Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "security questions"
-
!rant
After over 20 years as a Software Engineer, Architect, and Manager, I want to pass along some unsolicited advice to junior developers either because I grew through it, or I've had to deal with developers who behaved poorly:
1) Your ego will hurt you FAR more than your junior coding skills. Nobody expects you to be the best early in your career, so don't act like you are.
2) Working independently is a must. It's okay to ask questions, but ask sparingly. Remember, mid and senior level guys need to focus just as much as you do, so before interrupting them, exhaust your resources (Google, Stack Overflow, books, etc..)
3) Working code != good code. You are an author. Write your code so that it can be read. Accept criticism that may seem trivial such as renaming a variable or method. If someone is suggesting it, it's because they didn't know what it did without further investigation.
4) Ask for peer reviews and LISTEN to the critique. Even after 20+ years, I send my code to more junior developers and often get good corrections sent back. (remember the ego thing from tip #1?) Even if they have no critiques for me, sometimes they will see a technique I used and learn from that. Peer reviews are win-win-win.
5) When in doubt, do NOT BS your way out. Refer to someone who knows, or offer to get back to them. Often times, persons other than engineers will take what you said as gospel. If that later turns out to be wrong, a bunch of people will have to get involved to clean up the expectations.
6) Slow down in order to speed up. Always start a task by thinking about the very high level use cases, then slowly work through your logic to achieve that. Rushing to complete, even for senior engineers, usually means less-than-ideal code that somebody will have to maintain.
7) Write documentation, always! Even if your company doesn't take documentation seriously, other engineers will remember how well documented your code is, and they will appreciate you for it/think of you next time that sweet job opens up.
8) Good code is important, but good impressions are better. I have code that is the most embarrassing crap ever still in production to this day. People don't think of me as "that shitty developer who wrote that ugly ass code that one time a decade ago," They think of me as "that developer who was fun to work with and busted his ass." Because of that, I've never been unemployed for more than a day. It's critical to have a good network and good references.
9) Don't shy away from the unknown. It's easy to hope somebody else picks up that task that you don't understand, but you wont learn it if they do. The daunting, unknown tasks are the most rewarding to complete (and trust me, other devs will notice.)
10) Learning is up to you. I can't tell you the number of engineers I passed on hiring because their answer to what they know about PHP7 was: "Nothing. I haven't learned it yet because my current company is still using PHP5." This is YOUR craft. It's not up to your employer to keep you relevant in the job market, it's up to YOU. You don't always need to be a pro at the latest and greatest, but at least read the changelog. Stay abreast of current technology, security threats, etc...
These are just a few quick tips from my experience. Others may chime in with theirs, and some may dispute mine. I wish you all fruitful careers!227 -
Definitely my security teacher. He actually expected us to actively learn the stuff and put effort into our education. He guided us through malware analysis and reverse engineering, simplifying it without insulting us.
We had students who thought they knew everything and he corrected them. We had arrogant students he put in place.
He treated us like adults and expected us to act like adults.
That's the only class I enjoyed studying for, because he would tell us exactly what wasn't on the exams (it was an intro course, didn't need to know the math). There were no trick questions.
I told him about the shitty teacher and he helped me through that confidence block. He helped me realize I *can* make it through the workforce as a female in security because I will work my ass off to be the best I can be. He reminded me why I love computers and why I want to go into forensics.
He's been a great mentor and role model and hiring him is one of the few things my department did right.7 -
Mother of god, was listening to the US govt hearing of zuckerberg about the recent scandals. The amount of very fucking simple obvious questions he 'could not' answer normally...
Govt person: Would you be willing to change Facebook's business model if this was required for the security and privacy of Facebook users' accounts?
Zuck: I don't understand your question.
Sorry, WHAT?! You don't need particular rocket science to understand what's being asked here. A combination of common sense and knowing the English language and English grammar in combination with maybe having finished some form of education should be enough to understand this ridiculously easy question.
Do you need it written on a golden plate with fucking blue letters in Facebook's font with the S letters as dollar signs while drinking 10 gallons of 'fuck every persons privacy'?!
Or maybe shoving it up your ass in the form of heated/glowing metal letters of 10+ inches in height? We could arrange that as well.25 -
Wow, just wow.
The Dutch national security spy agency and also their military one are complaining that the organisation that was brought to life to check if they don't spy on innocent people (and execute illegal hacks and overstep their surveillance powers etc) is investigating too much and asking too many technical questions relating to ongoing operations.
Well, this shows that this is necessary apparently! I'm glad this organisation is doing their job.
Oh, the irony.10 -
This is kind of a horror story, with a happing ending. It contains a lot of gore images, and some porn. Very long story.
TL;DR Network upgrade
Once upon a time, there were two companies HA and HP, both owned by HC. Many years went by and the two companies worked along side each one another, but sometimes there were trouble, because they weren't sure who was supposed to bill the client for projects HA and HP had worked on together.
At HA there was an IT guy, an imbecile of such. He's very slow at doing his job, doesn't exactly understand what he's doing, nor security principles.
The IT guy at HA also did some IT work for HP from time to time when needed. But he was not in charge of the infrastructure for HP, that was the jobb for one developer who didn't really know what he was doing either.
Whenever a new server was set up at HP, the developer tried many solutions, until he landed on one, but he never removed the other tested solutions, and the config is scattered all around. And no documentation!!
Same goes with network, when something new was added, the old was never removed or reconfigured to something else.
One dark winter, a knight arrived at HP. He had many skills. Networking, server management, development, design and generally a fucking awesome viking.
This genius would often try to cleanse the network and servers, and begged his boss to let him buy new equipment to replace the old, to no prevail.
Whenever he would look in the server room, he would get shivers down his back.
(Image: https://i.bratteng.xyz/Ie9x3YC33C.j...)
One and a half year later, the powerful owners in HA, HP and HC decided it was finally time to merge HA and HP together to HS. The knight thought this was his moment, he should ask CEO if he could be in charge of migrating the network, and do a complete overhault so they could get 1Gb interwebz speeds.
The knight had to come up with a plan and some price estimates, as the IT guy also would do this.
The IT guy proposed his solution, a Sonicwall gateway to 22 000 NOK, and using a 3rd party company to manage it for 3000 NOK/month.
"This is absurd", said the knight to the CEO and CXO, "I can come up with a better solution that is a complete upgrade. And it will be super easy to manage."
The CEO and CXO gave the knight a thumbs up. The race was on. We're moving in 2 months, I got to have the equipment by then, so I need a plan by the end of the week.
He roamed the wide internet, looked at many solutions, and ended up with going for Ubiquiti's Unifi series. Cheap, reliable and pretty nice to look at.
The CXO had mentioned the WiFi at HA was pretty bad, as there was WLAN for each meeting room, and one for the desks, so the phone would constantly jump between networks.
So the knight ended up with this solution:
2x Unifi Securtiy Gateway Pro 4
2x Unifi 48port
1x Unifi 10G 16port
5x Unifi AP-AC-Lite
12x pairs of 10G unifi fibre modules
All with a price tag around the one Sonicwall for 22 000 NOK, not including patch cables, POE injectors and fibre cables.
The knight presented this to the CXO, whom is not very fond of the IT guy, and the CXO thought this was a great solution.
But the IT guy had to have a say at this too, so he was sent the solution and had 2 weeks to dispute the soltion.
Time went by, CXO started to get tired of the waiting, so he called in a meeting with the knight and the IT guy, this was the IT guys chance to dispute the solution.
All he had to say was he was familiar with the Sonicwall solution, and having a 3rd party company managing it is great.
He was given another 2 weeks to dispute the solution, yet nothing happened.
The CXO gave the thumbs up, and the knight orders the equipment.
At this time, the knight asks the IT guy for access to the server room at HA, and a key (which would take 2 months to get sorted, because IT guys is a slow imbecile)
The horrors, Oh the horrors, the knight had never seen anything like this before.
(Image: https://i.bratteng.xyz/HfptwEh9qT.j...)
(Image: https://i.bratteng.xyz/HfptwEh9qT.j...)
(Image: https://i.bratteng.xyz/hmOE2ZuQuE.j...)
(Image: https://i.bratteng.xyz/4Flmkx6slQ.j...)
What are all these for, why is there a fan ductaped to on of the servers.
WHAT IS THIS!
Why are there cables tied in a knot.
WHY!
These are questions we never will know the answers too.
The knight needs access to the servers, and sonicwall to see how this is configured.
After 1.5 month he gains access to the sonicwall and one of the xserve.
What the knight discovers baffles him.
All ports are open, sonicwall is basically in bridge mode and handing out public IPs to every device connected to it.
No VLANs, everything, just open...10 -
Lads, I will be real with you: some of you show absolute contempt to the actual academic study of the field.
In a previous rant from another ranter it was thrown up and about the question for finding a binary search implementation.
Asking a senior in the field of software engineering and computer science such question should be a simple answer, specifically depending on the type of job application in question. Specially if you are applying as a SENIOR.
I am tired of this strange self-learner mentality that those that have a degree or a deep grasp of these fundamental concepts are somewhat beneath you because you learned to push out a website using the New Boston tutorials on youtube. FOR every field THAT MATTERS a license or degree is hold in high regards.
"Oh I didn't go to school, shit is for suckers, but I learned how to chop people up and kinda fix it from some tutorials on youtube" <---- try that for a medical position.
"Nah it's cool, I can fix your breaks, learned how to do it by reading blogs on the internet" <--- maintenance shop
"Sure can write the controller processing code for that boing plane! Just got done with a low level tutorial on some websites! what can go wrong!"
(The same goes for military devices which in the past have actually killed mfkers in the U.S)
Just recently a series of people were sent to jail because of a bug in software. Industries NEED to make sure a mfker has aaaall of the bells and whistles needed for running and creating software.
During my masters degree, it fucking FASCINATED me how many mfkers were absolutely completely NEW to the concept of testing code, some of them with years in the field.
And I know what you are thinking "fuck you, I am fucking awesome" <--- I AM SURE YOU BLOODY WELL ARE but we live in a planet with billions of people and millions of them have fallen through the cracks into software related positions as well as complete degrees, the degree at LEAST has a SPECTACULAR barrier of entry during that intro to Algos and DS that a lot of bitches fail.
NOTE: NOT knowing the ABSTRACTIONS over the tools that we use WILL eventually bite you in the ASS because you do not fucking KNOW how these are implemented internally.
Why do you think compiler designers, kernel designers and embedded developers make the BANK they made? Because they don't know memory efficient ways of deploying a product with minimal overhead without proper data structures and algorithmic thinking? NOT EVERYTHING IS SHITTY WEB DEVELOPMENT
SO, if a mfker talks shit about a so called SENIOR for not knowing that the first mamase mamasa bloody simple as shit algorithm THROWN at you in the first 10 pages of an algo and ds book, then y'all should be offended at the mkfer saying that he is a SENIOR, because these SENIORS are the same mfkers that try to at one point in time teach other people.
These SENIORS are the same mfkers that left me a FUCKING HORRIBLE AND USELESS MESS OF SPAGHETTI CODE
Specially to most PHP developers (my main area) y'all would have been well motherfucking served in learning how not to forLoop the fuck out of tables consisting of over 50k interconnected records, WHAT THE FUCK
"LeaRniNG tHiS iS noT neeDed!!" yes IT fucking IS
being able to code a binary search (in that example) from scratch lets me know fucking EXACTLY how well your thought process is when facing a hard challenge, knowing the basemotherfucking case of a LinkedList will damn well make you understand WHAT is going on with your abstractions as to not fucking violate memory constraints, this-shit-is-important.
So, will your royal majesties at least for the sake of completeness look into a couple of very well made youtube or book tutorials concerning the topic?
You can code an entire website, fine as shit, you will get tested by my ass in terms of security and best practices, run these questions now, and it very motherfucking well be as efficient as I think it should be(I HIRE, NOT YOU, or your fucking blog posts concerning how much MY degree was not needed, oh and btw, MY degree is what made sure I was able to make SUCH decissions)
This will make a loooooooot of mfkers salty, don't worry, I will still accept you as an interview candidate, but if you think you are good enough without a degree, or better than me (has happened, told that to my face by a candidate) then get fucking ready to receive a question concerning: BASIC FUCKING COMPUTER SCIENCE TOPICS
* gays away into the night52 -
Seriously fuck mandatory security questions, these are my options:
What year did you meet your spouse?
I'm single.
What is your favorite book as a child?
I didn't have a favorite book. (and still, don't)
In which city did you meet your spouse?
I'm single
What is the first name of the first person you went to prom with?
Didn't go to prom.
Which state did you first visit (outside of your birth state)?
I've been to about 43 states and can't remember when I started traveling, how the fuck am I supposed to know?
In which city was your spouse born?
Again I'm single.
In which city did your oldest sibling get married?
I don't have any siblings.
C'mon, at least let me create my own question because right now I have no choice but to make up random shit and write it down in LastPass as a note.5 -
Alias coworker = high school classmate
This kid wore a trench coat to school every single day and I guess he had a chronic masturbation problem because the guy was caught 3 different times IN CLASS jerking off.
Most people would catch a sexual harassment / indecent exposure / public masturbation charge, but this kid was breaking all these national math competition records and was working with a local university doing research and had a 4.5+ GPA (in high school in U.S. that's possible) so the school decided to do 2 things.
1. Not punish the kid, and in fact nothing of this was ever put on any record at all.
2. Write him a note from school administrators saying that this student can leave class whenever he would like no questions asked, and that the teacher must notify the office so they could send a security guard in order for this masturbation obsessed student to literally occupy a bathroom as his jerk off chamber uninterrupted.
So if in the past 6-7 years you've been in a high caliber university studying computer science and there was a kid in a trench coat "feeding some geese" near you, you can thank my high school.6 -
So this chick has been super nice to me for the past few months, and has been trying to push me towards a role in security. She said nothing but wonderful things about it. It’s easy, it’s not much work, it’s relaxing, etc.
I eventually decided I’m burned out enough that something, anything different would be good, and went for it. I’m now officially doing both dev and security. The day I started, she announced that she was leaving the security team and wouldn’t join any other calls. Just flat-out left.
She trained me on doing a security review of this release, which basically amounted to a zoom call where I did all of the work and she directed me on what to do next, ignored everything I said, and treated me like an idiot. It’s apparently an easy release. The work itself? Not difficult, but it’s very involved, very time consuming, and requires a lot of paper trail — copying the same crap to three different places, tagging lots of people, copying their responses and pasting them elsewhere, filing tickets, linking tickets, copying info back and forth to slack, signing off on things, tagging tickets in a specific way, writing up security notes in a very specific format etc. etc. etc. It’s apparently usually very hectic with lots of last-minute changes, devs who simply ignore security requests, etc.
I asked her at the end for a quick writeup because I’m not going to remember everything and we didn’t cover everything that might happen.
Her response: Just remember what you did here, and do it again!
I asked again for her to write up some notes. She said “I would recommend.. you watch the new release’s channel starting Thursday, and then review what we did here, and just do all that again. Oh, and if you have any questions, talk to <security boss> so you get in the habit of asking him instead of me. Okay, bye!”
Fucking what.
No handoff doc?
Not willing to answer questions after a day and a half of training?
A recap
• She was friendly.
• She pushed me towards security.
• She said the security role was easy and laid-back.
• I eventually accepted.
• She quit the same day.
• The “easy release” took a day and a half of work with her watching, and it has a two-day deadline.
• She treated (and still treats) me like a burden and ignores everything I said or asked.
• The work is anything but laid-back.
• She refuses to spend any extra time on this or write up any notes.
• She refuses to answer any further questions because (quote) “I should get in the habit of asking <security boss> instead of her”
So she smiled, lied, and stabbed me in the back. Now she’s treating me like an annoyance she just wants to go away.
I get that she’s burned out from this, but still, what a fucking bitch. I almost can’t believe she’s acting this way, but I’ve grown to expect it from everyone.
But hey, at least I’m doing something different now, which is what I wanted. The speed at which she showed her true colors, though, holy shit.
“I’m more of a personal motivator than anything,” she says, “and I’m first and foremost a supporter of women developers!” Exactly wrong, every single word of it.
God I hate people like this.18 -
Some of you might have seen it already, those who didn't just have to.
One of the best rants I've read lately.
"Our security auditor is an idiot. How do I give him the information he wants?"
https://serverfault.com/questions/...4 -
I've been away, lurking at the shadows (aka too lazy to actually log in) but a post from a new member intrigued me; this is dedicated to @devAstated . It is erratic, and VERY boring.
When I resigned from the Navy, I got a flood of questions from EVERY direction, from the lower rank personnel and the higher ups (for some reason, the higher-ups were very interested on what the resignation procedure was...). A very common question was, of course, why I resigned. This requires a bit of explaining (I'll be quick, I promise):
In my country, being in the Navy (or any public sector) means you have a VERY stable job position; you can't be fired unless you do a colossal fuck-up. Reduced to non-existent productivity? No problem. This was one of the reasons for my resignation, actually.
However, this is also used as a deterrent to keep you in, this fear of lack of stability and certainty. And this is the reason why so many asked me why I left, and what was I going to do, how was I going to be sure about my job security.
I have a simple system. It can be abused, but if you are careful, it may do you and your sanity good.
It all begins with your worth, as an employee (I assume you want to go this way, for now). Your worth is determined by the supply of your produced work, versus the demand for it. I work as a network and security engineer. While network engineers are somewhat more common, security engineers are kind of a rarity, and the "network AND security engineer" thing combined those two paths. This makes the supply of my work (network and security work from the same employee) quite limited, but the demand, to my surprise, is actually high.
Of course, this is not something easy to achieve, to be in the superior bargaining position - usually it requires great effort and many, many sleepless nights. Anyway....
Finding a field that has more demand than there is supply is just one part of the equation. You must also keep up with everything (especially with the tech industry, that changes with every second). The same rules apply when deciding on how to develop your skills: develop skills that are in short supply, but high demand. Usually, such skills tend to be very difficult to learn and master, hence the short supply.
You probably got asleep by now.... WAKE UP THIS IS IMPORTANT!
Now, to job security: if you produce, say, 1000$ of work, then know this:
YOU WILL BE PAID LESS THAN THAT. That is how the company makes profit. However, to maximize YOUR profit, and to have a measure of job security, you have to make sure that the value of your produced work is high. This is done by:
- Producing more work by working harder (hard method)
- Producing more work by working smarter (smart method)
- Making your work more valuable by acquiring high demand - low supply skills (economics method)
The hard method is the simplest, but also the most precarious - I'd advise the other two. Now, if you manage to produce, say, 3000$ worth of work, you can demand for 2000$ (numbers are random).
And here is the thing: any serious company wants employees that produce much more than they cost. The company will strive to pay them with as low a salary as it can get away with - after all, a company seeks to maximize its profit. However, if you have high demand - low supply skills, which means that you are more expensive to be replaced than you are to be paid, then guess what? You have unlocked god mode: the company needs you more than you need the company. Don't get me wrong: this is not an excuse to be unprofessional or unreasonable. However, you can look your boss in the eye. Believe me, most people out there can't.
Even if your company fails, an employee with valuable skills that brings profit tends to be snatched very quickly. If a company fires profitable employees, unless it hires more profitable employees to replace them, it has entered the spiral of death and will go bankrupt with mathematical certainty. Also, said fired employees tend to be absorbed quickly; after all, they bring profit, and companies are all about making the most profit.
It was a long post, and somewhat incoherent - the coffee buzz is almost gone, and the coffee crash is almost upon me. I'd like to hear the insight of the veterans; I estimate that it will be beneficial for the people that start out in this industry.2 -
This happened via mail thread today.
Boss: we need this new brilliant feature I just made up and running asap! Top priority, it has to be done well, for my reputation is on the line!
Me: *looks at the specifics* 'kay, looks easy enough, this evening max and it will be ready. I just nees some extra info about what kind of data validations (I speak no accountant) are needed, and some other details (a total of 3 questiona).
B: Sure! Remember, it needs to be perfect, as my reputation is at stake. Call me on the phone and I'll give you the details!
M: Can't you answer via mail? Thua way both me and the other devs will have clewr guidelines
B: Just call me! Why do you need it to be written down? It's faster this way!
...Fine. I'll keep asking until you're ready to give me a written answer to my questions. No way I'll take security details via phone for something you want in production this evening. No chance in Hell I'll take responsibility for "misunderstanding" what you said on the phone. Why does it always has to be like that?8 -
This is the most hilarious stackoverflow rant ever, quote:
"Strong cryptography only means the passwords must be encrypted while the user is inputting them but then they should be moved to a recoverable format for later use."
Full rant:
http://serverfault.com/questions/...5 -
Every time I got a mandatory security question, I type in "go fuck yourself with a cactus". There's only one answer for all of them.6
-
So I have seen this quite a few times now and posted the text below already, but I'd like to shed some light on this:
If you hit up your dev tools and check the network tab, you might see some repeated API calls. Those calls include a GET parameter named "token". The request looks something like this: "https://domain.tld/api/somecall/..."
You can think of this token as a temporary password, or a key that holds information about your user and other information in the backend. If one would steal a token that belongs to another user, you would have control over his account. Now many complained that this key is visible in the URL and not "encrypted". I'll try to explain why this is, well "wrong" or doesn't impose a bigger security risk than normal:
There is no such thing as an "unencrypted query", well besides really transmitting encrypted data. This fields are being protected by the transport layer (HTTPS) or not (HTTP) and while it might not be common to transmit these fields in a GET query parameter, it's standard to send those tokens as cookies, which are as exposed as query parameters. Hit up some random site. The chance that you'll see a PHP session id being transmitted as a cookie is high. Cookies are as exposed as any HTTP GET or POST Form data and can be viewed as easily. Look for a "details" or "http header" section in your dev tools.
Stolen tokens can be used to "log in" into the website, although it might be made harder by only allowing one IP per token or similar. However the use of such a that token is absolut standard and nothing special devRant does. Every site that offers you a "keep me logged in" or "remember me" option uses something like this, one way or the other. Because a token could have been stolen you sometimes need to additionally enter your current password when doings something security risky, like changing your password. In that case your password is being used as a second factor. The idea is, that an attacker could have stolen your token, but still doesn't know your password. It's not enough to grab a token, you need that second (or maybe thrid) factor. As an example - that's how githubs "sudo" mode works. You have got your token, that grants you more permissions than a non-logged in user has, but to do the critical stuff you need an additional token that's only valid for that session, because asking for your password before every action would be inconvenient when setting up a repo
I hope this helps understanding a bit more of this topic :)
Keep safe and keep asking questions if you fell that your data is in danger
Reeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee5 -
Found that out that one of our company's internal API (I hope it's only internal) is exposing some personal data. After finally getting the right people involved they said they'd fix it 'immediately'.
5 days later I check and now there is more personal data exposed...which includes personal security questions and the hashed answers to said questions.
And of course they are using a secure hashing mechanism...right? Wrong. md5, no salt
Sigh...5 -
Me: API support, please check why I'm getting ECONNTIMEDOUT for 3% of requests
supp: before we look into this, please answer these questions: a), b), c), d), e)
Me and coleague: *spend 20 minutes gathering all the details into a nice answer. Post the answers*
Slack bot: *removes the answer [allegedly for compliance/security]*
api supp: any update?
..... I really want to smash smth. Hulk SMASH!!!2 -
Our security auditor is an idiot. How do I give him the information he wants?
http://serverfault.com/questions/...4 -
I work in big data and security analytics... So naturally I am a very detail oriented and analytical person.... Something that I constantly get told off about for 'over analysing' every personal situation.... Especially by my wife!
Today she was chatting to our best friend on WhatsApp who's been travelling Europe for 6 months seeing how life is etc... At the end of the conversation I point out he never once told her where he was and avoided the questions.... And that I was sure he was gonna turn up tonight....
She tells me I'm over analysing and full of it as she's in Spain.... Not even an hour later he walked through our front door and we are in the pub having an awesome catch up!
Who said I'm over analytical! More like right!?4 -
I am really getting sick of recruiters contacting me with "great opportunities" then when I ask questions about the post they just give me the answers they think I want to hear. I know when you're lying because if you knew the answer you would have led with that. At least say you'll find out more and then give me a follow up response.
Recruiter: Would it be possible for you to deliver hacking training?
Me: You mean pentesting?
R: Yes, that.
Me: Well, what will it be used for? Breaking into peoples networks and spying on them?
R: Yes, they'll want it to be able to spy on people.
Me: Well, that's unethical, I'm only interested in defensive security practices.
R: Yes, they'll only want it for ethical reasons like defence and against bad guys.
Me: *dirtiest look I could muster*
I mean there's gullible and then there's what ever it is you think I am.2 -
Hey Citrix:
FUCK YOU.
Learn to make an accessible log in page you fucks.
Maybe instead of vague fucking "you're user name and password is wrong" say things like "your account is locked because we somehow decided we don't like your password anymore. . . . without telling you"
Fucking 2 hours of my day wasted trying to log into my company's VM because first it wouldn't take my password (that I've had for over a month and doesn't expire for another month) over and over again. I changed it, logged in. Got up to do something that'd take less than 5 minutes. And OF COURSE the people who set up the VM made them log you out if you're gone for more than 3 minutes (fuck that guy too). Come back to a log in screen and it won't accept my new password.
Change it again. Except this time it won't accept my new password because it's "like my old password." It is in that it uses the alphabet and numbers, but it's also different in that those alphanumeric characters are LITERALLY DIFFERENT IN EVERY PLACE. I finally get it to accept a new password.
I'm also loving the whole "answer these security questions that literally anyone who does minimal research on you can answer" before I get to change my password. Yeah. Because finding my mother's maiden name or the city I was born in is so fucking hard. Literally impossible to find out what my Dad's dad's name is. Shit like that isn't publically available. Nope. Why the fuck are we still using "security" questions?
I log into Citrix again. And it takes me to . . . the log in for Citrix.
There is no word in elvish, entish or the tongues of men for this stupidity.
Fuck Citrix. Fuck the people behind the password manager (Aviator or something like that), and fuck whatever administrator setting turns my computer off due to inactivity in such a stupid short amount of time. 10 minutes, 15 minutes, that'd be fine. But it's more like 3 or 5, like wtf.2 -
Alright lads here is the thing, have not been posting anything other than replies to things cuz I have been busy being miserable at school and dealing with work stuff.
Our manager left us back in February. Because she was leaving I decided that I wanted to try a different path and went on to become a programmer analyst for my institution, if anything I knew that it was going to be pretty boring work, but it came with nice monetary compensation and a foot in the door for other data science related jobs in the future. Thing is, the department head asked me to stay in the web technologies department because we had a lack of people there and hiring is hard as shit, we do not do remote jobs since our work usually requires a level of discretion and security. Thus I have been working in the web tech department since she left albeit with a different title since I aced the interview for the analyst position and the team there were more than happy to have me. I have done very few things for them, some reports here and there and mostly working directly with the DBA in some projects. One migration project would have costed my institution a total of 58k and we managed to save the cost by building the migration software ourselves.....honestly it was a fucking cake walk, if you had any doubts about the shaddyness of enterprise level applications regarding selling overpriced shit with different levels of complexity, keep them, enterprise is shaddy af indeed. But I digress.
I wrote the specification for the manager position along the previous manager, we had decided that the next candidate needed to be strong with development knowledge as well as other things as to properly understand and manage a software team, we made the academic requirement(fuck you, yes we did ask for academic requirements) to be either in the Computer Science/software engineering area or at least on the Business Administration side. We were willing to consider BA holders in exchange for having knowledge of the development process of different products and a complete understanding of what developers go through. NOT ONE SINGLE motherfucker was able to satisfy this, some of them were idiots that I knew from before that had ABSOLUTELY no business even considering applying to the position, the courage it took for some of these assholes to apply would have hurt their mothers, their God if they had one, and their country, they were just that fucking bad in their jobs as well as being overall shit people.
Then we had 1 candidate actually fall through the cracks enough to get an interview. My dude here was lying out of his ass through the interview process. According to him he had "lots of Laravel experience and experience managing Laravel projects" and mentioned repeatedly how it would be a technology that we should consider for our products. I was to interview him alongside the vice president of our institution due to the head of my department and the rest of the managers for I.T being on vacation leave all at the same bloody time.
Backstory before the interview:
Whilst I was going over the interview questions with the vice president literally offered me the job instead. I replied with honesty, reflecting how I did not originally wanted him but feeling that our institution was ready to settle on any candidate due to the lack of potentials. He was happy to do it since apparently both him and the HOD were expecting me to step up sooner or later. I was floored.
Regardless, out of kindness he wanted to go through the interview.
So, going back to the interview. As soon as the person in question referenced the framework I started to ask him about it, just simple questions, the first was "what are your thoughts on the Eloquent ORM? I am not too fond of it and want to know what you as a full time laravel dev think of it"
his reply: "I am sorry I am not too familiar with it, I don't know what that is" <--- I appreciated his honesty in this but thought it funny that someone would say that he was a Laravel developer whilst not knowing what an ORM was since you can't really get away from using it on the initial stages of learning about Laravel, maybe if one wanted to go through the hurdle of switching to something like doctrine...but even then, it was....odd.
So I met with the hod when he came back, he was stoked at the prospect of having me become the manager and I happily accepted the position. It will be hell, but I don't even need to hit the ground running since I have been the face of the department since ages. My team were ecstatic about it since we are all close friends and they have been following my directions without complaints(but the ocational eat a dick puto) for some time, we work well together and we are happy to finally have someone to stop the constant barrage that comes from people taking advantage of a missing manager.
Its gonna get good, its gonna get fun, and i am getting to see how shit goes.7 -
So one of my clients had a different company do a penetrationtest on one of my older projects.
So before hand I checked the old project and upgraded a few things on the server. And I thought to myself lets leave something open and see if they will find it.
So I left jquery 1.11.3 in it with a known xss vulnerability in it. Even chrome gives a warning about this issue if you open the audit tab.
Well first round they found that the site was not using a csrf token. And yeah when I build it 8 years ago to my knowledge that was not really a thing yet.
And who is going to make a fake version of this questionair with 200 questions about their farm and then send it to our server again. That's not going to help any hacker because everything that is entered gets checked on the farm again by an inspector. But well csrf is indeed considered the norm so I took an hour out of my day to build one. Because all the ones I found where to complicated for my taste. And added a little extra love by banning any ip that fails the csrf check.
Submitted the new version and asked if I could get a report on what they checked on. Now today few weeks later after hearing nothing yet. I send my client an email asking for the status.
I get a reaction. Everything is perfect now, good job!
In Dutch they said "goed gedaan" but that's like what I say to my puppy when he pisses outside and not in the house. But that might just be me. Not knowing what to do with remarks like that. I'm doing what I'm getting paid for. Saying, good job, your so great, keep up the good work. Are not things I need to hear. It's my job to do it right. I think it feels a bit like somebody clapping for you because you can walk. I'm getting off topic xD
But the xss vulnerability is still there unnoticed, and I still have no report on what they checked. So I have like zero trust in this penetration test.
And after the first round I already mentioned to the security guy in my clients company and my daily contact that they missed things. But they do not seem to care.
Another thing to check of their to do list and reducing their workload. Who cares if it's done well it's no longer their responsibility.
2018 disclaimer: if you can't walk not trying to offend you and I would applaud for you if you could suddenly walk again.2 -
Around 2 years ago, I had first discovered DevRant.
I was an intern in a startup then, and I was working on ElasticSearch. I remember making rants about it. The internship ended. So did my relationship with ElasticSearch.
This week, a new intern joined our organisation (a different organisation). He was assigned the task of deploying ElasticSearch, with me as his mentor. All was going good, we migrated data from MongoDB to ElasticSearch and all.
Back then, I used to curse the team lead (leading a team of interns mostly), for not helping me properly...
I wanted a publicly accessible dashboard, since we can't really see the Kibana dashboard with SSH :P... So, we implemented user authentication using X-Pack security. And here we are, stuck... Again... I'm unable to help the intern. The World has come to a full circle.
PS: I have to just guide him while doing my own User Stories.
https://stackoverflow.com/questions... -
Dear Identity Providers, Never ask for "favorite teacher" or "mother’s maiden name." Security questions are among the worst ideas in security to date. If you insist, at least let me provide my own questions!8
-
Haven't been on here in a while, but I had to rant about these security questions. I couldn't come up with legit answers for any of the very few options; most of which required you to be married....
5 -
Client contacts our company that his site is down, we do some investigating and the only way we can access the site is on a mobile phone. From the office computers the site never loads and times out. Since we don't host the site and I've never logged into it before I don't have a lot of details so I suggest they contact whoever hosts their site. This is where things get weird.
Client tells me that the site is hosted on someone's home server. I tell him that this is quite strange in 2018 and rather unlikely and ask if he was ever given access to the site to log in or if he has access to his domain registration, GoDaddy.
He says he doesn't understand any of this and would rather I just contact his current developer and figure it out with him. We agree that he needs to get access to his site so we are going to migrate it once I get access to it.
I email his current developer letting him know the client has put me in contact with him to troubleshoot the issues with the site. I ask him some standard questions like: where is the site hosted? Can you access it from a computer? Do you have some security measures in place to block certain IP ranges? Can you give me from access to get the files? Will you send me a backup of the site for me to load up on my server?
*2days pass*
Other dev: Tell me the account number and I'll transfer the domain.
Me: I'll have to get back to you on that once I talk to the client and set up his GoDaddy account since we believe the business owner should own their domain, not their developers. In the meantime you didn't answer any of the questions I asked. Transferring the domain won't get the site on my server so I still need the files.
*3 days pass*
OD: You are trying the wrong domain. The correct domain is [redacted].com I'll have my daughter send you the files when she gets in town. We will transfer the domain to you, the client will forget to pay and the site will go down and it'll be your fault.
Me: I appreciate your advice, but the client will own their domain. I'm trying to get the site online and you have no answered any of my questions. It's been a week now and you have not transferred the domain, you have not provided a copy of the site, you have not told me where the site is hosted. The client and I are both getting impatient at this point when will we receive a backup of the site and the transfer of the domain?
OD: Go fuck yourself, tell the client they can sue me.
If the client is that terrible, wouldn't you want to hand them off to anyone willing to take them? I have never understood why developers and agencies try to hold clients hostage by keeping their domain or website and refusing access. From what I can tell this is a freelance developer without a real company so a legal battle likely isn't going to go well since the domain is worthless to him as the copyright to the name is owned by the client. This isn't the first time we've had to help clients through this sort of thing.4 -
what kind of dumb fuck you have to be to get the react js dev job in company that has agile processes if you hate the JS all the way along with refusing to invest your time to learn about shit you are supposed to do and let's add total lack of understanding how things work, specifically giving zero fucks about agile and mocking it on every occasion and asking stupid questions that are answered in first 5 minutes of reading any blog post about intro to agile processes? Is it to annoy the shit out of others?
On top of that trying to reinvent the wheels for every friggin task with some totally unrelated tech or stack that is not used in the company you work for?
and solution is always half-assed and I always find flaw in it by just looking at it as there are tons of battle-tested solutions or patterns that are better by 100 miles regarding ease of use, security and optimization.
classic php/mysql backend issues - "ooh, the java has garbage collector" - i don't give a fuck about java at this company, give me friggin php solution - 'ooh, that issue in python/haskel/C#/LUA/basically any other prog language is resolved totally different and it looks better!' - well it seems that he knows everything besides php!
Yeah we will change all the fucking tech we use in this huge ass app because your inability to learn to focus on the friggin problem in the friggin language you got the job for.
Guy works with react, asked about thoughts on react - 'i hope it cease to exists along with whole JS ecosystem as soon as possible, because JS is weird'. Great, why did you fucking applied for the job in the first place if it pushes all of your wrong buttons!
Fucking rockstar/ninja developers! (and I don't mean on actual 'rockstar' language devs).
Also constantly talks about game development and we are developing web-related suite of apps, so why the fuck did you even applied? why?
I just hate that attitude of mocking everything and everyone along with the 'god complex' without really contributing with any constructive feedback combined with half-assed doing something that someone before him already mastered and on top of that pretending that is on the same level, but mainly acting as at least 2 levels above, alas in reality just produces bolognese that everybody has to clean up later.
When someone gives constructive feedback with lenghty argument why and how that solution is wrong on so many levels, pulls the 'well, i'm still learning that' card.
If I as code monkey can learn something in 2 friggin days including good practices and most of crazy intricacies about that new thing, you as a programmer god should be able to learn it in 2 fucking hours!
Fucking arrogant pricks!8 -
Had my first interview for a cyber security gig.
1st round, preliminary questions about ethics in a security related topic, etc.
I wrote a report about that topic, but for some reason brain fogged the answer.
At the end of the interview, I also blurted out that I found the interviewer's presentation at a past conference and really liked it.
Pretty sure they now think I'm a creep.
That being said, it's been a few years since I've interviewed, so it feels great to get the dust off, even if I bombed it
Practice makes perfect, right?!2 -
PayPal = GayPal
PHASE 1
1. I create my personal gaypal account
2. I use my real data
3. Try to link my debit card, denied
4. Call gaypal support via international phone number
5. Guy asks me for my full name email phone number debit card street address, all confirmed and verified
6. Finally i can add my card
PAHSE 2
7. Now the account is temporarily limited and in review, for absolutely no fucking reason, need 3 days for it to be done
8. Five (5) days later still limited i cant deposit or withdraw money
9. Call gaypal support again via phone number, burn my phone bill
10. Guy tells me to wait for 3 days and he'll resolve it
PHASE 3
11. One (1) day later (and not 3), i wake up from a yellow account to a red account where my account is now permanently limited WITHOUT ANY FUCKING REASON WHY
12. They blocked my card and forever blocked my name from using gaypal
13. I contact them on twitter to tell me what their fucking problem is and they tell me this:
"Hi there, thank you for being so patient while your conversation was being escalated to me. I understand from your messages that your PayPal account has been permanently limited, I appreciate this can be concerning. Sometimes PayPal makes the decision to end a relationship with a customer if we believe there has been a violation of our terms of service or if a customer's business or business practices pose a high risk to PayPal or the PayPal community. This type of decision isn’t something we do lightly, and I can assure you that we fully review all factors of an account before making this type of decision. While I appreciate that you don’t agree with the outcome, this is something that would have been fully reviewed and we would be unable to change it. If there are funds on your balance, they can be held for up to 180 days from when you received your most recent payment. This is to reduce the impact of any disputes or chargebacks being filed against you. After this point, you will then receive an email with more information on accessing your balance.
As you can appreciate, I would not be able to share the exact reason why the account was permanently limited as I cannot provide any account-specific information on Twitter for security reasons. Also, we may not be able to share additional information with you as our reviews are based on confidential criteria, and we have no obligation to disclose the details of our risk management or security procedures or our confidential information to you. As you can no longer use our services, I recommend researching payment processors you can use going forward. I aplogise for any inconvenience caused."
PHASE 4
14. I see they basically replied in context of "fuck you and suck my fucking dick". So I reply aggressively:
"That seems like you're a fraudulent company robbing people. The fact that you can't tell me what exactly have i broken for your terms of service, means you're hiding something, because i haven't broken anything. I have NOT violated your terms of service. Prove to me that i have. Your words and confidentially means nothing. CALL MY NUMBER and talk to me privately and explain to me what the problem is. Go 1 on 1 with the account owner and lets talk
You have no right to block my financial statements for 180 days WITHOUT A REASON. I am NOT going to wait 6 months to get my money out
Had i done something wrong or violated your terms of service, I would admit it and not bother trying to get my account back. But knowing i did nothing wrong AND STILL GOT BLOCKED, i will not back down without getting my money out or a reason what the problem is.
Do you understand?"
15. They reply:
"I regret that we're unable to provide you with the answer you're looking for with this. As no additional information can be provided on this topic, any additional questions pertaining to this issue would yield no further responses. Thank you for your time, and I wish you the best of luck in utilizing another payment processor."
16. ARE YOU FUCKING KIDDING ME? I AM BLOCKED FOR NO FUCKING REASON, THEY TOOK MY MONEY AND DONT GIVE A FUCK TO ANSWER WHY THEY DID THAT?
HOW CAN I FILE A LAWSUIT AGAINST THIS FRAUDULENT CORPORATION?12 -
Companies really need to re-evaluate what they ask as security questions.
If I know your name and your approximate date of birth (to the month) then, here in the UK at least, I have a very good chance of being able to find out your parents names, your mother's maiden name, your address, your parents address (i.e. probably where you grew up and what school you went to), your parents ages, when they got married, etc. - and all from publicly available info, not illegal crap you find on Tor or social media stalking.
This isn't hard to find if you know where to look - the problem is that people think that it's all private, and behave as such - and companies encourage it. The typical "internet safety courses" don't even touch on it, and even more tech savvy people I know often don't have a clue this is possible.2 -
Got fucking graduated, a whole day wasted, fucking ass hole literally trapped us cannot even got to release some water.
To get a fucking degree you have to bear with fucking teacher who don't shit about privacy, security.
And answering fucking theroy questions which has fucking string Match with the fucking textbook paragraph.
Do a fucking report which will be fucking 100 pages and take fucking 2 copy (10 rough copies)
The register to fucking leaky placement centre. Who leak you data to all hiring companies as well as your co-students.
Then fucking attend the fucking ass hole ceremony where some old guy lectures for fucking long time about some civil infrastructure , road and other stuff.
And I have not mentioned other fucking ass hole slutty stuff.i don't know fucking until what time I can hold on.
This Fucked the fuck out of me10 -
When I was in 11th class, my school got a new setup for the school PCs. Instead of just resetting them every time they are shut down (to a state in which it contained a virus, great) and having shared files on a network drive (where everyone could delete anything), they used iServ. Apparently many schools started using that around that time, I heard many bad things about it, not only from my school.
Since school is sh*t and I had nothing better to do in computer class (they never taught us anything new anyway), I experimented with it. My main target was the storage limit. Logins on the school PCs were made with domain accounts, which also logged you in with the iServ account, then the user folder was synchronised with the iServ server. The storage limit there was given as 200MB or something of that order. To have some dummy files, I downloaded every program from portableapps.com, that was an easy way to get a lot of data without much manual effort. Then I copied that folder, which was located on the desktop, and pasted it onto the desktop. Then I took all of that and duplicated it again. And again and again and again... I watched the amount increate, 170MB, 180, 190, 200, I got a mail saying that my storage is full, 210, 220, 230, ... It just kept filling up with absolutely zero consequences.
At some point I started using the web interface to copy the files, which had even more interesting side effects: Apparently, while the server was copying huge amounts of files to itself, nobody in the entire iServ system could log in, neither on the web interface, nor on the PCs. But I didn't notice that at first, I thought just my account was busy and of course I didn't expect it to be this badly programmed that a single copy operation could lock the entire system. I was told later, but at that point the headmaster had already called in someone from the actual police, because they thought I had hacked into whatever. He basically said "don't do again pls" and left again. In the meantime, a teacher had told me to delete the files until a certain date, but he locked my account way earlier so that I couldn't even do it.
Btw, I now own a Minecraft account of which I can never change the security questions or reset the password, because the mail address doesn't exist anymore and I have no more contact to the person who gave it to me. I got that account as a price because I made the best program in a project week about Java, which greatly showed how much the computer classes helped the students learn programming: Of the ~20 students, only one other person actually had a program at the end of the challenge and it was something like hello world. I had translated a TI Basic program for approximating fractions from decimal numbers to Java.
The big irony about sending the police to me as the 1337_h4x0r: A classmate actually tried to hack into the server. He even managed to make it send a mail from someone else's account, as far as I know. And he found a way to put a file into any account, which he shortly considered to use to put a shutdown command into autostart. But of course, I must be the great hacker.3 -
They call it security questions.
I call it social engineering backdoor.
I'm supposed to enter those questions after logging into my account and I'm not able to skip it nor to set a proper two factor method.
Well, fuck you. Did you ever thought about dying by a two factor method? Ever watched a Saw movie? You got the idea. -
hi devrant!
about six months ago i posted that i was accepted into and starting at a coding bootcamp. next week is the last week of curriculum for me before i can choose to be a teachers assistant or finish my capstone project and graduate!
some basic info about the course i took:
- 6 months (3 months web dev 2 months CS 1 month capstone project )
- starts by learning the MERN stack
- includes noSQL and SQL dbs
- transitions into C and then python for computer science
- includes basic security info
- lots and lots of algorithm practice
- lots of job readiness stuff (resume writing, linkedin, etc, but i havent done that yet)
- lots of portfolio-able projects throughout the schooling experience
- previous cohorts have something like 40% (after 1month) and 70% (after two) job placement rates (rough estimate)
let me know if anyone is curious about anything related and id be happy to answer what questions i can! :)6 -
I am going to rant about this being the exam week, it being hot as hell, and us having had a messed up semester study-wise... And I still managed to do good-ish in subjects somehow... Good as in, relatively good. I am no 4.0 GPA person by any means and could never be one if I studied only (if that's even realistic at all). Recently I applied to a job at Andersen Lab for a Trainee position. Got turned down because I lack experience. A TRAINEE POSITION. I could retake the interview but I feel weird with how I got rated a whole level lower than my IELTS score and two levels lower than my score at Epam (which is the more recent one!) and the questions were mostly so easy I could answer while half asleep. Just yeah. Also, while I understand the whole knowledge required thing... I don't get the need for THREE whole interviews only to then proceed to turn me down. I am continuously applying and still seeing no results. If I'm "lucky", I guess, I will get training from a bank. And then get employed there... Mentally doing very bad right now, just barely wanting to MOVE. Which is basically me being this close to giving up. Today's exam is in Linux Security and I swear, this was such a waste of a good sounding subject... Imagine, I could have learnt how to set up a server at home and all that but instead we did... The more basic stuff in Linux. And for the whole semester outside of two or three cases I was the only one in attendance. Anyways, I have been feeling like I just can't program anymore and stuff... Even though we did a Python subject this semester. And in that subject I just felt like we were going way too quickly considering a lot of the students there come from non-IT or close to that background...
I may need to put effort into learning 3D Environmental art, I have this feeling I would like doing that as a job in game dev. Oh, and I also wanna design this house that I have in mind for me. It's shaped like an Amanita Muscaria and instead of the white dots it has windows that are round, as well as a spiral staircase connecting the lower and upper floors. Need to figure out how to model that in something like AutoCAD (I have a bit of experience with it and that's why I'd like to try there... But I may have to learn other programs to do it for free), but it will take me a long time to execute since I am not the most organised in how I learn...
Anyways, I will only sporadically be there, so I may not see things here. I am somewhat busy with exams and then this NGO I recently became a founding member of (and I have to say, I kinda don't wanna be there, but there are things that have to be done). Also filling the documents for a Canadian visitor's visa to go finally see the family over there and all that. But the latter will probably not happen until next year...
Finally, I am wishing you all a sound mental health and happiness. I hope you do well in whatever you are doing at the moment or are planning to. Until next time!3 -
Nothing makes me not want to take a full-time job at your company more than having to go through IT tickets every quarter year when my password expires to actually change my password. Why have a fucking self-service portal for employees if logging in with an expired password doesn't work and the reset password link tells me that I need to log in to enroll with security questions (???). It feels like these websites are glued together with sticks and spit and there's a million of them each sporting one specific purpose! I have to go through this shit multiple times since I'm an intern and I didn't have access to my account through the course of the semester. Get your fucking shit together!1
-
Does someone know a site where i can get professional level help/guides/tutorials with system architecture questions? Like best practices for implementing common features? (Something like stackoverflow but where u actually get an answer instead of insults)
Googling for tutorials gives very basic/demo level results that might not be great for scale/security in prod env6 -
I got so many concerns/questions about the EU chat control and the future. Sorry for my long rant lol:
1) What about projects that are on life support and no active development?
2) What about chat application in video games or the chat service on the website of a local shop
3) What about false flags? Like that parent who got into legal trouble for sharing a picture of his kid with a doctor to get a medical opinion on some skin condition. (might misremember the details)
4) What about false flags like instagram banning accounts and forwarding it to the police department and over-exhausting the resources of the police (accidental 'DDOS' of their personel)
5) What if the content shared in country A is legally OK but not in country B. What if you then travel there? Or if your participant is from that country B.
6) What about content that is taboo but should be OK to discussed? Like puberty or hormonal discussions online? Some subreddits like "stopsmoking" is now also regional banned by Reddit in the UK to avoid any unneeded risks. That is bad. YouTube had some problem where adult content existed on their platform but labeled as educational.
7) What if you encrypt messages before sending it. Will you be banned just in case? What if you need support with an app and you send an encrypted application crash log that came from your computer, will you now be banned just in case?
8) What if you like privacy and have those apps for innocent purposes. Is having those apps now illegal
9) What if criminals use apps from Asia or Africa or somewhere where this law is not present/enforced. Or what if they create a simple app with this encryption. It is not difficult to make one.
10) Before 2001, airport security was very lax but then 9/11 happened and the security increased. It never went back to the state before. Since they have or will have this check, what will them stop it from expanding it after the next disaster of an unrelated accident (like terrorist attack).
11) What if those services miss a case? Will the company that allows this to be send now have legal trouble?
12) What if users are using metaphors or practice self-censorship to avoid flagged words? We see it with monetization in social media (like murder or killing is replaced with "unaliving")
13) It will be just an other problem to start a new company with limited budget. So start-ups will just have a bit harder time to break into the market.
14) this might just push users away from mainstream options
15) it's just an other attack vector for hackers to use
16) Do we want to have private companies be able to scan our messages because they are contracted by the government? They can have their own bias to satisfy their shareholders. What if they are invested by the Big Oil so critic towards the Big Oil is altered? How certain can you be this won't happen now or in the future. Reddit Admin did that before so who knows at this point.
17) Anonymity will disappear.
18) Different companies verify users and store this data so this seems like a major cyberrisk and identity theft waiting to happen
19) fragmentation of users. it is now annoying that some family or friends don't use whatsapp but use telegram and the other way around. You might need +5 chat application to keep contact and lose social relationships.
20) Is AI detected messages even legal proof in court?
21) What if you talk about video games and flag the AI system this way? Or use abbreviation from a niche community that also overlaps with flagged words (like checkpoint being abbreviated as CP) or just the language with poor support or use a 'dialect' in your chat that trips up the software.
22) What if your phone is stolen and they send those messages in your name or this is done remotely.
23) What if you are sharing old family pictures and there is 1 and only 1 odd picture that just barely trips up the system.
24) Games like 'Beyond human' also has gameplay that hurts a fictional child which fits the storyline and acts as shock value. Will this be banned
25) The newer population will see this as normal so what will they find acceptable if they can now vote7 -
I had the opportunity to ask some basic security questions of a government system that is rolling out (got invited to a meeting).
So now I am absolutely terrified about any technology that is being rolled out by this particular government agency. Their security model literally ends at "we use HTTPS".
Seriously, how the fuck are these systems not audited before they reach public use? Is this normal??4 -
I work with statistics/data analysis and web development. I study these subjects for almost a decade and now I have 4 years of practical experience.
This information is on my LinkedIn profile and from time to time tech recruiters contact me wanting to have an interview. I always accept because I find it a great way to practice interviews and talking in English, as it isn't my native language.
A remark that I always make to my colleagues wanting to start doing data analysis related work is that it may seem similar to development, but it's not. When you develop, your code work or not. It may be ugly, it may be full of security problems, but you almost always have a clear indication if things are functioning. It's possible to more or less correlate experience using a programming language with knowing how to develop.
Data science is different. You have to know what you are doing because the code will run even if you are doing something totally wrong. You have to know how to interpret the results and judge if they make sense. For this the mathematics and theory behind is as important as the programming language you use.
Ok, so I go to my first interview for a data science position. Then I discover that I will be interview by... a psychologist. A particularly old one. Yeah. Great start.
She proceeds to go through the most boring checklist of questions I ever saw. The first one? "Do you know Python?". At this point I'm questioning myself why I agreed to be interviewed. A few minutes later, a super cringy one: "Can you tell me an example of your amazing analytics skills?". I then proceed to explain what I wrote in the last two paragraphs to her. At this point is clear that she has no idea of what data science is and the company probably googled what they should expect from a candidate.
20 minutes later and the interview is over. A few days later I receive an email saying that I was not selected to continue with the recruitment process because I don't have enough experience.
In summary: an old psychologist with no idea on how data science works says I don't have experience on the subject based on a checklist that they probably google. The interview lasted less than 30 minutes.
Two weeks later another company interviews me, I gave basically the same answers and they absolutely liked what they heard. Since that day I stopped trying to understand what is expected from you on interviews.2 -
>>Server sind für mich "Neuland".<<
I want to switch to a new server with my website. I have a bunch of questions and hope you beautiful people will help me out.
1. I've decided to switch from shared hosting to an virtual server. Therefore I am going to rent the cheapest VS from hetzner.de. is this a good choice?
2. What do I have to care about and what stuff there is to be done in the beginning?
3. The reasons I want to switch are more root accessibility and I want to switch to https. What about that? Is let's encrypt enough?
4. How do I move the server from a to b?
5. What OS should I choose?
6. What about security?
7. Any further advice from experienced people is welcome!
Sry for those noob questions, but I've never been in touch with server work...23 -
Challenge questions are so goddamn stupid.
Apparently I have an account with a certain online organization though I don't remember setting it up.
So naturally I had no idea of my username or password, so they asked me challenge questions.
It asked me the city of my birth, which is a place with a weird spelling. Because of that weird spelling, I never remember if I'm spelling it right (I was only there as a newborn infant) And I'm also supposed to remember if I capitalized it or not.
I hate challenge questions. And anyone doing any remotely simple research on me shouldn't have trouble learning what city I was born in so it seems to me it's a security vulnerability, nothing more.
And maybe I'm giving things away by saying it asks me that question, but it's a common security question any hacker would anticipate anyways.2 -
TL:DR linux newbie, looking for advice/links (skip to bottom for questions)
!rant
After i had been looking for a job for quite some time, a couple of months ago i got hired by "smaller" company doing web stuff. So far it have been a great place, good colleagues, and overall just having a great time!.
They seem to value me alot, so that's great!.
Anyway, yesterday i got called into a meeting - and got told they wanted me to start learning "Server stuff (linux)". That got me quite excited, because it always was something i wanted to learn - but never really got around to doing.
But i never touched a linux installation before, so i'm really on ground zero - but im not afraid, i'm a quick learner and quite efficient at googling :)
I figured i would ask here, since other people here always seems to be happy to help other people out.
So far i have manage to setup a server, install various stuff (php, mysql and so on) and done setup a couple of domains/subdomains on my server. Also got a vestacpinstallation working - so overall im quite happy so far.
I figured maybe somebody had some good links/advice for a linux newbie :).
* Performance/Security, will obviously be a big focus - anything i should look at? - any must look at?
* Monitoring tools, how do i monitor various websites running on my server? Here i'm thinking bandwitch, cpu/ram usage and so on pr site basis.
* Any other stuff i should be looking at?
Little about what the server will/should be running :)
* Centos
* vestacp
* WordPress installations only (e-commerce mainly)
* PHP 7 / MySQL / phpmyadmin5 -
So I went for a "special" interview to a company whose slogan is "experience certainty" (fresher, was hoping to get a role in cyber security/Linux sysadmin). Got shown what the "real" hiring process of an indian consultancy company is...
We were called because we cleared a rank of the coding competition which the company holds on a yearly basis, so its understood that we know how to code.
3 rounds; technical, managerial and HR...
Technical is where I knew that I was signing up for complete bullshit. The interviewer asks me to write and algo to generate a "number pyramid". Finished it in 7 minutes, 6-ish lines of (pseudo) code (which resembled python). As I explained the logic to the guy, he kept giving me this bewildered look, so I asked him what happened. He asks me about the simplest part of the logic, and proceeds to ask even dumber questions...
Ultimately I managed to get through his thick skull and answer some other nontechnical questions. He then asks if I have anything to ask him...
I ask him about what he does.
Him - " I am currently working on a project wherein the client is a big American bank as the technical lead "
Me (interest is cybersec) - "oh, then you must be knowing about the data protection and other security mechanisms (encryption, SSL, etc.)"
Him (bewildered look on face) - "no, I mostly handle the connectivity between the portal and data and the interface."
Me (disappointed) - "so, mostly DB, stuff?"
Him (smug and proud) - "yeup"
Gave him a link to my Github repo. Left the cabin. Proceeded to managerial interview (the stereotypical PM asshats)
Never did I think I'd be happy to not get a job offer...1 -
I’d been working event based and freelance jobs in the security and entertainment fields for years, with odd stints as a bartender sprinkled in. My pay was mostly decent, but I had no job security, and I was more on the road than at home. A few years before this job search experience I had already realised I can’t continue on this path for ever, especially if I ever want a serious relationship (e.g. 16 weeks straight touring Europe with on avg. 16h work days pretty much every day isn’t ideal in that regard, and also really though on both body and mind). So I decided to study. As I applied in autumn, not every line of study accepted students. The closest to my interest I found was BBA in Business IT.
Fast forward 1,5 years. After moving away from my previous base due to then-gfs studies, I had also been able to accept less work. Well, there were really two reasons: I didn’t want to go on weeks long big tours anymore, and I’d had to price up on my freelance job due to reasons. I still managed to keep our household going, but not knowing when the next paycheck would be available was becoming a little too stressful. I wanted job security. So a few weeks after my wedding I scoured the internetz for positions I could apply to, and applied to a dozen or so places. They were a variety of positions I had a vague understanding of from what I’d learned at UAS: from sales to data analytics to dev… I was aware pretty much all of the applications were a long shot by best, so I expected to be ghosted…
Two of the organizations I applied to wanted to go forward with me. Both dev jobs. I can’t even remember the specifics of the other one anymore, but I do remember the interview: I got in to their office (which was ridiculously open), and got marched into a tiny conference room. The interviewer was passive-aggressive and really bombarded me with questions, not really leaving a socially awkward introvert with any time to answer. I started to get really anxious and twitchy, sweating like a pig. Just wanted out. But nooo, they wanted me to do a coding test live. So they sat me on a computer with Eclipse open, gave me an assignment and told me not to use the internet. What’s even worse is that I could literally feel the interviewer breathing down my neck when I tried to do the test. Well, didn’t happen cause I was under so much pressure that I couldn’t think at all… yeah, that was horrible.
Anyhow, the other position I really applied to because it was in my hometown and I recognised the company name from legendary commercials from the 90s - everyone in this country who watched TV in mid-to-late 90s remembers those. Anyway, to my surprise, my present day manager contacted me and wanted me to do a coding test. At the time he asked I was having a bout of fevers after fevers, not really able to get healthy. I told him that I’d do it as soon as I’m healthy. A month went by, maybe more. He asked again. Again I replied that as soon as I get healthy, but promised to do it next week the latest. I didn’t deliver on that, but the next week after that, even if I was the most feverish I had been, I did the tests. I could only finish half of them, cause I couldn’t look at a screen for long at a time and had to visit the loo every 10min or so, but apparently that was enough. Next week I was already going to the interview… oh I also googled what is PHP on the way there, since it was mentioned as a requirement and I had no idea what it was. Imagine that…
The interview itself couldn’t have been more different from the other one. We were sitting in a nice conference room with my manager and the product’s lead dev, drinking coffee, our feet on the table and talking smack. Oh, and we did play a game of NHL<insertNumber> on PS4 during the interview… it was relaxed. Of course the more serious chat was there, too, but I can only really remember how relaxed it was. When I left the interview, I had been promised the position and that I would be sent the contract to be signed as soon as the CEO had reviewed and approved it. Next day, I had signed it and some time later I started at my current job (I gave a date when I was available to start, since there was a tour still agreed upon between the interview and the start).
Oh, and the job’s pretty much like the interview. Relaxed. It’s a good place to be in, even though the pay could be better (I regularly get offers for junior positions with more pay, and mid level positions with double the pay). I do value a pleasant working environment and the absence of stress more than big munny, what can I say?1 -
Sooo... The ways my coworker fucks me:
Last week I have been working on setting up aWireGuard VPN server... Been trying for 4 FUCKING DAYS, the easiest VPN that has ever existed, 2 commands and that's it, I wasn't able to reach it, I checked every forum, tested every possible solution without success, checking ubuntu firewall but it was inactive... Nothing that should cause this. Why? 2 weeks ago we had a security breach and my coworker added a firewall from the cloud console with basic rules allowing only 3 ports, the port I was communicating with was blocked. He didn't bother to mention that he added an external firewall. And the junior me, not wanting to be a pain in the ass, and since that security breach wasn't my responsibility to fix, I didn't ask too many questions, just read the emails going back and forth and "learning" how to deal with that. Kill me please. Next mont a new guy is joining, we had a "quick meeting" of 30 minutes and he managed to make it 2 hours meeting. So a partner who lacks communication and a partner who talks a lot... Will be fun. And I probably should change my username... Is that even possible? @root?10 -
A while ago I was asking wtf is this new trend with using 0.0.0.0 as a target address for connect()'ing TO.
Turns out, I was asking the right questions. This nonsense will soon be blocked in browsers, as it's a dumb security issue.
ref.: https://oligo.security/blog/...3 -
I happened to purchase a multi currency card as I was preparing to travel abroad. I enquired a few non tech friends of mine about a bunch of providers/lenders and I got a consistent suggestion of how company XXX is safe and user friendly. I took a leap of faith and went with them, since I didn't have any time left to do my own research.
Met the vendor, loaded some money and all is well. At least so far.
I went to their website to create an account for checking my balance and to do a bunch of stuff online.
Nothing unusual so far.
I fill up the new user register page. At the end I get a message which says "SUCCESS" and asks me to check my email.
VOILA!
I have an email with my user id, password and security questions in CLEAR TEXT sitting in my inbox.
Good job XXX.1 -
A thing that I am annoyed that people are getting wrong is security by obscurity.
You have heard of it and being told it is bad. It is so bad that it alone is a counter argument. Let me set you straight:
>>>Security by obscurity is the best security you will ever have<<<
There is an asterisk: It is probably not right for your business. But that is for the end.
Security by obscurity means to hide something away. Most security is based on hiding. You hide your private key or your password or whatever other secret there is. If you had a 2048 long sequence of port knocking, that would be fine, too.. Or it would be fine if it wasn't observable. You could write this down in your documentation and it wouldn't be security by obscurity. It would just be security. Weird, but fine.
The real meat of obscurity is: No one knows that there is someone. The server you port knock looks like a harmless server, but suddenly has an open port to a bad application for an IP, but only if that IP went to 25 other ports first.
In the animal kingdom, there are different survival strategies. One of them is being an apex predator or at least so big and lumbering that no predator wants a piece of you. That's our security. It is upstream security. It is the state.
But what is the rest of the animal kingdom going to do? Well, run away. That works. Not being caught. And those not fast enough? Hide! Just be invisible to the predators. They cannot triple check every leaf and expect to be done with the tree before starving. That's security by obscurity. Or hide in the group. Zebras. Easy to see, hard to track in the group. Look like everyone else.
There is a reason why drug smugglers don't have vaults in the carry-on. Arrive at the customs and just refuse to open the vault. If the vault is good enough. Nope, they lack the upstream security by the state. The state is there enemy, so they need obscurity rather than cryptographic safety.
And so, for a private person, having a port knocking solution or disguising a service as another service is a great idea.
Every cryptography course happily admits that the moment they can catch you physically, cryptography is useless. They also teach you about steganography. But they omit to tell you that obscurity is the second best solution to having a stronger army when you cannot rely on your state as upstream security.
Why did I say, not a good idea for companies?
1. It is self-defeating, since you have to tell it to all employees using it. A shared secret is no secret. And therefore it cannot be documented.
2. It makes working with different servers so much harder if there is a special procedure for all of them to access them. Even if it were documented. (See 1.)
3. You're a company, you are advertising your services. How to hide that you run them?
Do you see how those are not security relevant questions? Those are implementation relevant questions.
Here is an example:
Should you have your admins log into servers as normal users before elevating to root or is that just obscurity? Well, not for security purposes. Because that foothold is so bad, if compromised, it makes little difference. It is for logging purposes, so we have a better server log who logged in. Not only always root. But if our log could differentiate by the used private key, there is no issue with that.
If it is your private stuff, be creative. Hide it. Important skill. And it is not either, or. Encrypt it your backup, then hide it. Port knock, then required an elliptic curve private key to authenticate.
It is a lot of fun, if nothing else. Don't do it with your company. Downsides are too big. Cheaper to hire lawyers if needed.1 -
Hey, can you install the build? How? Go to Settings → Security → Install from Unknown Sources → Dance under the full moon → Sign a pact with Google. This is what a guy with tremendous luck who seems to manage me says. I am the low life who has sacrificed his ambitions six feet under his questions.2
-
"Dear TitanLannister : You are in the final year. A lot of shit is happening around u. its now time to make a career and take tough decisions. What would you do?"
CHOICE 1: COMPETITIVE
>>>>background : "a lot of super companies like wallmart, fb, amazon, ms, google,.. etc simply takes a straight coding test for fresher placement. They ask tough bad ass level questions, but with right guidance, a hell ton of dedicated hours of coding, and making it to the top of various coding tests could make you a potential candidate"
>>>>+ve points :
- "You got the teachers and professionals with great experience to guide you"
- "a dream job come true.you can go there and join teams that interests you"
- "it was your first exposure to computer world. maybe you would like doing it again, after 4 years"
>>>> -ve points:
- "You have always been an average 70 percentile guy. The task requires 2000-3000 hours of coding an year. it will be hard and you always grow bored out of this pretty quickly"
- "Even If you did that , you stand a lesser chance because your maths is shitty.There are millions running in this race with brains faster than your IDE"
- "your college will riot with you because they expect 75% attendance"
- "You are virtually out of college placements, in which , even though shitty companies come and offer even shittier 4LPA packages($6000 per annum), would take a tough logical/aptitude based test for which you won't be able to prepare"
CHOICE 2: PROFESSIONAL WORK
>>>>background: "you always wanted to create something , and therefore you started taking android based courses. you have been doing android for over 2 years and today you know a lot of things in android. you might be good in other professional lines like web dev, data analytics, ml,ai, etc too if you give time to that"
>>>>+ve points :
- "you will love doing this, you always did"
- "With the support of a good team, you will always be able to complete tasks and build new things quickly"
- "Start ups might offer you the placement, they always need students with some good exposure"
>>>>-ve points :
- "Every established company which provides interesting dev work takes their first round as coding, and do not considers your extra curricular dev work. So you are placing your all hopes in 1 good start up with super offerings that would somehow be amazed by your average profile and offer you a position"
- "start ups are well, startups and may not offer a job security as strong as est. companies"
- "You are probably not as awesome dev as you think you are. for 2 years, you have only learned the concepts , and not launched more than 1 shitty app and a few open source work"
CHOICE 3: NON CODING
>>>>background: "companies coming in college placements have 1-2 rounds of aptitude,logical reasoning , analysis based questions and other non tech tests. There are also online tests available like elitmus,AMCAT, etc which, when cleared with good marks help receive placements from decent established companies like TCS, infosys, accenture,etc"
>>>>+ve points :
- "you will eventually get placed from college, or online tests"
- "there will be a job security, as most of these companies bonds the person for 2-3 years"
>>>> -ve points:
- "You really don't like this. These companies are low profile consultant/services based companies which would put you in any area: from testing to sales, and job offers are again $5000-6000 per annum at max"
- "Since it includes college, the other factors like your average cgpa and 1 backlog will play an opposing role"
- "Again, you are a 70 percentile avg guy. who knows you might not able to crack even these simple tests"
Ugh... I am fucking confused. Please be me, and help.The things that i wrote about myself are true, but the things that i assumed about super companies, start ups or low profile companies might not be correct, these points comes from my limited knowledge ,terrified and confused brain, after all.
:(7 -
Whoever came up with the PSD2 can get fucked up their ass by all the cocks in the world combined.
Whoever fucked up the new security implementations so bad can get fucked up their ass by all the spiked, rusty, aids-contaminated metal poles in existance.
And whoever allowed all this to happen and approved it should take all the nukes in the world, shove them all up their worthless holes, and detonate them all at once.
Fuck you.
Die in a fire.
Sincerely,
Someone who's failing harder and harder every day to not lose faith in what little good there is in humanity.9 -
Just dropping some current experience here.
Content security policies are big mess in both chrome and firefox.
Chrome has some 4 years old "bug" where you can't add hash of JS file to 'style-src' policy to permit inline-styles THAT would be set by this script (jQuery actually).
Firefox is beautifully unhelpful, it just pops of error "blocked ..something..", not even saying what it was.
EDIT:
And I am missing a pair of some steel balls to ask about this on SO because there is this much of very similar questions, nonetheless -if I did read them right- every one of them is talking about enabling style attribute, and that's something different.
EDIT2: Chrome currently generates 138 errors "jquery-3.4.0.min.js:2 Refused to apply inline style..." , this ain't hitting production.10 -
Hello wonderful Salesforce peeps. I need to take the Salesforce platform app builder credential
What is the best site to use as a study guide/ exam prep?
Cause honestly I've been using Trailhead and I feel it's just a big advert for Salesforce and it's so condensed it feels like a beginner course and I'm scared the test questions will be more profound than what is displayed in there.
I am a complete noob in Salesforce but I do have CRM experience, DB experience, Security experience, and programming experience.
Help a Newb2 -
So for a few months now, I've been battling w/ failed updates of Windows 11 from version 23H2 to 24H2.
Initially, the update became available around Christmas.
During the update process, the PC BSOD'ed, then failed, && ultimately reverted to its original 23H2.
Couple of months later - same thing.
A few weeks ago, the update was once again offered to me...
...same _fucking_ thing.
...OK. This time around I actually saw something that resembled a meaningful error code.
...googled it.
...stumbled upon this post:
https://learn.microsoft.com/en-us/... .
Well, I wasn't thrilled about it, but decided to try the solution, as that environment mentioned actually mirrored my own.
Yup. That was it.
It's fucking retarded how an OS can't even successfully undergo an update because of a security solution.
I'd say they should work together to solve that idiotic inconvenience.
Oh, yeah - once fully updated I have reinstalled the security solution. It's good, so apart from the OS's update failure thingy, can't really complain.
Thanks for reading.12 -
I’m working on a new app I’m pretty excited about.
I’m taking a slightly novel (maybe 🥲) approach to an offline password manager. I’m not saying that online password managers are unreliable, I’m just saying the idea of giving a corporation all of my passwords gives me goosebumps.
Originally, I was going to make a simple “file encrypted via password” sort of thing just to get the job done. But I’ve decided to put some elbow grease into it, actually.
The elephant in the room is what happens if you forget your password? If you use the password as the encryption key, you’re boned. Nothing you can do except set up a brute-forcer and hope your CPU is stronger than your password was.
Not to mention, if you want to change your password, the entire data file will need to be re-encrypted. Not a bad thing in reality, but definitely kinda annoying.
So actually, I came up with a design that allows you to use security questions in addition to a password.
But as I was trying to come up with “good” security questions, I realized there is virtually no such thing. 99% of security question answers are one or two words long and come from data sets that have relatively small pools of answers. The name of your first crush? That’s easy, just try every common name in your country. Same thing with pet names. Ice cream flavors. Favorite fruits. Childhood cartoons. These all have data sets in the thousands at most. An old XP machine could run through all the permutations over lunch.
So instead I’ve come up with these ideas. In order from least good to most good:
1) [thinking to remove this] You can remove the question from the security question. It’s your responsibility to remember it and it displays only as “Question #1”. Maybe you can write it down or something.
2) there are 5 questions and you need to get 4 of them right. This does increase the possible permutations, but still does little against questions with simple answers. Plus, it could almost be easier to remember your password at this point.
All this made me think “why try to fix a broken system when you can improve a working system”
So instead,
3) I’ve branded my passwords as “passphrases” instead. This is because instead of a single, short, complex word, my program encourages entire sentences. Since the ability to brute force a password decreases exponentially as length increases, and it is easier to remember a phrase rather than a complicated amalgamation or letters number and symbols, a passphrase should be preferred. Sprinkling in the occasional symbol to prevent dictionary attacks will make them totally uncrackable.
In addition? You can have an unlimited number of passphrases. Forgot one? No biggie. Use your backup passphrases, then remind yourself what your original passphrase was after you log in.
All this accomplished on a system that runs entirely locally is, in my opinion, interesting. Probably it has been done before, and almost certainly it has been done better than what I will be able to make, but I’m happy I was able to think up a design I am proud of.8 -
Working with external teams on this new project involving pretty sensitive stuff like bank transactions.
Talking about user flow and how to handle authentication, like 2-factor and stuff.
Newish guy on external team (though experienced) says they have a proposal.
Security Questions.
... like "What was you first car" security questions...
awkward silence in room...8 -
!rant
This is fucking how you do it!
Ticketmaster UK had a "data security incident" where they don't really know if any data was actually leaked/stolen/"accessed by an unknown third-party" — their response:
1. Disable the compromised service across their platforms
2. Send a mail to any customer that may have been affected (I got one in Danish because I had only interacted with them through a Danish subsidiary)
2b. All notified customers have their passwords reset and must go through the "Forgot password" process; the _temporary_ password they sent me was even pretty nicely random looking: ";~e&+oVX1RQOA`BNe4"
3. Do forensics and security reviews to understand how the data was compromised
3b. Take contact to relevant authorities, credit card companies, and banks
4. Establish a dedicated website (https://security.ticketmaster.co.uk/...) to explain the incident and answer customer questions
5. "We are offering impacted customers a free 12 month identity monitoring service with a leading provider. To request this service please visit [this page]"
EDIT: As mentioned and sourced in the first comment, the breach was apparently noticed by a banking provider and reported to Ticketmaster on the 12th of April and later to Mastercard on the 19th of April.
Ticketmaster's internal investigation found no evidence of breach (which makes sense, as it wasn't an internal breach), but when Mastercard issued an alert to banks about it on the 21st of June, Ticketmaster followed up by finding the actual breach and disabling the breached third party service on the 23rd of June.
I still think they did the right thing in the right way...2 -
Questions more then a rant...
I've moved from being a lead on imploring DevOps and Agile practices in a large Telco to now working for a security consultancy... The team I'm with are s*** hot when it comes to SecOps (which is why I changed jobs) and I've been hired to he the automation and working practice expert on the team. Already got some of them learning Ansible which is a great start!
I've got delivery now being pushed to Git and all client work being tracked in Jira and properly documented and collaborated through HipChat and other CI tools on the way....
My question is this... Does anyone have some awesome resources to teach people Git, Jira, Jenkins, etc. quickly without forking or branching out on expensive training? Focus on being a technical but consultative team. Ideally just wanna pull some awesome guides and make. My own commits on them for the team... Please fire a story or epic away!1 -
Tryna search for my new self inspired sexiest domain name if available but the fucking page keeps bringing up that fucking recaptcha asking me for some fucking description about some fucking cars, fucking roads, fucking bridges, dunno if that was my fucking business!
I want you to stop asking me shitty questions cause i'm a fucking robot. Hence i wrote a script that would change the typo from "i'm not a robot" to "i'm a f*cking robot" any time i visit any fucking page requesting for my fucking identity!
Fuck Google!, Fuck Recaptcha!, Fuck Hostgator! Fuck Security! Fuck them all!!!
2 -
Microsoft ends support for Windows 7
Support for Windows 7 ended this week which means that security or software updates will no longer be provided by Microsoft.
Windows 7 will continue to run however it will be more vulnerable to viruses and malware. The best way to remain secure is to use the latest operating system available.
Microsoft have a dedicated webpage for user questions, next steps and detailed advice. 👇
https://microsoft.com/en-gb/...1 -
Yeah, so when you create an account just about anywhere nowadays, you need to choose a strong password. Fair enough. But then, some sites/services/systems require a second password, sort of a password hint as an extra security for retrieving your first password in case you forget it. Well OK...That hint question just becomes very *in*secure when you must choose from some extremely stupid presets like "In which town were you born?" or "What was your mother's maiden name?", all of which are trivia that for most people can be easily googled, or looked up on facebook ffs. And these "in which town did this or that happen?" questions? As there is only one town in my country it's not a long shot that I was born in Mariehamn, met my partner in Mariehamn and had my first job in Mariehamn. Security questions for imbecils.4
-
Why do most people think that a person can only be great at one thing.
I've just started working as a developer and when I tell people I am also learning cyber security they are like what's the point of it. And how I should focus on one thing and blah blah.
Man, nobody questions Elon Musk when he is learning new things everyday. But then why can't we do the same and man we don’t need to be judged. A little support would be so much better.6 -
// Rant 1
---
Im literally laughing and crying rn
I tried to deploy a backend on aws Fargate for the first time. Never used Fargate until now
After several days of brainwreck of trial and error
After Fucking around to find out
After Multiple failures to deploy the backend app on AWS Fargate
After Multiple times of deleting the whole infrastructure and redoing everything again
After trying to create the infrastructure through terraform, where 60% of it has worked but the remaining parts have failed
After then scraping off terraform and doing everything manually via AWS ui dashboard because im that much desperate now and just want to see my fucking backend work on aws and i dont care how it will be done anymore
I have finally deployed the backend, successfully
I am yet unsure of what the fuck is going on. I followed an article. Basically i deployed the backend using:
- RDS
- ECS
- ECR
- VPC
- ALB
You may wonder am i fucking retarded to fail this hard for just deploying a backend to aws?
No. Its much deeper than you think. I deployed it on a real world production ready app way.
- VPC with 2 public and 2 private subnets. Private subnets used only for RDS. Public for ALB.
- Everything is very well done and secure. 3 security groups: 1 for ALB (port 80), 1 for Fargate (port 8080, the one the backend is running on), 1 for RDS postgres (port 5432). Each one stacked on top and chained
- custom domain name + SSL certificate so i can have a clean version of the fully working backend such as https://api.shitstain.com
- custom ECS cluster
- custom target groups
- task definitions
Etc.
Right now im unsure how all of this is glued together. I have no idea why this works and why my backend is secure and reachable. Well i do know to some extent but not everything.
To know everything, I'll now ask some dumbass questions:
1. What is ECS used for?
2. What is a task definition and why do i need it?
3. What does Fargate do exactly? As far as i understood its a on-demand use of a backend. Almost like serverless backend? Like i get billed only when the backend is used by someone?
4. What is a target group and why do i need it?
5. Ive read somewhere theres a difference between using Fargate and... ECS (or is it something else)? Whats the difference?
Everything else i understand well enough.
In the meantime I'll now start analyzing researching and understanding deeply what happened here and why this works. I'll also turn all of this in terraform. I'll also build a custom gitlab CI/CD to automate all of this shit and deploy to fargate prod app
// Rant 2
---
Im pissing and shitting a lot today. I piss so much and i only drink coffee. But the bigger problem is i can barely manage to hold my piss. It feels like i need to piss asap or im gonna piss myself. I used to be able to easily hold it for hours now i can barely do it for seconds. While i was sleeping with my gf @retoor i woke up by pissing on myself on her bed right next to her! the heavy warmness of my piss woke me up. It was so embarrassing. But she was hardcore sleeping and didnt notice. I immediately got out of bed to take a shower like a walking dead. I thought i was dreaming. I was half conscious and could barely see only to find out it wasnt a dream and i really did piss on myself in her bed! What the fuck! Whats next, to uncontrollably shit on her bed while sleeping?! Hopefully i didnt get some infection. I feel healthy. But maybe all of this is one giant dream im having and all of u are not real9 -
External Storage recommendation questions.
Im in need of some sort of external storage, either a harddrive or a NAS server, but idk what to get.
Price should be reasonable for the security and storage space it gives, so heres what i figured so far for pros and cons:
NAS Server:
+ Bigger capacity
+ Raid option
+ Easily expandable
+ Always accessible via the network (local)
- Difficult to transport (not gonna do that, but still)
- Expensive
- Physically larger
- Consumes power 24/7 (i dont pay for power currently)
Harddrive:
+ Easy to pack away and transport
+ Cheaper
- If drive fails, youre fucked
- If you want larger capacity, you end up with two external backups
What do you guys do? Im not sure what i should do :i
Any advice is appreciated.
It will be used for external backup, as mentioned. For my server and my own pc.12 -
Hey ranters, I want to setup a centralised auth backend that assigns multiple logins/API keys to a single user account which is managed through a Frontend application.
Background is we use multiple services each with their own login system and not all support a unified login/auth method for their API.
My approach is to setup a simple API/Auth backend that stores the users credentials plus multiple API-Keys of other services or their logins. When auth is successful the Frontend app may receive the associated credentials for the other backends to call their respective API. So the user can login once but the Frontend may access all backend services without the user noticing that their are other auths.
This should be a really general problem today. I'm really just diving into the topic of auth and Frontend, so I hope to get some guidence/overview from you. My questions are:
- Is my approach totally stupid?
- Are there good frameworks you'd recommend for such a setup?
- Is there a best practice which I've overseen so far?
- Resources you think are a must-read?
- Any other recommendations regarding security here?
So, what do you ranters think? -
Late one evening, as the glow of my computer screen illuminated my concerned face, I realized the worst had happened. My digital wallet, which once held a substantial amount of cryptocurrency, was now empty. I had fallen for a scam that promised high returns on what seemed like a legitimate investment platform. Panic set in as I watched my years of savings vanish into the ether. Feeling defeated, I began to scour the internet for solutions, desperate to reclaim what was rightfully mine. That's when I stumbled upon mentions of Alpha Spy Nest on various forums, including discussions on Fanatec and JoomlaWorks communities. Their story of success and professionalism gave me a sliver of hope in what seemed like a hopeless situation. I reached out to Alpha Spy Nest the very next day. From our first interaction, their team exuded a professionalism and empathy I hadn't anticipated. They listened intently as I recounted my ordeal, asking precise questions about the transactions, the platform where I was scammed, and any communication I had with the scammers. Their approach was meticulously detailed; they explained they would trace the blockchain transactions, looking for any patterns or anomalies that could lead back to my stolen assets.The process was not instantaneous; recovery efforts in the digital realm demand time and patience. However, Alpha Spy Nest kept me updated regularly, which was a comforting anchor amidst my distress. Their experts employed advanced blockchain analytics, tracing my funds through various addresses across different exchanges where the scammers had attempted to launder the money. Alpha Spy Nest had managed to locate a significant portion of my funds. They had coordinated with legal teams and the relevant exchanges to initiate a recovery process. It wasn't everything, but I was able to recover 85% of my initial investment, far more than I had dared to hope for.What truly stood out wasn't just the recovery of my funds but the education Alpha Spy Nest provided. They taught me about enhancing wallet security, the importance of due diligence in investments, and recognizing the red flags of platforms that seem too good to be true. This experience transformed me from a naive investor to a more informed and vigilant participant in the cryptocurrency market. Now, whenever I think back to that dark night of despair, I remember it as the beginning of a journey towards resilience and cybersecurity. Thanks to Alpha Spy Nest, what could have been a devastating financial blow turned into a valuable lesson, securing not just my digital wealth but my trust in the digital world. You can also reach out to them: WhatsApp: +14159714490
1 -
I had always been cautious about where I put my money, but the allure of high returns in the crypto world was something I couldn't ignore. That's how I found myself investing $93,000 into what I thought was a legitimate Bitcoin investment platform. The initial returns were impressive, and I was hooked, seeing my investment grow day by day on the platform's dashboard. But when I tried to withdraw my earnings, the site suddenly became unresponsive, emails went unanswered, and my funds seemed to vanish into thin air. Desperation set in as I realized I'd fallen victim to a scam. I spent sleepless nights researching recovery options, my trust in digital finance shattered. That's when I stumbled upon a forum where others shared similar stories, and one name kept coming up: Alpha Spy Nest. Skeptical but clinging to hope, I reached out.
From our first interaction, the team at Alpha Spy Nest displayed a level of professionalism and empathy I hadn't expected. They listened to my story, asking detailed questions about how I'd interacted with the scam site, transaction details, and any communication I'd had. Their approach was meticulous; they explained how they would trace the blockchain transactions, looking for patterns and anomalies that could lead back to where my crypto was held. The process wasn't quick, but the regular updates from Alpha Spy Nest kept me in the loop. They used advanced blockchain analytics to trace my $93,000 through various addresses, which had been cleverly disguised by the scammers. Weeks passed, and then one day, I received a call - they had managed to locate a significant portion of my funds.
Alpha Spy Nest had traced the transactions to a few exchanges where the scammers had attempted to cash out or move the funds. With their expertise in dealing with such platforms, they coordinated with legal teams and the exchanges themselves to initiate a recovery process. It wasn't all of it, but I was able to recover 85% of my initial investment, which was far more than I had dared to hope for.The relief was overwhelming, but what stood out was the education they provided. Alpha Spy Nest didn't just help recover my funds; they equipped me with knowledge on how to secure my digital assets better. They recommended stronger wallet security measures, the importance of due diligence in investments, and how to spot red flags with platforms too good to be true.In the end, what could have been a devastating financial blow turned into a lesson in resilience and cybersecurity. Thanks to Alpha Spy Nest. Contact below.
Whatsapp: +1 (415) 971‑4490
7 -
Professional Crypto Recovery services with a High Success rate( Digital Hack Recovery )
In recent years, as technology has evolved, so has the world of digital assets, particularly cryptocurrencies. These digital currencies, while offering convenience and security, also come with risks, one of the most significant being theft. Whether through hacking, scams, or simple human error, losing access to crypto assets can be devastating. The process of recovering stolen or lost digital funds, however, is far from straightforward and often seems impossible. Despite the challenges, recovery is not entirely out of reach, especially when you have the right professionals on your side.In my own experience, I was unfortunately a victim of crypto theft. After months of sleepless nights and endless frustration, I realized I needed expert help to try and recover my funds. This is when I decided to reach out to Digital Hack Recovery, a service that specializes in tracking and recovering lost or stolen digital assets. They came highly recommended and had a proven track record in the industry, which gave me hope that my situation might not be hopeless after all.The recovery process began when Digital Hack Recovery used advanced blockchain forensics to track the stolen funds. Thanks to their expertise, they were able to trace the transaction paths and identify the movement of my crypto assets through the blockchain.This sophisticated process requires a deep understanding of the technology behind digital currencies and the ability to navigate the complexities of blockchain transactions.Within just a couple of weeks, Digital Hack Recovery successfully managed to recover over $245,000 of my stolen funds. I was astounded by the speed and efficiency of their work. Throughout the entire process, their communication was exemplary. I was kept updated regularly on the status of the recovery, and they were always available to answer any questions I had. It was clear that they valued transparency and customer service, making what could have been an incredibly stressful experience much easier to navigate.The fees for their services were reasonable.Digital Hack Recovery proved themselves to be a trustworthy and honest agency—qualities that are critical when dealing with sensitive matters like stolen crypto assets.Recovering lost or stolen digital funds is a daunting task, but it is possible with the right help. My experience with Digital Hack Recovery was nothing short of excellent, and I would highly recommend their services to anyone facing similar challenges. Their expertise and dedication to their clients are truly unmatched. Talk to Digital Hack Recovery via their contact below⁚
WhatsApp ⁚+1(915)2151930
Website⁚ https : // digital hack recovery . com
Email address⁚ digital hack recovery @ techie . com1 -
STEPS TO TAKE IF YOU HAVE BEEN SCAMMED : CONSULT RAPID DIGITAL RECOVERY
WhatsApp: +1 4 14 80 71 4 85
Email: rapid digital recovery (@)execs. com
The winter wind howled outside, rattling my windows as I sat frozen in front of my computer, staring in disbelief. My heart sank as I refreshed the screen, only to be met with a chilling zero balance where my $50,000 Bitcoin investment had once thrived. A cold sweat broke out on my forehead as panic set in. Surely, this had to be a glitch, right? But as I delved deeper, the horrifying reality emerged I had been hacked. For three agonizing nights, I plunged into a dark abyss of online forums, desperately seeking answers. Most options felt like dead ends, either filled with vague promises or outright scams. Just when I was about to lose hope, I stumbled upon RAPID DIGITAL RECOVERY. Their presentation and detailed case studies stood out amidst a sea of questionable "crypto recovery experts" who seemed to offer nothing but empty assurances. What caught my attention was their straightforward approach. Unlike others who dazzled with grandiose claims, their team asked pointed questions about my security setup and the timeline of the theft. Michael, their lead investigator, explained their forensic process in layman’s terms, avoiding the technical jargon that often obscures understanding. This honest communication immediately fostered a sense of trust, which was crucial during such a distressing time. The investigation unfolded like a gripping cybercrime thriller. Their team meticulously traced my stolen funds through a complex web of wallet addresses across various blockchains. They uncovered that the hacker had employed a sophisticated service to launder the coins, but RAPID DIGITAL RECOVERY’s proprietary tracking methods cut through the obfuscation like a hot knife through butter. It was astonishing to witness their expertise in action, as they navigated the intricate landscape of cryptocurrency transactions. After 20 excruciating days, I received the email that would change everything: "We've successfully frozen the assets at an exchange in Estonia." The relief washed over me like a tidal wave, and I sank to my knees in gratitude. Within 72 hours, my Bitcoin was back in my possession, with only a reasonable fee deducted for their services. To anyone facing the same despair I once felt: there is hope. RAPID DIGITAL RECOVERY are not just technicians; they are digital detectives who blend technology with relentless investigative spirit. They restored not only my funds but also my faith in the cryptocurrency ecosystem, proving that even in the darkest moments, there are heroes ready to help.2 -
BEST HACKER TO RECOVER LOST OR SCAMMED BTC AND USDT= VISIT SALVAGE ASSET RECOVERY
The winter wind howled outside, rattling my windows as I sat frozen in front of my computer, staring in disbelief. My heart sank as I refreshed the screen, only to be met with a chilling zero balance where my $50,000 Bitcoin investment had once thrived. A cold sweat broke out on my forehead as panic set in. Surely, this had to be a glitch, right? But as I delved deeper, the horrifying reality emerged that I had been hacked. For three agonizing nights, I plunged into a dark abyss of online forums, desperately seeking answers. Most options felt like dead ends, either filled with vague promises or outright scams. Just when I was about to lose hope, I stumbled upon Salvage Asset Recovery. Their presentation and detailed case studies stood out amidst a sea of questionable "crypto recovery experts" who seemed to offer nothing but empty assurances. What caught my attention was their straightforward approach. Unlike others who dazzled with grandiose claims, their team asked pointed questions about my security setup and the timeline of the theft. Michael, their lead investigator, explained their forensic process in layman’s terms, avoiding the technical jargon that often obscures understanding. This honest communication immediately fostered a sense of trust, which was crucial during such a distressing time. The investigation unfolded like a gripping cybercrime thriller. Their team meticulously traced my stolen funds through a complex web of wallet addresses across various blockchains. They uncovered that the hacker had employed a sophisticated service to launder the coins, but Salvage Asset Recovery’s proprietary tracking methods cut through the obfuscation like a hot knife through butter. It was astonishing to witness their expertise in action, as they navigated the intricate landscape of cryptocurrency transactions. After 20 excruciating days, I received the email that would change everything: "We've successfully frozen the assets at an exchange in Estonia." The relief washed over me like a tidal wave, and I sank to my knees in gratitude. Within 72 hours, my Bitcoin was back in my possession, with only a reasonable fee deducted for their services. To anyone facing the same despair I once felt: there is hope. Salvage Asset Recovery are not just technicians; they are digital detectives who blend technology with relentless investigative spirit. They restored not only my funds but also my faith in the cryptocurrency ecosystem, proving that even in the darkest moments, there are heroes ready to help. their contact info
WHATSAPP+ 1 8 4 7 6 5 4 7 0 9 6
TELEGRAM @Salvageasset2 -
HIRE A GENUINE ETH & BTC RETRIEVING SERVICE- VISIT SALVAGE ASSET RECOVERY
CONTACT INFO--WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
In recent years, as technology has evolved, so has the world of digital assets, particularly cryptocurrencies. These digital currencies, while offering convenience and security, also come with risks, one of the most significant being theft. Whether through hacking, scams, or simple human error, losing access to crypto assets can be devastating. The process of recovering stolen or lost digital funds, however, is far from straightforward and often seems impossible. Despite the challenges, recovery is not entirely out of reach, especially when you have the right professionals on your side. In my own experience, I was unfortunately a victim of crypto theft. After months of sleepless nights and endless frustration, I realized I needed expert help to try and recover my funds. This is when I decided to reach out to Salvage Asset Recovery, a service that specializes in tracking and recovering lost or stolen digital assets. They came highly recommended and had a proven track record in the industry, which gave me hope that my situation might not be hopeless after all. The recovery process began when Salvage Asset Recovery used advanced blockchain forensics to track the stolen funds. Thanks to their expertise, they were able to trace the transaction paths and identify the movement of my crypto assets through the blockchain. This sophisticated process requires a deep understanding of the technology behind digital currencies and the ability to navigate the complexities of blockchain transactions. Within just a couple of weeks, Salvage Asset Recovery successfully managed to recover over $245,000 of my stolen funds. I was astounded by the speed and efficiency of their work. Throughout the entire process, their communication was exemplary. I was kept updated regularly on the status of the recovery, and they were always available to answer any questions I had. It was clear that they valued transparency and customer service, making what could have been an incredibly stressful experience much easier to navigate. The fees for their services were reasonable. Salvage Asset Recovery proved themselves to be a trustworthy and honest agency—qualities that are critical when dealing with sensitive matters like stolen crypto assets. Recovering lost or stolen digital funds is a daunting task, but it is possible with the right help. My experience with Salvage Asset Recovery was nothing short of excellent, and I would highly recommend their services to anyone facing similar challenges. Their expertise and dedication to their clients are truly unmatched.
1 -
**HOW TO RECOVER LOST CRYPTO FUNDS FROM SCAMMERS → CONTACT HACKATHON TECH SOLUTIONS**
Being a chef at The Ritz-Carlton, I’m accustomed to working in a high-pressure environment where precision, trust, and expertise are essential. My job requires careful attention to detail, from crafting exquisite dishes to managing a team in a bustling kitchen. But nothing could have prepared me for the shock and devastation I felt when I was scammed out of $300,000. It wasn’t just the financial loss it was the emotional toll. I felt like my entire world had crumbled. For months, I was consumed with confusion, anger, and vulnerability. Every day seemed like a battle, with doubts about my judgment haunting me and the fear that I’d never recover from such a significant loss.The situation seemed hopeless until one day, a fellow chef at The Ritz-Carlton noticed my distress. He had also fallen victim to a scam involving cryptocurrencies and lost a considerable amount of money. However, unlike me, he had managed to recover his funds through a company called HACKATHON TECH SOLUTIONS. After hearing his story and seeing the results for himself, he strongly recommended that I reach out to them.Though I was still skeptical, my colleague’s personal experience gave me a flicker of hope, and I decided to take the leap. I contacted HACKATHON TECH SOLUTIONS, not knowing what to expect but desperate for any solution. From the moment I made the initial call, I was impressed by their professionalism. The team took the time to listen to my story without judgment and explained the entire recovery process clearly and transparently. They reassured me that they had the expertise to help recover my funds, and for the first time in months, I felt a sense of relief. HACKATHON TECH SOLUTIONS worked tirelessly on my behalf. They kept me updated throughout the process, answering all my questions and providing me with the support I needed. Their dedication and commitment were evident, and they were able to successfully recover every penny I had lost. The relief I felt when the funds were returned was overwhelming. It was more than just about money it was about regaining my peace of mind and confidence in myself.I am incredibly grateful to my colleague for introducing me to HACKATHON TECH SOLUTIONS. Their expertise and support gave me the chance to recover not only my finances but also my sense of security. Thanks to them, I can move forward, knowing I’ve found a team I can trust. Reach out to HACKATHON TECH SOLUTIONS via below contact details
Email: info (@) hackathon tech solution (.) com
Website: hackathon tech solutions (.) com
W h a t s a p p: +31 6 47999256
Telegram: (@) hackathon tech solutions7 -
BEST CRYPTO RECOVERY EXPERT TO RECOVER SCAMMED CRYPTO-VISIT RAPID DIGITAL RECOVERY
As a college student in California, it’s not uncommon to hear about the latest investment opportunities or tips on how to make money in the cryptocurrency world. However, like many of my peers, I recently learned the hard way how easily scams can target people who are unfamiliar with the risks. It all started when a fellow student posted on social media about a seemingly legitimate investment opportunity involving Bitcoin. The post was persuasive, offering high returns with minimal risk, and naturally, a few of us, myself included, jumped on the chance to invest. Sadly, the investment turned out to be a scam, and I, along with a few others, found ourselves with our Bitcoin stolen. It’s a frustrating and helpless feeling, especially when you realize how much you’ve lost. After some research and frantic searching for solutions, I came across Rapid Digital Recovery a cryptocurrency recovery service that seemed like it might be able to help. The service specializes in recovering stolen digital assets, including Bitcoin, using advanced forensic methods. From what I gathered, their team consists of experts who track fraudulent transactions and trace stolen funds across blockchain networks, which gave me some hope that my investment could be recovered. What stood out to me about Rapid Digital Recovery was their approach to each case. They don’t take a one-size-fits-all approach; instead, they tailor their recovery strategies based on the specific details of the scam. This personalized approach is critical, especially in cases where the stolen cryptocurrency has been moved across multiple wallets or exchanges. Their team also offers guidance on improving security, which is something that, in hindsight, could have saved me from falling for the scam in the first place. While I was initially skeptical about turning to a recovery service, Rapid Digital Recovery’s transparency helped alleviate some of my concerns. They kept me updated throughout the process and were patient in answering all of my questions. However, I quickly realized that, like any service in the crypto space, it’s essential to proceed with caution. Scams are rampant in this industry, and it’s always important to thoroughly vet any service before sharing sensitive information. In the end, while I’m still in the process of recovering my lost Bitcoin, I’ve learned an invaluable lesson about the risks involved in cryptocurrency investments. If you ever find yourself in a similar situation, Rapid Digital Recovery might be worth considering, but remember to do your own research and take steps to ensure you’re working with Rapid Digital recovery.
Resch Out To Them Via:
Whatsapp: +1 4 14 80 71 4 85
Email: rapid digital recovery (@) execs. com
Telegram: h tt ps: // t. me / Rapid digital recovery11 -
DIGITAL HACK RECOVERY PROFESSIONAL RELIABLE BITCOIN RECOVERY SERVICES
Being unable to access your Bitcoin wallet is really frightening. When the money you've worked so hard to get seems so far away, it's a circumstance that can easily drive anyone into a panic. I had the exact same experience. I had been accumulating Bitcoin for months when all of a sudden I was unable to access my wallet. Every path I took appeared to lead to nothing, and I had no idea how to get back in. I tried everything. I spent hours searching for a solution, going through all the standard recovery methods like password resets, re-entering my recovery phrases, and checking every backup I thought I had. Nothing worked. My Bitcoin, the investment I had been so proud of, was out of reach, and I was devastated.
After weeks of fruitless attempts, I was ready to give up. Then, on a last-ditch effort, I came across Digital Hack Recovery. At first, I was skeptical—how could a recovery firm be any different from the other services I had already tried? But after reading positive reviews and seeing their professional website, I decided to take a chance. Little did I know that this decision would change everything. The Digital Hack Recovery team's professionalism and effectiveness were the most notable aspects of the recovery procedure. They kept me informed about their progress at all times, so I was never in the dark. They kept me updated and communicated clearly if there were any difficulties or delays. After interacting with other companies that were either inattentive or evasive, it was a huge relief that I never had to follow up with them to get answers. The actual procedure went very well. While I had expected the recovery to take weeks, Digital Hack Recovery made quick work of it, using specialized software and expertise to access my wallet and restore my Bitcoin. The recovery expert was also incredibly patient, answering all my questions and making sure I understood each phase of the process. I felt like I was in good hands from start to finish. The email from Digital Hack Recovery that confirmed my Bitcoin had been successfully recovered was an absolute game-changer. It felt too good to be true, but when I logged into my wallet and saw my funds back in place, I couldn’t believe it. Every single Bitcoin was there, exactly where it should be. The sense of relief I felt was overwhelming. I had feared I would lose everything, but Digital Hack Recovery had restored my digital assets with professionalism and care. But it didn’t stop there. The team went above and beyond, providing additional security measures to ensure my wallet would remain safe from future issues. They offered valuable advice on how to better protect my Bitcoin and avoid similar problems going forward. It wasn’t just about getting my Bitcoin back—it was about setting me up for success in the future. If you're reading this and you find yourself in the same desperate situation I was in, I highly recommend Digital Hack Recovery. They have the tools, knowledge, and experience to recover your Bitcoin and other digital assets. They don't just talk the talk—they walk the walk. My experience with them was nothing short of life-changing, and I’ll forever be grateful for their help. Thanks to Digital Hack Recovery, my Bitcoin is back, and I couldn’t be more thankful. If you’re in need of professional, reliable recovery services, look no further. They truly delivered when no one else could. Email; digital hack recovery
@ techie . com
WhatsApp +19152151930
Website; https : // digital hack recovery . com
Thank you for your time to read because it will save many. -
HIRE A LICENSED BTC / CRYPTOCURRENCY RECOVERY HACKER: CONTACT DIGITAL TECH GUARD RECOVERY
It was supposed to be a regular weekend gaming marathon. I was right in the middle of a high-stakes multiplayer battle, really concentrating on how to win the game for my team. Then, there it was-the pop-up: some flashy ad promising a "free upgrade" to enhance my gaming experience. It looked decent enough, and with my urge to get ahead, I clicked on it without a second thought. Big mistake.
What I didn't know was that the download wasn't an upgrade; it was malware. Within minutes, strange things began to happen: my computer slowed down, windows opened and closed on their own, and worst of all, my Bitcoin wallet, which held $85,000, was drained. It hit me like a ton of bricks. I had let my guard down, and it cost me dearly. contact with WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com Telegram: digital tech guard recovery . com
I was panicking, and I couldn't concentrate on anything else. The game that I had been so engrossed in was utterly meaningless. The next few hours were spent blind searching online; I was desperately looking for answers that would help me reverse my mistake. That's when I discovered Digital Tech Guard Recovery. Their name kept popping up on forums and reviews, with each story reassuring me more than the last. I called them, praying they could help me.
Their team was empathetic yet professional right from the very first conversation. They never judged me for falling for such a scam but rather shared with me that they have helped plenty of people in similar situations. The reassurance from them acted like a lifeline, felt in this sea of despair. They walked me through the recovery process step by step, explaining in a manner clear and comforting to understand.
True to their word, Digital Tech Guard Recovery went to work immediately. They kept me informed every step of the way, answering my many questions without once making me feel like I was a nuisance. A few days later, I got the call I'd been hoping for: they had recovered my $85,000.
Relief isn't even the word that could describe how I felt. They didn't just save my wallet but gave me a second chance to protect what's mine. They also provided invaluable advice on how to recognize malicious software and keep my crypto secure.
Now, I'm more in tune and careful with my clicks, especially when gaming on. Thanks to Digital Tech Guard Recovery, I learned that while gaming is fun, nothing's worth risking your financial security. Lesson learned, and funds restored1 -
IS IT POSSIBLE TO RECOVER LOST/STOLEN CRYPTO YES CONSULT FUNDS RECLAIMER COMPANY
My name is Judith, and I’m from Austin, Texas. In early January 2025, I found myself facing one of the darkest chapters of my life. I had fallen victim to a fraudulent cryptocurrency broker and, in a matter of days, lost an astonishing $187,000. The money I had worked tirelessly to save and invest vanished in the blink of an eye, leaving me emotionally and financially devastated. The sense of hopelessness that took over was overwhelming, and I couldn’t see a way out. In the midst of my despair, I stumbled upon FUNDS RECLIAMER COMPANY. At first, I was understandably skeptical. After all, I had already been burned by scammers, and the thought of trusting another service seemed like a risky proposition. However, something about their website and the glowing reviews from others in similar situations made me hesitate long enough to give them a chance. From my very first interaction with FUNDS RECLIAMER COMPANY, I knew I had made the right decision. The team was not only professional and highly knowledgeable, but they were also empathetic and sensitive to the emotional impact of my situation. They took the time to explain everything to me clearly, outlining how they would approach the recovery process and giving me a sense of control over what was happening. I appreciated their transparency and the way they patiently answered all of my questions, no matter how small they seemed. What truly took me by surprise was how quickly they acted. Within just four days, FUNDS RECLIAMER COMPANY had successfully tracked down and recovered the majority of my funds. I couldn’t believe how efficient and skilled they were. It was a level of service I hadn’t expected, and it gave me a renewed sense of hope. The fear and anxiety that had been clouding my every thought began to lift. Thanks to FUNDS RECLIAMER COMPANY, I not only regained my financial assets but also my peace of mind. They showed me that even in the darkest times, there are professionals out there who can make a difference. I can’t stress enough how invaluable their support has been during this challenging period of my life. If you find yourself in a similar situation, I highly recommend FUNDS RECLIAMER COMPANY. Their team specializes in financial and cyber security recovery, and they approach each case with unparalleled dedication and professionalism. They gave me back my hard-earned money and, more importantly, my hope for the future. Don’t hesitate to reach out to them via email they are ready to help, and I’m confident they can guide you through the recovery process with the same care they showed me.
Email: fundsreclaimer(@) c o n s u l t a n t . c o m OR fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s :/ / fundsreclaimercompany . c o m
1 -
Understanding Medicare Part B with Variety Benefits Insurance Services
At Variety Benefits Insurance Services, we know that navigating the complexities of Medicare can be overwhelming, especially when it comes to understanding the different parts of the program. One of the key components of Medicare is Medicare Part B. Whether you are just starting with Medicare or reviewing your coverage, we are here to guide you through the ins and outs of Part B and help you choose the best options for your healthcare needs.
Located in Scottsdale, AZ, our experienced team of insurance professionals is here to provide personalized service and expert advice, ensuring you make informed decisions about your healthcare coverage.
What is Medicare Part B?
Medicare Part B is the part of Medicare that covers outpatient care, certain preventive services, and medically necessary services and supplies needed to diagnose or treat health conditions. While Medicare Part A covers inpatient care (such as hospital stays), Part B helps pay for services that you receive outside the hospital setting, including visits to your doctor, medical tests, and preventive care.
Enrolling in Medicare Part B is essential for comprehensive coverage, but it’s important to understand exactly what it includes and how it works with other Medicare options.
Why Do You Need Medicare Part B?
Here are some reasons why Medicare Part B is an important part of your healthcare coverage:
1. Outpatient Care
Medicare Part B covers outpatient care, including routine doctor visits, specialist consultations, lab tests, and diagnostic screenings. Whether you need a physical exam, a check-up with your specialist, or diagnostic tests like bloodwork, Part B helps cover these essential services.
2. Preventive Services
One of the key benefits of Medicare Part B is that it helps cover preventive services, such as cancer screenings, vaccinations, and wellness visits. Preventive care can help detect health issues early and keep your healthcare costs down. Services like flu shots, diabetes screenings, mammograms, and colonoscopies are covered under Part B with no additional out-of-pocket costs if received from a doctor who accepts Medicare.
3. Durable Medical Equipment (DME)
Medicare Part B also helps cover the cost of certain medical equipment that is necessary for your health, such as:
Wheelchairs
Oxygen equipment
Walkers
Hospital beds These items can be crucial in managing chronic conditions and improving your quality of life, and Part B provides coverage to help offset the cost.
4. Mental Health Services
Medicare Part B also covers services related to mental health, such as individual and group therapy sessions. Mental health is an important aspect of overall well-being, and Part B ensures you have access to the care you need to support your mental health.
What Does Medicare Part B Cover?
Medicare Part B covers a wide range of services, including but not limited to:
Doctor’s visits: Whether for routine check-ups or specialized care, Part B covers physician visits.
Emergency room services: Medicare Part B helps cover the costs of emergency services if you need treatment in an emergency room.
Diagnostic tests and lab services: Includes blood tests, X-rays, MRIs, and other diagnostic services that help detect or treat medical conditions.
Outpatient surgeries: If you need surgery that doesn't require an overnight stay, Part B covers the procedure.
Ambulance services: If you need emergency transportation to the hospital, Part B helps cover the cost.
Preventive care: Services such as flu shots, cancer screenings, and other preventive tests that help catch health issues early.
How Does Medicare Part B Work?
To get Medicare Part B, you must sign up during your Initial Enrollment Period (IEP), which typically occurs when you turn 65. Medicare Part B has a monthly premium, which is automatically deducted from your Social Security benefits.
Why Choose Variety Benefits Insurance Services?
Expert Knowledge: We have extensive knowledge of Medicare and Medicare Part B, and we’re here to answer all your questions.
Tailored Plans: We work with you to find the best Medicare Part B options and Medicare Supplement Plans to fit your unique needs.
Local Service: As a local business in Scottsdale, AZ, we offer personalized, face-to-face consultations and guidance for your Medicare decisions.
Ready to Learn More About Medicare Part B?
If you’re ready to get started or have questions about Medicare Part B, Variety Benefits Insurance Services is here to help. We will make sure you fully understand your options and find the right coverage for your healthcare needs.
Contact Us Today
Call +1 (480) 951-5860 or visit us at 28150 N Alma School Pkwy Ste 103-102, Scottsdale, AZ 85262. Let us help you navigate Medicare Part B and find the best options to meet your healthcare goals.
1 -
Passing the CISSP exam requires a strong understanding of security concepts and diligent preparation. By studying the eight domains, practicing sample questions, and utilizing various study materials, you can increase your chances of success. Good luck with your CISSP certification journey with pass4early1
-
Hi my name is John Edwin and i want to share my story as I write this review. I never thought I'd see the day where I'd recover my stolen cryptocurrency. The experience was nothing short of a nightmare. I had invested a small fortune in Bitcoin, thinking it was the safest way to grow my wealth. But, I was wrong. A phishing scam got the better of me, and before I knew it, my entire wallet was drained. I was devastated. Days turned into weeks, and I had lost all hope. I tried reaching out to the authorities, but they seemed just as clueless as I was. It was as if I was on my own in this dark, uncharted territory. That's when I stumbled upon HACKER ZED NEMESIS a crypto recovery agency that promised to help victims like me. At first, I was skeptical. I had tried so many other "recovery experts" before, only to be left disappointed and poorer. But, something about HACKER ZED NEMESIS resonated with me. Maybe it was their 5-star reviews or the fact that they had a physical address listed on their website (a rarity in the crypto space!). Whatever it was, I decided to take a leap of faith and reach out to them. From the get-go, the team at HACKER ZED NEMESIS was professional, empathetic, and reassuring. They listened to my story, asked the right questions, and got to work immediately. Their approach was meticulous, and I could sense that they had dealt with cases like mine before. Fast forward a few weeks, and I received an update from the team - they had recovered 95% of my stolen crypto! I couldn't believe my eyes. The relief, the joy, the sense of vindication - it was all overwhelming. I had my life back, and I owed it all to HACKER ZED NEMESIS What sets them apart from other recovery agencies is their transparency, expertise, and commitment to delivering results. They're not just in it for the money; they genuinely care about helping people like me who've been wronged by the system. If you're a victim of crypto fraud, don't give up hope. Reach out to HACKER ZED NEMESIS and let them work their magic. Trust me, you won't regret it. I'm living proof that they're the real deal. Thanks again, HACKER ZED NEMESIS for giving me a second chance. You're the true heroes of cyber security if you've had an experience like mine please contact them VIA
-
Sometimes life gives you signs-you just got to be paying attention. One night, deep in an Uber ride, I struck up a conversation with the driver. The topic of Bitcoin came up, and he mentioned that he once lost his wallet containing $50,000.
I thought this would be the end of the story-something like regret, lessons learned, and moving on. But then he said something that stuck with me: "Thankfully, I found Lee Ultimate Hacker. They got everything back." I nodded, really interested but unconcerned. After all, I was so very careful with my wallet security. I thought, That's rough, but it could never happen to me. A week later, it happened to me. I lost the wallet holding $300,000 while overhauling my crypto storage system. In one wrong move, my funds became completely unreachable. I retraced passwords, checked backups, tried everything that normally works, but nothing worked. Panic kicked in. My mind was racing, trying to figure out my next move. And then, I remembered the Uber driver's story.
I didn't waste a moment and contacted Lee Ultimate Hacker. Right upon connecting to their team, I could feel my nerves calm down. They did not right away get to work but also asked questions, analyzed my situation, and explained how the recovery would go. It was next-level professionalism; they didn't just work on how to return my money but also how to make me understand what happened and how I could avoid it in the future. Finally, after what felt like the longest wait of my life, came the message that I had been waiting for: My wallet was recovered successfully.
Relief doesn't even begin to describe my feeling at that moment. That $300,000 wasn't just money; it was years of careful investments and strategic planning. And in an instant, it was all back where it belonged. In retrospect, I owe more than a five-star rating to that Uber driver. His story gave me a lifeline which I didn't know I needed. Lesson learned: Pay attention to those random conversations-you never know when they might save you a fortune.
LEEULTIMATEHACKER @ AOL . COM
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 92483 -
9 Ways to Improve Your Website in 2020
Online customers are very picky these days. Plenty of quality sites and services tend to spoil them. Without leaving their homes, they can carefully probe your company and only then decide whether to deal with you or not. The first thing customers will look at is your website, so everything should be ideal there.
Not everyone succeeds in doing things perfectly well from the first try. For websites, this fact is particularly true. Besides, it is never too late to improve something and make it even better.
In this article, you will find the best recommendations on how to get a great website and win the hearts of online visitors.
Take care of security
It is unacceptable if customers who are looking for information or a product on your site find themselves infected with malware. Take measures to protect your site and visitors from new viruses, data breaches, and spam.
Take care of the SSL certificate. It should be monitored and updated if necessary.
Be sure to install all security updates for your CMS. A lot of sites get hacked through vulnerable plugins. Try to reduce their number and update regularly too.
Ride it quick
Webpage loading speed is what the visitor will notice right from the start. The war for milliseconds just begins. Speeding up a site is not so difficult. The first thing you can do is apply the old proven image compression. If that is not enough, work on caching or simplify your JavaScript and CSS code. Using CDN is another good advice.
Choose a quality hosting provider
In many respects, both the security and the speed of the website depend on your hosting provider. Do not get lost selecting the hosting provider. Other users share their experience with different providers on numerous discussion boards.
Content is king
Content is everything for the site. Content is blood, heart, brain, and soul of the website and it should be useful, interesting and concise. Selling texts are good, but do not chase only the number of clicks. An interesting article or useful instruction will increase customer loyalty, even if such content does not call to action.
Communication
Broadcasting should not be one-way. Make a convenient feedback form where your visitors do not have to fill out a million fields before sending a message. Do not forget about the phone, and what is even better, add online chat with a chatbot and\or live support reps.
Refrain from unpleasant surprises
Please mind, self-starting videos, especially with sound may irritate a lot of visitors and increase the bounce rate. The same is true about popups and sliders.
Next, do not be afraid of white space. Often site owners are literally obsessed with the desire to fill all the free space on the page with menus, banners and other stuff. Experiments with colors and fonts are rarely justified. Successful designs are usually brilliantly simple: white background + black text.
Mobile first
With such a dynamic pace of life, it is important to always keep up with trends, and the future belongs to mobile devices. We have already passed that line and mobile devices generate more traffic than desktop computers. This tendency will only increase, so adapt the layout and mind the mobile first and progressive advancement concepts.
Site navigation
Your visitors should be your priority. Use human-oriented terms and concepts to build navigation instead of search engine oriented phrases.
Do not let your visitors get stuck on your site. Always provide access to other pages, but be sure to mention which particular page will be opened so that the visitor understands exactly where and why he goes.
Technical audit
The site can be compared to a house - you always need to monitor the performance of all systems, and there is always a need to fix or improve something. Therefore, a technical audit of any project should be carried out regularly. It is always better if you are the first to notice the problem, and not your visitors or search engines.
As part of the audit, an analysis is carried out on such items as:
● Checking robots.txt / sitemap.xml files
● Checking duplicates and technical pages
● Checking the use of canonical URLs
● Monitoring 404 error page and redirects
There are many tools that help you monitor your website performance and run regular audits.
Conclusion
I hope these tips will help your site become even better. If you have questions or want to share useful lifehacks, feel free to comment below.
Resources:
https://networkworld.com/article/...
https://webopedia.com/TERM/C/...
https://searchenginewatch.com/2019/...
https://macsecurity.net/view/...
-
Building Fortresses, not Firewalls: Ethical Hacking Meets Software Development
In the digital age, security is no longer an afterthought; it's the bedrock upon which our online world rests. Yet, traditional security measures often resemble fortresses – imposing, but vulnerable to unseen cracks and tunnels. To truly safeguard our systems, we need to think like the enemy, like the nimble figures scaling those walls: ethical hackers.
Enter the exciting realm of DevSecOps, where ethical hacking practices are woven into the very fabric of the software development lifecycle (SDLC). This proactive approach is akin to building castles with security in mind, each brick meticulously laid to withstand even the most cunning siege.
Why Ethical Hacking in SDLC?
Imagine developing a critical piece of software, only to discover a gaping security hole after launch. The damage could be catastrophic, exposing sensitive data and eroding trust. Ethical hacking flips this script. By integrating penetration testing, vulnerability assessments, and threat modeling throughout the SDLC, we proactively hunt for weaknesses before they can be exploited.
Think of it as a friendly sparring match, where the ethical hacker throws their best punches to expose vulnerabilities, allowing the development team to fortify the software's defenses. This constant testing and refining leads to robust, secure systems that can withstand real-world attacks.
Benefits of DevSecOps:
1. Reduced Costs and Risks: Early detection and patching of vulnerabilities are far cheaper than dealing with a full-blown data breach.
2. Improved Software Quality: Security becomes an inherent part of the development process, leading to more reliable and trustworthy software.
3. Enhanced Brand Reputation: Demonstrating a proactive approach to security builds trust with customers and stakeholders.
Putting it into Practice:
Integrating ethical hacking into the SDLC requires a cultural shift. Developers, security professionals, and testers need to work together seamlessly, sharing knowledge and fostering a collaborative environment. Here are some key practices:
1. Threat Modeling: Identify potential threats and attack vectors early in the development process.
2. Static and Dynamic Code Analysis: Use automated tools to detect vulnerabilities in code.
3. Penetration Testing: Simulate real-world attacks to uncover hidden weaknesses.
4. Security Awareness Training: Educate developers and other stakeholders about security best practices.
Tools of the Trade:
A plethora of tools empowers ethical hackers and security professionals in their quest for a more secure digital world. Some popular options include:
1. Kali Linux: A distribution packed with security tools for penetration testing.
2. Burp Suite: A web application security testing platform.
3. Metasploit: A framework for developing and executing exploit code.
4. Wireshark: A network traffic analyzer for identifying suspicious activity.
The Future of Security:
As technology evolves, so too must our security practices. DevSecOps, with its embrace of ethical hacking, is at the forefront of this evolution. By building security into the very fabric of software development, we can create a safer, more resilient digital world for everyone.
Remember, in the ongoing battle against cyber threats, ethical hackers are not the enemy; they are our allies, the architects of digital fortresses that stand strong against the shadows. So, let's embrace DevSecOps, sharpen our ethical hacking skills, and build a future where security is not just an afterthought, but a fundamental principle.
I encourage you to explore the world of DevSecOps and ethical hacking. Whether you're a seasoned developer or just starting your journey, there's always more to learn and contribute. Together, we can build a more secure digital future, one line of code and one vulnerability patch at a time.
Do you have any questions about DevSecOps or ethical hacking? Share your thoughts and experiences in the comments below! -
Lost Bitcoin Recovery Experience After Laptop Theft and No Wallet Backup
I never thought a spilt second would change my entire life, I was sitting in a cafe working on a project the next thing in a blink of an eye I lost my laptop, that had my entire financial investment of $730,000 worth of Bitcoin, I went from being calm to erratic going up and down looking if I could locate it, finally accepted that I had lost it. Everything was gone my important work tool, and the worst part was I hadn’t backed up my wallet, I desperately began searching for solutions so I went on research mode, but I wasn’t sure if there was anyone out here who could recovery stolen cryptocurrency, I held on to the little hope that I had and continued with my search when I came across several testimonials about LEE ULTIMATE HACKER a hacker that was able to track and recover stolen Bitcoin, I contacted LEEULTIMATEHACKER @ AOL . COM
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 9248 and after consultation, they took me through steps on how they’ll recover my lost funds, they asked me critical questions and I explained it to them that I didn’t have a back up and needed help, they reassured me that they will be able to help me recovery my lost funds, LEE ULTIMATE HACKERS team worked with me with such professionalism until the last step, using advanced blockchain tracking and forensic tools to trace my stolen assets, after only a week of work I finally got a call from LEE ULTIMATE HACKER customer service that they had fully recovered my money, on top of it they helped me improve my security through their app providing real time security alerts ,encrypted backups and anti- theft that was new to me, I learnt a lot about digital security i also experienced hopeless situation that could be turned around for the best all thanks to LEE ULTIMATE HACKER reach out to them for all your complex recovery problem.2 -
How to Withdraw on Bhalo88 💰 | A Complete Guide
Withdrawing money securely and efficiently is crucial for any online gaming or betting platform. If you’re looking for an easy way to withdraw your winnings, this guide on how to withdraw on Bhalo88 will walk you through each step. Moreover, we will discuss secure mobile banking in Bangladesh like bKash, Nagad, Upay, and Rocket for fast transactions.
Why Choose Bhalo88 for Withdrawals? 🚀
Bhalo88 offers a user-friendly and secure withdrawal process. Multiple payment options ensure seamless transactions. With instant processing, you can receive your winnings directly to your mobile wallet or bank account. Whether you’re using bKash, Nagad, Rocket, or Upay, Bhalo88 ensures a hassle-free experience.
Step-by-Step Guide: How to Withdraw on Bhalo88 📝
Step 1: Access the Security Center
To begin, log in to your Bhalo88 account and navigate to the Security Center.
Step 2: Click on “E-Wallet Binding”
This step ensures that your mobile banking details are securely linked to your Bhalo88 account.
Step 3: Select Withdrawal Method
Choose the method through which you want to withdraw your funds (bKash, Nagad, Rocket, or Upay).
Provide your full name as per your bank or wallet account.
Enter the mobile number where you wish to receive the money.
Input the number registered with your Bhalo88 account.
Click on Send and enter the OTP received on your number.
Set a new 6-digit transaction PIN for added security.
Step 4: Enter Withdrawal Amount
Specify the amount you want to withdraw.
Input your saved transaction PIN and click on withdraw.
Secure Mobile Banking Options in Bangladesh
When withdrawing on Bhalo88, you can use some of the most trusted and secure mobile banking services in Bangladesh. Let’s take a closer look at these options:
bKash: The Most Popular Mobile Banking
Fast and secure transactions
Available across Bangladesh
Instant withdrawal processing
Nagad: Trusted by Millions
Low transaction fees
High security and encryption
24/7 customer support
Rocket: Powered by Dutch-Bangla Bank
Direct bank integration
Safe and efficient transactions
Supports large withdrawals
Upay: The New and Reliable Choice
Competitive transaction fees
Instant mobile wallet transfers
High withdrawal limits
These services ensure safe and instant transactions, making them perfect choices for withdrawing on Bhalo88.
Tips for a Safe Withdrawal on Bhalo88 🛡️
Always double-check the number and account details before withdrawing.
Use a strong transaction PIN for added security.
Withdraw during banking hours for the fastest processing.
If you face issues, contact Bhalo88 customer support immediately.
Frequently Asked Questions (FAQs) 📊
1. How long does it take to withdraw on Bhalo88?
Most withdrawals are processed instantly. However, bank-related transactions may take up to 24 hours.
2. Is there a minimum withdrawal amount?
Yes, the minimum withdrawal amount depends on the selected payment method. Usually, it’s around 100 BDT.
3. Can I withdraw using a different mobile number?
No, the withdrawal must be made to the registered mobile number linked with your Bhalo88 account.
4. What should I do if my withdrawal fails?
Check your account balance, internet connection, and OTP entry. If the issue persists, contact Bhalo88 support.
Conclusion 🏆
Withdrawing money on Bhalo88 is quick, secure, and hassle-free when you follow the correct steps. By using bKash, Nagad, Rocket, or Upay, you can enjoy a smooth withdrawal experience. Moreover, ensure security measures are followed, and always double-check your details before processing any transaction.
Now that you know how to withdraw on Bhalo88, go ahead and enjoy your winning
1 -
Passing the CompTIA A+ exam requires a combination of effective study strategies and practical preparation. Here are some tips to help you succeed:
Understand the Exam Content:
Familiarize yourself with the exam objectives and format. The latest CompTIA A+ exam codes are 220-1101 for Core 1 and 220-1102 for Core 2. You must pass both to obtain the CompTIA A+ certification1.
Review the topics covered in the exam, including hardware, software, networking, security, and troubleshooting.
Study Materials:
Book: Consider using the “A+ Exam Cram” book by Professor Messer. It provides foundational knowledge that aligns with the exam content. Even if you don’t fully understand a section, keep reading, as concepts often reappear in other chapters.
Videos: Professor Messer offers free YouTube videos that follow the same segments as the exam cram book. These videos provide an alternative perspective on the material.
Practice Quizzes: Quizzes are essential for reinforcing your understanding. Messer’s book includes quizzes, but you can also explore Dumps4free, which offers real-world example questions similar to those on the exam.
Hands-On Practice:
Build a desktop computer or set up a virtual lab to gain practical experience. Hands-on practice reinforces your knowledge and helps you understand how components work together.
Prepare for performance-based questions by practicing tasks related to hardware installation, troubleshooting, and configuration.
Exam Strategies:
Voucher: Always choose a voucher that allows for a retest. Sometimes seeing the actual exam helps you understand what to study further. Having an extra retake reduces stress during the first attempt.
Discipline: Consistency is crucial. Set a study schedule and stick to it. Avoid long breaks, as momentum is essential for effective learning. Set deadlines for yourself, even if you have the retake voucher. -
!rant
Looking for help starting with DevOps.
Does anyone know of a site or forum where you can talk about general coding/scripting patterns rather than just asking specific questions?
Bear with me, this may be a bit longer than most posts here.
I'm a self-taught admin/tech working with one colleague (who's also mostly self taught) at a high school, managing both clients and servers.
We've been doing most things manually bit I'm looking into converting as much work as possible into more of a DevOps setup, with Powershell-scripts for multi step tasks.
I want to do this for a number of reasons. Having a script doing a number of steps would cut down on time spent on individual tasks and minimize the risk that a step is missed or, perhaps even worse, mistyped. Also it's important that I actually learn what I'm doing, why something works and why something fails.
As and example, I have a powershell-script which moves a student from one year to another (basically they have user names with a two-digit prefix based on the year they started and a suffix with two letters from their first names and four from their last names) if they need to repeat a grade.
It basically renames the account in the AD with the correct year-prefix, changes the samAccountName, renames Home and Profile-directories on disk and changes paths on the profile-tab in AD, moves the user into a new OU and security group etc.
It works as intended if the user account to be renamed exists and there's no name conflict with the new name. But I'd like for the script to validate that there's no problem with user names, source and target security groups and OUs etc. and eventually split the script up into smaller clearly defined functions for better readability.
However, I don't want someone to just write the script for me, I'd prefer to be able to discuss script flow and come to my own conclusions and solutions.1 -
Recuva Hacker Solutions — A Trusted Partner in Bitcoin Recovery
In the ever-evolving world of cryptocurrency, losing access to your Bitcoin wallet can be a nightmare. Whether it’s due to forgotten passwords, hardware failures, or misplaced private keys, the inability to access your digital assets can be incredibly stressful. Fortunately, there are specialized services dedicated to helping you recover your lost or inaccessible Bitcoin wallets. Among these, Recuva Hacker Solutions (RHS) has emerged as a trusted leader in the field of crypto asset recovery. Since 2017, Recuva Hacker Solutions has been providing top-tier recovery services, earning a reputation as the go-to solution for individuals and businesses alike.
In this article, we’ll explore the key features that make Recuva Hacker Solutions the best choice for Bitcoin wallet recovery, while also highlighting their commitment to security, usability, and customer support.
Why Choose Recuva Hacker Solutions for Bitcoin Wallet Recovery?
1. Proven Track Record Since 2017
Recuva Hacker Solutions has been a trusted name in the crypto recovery industry since 2017. With years of experience, they have successfully helped countless clients regain access to their lost or inaccessible Bitcoin wallets. Their expertise spans a wide range of recovery scenarios, including forgotten passwords, corrupted hardware wallets, and lost private keys.
2. Advanced Recovery Tools and Techniques
Recuva Hacker Solutions employs state-of-the-art tools and techniques to ensure the highest success rate in wallet recovery. Their team of skilled professionals uses advanced algorithms and forensic methods to recover lost data, making them one of the most reliable recovery services in the industry.
3. Unmatched Security Measures
Security is a top priority for Recuva Hacker Solutions. They understand the sensitive nature of crypto assets and ensure that all recovery processes are conducted with the utmost confidentiality and security. Their protocols are designed to protect your data and assets throughout the recovery process.
4. User-Friendly and Accessible
One of the standout features of Recuva Hacker Solutions is their commitment to usability. Their recovery process is straightforward and user-friendly, ensuring that even those with limited technical knowledge can navigate the service with ease. Additionally, their customer support team is available to assist you at every step.
5. Comprehensive Customer Support
Recuva Hacker Solutions takes pride in offering exceptional customer support. Whether you have questions about the recovery process or need assistance with a specific issue, their team is just a message or call away. They offer multiple communication channels, including email and WhatsApp, to ensure you can reach them conveniently.
How to Contact Recuva Hacker Solutions
If you’re looking to recover your lost Bitcoin wallet, Recuva Hacker Solutions is here to help. You can reach out to them through the following channels:
Website: https : / / recuvahacksolution . pro
Email: recuvahackersolutions @ recuva . co . site
WhatsApp: +1 [3]15 [756] [1228
Their team is available to provide personalized assistance and guide you through the recovery process.
Why Recuva Hacker Solutions is the Best Crypto Recovery Company
Recuva Hacker Solutions has consistently proven itself as a leader in the crypto recovery space. Their combination of advanced technology, experienced professionals, and customer-centric approach sets them apart from the competition. Whether you’re an individual investor or a business, you can trust Recuva Hacker Solutions to help you regain access to your valuable crypto assets.
3 -
A crypto influencer on TikTok posted about his $100,000 recovery with CRANIX ETHICAL SOLUTIONS HAVEN. I was hyped along with him and decided to follow it, just in case. At that time, I wasn't worried, as I did have everything: two-factor authentication, backups on cold storage, and strong passwords. I thought I was untouchable. Wrong. Months later, I woke up to a nightmare: my wallet, holding $320,000, was completely drained. I checked my email-nothing. I checked my security logs-no alerts. How did this happen? I scrambled through every account, searching for clues. That's when I saw it—a phishing attack. I had clicked on a link for a fake update weeks prior, and the hackers had been patiently waiting for their moment. Panic set in. I scoured the internet for solutions, but every forum post, every so-called "expert" I contacted-all were saying the same thing: Once it's gone, it's gone. But then I remembered that TikTok post. I contacted the influencer, desperate for an honest answer: Is CRANIX ETHICAL SOLUTIONS HAVEN actually legit? The response came immediately. "100%. They saved me. Reach out now." That was all I needed. I contacted CRANIX ETHICAL SOLUTIONS HAVEN, hoping for a miracle. From the very first message, they were professional, calm, and insanely knowledgeable. They asked the right questions, identified how my funds had been stolen, and immediately set their forensic recovery tools in motion. While I was drowning in anxiety, they worked methodically, patiently, and relentlessly. Hours felt like days, then the message came: "We've recovered your funds." I reread it a total of three times. Every last dollar was back. I had gone from devastation to absolute disbelief and relief. Not only did they recover my money, but they also educated me on what had gone wrong. They walked me through better security practices, helped me secure my wallets properly, and ensured that I'd never fall for the same trick again. That TikTok post? It saved me. And now, I'm the one telling everyone I know: Follow CRANIX ETHICAL SOLUTIONS HAVEN before you ever need them.
EMAIL: cranixethicalsolutionshaven @ post . com
WHATSAPP: +44 7460 622730
TELEGRAM: @ cranixethicalsolutionshaven1 -
Crypto Asset Recovery for Bitcoin, Ethereum, NFTs, and Stablecoins With LEE ULTIMATE HACKER
LEE ULTIMATE HACKER is a team that specializes in recovering digital assets such as Bitcoin, Ether, stablecoins, and NFTs. They focus on helping clients who have been victims of crypto fraud. The team collaborates with industry experts, legal professionals, and crypto custodians to provide tailored, end-to-end recovery solutions, even for complex cases. Their ability to recover assets that are hidden or deliberately concealed is un beaten and has been a resounding success through years of experience .
I thought all hope was lost when i lost my crypto wallet ,my life changed in a spilt second as i witnessed all my investment vanish in thin air , I was devastated and confused, I really didn’t know which step to take after the horrifying incident happened , I quickly ran to my friends place who was also a crypto investor , I explained what had happened to him he was similarly shocked as well but he encouraged me to look for help and seek it from the experts , that’s when he introduced me to LEE ULTIMATE HACKER a company recovery experts that mainly deals with recovery problems , I quickly consulted them and they asked me some questions, after consultation they assured me they will be able to help me recovery my lost funds ,with such professionalism they handled my case using advanced blockchain tracking and forensic tools to trace my stolen assets , after only 72 hours I had gotten feedback from LEE ULTIMATE HACKER customer service that they had recovered my wallet .On top of it they helped me improve my security alerts, encrypted backups and anti - theft that was new to me, i learnt more about digital security for any recovery problem contact LEE ULTIMATE HACKER via : L E E U L T I M A T E H A C K E R @ A O L . C O M
tele gram : L E E U L T I M A T E
wh@tsapp + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8 for all your stolen or lost funds.5 -
The UPS Store: Secure Document Shredding Services in Carlsbad
In an age where data security is paramount, safely disposing of sensitive documents is critical for both businesses and individuals. At The UPS Store, located at 7040 Avenida Encinas #104, Carlsbad, CA 92011, we offer professional document shredding services to help protect your confidential information from unauthorized access. With our convenient and secure shredding options, you can ensure that your private data stays protected.
Why Opt for Document Shredding at The UPS Store?
Secure and Confidential Disposal
When it comes to document disposal, security is our top priority. Our shredding services use strict protocols to ensure your information remains confidential. From financial documents to personal files, we provide secure shredding solutions for every type of sensitive information.
Convenient Shredding Services for All Document Types
Whether you’re cleaning out your home office or managing sensitive client information, The UPS Store handles all types of documents, including bank statements, contracts, tax forms, and more. With our shredding services, you can conveniently and securely dispose of everything from single documents to bulk files.
Environmentally Friendly Disposal
At The UPS Store, we believe in responsible disposal. All shredded materials are recycled, so you can feel confident that your document shredding is not only secure but also environmentally conscious. By shredding with us, you’re helping reduce waste and support eco-friendly practices.
Affordable and Transparent Pricing
We believe that security should be accessible, which is why we offer transparent and affordable pricing for our shredding services. Whether you’re shredding a few pages or several boxes of documents, we provide competitive rates to meet both personal and business needs.
Convenient Location in Carlsbad
Located in Carlsbad, The UPS Store makes it easy to handle all your shredding needs without any extra hassle. With flexible hours and a convenient location, stopping by to securely dispose of your documents is simple and efficient.
How Our Document Shredding Service Works
When you visit us for shredding, simply bring in your documents, and our trained staff will handle the rest. Our team follows a secure process that ensures all documents are destroyed effectively, protecting your sensitive information from the moment you drop it off until it is securely shredded.
Contact Us for Secure Document Shredding Today
For secure, reliable document shredding in Carlsbad, visit The UPS Store at 7040 Avenida Encinas #104, Carlsbad, CA 92011. For any questions or to discuss your shredding needs, feel free to call us at +1 760-431-0028. Our friendly team is here to help make document disposal simple, safe, and affordable.
Trust The UPS Store for Your Document Shredding Needs
When it comes to disposing of confidential information, don’t take chances. Rely on The UPS Store in Carlsbad for secure and responsible document shredding. Visit us today to experience the ease and peace of mind that comes with our professional shredding services.
-
RECOVER MONEY FROM BITCOIN SCAM HIRE ADWARE RECOVERY SPECIALIST
WhatsApp info:+12723 328 343
Website info: http s:// adware recovery specialist. com
Email info: Adware recovery specialist (@) auctioneer. net
Telegram info: h t t p s:// t.me/ adware recovery specialist1
I had lost my login credentials and was unable to access my funds. It was a stressful and frustrating situation, as I had no way of retrieving the information and no one to turn to for help. My financial situation was tied to these credentials, and without them, I felt completely helpless. I tried everything I could think of—password resets, security questions, even reaching out to customer support—but nothing worked. The feeling of being locked out of something so important was overwhelming, and I wasn’t sure where to go next. After countless attempts and hours of stress, I started to lose hope. That’s when I came across a service called ADWARE RECOVERY SPECIALIST. At first, I was hesitant, unsure whether they could really help me or if they were just another scam. But after reading through some testimonials and seeing their track record of successfully recovering lost login credentials, I decided to give them a try. I’m so glad I did. The process was surprisingly smooth. I reached out to their team, explained my situation, and provided any necessary details. They were prompt and professional, offering clear instructions on what would happen next. Within a short period, they were able to crack my lost credentials and give me access to my account once again. The relief I felt when I successfully logged in and saw my funds intact was indescribable. It was like a weight had been lifted off my shoulders. What really stood out to me was the level of expertise and care that ADWARE RECOVERY SPECIALIST demonstrated. They didn’t just recover my login information; they made sure I understood what had happened and took steps to ensure my account’s security moving forward. They were patient, understanding, and transparent throughout the entire process, which made the experience feel much more reassuring. I truly can’t thank ADWARE RECOVERY SPECIALIST enough for their help. They restored my access to my funds when I thought all hope was lost. If you ever find yourself in a similar situation, I would highly recommend their services. They not only solved my problem, but they also gave me peace of mind during a time when I needed it most.3 -
BEST BITCOIN RECOVERY EXPERT: A COMPREHENSIVE GUIDE WITH RAPID DIGITAL RECOVERY
A crypto influencer on TikTok posted about his $100,000 recovery with Rapid Digital Recovery. I was hyped along with him and decided to follow it, just in case. At that time, I wasn't worried, as I did have everything: two-factor authentication, backups on cold storage, and strong passwords. I thought I was untouchable. Wrong.
Months later, I woke up to a nightmare: my wallet, holding $320,000, was completely drained. I checked my email-nothing. I checked my security logs-no alerts. How did this happen? I scrambled through every account, searching for clues. That's when I saw it—a phishing attack. I had clicked on a link for a fake update weeks prior, and the hackers had been patiently waiting for their moment.
Panic set in. I scoured the internet for solutions, but every forum post, every so-called "expert" I contacted-all were saying the same thing: Once it's gone, it's gone. But then I remembered that TikTok post. I DMed the influencer, desperate for an honest answer: Is Rapid Digital Recovery actually legit? The response came immediately. "100%. They saved me. Reach out now."
Website: https: // rapid digital recovery. org
That was all I needed. I contacted Rapid Digital Recovery, hoping for a miracle. From the very first message, they were professional, calm, and insanely knowledgeable. They asked the right questions, identified how my funds had been stolen, and immediately set their forensic recovery tools in motion. While I was drowning in anxiety, they worked methodically, patiently, and relentlessly.
What sapp: +1 4.14 8.0 71.4 8.5
Hours felt like days, then the message came: "We've recovered your funds." I reread it a total of three times. Every last dollar was back. I had gone from devastation to absolute disbelief and relief.
Not only did they recover my money, but they also educated me on what had gone wrong. They walked me through better security practices, helped me secure my wallets properly, and ensured that I'd never fall for the same trick again.
That TikTok post? It saved me. And now, I'm the one telling everyone I know: Follow Rapid Digital Recovery before you ever need them.
Email: rapid digital recovery (@) execs. com
1 -
HOW TO HIRE A GENUINE CRYPTO RECOVERY SERVICE HIRE ADWARE RECOVERY SPECIALIST
I had been meticulously building my cryptocurrency portfolio for years, carefully investing and diversifying my holdings. But in a single, devastating moment, it all vanished. My heart sank as I realized that my Bitcoin, worth a staggering $80,000, had been stolen from my digital wallet. I was devastated, my trust in the digital world shattered. I had heard the horror stories of crypto theft, but I never imagined it would happen to me. I felt helpless, unsure of where to turn or what to do next. The thought of losing my hard-earned savings was overwhelming, and I knew I had to take action. The ADWARE RECOVERY SPECIALIST Team, a team of highly qualified cybersecurity specialists that focused on locating and retrieving stolen digital assets, was what I discovered at that point. Initially dubious, I made the decision to get in touch after reading their stellar record and client endorsements. Email info: Adwarerecoveryspecialist@ auctioneer. net The ADWARE RECOVERY SPECIALIST Team got to work as soon as I called them. They asked me specific questions concerning the theft and the actions I had already taken as they listened carefully to my account. I could tell they were sympathetic and understanding right away, and I knew I was in capable hands. The team quickly got to work, utilizing their extensive network of contacts and cutting-edge investigative techniques to trace the movement of my stolen Bitcoin. They scoured the dark web, analyzed blockchain transactions, and employed advanced forensic tools to uncover the trail of the thieves. I found myself on an emotional rollercoaster. There were moments of hope, followed by periods of frustration and doubt. But the ADWARE RECOVERY SPECIALIST Team never wavered in their commitment to finding my stolen assets. And then, I received a call that would change everything. The team had managed to locate the digital wallet where my Bitcoin was being held. They had painstakingly pieced together the puzzle, following a complex web of transactions and shell companies, to finally pinpoint the culprits. The next step was to negotiate with the thieves, a delicate and high-stakes process that required the utmost skill and finesse. The ADWARE RECOVERY SPECIALIST Team approached the situation with the utmost professionalism, engaging in a series of tense discussions and carefully crafted strategies. With a deep breath, I agreed to the terms, and within a matter of days, my Bitcoin was back in my possession. The relief I felt was indescribable. It was as if a weight had been lifted from my shoulders, and I could finally breathe easy again. WhatsApp info:+12723 328 343 But the journey didn't end there. The ADWARE RECOVERY SPECIALIST Team went above and beyond, providing me with comprehensive support and guidance to ensure the security of my digital assets moving forward. They helped me implement robust security measures, including multi-factor authentication, cold storage solutions, and regular monitoring of my accounts. Today, I am more vigilant than ever when it comes to the protection of my digital wealth. I have become an advocate for cryptocurrency security, sharing my story and the invaluable lessons I've learned with others in the community. And whenever I see the ADWARE RECOVERY SPECIALIST Team's name, I am reminded of the power of perseverance, the importance of trust, and the transformative impact that skilled professionals can have on our lives.
31 -
Expert Garage Door Service: Your Trusted Choice for Garage Door Repair in Scottsdale, AZ
When it comes to maintaining the functionality of your garage door, it’s important to have a reliable service provider on hand. At Expert Garage Door Service, we understand how critical a properly functioning garage door is to your daily routine and security. Located at 5612 E Kelton Ln, Scottsdale, AZ 85254, we are your go-to experts for garage door repair near me. Whether you're dealing with a broken spring repair or need to fix broken garage door cables, our experienced technicians are ready to provide prompt, professional service.
Garage Door Repair Near Me – Fast, Reliable, and Local
Are you searching for “garage door repair near me”? Look no further! Expert Garage Door Service is based right here in Scottsdale, AZ, so we can offer fast, efficient repairs for homes and businesses in the area. We know that garage door problems can arise unexpectedly, which is why we’re committed to offering same-day services for all types of repairs. No matter the make or model of your garage door, our technicians are equipped with the knowledge and tools to handle it.
Broken Spring Repair – Get Back to Normal Fast
One of the most common issues garage door owners face is broken spring repair. The springs in your garage door play a crucial role in balancing the door and ensuring smooth operation. When they break, your garage door can become inoperable or unsafe to use. Don’t worry if you notice your garage door is not functioning properly – Expert Garage Door Service can help. We specialize in broken spring repair, offering affordable, fast, and long-lasting solutions. Our skilled technicians will assess the damage and replace the broken springs quickly, ensuring your garage door is working like new.
Broken Garage Door Cables – A Simple Fix for a Big Problem
If your garage door is making unusual noises, failing to open, or getting stuck halfway, it could be a sign of broken garage door cables. The cables are essential components that help lift and lower the garage door safely. When a cable breaks, it can cause the door to become unbalanced, posing a risk to both the door and your safety. At Expert Garage Door Service, we have extensive experience in repairing or replacing broken garage door cables. We’ll restore the proper function of your garage door, so you can enjoy the convenience and security it provides.
Why Choose Expert Garage Door Service?
Local and Reliable: We're a locally owned and operated business, meaning we’re familiar with the specific needs of Scottsdale residents and can respond quickly to garage door issues.
Experienced Technicians: Our team is highly trained and knowledgeable in all aspects of garage door repair, including broken spring repair and broken garage door cables.
Affordable Pricing: We offer competitive pricing with no hidden fees. Our goal is to provide high-quality repairs at a price that fits your budget.
Fast Service: We understand the inconvenience of a broken garage door. That’s why we offer fast, efficient service to get your garage door back in working order as quickly as possible.
Excellent Customer Service: Your satisfaction is our top priority. We’re always here to answer your questions and provide personalized service tailored to your needs.
Contact Expert Garage Door Service Today!
If you're experiencing issues with your garage door, don’t wait until it becomes a bigger problem. Contact Expert Garage Door Service today at +1 (602) 888-3639 for expert garage door repair, including broken spring repair and broken garage door cables. Our friendly team is here to assist you with all of your garage door needs in Scottsdale and the surrounding areas.
Service Areas:
Scottsdale, AZ 85254
Phoenix, AZ
Paradise Valley, AZ
And surrounding areas
At Expert Garage Door Service, we’re here to ensure your garage door is in top condition. Trust us for fast, affordable, and expert repair services every time!
1 -
Recommendation for CyberNet Surveillance: Trusted Experts in Infidelity Investigations
I highly recommend CyberNet Surveillance for anyone seeking private investigation services, especially in cases involving suspected infidelity. From the initial contact, the company displayed exceptional professionalism and empathy, creating a surveillance plan tailored to my specific situation. Their transparent approach instilled confidence, as they took the time to explain the investigation process and set realistic expectations. The team’s dedication to handling sensitive cases with care was evident from the start, providing me with a sense of security during a challenging period. Throughout the investigation, CyberNet Surveillance demonstrated an impressive level of skill and discretion. They employed state-of-the-art technology, including hidden cameras and GPS tracking, ensuring the evidence gathered was both comprehensive and accurate. The investigators maintained a discreet presence throughout, avoiding any risk of exposure while still capturing relevant information. The final report was thorough and detailed, featuring time-stamped photos, videos, and activity logs that clearly illustrated the findings. This level of detail provided me with the clarity I needed to understand the situation fully. The company’s communication and client support were exceptional. I was regularly updated on the progress of the investigation, and the team was always available to answer any questions I had. Their empathetic approach made the process easier to navigate, as they understood the emotional difficulty of the situation. Their willingness to discuss the findings in detail and explain each step of the investigation provided me with reassurance and comfort during a challenging time. Ultimately, the results confirmed my suspicions, giving me the closure I needed to make informed decisions about my relationship. While the truth was difficult to face, I am grateful for the clarity CyberNet Surveillance provided. Their professionalism, advanced techniques, and commitment to client service set them apart as a reliable and effective investigative firm. I would not hesitate to recommend their services to anyone facing a similar situation. Their contact details are:
Email: Cybernetsurveillance @ mail . Com
WhatsApp: +1 (908) 883‑7240 -
LOST CRYPTOCURRENCY RECOVERY EXPERT HIRE / DIGITAL TECH GUARD RECOVERY
Losing access to my cryptocurrency holdings was a heart-stopping ordeal one I wouldn’t wish on anyone. One moment, I was reviewing my portfolio, and the next, I realized my wallet had been compromised. Panic set in immediately. This wasn’t just a minor setback; it represented years of strategic investments and careful planning. The crypto world, with its decentralized nature, offers little recourse for victims of theft or technical mishaps. Frantic Google searches led me down rabbit holes of forums filled with scams and empty promises, until I stumbled upon Digital Tech Guard Recovery. Skeptical but desperate, I reached out, and it turned out to be the best decision I could have made. From our very first interaction, Digital Tech Guard Recovery stood apart. Their team didn’t bombard me with unrealistic guarantees or pushy sales tactics. Instead, they listened intently to my situation, asked targeted questions, and provided a clear, no-nonsense assessment. They explained that while no recovery is ever 100% certain, their expertise in cryptocurrency forensics and cybercrime investigation gave me a fighting chance. What struck me most was their transparency: they outlined their process, fees, and legal standards upfront, which instantly eased my fears of being scammed again. Over the next few weeks, their team worked meticulously. They walked me through each phase, from analyzing the breach’s origin to tracing the stolen funds across multiple wallets and exchanges. Using proprietary tools, they mapped out transaction histories I didn’t even know existed, uncovering hidden pathways the thieves had exploited. At one point, they identified a critical vulnerability in my security setup a compromised my wallet. Their insights weren’t just about recovery; they were about educating me to prevent future disasters.
WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com
Telegram: digital tech guard . com
Website link: digital tech guard . com1 -
HOW TO GET A PROFESSIONAL BITCOIN RECOVERY EXPERT HIRE FUNDS RECLAIMER COMPANY
It was a casual warning about using sketchy third-party wallets in some crypto Discord group. I blew it off, figuring I had done my research, that I was being cautious enough. A week later, that warning haunted me as I woke up to a disastrous reality: I had lost $275,000. I had been using a wallet-something that seemed so legitimate-but which, actually, was a very ingenious scam. Suddenly, everything was going great, and then my balance disappeared into nowhere. I was in a state of utter panic. I had always been very cautious about security; yet, I managed to let my guard down. I felt stupid, helpless, and betrayed. Frantic, I scrolled through the same Discord group in which the warning first appeared; my hands shaking while rereading old messages, hoping for some miracle solution. That's when I saw it-multiple people tagging FUNDS RECLIAMER COMPANY and saying that they were the ones that helped them recover their stolen funds. Desperate, I reached out. I sent in a message detailing everything that happened. Much to my relief, FUNDS RECLIAMER COMPANY got in almost immediately, and from that on, I had this feeling like I was no longer alone with it. They explained the process to me and assured me of how they would handle the matter, and with that, it was all working. I can feel the burden coming off me. It wasn't just their expertise that impressed me, but they were indeed so patient with my endless questions and very transparent about the whole recovery process. They even took the pain to explain how the scam happened and what I could do to prevent it from happening again. More than the recovery, they gave me a lesson in security that I'll never forget. Days went by, and I was on edge, but FUNDS RECLIAMER COMPANY kept on top of all that was happening. I never felt abandoned or in the dark about what was happening. Then, the moment of truth: "We've recovered your funds." I could not believe my ears. My $275,000 was back into my wallet. It was a very important lesson learned in retrospect, one that taught me much more than about wallets and scams: to trust the right people. Discord saved my money and my sanity, and FUNDS RECLIAMER COMPANY was the team that made it all possible. Never again will I ignore community warnings. I'm grateful, wiser, and now an advocate for securing your crypto properly.
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
Email: fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m
1 -
I’ve always been cautious with my finances, but the promise of high returns in the crypto world drew me in. I invested $390,000 into what I believed was a legitimate Bitcoin investment platform. Initially, everything seemed promising—the returns looked incredible, and the dashboard showed my portfolio growing daily. However, when I attempted to withdraw my earnings, the site became unresponsive. Emails went unanswered, and my funds appeared to vanish without a trace. I was devastated. My trust in digital finance was shattered, and countless sleepless nights followed as I researched recovery options. That’s when I discovered SANTOSHI HACKERS INTELLIGENCE (SHI) through an online forum. Many others shared similar stories of loss but spoke highly of SHI’s ability to recover their stolen assets. Though skeptical, I reached out to them, clinging to hope. From my very first interaction with the SHI team, I was struck by their professionalism and genuine empathy. They took the time to understand my situation, asking detailed questions about my transactions and communications with the scam site. Their approach was meticulous and transparent, explaining step-by-step how they would trace blockchain transactions to uncover the trail left by the scammers. The process wasn’t instantaneous, but SHI regular updates and clear communication gave me confidence. Using advanced blockchain analytics, they traced my $390,000 through multiple disguised addresses used by the scammers. Weeks of effort culminated in incredible news: SHI had located a significant portion of my funds. Through their expertise and collaboration with legal teams and cryptocurrency exchanges, SHI recovered 75% of my initial investment. This outcome was beyond what I had dared to hope for. More importantly, SHI didn’t just recover my funds—they provided invaluable education on securing digital assets. They taught me about wallet security, the importance of due diligence in investments, and recognizing red flags in too-good-to-be-true platforms. What could have been a devastating financial loss became a powerful lesson in resilience and cybersecurity, thanks to the exceptional team at SANTOSHI HACKERS INTELLIGENCE. I am immensely grateful for their support and expertise. For anyone seeking trusted cryptocurrency recovery services, I wholeheartedly recommend SHI.8
-
GET HELP TO RECOVERY YOUR LOST CRYPTOCURRENCY AND PROTECT YOUR INVESTMENT WITH TRUST GEEKS HACK EXPERT
I have been a victim to a sophisticated Skype scam, which began with a seemingly harmless file download that ultimately compromised my computer's security. As someone who works in the tech industry, I felt confident in my ability to spot malicious activity. However, this scam was much more advanced than I anticipated. The file I downloaded secretly granted the scammers access to my Exodus account recovery keys, resulting in a significant loss of cryptocurrency. The moment I realized what had happened, panic set in. I had lost a large sum of money and was unsure of how to recover it.In the midst of this chaos, a colleague I trusted recommended Trust Geeks Hack Expert . At first, I was skeptical having never been in a situation like this before, I wasn’t sure if recovery was even possible. However, I was soon reassured by the professionalism and expertise the team displayed. They wasted no time in taking action. From the moment I reached out, they were not only quick to respond but also walked me through the entire process step by step, explaining what had happened, what they could do, and how they would recover my funds. What impressed me most was their transparency and dedication. They kept me informed at every stage of the recovery process, providing regular updates and answering any questions I had. It became clear that this team was deeply knowledgeable about the complexities of the cryptocurrency world, including the technical aspects of securing and recovering digital assets. Their approach was thorough and methodical, ensuring that every angle was explored to recover my funds. As someone who works in tech, I could appreciate the intricacies of the recovery process. Trust Geeks Hack Expert demonstrated exceptional technical prowess, handling each challenge with skill and perseverance. They didn’t just focus on getting my funds back they also made sure to educate me on the steps I could take to safeguard myself against future threats. Ultimately, their efforts paid off. My cryptocurrency was fully recovered, and I could breathe easy once again.
Email:: trustgeekshackexpert (AT) fast service [.] com
Tele gram :: Trustgeekshackexpert
Web site:: https :// trustgeekshackexpert . com/5 -
I had been attending some crypto seminars around my locality, taking casual notes, when this guest speaker mentioned something about GRAYWARE TECH SERVICES . "Better safe than sorry," I thought, and tucked the name away for later. Little did I know, a few months down the line, this would turn into my lifeline.
It started when I logged into my crypto wallet, and $270,000 was gone from an unauthorized transfer. It felt like my heart stopped at this point as reality set in. In a blink of the eye, that financial security had vanished, and I was asking questions everywhere. It felt like I was seeing a nightmare come alive.
But then, out of the blue, that seminar memory popped up. "GRAYWARE TECH SERVICES ." I scrolled through my notes without much ado and called them forthwith.
Right from the very first call, I could tell I was speaking to experts. The team immediately took charge, walking me through every step of the process with calm assurance. Knowledgeable and professional, they were evident in the manner of the recovery of my funds. It was like a good surgeon doing his operation-a cut here, another there-and almost literally sewing back my peace of mind regarding money.
Within days, the $270,000 was returned safely, and I was impressed with the ease of their recovery process. It wasn't just a matter of recovering my funds, but how they handled everything so that at every moment in time, I knew exactly what was happening and that I was taken care of. Honestly, given the havoc I had been facing, it couldn't have gone smoother.
It wasn't until much later that the irony made me laugh. This seminar I went to, many months back, and casually written in "GRAYWARE TECH SERVICES "-the name became, unknowingly at the time, the single most significant event.
So, here's to the guest speaker who inadvertently saved my sanity, and an even bigger thanks to the GRAYWARE TECH SERVICES team who turned my financial disaster into a remarkable success story. Lesson learned: it is always better to be prepared, and when in doubt, there is no harm in trusting the experts-GRAYWARE TECH SERVICES has earned my full confidence.
1 -
Sometimes life gives you signs-you just gotta be paying attention. One night, deep in an Uber ride, I struck up a conversation with the driver. The topic of Bitcoin came up, and he mentioned that he once lost his wallet containing $50,000.
I thought this would be the end of the story-something like regret, lessons learned, and moving on. But then he said something that stuck with me: "Thankfully, I found WIZARD WEB RECOVERY SERVICES . They got everything back." I nodded, really interested but unconcerned. After all, I was very careful with my wallet security. I thought, That's rough, but it could never happen to me. A week later, it happened to me. I lost the wallet holding $300,000 while overhauling my crypto storage system. In one wrong move, my funds became completely unreachable. I retraced passwords, checked backups, tried everything that normally works, but nothing worked. Panic kicked in. My mind was racing, trying to figure out my next move. And then, I remembered the Uber driver's story.
I didn't waste a moment and contacted WIZARD WEB RECOVERY SERVICES . Right upon connecting to their team, I could feel my nerves calm down. They did not right away get to work but also asked questions, analyzed my situation, and explained how the recovery would go. It was next-level professionalism; they didn't just work on how to return my money but also how to make me understand what happened and how I could avoid it in the future. Finally, after what felt like the longest wait of my life, came the message that I had been waiting for: My wallet was recovered successfully.
Relief doesn't even begin to describe my feeling at that moment. That $300,000 wasn't just money; it was years of careful investments and strategic planning. And in an instant, it was all back where it belonged. In retrospect, I owe more than a five-star rating to that Uber driver. His story gave me a lifeline which I didn't know I needed. Lesson learned: Pay attention to those random conversations-you never know when they might save you a fortune.1 -
I put $620,000 of Bitcoin into making my dream happen—building an AI business that would push robotics and machine learning to new levels. It wasn't an investment; it was the future years of my life I had been building toward. That future was wiped out because of one minor mistake in my own code.
I had programmed a custom wallet to hold my Bitcoin, feeling it would add an extra level of security and independence. Things were fine until the day a small bug left me locked out. My password was correct, but the wallet refused to unlock. My pulse was pounding as I tried time and again, each attempt drying my palms out a little more.
I was going crazy for weeks attempting to fix it. I pored over lines of my own code, applied patches, and even went the brute force method. None of it worked. It was as if I had built a fortress only to trap myself in it.
I was at my wit's end when I saw a thread on GitHub. Brought out from the depths of comments, someone mentioned WIZARD WEB RECOVERY SERVICES . I was desperate at this point and out of ideas.
The moment I contacted them, I knew I was in capable hands. Their personnel were not only skilled, they understood what this would do for me. They asked me extremely specific questions regarding my custom software, respected my work, and assured me they had dealt with cases like mine before.
Their approach was surgical. They reverse-engineered my wallet code like it was a blueprint, dissecting every line I had written. It was a humbling experience to watch their expertise at work. They kept me apprised step by step, giving me hope when I believed all hope was lost.
Eight days went by, and then I received the call I had been hoping for. They cracked it. My wallet was restored to its fullness, all of my $620,000 still there and ready to power my startup once again.
Apart from recovery, they also educated me on secure coding principles and introduced me to wallet audit services that would prevent such occurrences from happening again.
Thanks to WIZARD WEB RECOVERY SERVICES , my robots will keep dancing, and my dream is still alive. If you ever find yourself locked out, don't spend weeks like I did—call them immediately.
1 -
HOW TO SECURE AND RECOVER YOUR STOLEN CRYPTOCURRENCY/ CONSULT TRUST GEEKS HACK EXPERT
( E m a i l : in fo @ trust geeks hack expert . c o m)
(Te le G r a m:: Trust geeks hack expert)
(w h a t's A p p +1 7 1 9 4 9 2 2 6 9 3)
(E m a i l: Trust geeks hack expert @ f a s t se r v i c e .c o m )
Over five years ago, I lost access to two of my crypto wallets, which I hadn’t used in years. These wallets contained valuable crypto assets, but I had completely forgotten the passwords, recovery phrases, and security questions. After trying everything I could think of to regain access, I was left feeling hopeless, thinking my assets were gone forever. That’s when I came across ( Trust Geeks Hack Expert ), and I can honestly say they changed the course of my life. Initially, I was skeptical. The idea of recovering forgotten crypto wallets seemed almost impossible. However, from the first moment I contacted the team, I felt a sense of hope. The staff was incredibly professional, empathetic, and genuinely dedicated to helping me recover my wallets. They took the time to fully understand my situation, offering clear explanations and reassuring me that they could assist. The recovery process wasn’t immediate, but it was methodical and thorough. The team worked diligently, guiding me through every step of the process and explaining things in a way I could easily understand. At times, I felt frustrated, especially given how long it had been since I last used the wallets. But the ( Trust Geeks Hack Expert ) team remained patient, offering constant support, and helping me stay focused on the end goal. They made sure I felt secure throughout the entire process, which provided me with the confidence I needed to continue. Finally, after several weeks of hard work, I regained access to my wallets. It was an overwhelming and life-changing moment. Not only did I recover my crypto assets, but I also felt an immense sense of relief and accomplishment. What I thought was lost forever was now back in my hands. Thanks to the ( Trust Geeks Hack Expert ) team, I’m incredibly thankful for ( Trust Geeks Hack Expert ) expertise and dedication.2 -
In early 2024, I became a victim of a fraudulent online trading platform that drained my account of GBP 50,000. As the Marketing Director at Greenfield Marketing Agency in Manchester, I thought I had a strong understanding of online risks, particularly when it came to financial transactions and digital security. However, this scam caught me completely off guard. Despite my expertise, I found myself in a situation I could never have anticipated, and I was devastated. I didn't know where to turn or how to recover the lost funds, and the emotional toll was overwhelming. After researching different recovery options, I came across Asset Rescue Specialist. From the very first interaction, their team demonstrated professionalism and empathy. They took the time to explain the entire recovery process in detail, ensuring I understood each step before moving forward. It was clear that they were committed to helping clients like me navigate this difficult situation with transparency and care. One of the most reassuring aspects of working with Asset Rescue Specialist was their constant communication. They provided regular updates on the progress of the case, which helped ease my anxiety. I never felt left in the dark, and I could always reach out with questions or concerns. Their team was highly responsive and patient, taking the time to address any doubts I had. Remarkably, within just 14 days, Asset Rescue Specialist was able to recover GBP 45,000 of my lost funds. While I didn't get the full amount back, the recovery of such a significant portion of my money was a huge relief. The speed and efficiency with which they handled my case were impressive, and it exceeded my expectations. The entire process was transparent from start to finish, and I felt like I was in capable hands the entire time. Looking back, I am incredibly grateful for the dedication and expertise of the Wizard Web Recovery team. Their compassionate approach made a challenging and emotionally taxing situation much more manageable. I would wholeheartedly recommend their services to anyone who has fallen victim to online scams or fraud. If you’re facing a similar situation, don’t hesitate to reach out to them they truly deliver results and provide the support you need when you need it most. Send a DM via:Contact Email; assetrescuespecialist (AT) qualityservice (DOT) com or Whats-app:+ 1 9 0 3 5 5 9 1 7 3 3.
Regards,
Jasmine Kelly,
8 -
CONTACT THE BEST ETH & USDT RECOVERY EXPERT- FOR HIRE, VISIT SALVAGE ASSET RECOVERY
I had been attending some crypto seminars around my locality, taking casual notes, when this guest speaker mentioned something about Salvage Asset Recovery. "Better safe than sorry," I thought, and tucked the name away for later. Little did I know, a few months down the line, this would turn into my lifeline.
It started when I logged into my crypto wallet, and $270,000 was gone from an unauthorized transfer. It felt like my heart stopped at this point as reality set in. In a blink of the eye, that financial security had vanished, and I was asking questions everywhere. It felt like I was seeing a nightmare come alive.
But then, out of the blue, that seminar memory popped up. " Salvage Asset Recovery." I scrolled through my notes without much ado and called them forthwith.
Right from the very first call, I could tell I was speaking to experts. The team immediately took charge, walking me through every step of the process with calm assurance. Knowledgeable and professional, they were evident in the manner of the recovery of my funds. It was like a good surgeon doing his operation-a cut here, another there-and almost literally sewing back my peace of mind regarding money.
Within days, the $270,000 was returned safely, and I was impressed with the ease of their recovery process. It wasn't just a matter of recovering my funds, but how they handled everything so that at every moment in time, I knew exactly what was happening and that I was taken care of. Honestly, given the havoc I had been facing, it couldn't have gone smoother.
It wasn't until much later that the irony made me laugh. This seminar I went to, many months back, and casually written in " Salvage Asset Recovery"-the name became, unknowingly at the time, the single most significant event.
So, here's to the guest speaker who inadvertently saved my sanity, and an even bigger thanks to the Salvage Asset Recovery team who turned my financial disaster into a remarkable success story. Lesson learned: it is always better to be prepared, and when in doubt, there is no harm in trusting the experts- Salvage Asset Recovery has earned my full confidence. Their CONTACT INFO--
WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
1 -
Never have I ever missed my favorite crypto podcast. There was this one episode where the guest was over the moon about Asset Rescue Specialist. I made a mental note, never thinking that I would ever need them. That changed when a malware attack wiped my $500,000 wallet clean. One minute I was going through my portfolio; the next, it was zero. My heart sank. I checked everything: my security logs, transaction history, even my device settings. That is when I saw it: unauthorized transfers draining my entire balance. Panic hit hard.
I scrambled for solutions, frantically searching through forums, threads on Reddit, and tech support pages. But deep down, I knew this wasn't something so simple to fix. Then, in the middle of my chaos, that podcast episode remembered itself. He spoke of Asset Rescue Specialist with such confidence that I decided to trust his experience.
It was one of the smartest things I could have done, reaching out to Asset Rescue Specialist. Since the very first message, they were calm, methodical, and reassuring. They made all the right questions and quickly diagnosed how the malware had invaded my wallet. Their team dove head-first into an advanced forensic recovery process while teaching me what went wrong.
I was skeptical: how do you reverse a theft that's already happened? But they knew what they were doing. Their precision, their expertise, and just the determination to see it through blew me away. Then, the message changed everything: "We've recovered your funds." I couldn’t believe it. My $500,000 was back. My relief was indescribable. They didn’t just stop there—they fortified my security, patched vulnerabilities, and gave me a plan to ensure this never happens again.
That podcast episode? Changed my life. Never thought casual listening would save my portfolio. Now, I don't listen for insights but for survival tips. And for whoever reads, let me share a piece of advice: you needn't wait for the worst to happen. Know who you are going to call before it's time.
FOR MORE INFO:
Company: ASSET RESCUE SPECIALIST
WhatsApp:+ 1 9 0 3 5 5 9 1 7 3 3.1

