Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "for hacking service"
-
more buzzword translations with a story (because the last one was pretty well liked):
"machine learning" -> an actual, smart thing, but you generally don't need any knowledge to use it as they're all libraries now
"a bitcoin" -> literally just a fucking number that everyone has
"powerful" -> it's umm… almost working (seriously i hate this word, it really has a meaning of null)
"hacking" -> watching a friend type in their facebook password with a black hoodie on, of course (courtesy of @GeaRSiX)
"cloud-based service" -> we have an extra commodore 64 and you can use it over the internet for an ever-increasing monthly fee
"analysis" -> two options: "it's not working" or "its close enough"
"stress-free workplace" -> working from home without pants
now for a short story:
a few days ago in code.org "apscp" class, we learnt about how to do "top down design" (of course, whatever works before for you was not in option in solving problems). we had to design a game, as the first "step" of "top down design," we had to identify three things we needed to do to make a game.
they were:
1. characters
2. "graphics"
3. "ai"
graphics is literally a png, but what the fuck do you expect for ai?
we have a game right? oh wait! its getting boring. let's just sprinkle some fucking artificial intelligence on it like i put salt on french fries.
this is complete bullshit.
also, one of my most hated commercials:
https://youtu.be/J1ljxY5nY7w
"iot data and ai from the cloud"
yeah please shut the fuck up
🖕fucking buzzwords6 -
Paranoid Developers - It's a long one
Backstory: I was a freelance web developer when I managed to land a place on a cyber security program with who I consider to be the world leaders in the field (details deliberately withheld; who's paranoid now?). Other than the basic security practices of web dev, my experience with Cyber was limited to the OU introduction course, so I was wholly unprepared for the level of, occasionally hysterical, paranoia that my fellow cohort seemed to perpetually live in. The following is a collection of stories from several of these people, because if I only wrote about one they would accuse me of providing too much data allowing an attacker to aggregate and steal their identity. They do use devrant so if you're reading this, know that I love you and that something is wrong with you.
That time when...
He wrote a social media network with end-to-end encryption before it was cool.
He wrote custom 64kb encryption for his academic HDD.
He removed the 3 HDD from his desktop and stored them in a safe, whenever he left the house.
He set up a pfsense virtualbox with a firewall policy to block the port the student monitoring software used (effectively rendering it useless and definitely in breach of the IT policy).
He used only hashes of passwords as passwords (which isn't actually good).
He kept a drill on the desk ready to destroy his HDD at a moments notice.
He started developing a device to drill through his HDD when he pushed a button. May or may not have finished it.
He set up a new email account for each individual online service.
He hosted a website from his own home server so he didn't have to host the files elsewhere (which is just awful for home network security).
He unplugged the home router and began scanning his devices and manually searching through the process list when his music stopped playing on the laptop several times (turns out he had a wobbly spacebar and the shaking washing machine provided enough jittering for a button press).
He brought his own privacy screen to work (remember, this is a security place, with like background checks and all sorts).
He gave his C programming coursework (a simple messaging program) 2048 bit encryption, which was not required.
He wrote a custom encryption for his other C programming coursework as well as writing out the enigma encryption because there was no library, again not required.
He bought a burner phone to visit the capital city.
He bought a burner phone whenever he left his hometown come to think of it.
He bought a smartphone online, wiped it and installed new firmware (it was Chinese; I'm not saying anything about the Chinese, you're the one thinking it).
He bought a smartphone and installed Kali Linux NetHunter so he could test WiFi networks he connected to before using them on his personal device.
(You might be noticing it's all he's. Maybe it is, maybe it isn't).
He ate a sim card.
He brought a balaclava to pentesting training (it was pretty meme).
He printed out his source code as a manual read-only method.
He made a rule on his academic email to block incoming mail from the academic body (to be fair this is a good spam policy).
He withdraws money from a different cashpoint everytime to avoid patterns in his behaviour (the irony).
He reported someone for hacking the centre's network when they built their own website for practice using XAMMP.
I'm going to stop there. I could tell you so many more stories about these guys, some about them being paranoid and some about the stupid antics Cyber Security and Information Assurance students get up to. Well done for making it this far. Hope you enjoyed it.26 -
opened up my laptop at the car dealership where I am chilling at rn while I wait on my car's service to be done.
I open my laptop and start working on some small fix that I had forgotten about for work.
OMG guess what? no one is looking at me doing shit in the computer because in reality no one gives a flying fuck like most of you attention whores wanna make it sound like.
No one thinks you are hacking because you opened up a terminal in public.
Bola de jotos ridiculos.15 -
"Our Data Service comes PRE-P0WN'D"
Those SHIT-FOR-BRAINS data service providers GLOAT that their data can be natively integrated into most BI platforms, no code required.
How? Because they will EXPOSE THE ENTIRE FUCKING THING ON THE INTERNET.
LITERALLY.
UNAUTHENTICATED URL WITH THE ENTIRE DATASET.
STATIC. WON'T EVER FUCKING CHANGE.
NO VPN REQUIRED. NO AUTHENTICATION HEADERS. NO IN-TRANSIT ENCRYPTION.
"It is safe! No one will know the secret token that is a parameter in the url"
BLOODY BYTE BUTTS, BATMAN! IT IS A FUCKING UNAUTHENTICATED URL THAT DOES NOT REQUIRES RENEWAL NOR A VPN, IT WILL LEAK EVENTUALLY!
That is the single fucking worst SELF-P0WN I have ever seen.
Now I know why there are fucking toddlers "hacking" large scale databases all over the globe.
Because there are plenty of data service providers that are FUCKING N00BS.4 -
Im ranting in progress of the issue so i dont get the urge to do any of the things not seem as acceptable to fix this issue.
Issue: yesterday i activated a device i havent had any (even prepaid) service on in years, and had a 'new'(to me) number assigned...
Today, after being sick so muting nuisances immediately for rest, i check, 3missed calls from the same, less spammy looking number. I havent use this number for even a txt code verification at all... aside from 1 call to comcast (for the blissful irony of seeing if its an option (they need to survey physically) since im suing my current isp who didnt take my VERY NICE and explictly required in their business t&c, refund for the issue's duration.. after months of tryjng to directly get a message (not using my not technically hacking expertise like just scrubbing for email formatting and popped up in their inbox (calling them is more frowned upon)...
Their conclusion as to "why" (they nvr solved the issue... dhcpv6 was in aggressive lease mode(no response per lease(NOT batches) of about 60 for about 20 devices which i ofc use my /28 static ipv4 block... not ipv6 (they also claimed there was no logs til i dug and found verbose, long history high/med high debug level logs in their prop. dev's gui... which they forced me to use, has 2 separate cores/stacks which is done for 1 reason only... constant simultaneous ipv4 and ipv6 (so ofc was auto enabled)...
Basically it was spamming do to a config issue with their scripts, and their WAN6 dev/script's config. Have found a single person who knows what ipv6 (or v4) or wan6 device actually means... their conclusion from multiple "specialist departments " ..."we dont support ipv6 so if u had issues caused by using something we dont support it's your fault... sooooo ludacris.
.... ok back to main point.
callback options
1 schedule a call back for "later"
2 dont schedule and hang up/try some other time
3. cancel callback and join the end of the cue(from previous message it told me a callback in 6-10m or lose your place in line and go to the end... hours later no call and they definitely have the number as it reiterated -.-
...
answer to wait in line>
experiencing extremely high wait time
>your current wait time 31-60m
2.5sec later.. let me connect you to a rep ...etc (identical as in callback options intro)
> your current wait time is 30sec
waiting nearly 25min whilst typing this.(i did make sweet potato stuff, propagated a rose, fed JSON some of his new, in closure buffet of things he previously never encounted and bought a literal ton of rubber mulch)40min to a rep 5more to solve (last guy at same position didnt know this option exited, despite me decribing it verbosely to him.
Everything the automated syst asks is about account numer... there is none ive never even had a burner that was at&t brand.
Wzf.3 -
Getting started with my dissertation project for my degree. Using Java and Dropwizard for a backend service with a nice iOS client in Swift. Will make such a refreshing change from hacking crappy eForms together with jQuery and an Objective-C native bridge.2
-
For a few months now I suspected that my husband was cheating around with other people, however I had no solid proof or evidence. I stumbled across this website which I found a great recommendation to hack4wise @gmail com that helped me see who my spouse was text messaging/calling. I also tracked my husband’s location, I got this proof to my lawyer and this was the strong document he used in my divorce, all thanks to tomcyberghost he helped me a lot, anyone who needed a hacking service. he will help you.590
-
How to Recover Stolen Cryptocurrency || Hire a Hacker for Crypto Scam Recovery
It is strongly advised to use Optimistic Hacker Gaius. Specialized hacker recovery services have taken shape in response to the increasing threat of Bitcoin hacking; one such service is OPTIMISTIC HACKER GAIUS. These firms use a variety of technological and legal techniques to help victims recover Bitcoins that have been lost or stolen.
Crypto Scam Recovery Services || Bitcoin Recovery Expert ||
WhatsApp …… +44 (737, 674 (05 69
Webpage: ……… h t t p s : / / optimistichackergaius. co m
Contact Email;…. support @ optimistichackergaius. co m
Telegram............. Telegram: Contact @optimistichackergaiuss7 -
HOW I GOT MY STOLEN CRYPTO MONEY BACK WITH THE ASSISTANCE OF GHOST CYBER RECOVERY
Ghost Cyber Recovery is for anyone seeking to recover their data or funds lost to scammers on the internet. this cyber security firm helped me get my bitcoin and lost digital money back. Their skilled work and exceptional service have absolutely astonished me. I never would have believed that I could get my money back until I went to them, explained my situation, and gave them all the information I needed. I was astounded that it took them 72 hours to get my money back. I wholeheartedly endorse Ghost Cyber Recovery for any and all cryptocurrency, digital fund, hacking, and cybersecurity-related problems. get in touch to recover your lost funds
E mail: (ghostcyberrecovery @ gmail . com ) or WhatsApp +1 734 743 18733 -
EXPERT SERVICE FOR CRYPTO THEFT HIRE TECHNOCRATE RECOVERY
I was drowning in debt and stuck with a negative balance on my account, which led to significant financial stress and anxiety. The constant worry about how I would manage my bills and obligations became overwhelming. It felt like I was trapped in a cycle of financial despair, and I didn’t know where to turn for help. That’s when I discovered TECHNOCRATE RECOVERY From the moment I reached out to them, I was impressed by their professionalism and understanding of my situation. TECHNOCRATE RECOVERY specializes in ethical hacking and recovery of stolen funds and crypto Assets and they possess a profound knowledge of the financial and economic systems that govern our lives. They were able to analyze my financial data meticulously, identifying errors, discrepancies, and fraudulent activities that were negatively impacting my credit and contributing to my financial struggles. Their team worked tirelessly to investigate my account and rectify the issues. They were thorough in their approach, leaving no stone unturned. I appreciated their discretion and commitment throughout the entire process. They not only focused on correcting the immediate problems but also provided valuable insights into managing my finances better in the future. I highly recommend contacting TECHNOCRATE RECOVERY. Their skills and dedication are truly game-changing when it comes to getting your finances back on track. The team not only helped me resolve my debt but also empowered me with knowledge and strategies to prevent future problems. Thanks to TECHNOCRATE RECOVERY for their outstanding support and reliable service.
Details For Inquiries
Email: tec hnocratrecovery@ contractor. net
Call/WhatsApp: +1 573-356-3708 -
Recommending COREASSETINC RECOVERY FIRM "COREASSETINC @ gmail dot com or Telegram: @ COREASSETINC" to people for their recovery services was God led, I suffered in the hands of scammers loosing my crypto assets worth $380,000 to a binary option site online with so much debts on me. I can't thank them enough for their mind blowing recovery service in retrieving back my money from these heartless scammers, the moment I wasn't able to withdraw my funds for the first time of asking, it became clear I have been scammed off my livelihood investing in cryptocurrency. I was searching through the Internet seeking for possible solution to my predicament and I saw comments about COREASSETINC with recommendations to contact them, I wasn't sure at first but in my despair I seriously needed the help of a legitimate hacking firm to assist in my case. I had to trust the reviews and contacted them to inquire about their recovery services and what it takes to hire their services, they laid down their working terms and conditions which I accepted before they commenced with the recovery. In anxiety I waited and hoped for the best possible outcome working them on my case and providing every information they requested to work with, assuming I hadn't read about and reached out to COREASSETINC, I wouldn't be here and happy sharing my amazing experience of getting back my lost investment funds. It's a testament of their worthiness and dedication to combating fraud, I know what it means losing funds to online investment, but worry not because there's a solution with COREASSETINC.
-
WHERE TO FIND A TRUSTED HACKER FOR ANY HACKING SERVICE = DIGITAL HACK RECOVERY
I had stored my Bitcoin wallet details in a digital note on my phone, thinking it was safe. It seemed like the most convenient option at the time—always accessible and secure behind my phone's encryption. However, my sense of security was shattered when my phone got hacked, and I lost access to my wallet. The moment I realized what had happened, a wave of panic washed over me. I had invested a significant amount of money into Bitcoin over the years, and the value had grown substantially. I was staring at the possibility of losing $400,000, my entire nest egg, in the blink of an eye. The anxiety was unbearable.For weeks, I tried everything I could think of to recover my funds. I consulted with tech-savvy friends, searched endlessly online, and even attempted various recovery tools, but nothing worked. Each failed attempt only heightened my fear that my Bitcoin was gone for good. It was a constant emotional roller coaster—one minute, I felt a glimmer of hope, and the next, I was plunged back into despair. I couldn’t eat, sleep, or think about anything else. I was consumed by the thought of losing everything I had worked so hard to build.Just when I was about to give up, I came across Digital Hack Recovery. At first, I was hesitant. Could I really trust someone to recover my wallet? Would they be able to help, or was this just another dead end? Despite my doubts, I decided to reach out to them—it was my last hope. From the moment I made contact, I felt a sense of relief. The team at Digital Hack Recovery was incredibly professional and understanding. They didn’t just treat me like another client; they treated my case with the urgency and care it deserved. They took the time to understand the details of my situation, and their thoroughness immediately put me at ease.The recovery process was far from easy. There were challenges and setbacks along the way, and there were moments when I feared the worst. But Digital Hack Recovery never gave up. They kept me informed at every step, explaining the technical aspects in a way that made sense and reassured me that they were doing everything possible to recover my Bitcoin. I discovered they had a range of tools and techniques at their disposal that I had never even heard of before—things that went far beyond the standard recovery methods I had tried on my own.After what felt like an eternity, I received the news I had been desperately hoping for—they had recovered my wallet. I was overwhelmed with relief and gratitude. The weight that had been pressing down on me for weeks was finally lifted. Digital Hack Recovery didn’t just recover my Bitcoin; they restored my peace of mind and taught me a valuable lesson about the importance of digital security.If you find yourself in a situation where you’ve lost access to your Bitcoin wallet due to hacking or any other digital mishap, I cannot recommend Digital Hack Recovery highly enough. They went above and beyond to ensure I got back what was rightfully mine. Their expertise, dedication, and compassion made all the difference. I’m forever grateful to them for saving not just my $400,000 but also my sanity. contact them via⁚ WhatsApp +19152151930, Email⁚ digital
hack recovery @ techie . com or visit their Website⁚ https : // digital hack recovery . com -
How to Get Back Lost, Hacked, or Stolen Cryptö? GrayHat Hacks Contractor
Recovering lost, hacked, or stolen cryptöcurrency can be a challenging and often uncertain process. However, you can recover your assets or mitigate the damage by utilizing Cryptö Recovery Services. GrayHat Hacks Contractor is one of the most recommended agency that specialize in tracking and recovering stolen cryptöcurrency.
Exploring How GrayHat Hacks Contractor Analyses Blockchain in Cryptöcurrency Investigations
The examination of blockchain activities plays a vital role in identifying fraudulent transactions and recovering misappropriated cryptöcurrency assets. This intricate process involves multiple critical steps as discussed briefly in this submission.
GrayHat Hacks Contractor (GHH) conduct thorough investigations of blockchain records related to stolen digital currencies in order to trace their movement from their original source to their current state. By clustering related addresses, GHH can effectively track the movement of stolen funds across various wallets, providing insights into the strategies employed by cybercriminals.
GHH examine transaction behaviors for anomalies or red flags that may suggest illegal activities, such as hacking or financial theft. Leveraging historical transaction data, GrayHat Hacks Contractor can identify recurring attack patterns, enabling them to spot potential threats before they escalate, thus helping in the formulation of preemptive countermeasures. Blockchain analysis sometimes necessitates collaboration with other agencies, cryptöcurrency exchanges, and other stakeholders to effectively immobilize and reclaim stolen assets.
In the field of cryptöcurrency investigations, blockchain analysis collaborates with open-source intelligence OSINT to offer a well-rounded perspective on security incidents. Tools like Etherscan and Nansen assist investigators like GHH in gathering essential information about individuals and organizations linked to cyber crimes, enhancing their capability to track down culprits and retrieve stolen funds.
While the steps to recovery may differ as each case is unique, there is still a good chance you can recover your lost funds if reported to the right team. The decentralized and pseudonymous nature of cryptocurrency makes it particularly difficult to trace or recover assets once they’ve been stolen. This makes it crucial for anyone seeking to recover stolen funds to employ the service of experts in the field.
You can reach out to them via WhatsApp +1 (843) 368-3015 if you are ever in need of their services.2 -
I was scammed by an Instagram account pretending to be a celebrity. I engaged with this scammer for five months through WhatsApp and ended up sending money via Bitcoin. The scammer then coerced me into providing my banking login details, leading them to steal $20,000 from my unemployment funds. They convinced me that they had routed cash to my account, and they deliberately avoided giving me any time to verify this supposed transaction, ultimately taking advantage of my trust. Throughout this ordeal, the scammer was incredibly patient and manipulative, waiting for eight months before I finally became suspicious and decided to expose them.
I made a video on WhatsApp detailing the scam, hoping it would help others avoid falling into the same trap. However, by then, my financial situation had become dire. The scammer demanded that I send Bitcoin via an ATM, continuing their deception even as I sought a resolution. Fortuitously, just as I was nearing desperation, I discovered BOTNET CRYPTO RECOVERY.
They stepped in at a crucial moment and managed to recover my $20,000. Their timely intervention and expertise in fund recovery proved to be a lifesaver.
The team at BOTNET CRYPTO RECOVERY is truly skilled in their field, demonstrating an impressive capability to not only recover stolen funds but also to expose and dismantle scam operations. Their service was exceptional. They provided clear communication and actionable strategies, working diligently to ensure that my money was returned. The recovery process was handled with the utmost professionalism and efficiency. Seeing my funds returned was a huge relief, and it was evident that BOTNET CRYPTO RECOVERY was well-versed in handling such complex and sensitive situations. I have since recommended BOTNET CRYPTO RECOVERY to several friends and colleagues, all of whom have been equally impressed with their services. They have become my go-to recommendation for anyone dealing with similar issues, whether it involves recovering lost funds or addressing various online scams. Their expertise extends beyond just recovery; they offer comprehensive solutions for individuals and businesses facing financial fraud.
BOTNET CRYPTO RECOVERY’s ability to address both hacking and fund recovery issues has been invaluable to me. They have various skills and strategies for tackling these challenges, and their success in helping me recover my stolen funds speaks volumes about their capabilities. They approach each case with a unique strategy tailored to the specifics of the situation, ensuring the best possible outcome for their clients. Reflecting on my experience, I am immensely grateful for the intervention of BOTNET CRYPTO RECOVERY. Their support has not only helped me regain my lost funds but also provided me peace of mind during a highly stressful period.
The professionalism and dedication demonstrated by their team have solidified my confidence in their services. If you find yourself in a situation involving financial fraud or scams, I highly recommend reaching out to BOTNET CRYPTO RECOVERY. Their proven track record and specialized expertise make them a top choice for recovering stolen funds and tackling online scams. They have been instrumental in my financial recovery, and their assistance has made a significant difference in my life.
EMAIL THEM: chat@botnetcryptorecovery.info