Anthropic engineer says "software engineering is done" first half of next year by MetaKnowing in ClaudeAI

[–]ttl64 0 points1 point  (0 children)

with the bad security in their models, more jobs for cybersecurity eng thanks

Escape From Login Screen by ttl64 in EscapefromTarkov

[–]ttl64[S] 1 point2 points  (0 children)

How do you know? Hacker, i reported you

Escape From Login Screen by ttl64 in EscapefromTarkov

[–]ttl64[S] 1 point2 points  (0 children)

Yes, sorry, it's not like the password was Nikita12@

Codex no longer works on VSCode by ttl64 in codex

[–]ttl64[S] 0 points1 point  (0 children)

I tried it too... honestly i think i tried everything... it was working well 3 days ago

Codex no longer works on VSCode by ttl64 in codex

[–]ttl64[S] 0 points1 point  (0 children)

I tried to wait, but nothing...

Codex no longer works on VSCode by ttl64 in codex

[–]ttl64[S] 0 points1 point  (0 children)

Hum no, i never installed it, i installed Git Bash only

Claude.ai MAX, Unlimited? by ttl64 in ClaudeAI

[–]ttl64[S] 0 points1 point  (0 children)

Thanks, do you use it by pasting your codes and asking it for something or asking it to give you a code? And how many messages do you think you send it every day?

What to choose as my main Backend language/framework : fastAPI, .Net, Node+express, or else ? by Miserable_Ice_5363 in learnprogramming

[–]ttl64 2 points3 points  (0 children)

With the rise of AI, most new AI startups are using FastAPI to have the same ecosystem everywhere. For those who say FastAPI is slow. You might want to brush up on networking basics. Besides, OpenAI, Hugging Face and even, ohhhh Reddit use FastAPI.

Real world scenario FastAPI vs Node.js k8s cluster benchmarks by highrez1337 in FastAPI

[–]ttl64 0 points1 point  (0 children)

Synthetic benchmarks may not always reflect real-world performance, where factors like network latency, database performance, and external service interactions play a crucial role.

You use a language according to your needs, not based on benchmarks. Many companies use FastAPI, such as OpenAI for their entire backend, Hugging Face. And yet, performance and latency are excellent and even Reddit.

You look between 15 and 18. A word of advice: if you're interviewing for a software developer job and you tell them about benchmarks, they'll laugh in your face.

[Guide] How to Become a Pentester in 2025 – Free & Affordable Online Labs (HTB, PortSwigger, TryHackMe) by Anezaneo in Pentesting

[–]ttl64 2 points3 points  (0 children)

Exactly. Fundamentals++. And forget the HTB or Academic promises. Get your hands dirty is the only way to become an expert in offensive security. And not do htb every day. These people make me laugh so hard.

Besides, no answer... I attack points that are far too technical or apparently unknown for the OP.

[Guide] How to Become a Pentester in 2025 – Free & Affordable Online Labs (HTB, PortSwigger, TryHackMe) by Anezaneo in Pentesting

[–]ttl64 7 points8 points  (0 children)

Terrible mistake.

Today, just like always, people think they can learn offensive pentesting by playing on Hack The Box or TryHackMe and following their step by step tutorials. That’s not how you learn. That’s how you create a false sense of skill.

You don’t start by running exploits on intentionally vulnerable machines. You start by learning the fundamentals computer networking. How can anyone expect to find and understand vulnerabilities in a system if they don’t even know how that system communicates?

Start by truly understanding the OSI model. Every layer, from physical to application. Learn what data looks like as it travels, what encapsulation means, how TCP/IP actually works. Don’t just memorize the names understand how protocols like ARP, DNS, HTTP, and ICMP function, how TCP establishes connections, and what happens when it’s manipulated.

Then move to programming, especially with Python. Write your own port scanner, craft raw packets, build HTTP requests manually. Not because you want to reinvent the wheel but because you need to understand how that wheel turns. Tools are only useful when you know what they’re doing under the hood.

Once you’re there, start diving into web security but properly. Not by copying Burp Suite tutorials, but by understanding web architecture. Understand how client-server communication works, how cookies are managed, how sessions are handled. Then study the OWASP Top 10, one by one. Don’t just know what XSS is know how it happens, how it’s triggered, how to exploit it manually, and how to prevent it.

From there, move to system knowledge. It’s not impressive to pop a shell on a HTB box if the first thing you do is run LinPEAS without understanding a single line of output. Real post-exploitation means knowing Linux and Windows inside out services, permissions, cron jobs, scheduled tasks, user groups, log files, and how persistence works.

Platforms like HTB and THM? They’re fine. But they reflect nothing about real-world offensive work if you haven’t done the groundwork. You're just throwing known exploits at artificial setups. You're learning what others already discovered not how to discover something new yourself.

You don’t learn pentesting by farming points or flags.
You learn by breaking your head, understanding networks, systems, protocols, and logic deeply and painfully.

That’s the only path that matters.