What codec/container for your music files do you prefer? Preferred bitrate? If you had 30 TB of storage at any given time, would you use FLAC? |
|
I'm quite the tech type of person, though my intentions are not usually meant for the good, they are usually malicious in just about any way I can think of. As many of you may classify people under the general category of "hackers," I would be one of them. Ask away and I shall try to answer |
|
What codec/container for your music files do you prefer? Preferred bitrate? If you had 30 TB of storage at any given time, would you use FLAC? |
|
Umm, I'm not much the music type |
|
Since people are more gullible and less secure than software, I'm wondering what percentage of your "hacking time" do you spend on some form of social engineering (e.g. phishing)? |
|
In my personal experiences the use of social engineering was rare for me. I would not use it very often unless it was to run a scam on Microsoft to get free keyboards and mice :3. As for phishing, I never got into it because uploading a virus to a popular game or software was a much easier method to getting accounts of all varieties. To give you an exact percent I would have to say about 2% of my time was spent social engineering. |
|
Haha that's so true, "fake" anti-virus software is the best. You'd think, when you see the "your computer is slow" popups, that it's just an amateur job, but when you actually install those tools, they're sometimes really, really, professionally done! |
|
My motive use to be just to have some fun with the people, I did run through finding some girls that I played with their minds for a day or two, but I eventually just let them be and moved on. I don't mean any large harm, although I did one time delete a guys secondary hard drive because when I viewed his webcam he gave me the middle finger D:, I taught him to do that again. |
|
Personally I think we should get out of Iraq and Afghanistan, and use our trillion dollar military to invade countries that harbor cyber terrorist. And I include the people who created the fake anti virus, viruses as cyber terrorists. While destroying a persons computer, is not nearly as dramatic as blowing something up, it does far more property damage on a larger scale, and the suffering is spread across millions of people, instead of dozens or hundreds. |
|
Here's and easy one. To see how much of a hacker you are you should know the basic of basics. What is the first 48 bits of any packet being sent on a TCP/IP network and most other networks? |
|
Ok, what port is most commonly left wide open for you to gain access to an average home computer? |
|
I've found port 80 to be the most common to be open, but in all seriousness, open ports do not do much for accessing home computers. You may hear rumors such as, "open ports allow a hacker to gain access," but that's not very true, never have I ever heard of any person using an open port to access someones computer. |
|
Well ports can be used for simple tasks like accessing someones webcam without them knowing about it and other random crap, but good call. |
|
|
|
Are you the reason that Trojan made the condom? To protect from your virtual STD? |
|
Favourite RAT (If you use one)? |
|
"Logic will get you from A to B. Imagination will take you everywhere." – Albert Einstein.
Bookmarks