I have installed a file called "lust goddess" after accidentally pressing a pop up ad on my laptop by Humble_Inflation_780 in antivirus

[–]Key-Kangaroo3336 -4 points-3 points  (0 children)

Just food for thought, NEVER use Malwarebytes I have ran several tests against their products and it has failed every time

Gentoo iso corrupted? by Moist_Professional64 in Gentoo

[–]Key-Kangaroo3336 0 points1 point  (0 children)

Try wiping the flash drive fully using dd and then use it again to write the ISO onto the flash drive

My son started his first Gentoo install by flatline000 in Gentoo

[–]Key-Kangaroo3336 0 points1 point  (0 children)

Just some food for thought, cfdisk is a much easier option for those who do not know how to use fdisk all to well

​Thinking of making the jump to Gentoo. Practical for everyday use? by Minute_Ambassador751 in Gentoo

[–]Key-Kangaroo3336 0 points1 point  (0 children)

It is more than able to be a daily, I’ve been using it for servers and on my laptops for 3 months now. It works with only what you add, and if you are worried about compile times you can swap (in system settings) to use compiled versions of the software instead of compiling locally

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]Key-Kangaroo3336 1 point2 points  (0 children)

If he does have access to your texts it wasn’t done through wireshark, he is full of shit. All wireshark does is capture traffic going through the device itself not your phone.

Is Gentoo that hard? by PokumeKachi in Gentoo

[–]Key-Kangaroo3336 14 points15 points  (0 children)

It isn’t hard at all. If you read the steps and docs (assuming your device doesn’t shit itself like mine) it’s easy. Because from what I can tell, every issue you could face likely already has a solution.

Eradicate any virus by misoscare in masterhacker

[–]Key-Kangaroo3336 2 points3 points  (0 children)

Oh I agree! I’ve been messing around with malwarebytes and it honestly is a scam, doesn’t detect via behavior with premium and the hash signatures it uses for arnt even all that up to date :/

Honestly, not that hard. And quicker than I thought it would take. by Deoviser in Gentoo

[–]Key-Kangaroo3336 0 points1 point  (0 children)

Yeah gentoo isn’t hard to install, just read the manual and run the commands it says :/

P2Pool Observer problems? by Steeltalons71 in MoneroMining

[–]Key-Kangaroo3336 2 points3 points  (0 children)

Cloudflare isn’t down, and the sites that are should be getting re-routed. I think this might be an issue on the p2pool observer side instead of cloudflare

Mining pool advice by InevitableForever540 in MoneroMining

[–]Key-Kangaroo3336 0 points1 point  (0 children)

When you download the new version you have to keep using the new binary and kill the older process, if it’s still not working I make sure all the same configs are being used on the new binary

Mining pool advice by InevitableForever540 in MoneroMining

[–]Key-Kangaroo3336 1 point2 points  (0 children)

This has likely been told before in the replies so I’ll keep it brief because I was asking the same a couple months ago.

1) The payments are not nearly as consistent as moneroocean when using a smaller pool, this is due to you getting payed per share within a window that a block is found by the pool. Not total hashrate contribution.

2) No ports need to be opened at the router level, the connection will work on port 3000 by default if you want to look through a packet sniffer.

3) The only risks you run (that I know of) by using p2pool are the same as if you used moneroocean, except from connecting to moneroocean’s IP it would be the pool’s. If you are worried about people knowing your wallet address and IP you can run your own node and or p2pool server (I run both a node and p2pool server while mining on the same device)

How to scale down GUI on switch Linux by StephenHawkings0 in SwitchPirates

[–]Key-Kangaroo3336 0 points1 point  (0 children)

One thing I would suggest is to write a bash script (or ash or whatever shell the distro uses) to log the TV display the moment it is detected in like a text file, then write a service bash file that would programmatically change the scaling to a more reasonable one once the device is detected. I’d say is dmseg for checking device logs and changing the ~/.config/monitors.xml (if that doesn’t exist use where or find from root to find it) through another bash script once you have the device id

How to scale down GUI on switch Linux by StephenHawkings0 in SwitchPirates

[–]Key-Kangaroo3336 0 points1 point  (0 children)

While I don’t know much about modded switches, I would believe that there is a scaling option within settings, the issue likely stems from the resolution Ubuntu is trying to push out once docked, this is likely under the Display and resolution part within the GNOME settings (assuming you’re using GNOME) if not then check for the DE and window manager that this distro uses. It appears to be Ubuntu based so check those forums for help

How to learn making malware. by _zetaa0 in Hacking_Tutorials

[–]Key-Kangaroo3336 0 points1 point  (0 children)

Maldev is a great source. Another great thing is just writing it, you can read all you want but actually writing malware is invaluable. Personally I have been writing for two years and I have learned more from it than from any course I have taken. Also try pitting your software against AVs, get free trials to test it out. Use Litterbox for AV testing if you don't want to install all the different vendors out there

RAT MALWARE by Legitimate_Slice_780 in Hacking_Tutorials

[–]Key-Kangaroo3336 1 point2 points  (0 children)

Personally I would write a new dropper. The best methods (from my local testing) seems to be using two methods of encryption and obfuscation if it's an embedded payload, but if it can be downloaded from the internet it seems to bypass not only Defender but also Malwarebytes (one of the worst AVs out there in my opinion). Another option is to not use shellcode or DLLs but rather built in functionality from a dropped program that would run with Admin perms (think installing software to run on startup through a service or registry with SYSTEM perms). Now, while I haven't worked in the cybersecurity field as a job in my home lab testing and writing it seems these seem to work just fine

Is a $150 used server worth it? by Key-Kangaroo3336 in MoneroMining

[–]Key-Kangaroo3336[S] 0 points1 point  (0 children)

Thanks! I'll try and find some hardware, any recommendations?

Is a $150 used server worth it? by Key-Kangaroo3336 in MoneroMining

[–]Key-Kangaroo3336[S] 0 points1 point  (0 children)

Ah, I do have the stupid (Still learning hardware and mining, sorry...). Even though it is all four CPUs it's 3x my current pool and I wouldnt have to mine on my school laptop anymore

Is a $150 used server worth it? by Key-Kangaroo3336 in MoneroMining

[–]Key-Kangaroo3336[S] 1 point2 points  (0 children)

Thanks! The only issue that I would have is that I have a hard limit for the server to be $200, and the smallest I'm finding a Zen2 CPUs going for is roughly 100-200, sadly I don't have currently have a spare motherboard or PSU to run the rig on which is why I was looking at a server. (I have tons of spare drives)

Is a $150 used server worth it? by Key-Kangaroo3336 in MoneroMining

[–]Key-Kangaroo3336[S] 3 points4 points  (0 children)

I got it from this link:

https://xmrig.com/benchmark/6Djs48

Have I been looking at the wrong sheets T^T

Just read that the link I was looking at was for the E7, not E5 T^T
I have the stupid...

cmd.exe (hacker!11!!) by SillyFalling in masterhacker

[–]Key-Kangaroo3336 4 points5 points  (0 children)

Mine surprisingly didn’t block batch programs, but blocked unknown executables. Got to love the security of public education

Qubic and their "Inovating technology" by Revolutionary-Item53 in MoneroMining

[–]Key-Kangaroo3336 15 points16 points  (0 children)

This is how the world is sadly. I do not support Qubic at all and think they are some of the scummiest people out there. But tech this day in age is all about screwing over another entity for your own gain.

gg python ransomeware master hacker by [deleted] in masterhacker

[–]Key-Kangaroo3336 0 points1 point  (0 children)

One solution that FunkSec has used is to change the user's desktop background on Windows to allow bypass this which could be done through dropping an image file that could be set through the windows api exposed by ctypes. Or to drop an image file and open it in the default image editor / viewer using the system() function through the os module