User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 1322
  6. 1323
  7. 1324
  8. 1325
  9. 1326
  10. 1327
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    I'm going to the place where winners go. Offline.

    Cya. Loser.

    You seem upset bro, let me put on some tunes while you stomp your feet and grasp at straws.

  2. Sophie Pedophile Tech Support
    I still daydream of the squad of Nero, Sohpie, and myself.

    Ir probably involves a lot of violence and sex.
  3. Sophie Pedophile Tech Support
    I know that network security is going to override any plans you thought you were capable of pulling off.

    Internet - - - - CLOUD FIREWALL - - - - Computer

    Computer is not going to be connected to the internet. It is going to have internet access.

    Still failing.
  4. Sophie Pedophile Tech Support
    what is going on in here, guys?

    munheeiskingofchina is trying to fit in by pretending he knows anything about computers, obviously he has failed.
  5. Sophie Pedophile Tech Support
    Yes I do.

    No, you really don't.
  6. Sophie Pedophile Tech Support
    No part of that absolved anyone of anything.

    Sure it does silly, or at least it attempts to diminish responsibility "Oh yeah sorry i murdered that person, but hey we all have a bit of murderer inside amirite guise?"

    No, you're a murderer and thus fundamentally different than those who are not.
  7. Sophie Pedophile Tech Support
    If it's getting routed through a server it is not allowing a direct connection to your computer.

    Lmao, you don't even know what you're talking about. Go read a book and we can discuss this further.
  8. Sophie Pedophile Tech Support
    Sorry this faggot shit on your trojan. Ill take a look at it later but my woman is yelling at me to clean shit up. So I better do what she says. Got a tldr of imporvements over the last?

    Made it more fancy, added logic to disable task manager and i plan on integrating it into a modular framework with github as C&C so i can add modules live to the implants.
  9. Sophie Pedophile Tech Support
    There's a bad man in everyone, no matter who we are. There's a rapist and a nazi living in our tiny hearts. Child pornographers and cannibals, and politicians too. There's someone in your head waiting to fucking strangle you.

    I don't agree with this notion as it absolves horrible people of their guilt.
  10. Sophie Pedophile Tech Support
    Do you mean hiding a file in the system?

    Does it need outside access to be effective?

    It gets blocked on the computer and at the cloud.

    Really... How, you just said we're allowing HTTP.

    And at the cloud it would ONLY allow http through and whatever else there is, like STMP
  11. Sophie Pedophile Tech Support
    Are you a virgin?
  12. Sophie Pedophile Tech Support
    Well if we're allowing HTTP what's stopping me from using website X, Y or Z as C&C? You're starting to sound like spectral bro.
  13. Sophie Pedophile Tech Support
    Sounds like girl problems to me.
  14. Sophie Pedophile Tech Support
    They call it combinowanie or are proud of it vs other europeans hwo good they are at finding small ways to hustle or save money in illegal or semi legal ways. for insatcne password sharing on netflix is huge in poland, pirated software, going to store isles and pretending to pay for goods and making it seem like you did only to wlak out for free with them. etc. they call it "combinowanie" and may be the best at it in europe.
  15. Sophie Pedophile Tech Support
    Do they still use STMP servers or is it cloud based for increased security?

    Let's say it was cloud based. That still doesn't mean SMTP can't be utilized.

    If the email ports are being accessed when the email client that is linked to the high security software is not being utilised, it will find the source and kill it.

    That would depend on the security software, like i said, it doesn't matter the purpose of the trojan is not to attack companies besides there are smarter ways to target companies that involve a number of techniques.

  16. Sophie Pedophile Tech Support
    If i were a federal agent, how would that make you feel?
  17. Sophie Pedophile Tech Support
    If you want to discover if the girl you likes has a boyfriend, your trojan will get that secret information without having to ask her.

    She does have a boyfriend, me. HO! Also, if my trojan is so insignificant, i'd happily upload an implant for you so you can test how useless it is, how does that sound?

    Major companies……. firewall. All software has a signed access key.

    I'm not targeting companies, but i'll just say this. Will they have SMTP ports closed? I think not because they couldn't send mail, this trojan(as of yet) contacts its control server via SMTP.

    defense industries etc…

    Yeah, i'm not ready to tango with the US millitary nor is it the point of this thread to do so.

    And bitcoin is not secure.

    Indeed? I'll have you link me studies by the scientific community backing this claim up.

    The media told you it is secret and undetectable. Therefore, it isn't. It is there to steer anyone with a propensity for secret dealings involving international anything, including crime, terrorism or espionage, towards an area where they are instantly detectable.

    You're more of a conspiracy cook than i am.

  18. Sophie Pedophile Tech Support
    UGH. I'll send another.

    OR send me a pastebin or whatever because they don't arrive though. Lemme, delete a couple old ones maybe that helps.
  19. Sophie Pedophile Tech Support
    A trojan is illegal

    Indeed, i care not however.

    and serves no purpose

    It does, building a trojan teaches you how they operate so you can better understand the complexities involved to become a better programmer/hacker.

    unless you are trying to secretly obtain information.

    This would be possible.

    You can't secretly wire transfer money it leaves a huge trail.

    You can transfer bitcoin.

    And if you are after information, your software is more than detectable.

    Indeed, but by how great a percentage of the population? And how long until the AV companies catch on? There are methods of protecting your software from reverse engineering and being detected, and it so happens i am acquainted with these methods. Now, i'm not saying no one will notice, but by the time someone does, it will already be too late. That is of course if i were to deploy this trojan in real life, which i may or may not do.

  20. Sophie Pedophile Tech Support
    I'm a cyber criminal, regular criminal, pedohebecreepophile and i've made bombs before, pretty big ones too. I'm also openly opposed to everything the US government stands for. Why am i not in Guantanamo Bay yet? Obviously i'm a danger to humanity and probably a terrorist.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 1322
  6. 1323
  7. 1324
  8. 1325
  9. 1326
  10. 1327
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top