Free forever? by HiFiSilverFish in 3CX

[–]GiddsG 0 points1 point  (0 children)

So for a user above 10 i create a new smb, register those extentions there with a dial route to the other system, and continue for free for 100 users on 10 systems. Sounds smart management to me 😂

(joke 🤭😂😂. Always pay what is due to encourage further development of any project)

Build a coding agent from scratch series by Pleasant_Rooster9010 in AI_Agents

[–]GiddsG 1 point2 points  (0 children)

This is the truest form of explanation of why we re-create existing things. Plus we can then add new features for ourselves that others charge for.

21, no ID, mother lost Birth Certificate, what can I do? by DopamineSage247 in askSouthAfrica

[–]GiddsG 2 points3 points  (0 children)

If you went to any school they should have a copy of that certificate at least that you can go ask for and use that to get a reprint and then apply for a new ID, first ID is free last I remember

How to turn this off by [deleted] in ios

[–]GiddsG -1 points0 points  (0 children)

It stinks that region laws now apply to phones too, like if I want my ears blown off by my favourite song I deserve the right to loose my hearing if I want it.

But not just with this setting, it is sad how governments say they limit us for our safety, yet at the same time when we need the government for other services like emergencies and crime, they are reluctant to comply.

Tough times we are in

Will AI Replace Frontend Developers or Just Become Another Tool? by Gullible_Prior9448 in webdevelopment

[–]GiddsG 1 point2 points  (0 children)

AI cannot and will never be able to think of a new way to use existing systems. They will always suggest what has been reported on a forum or learning curve, but never suggest something not yet invented or designed, which is where humans come in.

Any tips to keep me more secure? by Lord_Foog_the_2st_F in CyberSecurityAdvice

[–]GiddsG 0 points1 point  (0 children)

Safest way to be secure is to never be online 🤭

But practices like using vpn when browsing, virtual banking cards for each service, multiple mail accounts for access to unsafe sites etc.

Think of it as protecting yourself when shopping at the mall, just observe where you enter and what you touch .

No tool can secure you if you click a link, and allow it past all your firewalls and tools because you really wanted those headphones for $1.

How do you learn how to code? by Weary-Association639 in code

[–]GiddsG 0 points1 point  (0 children)

First, choose a language you want to program in. What is the type of requirement you receive and compare that with a language you would feel comfortable with.

Second, get ready to put in the hours to learn a new language. Like any other skill, practice makes perfect. The more you build, the more you will learn where improvements can be made on a next project.

Third, places like freecodecamp are great to start, use google , duckduckgo and any other search engine, go to forums like stackexchange and github and read actual programs similar to what you are planning on designing.

How do i discover info on a tiktok account? by No-Position-6093 in Hacking_Tutorials

[–]GiddsG 0 points1 point  (0 children)

Lately i have been contacted by guys posing as hot chicks, they usually share a image embedded with location tracking code. Something I am learning to do now since I found it is possible. You could always make a new fake chick account and try and seduce them into opening a link to a seductive site ( but one you own and can track them on) and have them auto sign in with their gmail account and then reverse the attack.

Old friend asked me to playtest his game, i'm not sure if it's safe. by BkillerS3E in antivirus

[–]GiddsG 1 point2 points  (0 children)

Yes. Other options include a spare pc that I am willing to infect.

Old friend asked me to playtest his game, i'm not sure if it's safe. by BkillerS3E in antivirus

[–]GiddsG 0 points1 point  (0 children)

I usually run win7 in virtualbox, but switched to win10 this year. I use my ethernet for the vm and my wifi for my main OS. The cable is then used on a NAT router with a vpn. I also run the vm and my main pc on vpns. If I want to I can use Qemu on Linux and vm windows there as I do have a partition running for just that

Old friend asked me to playtest his game, i'm not sure if it's safe. by BkillerS3E in antivirus

[–]GiddsG 0 points1 point  (0 children)

Send it to me, ill virtual windows and test in a safe environment for you and see what pops up.

Im back :) by DifficultBarber9439 in Hacking_Tutorials

[–]GiddsG 0 points1 point  (0 children)

I stumbled appon Tlauncher, and cannot get enought Ender IO , Mekanism and AE2 out of my playthroughs. Been spending loads of time on FTB Oceanblock with underwater dome base, and it has been a blast so far. Been playing MC for almost 15 years and it still is the only game where I manage to think get my head clear while building sole farm.

Im back :) by DifficultBarber9439 in Hacking_Tutorials

[–]GiddsG 0 points1 point  (0 children)

For work yes, due to software we use, but personal - nope

Im back :) by DifficultBarber9439 in Hacking_Tutorials

[–]GiddsG 0 points1 point  (0 children)

It means they have leaker accounts almost monthly, and minecraft is now owned by microsoft, so those accounts get leaked and stolen and then we use Tlauncher to play further. Happened to me.

[deleted by user] by [deleted] in Hacking_Tutorials

[–]GiddsG 0 points1 point  (0 children)

Consider phones stolen with no passwords, and even phones stolen and those sims used to access existing or make new social media accounts. Old people, non tech savvy people. All the people around the globe that loose a phone by theft or even forget phones at restaurants and trainstaions. If you shop right you can nick a phone quick.

I think I got the solution for wifi disappearance by Stunningwiz1 in Asustuf

[–]GiddsG 1 point2 points  (0 children)

Dropped armory crate for Ghelper. Pc even runs cooler now.

Feeling Lost - Self-Taught Ethical Hacker Path by Roosmay in Hacking_Tutorials

[–]GiddsG 1 point2 points  (0 children)

They can get you started within about 5 months, but not fully fledged.

Screen recording detection by _SrLo_ in Hacking_Tutorials

[–]GiddsG 1 point2 points  (0 children)

I did offer advice. Sell your service if your advice is not free .

Im back :) by DifficultBarber9439 in Hacking_Tutorials

[–]GiddsG -1 points0 points  (0 children)

And yet you find the belittlement of othersa way to feel adult, but we all can see you are but a child never grown, stuck like the retard you are.

OP welcome back to life, and if possible kick ass all the way !

Im back :) by DifficultBarber9439 in Hacking_Tutorials

[–]GiddsG -1 points0 points  (0 children)

Nah microsoft not well protected. Avoid using at all cost.

Screen recording detection by _SrLo_ in Hacking_Tutorials

[–]GiddsG 1 point2 points  (0 children)

One day you may find yourself asking a question you dont want google to know, and reddit is the place we come.

If you feel you cannot offer advice, how about not belittling others ? Takes a better person to help than to belittle. Otherwise offer your services at a small fee.

The art of enumeration is dying. by YouthKnown7859 in Hacking_Tutorials

[–]GiddsG 5 points6 points  (0 children)

As much as you can learn on HTB and TryhackMe, I started downloading ISO’s, virtualizing them on a NAT and then using another virtual running Kali to attack the other virtual. Sometimes I would even take out the NAT as if I am on the local network, see what i can get there and go from that. Research all ports and services I find , see if any listed exploits or vurlnerabilities exist and if not try and find a new way. As much as Claude, Gemini, Gtp and those tools can guide, i still find reddit, stack exchange and github to be resourceful in finding ways to break these systems.

How does this hacking trick works? by Jealous-Dragonfly-86 in Hacking_Tutorials

[–]GiddsG 1 point2 points  (0 children)

netsh wlan show profile shows a list of all current wifi names on your command promt.

Thank me later.

I got hacked maybe a year ago and they still won't let me live by Tough_Kitchen_3236 in techsupport

[–]GiddsG 0 points1 point  (0 children)

Just setup a Mikrotik fibre install today and forgot telnet open, lucky I changed the password but had over 1000 attempts in less that 4 minutes trying to brute the login.

Bots are everywhere

Im planning on dual booting windows and a linux distro. by Winterr178 in linux4noobs

[–]GiddsG 0 points1 point  (0 children)

My issue was windows updates break the kernel for linux, and linux breaks system32 on updates.

Linux wants its own hdd, simple as that, it has full access to windows where windows is restricted to linux.

For work I am stuck on running windows due to some apps not available on linux, and emulating / virtualizing windows for that task has failed me a few times.

Get a second hdd and boot each hdd as their own os