User Controls
Rocklin killed himself (Proof inside)
-
2015-09-18 at 9:23 PM UTC
-
2015-09-19 at 12:43 AM UTC
He's pretty far from a hipster
His extensive record collection of 80's hits begs to differ
-
2015-09-19 at 4:04 AM UTC
-
2015-09-19 at 12:28 PM UTC
, what the fuck is your point Faggert?
It's not even his screenshot, Spectral doesn't have all the addons you see, i've seen his browser screenshots too. For a 'hacker' he has ZERO security addons lolololol, not what i'd expect for a infosec minded person. -
2015-09-19 at 12:46 PM UTC
It's not even his screenshot, Spectral doesn't have all the addons you see, i've seen his browser screenshots too. For a 'hacker' he has ZERO security addons lolololol, not what i'd expect for a infosec minded person.
Don't need any security at all when all packets and processes are enhancemented, logged and researched. If you use security products, you are putting yourself and your security entirely in the hands of the maker of the security product. I don't play games like that. -
2015-09-19 at 12:48 PM UTC
Don't need any security at all when all packets and processes are enhancemented, logged and researched. If you use security products, you are putting yourself and your security entirely in the hands of the maker of the security product. I don't play games like that.
Researched
[SIZE=14px]Hahahahahahahahah[/SIZE] -
2015-09-19 at 1:09 PM UTC
Don't need any security at all when all packets and processes are enhancemented, logged and researched. If you use security products, you are putting yourself and your security entirely in the hands of the maker of the security product. I don't play games like that.
It's physically impossible to manually inspect all incoming packets, also the only way to capture packets is to use software specifically designed to do so and unless you wrote that software yourself you're going to be relying on a third party anyway which would defeat the purpose of 'doing everything yourself'. -
2015-09-19 at 1:12 PM UTCResearched
[SIZE=14px]Hahahahahahahahah[/SIZE]
Well, of course. For example, there are 65,535 ports on a machine. If, let's say, TCP port 30006 opens, and it's not supposed to open, I would do very well to research that port for recent activity elsewhere on other people's machines. For another example, new FUD viruses appear every single day, so if you have any nfos at all on a detected suspicious activity, you need to research those details fully in order to get a solid handle on the situation. Research can also include sandbox testing, debugging, comparing, tracing and source checking. -
2015-09-19 at 1:33 PM UTCExcept these are things you only read about without really understanding.
-
2015-09-19 at 1:58 PM UTC
Except these are things you only read about without really understanding.
tl/dr
-
2015-09-19 at 2:07 PM UTC
tl/dr
It must be horrible to be you.