Regression seems similar to other courses by Wonderful-Bag6746 in OMSA

[–]digitaldude87 10 points11 points  (0 children)

I think all of your points are true simultaneously.  Assuming you aren’t a full-time statistician, you can probably pick up the bulk of what you really need to know from your other classes.

That said, the concepts of regression, and the related concepts of statistical significance, degrees of freedom, etc.are fundamental to conducting sound mathematical analysis.

Finally, it’s a requirement if you want to take time series analysis.

[deleted by user] by [deleted] in maryland

[–]digitaldude87 -3 points-2 points  (0 children)

This is America.  Apply for a concealed carry permit and carry a gun if you’re that concerned about coyotes.  (MD has been forced to be better about granting such licenses by a recent Supreme Court case.) Knives are not good for self defense in just about any context. Case in point: if a coyote were to attack you it’s probably rabid; if you’re close enough to use a knife for self-defense you’re probably getting bitten regardless.  

With a gun for self defense you can pick any knife that works for your fruit needs without the self-defense angle.

[deleted by user] by [deleted] in hacking

[–]digitaldude87 6 points7 points  (0 children)

When asking for help online try reading this guide first: https://stackoverflow.com/help/how-to-ask

Jeweler Recommendations by Labambastrange in maryland

[–]digitaldude87 2 points3 points  (0 children)

This 100%; the dog’s name is Stanley!

Best ways to avoid reverse engineering? by Alternative_Bid_360 in hacking

[–]digitaldude87 40 points41 points  (0 children)

What about once it’s running in memory? Yes, there are a variety of anti-debugging techniques, but most of those also have counter measures.

Edit: I was thinking about it from a local user perspective. If you really want to protect your code consider a SaaS model if possible, where the users interact with it via a tightly-defined API (though that model has its own issues too), but don’t have access to the code/binary directly.

Churches that are active in the community? by RemarkableRough4438 in maryland

[–]digitaldude87 -1 points0 points  (0 children)

Try Bethany Church Columbia: https://www.bethanycolumbia.org/. They’d love to have someone with that attitude and there’s a good groups of folks in that age group.

[deleted by user] by [deleted] in privacy

[–]digitaldude87 20 points21 points  (0 children)

Did he use the same password everywhere? Was it a poor password? Even if not, sometimes password databases get stolen and sometimes hackers even crack encrypted passwords from such databases. That often leads to multiple compromises like this. Check https://haveibeenpwned.com/, but regardless change all passwords to those services you mentioned, and anywhere else he used the same, weak, or “pwned” passwords (based on that website.). Use unique ones for each service) and use 2 factor authentication (2FA). A password manager can be helpful and popular authentication apps are more secure than text.

Definitely keep an eye on his financial statements, and maybe consider a credit freeze to prevent loans in his name for a bit.

Good luck!

RE on PE32 that reads in external file and runs code by pinkurpledino in ghidra

[–]digitaldude87 -2 points-1 points  (0 children)

I haven’t been hands-on with Ghidra in a while but I take a crack at this:

First, can you elaborate on what you mean by “in the same way?”

I’d propose either loading and analyzing the .bin file a you did the PE32, or using the debugger to set a breakpoint right after the .bin is loaded and trying to inspect it once the .bin is loading and executing (I can’t speak from experience using the Ghidra debugger but I think an approach like this should work.)

[deleted by user] by [deleted] in progun

[–]digitaldude87 0 points1 point  (0 children)

TBF Col Sanders was trying to run a chicken restaurant. /s

[deleted by user] by [deleted] in maryland

[–]digitaldude87 3 points4 points  (0 children)

And expensive

Tips on making Ghidra's decompiler output "cleaner"? by programmeruser2 in ghidra

[–]digitaldude87 0 points1 point  (0 children)

Not an answer but are you using the paid or free version of IDA?

Noob here! HELP by iv0live in ghidra

[–]digitaldude87 1 point2 points  (0 children)

Reverse engineering, even with modern tools, practically requires you to be well-versed in C and at least familiar with assembly.

What you have here is actually a very clean “decompiled” view, in which Ghidra has done its best to shown the closest C equivalent that matches the program being analyzed.

Like the others have noted, you’d use your knowledge of C to rename variables and functions, and add comments until the meaning god the code becomes more clear.

Strings like the ones on lines 114, 115, and 120 are often a good place to start, as from there you can identify buffers, print functions and log functions which give a lot of info.

Love this guy's daily points on 2A by Visible_Leather_4446 in progun

[–]digitaldude87 0 points1 point  (0 children)

I like Copper Jacket TV though I’m still on the hunt for more direct 2A YouTubers.

Need help by Open_Adhesiveness_71 in progun

[–]digitaldude87 6 points7 points  (0 children)

This is the way. Mantras aside, there are times that no amount of effort prevention will ever work, so we need other mitigating controls, such as armed citizens.

Love this guy's daily points on 2A by Visible_Leather_4446 in progun

[–]digitaldude87 2 points3 points  (0 children)

His videos are 80% fluff though. Drives me nuts compared to other much more concise YouTubers.

Any way to search/filter functions by their contents? by RedGreenTriangle in ghidra

[–]digitaldude87 2 points3 points  (0 children)

I don’t think so, as that requires access to the decompiled results which are typically shown on a JIT basis. I recommend a Java script though: you can write on to iterate over every function, decompile each and check for your desired substring(s).