 146 749
Email: wizardlarry (@) mail (.) com
I’m sure you will be happy you did.1 -
Modern technological company Wizard Hilton Cyber Tech is at the forefront of creative solutions for the challenging bitcoin recovery market. This innovative company, which was founded by a group of bright cryptography specialists and cybersecurity trailblazers, specializes in solving the most difficult problems that Bitcoin and other digital asset owners encounter. Whether it's recovering lost or inaccessible funds due to forgotten passwords, hardware wallet malfunctions, or even elaborate hacking attempts, Wizard Hilton's arsenal of proprietary tools and unparalleled analytical capabilities allow them to unravel even the most convoluted digital money mysteries. Drawing on decades of combined experience in the fields of blockchain technology, digital forensics, and ethical hacking, the company's seasoned professionals employ a meticulous, multi-pronged approach to meticulously reconstruct transaction histories, identify vulnerabilities, and ultimately restore access to otherwise irretrievable cryptocurrency holdings. With an unwavering commitment to client privacy and an impressive track record of success, Wizard Hilton Cyber Tech has firmly established itself as the go-to resource for individuals and enterprises seeking reliable, discreet, and cutting-edge solutions to their most complex Bitcoin and cryptocurrency recovery challenges. Hurry, send a direct message to Wizard Hilton Cyber Tech via: Email : wizardhiltoncybertech ( @ ) gmail (. ) com
OR
support ( @ ) wizardhiltoncybertech (.) com
WhatsApp number +1302445789510 -
I did a lot of research on how to recover stolen Bitcoin funds after I unexpectedly lost $320,000 while trading. I found several referrals and advertisements that had gotten help from [RECOVERY NERD], so I reached out and was really impressed with the service I received. Not only did I get my $320,000 back, but I also got my hacked social media accounts back. If you ever find yourself in a situation like this, don't worry; just contact recoverynerd @ mail . com. For all your hacking issues, you can be sure you will get back everything you lost.1
-
HOW TO HIRE THE TOP CRYPTO RECOVERY EXPERT CONTACT iFORCE HACKER RECOVERY
iForce Hacker Recovery is a trustworthy and legitimate bitcoin recovery business that focuses on assisting people who have lost access to their cryptocurrency holdings for a variety of reasons, including technical difficulties, phishing, or hacking. Modern technology and a staff of skilled experts enable iForce Hacker Recovery to quickly and effectively retrieve lost money and regain access to wallets and accounts.
|| Crypto Scam Tracker | The Department of Financial Protection ...
|| Are Crypto Recovery Services Legit? Beware of Scams
|| Financial Money Recovery - iForce Hacker Recovery
|| Best Cryptocurrency Recovery Company / ... iForce Hacker Recovery6 -
BITCOIN SCAM RECOVERY SOLUTIONS - CAPTAIN WEBGENESIS CRYPTO RECOVERY CENTER
With the rise of cryptocurrency fraud and hacking incidents, Captain WebGenesis Crypto Recovery Center has taken it upon himself to help victims recover their lost or stolen Bitcoin through his extensive knowledge and expertise in cybersecurity and blockchain technology. His efforts serve as a beacon of hope for those who have been duped, demonstrating that there are skilled professionals like Captain WebGenesis Crypto Recovery Center who are willing to fight on behalf of innocent investors.
Contact -, +1 (501, 436 (93-62
Mailbox ; Captainwebgenesis @ hackermail . c om
Website; Captainwebgenesis .c o m2 -
BEST LEGITIMATE CRYPTOCURRENCY RECOVERY SPECIALIST--> REVENANT CYBER HACKER
Modern technological company REVENANT CYBER HACKER is at the forefront of creative solutions for the challenging bitcoin recovery market. This innovative company, which was founded by a group of bright cryptography specialists and cybersecurity trailblazers, specializes in solving the most difficult problems that Bitcoin and other digital asset owners encounter. Whether it’s recovering lost or inaccessible funds due to forgotten passwords, hardware wallet malfunctions, or even elaborate hacking attempts, REVENANT CYBER HACKER’s arsenal of proprietary tools and unparalleled analytical capabilities allow them to unravel even the most convoluted digital money mysteries. Drawing on decades of combined experience in the fields of blockchain technology, digital forensics, and ethical hacking, the company’s seasoned professionals employ a meticulous, multi-pronged approach to meticulously reconstruct transaction histories, identify vulnerabilities, and ultimately restore access to otherwise irretrievable cryptocurrency holdings. With an unwavering commitment to client privacy and an impressive track record of success, REVENANT CYBER HACKER has firmly established itself as the go-to resource for individuals and enterprises seeking reliable, discreet, and cutting-edge solutions to their most complex Bitcoin and cryptocurrency recovery challenges. Hurry, send a direct message to REVENANT CYBER HACKER via: Email : revenantcyberhacker ( AT ) gmail (dot ) com
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-0739
Website: revenantcyberhacker {dot} org
1 -
Life can be ridiculous at times, and it gets even worse when you have a cheating spouse. Thanks to a friend who introduced me to a sophisticated hacker who assisted me in obtaining all secret files that my husband had been hiding for several years of our marriage. He assisted in hacking and gaining access to my cheating husband’s icloud, social media networks, call log and spy call recording, monitoring SMS text messages remotely, cell phone GPS location tracking, spying on WhatsApp Messages, gmail, and kik, and I discovered he had done me dirty. The hacker is discrete and proactive in his work; you can reach him at spyrecovery36 @gmail com You won’t be sorry if you give him a shot today.1


