User Controls

Rocklin killed himself (Proof inside)

  1. #21
    -SpectraL coward [the spuriously bluish-lilac bushman]
    .
  2. #22
    arthur treacher African Astronaut
    He's pretty far from a hipster


    His extensive record collection of 80's hits begs to differ


  3. #23
    .
    , what the fuck is your point Faggert?
  4. #24
    Sophie Pedophile Tech Support
    , what the fuck is your point Faggert?

    It's not even his screenshot, Spectral doesn't have all the addons you see, i've seen his browser screenshots too. For a 'hacker' he has ZERO security addons lolololol, not what i'd expect for a infosec minded person.
  5. #25
    -SpectraL coward [the spuriously bluish-lilac bushman]
    It's not even his screenshot, Spectral doesn't have all the addons you see, i've seen his browser screenshots too. For a 'hacker' he has ZERO security addons lolololol, not what i'd expect for a infosec minded person.

    Don't need any security at all when all packets and processes are enhancemented, logged and researched. If you use security products, you are putting yourself and your security entirely in the hands of the maker of the security product. I don't play games like that.
  6. #26
    Don't need any security at all when all packets and processes are enhancemented, logged and researched. If you use security products, you are putting yourself and your security entirely in the hands of the maker of the security product. I don't play games like that.
    Researched

    [SIZE=14px]Hahahahahahahahah[/SIZE]
  7. #27
    Sophie Pedophile Tech Support
    Don't need any security at all when all packets and processes are enhancemented, logged and researched. If you use security products, you are putting yourself and your security entirely in the hands of the maker of the security product. I don't play games like that.

    It's physically impossible to manually inspect all incoming packets, also the only way to capture packets is to use software specifically designed to do so and unless you wrote that software yourself you're going to be relying on a third party anyway which would defeat the purpose of 'doing everything yourself'.
  8. #28
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Researched

    [SIZE=14px]Hahahahahahahahah[/SIZE]

    Well, of course. For example, there are 65,535 ports on a machine. If, let's say, TCP port 30006 opens, and it's not supposed to open, I would do very well to research that port for recent activity elsewhere on other people's machines. For another example, new FUD viruses appear every single day, so if you have any nfos at all on a detected suspicious activity, you need to research those details fully in order to get a solid handle on the situation. Research can also include sandbox testing, debugging, comparing, tracing and source checking.
  9. #29
    Except these are things you only read about without really understanding.
  10. #30
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Except these are things you only read about without really understanding.

    tl/dr
  11. #31
    tl/dr
    It must be horrible to be you.
Jump to Top