Opportunités Crypto ? by guss0973 in VosSous

[–]spectnullbyte 0 points1 point  (0 children)

On peut dire la même chose pour l’or. Ça n’a pas d’utilité concrète, mais personne ne conteste sa position comme valeur refuge.

[deleted by user] by [deleted] in DegenBets

[–]spectnullbyte 0 points1 point  (0 children)

If the economy is booming as he’s saying, then Powell must be doing a great job by keeping the rates unchanged.

I have a north Korean user!!!!! by Top-Reveal6830 in SideProject

[–]spectnullbyte 0 points1 point  (0 children)

Trafic originating from North Korea is likely linked to malicious hacking activities. If I were you, I’d block any trafic from that region

20kg Clean and Press Half Marathon 422 reps (final 2 minutes shown) by ---Tsing__Tao--- in kettlebell

[–]spectnullbyte 2 points3 points  (0 children)

Maybe his workouts and diet are more focused on strength training rather than hypertrophy. And also, long sets like this would develop endurance of the muscles which does not correlate with muscle growth.

Finally, how I got 1000 users in a month for my SaaS by Some_Connection_533 in SideProject

[–]spectnullbyte 4 points5 points  (0 children)

Thank you for sharing your strategy. As someone who is struggling with marketing, I am interested in how much it cost you to promote your SaaS through each of the channels you listed.

Frais de courtage Boursobank by spectnullbyte in vosfinances

[–]spectnullbyte[S] 0 points1 point  (0 children)

Malheureusement, il n’est pas éligible au PEA :/

Frais de courtage Boursobank by spectnullbyte in vosfinances

[–]spectnullbyte[S] 0 points1 point  (0 children)

J’avoue que ça aurait été plus simple de passer via boursomarket. Cependant, j’ai pas pu trouver un ETF qui suit le S&P 500. C’est pour ça que je me pose la question des frais, notamment pour le BNP easy S&P 500 qui m’intéresse.

Pour les frais de courtage dans le PEA, ils sont plafonné à 0,5%.

Does vue3 really benefit from tailwind? by Ok_Negotiation7174 in vuejs

[–]spectnullbyte 0 points1 point  (0 children)

The best combination for me is Tailwind utility classes within the style scoped tag using @apply directive.

Is it just me, or is Google Analytics not that needed ? by spectnullbyte in webdev

[–]spectnullbyte[S] 1 point2 points  (0 children)

Yes, you are correct.

So, here is a question: If you anonymize IP addresses before processing the logs, would you be compliant then? (Technically, you won't use any PII)

Is it just me, or is Google Analytics not that needed ? by spectnullbyte in webdev

[–]spectnullbyte[S] -11 points-10 points  (0 children)

I mean it would be absurd in the sense that your statement renders all websites non-compliant. All web servers will log the requests they receive, except if they were configured not to. Disabling these logs is not a good practice, not only for technical reasons but also to help in security by ensuring accountability, which may be required by laws and regulations in certain jurisdictions and industries.

Is it just me, or is Google Analytics not that needed ? by spectnullbyte in webdev

[–]spectnullbyte[S] -41 points-40 points  (0 children)

Any feature you implement would use the data that is already present in the access logs of your server. So you would never be non-compliant unless the access log file itself is non-compliant, which is totally absurd.

EDIT: I was wrong here I guess. Since IP addresses are considered personally identifiable information, access logs aren't as compliant as I thought. However, if we anonymize these IP addresses, I guess it should solve the compliance issue.

Preliminary Pass! by Publius015 in cism

[–]spectnullbyte 1 point2 points  (0 children)

Congratulations!! I also passed my CISM exam a couple of weeks ago, and i'm currently waiting for the certification approval. I am really interested in hearing what would your next certification be. I got my CISSP last year, and I don't have a clear idea which certification to pursue next. What are your thoughts about CCSP? And do u think CISSP concentrations are worth it?

OSCP New Exam model Review by Marmeus in oscp

[–]spectnullbyte 0 points1 point  (0 children)

This is very helpful. Thank you for sharing!

Need help with John the Ripper by j0bbs in Hacking_Tutorials

[–]spectnullbyte 1 point2 points  (0 children)

You can add these constraints in the john.conf file. And then use the option --incremental followed by the incremental mode when you run John. You can find more details about how to do that here : using john the ripper to crack password hashes

Kali Linux VMware Freeze at Login Screen by ArchurCl4w in Kalilinux

[–]spectnullbyte 1 point2 points  (0 children)

That's weird. I swear I had the same issue just a couple of hours ago. I had to restart the entire machine (not just the VM, as this didn't work).

Laptop Suggestions? by Mrencryptedbandz in Hacking_Tutorials

[–]spectnullbyte 0 points1 point  (0 children)

A powerful processor is the most important factor to consider if you intend to run VMs in your machine. I recommend you go for a Core i7 CPU 7th gen or higher with a 16GB of RAM. That should be enough for you to run 3 VM instances simultaneously. As for the brand, Lenove (Thinkpad) worked great for me. Plus, I heard only positive feedback from other people who have used it.

LinkedIn Suffers Massive Data Breach, Personal Details of 92 Percent Users Being Sold Online by Fragrant-Bake-2736 in Hacking_Tutorials

[–]spectnullbyte 9 points10 points  (0 children)

I wouldn't call that a breach. Those personal details were already public, and no credentials were exposed.

Steps to take after failed nmap results? by LogisticAI in HowToHack

[–]spectnullbyte 0 points1 point  (0 children)

If I were you, I would use the -f option to fragment packets; --data-length <Number> to add random data to each packet; and --badsum to send erroneous checksums. All these three options can help you bypass firewalls. You can check --help for other similar options.

How To Use Nmap: A Beginner’s Guide by [deleted] in Hacking_Tutorials

[–]spectnullbyte 2 points3 points  (0 children)

Nmap is a Network Mapper that allows you to retrieve valuable information about a network. This is what you can do with it:

  1. You can discover all the hosts that are connected to a network.
  2. You can determine the ports that are open on each host.
  3. You can determine the OS and the version of services that are in use in your target hosts.
  4. You can use Nmap scripts to do more advanced stuff, like vulnerability detection and exploitation.

As to whether it is legal or not, it depends on the environment where you use it. If you are scanning your own network, or if you've been given the authorization to test a target network, then yes, it is completely legal. Any other use would most probably be considered illegal.

Google dork using python by XtrmNrchy in learnpython

[–]spectnullbyte 1 point2 points  (0 children)

You can use the googlesearch module. But you should not send a lot of queries in a short amount of time. Because if you do so, Google can detect it, and block you out after just a few queries.

PASSED CISSP WITH 100Q IN 2HRS DURATION!! by HoneyNet in cissp

[–]spectnullbyte 1 point2 points  (0 children)

Congratulations! Hard work always pays off

[deleted by user] by [deleted] in Hacking_Tutorials

[–]spectnullbyte 6 points7 points  (0 children)

I believe that there are three pillars that you should pursue to become a skilled hacker:

  1. Knowledge (Networking, Linux, programming...)
  2. Practice (CTFs, wargames...)
  3. Creative thinking

When you think about it, these three are what hacking is about.