#hacking software
Explore tagged Tumblr posts
Text
Trinetra Detectives: Delhi's Trusted Private Investigation Agency
Trinetra Detectives knows about the growing problem surrounding spy software. These malicious programs can be completely hidden, running silently in the background and recording your keystrokes, browsing history, and even phone calls. Traditional methods might not be enough to get to them.
We understand the emotional stress that comes with infidelity. Our private investigator will handle your case with care and sensitivity. We use proven techniques to gather evidence, including surveillance, background checks, and digital forensics.
Have you ever suspected someone might be spying on your digital life? It could be that a competitor is after your business secrets, or a spouse might be keeping tabs on your online activity. Whatever the reason, spy software detection is very important for reclaiming your privacy.
Private investigator software is a powerful tool in our toolbox. These special programs allow us to look more carefully into potential leads and find hidden connections. When combined with our investigative experience, they provide a clear picture of who might be behind the spying and their motives.
This is where our expertise comes in. We go beyond basic system spy software. Trinetra Detectives takes advantage of advanced tools and techniques designed specifically to identify even the most advanced spyware. Our detailed investigation will leave no stone unfinished, checking your digital privacy is restored.
Our commitment to the best Personal Detective services goes far more than just investigations. We handle our clients with kindness and respect, understanding the sensitive nature of their situations. We'll keep you informed every step of the way, ensuring you feel confident and empowered throughout the process.
Are you experiencing stress in your relationship? Do you suspect your spouse might be cheating? Trinetra Detective Agency can help. We are a team of experienced and licensed private investigators specializing in investigations for cheating spouses.
Trinetra Detective Agency prioritizes your needs. We'll work closely with you to understand your situation and develop a customized investigation plan. Throughout the process, we'll keep you informed of our progress and findings.
Don't live in the shadows of suspicion. If you're in the Delhi area and searching for a private investigator for cheating near me, contact Trinetra Detective Agency today for a free consultation. Let us help you find the truth and move forward with confidence.
Don't go for anything less than the best private detective agency. Contact Trinetra Detectives today for a free consultation. Let our expertise and dedication help you find the answers you seek.
0 notes
Text
The Headline says it all, ha-ha-ha: “Vietnam tried to hack U.S. Officials, CNN with Posts on X, Probe finds”. Way to go, Vietnam!!! Too bad it wasn’t successful. Maybe next time, eh? ‘Mabuhay ang Vietnam!!!’ (Long live to Vietnam!!!)
0 notes
Text
#hacking#anime#hack#hacker#coding#programming#engineering#software engineering#javascript#javaprogramming#Cyberpunk#cyberpunk aesthetic#cyberpunk art#cyberpunk 2077#night city#futuristic
62 notes
·
View notes
Text
pro tip for programmers - how to alias
hey, so you know that annoying thing that happens when you're coding, and you need to run/test the same program 100 times in a row, so you end up typing "python3 testScriptWithASuperLongName.py" into the terminal about 80,000 times?
well, there's a better way! it's called aliasing :D
in your bash shell (or zsh, or whatever shell you use, but bash is the default on VSCode and most people on tumblr use VSCode, so I'm using bash as the default to explain this concept) you can set an alias, essentially a shortcut command, that runs longer commands.
(yes you can just use the up arrow key to re-run the same command, but sometimes you're typing other things into the terminal too and you don't feel like hitting the up arrow key four times in a row, and also this is just a cool and useful tip to get comfortable with aliasing so shhhh)
so, in your terminal shell, just type this:
alias run="python3 testScriptWithASuperLongName.py"
now, you can run that entire super long command, just by typing the word "run" into your terminal. Here's a screenshot of an example on my computer to make it make more sense:
in this example, i just created a simple python file that contains one line of code: print("it works!")
then, as you can see, by setting the alias to run, i can now run that file, runningatestscript.py, simply with the command 'run'.
the best part is, this alias is temporary - it only lasts as long as your shell session is open. so once you close the terminal, the run alias is cleared and you can set it again next time to any file or task you're currently working on, to save yourself a lot of typing, typos, and time.
so if you want to, you can get in the habit of always setting a run alias in the VSCode terminal for whichever file you're working with as soon as you get everything open. that way, when you need to run the same file 50 million times, you have a super easy way of doing it! you can even set it to a single letter if you want to go for maximum speed, but i prefer to use whole short words, because they're easy for me to remember.
note: if you do want to set an alias to work for all sessions, you can simply add it to your ./bashrc file. this is a common way to automate repeatable tasks, and simply to set easier-to-remember commands for terminal commands that are really complicated/confusing/hard to remember.
for example, i saved the alias checkboot="[ -d /sys/firmware/efi ] && echo 'UEFI mode' || 'BIOS mode'" into my zshrc file (zsh equivalent of bashrc file). this way, no matter how many times i rebooted my machine, i would always be able to quickly check which boot mode was running by simply typing 'checkboot'.
yesterday i was updating my boot mode from BIOS to UEFI on my very old machine that is technically compatible with UEFI, but not configured for it by default. So it was extremely helpful and saved me the time and headache of having to remember and type that long-ass command a thousand times in between many different reboots and new shells.
if you have any tasks like that, or terminal commands that you know would be useful to you, but you can never remember them when you need them, i highly recommend getting comfortable with aliasing! it can be super useful to simply set custom aliases for all the commands you don't want to remember, so that you can automate things away and not have to worry about so much linux syntax all the time when you're tring to focus on programming.
i know this may seem like a simple tip to some, but i only learned about it recently and it's been extremely helpful to integrate into my workflow and customize my OS with! so i thought it might be worthwhile to some people if i share :) hope it helps!
#codeblr#linux#hacker#compsci#hack the planet#hacking#studyblr#coding#progblr#programmer#programming#women in tech#women in stem#women in computing#women in cs#comp sci#coding tips#programming tips#software development#software developers#vscode
104 notes
·
View notes
Text
In his How To, he lists the skills hackers should acquire first:
Learn C.²²
Learn just a little bit of x86 assembler.²³ You don't have to be great at this at first, but you need to sort of kind of know what the fuck is going on.
Work through Hacking: The Art of Exploitation by Erickson.
Learn JavaScript.
Go through the big exploit archives. Star in the 1990s. Look through exploits. Figure out how they worked. Turn the clock forward to the modern era, so you slowly accustom yourself to newer exploitation techniques.
Get really good at x86 assembler, and learn IDA Pro and OllyDbg.
22. C is a general-purpose, machine-independent programming language that was used to write a range of well-known applications – from Windows operating systems to Oracle databases.
23. x86 assembler is a programming language used for time-sensitive applications and detailed software systems.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
#book quotes#going dark#julia ebner#nonfiction#andrew auernheimer#weev#how to#skills#hacking#c#programming#x86 assembler#hacking: the art of exploitation#jon erickson#javascript#exploits#archives#90s#1990s#20th century#exploitation#ida pro#ollydbg#time sensitive#software
52 notes
·
View notes
Text
USA 1997
#USA1997#INTERPLAY#SSI#DREAMFORGE INTERTAINMENT INC.#WESTWOOD STUDIOS#BEYOND SOFTWARE#RPG#LICENSED#DUNGEONS & DRAGONS#IBM#THE FORGOTTEN REALMS ARCHIVES#POOL OF RADIANCE#CURSE OF THE AZURE BONDS#SECRET OF THE SILVER BLADES#POOLS OF DARKNESS#EYE OF THE BEHOLDER#DUNGEON HACK#HILLSFAR#EYE OF THE BEHOLDER II THE LEGEND OF DARKMOON#EYE OF THE BEHOLDER III ASSAULT ON MYTH DRANNOR#MENZOBERRANZAN#GATEWAY TO THE SAVAGE FRONTIER#TREASURES OF THE SAVAGE FRONTIER
50 notes
·
View notes
Text
It's a trojan horsey! :)
16 notes
·
View notes
Text
Let's Play Hunter: The Reckoning |12| Carpenter's Rage
After a mad dash through the sewers after recovering from a slight mental breakdown, it's time to look for Arkady in Death Row. But before we do, we get to say hello to Carpenter one last time. Before we chop him up you see.
#hunterthereckoning #retro #horror
youtube
#Hunter: The Reckoning#2002#Hack And Slash#RPG#Tapletop RPG#TTRPG#modern#World of Darkness#High Voltage Software#Gamecube#Xbox#Interplay Entertainment#co-op#multiplayer#undead#hunter#vampire#zombie#ghouls#werewolf#horror#Youtube
2 notes
·
View notes
Text
In case anyone wants to know if I am officially an old man fish out of water I did in fact try to sell animation DVDs at the art show (this attempt did not go well lol)
#Stickers and comics it is!#Look I knew it was a bad business idea I just wanted to do it to learn how to make a dvd bc my dark secret is I like to make things#Impossible these days since no one makes free dvd software EXCEPT THIS ONE ANCIENT OPEN SOURCE PROGRAM#I had to hack the config files of to make my menus#It was an interesting process
4 notes
·
View notes
Text
How Does Google Traffic Hack Work
How to Sell Any Product or Service Using Free Google Traffic with
“Google Traffic Hack”
Selling any product or service online requires two main ingredients: visibility and targeted traffic. The more eyes you can get on your offer, the better your chances of closing a sale. But with ad costs skyrocketing and SEO becoming increasingly complicated, how can businesses consistently drive targeted traffic without breaking the bank? Enter Google Traffic Hack, a revolutionary software that allows you to generate free Google traffic to sell your products or services effortlessly.
In this guide, we’ll explore how you can leverage Google Traffic Hack to sell anything online, whether it’s physical goods, digital services, or affiliate offers, all while benefiting from free, high-quality traffic from Google.
👉👉Learn more details Google Traffic Hack
How Does Google Traffic Hack Work
#Google Traffic Hack#Google Traffic#How Does Google Traffic Hack Work#how to google traffic hack#Google Traffic Hack Honest Review#Google Traffic Hack Review#Google Traffic Hack Upgrades#How to Buy Google Traffic Hack#Google Traffic Hack Software
2 notes
·
View notes
Text
So I played one (1) game of doctor in the new lights out mode and got accused of hacking by the survivors lmaooooooo. Apparently they don't realize that doc got buffed so he moves faster when using his static blast. Oh and also? I CAN FIND YOU IN TIER 3 BECAUSE YOU'RE MISSING YOUR SKILLCHECKS AND REVEALING YOURSELF. ALSO DOCTOR HALLUCINATIONS. If you're in tier 3 and off in a corner, I will see if I'm running around the dark not finding people and looking around.
It's almost as if doctor's base kit is tracking survivors LMAO
They also gaslit themselves into to thinking I could see their auras and had no hit cooldown lmao. It couldn't be that I kept losing survivors and hearing gens being worked on oh no. The whole hit thing and aura was straight up them making shit up holy shit lmao.
I got reported lmao
check it out
I really wish I had saved my side of it
#behavior: we buffed doctor and made him faster when using his power#survivors: IS THIS SPEED HACKING???#dead by daylight#dbd#also i'm pretty sure the most 'cheating'#people can do on PS5 is like lag switching right?#I've never seen outright cheaters with 3rd party software on PS or Xbox
3 notes
·
View notes
Note
Hello, im wehaveagathering from my main blog, im kind of obsessed with your hockey poetry edits and I think your blog is great! I guess I kind of have a dumb question, where do you find the images you use for your edits? Did you say Getty in your tags?? I’ve gotten into making icons recently (and i have ideas for poetry edits hrrrghhh) but it’s hard to find high res images. Thanks for your time and I hope you have a nice day :)
first of all thank you so much 🥹 and second that’s absolutely not a dumb question!! i do pull a lot of images from getty and i’ll also download pictures from sports articles (i got a lot of the hugheses pictures from online access articles, for example), or sometimes from instagram/facebook/twitter if an account is public. freely admitting that i am not technologically advanced? inclined? in the slightest here, but the image editing software that you use and how you import/export photos with it makes a difference in the quality of them as well!
if you haven’t seen them yet, i would also recommend checking out @simmyfrobby @national-hockey-lesbian @hauntedppgpaints @tapedsleeves @starscelly and @captainbradmarchand’s blogs just off the top of my head!!! they might know more places to get high res images and also i love their work 💕🫶
#sorry can’t type hands all butterfly hearts i’m just out here like 🥰🥰🥰🥹🥹🥹😭😭😭💕💕💕#@ everyone i tagged ty i love you i hope you don’t mind the tag 😘 also i KNOW i am unintentionally forgetting people so tag them at will#forgive me i am eepy. we are running on <4 hours of sleep and over 18 hours awake 🫡#liv in the replies#join the club!!! join the club!!!!! we love the hockey poetry edits!!!!!! i’m so excited to see what you create!!!!! :)))))#the process of me finding images is very much like. either i have a vision in my head and i troll getty looking for it or my screenshots#if i know i have one l m a o but either way i am always 68 pages deep in a hyper specific search labeling my photos like ‘ohHHH buddy’#‘menace 1 abd 2’ ‘but he’s not a cup winner’ ‘ohhhh the nolpat media scrums are rich earth’#‘because WILLY WON’T CUT HIS HAIR’ ‘deJA FUCKIN MILK BAYBE’ ‘is it truly sn edit if u don’t find a devastating baby pic’ ‘yes MF last line’#and so forth. like. glad it’s comprehensible to ME but if anyone else ever tried to use these photos based on file name alone i am so sorry#also i forget that y’all can’t see all of the metadata notes on photos to know where they’re from :/ i gotta be better abt making it clear#also on the note about image quality i just need to state for the record i am so photoshop whatever illiterate.#i learn one (1) new trick on GIMP a year maybe two if i am lucky & no i have never figured out consistent sizing 🫡 but the one hack for res#i HAVE figured out is that when i do edits i usually make a whole doc w/the poem lined up on it (helps me keep somewhat consistent sizing)#and then i export that document as a pdf and edit the pdf in the software instead of trying to screencap or jpeg or anything. PDF quality >#that is probably so convoluted lol if anyone has tips please lmk i am always learning#ANYWAY. rambling u did not ask for but is inherent to Me.#have a great day too!!!!! you literally made mine so 💕😭#wehaveagathering#indecisor
9 notes
·
View notes
Text
i actually think hatori is more of an electrical/hardware engineer than an informatics/information technology/software engineering person
#from the fanbook - he says he has the ability to ''flip switches he isn't supposed to''#in other words - 1s and 0s and currents#off and on#i think at the very granular level that's the mechanics of hatori's power#and i mean this is applicable to computer science and IT - but not that much#the electrical and hardware manipulation is VERY abstracted away into programming languages#and im of the opinion that hatori... doesn't know how to program computers#also when we see him demonstrate his abilities they are either hacking drones and helicopters that are likely programmed in lower-#-level languages and place a larger emphasis on electrical engineering#or hacking radio waves which i mean that's still some sort of off-on thing#the software engineering route of changing ports n permissions n stuff is.. i think not hatori's thing#but who knows... i really like hatori infosec interpretations... its just that i also think in canon he's an electrical engineer type guy#(not shitting on electrical engineers - infact i think they do better stuff than me - the loser infosec guy who can't do physics#to save his life)#my post canon hc for him is that he cleans up and goes to post-secondary school and finally learns the theory behind all of the stuff#-he CAN do#i think he'd unlock a lot of potential that way#but what do i know i am just speculating on the mechanics of psychic powers#milk (normal)#hatori tag#ah this is just me rambling i wanted to get the thought out
13 notes
·
View notes
Text
Just press THIS button?
“Reset, readjust, restart, refocus. As many times as you need to.”Thank Alan Watts for this helpful life hack…Thank Microsoft & CrowdStrike for the same idea for yesterday…sort of.You get “any” work done?
View On WordPress
#advice#blog#computer#crowdstrike#hack#idea#laptop#life#metaphor#microsoft#quote#refocus#reset#restart#software#Watts#work
2 notes
·
View notes
Text
I miss pokemon mystery dungeon. are there multiple for the 3ds? if so which should I try to find?
#3ds specifically bc i hacked mine and i can play roms on it#but i dont know how to play DS games on it yet it requires moee fucking w the software that i dont wanna do rn#ratt squeaks
7 notes
·
View notes
Note
👀👀 rlly interesting read on ovan, would love to hear some abt ur hcs on him n corbenik
(Now on DW!)
So it's been a hot minute since I watched Terminal Disc so my memory of the details of the canon are very vague, but I definitely think it's likely that the Epitaphs attached themselves to players in reverse numerical order, making Ovan the first and unintentionally the template for how becoming an Epitaph-PC would play out.
Corbenik is sort of funny as a Phase because the way it's laid out in the Epitaph, Corbenik serves no function until the Wave wipes out its intended target, and it's left behind to observe the void. As long as the system state isn't disturbed and no new AI begins to emerge, Corbenik stays passive theoretically forever -- but once it is disturbed, it rouses the rest of the Wave to come clean up what was left unfinished.
(I recognise this isn't how we see it play out in R1, I'm basing this on the idea that Morganna designed the Wave to be essentially self-propagating against Aura. The stalemate is the point, the rolling waves razing any fertile ground for her to develop on in favour of perpetual despair and the call of the void.)
With Corbenik as the rearguard of the apocalypse, it could have easily been the most active (least inactive?) of the Phases during the period of calm after Aura takes over Morganna's duties -- with no AI competing with Aura available to suppress, it was essentially on standby, latching onto Ovan the moment he showed up and then doing nothing until it registered the AIDA that also attached itself to Ovan.
Which is the thing that really fucks Ovan over, I think. The body timeshare he has with Tri-Edge is stressful enough, but Corbenik is also perpetually making him identify himself as the greatest threat to system integrity. So he's essentially getting a triple dose of the Epitaph "the solution is Fucking Kill Yourself" heightened self-destructive urge -- from the nature of the Cursed Wave, from the Vagrant AI-fication of the Phases and being (in part) his own natural-born enemy.
On top of this, Corbenik is perpetually calling to the other Phases like "over here! I've identified the enemy! Here is an AI we need to stop from reaching self-actualisation!" So candidates are drawn to him, unconsciously recognise him as having seniority, and then immediately identify him as the threat to be eliminated. People keep forming a kind of proxy disordered attachment to him, feeling compelled to follow his orders but also feeling threatened by his presence and become driven by the urge to destroy him.
Haseo is particularly vulnerable to this because Skeith and Corbenik are so intertwined in their roles, the first Phase is the one the last calls the strongest, and his personal sense of betrayal only amplifies the destructive resonance. And the influence goes both ways, the more Skeith perceives Corbenik's host as the main threat, the more Corbenik calls on Skeith as the vanguard to eliminate that threat. Haseo's (perceived) perception of him directly influences Ovan's perception of himself -- with everyone else Ovan is very particular about asserting his own reality, but with Haseo, the way Haseo sees him takes priority over how Ovan sees himself.
#van's answers#anonymous#dothack#.hack//g.u.#Ovan#Avatar Corbenik#GU spoilers#<- for my friends who are still playing the games#I have a lot of feelings about how the Cursed Wave is basically the software version of weaponised depression#And about how the games are overall very clear about how happiness and emotional connection aren't frivolous but rather essential to life#Corbenik as the 8th Phase is the pure distilled idea of 'there is a way out and it's by dying in your egg without ever hatching'#and it's supported by the other Phases in creating a vision of the world that has nothing worth living in it#as much as you're afraid of death -- look. See. What else is there?#They're out-of-proportion feelings of doom aimed to keep a consciousness that vastly exceeds human comprehension from having any hope#AND CC CORP JUST FUCKING SLAPPED THEM INSIDE SOME PCS AND GAVE THEM TO PLAYERS LIKE 'here you go! Here's your Personal Cataclysm Gun!'#The real enemy in dothack is closed source software development and corporate vanity
5 notes
·
View notes