Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "virus attack"
-
Anyone know this bitch hacker 127.0.0.1 story?
WORST HACKERS OF ALL TIME
CONTINUED IN THE COMMENTS BECUASE IT IS SO LONG...
TLdr bitch hacker hacks himself by localhost
bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> why do you kick me
<bitchchecker> can’t you discus normally
<bitchchecker> answer!
<Elch> we didn’t kick you
<Elch> you had a ping timeout: * bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
<bitchchecker> what ping man
<bitchchecker> the timing of my pc is right
<bitchchecker> i even have dst
<bitchchecker> you banned me
<bitchchecker> amit it you son of a bitch
<HopperHunter|afk> LOL
<HopperHunter|afk> shit you’re stupid, DST^^
<bitchchecker> shut your mouth WE HAVE DST!
<bitchchecker> for two weaks already
<bitchchecker> when you start your pc there is a message from windows that DST is applied.
<Elch> You’re a real computer expert
<bitchchecker> shut up i hack you
<Elch> ok, i’m quiet, hope you don’t show us how good a hacker you are
<bitchchecker> tell me your network number man then you’re dead
<Elch> Eh, it’s 129.0.0.1
<Elch> or maybe 127.0.0.1
<Elch> yes exactly that’s it: 127.0.0.1 I’m waiting for you great attack
<bitchchecker> in five minutes your hard drive is deleted
<Elch> Now I’m frightened
<bitchchecker> shut up you’ll be gone
<bitchchecker> i have a program where i enter your ip and you’re dead
<bitchchecker> say goodbye
<Elch> to whom?
<bitchchecker> to you man
<bitchchecker> buy buy
<Elch> I’m shivering thinking about such great Hack0rs like you
bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> dude be happy my pc crashed otherwise you’d be gone
<Metanot> lol
<Elch> bitchchecker: Then try hacking me again… I still have the same IP: 127.0.0.1
<bitchchecker> you’re so stupid man
<bitchchecker> say buy buy
<Metanot> ah, [Please control your cussing] off
<bitchchecker> buy buy elch
bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) Quit (Ping timeout#)
bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> elch you son of a bitch
<Metanot> bitchchecker how old are you?
<Elch> What’s up bitchchecker?
<bitchchecker> you have a frie wal
<bitchchecker> fire wall
<Elch> maybe, i don’t know
<bitchchecker> i’m 26
<Metanot> such behaviour with 26?
<Elch> how did you find out that I have a firewall?
<Metanot> tststs this is not very nice missy
<bitchchecker> because your gay fire wall directed my turn off signal back to me
<bitchchecker> be a man turn that shit off
<Elch> cool, didn’t know this was possible.
<bitchchecker> thn my virus destroys your pc man
<Metanot> are you hacking yourselves?
<Elch> yes bitchchecker is trying to hack me
<Metanot> he bitchchecker if you’re a hacker you have to get around a firewall even i can do that
<bitchchecker> yes man i hack the elch but the sucker has a fire wall the
<Metanot> what firewall do you have?
<bitchchecker> like a girl
<Metanot> firewall is normal a normal hacker has to be able to get past it…you girl
<He> Bitch give yourself a jackson and chill you’re letting them provoce you and give those little girls new material all the time
<bitchchecker> turn the firewall off then i send you a virus [Please control your cussing]er
<Elch> Noo
<Metanot> he bitchchecker why turn it off, you should turn it off
<bitchchecker> you’re afraid
<bitchchecker> i don’t wanna hack like this if he hides like a girl behind a fire wall
<bitchchecker> elch turn off your shit wall!
<Metanot> i wanted to say something about this, do you know the definition of hacking??? if he turns of the firewall that’s an invitation and that has nothing to do with hacking
<bitchchecker> shut up
<Metanot> lol
<bitchchecker> my grandma surfs with fire wall
<bitchchecker> and you suckers think you’re cool and don’t dare going into the internet without a fire wall
<Elch> bitchchecker, a collegue showed me how to turn the firewall off. Now you can try again
<Metanot> bitchhacker can’t hack
<Black<TdV>> nice play on words
<bitchchecker> wort man
<Elch> bitchchecker: I’m still waiting for your attack!
<Metanot> how many times again he is no hacker
<bitchchecker> man do you want a virus
<bitchchecker> tell me your ip and it deletes your hard drive
<Metanot> lol ne give it up i’m a hacker myself and i know how hackers behave and i can tell you 100.00% you’re no hacker..29 -
Hello again, everyone. I've been busy with all the paperwork at my ship (will make a post about it later) but for now, I'll bore you with another story (not navy one, fortunately) to justify my slacking off.
And this story... is the story on how I got into ITSec. And it is pretty damn embarrassing. It all began when I was 16. I was hooked on battleknight.gameforge.com, a browser game. My father had just had ADSL installed at our home, and the new opportunities before me were endless. Well...
After I've had my fill with the porn torrents and them opportunities dwindled to just a few dozens, I began searching for free games, and I stumbled on that game. I played a lot, but as a free-to-play game, it was also pay-to-win. I didn't have a credit card, so I paid for a few gems with SMS messages. Fast forward a couple of years, I got into the Naval Academy. A guy came in to advertise something (I think it was an encyclopaedia or something - yes, wikipedia wasn't a thing back then) and to pay for it, we could apply for a credit card. So I applied. And I resisted the temptation for a year.
Note: prepaid wasn't that known where I live, so using credit cards was the only way for online transactions.
So I made 1 transaction. Just one. After a couple of months my monthly report from the bank came, showing a 2.5$ (I think) transaction on Paypal. I paid no mind, thinking that it was some hidden fee. Oh boy, I shit you not, I was THAT much of an idiot. Six months later, BOOM!
600$ transaction to ebay via paypal. You can imagine all those nice things that came to my mind. In any case, the bank accepted my protest that I filed at their central offices and cancelled the transaction. I promptly cancelled my card, destroyed it right there for good measure, and got to thinking... what the fuck just happened?
As many people here, I am afflicted with a deadly virus, called curiosity. I started researching the matter, trying to figure out how. And, because I didn't like black boxes and "it is just like it is" explanations, I tumbled down the rabbit hole of ITSec. I soon found out that, not only it was possible, but also it was sometimes EXTREMELY easy to steal credit card info. There are sites, to this very day, that store user info (along with credit cards info) IN FUCKING CLEARTEXT. Sometimes your personal, financial and even medical info are just an SQLi away.
So, I got very disillusioned on many things. But I never regretted it. It may cause me to age prematurely and will kill me of stroke or heart attack one day, but as I still tumble down the ITSec rabbit hole, I can say with confidence that
I REGRET NOTHING
Plus, my 600$ were returned, so look on the bright side :)1 -
Not dev related but still a rant:
My company decided that all the network traffic should go throu a virus scanner. But they don't know what the fuck they are doing, so now EVERY valid SSL cert gets rejected by our browsers because the virus-scanner breaks the SSL encryption.
Anyone open for a pishing attack?8 -
*Now a days*
We don't need viruses ☣ or malwares to slow down MS Windows 💻,
Two Tabs of Google Chrome does it delicately. 😂😂😂😂😂6 -
My windows defender has gone out of the window.
Now whenever i open windows security app, it shows a blank page.
There's is no tray process running and I can't find any service too.
I know it's a huge virus attack.
Can anyone suggest some methods to know what is causing this problem?
This has happened once before. That time i used DISM and checked windows files integrity. It replaced corrupted ones and then windows worked fine.
This time i want to know the cause.
I wanna root it out and rip it apart.7 -
Mom: Why are you not using this laptop.
Me: I have to wipe it clean. Virus attack.
Next day....
Me: Mom why is my laptop smelling like washing detergent ??
Guess what happened.....:'(1 -
Back in the days of DOS/Win3.x I was jerking around in school sending messages to my friends in other classes by changing autoexec.bat on the workstations I used.
Somehow someone mistook my messages as a virus, and the IT department closed down the workstations for weeks.2 -
Media always misinterprets anything related to computer and information technology. Recently found an Indian News channel which aired news about recent cyber attack and stated virus named "Ransomware" (not WannaCry) has affected computers all over the world. They aired wrong information without hesitation despite India being world's rapidly growing IT hub.6
-
HIRE THE BEST BITCOIN RECOVERY EXPERT; HOW TO SAFELY RECOVER STOLEN CRYPTOCURRENCY VISIT CYBER CONSABLE INTELLIGENCE
I’ve always felt confident navigating the world of cryptocurrency. As a software engineer, I understood the ins and outs of wallets, private keys, and blockchain security, which made me feel secure in my investments. So, when I found a promising platform that seemed like a great opportunity, I invested $250,000 without hesitation. Unfortunately, I soon learned that my confidence would be shattered by a sophisticated cyber attack. It started with small, unauthorized transactions in my wallet. At first, I thought it was a mistake, but as the activity continued, I realized something was wrong. My wallet had been compromised, but not in the way I had expected. Instead of a simple hack, I had fallen victim to a virus attack. The virus was a piece of malware designed specifically to target cryptocurrency wallets. It infiltrated my system through a vulnerability I hadn’t noticed. Once inside, the virus silently monitored my wallet, captured my private keys, and gave the hackers full access to my funds. It was stealthy and nearly undetectable. The attackers didn’t need to log into my account manually; they could control everything remotely, draining my wallet without my knowledge. I was completely blindsided. As someone familiar with tech, I knew how advanced this virus was. It wasn’t just a typical phishing attack, it was a targeted, silent assault on my financial assets. As my funds disappeared, I realized I might never be able to recover them. Desperate, I turned to a trusted colleague who had gone through a similar situation. They recommended Cyber Constable Intelligence, a company that specializes in recovering stolen crypto assets. I contacted them immediately, and their team quickly started investigating. Cyber Constable Intelligence explained how the virus had exploited a weak point in my security. Using advanced tools, they traced the stolen funds across the blockchain and located them. After a thorough recovery process, they managed to return the entire $250,000.Thanks to their expertise and quick action, I was able to recover my funds. The experience was a wake-up call about how vulnerable even the most cautious can be to sophisticated attacks. Without Cyber Constable Intelligence, I would have lost everything, and I’m grateful for their skill in reversing the damage caused by the virus.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyberconstable @ coolsite net
Website info; www cyberconstableintelligence com1 -
As the senior teacher at Greenfield Academy, I wanted to share our ordeal with TECH CYBER FORCE RECOVERY after our school was targeted by a malicious virus attack that withdrew a significant amount of money from our bank account. A third-party virus infiltrated our system and accessed our financial accounts, resulting in a USD 50,000 withdrawal. This attack left us in a state of shock and panic, as it posed a serious threat to our school's financial stability. Upon realizing what had happened, we immediately contacted TECH CYBER FORCE RECOVERY for help. Their team responded promptly and began investigating the situation. They worked tirelessly to track down the virus, analyze its behavior, and understand how it had bypassed our security measures. Most importantly, they focused on recovering the funds that had been stolen from our bank account. Thanks to TECH CYBER FORCE RECOVERY's quick and expert intervention, they were able to successfully recover all the funds that had been withdrawn. Their team worked closely with our bank and utilized advanced recovery methods to ensure the full amount was returned to our account. We were incredibly relieved to see the stolen funds restored, and their efforts prevented any further financial loss. I am incredibly grateful for TECH CYBER FORCE RECOVERY's professionalism, expertise, and swift action in helping us recover the stolen funds. Their team not only managed to undo the damage caused by the virus but also ensured that our financial security was restored. I highly recommend their services to any organization dealing with similar cyberattacks, as their team truly went above and beyond to resolve the issue and protect our assets.
CONTACTING THEM TECH CYBER FORCE RECOVERY
EMAIL. Tech cybers force recovery @ cyber services . com3 -
HOW TO REOVER LOST OR STOLEN BITCOIN, ETH AND OTHER CRYPTO ASSETS; VISIT CYBER CONSTABLE INTELLIGENCE
On January 2, 2025, at precisely 3 AM, Bet365 was hit by a devastating cyber-attack. Our website was infiltrated by a sophisticated virus that granted cybercriminals access to sensitive customer data. In the span of a few hours, £2,500,000 was stolen from our customers’ accounts. The attack was swift and covert, and by the time we realized what had happened, a significant amount of funds had already been siphoned off. As soon as we discovered the breach, my team and I worked tirelessly to secure our platform and protect our customers. We immediately launched an internal investigation and found that the virus had allowed unauthorized withdrawals from a number of accounts. This was a critical situation, and we knew we needed immediate help to recover the stolen funds and prevent any further damage. That's when we turned to Cyber Constable Intelligence. Their reputation for successfully recovering stolen funds in cybercrime cases made them the ideal partner for this challenge. The team at Cyber Constable Intelligence responded immediately, quickly analyzing the virus and the methods used by the hackers. Within hours, they were able to trace the movement of the stolen funds and identify the cybercriminals responsible for the attack. Cyber Constable Intelligence acted swiftly, working around the clock to coordinate with financial institutions and law enforcement. They used their advanced investigative tools and global network to track and recover the £2,500,000 stolen from our customers. Thanks to their relentless efforts, within just three days, we had recovered the full amount. By January 5, 2025, only three days after the attack, we were able to reimburse all affected customers and restore the funds to their accounts. This quick recovery was crucial in reassuring our customers and restoring their trust in Bet365. Additionally, Cyber Constable Intelligence helped us bolster our security measures, ensuring that we are now better protected against future threats. This experience was a stark reminder of the constant risks in the digital world. However, thanks to Cyber Constable Intelligence, we were able to act quickly, recover the stolen funds, and ensure that our platform remains a safe and secure place for our customers. Moving forward, we are more committed than ever to maintaining the highest standards of security to protect both our business and our users.
Reach out to their Info below
WhatsApp: 1 252378-7611
Website info; www cyberconstableintelligence com
Email Info cyberconstable@coolsite net1 -
I faced an unimaginable nightmare. My phone was attacked by a virus that compromised my Binance wallet, allowing hackers to drain all of my Ethereum and Bitcoin, which amounted to around $525,000. I was completely caught off guard, not understanding how this could happen, and was desperate to find a way to recover my stolen funds. I immediately tried to reach out to Binance’s support team, but after several attempts, I realized I couldn’t get through to anyone. My situation felt hopeless, and I had no idea what to do next. In a last-ditch effort, I went to my local police station to file a report, hoping they might be able to help. Unfortunately, they told me they didn’t have the capacity or expertise to deal with cryptocurrency-related fraud, especially one involving a virus. I left the station feeling more defeated than ever. It seemed like my $525,000 was gone for good. Just when I thought there was no hope left, a gentleman approached me at the station. He handed me a business card for Trust Geeks Hack Expert , a company that specializes in recovering lost or stolen cryptocurrency, particularly in cases involving hacking and viruses. Though I was initially skeptical aware of the scams that often plague the crypto world I decided to contact them support E m a i l : Trust geeks hack expert @ ast ser vi ce.. com And Te le gr am. Trust geeks hack expert . My situation was desperate, and I had to at least try. I reached out to Trust Geeks Hack Expert and shared all of the details of the incident, including the fact that my phone had been infected by a virus. I provided them with the transaction details, wallet addresses, and any other relevant information they requested. To my amazement, within just 72 hours, I received a letter from Trust Geeks Hack Expert confirming that they had successfully recovered all of my funds. Not only did they retrieve the $525,000, but they also traced the virus and identified the individuals responsible for the attack. The experience was eye-opening. Losing cryptocurrency due to a virus attack on your phone can feel like an irreversible blow, but it’s not always the end. With the right help, recovery is possible. Trust Geeks Hack Expert proved that there are trustworthy professionals who specialize in cases like mine. If you find yourself in a similar situation, I highly recommend reaching out to Trust Geeks Hack Expert.3
-
RECOVER YOUR LOST CRYPTOCURRENCY: BEST EXPERTS TO HELP YOU RECLAIM YOUR FUNDS WITH SPARTAN TECH GROUP RETRIEVAL
A few months ago, I ran into a major issue that nearly cost me everything. I had been using my computer to trade cryptocurrency for some time, relying on my digital wallet for every transaction. One day, after an unexpected system crash, I realized that something was terribly wrong. My computer, which had always been reliable, was infected with a virus that completely compromised my trading wallet. When I tried to access my account, I was logged out and couldn’t get back in. Panic set in as I realized I had no idea how to regain access, and I feared I might have lost everything I had worked so hard for. In my frantic search for a solution, I reached out to a close friend who was knowledgeable about technology and had experience with crypto trading. After explaining my situation, she immediately suggested I reach out to a team called SPARTAN TECH GROUP RETRIEVAL Then contact them on WhatsApp:+1 (971) 4 8 7 -3 5 3 8 OR Telegram:+1 (581) 2 8 6 - 8 0 9 2. She mentioned that she had read several accounts on Quora from people who had faced similar issues and had successfully recovered their funds with the help of SPARTAN TECH GROUP RETRIEVAL. I was skeptical at first, unsure whether this was just another online service that made grand promises but couldn’t deliver. But after learning more about SPARTAN TECH GROUP RETRIEVAL’s reputation and reading more testimonials from individuals who had been in my position, I decided to give them a try. I contacted them, explained my situation, and was quickly put in touch with one of their specialists. The team at SPARTAN TECH GROUP RETRIEVAL immediately set to work, analyzing the situation with a calm and professional approach. They explained that the virus had likely been a targeted attack, with the purpose of stealing access to my crypto wallet. However, they reassured me that they had the tools and expertise to track the source of the attack and restore my access. Their team used advanced forensic methods, combining blockchain analysis, data recovery techniques, and a deep understanding of cryptocurrency security protocols to retrieve my account. Within a short period, SPARTAN TECH GROUP RETRIEVAL successfully regained access to my wallet and helped secure it from future threats. Not only did they recover my account, but they also implemented enhanced security measures to prevent further breaches. I was absolutely amazed by their professionalism, technical expertise, and how quickly they acted. What impressed me most was their commitment to ensuring that I understood the process every step of the way. Thanks to SPARTAN TECH GROUP RETRIEVAL, I was able to recover not just my funds but my peace of mind. I am now more confident in my trading, knowing that if anything goes wrong, I have a trustworthy team to rely on.
CONTACT INFO ABOUT THE COMPANY:
Email: spartantech (@) c y b e r s e r v i c e s . c o m
1 -
I’ve always felt confident navigating the world of cryptocurrency. As a software engineer, I understood the ins and outs of wallets, private keys, and blockchain security, which made me feel secure in my investments. So, when I found a promising platform that seemed like a great opportunity, I invested $250,000 without hesitation. Unfortunately, I soon learned that my confidence would be shattered by a sophisticated cyber attack. It started with small, unauthorized transactions in my wallet. At first, I thought it was a mistake, but as the activity continued, I realized something was wrong. My wallet had been compromised, but not in the way I had expected. Instead of a simple hack, I had fallen victim to a virus attack. The virus was a piece of malware designed specifically to target cryptocurrency wallets. It infiltrated my system through a vulnerability I hadn’t noticed. Once inside, the virus silently monitored my wallet, captured my private keys, and gave the hackers full access to my funds. It was stealthy and nearly undetectable. The attackers didn’t need to log into my account manually; they could control everything remotely, draining my wallet without my knowledge. I was completely blindsided. As someone familiar with tech, I knew how advanced this virus was. It wasn’t just a typical phishing attack, it was a targeted, silent assault on my financial assets. As my funds disappeared, I realized I might never be able to recover them. Desperate, I turned to a trusted colleague who had gone through a similar situation. They recommended Hack Buster Recovery, a company that specializes in recovering stolen crypto assets.
1



