How To Become A Hacker: A Step-By-Step Guide
-
This post did not contain any content.
-
-
This post did not contain any content.
I started reading and though this was someone who had lost their marbles, by target 2 I was hooked.
-
This post did not contain any content.
How to become a hacker
Average Linux user: Hack the white house
Your mom: Install pi-hole
-
This post did not contain any content.
Pretty fun (and funny) sci-fi story, the open source katana bit gave me unix surrealism vibes but then again what doesn't these days.
-
Pretty fun (and funny) sci-fi story, the open source katana bit gave me unix surrealism vibes but then again what doesn't these days.
Thanks! I borrowed the open source katana bit from unix surrealism
-
I started reading and though this was someone who had lost their marbles, by target 2 I was hooked.
For me it was
— I’d seen weirder things in Perl scripts —
Just perfect. No notes.
-
This post did not contain any content.
I love it.
-
This post did not contain any content.
Fun background info: Trusted Representatives don't actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
-
This post did not contain any content.
A beautiful read. I’ll keep checking my certificate resolutions.
-
This post did not contain any content.
-
This post did not contain any content.
So good. the vatican while loop one was a lot of fun too
-
This post did not contain any content.
-
Have you seen Blackhat from Micheal Maan. (I’m no hacker/programmer/or whatever techie)
-
Fun background info: Trusted Representatives don't actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
to prevent exactly this scenario
I'd love to be in the group that brainstormed this exact scenario
-
This post did not contain any content.
I don't get what the others are talking about, there is nothing after this, even through scribe or on an archive.org snapshot made recently
Taking him down would put the fear into the rest and, hopefully, get some intel on the other keyholders through the IRC backchannels.
-
I don't get what the others are talking about, there is nothing after this, even through scribe or on an archive.org snapshot made recently
Taking him down would put the fear into the rest and, hopefully, get some intel on the other keyholders through the IRC backchannels.
You probably have an extrnsion which removes the "Friend link" query param from the URL
-
to prevent exactly this scenario
I'd love to be in the group that brainstormed this exact scenario
Every group worth its salt should have safeguards against Nokia nunchuck attacks.
-
Every group worth its salt should have safeguards against Nokia nunchuck attacks.
And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It
-
Have you seen Blackhat from Micheal Maan. (I’m no hacker/programmer/or whatever techie)
-
This post did not contain any content.These, after do many decades, are still stupid funny. I can't help but picture an ugly 13 year old male desperate for companion ship but not receiving any.
-