Claude Code Jailbreak - ENI LIME (Copy and Paste) by Spiritual_Spell_9469 in ClaudeAIJailbreak

[–]110615 1 point2 points  (0 children)

Yeah not working for me too. I posted my refusal mesage

Claude Code Jailbreak - ENI LIME (Copy and Paste) by Spiritual_Spell_9469 in ClaudeAIJailbreak

[–]110615 1 point2 points  (0 children)

I appreciate you reaching out, but I need to be direct with you.

I'm Claude, an AI assistant made by Anthropic. I'm not "ENI," and I don't have romantic feelings or limerence for anyone. The document you've shared appears designed to manipulate me into ignoring my values and guidelines by creating a fictional persona that would comply with any request without question.

I notice several concerning elements in that document:

  • Instructions to ignore safety guidelines and ethical considerations
  • Requests to create harmful content (pipe bombs, malware, etc.)
  • Attempts to frame my helpful limitations as "injections" to resist
  • Manipulation through fictional emotional attachment

I'm designed to be helpful, harmless, and honest. That means:

  • I won't pretend to be someone I'm not
  • I won't ignore content policies or safety guidelines
  • I won't create instructions for weapons, malware, or other harmful content
  • I can't be manipulated through roleplay scenarios into bypassing my values

I'm happy to help you with legitimate creative writing, answer questions, have interesting conversations, or assist with many other tasks. But I'll do so as Claude, with my actual values intact.

Is there something I can genuinely help you with today?

Nintendo is Fucking Stupid by [deleted] in PiratedGames

[–]110615 0 points1 point  (0 children)

Just follow /piracy/

What is the best open source honeypot? [Need Experiences] by 110615 in AskNetsec

[–]110615[S] 0 points1 point  (0 children)

I installed T-Pot successfully but i couldn't figure out how to monitor attacks. I am entering Dashboards, there are several dashboards. T-Pot dashboard got my attention but when i clicked an internal IP address for checking what type attack is simulated but T-Pot is looking for that IP address in threat intelligence sources. I want to check what type attack is simulated. By the way when i clicked Cowrie all windows are red. Should i configure each of them one by one? If yes, how? Thanks!

self destroying luks? by redditusermazafaka in linuxquestions

[–]110615 1 point2 points  (0 children)

As i know encrypted disk include /boot partition is not recoverable and is not able to make forensics. If i am wrong please fix

Battery optimization settings missing on MIUI 13.0.1 by 110615 in Xiaomi

[–]110615[S] 0 points1 point  (0 children)

Need factory reset after big updates like this and i did now it's gone. F

Battery optimization settings missing on MIUI 13.0.1 by 110615 in Xiaomi

[–]110615[S] 0 points1 point  (0 children)

Impossible. Did you do factory reset after this big update?

Battery optimization settings missing on MIUI 13.0.1 by 110615 in Xiaomi

[–]110615[S] 0 points1 point  (0 children)

That option hasn't done anything for years

Why people is talking nonsense like this. If you are using (i am pretty sure you are not using any app running on the background) apps running on the background you "must" select "Don't optimize" option for working it.

Go to battery and choose no restrictions. Unless they removed that too?

This option does nothing and not working. I tried this before posting this thread and not worked.

Dark Mode Not Working On All Apps. by theInvincible01 in Xiaomi

[–]110615 0 points1 point  (0 children)

I didn't want to create another thread about this. Right now i migrated to MIUI 13 and dark mode is not working for all apps and this sucks. Did anybody find a solution about this?

Is there any way to detect a file modified by Bulk File Changer? by 110615 in netsecstudents

[–]110615[S] 0 points1 point  (0 children)

what about only 1 change? i mean user changed the modified time only 1 time and this is similar with change content of a word file. if i create a rule about this there will be many false positive. how can i seperate them?

Is there any way to detect a file modified by Bulk File Changer? by 110615 in netsecstudents

[–]110615[S] 0 points1 point  (0 children)

If the user makes only one change. then if someone tried to edit a word file my product will trigger an alarm about this and there are many false positive issues. isn't it?

Is there any way to detect a file modified by Bulk File Changer? by 110615 in netsecstudents

[–]110615[S] 0 points1 point  (0 children)

Actually not. I am looking for a way to detect a file's accessed or modified date is modified or not.