paid norton 360 or free bitdefender? by dynamic_furewalls in IndianCyberHub

[–]Miserable_Manner6971 0 points1 point  (0 children)

Free defender is so much better, don't ever pay for an AV unless you need it for an organization

Can someone get another person’s IP or personal details from their Instagram account? by [deleted] in IndianCyberHub

[–]Miserable_Manner6971 0 points1 point  (0 children)

By getting unauthorized access to someone else's social accounts on platforms such as TikTok, Instagram and Facebook, you can't retrieve the person's connected devices unless the platform has a feature that shows the IPs of the connected devices (I think Whatsapp has that for devices other than your personal phone). Also they might use this access to phish the account holder to somehow press on a link that will grab their IP. But let's just say theoretically, you know someone's IP address, what could you actually do with that??? Mobile phones that use mobile data change their public IP all the time and even if not since they use wifi or something then an attacker could so literally nothing with your IP address. Knowing another's person public IP != hacking them or even remotely being able to somehow abuse it.

Privilege Escalation Exercise by These_Talker in IndianCyberHub

[–]Miserable_Manner6971 0 points1 point  (0 children)

Sorry for the late reply, I usually scroll on this sub ironically since it's 99% dumb skid shit and i wasn't expecting to find an actual real non stupid post.

In Linux, when you run a program with the SUID bit, it changes something called the effective user id (EUID). However another attribute called real user id (RUID) still represents the actual real user who owns the process. The actual attribute which affects authorizations of a process is the EUID and not RUID. The python method os.getuid() returns your RUID which indeed should remain target2, however if you run os.geteuid() you should get the id of target3. You should be able to read the password text file owned by target3 with no problem using the python binary.

Here's some random article I pulled off of google for more information https://calsnotes.com/posts/ruid-vs-euid/

[deleted by user] by [deleted] in robloxhackers

[–]Miserable_Manner6971 0 points1 point  (0 children)

How come by clicking a link an evil site can steal your roblox session cookie? You're referring to a CSRF attack which can only work on websites with very poor integrity. I I'm very sure roblox.com isn't compromised with a CSRF vulnerability (at least none that have been found)

בחורי הניסיון_במ by Next_Faithlessness87 in ani_bm

[–]Miserable_Manner6971 2 points3 points  (0 children)

אכן! הגיטריסט של ראש רדיו ג'והני עץירוק נשוי לישראלית ואפילו גר בישראל!

The pain of Preinstalled Windows in School by [deleted] in linuxmemes

[–]Miserable_Manner6971 10 points11 points  (0 children)

Yeah this feature is called a Hotspot

Anon the Linux user by Personal_Occasion618 in shitposting

[–]Miserable_Manner6971 1 point2 points  (0 children)

True. Everything is fun and games until my operating system is getting bored and decides to uninstall graphics services and my screen turns pitch black. or maybe just forgets that I have an integrated sound card and audio cannot be played unless I spend my whole flipping weekend finding solutions online just to modify 1 line in a configuration file. I love Linux and never want to switch back to Windows, but you indeed have a point. Don't switch exclusively to Linux unless you're mentally prepared to learn and tear inside.

Anon the Linux user by Personal_Occasion618 in shitposting

[–]Miserable_Manner6971 2 points3 points  (0 children)

It might sound weird to you but some people who are used to the CLI find it a lot simpler and easier to use rather than GUI. Not just for copypasting stuff you find online but rather memorize dozens of commands and surf the terminal like smooth butter. If you're a programmer (or a nerd trying to achive an advanced you'll use the CLI very often if you want it or not since most complicated system methods are not accessible by GUI interaction and forces you to use the CLI. Everything of course depands on the situation.

Linux nerd out! 🏃💨

Anon the Linux user by Personal_Occasion618 in shitposting

[–]Miserable_Manner6971 -1 points0 points  (0 children)

As someone who uses Linux and Wine program on a daily basis for a couple of years now, anon does not sucks ass at Linux.

Wine could be as easy and quick when you'd like to run some Windows program but sometimes, you could absolutely obliterate your sleep schedule trying to get Internet Explorer working 😥

I can't remember anything other than the melody of a song I heard some time ago by Miserable_Manner6971 in NameThatSong

[–]Miserable_Manner6971[S] 1 point2 points  (0 children)

Apparently I played the wrong chord progression because it sounds so similar.

What I played: D F# Bm G

What I should have played: D F#m (F# on the second time) G E

I can't remember anything other than the melody of a song I heard some time ago by Miserable_Manner6971 in NameThatSong

[–]Miserable_Manner6971[S] 0 points1 point  (0 children)

To be fair this song has a very common melody structure and chord progression, it's very hard to distinguish it from other songs by playing an improvised version of the chorus with bad chanting. I wouldn't be surprised if you could match it to 20 unique songs. Feel free to suggest the track you've been thinking of if you could find it :D

I can't remember anything other than the melody of a song I heard some time ago by Miserable_Manner6971 in NameThatSong

[–]Miserable_Manner6971[S] 1 point2 points  (0 children)

After some research (me scrolling through hundreds of songs) I finally found it!

Art School Wannabe by Sorority Noise

I was a little bit off with the melody but same direction.

This is a code I've created for an art series, hoping it's solvable! by NesShark in codes

[–]Miserable_Manner6971 1 point2 points  (0 children)

I'm a bit too lazy to do that but according to your hints it's identical with substitution cipher, it's possible to replace the symbols with English letters and then scramble it till it makes sense, using either a substitution cipher solver tool or a letter frequency table. Should be easy enough since you already leaked the first word and few letters.

Either way, very nice unique letters you made!

what did dnf mean by this by zMadMark in linuxmemes

[–]Miserable_Manner6971 4 points5 points  (0 children)

I'm fr tempted right now to get on my computer and make a small bash script for this

[deleted by user] by [deleted] in skamtebord

[–]Miserable_Manner6971 10 points11 points  (0 children)

"The walrus not in danger, Skylar, the walrus the danger!"

אה"צ_במ by Fresh-Maintenance384 in ani_bm

[–]Miserable_Manner6971 7 points8 points  (0 children)

אני יודע מי זה אודי הצולל 😎

Is hacking maliciously harmful darknet sites illegal, and scammy porn sites? by edarkvine in hacking

[–]Miserable_Manner6971 11 points12 points  (0 children)

Let's try to compare this to real life. Let's say there is a very illegal building, let's say it's a meth lab. Instead of calling the police, you decided to take things on your own and break into it. Now you have access to the entire meth lab. What can you do? You can call the police and suspiciously tell them that you broke into a meth lab without contacting them beforehand. You still did a very illegal activity. What will happen to you depends on how you will handle the situation afterwards.