It could loopback to you…
It could loopback to you…
the commercials that have already been paid to the company are still showing, so that ad revenue is still being capitalized.
That’s not how it works though. You are not accounted for watching the ads over a pirate stream…
Also people regularly spend more than they can afford.
When you think about it the fact that you can quite easily borrow money you clearly will not reimburse which is kind of an infinite money Glitch for capitalism.
Thanks ! That’s exactly how I think it could be implemented but that confirms that this is certainly not something you can find commonly where I live.
That confirms the fact that if you use the same wifi and everyone has entered the same encryption key then there is no real client isolation…
It’s cool that wifi keeps evolving. It comes a long way from the WEP beginnings.
Do you have any documentation on how this work ? Is there a name to this special protocol? Is it a recent addition to the wifi standard ?
Again a wifi AP doesn’t send data to a specific client. So how does an AP can enforce that one client can’t read a frame for someone else that is properly authenticated? How would an AP prevent someone spoofing mac addresses from receiving that data ?
I’m really confused by this feature I never heard of even when I was playing with aircrack and so on. Yes sometimes your mac address can get filtered but even that is not really difficult to avoid.
Sorry I have so many questions but I honestly did quite some “tinkering” with wifi years ago and none of this sounds familiar.
I have no idea what this client separation is.
As far as I know there isn’t really any client separation on wifi. It’s a shared medium.
At least I don’t see anything preventing you from reading someone else traffic. So anything unencrypted on a wifi is also accessible to any other clients.
I had tools more than 10 years ago that could automatically hijack session cookies on wifi for anybody connected and not using https.
Edit: I know, I shouldn’t give a shit. But writing a fairly long comment to share my knowledge on this only to see it immediately downvoted without any explanation kind of sucks. So I’m removing this comment and will not interact here anymore.
* in 360p.
Also if you put “sensitive” information in your history by mistake you can use “history -d <line#>” to remove it.
Unfortunately I had to use this command too many times.
Seriously, some people are that good that you know they could do almost anything very well in a matter of days.
So why not ? I always have a lot of respect for someone that is willing to drastically change their lives in order to improve.
If you do self host I suggest reading carefully the Gmail guidelines for mails. They are the leaders in the field and they dictate the level of security required.
DNS forward and reverse, DKIM, SPF, DMARC, ARC, DANE, bounce signature etc. Email is indeed a very complicated thing to host. I work on emails system all day and and I wouldn’t host my own mail.
Even worse I’m hoping email disappear and another technology takes it place. Emails are unreliable and outdated, they need to go.
Honestly, the only good advice is to consult a doctor.
Is it possible that this password was really your gf’s password in the past ? It could have leaked long ago and the hacker just decided to use a previously leaked pass to be more inconspicuous.
I don’t think this whole story is so wild, it could be just coincidental. The hacker knew somehow about her DOB and thought this would be an easy password.
Rest assured a hacker wouldn’t want to use their own password or reuse even one as that could link to previous nefarious activity. So they had to set up a brand new password just to move forward. So they set up anything personal they could get their hands on.
PS: you should check haveIbeenPwned for the address of your gf.
Zabbix still remains a good choice imo. It works fine with Grafana et now the Zabbix-grafana plugin is officially supported by Grafana.
Zabbix without Grafana is pretty weak in term of visualization.
Same devs as the Nvidia driver installer?
I always select the custom install option and always get recommended the same version that is already installed.
(Physics engine or something).
Oh no you have to say it out loud EVERY time ?
We also have that in France.
Some peers on torrents are indeed tracking uploaders. Here you receive a letter saying which file you shared and when.
Blockbusters are the most likely to be tracked.
For me I avoided that system with alldebrid’s sort of seedbox. And direct download with alldebrid.
Here as far as I know, a datacenter IP is free to download anything and everything on torrents… Which it then uploads to DDL sites for me. And since they can’t don’t track DDL it’s safe.
So install truck brakes on the luggage then use brake cleaner. Got it.
Thank you for the advice.
As far as I recall he actively seeks to commit cybercrimes and even says so himself.
It’s not the first young hacker on the spectrum that has urges to hack stuff.
It’s a whole different question when someone is conscious he is doing something illegal and actively seeks to do it.
This is not another Aaron Swartz story imo. It’s an autistic individual that doesn’t hack out of curiosity but in order to damage businesses, and people or benefit himself.
My strategy with paywalls is to close the tab and go somewhere else. It works fine and is a great way to let the website owner this bullshit make them lose viewers and visibility.