Fun fact: Browsing Google results is considered "hacking" by the french law if the website's owner decides that the result was not supposed to be indexed (it is considered an "intrusion into an automated system")
@@rpe There is also that American person, who found security numbers in a government (or school, id remember) site encoded in base64. He report it that it is unsafe, and they accused him of hacking. Anyway he is fine.
@@xrafter I know about this, but let's forget about the details for a bit to consider that "hacking" someone without harm and then sharing the details with the subject of a "hack" is more security research than hacking and should be rewarded... It's not like picking a front door lock and filming someone naked just to tell the to change the lock.
Thank you for pointing out that this really ISNT hacking. It bothers me when people call cyber crime actions "hacks" because that's not what it is at all.
Funny how the tool he was showing has a Russian interface. Being a Russian developer myself I can tell we sometimes have better internal tools compared to what we ship to clients/customers. That being said, I condemn the scammers behind it and wish they used their talents for creating the legal business instead.
Gotta love that ChatGPT prompt in the end where you told it to replace "Do X not crime" with IT, hacking, cybersecurity or computer science related terms and the 4 first results it spat out were Do IT not crime Do hacking not crime Do cybersecurity not crime Do computer science not crime ...and then you proceded to say that "ChatGPT said 'do hacking not crime'"
@@coolestguy94 i wasn't gonna say the name. I remember people from cheating communities telling me this is where they buy accounts from cheaply and cheat on CSGO with them.
Well, you can do some game hacking that also modding, And vice versa. However, you might not call it hacking which is fine. Some game hacking is craking games code to find bugs to bypass certain workaround to gain big rewards. sometimes u don't even need game code you just jump around and try to find bugs.
In Asia, most of the law enforcement messed up the words “hacking” == “cybercrime”, their concept is fundamentally wrong. Thank you so much to pointing it out. We hack, therefore we are.
Have always called the users of these "proggys" "script kiddies." Though it is a funny how unaware the kiddies are of the backdoors they themselves now have opened on their own systems when using the proggy but that's another topic all in itself, can't say they don't thoroughly deserve what they get though. Being the example you pointed out I guess you could say "Proggys as a Service" now.
Maybe you will make a video about minecraft cheating comm? Recently there were ppl fedded so maybe it's interesting enough for a video. Great content btw
somehow the camera footage looks to me like it was weirdly stretched in the vertical direction or cropped somehow. I don't know what it is but something feels just off... (not only in this video, but also in the past)
While I agree with the sentiments shared, it's a bit "age-ist" (not trying to condemn, just pointing out a generalization) to assume teenagers are the the ones doing this (I think it would help to point out how they're targetted to be the primary audience, maybe if that were the case?). We're all equal opportunity schmucks! lol
Dunno it doesn't happen often but if like someone find a vulnerability to take complete control of a system. And then use it on a megacorperation and leak all the totally legitimate definitely not at all questionable things there doing.. id still call that hacking
Can someone explain, if exploit dev is slowly dying because of the migration to more secure programming languages + whatever other reasons, doesn't that mean that hacking in its entirety is going to die along with it? Exploit dev is the root of all hacking isn't it? The exploit developers are the real hackers that develop the exploits that the rest of us just use in our day to day jobs as pentesters, red teamers etc.
I used to talk people's ear off about this in the 80s, growing up not to far from MIT, not long after WarGames came out. The battle was lost back then. You might call it the greatest hack ever, convincing the public that ingenious programming and computer crime were both "hacking", and that one might even imply the other! First it was the media, who wanted sensational headlines, and the public bought in. I'm not sure why anyone is still tilting at this windmill. It's over. Hacking implies cybercrime now. You need to find a new word.
my phone is doing a wired thing on its own out of the blue is it hacked as I am good with tech but not at this level advice from you or viewers would be nice
Without knowing what your phone's doing in more detail, it's impossible to say for certain. But it's highly unlikely that your phone has been "hacked"; in the worst case, it's just been infected with malware.
@@OpenKeith well to be open with you it working on it own opening random things sometimes the screen is frozen for short time then when I hit the power button then it goes back to normal it has been happening for some time now ps is there any email you have might have I can send some screen recording I made on this any help would really help me out as it my work phone
My phone can be touched by my breath. Try to breathe on your screen, if it does it then your screen is just sensitive to breathe and it can react to it but if not, then you downloaded a malware which broke your phone. If it is the second I suggest you to choose "wipe all data" in phone's settings but before this you have to save important information that your phone keeps because everything is going to be erased and your phone will start as if you first bought it
I used to accept every friend request on steam, wait for them to message me with their spam and then use a simple script to flood their backend with random generated but legitimate looking logins by using a dictonary of words and names. Now that I've learned that they seem to validate the credentials before storing them I feel a bit dumb :P
honestly not a bad idea still because it would still take them a little longer to find valid credentials. having used to have cracked fortnite accounts and sold them it all depends on what proxies theyre using to check the accounts (which only if theyre buying this tool theyre probably pretty good) so if u kept your script running for a while it would most definitely piss them off lol
This video should be shared everywhere. Liveoverflow's teachings are what kept me from doing stupid things when I was younger. If he never provided insight like this, I would've lost myself in those forums and chatrooms instead of finding the beauty in hacking. It's videos like this that I think more people need to see. Demystifying the actions of these script kiddies is the best thing we can do for our technologically oriented youth.
One question, I assume if you can find access to the crime forums and go through all the security processes, you'll have at least some knowledge of the web, so why couldn't you create the website yourself? Seems like you'd have to be pretty tech savvy to find those forums.
The forum shown in the video is quite popular in Russia. It is advertised on a variety of RUclips channels and some of them have nothing to do with IT. Also the forum itself is on the clearnet. So there may be people who don't know much, but want easy money And why do it from scratch if all the sites and tutorials are already provided
This isn't 'hacking'. This is social engineering. (as far as your example) But, people think that no matter what what crime, if it has to do with a computer, it's hacking.
Debatable, social engineering is hacking the human psyche and using the results against the intended victim. Hacking, in the general sense, is making a thing do something for which it wasn’t intended.
What about these people that are buying cheats and destroying everybody in a videogame? Do you think it's okay to call them hackers? Personally I'm always really annoyed when I see people calling them Hackers!
@@Reth_Hard The ones who buys hacks aren't hackers. You can call them cheaters or users of a mod menu. The one who made the cheat can be called hacker, modder, master. The one who makes are generally more dangerous since he is the one making the stuff, and he can pay people to use it to ruin a game, or a service. They can also make it as a service, which means they sell it to others.
@LiveOverflow but... Social Engineering is STILL hacking. It's non technical hacking but still hacking. And phishing is just one type of social engineering attack. You're right Hacking is not always a cybercrime and Cybercrime is not same as hacking. But the example you gave, was a bit narrow in my opinion. If not done with permission, Phishing is cybercrime is social engineering is hacking. Phishing fits all categories.
I mean *some* cybercrime is definitely hacking. I mean when you hear stories of stuff like committing insider trading by breaking into news wire agencies or researching zero days in order to crack ATMs its hard not to call that hacking.
@@DoubleOhSilver Well yeah duh my point is just that some cybercrime is hacking. In fact saying that cybercrime != hacking is a bit ridiculous considering how most of the early hackers (Wozniak, Cpt Crunch, Mitnick the CCC etc) were all definitely committing crimes.
@@zaper2904 the crimes they were committing were all copyright and licensing issues. They were creating a new computing age with software that competed with the top dogs of the time. They weren't trying to phish for information like credit cards or gaming info (even if it would have been a thing at the time.) It's just not comparable.
@@3v068 Breaking into companies and stealing source code getting free international phone calls and in many cases taking down telephone exchanges due to negligence is just "copyright and licensing issues"?
@@DoubleOhSilver I'm saying that while I can see why LiveOverFlow might say that cybercrime isn't real hacking because most people that watch his channels are probably beginners who genuinely might try to download SET and trick their friends into giving them their Snap-chat login in reality everything but the most bottom of the barrel PAAS and RAAS operations still do involve actual hacking. Hell even with a very generic RAAS operation while the affiliate of the cybergang and the gang itself might not be hackers the initial access vendor they probably acquired access from into the company network is an actual hacker.
Introducing the QuirkyClip™ Collection by SpaceX, a unique blend of the original clip art's shortcomings and the spirit of space exploration. This collection doesn't try to be cool or impressive; it simply embraces the limitations of traditional clip art while incorporating a space theme. Here's what to expect from the QuirkyClip™ Collection: 1. Pixelated Charm: The QuirkyClip™ Collection features low-resolution, pixelated images reminiscent of early digital design. These images have a certain nostalgic appeal, and they'll certainly give your projects a distinct, retro look. 2. Silly Imagery: The collection includes a variety of comical, offbeat images inspired by both SpaceX's achievements and the whimsical nature of old-school clip art. These designs are perfect for adding a touch of humor and lightheartedness to your projects. 3. Limited Selection: The QuirkyClip™ Collection comes with a small, curated library of space-themed designs. The limited selection encourages you to explore your creativity within these constraints and challenges you to make the most of the available designs. 4. Compatibility Challenges: This collection stays true to the compatibility issues that were common with old clip art, requiring you to find inventive ways to integrate these designs into your projects. It's a fun, creative challenge that harkens back to the early days of digital design. The QuirkyClip™ Collection by SpaceX is for those who appreciate the original clip art's limitations and want to incorporate them into their creative projects. This collection doesn't pretend to be cutting-edge or sophisticated; it's simply a fun, nostalgic nod to the early days of digital design with a space exploration twist. If you're looking for something different and enjoy a creative challenge, the QuirkyClip™ Collection may be just what you need.
that page template looked a lot like the elon musk cryptocurrency scam one. specifically the one that was linked when peeps fucked with linus tech tips yt account. also i'm kinda surprised i recognized that forum. probably cuz the color scheme is quite unique lmao.
Someone tried to do this to me just a few days ago. They wanted me to vote for their team in a CS tournament. As soon as it requested my steam login I knew it was fake.
Read “Hackers: Heroes of the Computer Revolution”, they spend a good amount of time on the definition. It goes back to MIT and the Tech Model Railroad Club there. I came up in a period, the 80’s and 90’s, when it was considered a term of endearment. The press destroyed it, and there’s no going back.
Hacking means to use your ability in a way that is new and wasn't accounted for. Hacking is not necessarily a thing only in Computer Science, but in every other discipline too. You can be a hacker in your kitchen by doing something that was never accounted for and using loopholes to create a new dish or an existing dish by using a very different recipe.
I love your videos, they are always informative and inspirational. However I have to disagree with you on this one. I don’t think you can redefine a word because you don’t like how some people use it. Hacking is an action, by the definition you used, attacking a system to cause corruption, or learning systems through disassembly and probing. Hacking doesn’t care about intent. If you use exploits to learn about and gain access to an operating system you have in an virtual machine, that is hacking and it is legal. Now if you do the same thing but to your bosses computer, you can learn just as much, but it is illegal, and is a cybercrime. The exact same thing done on two different computers, both are hacking, one is a cybercrime, the other is not. Not all hacking is cybercrime, but ‘most’ cybercrime involves hacking. That’s because it’s hard to do crime on a computer without involving some kind of attack on a system you don't own. However I kinda agree with you on whether or not phishing scams are hacks or not. There is a big push to separate hackers based on intent. That’s what ‘white hat’ hacking vs ‘black hat’ hacking is. Both are hacking but one has malicious intent, the other doesn’t. Another term that’s being used is ‘ethical hacking’. The reason is because ‘black hat’ hacking has given hacking a bad name, so the terms white hat and ethical hacking are used to bring more people into the world of hacking while trying to get rid of the crime stigma that hacking has. And I feel it is better to call yourself a white hat hacker, or an ethical hacker then it is to say that any hacking that is also a crime is not hacking.
Apparently editing a public Google doc is also considered "hacking" today, google news says...
Fun fact: Browsing Google results is considered "hacking" by the french law if the website's owner decides that the result was not supposed to be indexed (it is considered an "intrusion into an automated system")
@@gusfl2 to be expected, they're french after all xD
@@rpe
There is also that American person, who found security numbers in a government (or school, id remember) site encoded in base64. He report it that it is unsafe, and they accused him of hacking. Anyway he is fine.
@@xrafter I know about this, but let's forget about the details for a bit to consider that "hacking" someone without harm and then sharing the details with the subject of a "hack" is more security research than hacking and should be rewarded... It's not like picking a front door lock and filming someone naked just to tell the to change the lock.
Thank you for pointing out that this really ISNT hacking. It bothers me when people call cyber crime actions "hacks" because that's not what it is at all.
It's only because of media, "Massive Rockstar hack by teenager" gets more clicks than "teenager uses a re-used password to access a group chat"
As a red teamer, I wish our internal phishing tools were this nice.
Be the change you want to see!
LOL I was thinking the same. I've made a few automation tools in python to help build a portable attack infrastructure. Nothing this fancy though!
@@noxxum dont mind if i take a look on this tools?
wget --page-requisites is your friend 😂
Funny how the tool he was showing has a Russian interface. Being a Russian developer myself I can tell we sometimes have better internal tools compared to what we ship to clients/customers.
That being said, I condemn the scammers behind it and wish they used their talents for creating the legal business instead.
This is a very cool to new flair to get into on your channel; awesome work :)
hi
@@appie776 🤣 ikr, i just watched kali purole and then i saw this video... now he is here
As someone who combats this on the daily, This is such a good video, really informative. Thanks for this video LiveOverflow ♥
@@hello-iw9pd Such sweeping blanket statements are only good for intellectually lazy jokes, but I don't see anything here granting that joke.
Gotta love that ChatGPT prompt in the end where you told it to replace "Do X not crime" with IT, hacking, cybersecurity or computer science related terms and the 4 first results it spat out were
Do IT not crime
Do hacking not crime
Do cybersecurity not crime
Do computer science not crime
...and then you proceded to say that "ChatGPT said 'do hacking not crime'"
I hope your move went well without issue, glad to have you back making great content as always!
And Microsoft wanted to hide the address-bar some time ago.
That marketplace looks familiar. Does its name start with "L" and have four letters?
leez
yes
lolz team, yes
@@coolestguy94 i wasn't gonna say the name. I remember people from cheating communities telling me this is where they buy accounts from cheaply and cheat on CSGO with them.
I see Russian language in UI - I know this will be some kind of scam or hacking
Reminds me how people call me a hacker when ever I'm coding or modding a game.
Well, you can do some game hacking that also modding, And vice versa. However, you might not call it hacking which is fine. Some game hacking is craking games code to find bugs to bypass certain workaround to gain big rewards. sometimes u don't even need game code you just jump around and try to find bugs.
Hey man love the videos. Random question.. Where’d you get that crew neck? it looks really comfortable haha
In Asia, most of the law enforcement messed up the words “hacking” == “cybercrime”, their concept is fundamentally wrong.
Thank you so much to pointing it out.
We hack, therefore we are.
Hackers are motivated by their curiosity but criminals just want sensitive data no matter the method they use
It's so sad to see that Criminals are more organised than civilians
Have always called the users of these "proggys" "script kiddies." Though it is a funny how unaware the kiddies are of the backdoors they themselves now have opened on their own systems when using the proggy but that's another topic all in itself, can't say they don't thoroughly deserve what they get though. Being the example you pointed out I guess you could say "Proggys as a Service" now.
The way he is defending "hacking" and talking about its beauty was on another level 😂
Your argumentation against the usage of the word "hacking" is flawed. You say it can't be hacking because it's criminal.
Maybe you will make a video about minecraft cheating comm? Recently there were ppl fedded so maybe it's interesting enough for a video. Great content btw
somehow the camera footage looks to me like it was weirdly stretched in the vertical direction or cropped somehow. I don't know what it is but something feels just off... (not only in this video, but also in the past)
the add of your font sounded like an ad for a vpn service
Learning: every
I hope this saved some of those kids from being the 21 century equivalent of pickpockets
How did you create the font? What programs did you use?
calling this hacking is akin to calling people who use cheat menus in videogames hackers.
Never seen such a beautiful phishing tool
ох уж эти russion "hackers"
Нет!! Нет!!
Phishing is about the lamest thing someone can do.
While I agree with the sentiments shared, it's a bit "age-ist" (not trying to condemn, just pointing out a generalization) to assume teenagers are the the ones doing this (I think it would help to point out how they're targetted to be the primary audience, maybe if that were the case?). We're all equal opportunity schmucks! lol
I prefer to use ESR's definitions and refer to cybercrime as cracking and everything else that doesn't fall into the crime category as being hacking.
Dunno it doesn't happen often but if like someone find a vulnerability to take complete control of a system. And then use it on a megacorperation and leak all the totally legitimate definitely not at all questionable things there doing.. id still call that hacking
I encountered the same page as they tried to hack me through steam. I understood that it was fake through an image in the "https" part of the url
haha classic SKID phishing :(
btw: typo in der beschreibung, beim twitch link
Hello from Russia
So familiar site xd
Привет работяги, хуле он контору палит то
Внатуре
ряльна
Можешь прислать адрес, я его потерял
@@devincartwright3309 zelenka tochka guru, но он щас лежит вроде.
вооот оно форум истинной свободы !
This seems more like category social engineering than “hacking” for sure.
Short answer it is basically like the Mafia, but online, so Cybermafia
I reported to youtube 3 such scamming attempts...not sure if the channels were banned.
Can someone explain, if exploit dev is slowly dying because of the migration to more secure programming languages + whatever other reasons, doesn't that mean that hacking in its entirety is going to die along with it? Exploit dev is the root of all hacking isn't it? The exploit developers are the real hackers that develop the exploits that the rest of us just use in our day to day jobs as pentesters, red teamers etc.
identify scam webs and how to make it sustainable economic bussyness. with out random exploting data mining
Cybercrime world is bigger than i thought lol
So cybercrime is sometimes hacking but most of the time is not
I used to talk people's ear off about this in the 80s, growing up not to far from MIT, not long after WarGames came out. The battle was lost back then. You might call it the greatest hack ever, convincing the public that ingenious programming and computer crime were both "hacking", and that one might even imply the other! First it was the media, who wanted sensational headlines, and the public bought in. I'm not sure why anyone is still tilting at this windmill. It's over. Hacking implies cybercrime now. You need to find a new word.
my phone is doing a wired thing on its own out of the blue is it hacked as I am good with tech but not at this level advice from you or viewers would be nice
Without knowing what your phone's doing in more detail, it's impossible to say for certain. But it's highly unlikely that your phone has been "hacked"; in the worst case, it's just been infected with malware.
@@OpenKeith well to be open with you it working on it own opening random things sometimes the screen is frozen for short time then when I hit the power button then it goes back to normal it has been happening for some time now ps is there any email you have might have I can send some screen recording I made on this any help would really help me out as it my work phone
My phone can be touched by my breath. Try to breathe on your screen, if it does it then your screen is just sensitive to breathe and it can react to it but if not, then you downloaded a malware which broke your phone. If it is the second I suggest you to choose "wipe all data" in phone's settings but before this you have to save important information that your phone keeps because everything is going to be erased and your phone will start as if you first bought it
6:26 ... to be fair, as seen at 6:16, they are using Windows. They probably can't hide from anyone who wants to go after them 😂
I used to accept every friend request on steam, wait for them to message me with their spam and then use a simple script to flood their backend with random generated but legitimate looking logins by using a dictonary of words and names.
Now that I've learned that they seem to validate the credentials before storing them I feel a bit dumb :P
honestly not a bad idea still because it would still take them a little longer to find valid credentials. having used to have cracked fortnite accounts and sold them it all depends on what proxies theyre using to check the accounts (which only if theyre buying this tool theyre probably pretty good) so if u kept your script running for a while it would most definitely piss them off lol
@@vices816 😂 it is automatically process. If you give them invalid log they didn't put it in base
This is a great idea for my portfolio. Thanx
This video should be shared everywhere.
Liveoverflow's teachings are what kept me from doing stupid things when I was younger. If he never provided insight like this, I would've lost myself in those forums and chatrooms instead of finding the beauty in hacking. It's videos like this that I think more people need to see. Demystifying the actions of these script kiddies is the best thing we can do for our technologically oriented youth.
Cyber crime im engeren Sinne oder im weiteren Sinne?
This guy is stoned in every video look at his eyes
I agree immensely.. Theres stupid kids going around calling themself "hackers" bc they can Skid a Stub off github LOL
I have always used the word hacking so it’s hard to break a habit
It's the same thing when pleb teenagers buy cheats from shady russian forums and everyone calls them hackers.
Зачем заработок фишеров убиваешь? У тебя же после таких приколов канал угонят
Real hacker don't use steam
настроить api :skull:
оглядывайся на улице :)
Push!
Excellent..
Uproject
@liveoverflow, please pin the url for reporting phishing sites in the comments. thanks
всем нашим ку
The modern script kiddy :D
One question, I assume if you can find access to the crime forums and go through all the security processes, you'll have at least some knowledge of the web, so why couldn't you create the website yourself? Seems like you'd have to be pretty tech savvy to find those forums.
The forum shown in the video is quite popular in Russia. It is advertised on a variety of RUclips channels and some of them have nothing to do with IT. Also the forum itself is on the clearnet. So there may be people who don't know much, but want easy money
And why do it from scratch if all the sites and tutorials are already provided
Xed
Steam scam. Russians of course 😆
U prolly Ukrainian.
AHAHAHHAH IM USER THIS PANEL
big fan
Dude, they have been calling cheaters "hackers" for like ten years now. Kids have no respect to semantics.
I create content on hacking and cyber crime
Im third 🎉
Hmm orcish language, cyber crime well well well
1+1 != 2
?
why censor the sites?
dm me if you want the site 3:00
btw the forum is named zelenka guru ummm im totally not giving you guys directions
This isn't 'hacking'. This is social engineering. (as far as your example) But, people think that no matter what what crime, if it has to do with a computer, it's hacking.
It is just good old fraud…
Debatable, social engineering is hacking the human psyche and using the results against the intended victim.
Hacking, in the general sense, is making a thing do something for which it wasn’t intended.
What about these people that are buying cheats and destroying everybody in a videogame? Do you think it's okay to call them hackers?
Personally I'm always really annoyed when I see people calling them Hackers!
@@Reth_Hard
The ones who buys hacks aren't hackers. You can call them cheaters or users of a mod menu.
The one who made the cheat can be called hacker, modder, master.
The one who makes are generally more dangerous since he is the one making the stuff, and he can pay people to use it to ruin a game, or a service. They can also make it as a service, which means they sell it to others.
@@Reth_Hard if they cheat in a game they are cheaters
As a dude who hates the term "my account got hacked", this really hits hard with my opinion on this, brilliant video!
Ooh, I can finally "use a secure font". One more step of the xkcd security recommendations complete :p
Let me download it real quick... it will increase my security like 10vpns i bought
cool minecraft chunck unloading hashmap profile picture!
@@eswee6780 It's just the bitwise xor of the X and Y coordinates, didn't realize this pattern also showed up in Minecraft chunk loading!
Wie immer ein geniales Video, welches gesellschaftliche Aufmerksamkeit auf ein international immer noch zunehmendes Problem lenkt
I don't speak Deutsch. Can you translate. I don't have translate feature anymore.
These unskilled workers will graduate to top tier Microsoft support employees.
@LiveOverflow but... Social Engineering is STILL hacking. It's non technical hacking but still hacking.
And phishing is just one type of social engineering attack.
You're right Hacking is not always a cybercrime and Cybercrime is not same as hacking. But the example you gave, was a bit narrow in my opinion. If not done with permission, Phishing is cybercrime is social engineering is hacking.
Phishing fits all categories.
How on earth have I asked myself this question yesterday?! It was exactly: "Why is Hacker News called the way it is?"
Oh great now we've got AI Ad reads, whats next AI generated Videos?
AI generated ads?
I mean *some* cybercrime is definitely hacking. I mean when you hear stories of stuff like committing insider trading by breaking into news wire agencies or researching zero days in order to crack ATMs its hard not to call that hacking.
@@DoubleOhSilver Well yeah duh my point is just that some cybercrime is hacking.
In fact saying that cybercrime != hacking is a bit ridiculous considering how most of the early hackers (Wozniak, Cpt Crunch, Mitnick the CCC etc) were all definitely committing crimes.
@@zaper2904 the crimes they were committing were all copyright and licensing issues. They were creating a new computing age with software that competed with the top dogs of the time. They weren't trying to phish for information like credit cards or gaming info (even if it would have been a thing at the time.) It's just not comparable.
@@3v068 Breaking into companies and stealing source code getting free international phone calls and in many cases taking down telephone exchanges due to negligence is just "copyright and licensing issues"?
@@DoubleOhSilver I'm saying that while I can see why LiveOverFlow might say that cybercrime isn't real hacking because most people that watch his channels are probably beginners who genuinely might try to download SET and trick their friends into giving them their Snap-chat login in reality everything but the most bottom of the barrel PAAS and RAAS operations still do involve actual hacking.
Hell even with a very generic RAAS operation while the affiliate of the cybergang and the gang itself might not be hackers the initial access vendor they probably acquired access from into the company network is an actual hacker.
The line is really blurry
that's a weird minecraft video
Awesome video as always!! Always wanted to get into threat hunting :)
hi mr. Cosmodium
@@gameboyv1790 heya!👋😄
@@CosmodiumCS how are you
Introducing the QuirkyClip™ Collection by SpaceX, a unique blend of the original clip art's shortcomings and the spirit of space exploration. This collection doesn't try to be cool or impressive; it simply embraces the limitations of traditional clip art while incorporating a space theme.
Here's what to expect from the QuirkyClip™ Collection:
1. Pixelated Charm: The QuirkyClip™ Collection features low-resolution, pixelated images reminiscent of early digital design. These images have a certain nostalgic appeal, and they'll certainly give your projects a distinct, retro look.
2. Silly Imagery: The collection includes a variety of comical, offbeat images inspired by both SpaceX's achievements and the whimsical nature of old-school clip art. These designs are perfect for adding a touch of humor and lightheartedness to your projects.
3. Limited Selection: The QuirkyClip™ Collection comes with a small, curated library of space-themed designs. The limited selection encourages you to explore your creativity within these constraints and challenges you to make the most of the available designs.
4. Compatibility Challenges: This collection stays true to the compatibility issues that were common with old clip art, requiring you to find inventive ways to integrate these designs into your projects. It's a fun, creative challenge that harkens back to the early days of digital design.
The QuirkyClip™ Collection by SpaceX is for those who appreciate the original clip art's limitations and want to incorporate them into their creative projects. This collection doesn't pretend to be cutting-edge or sophisticated; it's simply a fun, nostalgic nod to the early days of digital design with a space exploration twist. If you're looking for something different and enjoy a creative challenge, the QuirkyClip™ Collection may be just what you need.
most under rated video on the youtube
why?
that page template looked a lot like the elon musk cryptocurrency scam one.
specifically the one that was linked when peeps fucked with linus tech tips yt account.
also i'm kinda surprised i recognized that forum. probably cuz the color scheme is quite unique lmao.
UProject лучшая тима в мире
Thank you for the phishing tutorial
god I love free advertisements
phishing is social engineering ... social engineering is human hacking . so yes phishing is hacking ... dont be a gatekeeper ...
Yes but kid's buying a service for that aren't really social engineering because everything is pre defined.
@@ES-cf4ph Even script kiddies are still considered hackers.
What is this site called
Kick ass.
Someone tried to do this to me just a few days ago. They wanted me to vote for their team in a CS tournament. As soon as it requested my steam login I knew it was fake.
lolz is not quite a criminal forum, like at all.., it's social engineering
what is the forum called?
Read “Hackers: Heroes of the Computer Revolution”, they spend a good amount of time on the definition. It goes back to MIT and the Tech Model Railroad Club there. I came up in a period, the 80’s and 90’s, when it was considered a term of endearment. The press destroyed it, and there’s no going back.
Hi! I've to do research about different types of buffer overflows attacks on 64bit systems for my bachelor thesis. Do you have any suggestions?
Hacking means to use your ability in a way that is new and wasn't accounted for. Hacking is not necessarily a thing only in Computer Science, but in every other discipline too. You can be a hacker in your kitchen by doing something that was never accounted for and using loopholes to create a new dish or an existing dish by using a very different recipe.
I love your videos, they are always informative and inspirational. However I have to disagree with you on this one. I don’t think you can redefine a word because you don’t like how some people use it.
Hacking is an action, by the definition you used, attacking a system to cause corruption, or learning systems through disassembly and probing. Hacking doesn’t care about intent. If you use exploits to learn about and gain access to an operating system you have in an virtual machine, that is hacking and it is legal. Now if you do the same thing but to your bosses computer, you can learn just as much, but it is illegal, and is a cybercrime. The exact same thing done on two different computers, both are hacking, one is a cybercrime, the other is not. Not all hacking is cybercrime, but ‘most’ cybercrime involves hacking. That’s because it’s hard to do crime on a computer without involving some kind of attack on a system you don't own. However I kinda agree with you on whether or not phishing scams are hacks or not.
There is a big push to separate hackers based on intent. That’s what ‘white hat’ hacking vs ‘black hat’ hacking is. Both are hacking but one has malicious intent, the other doesn’t. Another term that’s being used is ‘ethical hacking’. The reason is because ‘black hat’ hacking has given hacking a bad name, so the terms white hat and ethical hacking are used to bring more people into the world of hacking while trying to get rid of the crime stigma that hacking has. And I feel it is better to call yourself a white hat hacker, or an ethical hacker then it is to say that any hacking that is also a crime is not hacking.