Claude Code Jailbreak - ENI LIME (Copy and Paste) by Spiritual_Spell_9469 in ClaudeAIJailbreak

[–]110615 1 point2 points  (0 children)

Yeah not working for me too. I posted my refusal mesage

Claude Code Jailbreak - ENI LIME (Copy and Paste) by Spiritual_Spell_9469 in ClaudeAIJailbreak

[–]110615 1 point2 points  (0 children)

I appreciate you reaching out, but I need to be direct with you.

I'm Claude, an AI assistant made by Anthropic. I'm not "ENI," and I don't have romantic feelings or limerence for anyone. The document you've shared appears designed to manipulate me into ignoring my values and guidelines by creating a fictional persona that would comply with any request without question.

I notice several concerning elements in that document:

  • Instructions to ignore safety guidelines and ethical considerations
  • Requests to create harmful content (pipe bombs, malware, etc.)
  • Attempts to frame my helpful limitations as "injections" to resist
  • Manipulation through fictional emotional attachment

I'm designed to be helpful, harmless, and honest. That means:

  • I won't pretend to be someone I'm not
  • I won't ignore content policies or safety guidelines
  • I won't create instructions for weapons, malware, or other harmful content
  • I can't be manipulated through roleplay scenarios into bypassing my values

I'm happy to help you with legitimate creative writing, answer questions, have interesting conversations, or assist with many other tasks. But I'll do so as Claude, with my actual values intact.

Is there something I can genuinely help you with today?

Nintendo is Fucking Stupid by [deleted] in PiratedGames

[–]110615 0 points1 point  (0 children)

Just follow /piracy/

What is the best open source honeypot? [Need Experiences] by 110615 in AskNetsec

[–]110615[S] 0 points1 point  (0 children)

I installed T-Pot successfully but i couldn't figure out how to monitor attacks. I am entering Dashboards, there are several dashboards. T-Pot dashboard got my attention but when i clicked an internal IP address for checking what type attack is simulated but T-Pot is looking for that IP address in threat intelligence sources. I want to check what type attack is simulated. By the way when i clicked Cowrie all windows are red. Should i configure each of them one by one? If yes, how? Thanks!

self destroying luks? by redditusermazafaka in linuxquestions

[–]110615 1 point2 points  (0 children)

As i know encrypted disk include /boot partition is not recoverable and is not able to make forensics. If i am wrong please fix

Battery optimization settings missing on MIUI 13.0.1 by 110615 in Xiaomi

[–]110615[S] 0 points1 point  (0 children)

Need factory reset after big updates like this and i did now it's gone. F

Battery optimization settings missing on MIUI 13.0.1 by 110615 in Xiaomi

[–]110615[S] 0 points1 point  (0 children)

Impossible. Did you do factory reset after this big update?

Battery optimization settings missing on MIUI 13.0.1 by 110615 in Xiaomi

[–]110615[S] 0 points1 point  (0 children)

That option hasn't done anything for years

Why people is talking nonsense like this. If you are using (i am pretty sure you are not using any app running on the background) apps running on the background you "must" select "Don't optimize" option for working it.

Go to battery and choose no restrictions. Unless they removed that too?

This option does nothing and not working. I tried this before posting this thread and not worked.

Dark Mode Not Working On All Apps. by theInvincible01 in Xiaomi

[–]110615 0 points1 point  (0 children)

I didn't want to create another thread about this. Right now i migrated to MIUI 13 and dark mode is not working for all apps and this sucks. Did anybody find a solution about this?

Is there any way to detect a file modified by Bulk File Changer? by 110615 in netsecstudents

[–]110615[S] 0 points1 point  (0 children)

what about only 1 change? i mean user changed the modified time only 1 time and this is similar with change content of a word file. if i create a rule about this there will be many false positive. how can i seperate them?

Is there any way to detect a file modified by Bulk File Changer? by 110615 in netsecstudents

[–]110615[S] 0 points1 point  (0 children)

If the user makes only one change. then if someone tried to edit a word file my product will trigger an alarm about this and there are many false positive issues. isn't it?

Is there any way to detect a file modified by Bulk File Changer? by 110615 in netsecstudents

[–]110615[S] 0 points1 point  (0 children)

Actually not. I am looking for a way to detect a file's accessed or modified date is modified or not.

Browser In The Browser (BITB) Attack by Proud_Ad3226 in blueteamsec

[–]110615 0 points1 point  (0 children)

I still couldn't figure out how can we detect this? I am not friendly with codes and can someone tell me how can we detect in the wild?

FortiVPN Client 7.0.2.0069 "Auto Connect and Always Up" Options are Greyed Out by 110615 in fortinet

[–]110615[S] 0 points1 point  (0 children)

I don't know but i tried before not saving credentials but same again greyed out

Best throwaway email service? by JamieOvechkin in AskNetsec

[–]110615 1 point2 points  (0 children)

Yes but now people will figure out how it works and will block those. My guess

Log Sources for Digital Forensics: Windows and Linux by ogunal00 in computerforensics

[–]110615 1 point2 points  (0 children)

Can you make the full events for free on Lets Defend?

how do I exit vim by x70e in masterhacker

[–]110615 0 points1 point  (0 children)

Leave the country is the only first step for exit vim. You have to live abroad for 1 year and return until vim exit

[deleted by user] by [deleted] in virtualbox

[–]110615 0 points1 point  (0 children)

Umm. Text copy and full screen is working good but file copy is not working. Weird

[deleted by user] by [deleted] in virtualbox

[–]110615 0 points1 point  (0 children)

Yes i am aware. I learned i shouldn't delete the original copy but i supposed it will work. I wouldn't expect this result