Skip Navigation

Posts
0
Comments
480
Joined
2 yr. ago

  • To drain Russia and prevent internal instability through a sudden end.

  • It's not really CSAM if there is no abuse happening, is it?

  • 66 wpm, 94% accuracy with standard google keyboard.

    To improve speed I'd suggest simply practicing. You'll get better over time!

  • That's really clever, you finally got me to dislodge this turd. Thank you!

  • For me it will be the same as my "public" online presence, but not the more anonymous ones.

  • They are not just middlemen, they control the entire sales platform - both buyer and seller.

  • They won't be required to pay it back like that, that is a propaganda talking point.

  • Sure, look up specific configuration points or architectures, but looking up AD is a bad sign.

  • No, that approach is completely fine even if pedantic because you get the candidate to reason about their choices and their approach which tells you so much more about them than rote memorization. Being pedantic is the whole point of it.

  • Just saying that running automated tools and identifying those vulnerabilities is just the first step to learning hacking, but nothing more. To gain a proper understanding you must be able to find vulnerabilities manually or at least understand a certain exploit such as ETERNALBLUE which you won't really look for manually.

  • You can see that the first machine is at /dvwa which is the Damn Vulnerable Web Application and is made for practicing hacking. If you have a basic understanding of the vulnerabilities there finding 7 of them is easy peasy.

  • I'll be talking about digital signatures which is the basis for such things. I assume basic understanding of asymmetric cryptography and hashing.

    Basically, you hash the content you want to verify with a secure hashing function and encrypt the value with your private key. You can now append this encrypted value to the content or just release it alongside it.

    To now verify this content they can use your public key to decrypt your signature and get the original hash value, and compare it to their own. To get that, they just need to hash the content themselves with the same function.

    So by signing their videos with the white house private key and publishing their public key somewhere, you can verify the video's authenticity like that.

    For a proper understanding check out DSA :)

  • "Always" is a really strong word that you should not be using in this context since it's just not true.

  • Hope you find something to fulfill your wish!

  • I work in exactly this field and I can go to work in shorts and a tank top because it's about my expertise, not the material or its form I choose to wear. I had to go to work in a suit in a previous job and I'll never ever accept that again.

  • Hacking is too complex to be automated like that - for now at least. Especially the AI buzzword is useless in this context. There are a lot of attempts to automate the process, but none of them come close to manual review by an experienced professional.